2015 24th International Conference on Computer Communication and Networks (ICCCN) 2015
DOI: 10.1109/icccn.2015.7288394
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines

Abstract: In cloud computing, quality of services is often enforced through Service Level Agreement (SLA) between end users and cloud providers. While SLAs on hardware resources such as CPU cycles or bandwidth can be monitored by low layer sensors, the enforcement of security SLAs stays a very challenging problem. Several high level architectures for security SLAs have been proposed. However, details still need to be filled before they can be deployed.In this paper, we propose to design mechanisms to detect violations o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…For example, out of 572 business and technology executives that were surveyed in Berman et al [Berman, Lynn, Marshall et al (2012)],51% relied on cloud computing for business model innovation. These demands also become a driving force for the development of cloud security and wireless security, which ranges from very theoretical efforts such as homomorphic encryption to very engineering mechanisms defending against side channel attacks through memory and cache sharing [Xie and Wang (2013b); Xie, Wang and Qin (2015); Pan, Lei, Zhang et al (2018)].…”
Section: Introductionmentioning
confidence: 99%
“…For example, out of 572 business and technology executives that were surveyed in Berman et al [Berman, Lynn, Marshall et al (2012)],51% relied on cloud computing for business model innovation. These demands also become a driving force for the development of cloud security and wireless security, which ranges from very theoretical efforts such as homomorphic encryption to very engineering mechanisms defending against side channel attacks through memory and cache sharing [Xie and Wang (2013b); Xie, Wang and Qin (2015); Pan, Lei, Zhang et al (2018)].…”
Section: Introductionmentioning
confidence: 99%