2023
DOI: 10.32604/cmes.2023.026371
|View full text |Cite
|
Sign up to set email alerts
|

PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

Abstract: With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime's security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 29 publications
0
0
0
Order By: Relevance
“…Although cloud computing technology is developing and becoming more sophisticated, its security issues still need to be considered [7][8][9]. Nalini used a security tree to illustrate the significance of cloud security and summarize security challenges at three levels: virtualization, applications, and networks [10].…”
Section: Introductionmentioning
confidence: 99%
“…Although cloud computing technology is developing and becoming more sophisticated, its security issues still need to be considered [7][8][9]. Nalini used a security tree to illustrate the significance of cloud security and summarize security challenges at three levels: virtualization, applications, and networks [10].…”
Section: Introductionmentioning
confidence: 99%