2012
DOI: 10.2197/ipsjtrans.5.156
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Information Leakage from Virtual Machines' Memory in IaaS Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Permitted access can be configured by users. Secure Runtime Environment [2,23] and VMCrypt [24] prevent information leakage from the memory of VMs to cloud operators. These systems encrypt the memory of VMs only when cloud operators access it from the management VM, while the systems do not when the VMs themselves access its memory.…”
Section: Secure Vm Management On Trusted Hypervisorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Permitted access can be configured by users. Secure Runtime Environment [2,23] and VMCrypt [24] prevent information leakage from the memory of VMs to cloud operators. These systems encrypt the memory of VMs only when cloud operators access it from the management VM, while the systems do not when the VMs themselves access its memory.…”
Section: Secure Vm Management On Trusted Hypervisorsmentioning
confidence: 99%
“…Cloud operators inside the virtualized system cannot access the memory using VMI. Like the above systems [2,23,24], CloudVisor securely encrypts the memory when users' VMs are migrated. However, the overhead of nested virtualization is not small.…”
Section: Secure Vm Management On Untrusted Hypervisorsmentioning
confidence: 99%
“…This out-of-band remote management relies on the management VM, but the management VM is not always trustworthy in clouds [1], [2], [3], [4], [5]. Since the user VMs can be migrated between data centers, it is not guaranteed that they are run in data centers where all the administrators are trusted.…”
Section: Out-of-band Remote Managementmentioning
confidence: 99%
“…We assume that IaaS providers themselves are trusted. This assumption is widely accepted [1], [2], [3], [4], [5]. To guarantee the trustworthiness, a small number of trusted administrators are responsible for the maintenance of the VMM and the hardware.…”
Section: Threat Model and Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation