Dynamic information extraction and integrity verification scheme for cloud security

N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To become a more popular cloud service, it is necessary to dynamically provision virtualized infrastructure resources and to automatically deploy and optimize workloads based on the state of the workload or the state of the entire infrastructure resource. However, in a cloud-based virtualization infrastructure, when multiple VMs work together to provide a customized virtualized network security service, existing debugging and profiling tools can no longer be used as performance measures or integrity verification tools. In order to solve these drawbacks, a tracing method is used. In the tracing, necessary information is simultaneously recorded with minimal overhead while executing the program. In this paper, we proposed a scheme to guarantee the integrity of the software that composes the VM in the cloud environment using Intel processor trace (PT).

Cite

CITATION STYLE

APA

Kim, H., Kim, Y., Kim, I., & Kim, H. (2018). Dynamic information extraction and integrity verification scheme for cloud security. In Lecture Notes in Electrical Engineering (Vol. 425, pp. 424–429). Springer Verlag. https://doi.org/10.1007/978-981-10-5281-1_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free