The HybrEx model for confidentiality and privacy in cloud computing

作者: Steven Y. Ko , Kyungho Jeon , Ramsés Morales

DOI: 10.5555/2170444.2170452

关键词: Cloud computingComputer scienceComputer securityExecution modelConfidentiality

摘要: … We illustrate this with an example called CloudBurst [18], a … CloudBurst’s input consists of (potentially) private data called … a private cloud gives more computing power, which can lead to …

参考文章(18)
Edward W. Felten, Michael J. Freedman, Ariel J. Feldman, William P. Zeller, SPORC: group collaboration using untrusted cloud resources operating systems design and implementation. pp. 337- 350 ,(2010) , 10.5555/1924943.1924967
Jacobus Van der Merwe, Prashant Shenoy, K. K. Ramakrishnan, Timothy Wood, Alexandre Gerber, The case for enterprise-ready virtual private clouds ieee international conference on cloud computing technology and science. pp. 4- ,(2009)
Vitaly Shmatikov, Ann Kilzer, Srinath T. V. Setty, Indrajit Roy, Emmett Witchel, Airavat: security and privacy for MapReduce networked systems design and implementation. pp. 20- 20 ,(2010) , 10.5555/1855711.1855731
Andreas Haeberlen, Peter Druschel, Rodrigo Rodrigues, Paarijaat Aditya, Accountable virtual machines operating systems design and implementation. pp. 119- 134 ,(2010) , 10.5555/1924943.1924952
Krishna P. Gummadi, Nuno Santos, Rodrigo Rodrigues, Towards trusted cloud computing ieee international conference on cloud computing technology and science. pp. 1- 5 ,(2009)
Craig Gentry, Fully homomorphic encryption using ideal lattices Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09. pp. 169- 178 ,(2009) , 10.1145/1536414.1536440
Michae Walfish, Mike Dahlin, Allen Clement, Srinath Setty, Prince Mahajan, Sangmin Lee, Lorenzo Alvisi, Depot: cloud storage with minimal trust operating systems design and implementation. pp. 307- 322 ,(2010) , 10.5555/1924943.1924965
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds computer and communications security. pp. 199- 212 ,(2009) , 10.1145/1653662.1653687
M. C. Schatz, CloudBurst: highly sensitive read mapping with MapReduce Bioinformatics. ,vol. 25, pp. 1363- 1369 ,(2009) , 10.1093/BIOINFORMATICS/BTP236