Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines

نویسندگان

چکیده

When users upload their private data to the cloud, they lose control of stored in cloud server. If system cannot provide an effective security mechanism protect data, consequent leakage issue will hinder development computing. Conventional access and encryption technologies effectively propagation tenant system. The mandatory one-way information flow model is limited by complexity environment, it difficult cloud. To solve above problems, this article proposes a tenant-led ciphertext method for virtual machines. Through design decentralized policy, secret-domain key management scheme, multi-ID-based threshold strategies taint infection, secret-level reduction, ability are realized form, which can prevent malicious inside outside from illegally reading data. feasibility verified proof experiment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical, Dynamic Information-flow for Virtual Machines

For decades, secure operating systems have incorporated mandatory access control (MAC) techniques. Surprisingly, mobile-code platforms such as the Java Virtual Machine (JVM) and the .NET Common Language Runtime (CLR) have largely ignored these advances and have implemented a far weaker security that does not reliably track ownership and access permissions for individual data items. We have impl...

متن کامل

A Near Optimal Approach in Choosing The Appropriate Physical Machines for Live Virtual Machines Migration in Cloud Computing

Migration of Virtual Machine (VM) is a critical challenge in cloud computing. The process to move VMs or applications from one Physical Machine (PM) to another is known as VM migration. In VM migration several issues should be considered. One of the major issues in VM migration problem is selecting an appropriate PM as a destination for a migrating VM. To face this issue, several approaches are...

متن کامل

a near optimal approach in choosing the appropriate physical machines for live virtual machines migration in cloud computing

migration of virtual machine (vm) is a critical challenge in cloud computing. the process to move vms or applications from one physical machine (pm) to another is known as vm migration. in vm migration several issues should be considered. one of the major issues in vm migration problem is selecting an appropriate pm as a destination for a migrating vm. to face this issue, several approaches are...

متن کامل

An Information Flow Control Model for the Cloud

Concern about data leakage is holding back more widespread adoption of cloud computing by companies and public institutions alike. To address this, cloud tenants/applications are traditionally isolated in virtual machines or containers. But an emerging requirement is for cross-application sharing of data, for example, when cloud services form part of an IoT architecture. Information Flow Contro...

متن کامل

Special Ontology and Cloud Virtual Machines

With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of processes and protection. Yet these architectur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3051061