A collective attestation scheme towards cloud system
Tóm tắt
Từ khóa
Tài liệu tham khảo
Petrolo, R., Loscri, V., Mitton, N., et al.: Towards a smart city based on cloud of things, a survey on the smart city vision and paradigms[C]. Trans. Emerg. Telecommun. Technol. 28(1), e2931 (2017)
Miah, S.J., Hasan, J., John, G.: On-cloud healthcare clinic: an e-health consultancy approach for remote communities in a developing country. Telematics Inform. 34(1), 311–322 (2017)
Lee, Y.T., Hsiao, W.H., Huang, C.M., et al.: An integrated cloud-based smart home management system with community hierarchy. IEEE Trans. Consum. Electron. 62(1), 1–9 (2016)
Ever, E.: Performability analysis of cloud computing centers with large numbers of servers. J. Supercomput. 73(5), 2130–2156 (2017)
Shukla, V., Jain, A.: Design and analysis of high speed optical routers for next generation data centre network. J. Eng. Res. 6(2), 122–137 (2018)
Xiao, Y., Zhang, X., Zhang, Y., et al. One bit flips, one cloud flops: cross-VM row hammer attacks and privilege escalation. USENIX security symposium, pp. 19–35 (2016).
Liao, X., Alrwais, S., Yuan, K., et al. Lurking malice in the cloud: understanding and detecting cloud repository as a malicious service. In: Computer and communications security, pp. 1541–1552 (2016).
Tak, B.C., Isci, C., Duri, S.S., et al. Understanding security implications of using containers in the cloud. USENIX annual technical conference, pp. 313–319 (2017).
Sohal, A.S., Sandhu, R., Sood, S.K., et al.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–354 (2018)
Cloud Security Alliance. Top threats to cloud computing: egregious eleven. https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven, 2019-08-06/2020-07-08.
Asha, B. Alteryx S3 leak leaves 123m American households exposed. https://www.zdnet.com/article/alteryx-s3-leak-leaves-120m-american-households-exposed/. 2017-12-19/2020-07-08.
Ali, T., Ismail, R., Musa, S., et al.: Design and implementation of an attestation protocol for measured dynamic behavior. J. Supercomput. 74(11), 5746–5773 (2018)
Santos, N., Gummadi, K.P., Rodrigues, R. et al. Towards trusted cloud computing. In: IEEE international conference on cloud computing technology and science, pp. 1–5 (2009).
Partha, S., Pritam, S., Sunirmal, K. A distributed approach towards trusted cloud computing platform. In: Applications and innovations in mobile computing, pp. 146–151 (2005).
Asokan, N., Brasser, F., Ibrahim, A., et al. SEDA: scalable embedded device attestation. In: Computer and communications security, pp. 964–975 (2015).
Stephen, A., Benedict, S., Kumar, R.P., et al.: Monitoring IaaS using various cloud monitors. Cluster Comput. 22(5), 12459–12471 (2019)
Balasubramanian, V., Mala, T.: Cloud data integrity checking using bilinear pairing and network coding. Cluster Comput. 22(3), 6927–6935 (2019)
Vijayakumar, K., Arun, C.: Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC. Cluster Comput. 22(5), 10789–10800 (2019)
Ali, T., Nauman, M., Jan, S., et al.: Trust in IoT: dynamic remote attestation through efficient ehaviour capture. Cluster Comput. 21(1), 409–421 (2018)
Nunes, I.O., Dessouky, G., Ibrahim, A., et al. Towards systematic design of collective remote attestation protocols. In: International conference on distributed computing systems, pp. 1188–1198 (2019).
Ibrahim, A. Collective attestation: for a stronger security in embedded networks. In: Symposium on reliable distributed systems, pp. 267–268 (2018).
Tan, H., Tsudik, G., Jha, S., et al.: MTRA: multi-tier randomized remote attestation in IoT networks. Comput Secur 81, 78–93 (2019)
Dushku, E., et al.: SARA: Secure asynchronous remote attestation for IoT systems. IEEE Trans. Inf. Forensics Secur. 15, 3123–3136 (2020)
Sailer, R., Zhang, X., Jaeger, T., et al. Design and implementation of a TCG-based integrity measurement architecture. USENIX security symposium, pp. 16–16 (2004).
Xing, B., Han, Z., Chang, X., et al.: OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurr. Comput. 27(5), 1092–1109 (2015)
Shim, K.: An ID-based aggregate signature scheme with constant pairing computations. J. Syst. Softw. 83(10), 1873–1880 (2010)
Schuster, F., Costa, M., Fournet, C., et al. VC3: Trustworthy data analytics in the cloud using SGX. In: IEEE symposium on security and privacy, pp. 38–5, (2015).
Hua, Z., Gu, J., Xia, Y., et al. vTZ: virtualizing {ARM} TrustZone. USENIX security symposium, pp. 541–556 2017().
Baumann, A., Peinado, M., Hunt, G.C., et al.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. 33(3), 1–26 (2015)
Wang, J., Hong, Z., Zhang, Y., et al.: Enabling security-enhanced attestation with intel SGX for remote terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1), 88–96 (2018)
Arnautov, S., Trach, B., Gregor, F., et al. SCONE: secure Linux containers with Intel SGX. Operating systems design and implementation, pp. 689–703 (2016).