Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review

FAM Ibrahim, EE Hemayed - Computers & Security, 2019 - Elsevier
Cloud computing is no longer the future but the present. Security and trust are critical in
cloud computing, but how can cloud service tenants trust cloud service providers to store all …

Infrastructure as a service security: Challenges and solutions

W Dawoud, I Takouna, C Meinel - 2010 the 7th International …, 2010 - ieeexplore.ieee.org
Cloud Computing represents a new computing model that poses many demanding security
issues at all levels, eg, network, host, application, and data levels. The variety of the delivery …

Intertrust: Towards an efficient blockchain interoperability architecture with trusted services

G Wang, M Nixon - 2021 IEEE international conference on …, 2021 - ieeexplore.ieee.org
Blockchain as a potentially disruptive technology can advance many different fields, eg,
cryptocurrencies, supply chains, and the industrial Internet of Things. The next-generation …

[PDF][PDF] Private Virtual Infrastructure for Cloud Computing.

FJ Krautheim - HotCloud, 2009 - usenix.org
Cloud computing places an organization's sensitive data in the control of a third party,
introducing a significant level of risk on the privacy and security of the data. We propose a …

Enabling secure VM-vTPM migration in private clouds

B Danev, RJ Masti, GO Karame, S Capkun - Proceedings of the 27th …, 2011 - dl.acm.org
The integration of Trusted Computing technologies into virtualized computing environments
enables the hardware-based protection of private information and the detection of malicious …

Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing

FJ Krautheim, DS Phatak, AT Sherman - … June 21-23, 2010. Proceedings 3, 2010 - Springer
We introduce a new mechanism for rooting trust in a cloud computing environment called
the Trusted Virtual Environment Module (TVEM). The TVEM helps solve the core security …

Remote attestation of confidential VMs using ephemeral vTPMs

V Narayanan, C Carvalho, A Ruocco, G Almási… - Proceedings of the 39th …, 2023 - dl.acm.org
Trying to address the security challenges of a cloud-centric software deployment paradigm,
silicon and cloud vendors are introducing confidential computing–an umbrella term aimed at …

Property-based TPM virtualization

AR Sadeghi, C Stüble, M Winandy - International Conference on …, 2008 - Springer
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially
migration of virtual machines (VMs) between hardware platforms provides a useful and cost …

Security for the cloud infrastructure: Trusted virtual data center implementation

S Berger, R Cáceres, K Goldman… - IBM Journal of …, 2009 - ieeexplore.ieee.org
The trusted virtual data center (TVDc) is a technology developed to address the need for
strong isolation and integrity guarantees in virtualized environments. In this paper, we …

CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing

T Zhang, RB Lee - Proceedings of the 42nd Annual International …, 2015 - dl.acm.org
Cloud customers need guarantees regarding the security of their virtual machines (VMs),
operating within an Infrastructure as a Service (IaaS) cloud system. This is complicated by …