Researches on Architecture Extensions for Cloud Security
Author:
Affiliation:

Funding:

Ethical statement:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
    Abstract:

    The security issue of cloud computing has received widely attention in recent years. Due to the sharing, out-sourcing and openness features of cloud computing mode, the end-users don’t gain the complete control over their computing and data. Instead, a malicious system operator can tamper with or steal user’s critical data without user’s awareness. Some researchers tried to protect the privacy and integrity of data in the cloud by extending architecture and reduce the hardware/software stack that cloud security relies on. This paper presents technologies in these researches, including enforcing memory isolation, encryption by secure processor, et al.

    Reference
    Related
    Cited by
Get Citation

LIU Yu-tao, XIA Yu-bin, CHEN Hai-bo. Researches on Architecture Extensions for Cloud Security[J]. Journal of Integration Technology,2012,1(4):30-33

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
History
  • Received:
  • Revised:
  • Adopted:
  • Online: April 08,2013
  • Published: