Acknowledgement
Supported by : 한국연구재단
References
- Cloud Computing Use Case Discussion Group, Cloud Computing Use Case White Paper Version 4.0, July, 2010
- D. Zissis, and D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, Vol. 28(3), March, 2012
- Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, December, 2009
- W. Jansen, and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, January, 2011
- 김태형, 김인혁, 김정한, 민창우, 김지홍, 엄영익, 클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행기술, 정보보호학회논문지, 제20권, 제5호, 2010, 10월
- Cloud Security Alliance, Top Threats to Cloud Computing V1.0, March, 2010
- M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, E. Weippl, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space, Proc. of the USENIX Security Symposium, August, 2011
- S. T. King, Y. M. Wang, C. Verbowski, H. J. Wang, J. R. Lorch, Subvirt: Implementing malware with virtual machines, Proc. of the 2006 IEEE Symposium on Security and Privacy, 2006
- J. Rutkowska, Subverting Vista Kernel For Fun And Profit, Black Hat Briefings, August, 2006
- K. Kortchinsky, CLOUDBURST: A VMware Guest to Host Escape Story, BlackHat USA, 2009
- C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-pre-serving public auditing for data storage security in cloud computing, Proc. of the 29th conference on Information communications, pp.525-533, 2010
- G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possesion, Proc. of SecureComm, 2008
- G. Ateniese, R. Bums, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, D. Song, Remote data checking using provable data possession, ACM Transactions on Information and System Security, Vol. 14(1), May, 2011
- M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, Auditing to keep online storage services honest Proc. of HotOS, 2007
- T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
- K. D. Bowers, A. Juels, and A. Oprea, HAIL: A High-Availability and Integrity Layer for Cloud Storage, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
- K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud, Proc. of the 18th ACM conference on Computer and Communications Security, 2011
- C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, Dynamic Provable Data Possession, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
- K. D. Bower, M. V. Dijk, A. Juels, A. Oprea, and R. L. Rivest, How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes, Proc. ofthe 18th ACM conference on Computer and Communications Security, 2011
- L. Alvisi, A. Clement, M. Dahlin, S. Lee, P. Mahajan, S. Setty, and M. Walfish, Depot: Cloud storage with minimal trust, USENIX Symposium on Operating Systems Design and Implementation, October 2010
- A. Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds, Proc. of the 6th ACM SIGOPS/EuroSysEuropean Systems Conference, April, 2011
- B. parno, J. M. McCune, and A. Perrig, Bootstrapping Trust in Commodity Computers, Proc. of IEEE Symposium on Security and Privacy, 2010
- M. Mannan, B. H. Kim, A. Ganjali, and D. Lie, Unicorn:Two-Factor Attestation for Data Security, Proc. of the 18th ACM conference on Computer and Communications Security, 2011
- E. G. Sier, W. Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. B. Schneider, Logical Attestation: An Authorization Architecture for Trustworthy Computing, Proc. of 23rd ACM Symposium on Operating Systems Principles, 2011
- J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, Flicker: An execution infrastructure for TCB Minimization, Proc. of the European Conference on Computer Systems, April, 2008
- J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrigo TrustVisor: Efficient TCB reduction and attestation, Proc of IEEE Symposium on Security and Privacy, May, 2010
- X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports, Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, Proc. of the 13th international conference on Architectural support for programming languages and operating systems, 2008
- S. B. Suh, Secure architecture and implementation ofxen on arm for mobile devices, 4th Xen Summit, 2007
- F. Zhang, J. Chen, H. chen, and B. Zang, CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization, Proc. of 23rd ACM Symposium on Operating Systems Principles, 2011