Rasmusson, Lars and Aslam, Mudassar (2012) Protecting Private Data in the Cloud. In: The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 18-21 April 2012, Porto, Portugal. (In Press)
|PDF - Published Version |
Available under License Creative Commons Attribution No Derivatives.
Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company. We describe a system organization that prevents host administrators from directly accessing or installing eaves-dropping software on the machine that holds the client's valuable data. Clients are monitored via machine code probes that are inlined into the clients' programs at runtime. The system enables the cloud provider to install and remove software probes into the machine code without stopping the client's program, and it prevents the provider from installing probes not granted by the client.
|Item Type:||Conference or Workshop Item (Paper)|
|Uncontrolled Keywords:||cloud computing; virtualization; trusted computing; binary translation|
|Deposited By:||Lars Rasmusson|
|Deposited On:||20 Mar 2012 14:30|
|Last Modified:||17 Jan 2013 11:19|
Repository Staff Only: item control page