Disk Storage Isolation and Verification in Cloud

被引:0
|
作者
Wang, Zhan [1 ]
Sun, Kun
Jajodia, Sushil
Jing, Jiwu [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100864, Peoples R China
基金
美国国家科学基金会;
关键词
Multi-tenancy; Cloud Storage Isolation; Verification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multi-tenancy of the cloud maximizes the utility of computation and storage resources by multiplexing the underlying hardware infrastructure amongst cloud customers; however, it also introduces significant security issues such as information leakage between two virtual machines (VMs) even if certain access control policy (e.g., Chinese Wall security policy) has been deployed in the cloud. Physical resource isolation between VMs is an effective mechanism to remove the covert channels in the cloud and prevent information leakage; however, due to economic concerns or negligence, some cheap-and-lazy cloud providers are not motivated to enforce the physical resource isolation as they promised. In this paper, we first develop a mechanism to check the co-residency of two files on local hard disk(s) by measuring the file access time, and then extend our mechanism to check data storage co-residency on Amazon S3 cloud storage.
引用
收藏
页码:771 / 776
页数:6
相关论文
共 50 条
  • [21] One secure data integrity verification scheme for cloud storage
    Fan, Yongkai
    Lin, Xiaodong
    Tan, Gang
    Zhang, Yuqing
    Dong, Wei
    Lei, Jing
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 376 - 385
  • [22] On-demand Integrity Verification Technique for Cloud Data Storage
    Saxena, Rajat
    Dey, Somnath
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2018, 9 (01): : 33 - 50
  • [23] Research on Cloud Storage Verification Technology in Internet of Things Environment
    Yi, Xiaoyin
    Li, Jingyi
    Peng, Gang
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1448 - 1453
  • [24] An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
    Feng, Bin
    Ma, Xinzhu
    Guo, Cheng
    Shi, Hui
    Fu, Zhangjie
    Qiu, Tie
    [J]. IEEE ACCESS, 2016, 4 : 7899 - 7911
  • [25] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    [J]. 2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [26] Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains
    Li, Kai
    Tang, Yuzhe
    Kim, Beom Heyn
    Xu, Jianliang
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 39 - 62
  • [27] S-CDA: A Smart Cloud Disk Allocation Approach in Cloud Block Storage System
    Wang, Hua
    Yang, Yang
    Huang, Ping
    Zhang, Yu
    Zhou, Ke
    Tao, Mengling
    Cheng, Bin
    [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [28] Performance Enhancement of Cloud Based Storage using Disk Scheduling Technique
    Sarkar, Saswati
    Kundu, Anirban
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (01) : 46 - 63
  • [29] A New Virtual Disk Mapping Method for the Cloud Desktop Storage Client
    Hancong Duan
    Xiaoqin Wang
    Ping Lu
    Shengmei Luo
    Zhiyong Wang
    [J]. ZTE Communications, 2014, 12 (04) : 3 - 7
  • [30] Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios
    Han, Bing
    Wang, Hao
    Fang, Min
    Zhang, Yongchao
    Zhou, Lu
    Ge, Chunpeng
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2467 - 2481