Security and trust preserving inter‐ and intra‐cloud VM migrations

This paper focus on providing a secure and trustworthy solution for virtual machine (VM) migration within an existing cloud provider domain, and/or to the other federating cloud providers. The infr ...

[1]  Carsten Schürmann,et al.  Towards a Mechanized Proof of Selene Receipt-Freeness and Vote-Privacy , 2017, E-VOTE-ID.

[2]  Andy Hopper,et al.  Predicting the Performance of Virtual Machine Migration , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[3]  Trent Jaeger,et al.  Verifying System Integrity by Proxy , 2012, TRUST.

[4]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[5]  David A. Basin,et al.  Alethea: A Provably Secure Random Sample Voting Protocol , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).

[6]  Joint Task Force Transformation Initiative,et al.  Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .

[7]  Mats Björkman,et al.  Security and Trust Preserving VM Migrations in Public Clouds , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[9]  Trent Jaeger,et al.  Seeding clouds with trust anchors , 2010, CCSW '10.

[10]  Ghassan O. Karame,et al.  Enabling secure VM-vTPM migration in private clouds , 2011, ACSAC '11.

[11]  Ralf Sasse,et al.  A Formal Analysis of 5G Authentication , 2018, CCS.

[12]  Ahmad-Reza Sadeghi,et al.  Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.

[13]  Kenneth A. Goldman,et al.  A Practical Guide to TPM 2.0 , 2015, Apress.

[14]  Patrick Howard FISMA Principles and Best Practices: Beyond Compliance , 2011 .

[15]  David A. Basin,et al.  The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.

[16]  Michael Franz,et al.  Awarded Best Paper! Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing , 2004, Virtual Machine Research and Technology Symposium.

[17]  Haibo Chen,et al.  Daonity - Grid security from two levels of virtualization , 2007, Inf. Secur. Tech. Rep..

[18]  Larry Feldman,et al.  Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations | NIST , 2015 .

[19]  Antonio Puliafito,et al.  A Remote Attestation Approach for a Secure Virtual Machine Migration in Federated Cloud Environments , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.

[20]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[21]  Ahmad-Reza Sadeghi,et al.  A protocol for property-based attestation , 2006, STC '06.

[22]  Basel Katt,et al.  Quantitative security assurance metrics: REST API case studies , 2018, ECSA.

[23]  Wei Lu,et al.  MalwareTextDB: A Database for Annotated Malware Articles , 2017, ACL.

[24]  Haibo Chen,et al.  PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.

[25]  Cas J. F. Cremers,et al.  A Comprehensive Symbolic Analysis of TLS 1.3 , 2017, CCS.