Isolation in cloud computing infrastructures: new security challenges View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-04

AUTHORS

Mohammad-Mahdi Bazm, Marc Lacoste, Mario Südholt, Jean-Marc Menaud

ABSTRACT

Cloud computing infrastructures share hardware resources among different clients, leveraging virtualization to multiplex physical resources among several self-contained execution environments such as virtual machines or Linux containers. Isolation is a core security challenge for such a computing paradigm. It may be threatened by side-channels, created due to the sharing of physical resources like processor caches, or by mechanisms implemented in the virtualization layer. Side-channel attacks (SCAs) exploit and use such leaky channels to obtain sensitive data such as kernel information. This paper aims to clarify the nature of this threat for cloud infrastructures. Current SCAs are performed locally and exploit isolation challenges of virtualized environments to retrieve sensitive information. This paper also clarifies the concept of distributed side-channel attack (DSCA). We explore how such attacks can threaten isolation of any virtualized environments such as cloud computing infrastructures. Finally, we study a set of different applicable countermeasures for attack mitigation in cloud infrastructures. More... »

PAGES

197-209

References to SciGraph publications

  • 2013. Cache-Access Pattern Attack on Disaligned AES T-Tables in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks in DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
  • 2006. Trace-Driven Cache Attacks on AES (Short Paper) in INFORMATION AND COMMUNICATIONS SECURITY
  • 2016. HexPADS: A Platform to Detect “Stealth” Attacks in ENGINEERING SECURE SOFTWARE AND SYSTEMS
  • 2016. A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds in INFORMATION AND COMMUNICATIONS SECURITY
  • 2017. KASLR is Dead: Long Live KASLR in ENGINEERING SECURE SOFTWARE AND SYSTEMS
  • 2010. Provably Secure Higher-Order Masking of AES in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2012. A Cache Timing Attack on AES in Virtualization Environments in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2003. Cryptanalysis of DES Implemented on Computers with Cache in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2003
  • 2012. Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds in INFORMATION SECURITY AND PRIVACY RESEARCH
  • 2006. Cache Attacks and Countermeasures: The Case of AES in TOPICS IN CRYPTOLOGY – CT-RSA 2006
  • 2017. LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization in RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES
  • 2016. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds in RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES
  • 2016. Flush+Flush: A Fast and Stealthy Cache Attack in DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
  • 2006. Cache Based Remote Timing Attack on the AES in TOPICS IN CRYPTOLOGY – CT-RSA 2007
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s12243-019-00703-z

    DOI

    http://dx.doi.org/10.1007/s12243-019-00703-z

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1112141901


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Orange (France)", 
              "id": "https://www.grid.ac/institutes/grid.89485.38", 
              "name": [
                "Orange Labs, 44 Avenue de la R\u00e9publique, 92320, Ch\u00e2tillon, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Bazm", 
            "givenName": "Mohammad-Mahdi", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Orange (France)", 
              "id": "https://www.grid.ac/institutes/grid.89485.38", 
              "name": [
                "Orange Labs, 44 Avenue de la R\u00e9publique, 92320, Ch\u00e2tillon, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Lacoste", 
            "givenName": "Marc", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "IMT Atlantique", 
              "id": "https://www.grid.ac/institutes/grid.486295.4", 
              "name": [
                "IMT Atlantique, 4 Rue Alfred Kastler, 44307, Nantes, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "S\u00fcdholt", 
            "givenName": "Mario", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "IMT Atlantique", 
              "id": "https://www.grid.ac/institutes/grid.486295.4", 
              "name": [
                "IMT Atlantique, 4 Rue Alfred Kastler, 44307, Nantes, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Menaud", 
            "givenName": "Jean-Marc", 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1508293.1508300", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000580867"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-32946-3_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002898329", 
              "https://doi.org/10.1007/978-3-642-32946-3_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1653662.1653687", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003067577"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.asoc.2016.09.014", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004918281"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-50011-9_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004923667", 
              "https://doi.org/10.1007/978-3-319-50011-9_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2663474.2663479", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005907924"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11935308_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009287774", 
              "https://doi.org/10.1007/11935308_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11935308_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009287774", 
              "https://doi.org/10.1007/11935308_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2995272.2995279", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013633955"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/cpe.2848", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020238248"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-30806-7_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020759029", 
              "https://doi.org/10.1007/978-3-319-30806-7_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2810103.2813706", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021915846"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2366231.2337172", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024467680"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2046660.2046671", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026426379"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15031-9_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027621097", 
              "https://doi.org/10.1007/978-3-642-15031-9_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15031-9_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027621097", 
              "https://doi.org/10.1007/978-3-642-15031-9_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-45719-2_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028573031", 
              "https://doi.org/10.1007/978-3-319-45719-2_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45238-6_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030691288", 
              "https://doi.org/10.1007/978-3-540-45238-6_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45238-6_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030691288", 
              "https://doi.org/10.1007/978-3-540-45238-6_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2508859.2516741", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031089014"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1972551.1972552", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031237603"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11605805_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032149789", 
              "https://doi.org/10.1007/11605805_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11605805_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032149789", 
              "https://doi.org/10.1007/11605805_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2086696.2086702", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033163572"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1456508.1456514", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034578097"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.entcs.2005.10.031", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035809322"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-30436-1_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038397355", 
              "https://doi.org/10.1007/978-3-642-30436-1_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-40026-1_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039042430", 
              "https://doi.org/10.1007/978-3-642-40026-1_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11967668_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051217849", 
              "https://doi.org/10.1007/11967668_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11967668_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051217849", 
              "https://doi.org/10.1007/11967668_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2499368.2451167", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063162702"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/3037697.3037703", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084924638"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-40667-1_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084927525", 
              "https://doi.org/10.1007/978-3-319-40667-1_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-62105-0_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086138834", 
              "https://doi.org/10.1007/978-3-319-62105-0_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-60876-1_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1090045892", 
              "https://doi.org/10.1007/978-3-319-60876-1_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-66332-6_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1092165458", 
              "https://doi.org/10.1007/978-3-319-66332-6_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/dsnw.2011.5958812", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093619652"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/cloudcom.2011.22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094578100"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/hpca.2016.7446082", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094828714"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/ispa.2009.47", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095361155"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sp.2009.19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095591051"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csnet.2017.8241986", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1100168905"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fmec.2018.8364038", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1104338033"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-04", 
        "datePublishedReg": "2019-04-01", 
        "description": "Cloud computing infrastructures share hardware resources among different clients, leveraging virtualization to multiplex physical resources among several self-contained execution environments such as virtual machines or Linux containers. Isolation is a core security challenge for such a computing paradigm. It may be threatened by side-channels, created due to the sharing of physical resources like processor caches, or by mechanisms implemented in the virtualization layer. Side-channel attacks (SCAs) exploit and use such leaky channels to obtain sensitive data such as kernel information. This paper aims to clarify the nature of this threat for cloud infrastructures. Current SCAs are performed locally and exploit isolation challenges of virtualized environments to retrieve sensitive information. This paper also clarifies the concept of distributed side-channel attack (DSCA). We explore how such attacks can threaten isolation of any virtualized environments such as cloud computing infrastructures. Finally, we study a set of different applicable countermeasures for attack mitigation in cloud infrastructures.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s12243-019-00703-z", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1120575", 
            "issn": [
              "0003-4347", 
              "1958-9395"
            ], 
            "name": "Annals of Telecommunications", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3-4", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "74"
          }
        ], 
        "name": "Isolation in cloud computing infrastructures: new security challenges", 
        "pagination": "197-209", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "9bfe05961e66eaadfaefae8fa44eee6b7193c8d7a1a28f931ed0b365380765a5"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s12243-019-00703-z"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1112141901"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s12243-019-00703-z", 
          "https://app.dimensions.ai/details/publication/pub.1112141901"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T13:25", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000369_0000000369/records_68984_00000001.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://link.springer.com/10.1007%2Fs12243-019-00703-z"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12243-019-00703-z'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12243-019-00703-z'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12243-019-00703-z'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12243-019-00703-z'


     

    This table displays all metadata directly associated to this object as RDF triples.

    210 TRIPLES      21 PREDICATES      65 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s12243-019-00703-z schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author Nbf3ad584f00d4f61a823841f043b01bf
    4 schema:citation sg:pub.10.1007/11605805_1
    5 sg:pub.10.1007/11935308_9
    6 sg:pub.10.1007/11967668_18
    7 sg:pub.10.1007/978-3-319-30806-7_9
    8 sg:pub.10.1007/978-3-319-40667-1_14
    9 sg:pub.10.1007/978-3-319-45719-2_6
    10 sg:pub.10.1007/978-3-319-50011-9_28
    11 sg:pub.10.1007/978-3-319-60876-1_1
    12 sg:pub.10.1007/978-3-319-62105-0_11
    13 sg:pub.10.1007/978-3-319-66332-6_11
    14 sg:pub.10.1007/978-3-540-45238-6_6
    15 sg:pub.10.1007/978-3-642-15031-9_28
    16 sg:pub.10.1007/978-3-642-30436-1_32
    17 sg:pub.10.1007/978-3-642-32946-3_23
    18 sg:pub.10.1007/978-3-642-40026-1_13
    19 https://doi.org/10.1002/cpe.2848
    20 https://doi.org/10.1016/j.asoc.2016.09.014
    21 https://doi.org/10.1016/j.entcs.2005.10.031
    22 https://doi.org/10.1109/cloudcom.2011.22
    23 https://doi.org/10.1109/csnet.2017.8241986
    24 https://doi.org/10.1109/dsnw.2011.5958812
    25 https://doi.org/10.1109/fmec.2018.8364038
    26 https://doi.org/10.1109/hpca.2016.7446082
    27 https://doi.org/10.1109/ispa.2009.47
    28 https://doi.org/10.1109/sp.2009.19
    29 https://doi.org/10.1145/1456508.1456514
    30 https://doi.org/10.1145/1508293.1508300
    31 https://doi.org/10.1145/1653662.1653687
    32 https://doi.org/10.1145/1972551.1972552
    33 https://doi.org/10.1145/2046660.2046671
    34 https://doi.org/10.1145/2086696.2086702
    35 https://doi.org/10.1145/2366231.2337172
    36 https://doi.org/10.1145/2499368.2451167
    37 https://doi.org/10.1145/2508859.2516741
    38 https://doi.org/10.1145/2663474.2663479
    39 https://doi.org/10.1145/2810103.2813706
    40 https://doi.org/10.1145/2995272.2995279
    41 https://doi.org/10.1145/3037697.3037703
    42 schema:datePublished 2019-04
    43 schema:datePublishedReg 2019-04-01
    44 schema:description Cloud computing infrastructures share hardware resources among different clients, leveraging virtualization to multiplex physical resources among several self-contained execution environments such as virtual machines or Linux containers. Isolation is a core security challenge for such a computing paradigm. It may be threatened by side-channels, created due to the sharing of physical resources like processor caches, or by mechanisms implemented in the virtualization layer. Side-channel attacks (SCAs) exploit and use such leaky channels to obtain sensitive data such as kernel information. This paper aims to clarify the nature of this threat for cloud infrastructures. Current SCAs are performed locally and exploit isolation challenges of virtualized environments to retrieve sensitive information. This paper also clarifies the concept of distributed side-channel attack (DSCA). We explore how such attacks can threaten isolation of any virtualized environments such as cloud computing infrastructures. Finally, we study a set of different applicable countermeasures for attack mitigation in cloud infrastructures.
    45 schema:genre research_article
    46 schema:inLanguage en
    47 schema:isAccessibleForFree false
    48 schema:isPartOf N2c5b93defe644a53bb7bc385ec6499f4
    49 N93ba3d9ec1004c7f86237872adbc69c9
    50 sg:journal.1120575
    51 schema:name Isolation in cloud computing infrastructures: new security challenges
    52 schema:pagination 197-209
    53 schema:productId N5714904f5fd34e41978c46cfd710d1ad
    54 N80702a9c1d2f41919ed44f3646bc3bc2
    55 Ne8e48bb53f6f4f4b837afce7a0d628c5
    56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112141901
    57 https://doi.org/10.1007/s12243-019-00703-z
    58 schema:sdDatePublished 2019-04-11T13:25
    59 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    60 schema:sdPublisher N37bac9345a064ec0ab077f6d7434d8b2
    61 schema:url https://link.springer.com/10.1007%2Fs12243-019-00703-z
    62 sgo:license sg:explorer/license/
    63 sgo:sdDataset articles
    64 rdf:type schema:ScholarlyArticle
    65 N2c5b93defe644a53bb7bc385ec6499f4 schema:issueNumber 3-4
    66 rdf:type schema:PublicationIssue
    67 N30b21dc089a4467d88bba328a07d691d schema:affiliation https://www.grid.ac/institutes/grid.89485.38
    68 schema:familyName Bazm
    69 schema:givenName Mohammad-Mahdi
    70 rdf:type schema:Person
    71 N37bac9345a064ec0ab077f6d7434d8b2 schema:name Springer Nature - SN SciGraph project
    72 rdf:type schema:Organization
    73 N5714904f5fd34e41978c46cfd710d1ad schema:name doi
    74 schema:value 10.1007/s12243-019-00703-z
    75 rdf:type schema:PropertyValue
    76 N58cad651fe1744fcac3ac3ba82c4b679 schema:affiliation https://www.grid.ac/institutes/grid.486295.4
    77 schema:familyName Menaud
    78 schema:givenName Jean-Marc
    79 rdf:type schema:Person
    80 N80702a9c1d2f41919ed44f3646bc3bc2 schema:name readcube_id
    81 schema:value 9bfe05961e66eaadfaefae8fa44eee6b7193c8d7a1a28f931ed0b365380765a5
    82 rdf:type schema:PropertyValue
    83 N8a907f319c2b43b2a1bffd8d963435dd rdf:first N58cad651fe1744fcac3ac3ba82c4b679
    84 rdf:rest rdf:nil
    85 N916c7f6043d84866b55433577723c222 schema:affiliation https://www.grid.ac/institutes/grid.486295.4
    86 schema:familyName Südholt
    87 schema:givenName Mario
    88 rdf:type schema:Person
    89 N93ba3d9ec1004c7f86237872adbc69c9 schema:volumeNumber 74
    90 rdf:type schema:PublicationVolume
    91 Nbf3ad584f00d4f61a823841f043b01bf rdf:first N30b21dc089a4467d88bba328a07d691d
    92 rdf:rest Ne6874338420144dd810643f6689e4f35
    93 Nbf6694c02186416e8a1e7aa9927b9593 rdf:first N916c7f6043d84866b55433577723c222
    94 rdf:rest N8a907f319c2b43b2a1bffd8d963435dd
    95 Ne6874338420144dd810643f6689e4f35 rdf:first Nea230359295c48a7ad720fb84be9e2d3
    96 rdf:rest Nbf6694c02186416e8a1e7aa9927b9593
    97 Ne8e48bb53f6f4f4b837afce7a0d628c5 schema:name dimensions_id
    98 schema:value pub.1112141901
    99 rdf:type schema:PropertyValue
    100 Nea230359295c48a7ad720fb84be9e2d3 schema:affiliation https://www.grid.ac/institutes/grid.89485.38
    101 schema:familyName Lacoste
    102 schema:givenName Marc
    103 rdf:type schema:Person
    104 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    105 schema:name Information and Computing Sciences
    106 rdf:type schema:DefinedTerm
    107 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    108 schema:name Computer Software
    109 rdf:type schema:DefinedTerm
    110 sg:journal.1120575 schema:issn 0003-4347
    111 1958-9395
    112 schema:name Annals of Telecommunications
    113 rdf:type schema:Periodical
    114 sg:pub.10.1007/11605805_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032149789
    115 https://doi.org/10.1007/11605805_1
    116 rdf:type schema:CreativeWork
    117 sg:pub.10.1007/11935308_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009287774
    118 https://doi.org/10.1007/11935308_9
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/11967668_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051217849
    121 https://doi.org/10.1007/11967668_18
    122 rdf:type schema:CreativeWork
    123 sg:pub.10.1007/978-3-319-30806-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020759029
    124 https://doi.org/10.1007/978-3-319-30806-7_9
    125 rdf:type schema:CreativeWork
    126 sg:pub.10.1007/978-3-319-40667-1_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084927525
    127 https://doi.org/10.1007/978-3-319-40667-1_14
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/978-3-319-45719-2_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028573031
    130 https://doi.org/10.1007/978-3-319-45719-2_6
    131 rdf:type schema:CreativeWork
    132 sg:pub.10.1007/978-3-319-50011-9_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004923667
    133 https://doi.org/10.1007/978-3-319-50011-9_28
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/978-3-319-60876-1_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090045892
    136 https://doi.org/10.1007/978-3-319-60876-1_1
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/978-3-319-62105-0_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086138834
    139 https://doi.org/10.1007/978-3-319-62105-0_11
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/978-3-319-66332-6_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092165458
    142 https://doi.org/10.1007/978-3-319-66332-6_11
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/978-3-540-45238-6_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030691288
    145 https://doi.org/10.1007/978-3-540-45238-6_6
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/978-3-642-15031-9_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027621097
    148 https://doi.org/10.1007/978-3-642-15031-9_28
    149 rdf:type schema:CreativeWork
    150 sg:pub.10.1007/978-3-642-30436-1_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038397355
    151 https://doi.org/10.1007/978-3-642-30436-1_32
    152 rdf:type schema:CreativeWork
    153 sg:pub.10.1007/978-3-642-32946-3_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002898329
    154 https://doi.org/10.1007/978-3-642-32946-3_23
    155 rdf:type schema:CreativeWork
    156 sg:pub.10.1007/978-3-642-40026-1_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039042430
    157 https://doi.org/10.1007/978-3-642-40026-1_13
    158 rdf:type schema:CreativeWork
    159 https://doi.org/10.1002/cpe.2848 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238248
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1016/j.asoc.2016.09.014 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004918281
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.1016/j.entcs.2005.10.031 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035809322
    164 rdf:type schema:CreativeWork
    165 https://doi.org/10.1109/cloudcom.2011.22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094578100
    166 rdf:type schema:CreativeWork
    167 https://doi.org/10.1109/csnet.2017.8241986 schema:sameAs https://app.dimensions.ai/details/publication/pub.1100168905
    168 rdf:type schema:CreativeWork
    169 https://doi.org/10.1109/dsnw.2011.5958812 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093619652
    170 rdf:type schema:CreativeWork
    171 https://doi.org/10.1109/fmec.2018.8364038 schema:sameAs https://app.dimensions.ai/details/publication/pub.1104338033
    172 rdf:type schema:CreativeWork
    173 https://doi.org/10.1109/hpca.2016.7446082 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094828714
    174 rdf:type schema:CreativeWork
    175 https://doi.org/10.1109/ispa.2009.47 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095361155
    176 rdf:type schema:CreativeWork
    177 https://doi.org/10.1109/sp.2009.19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095591051
    178 rdf:type schema:CreativeWork
    179 https://doi.org/10.1145/1456508.1456514 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034578097
    180 rdf:type schema:CreativeWork
    181 https://doi.org/10.1145/1508293.1508300 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000580867
    182 rdf:type schema:CreativeWork
    183 https://doi.org/10.1145/1653662.1653687 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003067577
    184 rdf:type schema:CreativeWork
    185 https://doi.org/10.1145/1972551.1972552 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031237603
    186 rdf:type schema:CreativeWork
    187 https://doi.org/10.1145/2046660.2046671 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026426379
    188 rdf:type schema:CreativeWork
    189 https://doi.org/10.1145/2086696.2086702 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033163572
    190 rdf:type schema:CreativeWork
    191 https://doi.org/10.1145/2366231.2337172 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024467680
    192 rdf:type schema:CreativeWork
    193 https://doi.org/10.1145/2499368.2451167 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063162702
    194 rdf:type schema:CreativeWork
    195 https://doi.org/10.1145/2508859.2516741 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031089014
    196 rdf:type schema:CreativeWork
    197 https://doi.org/10.1145/2663474.2663479 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005907924
    198 rdf:type schema:CreativeWork
    199 https://doi.org/10.1145/2810103.2813706 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021915846
    200 rdf:type schema:CreativeWork
    201 https://doi.org/10.1145/2995272.2995279 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013633955
    202 rdf:type schema:CreativeWork
    203 https://doi.org/10.1145/3037697.3037703 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084924638
    204 rdf:type schema:CreativeWork
    205 https://www.grid.ac/institutes/grid.486295.4 schema:alternateName IMT Atlantique
    206 schema:name IMT Atlantique, 4 Rue Alfred Kastler, 44307, Nantes, France
    207 rdf:type schema:Organization
    208 https://www.grid.ac/institutes/grid.89485.38 schema:alternateName Orange (France)
    209 schema:name Orange Labs, 44 Avenue de la République, 92320, Châtillon, France
    210 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...