[1] |
ZHANG Q , CHENG L , BOUTABA R . Cloud computing:state-ofthe-art and research challenges[J]. Journal of Internet Services and Applications, 2010,1(1): 7-18.
|
[2] |
BUTT S , SRIVASTAVA A , GANAPATHY V . Self-service cloud computing[C]// ACM Conference on Computer and Communications Security. 2015: 253-264.
|
[3] |
JAIN R , PAUL S . Network virtualization and software defined networking for cloud computing:a survey[J]. IEEE Communications Magazine, 2013,51(11): 24-31.
|
[4] |
CHOWDHURY N M M K , BOUTABA R . Network virtualization:state of the art and research challenges[J]. IEEE Communications Magazine, 2009,47(7): 20-26.
|
[5] |
CHOWDHURY N M M K , BOUTABA R . A survey of network virtualization[J]. Computer Networks, 2010,54(5): 862-876.
|
[6] |
FISCHER A , BOTERO J F , TILL B M ,et al. Virtual network embedding:a survey[J]. IEEE Communications Surveys & Tutorials, 2013,15(4): 1888-1906.
|
[7] |
余涛, 毕军, 吴建平 . 未来互联网虚拟化研究[J]. 计算机研究与发展, 2015,52(9): 2069-2082.
|
|
YU T , BI J , WU J P ,et al. Research on the virtualization of future internet[J]. Journal of Computer Research and Development, 2015,52(9): 2069-2082.
|
[8] |
RISTENPART T , TROMER E , SHACHAM H ,et al. Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]// ACM Conference on Computer and Communications Security,CCS 2009,Chicago,Illinois,USA,November. 2009: 199-212.
|
[9] |
GILLANI F , AL-SHAER E , LO S ,et al. Agile virtualized infrastructure to proactively defend against cybe attacks[C]// 2015 IEEE Conference on Computer Communications. 2015: 729-737.
|
[10] |
张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANGY Y Q , WANG X F , LIU X F ,et al. Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|
[11] |
WU Z , XU Z , WANG H . Whispers in the Hyper-space:high-speed covert channel attacks in the cloud[C]// USENIX Security symposium. 2012: 159-173.
|
[12] |
IRAZOQUI G , EISENBARTH T , SUNAR B . S$A:a shared cache attack that works across cores and defies VM sandboxing-and its application to AES[C]// IEEE Symposium on Security & Privacy. 2015: 591-604.
|
[13] |
ZHANG Y , LI M , BAI K ,et al. Incentive compatible moving target defense against vm-colocation attacks in clouds[C]// IFIP International Information Security Conference. 2012: 388-399.
|
[14] |
LI P , GAO D , REITER M K . Stopwatch:a cloud architecture for timing channel mitigation[J]. ACM Transactions on Information and System Security (TISSEC), 2014,17(2): 1-28.
|
[15] |
ZHANG Y , REITER M K . Düppel:retrofitting commodity operating systems to mitigate cache side channels in the cloud[C]// ACM Sigsac Conference on Computer & Communications Security. 2013: 827-838.
|
[16] |
PATTUK E , KANTARCIOGLU M , LIN Z ,et al. Preventing cryptographic key leakage in cloud virtual machines[C]// The 23rd USENIX Security Symposium (USENIX Security 14). 2014: 703-718.
|
[17] |
GILLANI F , AL-SHAER E , LO S ,et al. Agile virtualized infrastructure to proactively defend against cyber attacks[C]// Computer Communications. 2015: 729-737.
|
[18] |
WANG Y , CHAU P , CHEN F . A framework for security-aware virtual network embedding[C]// 2015 24th International Conference on Computer Communication and Networks (ICCCN). 2015: 1-7.
|
[19] |
HAN Y , ALPCAN T , CHAN J ,et al. Security games for virtual machine allocation in cloud computing[C]// International Conference on Decision and Game Theory for Security. 2013: 99-118.
|
[20] |
MOON S J , SEKAR V , REITER M K . Nomad:mitigating arbitrary cloud side channels via provider-assisted migration[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 1595-1606.
|
[21] |
LIU F , YAROM Y , GE Q ,et al. Last-level cache side-channel attacks are practical[C]// 2015 IEEE Symposium on Security and Privacy (SP). 2015: 605-622.
|
[22] |
SUZAKI K , IIJIMA K , YAGI T ,et al. Memory deduplication as a threat to the guest OS[C]// The Fourth European Workshop on System Security. 2011: 1-6.
|
[23] |
OWENS R , WANG W . Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines[C]// 2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC). 2011: 1-8.
|