Journal on Communications ›› 2019, Vol. 40 ›› Issue (10): 90-100.doi: 10.11959/j.issn.1000-436x.2019141
• Papers • Previous Articles Next Articles
Junfeng TIAN, Zilong WANG, Xinfeng HE, Zhen LI
Revised:
2019-07-11
Online:
2019-10-25
Published:
2019-11-07
Supported by:
CLC Number:
Junfeng TIAN, Zilong WANG, Xinfeng HE, Zhen LI. Shamir-based virtual machine placement policy[J]. Journal on Communications, 2019, 40(10): 90-100.
[1] | RISTENPART T , TROMER E , SHACHAM H ,et al. Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]// ACM Conference on Computer and Communications Security. 2009: 199-112. |
[2] | ZHANG Y , JUELS A , REITER M K ,et al. Cross-VM side channels and their use to extract private keys[C]// ACM Conference on Computer and Communications Security. 2012: 305-316. |
[3] | LIU F , YAROM Y , GE Q ,et al. Last-level cache side-channel attacks are practical[C]// IEEE Symposium on Security and Privacy. 2015: 605-622. |
[4] | YOUNIS Y A , KIFAYAT K , SHI Q ,et al. A new prime and probe cache side-channel attack for cloud computing[C]// The 13th IEEE International Conference on Dependable,Autonomic and Secure Computing (DASC-2015). 2015: 1718-1724. |
[5] | INCI M S , GüLMEZOGLU B , APECECHEA G I ,et al. Seriously,get off my cloud! Cross-VM RSA key recovery in a public cloud[J]. IACR Cryptology ePrint Archive, 2015,2015: 1-15. |
[6] | CHEN K , SHEN Q , LI C ,et al. Sift -an efficient method for co-residency detection on Amazon EC2[C]// International Conference on Information Systems Security and Privacy. 2016: 423-431. |
[7] | BATES A , MOOD B , PLETCHER J ,et al. On detecting co-resident cloud instances using network flow watermarking techniques[J]. International Journal of Information Security, 2014,13(2): 171-189. |
[8] | ZHANG Y , LI M , BAI K ,et al. Incentive compatible moving target defense against VM-colocation attacks in clouds[C]// IFIP International Information Security Conference. Springer, 2012: 388-399. |
[9] | AZAR Y , KAMARA S , MENACHE I ,et al. Co-location-resistant clouds[C]// The 6th Edition of the ACM Workshop on Cloud Computing Security. 2014: 9-20. |
[10] | HAN Y , CHAN J , ALPCAN T ,et al. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing[J]. IEEE Transactions on Dependable & Secure Computing, 2017,14(1): 95-108. |
[11] | AFOULKI Z , BOUSQUET A , ROUZAUD-CORNABAS J ,et al. A security-aware scheduler for virtual machines on IaaS clouds[J]. Rapport de Recherche, 2011,8: 1-12. |
[12] | BERRIMA M , NASR A K , BEN R N ,et al. Co-location resistant strategy with full resources optimization[C]// The 2016 ACM on Cloud Computing Security Workshop. 2016: 3-10. |
[13] | BARROWCLOUGH J P , ASIF R . Securing cloud hypervisors:a survey of the threats,vulnerabilities,and countermeasures[J].,2018 (2018):1681908:1-1681908:20. Security and Communication Networks, 2018(2018): 1681908:1-1681908::20. |
[14] | NEZARAT A , SHAMS Y . A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment[J]. Journal of Super Computing, 2017,73(2): 1-21. |
[15] | WANG C , MA S , ZHANG X ,et al. A hypervisor level provenance system to reconstruct attack story caused by kernel malware[C]// International Conference on Security and Privacy in Communication Systems. 2017: 778-792. |
[16] | LIU L , WANG A , ZANG W Y ,et al. Empirical evaluation of the hypervisor scheduling on side channel attacks[C]// 2018 IEEE International Conference on Communications. IEEE, 2018: 1-6. |
[17] | SZEFER J , KELLER E , LEE R B ,et al. Eliminating the hypervisor attack surface for a more secure cloud[C]// The 18th ACM conference on Computer and Communications Security. ACM, 2011: 401-412. |
[18] | 石勇, 郭煜, 刘吉强 ,等. 一种透明的可信云租户隔离机制研究[J]. 软件学报, 2016,27(6): 1538-1548. |
SHI Y , GUO W , LIU J Q ,et al. Research on a transparent trusted cloud tenant isolation mechanism[J]. Journal of Software, 2016,27(6): 1538-1548. | |
[19] | VARADARAJAN V , ZHANG Y , RISTENPART T ,et al. A placement vulnerability study in multi-tenant public clouds[C]// USENIX Security Symposium. 2015: 913-928. |
[20] | JANSEN R , BRENNER P R . Energy efficient virtual machine allocation in the cloud[C]// Green Computing Conference and Workshops. 2011: 1-8. |
[21] | 金顺福, 郝闪闪, 王宝帅 . 融合双速率和工作休眠的虚拟机调度策略及参数优化[J]. 通信学报, 2017,38(12): 10-20. |
JIN S F , HAO S S , WANG B S . Virtual machine scheduling strategy based on dual-speed and work vacation mode and its parameter optimization[J]. Journal on Communications, 2017,38(12): 10-20. | |
[22] | 李湘, 陈宁江, 杨尚林 ,等. 感知应用特征与网络带宽的虚拟机在线迁移优化策略[J]. 通信学报, 2017,38(Z2): 147-155. |
LI X , CHEN N J , YANG S L ,et al. Optimization strategy of virtual machine online migration with awareness of application characteristics and network bandwidth migration[J]. Journal on Communications, 2017,38(Z2): 147-155. | |
[23] | 崔勇, 林予松, 李润知 ,等. 基于合作博弈的多虚拟机实时迁移带宽分配机制[J]. 通信学报, 2016,37(4): 149-158. |
CUI Y , LIN Y S , LI R Z ,et al. Cooperative game based bandwidth allocation mechanism live migration of multiple virtual machines[J]. Journal on Communications, 2016,37(4): 149-158. | |
[24] | 荣辉桂, 莫进侠, 常炳国 ,等. 基于Shamir秘密共享的密钥分发与恢复算法[J]. 通信学报, 2015,36(3): 64-73. |
RONG H G , MO J X , CHANG B G ,et al. Key distribution and recovery algorithm based on Shamir secret sharing[J]. Journal on Communications, 2015,36(3): 64-73. | |
[25] | CALHEIROS R N , RANJAN R , BELOGLAZOV A ,et al. CloudSim:a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms[J]. Software Practice & Experience, 2011,41(1): 23-50. |
[26] | ALBDOUR L . Comparative study for different provisioning policies for load balancing in cloudsim[J]. International Journal of Cloud Applications and Computing (IJCAC), 2017,7(3): 76-86. |
[1] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[2] | Sifeng ZHU, Jianghao CAI, Zhengyi CHAI, Enlin SUN. Multi-objective optimal offloading decision for cloud-edge collaborative computing scenario in Internet of vehicles [J]. Journal on Communications, 2022, 43(6): 223-234. |
[3] | Tianyi ZHU,Fenghua LI,Wei JIN,Yunchuan GUO,Liang FANG,Lin CHENG. Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy [J]. Journal on Communications, 2020, 41(9): 29-48. |
[4] | Pei ZHANG,Shuaijun LIU,Zhiguo MA,Xiaohui WANG,Junde SONG. Improved satellite resource allocation algorithm based on DRL and MOP [J]. Journal on Communications, 2020, 41(6): 51-60. |
[5] | Mingsheng WANG,Heyang CAO,Peiyao LI. Decentralized credit system based on blockchain and its application [J]. Journal on Communications, 2019, 40(8): 169-177. |
[6] | SU Mingfeng,WANG Guojun,LI Renfa. Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective [J]. Journal on Communications, 2019, 40(6): 102-115. |
[7] | Nan BAO,Jiakuo ZUO,Han HU,Xu BAO. SDN based network resource selection multi-objective optimization algorithm [J]. Journal on Communications, 2019, 40(2): 51-59. |
[8] | Xiaochen HAO,Liyuan WANG,Jinshuo LIU,Lixia XIE,Wenhuan ZHANG. Resource allocation optimization algorithm based on double populations differential evolution in WSN [J]. Journal on Communications, 2018, 39(4): 68-75. |
[9] | Xiao-tong FU,Si CHEN,Ning ZHANG. Proxy-cryptocurrency payment system [J]. Journal on Communications, 2017, 38(7): 199-206. |
[10] | Hao FENG,Lei LUO,Yong WANG,Miao YE. Multi-objective data collecting strategies for wireless sensor network based on the time variable multi-salesman problem and genetic algorithm [J]. Journal on Communications, 2017, 38(3): 112-123. |
[11] | Xue-bin MA,Ai-li LI,Xiao-juan ZHANG. Wakeup strategy based on multi-objective optimization for fixed relay nodes [J]. Journal on Communications, 2017, 38(10): 47-59. |
[12] | Qi WANG,Jaffrès-Runser Katia,Yi SUN,Jun LI,Jun ZHANG,Bin DA,Zhong-cheng LI. Fundamental performance bounds for multi-performance criteria in wireless ad hoc networks [J]. Journal on Communications, 2015, 36(6): 1-140. |
[13] | Jian-kang DONG,Hong-bo WANG,Yang-yang LI,Shi-duan CHENG. Improving energy efficiency and network performance in IaaS cloud with virtual machine placement [J]. Journal on Communications, 2014, 35(1): 72-81. |
[14] | Nai-jin CHEN,Jian-hui JIANG. Hardware-task partitioning algorithm merged area estimation with multi-objective optimization [J]. Journal on Communications, 2013, 34(2): 40-55. |
[15] | . Improved PESA algorithm based on comentropy [J]. Journal on Communications, 2013, 34(11): 5-47. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|