Skip to Main content Skip to Navigation
Conference papers

Authentication and secured execution for the infrastructure-as-a-service layer of the cloud computing model

Abstract : This paper presents a full system architecture allowing the authentication and secured execution of binary files using hardware-assisted on-the-fly memory encryption/decryption. In a context of general blurring of the physical relationship between a user and the computer which which it eventually interacts, this architecture has been thought so as to achieve a certain degree of robustness against corruptions in a cloud computing IaaS software stack, including when the corruptions may come from the lowest hypervision layer.
Document type :
Conference papers
Complete list of metadatas

https://hal-cea.archives-ouvertes.fr/cea-01838148
Contributor : Léna Le Roy <>
Submitted on : Friday, July 13, 2018 - 10:29:08 AM
Last modification on : Monday, February 10, 2020 - 6:14:16 PM

Identifiers

Collections

CEA | DRT | LIST

Citation

L. Hubert, R. Sirdey. Authentication and secured execution for the infrastructure-as-a-service layer of the cloud computing model. 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Oct 2013, Compiegne, France. pp.291-297, ⟨10.1109/3PGCIC.2013.49⟩. ⟨cea-01838148⟩

Share

Metrics

Record views

109