Authentication and secured execution for the infrastructure-as-a-service layer of the cloud computing model - Archive ouverte HAL Access content directly
Conference Papers Year : 2013

Authentication and secured execution for the infrastructure-as-a-service layer of the cloud computing model

(1) , (1)
1

Abstract

This paper presents a full system architecture allowing the authentication and secured execution of binary files using hardware-assisted on-the-fly memory encryption/decryption. In a context of general blurring of the physical relationship between a user and the computer which which it eventually interacts, this architecture has been thought so as to achieve a certain degree of robustness against corruptions in a cloud computing IaaS software stack, including when the corruptions may come from the lowest hypervision layer.
Not file

Dates and versions

cea-01838148 , version 1 (13-07-2018)

Identifiers

Cite

L. Hubert, R. Sirdey. Authentication and secured execution for the infrastructure-as-a-service layer of the cloud computing model. 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Oct 2013, Compiegne, France. pp.291-297, ⟨10.1109/3PGCIC.2013.49⟩. ⟨cea-01838148⟩

Collections

CEA DRT LIST DSCIN
26 View
0 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More