{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T02:50:55Z","timestamp":1725936655125},"publisher-location":"Singapore","reference-count":44,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050251"},{"type":"electronic","value":"9789811050268"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5026-8_18","type":"book-chapter","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T22:15:23Z","timestamp":1514412923000},"page":"449-465","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Applications of Trusted Computing in Cloud Context"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Reza Memarian","sequence":"first","affiliation":[]},{"given":"Diogo","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"In\u00e1cio","sequence":"additional","affiliation":[]},{"given":"Ville","family":"Lepp\u00e4nen","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,28]]},"reference":[{"issue":"7","key":"18_CR1","doi-asserted-by":"crossref","first-page":"2473","DOI":"10.1007\/s11227-015-1400-5","volume":"71","author":"RW Ahmad","year":"2015","unstructured":"Ahmad, R. W., Gani, A., Hamid, S. H. A., Shiraz, M., Xia, F., & Madani, S. A. (2015). Virtual machine migration in cloud data centers: a review, taxonomy, and open research issues. The Journal of Supercomputing, 71(7), 2473\u20132515.","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"18_CR2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MSP.2013.8","volume":"11","author":"EG Amoroso","year":"2013","unstructured":"Amoroso, E. G. (2013). From the enterprise perimeter to a mobility-enabled secure cloud. IEEE Secur Privacy, 11(1), 23\u201331.","journal-title":"IEEE Secur Privacy"},{"issue":"4","key":"18_CR3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2010). A view of cloud computing. Commun ACM, 53(4), 50\u201358.","journal-title":"Commun ACM"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Aslam, M., Gehrmann, C., & Bj\u00f6rkman, M. (2012). Security and Trust Preserving VM Migrations in Public Clouds. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 869\u2013876).","DOI":"10.1109\/TrustCom.2012.256"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Bates, A., Mood, B., Valafar, M., & Butler, K. (2013). Towards secure provenance-based access control in cloud environments. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy (pp. 277\u2013284). ACM.","DOI":"10.1145\/2435349.2435389"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Brohi, S. N., Bamiah, M. A., Chuprat, S., Ab Manan, J. L. (2012). Towards an efficient and secure educational platform on cloud infrastructure. In 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (pp. 145\u2013150). IEEE.","DOI":"10.1109\/ICCCTAM.2012.6488088"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Cesena, E., Ramunno, G., Sassu, R., Vernizzi, D., & Lioy, A. (2011). On Scalability of remote attestation. In Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) (pp. 25\u201330). New York, NY, USA: ACM","DOI":"10.1145\/2046582.2046588"},{"key":"18_CR8","unstructured":"Chen, C., Raj, H., Saroiu, S., & Wolman, A. (2014). cTPM: A cloud tpm for cross-device trusted applications. In: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI), USENIX Association, Berkeley, CA, USA (pp. 187\u2013201)."},{"key":"18_CR9","unstructured":"CrowdStrike. (2015). VENOM Vulnerability. Retrieved May 2016, from http:\/\/venom.crowdstrike.com\/ ."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Danev, B., Masti, R. J., Karame, G. O., & Capkun, S. (2011). Enabling secure VM-vTPM migration in private clouds. In Proceedings of the 27th Annual Computer Security Applications Conference (ASAC) (pp. 187\u2013196). New York, NY, USA: ACM","DOI":"10.1145\/2076732.2076759"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Dargie, W. (2014). Estimation of the cost of VM migration. In 23rd International Conference on Computer Communication and Networks (ICCCN) pp. 1\u20138.","DOI":"10.1109\/ICCCN.2014.6911756"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Divakarla, U., & Chandrasekaran, K. (2016). Trusted path between two entities in Cloud. In 6th International Conference on Cloud System and Big Data Engineering (Confluence) pp. 157\u2013162.","DOI":"10.1109\/CONFLUENCE.2016.7508106"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Duan, Y., Fu, G., Zhou, N., Sun, X., Narendra, N. C, & Hu, B. (2015). Everything as a service (XaaS) on the cloud: origins, current and future trends. In IEEE 8th International Conference on Cloud Computing pp. 621\u2013628.","DOI":"10.1109\/CLOUD.2015.88"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Eldred, M., Adams, C., & Good, A. (2014) Trust challenges in a high performance cloud computing project. In IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 1045\u20131050).","DOI":"10.1109\/CloudCom.2014.21"},{"issue":"6","key":"18_CR15","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1007\/s11859-015-1127-4","volume":"20","author":"P Fan","year":"2015","unstructured":"Fan, P., Zhao, B., Shi, Y., Chen, Z., & Ni, M. (2015). An improved vTPM-VM live migration protocol. Wuhan University Journal of Natural Sciences, 20(6), 512\u2013520.","journal-title":"Wuhan University Journal of Natural Sciences"},{"issue":"2","key":"18_CR16","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DAB Fernandes","year":"2014","unstructured":"Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., & In\u00e1cio, P. R. M. (2014). Security Issues in Cloud Environments\u2014A Survey. International Journal of Information Security (IJIS): Special Issue Named Security in Cloud Computing, 13(2), 113\u2013170.","journal-title":"International Journal of Information Security (IJIS): Special Issue Named Security in Cloud Computing"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., & Boneh, D. (2003). Terra: A virtual machine-based platform for trusted computing. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP \u201903 (pp 193\u2013206). ACM.","DOI":"10.1145\/945445.945464"},{"key":"18_CR18","unstructured":"Gonzales, D., Kaplan, J., Saltzman, E., Winkelman, Z., & Woods, D. (2015). Cloud-trust\u2014A security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing PP(99), 1\u201314."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Hosseinzadeh, S., Laur\u00e9n, S., & Lepp\u00e4nen, V. (2016). Security in container-based virtualization through vTPM. In Proceedings of the 9th International Conference on Utility and Cloud Computing pp. 214\u2013219. ACM.","DOI":"10.1145\/2996890.3009903"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Javanmard, M., Salehi, M. A, & Zonouz, S. (2015). TSC: Trustworthy and scalable cytometry. In 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS) (pp. 1356\u20131360). IEEE.","DOI":"10.1109\/HPCC-CSS-ICESS.2015.125"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Jayaram, K., Safford, D., Sharma, U., Naik, V., Pendarakis, D., & Tao, S. (2014). Trustworthy geographically fenced hybrid clouds. In Proceedings of the 15th International Middleware Conference (pp. 37\u201348). ACM.","DOI":"10.1145\/2663165.2666091"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Khan, I., Rehman, H., & Anwar, Z. (2011). Design and deployment of a trusted eucalyptus cloud. In 2011 IEEE International Conference on Cloud Computing (CLOUD) (pp. 380\u2013387). IEEE.","DOI":"10.1109\/CLOUD.2011.105"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Ko, R. K., & Will, M. A. (2014). Progger: An efficient, Tamper-evident Kernel-space logger for cloud data provenance tracking. In 2014 IEEE 7th International Conference on Cloud Computing (CLOUD) (pp. 881\u2013889). IEEE.","DOI":"10.1109\/CLOUD.2014.121"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Lee, B., Awad, A., & Awad, M. (2015). Towards secure provenance in the cloud: A survey. In 2015 IEEE\/ACM 8th International Conference on Utility and Cloud Computing (UCC) (pp. 577\u2013582). IEEE.","DOI":"10.1109\/UCC.2015.102"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Leelipushpam, P. G. J, & Sharmila, J. (2013). Live VM migration techniques in cloud environment a survey. In 2013 IEEE Conference on Information & Communication Technologies (ICT), (pp. 408\u2013413). IEEE.","DOI":"10.1109\/CICT.2013.6558130"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Li, J., Squicciarini, A., Lin, D., Liang, S., & Jia, C. (2015). SecLoc: Securing location-sensitive storage in the cloud. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (pp. 51\u201361). ACM.","DOI":"10.1145\/2752952.2752965"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Memarian, M. R., Conti, M., & Lepp\u00e4nen, V. (2015). EyeCloud: A Botcloud Detection System. In 2015 IEEE Trustcom\/BigDataSE\/ISPA (Vol. 1, pp. 1067\u20131072).","DOI":"10.1109\/Trustcom.2015.484"},{"key":"18_CR28","unstructured":"NIST. (2011). The NIST definition of cloud computing. Retrieved June 2016, from http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-145.pdf ."},{"issue":"2","key":"18_CR29","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TPDS.2015.2408613","volume":"27","author":"TH Noor","year":"2016","unstructured":"Noor, T. H., Sheng, Q. Z., Yao, L., Dustdar, S., & Ngu, A. H. H. (2016). CloudArmor: Supporting reputation-based trust management for cloud services. IEEE Transactions on Parallel and Distributed Systems, 27(2), 367\u2013380.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"18_CR30","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TSC.2012.1","volume":"6","author":"KW Park","year":"2013","unstructured":"Park, K. W., Han, J., Chung, J., & Park, K. H. (2013). THEMIS: A Mutually verifiable billing system for the cloud computing environment. IEEE Transactions on Services Computing, 6(3), 300\u2013313.","journal-title":"IEEE Transactions on Services Computing"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Park, S., Yoon, J. N., Kang, C., Kim, K. H., & Han, T. (2015). TGVisor: A tiny hypervisor-based trusted geolocation framework for mobile cloud clients. In 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) (pp. 99\u2013108). IEEE.","DOI":"10.1109\/MobileCloud.2015.17"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Rocha, F., & Correia, M. (2011). Lucy in the sky without diamonds: Stealing confidential data in the cloud. In IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W) (pp. 129\u2013134).","DOI":"10.1109\/DSNW.2011.5958798"},{"issue":"9","key":"18_CR33","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MC.2011.223","volume":"44","author":"F Rocha","year":"2011","unstructured":"Rocha, F., Abreu, S., & Correia, M. (2011). The Final Frontier: Confidentiality and Privacy in the Cloud. Computer, 44(9), 44\u201350.","journal-title":"Computer"},{"key":"18_CR34","unstructured":"Santos, N., Gummadi, K. P., & Rodrigues, R. (2009). Towards trusted cloud computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, USENIX Association, Berkeley, CA, USA, HotCloud\u201909."},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Shin, J., Kim, Y., Park, W., & Park, C. (2012). DFCloud: A TPM-based secure data access control method of cloud storage in mobile devices. In 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 551\u2013556). IEEE.","DOI":"10.1109\/CloudCom.2012.6427606"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Singh, N. K., Patel, Y. S., Das, U., & Chatterjee, A. (2014). NUYA: An encrypted mechanism for securing cloud data from data mining attacks. In 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICDMIC.2014.6954254"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Somani, G., Gaur, M. S., Sanghi, D., & Conti, M. (2016) DDoS attacks in cloud computing: Collateral damage to non-targets. Computer Networks.","DOI":"10.1016\/j.comnet.2016.03.022"},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Syed, T. A., Musa, S., Rahman, A., & Jan, S. (2015). Towards secure instance migration in the cloud. In 2015 International Conference on Cloud Computing (ICCC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/CLOUDCOMP.2015.7149664"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Taha, M. M. B., Chaisiri, S., Ko, R. K. (2015). Trusted tamper-evident data provenance. In 2015 IEEE Trustcom\/BigDataSE\/ISPA (Vol. 1, pp. 646\u2013653). IEEE.","DOI":"10.1109\/Trustcom.2015.430"},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Toegl, R., Winkler, T., Nauman, M., & Hong, T. (2009). Towards platform-independent trusted computing. In Proceedings Of The 2009 Acm Workshop On Scalable Trusted Computing (pp. 61\u201366). ACM.","DOI":"10.1145\/1655108.1655119"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Wallom, D., Turilli, M., Martin, A., Raun, A., Taylor, G., Hargreaves, N., et al. (2011). myTrustedCloud: Trusted cloud infrastructure for security-critical computation and data management. In IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom). (pp. 247\u2013254).","DOI":"10.1109\/CloudCom.2011.41"},{"key":"18_CR42","doi-asserted-by":"crossref","unstructured":"Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). SecCloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 52\u201361).","DOI":"10.1109\/ICDCSW.2010.36"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Zawoad, S., & Hasan, R. (2015) FECloud: A trustworthy forensics-enabled cloud architecture. In Proceedings of 11th Annual International Federation for Information Processing WG 11.9 International Conference on Digital Forensics (pp. 271\u2013285).","DOI":"10.1007\/978-3-319-24123-4_16"},{"issue":"8","key":"18_CR44","doi-asserted-by":"crossref","first-page":"2327","DOI":"10.1109\/TPDS.2014.2346504","volume":"26","author":"R Zhang","year":"2015","unstructured":"Zhang, R., Su, X., Wang, J., Wang, C., Liu, W., & Lau, R. W. H. (2015). On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2327\u20132339.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Research Advances in Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5026-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T10:25:07Z","timestamp":1660213507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5026-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050251","9789811050268"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5026-8_18","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}