{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T19:55:39Z","timestamp":1720814139320},"reference-count":37,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2014,7,25]],"date-time":"2014-07-25T00:00:00Z","timestamp":1406246400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/s13174-014-0007-z","type":"journal-article","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T14:04:27Z","timestamp":1406210667000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Replica placement to mitigate attacks on clouds"],"prefix":"10.5753","volume":"5","author":[{"given":"Filipe","family":"Araujo","sequence":"first","affiliation":[]},{"given":"Serhiy","family":"Boychenko","sequence":"additional","affiliation":[]},{"given":"Raul","family":"Barbosa","sequence":"additional","affiliation":[]},{"given":"Ant\u00f3nio","family":"Casimiro","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"Proceedings of the nineteenth ACM Symposium On Operating Systems Principles, SOSP \u201803","author":"P Barham","year":"2003","unstructured":"Barham P, Dragovic B, Fraser B, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A: Xen and the art of virtualization. In Proceedings of the nineteenth ACM Symposium On Operating Systems Principles, SOSP \u201803. ACM, New York; 2003:164\u2013177."},{"key":"7_CR2","unstructured":"Technical White Papers \u2014 VMWare. . Retrieved on May 6, 2014., [ http:\/\/www.vmware.com\/resources\/techresources\/ ] Technical White Papers \u2014 VMWare. . Retrieved on May 6, 2014."},{"key":"7_CR3","unstructured":"Papers \u2014 Oracle VM VirtualBox. . Retrieved on May 6, 2014., [ https:\/\/www.virtualbox.org\/wiki\/Papers ] Papers \u2014 Oracle VM VirtualBox. . Retrieved on May 6, 2014."},{"key":"7_CR4","first-page":"41","volume-title":"Proceedings of the annual conference on USENIX Annual Technical Conference, ATEC \u201805","author":"F Bellard","year":"2005","unstructured":"Bellard F: QEMU, a fast and portable dynamic translator. In Proceedings of the annual conference on USENIX Annual Technical Conference, ATEC \u201805. USENIX Association, Berkeley; 2005:41\u201341."},{"key":"7_CR5","unstructured":"Camargos FL, Girard G, des Ligneris B (2008) Virtualization of Linux servers. In: Proceedings of the Linux symposium. ., [ http:\/\/ols.fedoraproject.org\/OLS\/Reprints-2008\/camargos-reprint.pdf ] Camargos FL, Girard G, des Ligneris B (2008) Virtualization of Linux servers. In: Proceedings of the Linux symposium. ."},{"key":"7_CR6","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1809049.1809052","volume-title":"Proceedings of the 7th International Conference on Autonomic Computing, ICAC \u201810","author":"X Meng","year":"2010","unstructured":"Meng X, Isci C, Jeffrey J, Zhang L, Bouillet E, Pendarakis D: Efficient resource provisioning in compute clouds via vm multiplexing. In Proceedings of the 7th International Conference on Autonomic Computing, ICAC \u201810. ACM, New York; 2010:11\u201320."},{"key":"7_CR7","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/ICPP.2010.30","volume-title":"Proceedings of the 2010 39th International Conference on Parallel Processing, ICPP \u201810","author":"J Sonnek","year":"2010","unstructured":"Sonnek J, Greensky J, Reutiman R, Chandra A: Starling: minimizing communication overhead in virtualized computing platforms using decentralized affinity-aware migration. In Proceedings of the 2010 39th International Conference on Parallel Processing, ICPP \u201810. IEEE Computer Society, Washington, DC; 2010:228\u2013237."},{"key":"7_CR8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1508293.1508299","volume-title":"Proceedings of the 2009 ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, VEE \u201809","author":"T Wood","year":"2009","unstructured":"Wood T, Tarasuk-Levin G, Shenoy P, Desnoyers P, Cecchet E, Corner MD: Memory buddies: exploiting page sharing for smart colocation in virtualized data centers. In Proceedings of the 2009 ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, VEE \u201809. ACM, New York; 2009:31\u201340."},{"issue":"10","key":"7_CR9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/1831407.1831429","volume":"53","author":"D Gupta","year":"2010","unstructured":"Gupta D, Lee S, Vrable M, Savage S, Snoeren AC, Varghese G, Voelker GM, Vahdat A: Difference engine: harnessing memory redundancy in virtual machines. Commun ACM 2010, 53(10):85\u201393.","journal-title":"Commun ACM"},{"key":"7_CR10","unstructured":"Heroku | Cloud application platform. . Retrieved on May 6, 2014., [ http:\/\/www.heroku.com ] Heroku | Cloud application platform. . Retrieved on May 6, 2014."},{"key":"7_CR11","unstructured":"Ruby On rails and PHP cloud hosting PaaS | Managed rails development | Engine yard platform as a service. . Retrieved on May 6, 2014., [ http:\/\/www.engineyard.com ] Ruby On rails and PHP cloud hosting PaaS | Managed rails development | Engine yard platform as a service. . Retrieved on May 6, 2014."},{"key":"7_CR12","unstructured":"Google App Engine \u2014 Google Developers. . Retrieved on May 6, 2014., [ https:\/\/developers.google.com\/appengine\/ ] Google App Engine \u2014 Google Developers. . Retrieved on May 6, 2014."},{"key":"7_CR13","unstructured":"McKeown M, Kommalapati H, Roth JDisaster recovery and high availability for windows azure applications. Web page visited on December 5th 2013., [ http:\/\/msdn.microsoft.com\/en-us\/library\/windowsazure\/dn251004.aspx ] McKeown M, Kommalapati H, Roth JDisaster recovery and high availability for windows azure applications. Web page visited on December 5th 2013."},{"issue":"4","key":"7_CR14","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1145\/1357010.1352610","volume":"42","author":"AN Bessani","year":"2008","unstructured":"Bessani AN, Alchieri EP, Correia M, Fraga JS: DepSpace: a byzantine fault-tolerant coordination service. SIGOPS Oper Syst Rev 2008, 42(4):163\u2013176.","journal-title":"SIGOPS Oper Syst Rev"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Prieto E, Diaz R, Romano L, Rieke R, Achemlal M (2011) MASSIF: a promising solution to enhance olympic games IT security. In: Georgiadis CK, Jahankhani H, Pimenidis E, Bashroush R, Al-Nemrat A (eds) ICGS3\/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 139\u2013147.. Springer. ., [ http:\/\/link.springer.com\/chapter\/10.1007%2F978\u20133-642\u201333448\u20131_20 ] Prieto E, Diaz R, Romano L, Rieke R, Achemlal M (2011) MASSIF: a promising solution to enhance olympic games IT security. In: Georgiadis CK, Jahankhani H, Pimenidis E, Bashroush R, Al-Nemrat A (eds) ICGS3\/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 139\u2013147.. Springer. .","DOI":"10.1007\/978-3-642-33448-1_20"},{"key":"7_CR16","first-page":"1:1","volume-title":"Proceedings of the 2nd international workshop on Dependability Issues in Cloud Computing, DISCCO \u201813","author":"A Bessani","year":"2013","unstructured":"Bessani A, Cutillo LA, Ramunno G, Schirmer N, Smiraglia P: The TClouds platform: concept, architecture and instantiations. In Proceedings of the 2nd international workshop on Dependability Issues in Cloud Computing, DISCCO \u201813. ACM, New York; 2013:1:1\u20131:6."},{"key":"7_CR17","unstructured":"SECFUNET - Security for Future Networks - Home. . Accessed on 6 May 2014., [ http:\/\/www.secfunet.eu ] SECFUNET - Security for Future Networks - Home. . Accessed on 6 May 2014."},{"key":"7_CR18","unstructured":"CloudFit. . Accessed on 6 May 2014., [ http:\/\/cloudfit.di.fc.ul.pt\/index.php?title=Public:Main_Page ] CloudFit. . Accessed on 6 May 2014."},{"key":"7_CR19","unstructured":"Slamanig D, Hanser C (2012) On cloud storage and the cloud of clouds approach. In: Internet technology and secured transactions, 2012 international conferece for, 649\u2013655. ., [ http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=%arnumber=6470897%url=http%3A%2F%2Fieeexplore.ieee.org%252 ] Slamanig D, Hanser C (2012) On cloud storage and the cloud of clouds approach. In: Internet technology and secured transactions, 2012 international conferece for, 649\u2013655. ."},{"key":"7_CR20","unstructured":"Bitcoin - Open source P2P money. . Accessed on 6 May 2014., [ http:\/\/bitcoin.org\/ ] Bitcoin - Open source P2P money. . Accessed on 6 May 2014."},{"issue":"4","key":"7_CR21","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro M, Liskov B: Practical byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst 2002, 20(4):398\u2013461.","journal-title":"ACM Trans Comput Syst"},{"key":"7_CR22","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1145\/1774088.1774187","volume-title":"Proceedings of the 2010 ACM Symposium on Applied Computing, SAC \u201810","author":"M Correia","year":"2010","unstructured":"Correia M, Veronese GS, Lung LC: Asynchronous Byzantine consensus with 2 f +1 processes. In Proceedings of the 2010 ACM Symposium on Applied Computing, SAC \u201810. ACM, New York,; 2010:475\u2013480."},{"key":"7_CR23","first-page":"2:1","volume-title":"Proceedings of the 10th international workshop on Middleware for Grids, Clouds and e-Science, MGC \u201812","author":"F Araujo","year":"2012","unstructured":"Araujo F, Barbosa R, Casimiro A: Replication for dependability on virtualized cloud environments. In Proceedings of the 10th international workshop on Middleware for Grids, Clouds and e-Science, MGC \u201812. ACM, New York; 2012:2:1\u20132:6."},{"key":"7_CR24","volume-title":"Proceedings of the 15th conference on USENIX security symposium - Volume 15, USENIX-SS\u201906","author":"S Berger","year":"2006","unstructured":"Berger S, C\u00e1ceres R, Goldman KA, Perez R, Sailer R, van Doorn L: vTPM: virtualizing the Trusted Platform Module. In Proceedings of the 15th conference on USENIX security symposium - Volume 15, USENIX-SS\u201906. USENIX Association, Berkeley; 2006."},{"key":"7_CR25","volume-title":"Urn models and their application \u2014 an approach to modern discrete probability theory","author":"NL Johnson","year":"1977","unstructured":"Johnson NL, Kotz S: Urn models and their application \u2014 an approach to modern discrete probability theory. John Wiley & Sons, New York, Chichester, Brisbane, Toronto; 1977."},{"key":"7_CR26","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/CLOUD.2009.60","volume-title":"Proceedings of the 2009 IEEE International Conference on Cloud Computing, CLOUD \u201809","author":"M Jensen","year":"2009","unstructured":"Jensen M, Schwenk J, Gruschka N, Iacono LL: On technical security issues in cloud computing. In Proceedings of the 2009 IEEE International Conference on Cloud Computing, CLOUD \u201809. IEEE Computer Society, Washington, DC; 2009:109\u2013116."},{"key":"7_CR27","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1145\/2382196.2382230","volume-title":"Proceedings of the 2012 ACM conference on computer and communications security","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Juels A, Reiter MK, Ristenpart T: Cross-VM side channels and their use to extract private keys. In Proceedings of the 2012 ACM conference on computer and communications security. ACM, New York; 2012:305\u2013316."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Gruschka N, Iacono LL (2009) Vulnerable cloud: SOAP message security validation revisited. In: ICWS, 625\u2013631. ., [ http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=%arnumber=5175877%url=http%3A%2F%2Fieeexplore.ieee.org%252 ] Gruschka N, Iacono LL (2009) Vulnerable cloud: SOAP message security validation revisited. In: ICWS, 625\u2013631. .","DOI":"10.1109\/ICWS.2009.70"},{"key":"7_CR29","unstructured":"Verizon (2013) Data breach investigations report. . Retrieved on May 6, 2014., [ http:\/\/www.verizonenterprise.com\/DBIR\/2013\/ ] Verizon (2013) Data breach investigations report. . Retrieved on May 6, 2014."},{"key":"7_CR30","unstructured":"CloudFlare blog - The DDoS That Almost Broke the Internet. . Retrieved on May 6, 2014., [ http:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet ] CloudFlare blog - The DDoS That Almost Broke the Internet. . Retrieved on May 6, 2014."},{"key":"7_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/IPDPS.2009.5161134","volume-title":"Proceedings of the 2009 IEEE International Symposium on Parallel & Distributed Processing, IPDPS \u201809","author":"P Domingues","year":"2009","unstructured":"Domingues P, Araujo F, Silva L: Evaluating the performance and intrusiveness of virtual machines for desktop grid computing. In Proceedings of the 2009 IEEE International Symposium on Parallel & Distributed Processing, IPDPS \u201809. IEEE Computer Society, Washington, DC; 2009:1\u20138."},{"key":"7_CR32","unstructured":"SFGate.com blog - The Google Attack Scenario Offense and Defense. . Retrieved on May 6, 2014., [ http:\/\/blog.sfgate.com\/ybenjamin\/2010\/04\/20\/the-google-attack-scenario-offense-and-defense\/ ] SFGate.com blog - The Google Attack Scenario Offense and Defense. . Retrieved on May 6, 2014."},{"key":"7_CR33","unstructured":"Hacking D-Link Routers With HNAP. . Retrieved on May 6, 2014., [ http:\/\/www.sourcesec.com\/Lab\/dlink_hnap_captcha.pdf ] Hacking D-Link Routers With HNAP. . Retrieved on May 6, 2014."},{"key":"7_CR34","unstructured":"Computerworld - Researchers Demo Cloud Security Issue with Amazon AWS Attack. . Retrieved on May 6, 2014., [ http:\/\/www.computerworld.com\/s\/article\/9221208\/Researchers_demo_cloud_security_issue_with_Amazon_AWS_attack\/ ] Computerworld - Researchers Demo Cloud Security Issue with Amazon AWS Attack. . Retrieved on May 6, 2014."},{"key":"7_CR35","first-page":"401","volume-title":"Proceedings of the 18th ACM conference on computer and communications security, CCS \u201811","author":"J Szefer","year":"2011","unstructured":"Szefer J, Keller E, Lee RB, Rexford J: Eliminating the hypervisor attack surface for a more secure cloud. In Proceedings of the 18th ACM conference on computer and communications security, CCS \u201811. ACM, New York; 2011:401\u2013412."},{"key":"7_CR36","unstructured":"InformationWeek - New Virtualization Vulnerability Allows Escape To Hypervisor Attacks. . Retrieved on May 6, 2014., [ http:\/\/www.informationweek.com\/security\/application-security\/new-virtualization-vulnerability-allows\/240001996\/ ] InformationWeek - New Virtualization Vulnerability Allows Escape To Hypervisor Attacks. . Retrieved on May 6, 2014."},{"key":"7_CR37","unstructured":"Dark Reading - Researchers Develop Cross-VM Side-Channel Attack. Retrieved on May 6, 2014., [ http:\/\/www.darkreading.com\/attacks-breaches\/researchers-develop-cross-vm-side-channel-attack\/d\/d-id\/1138623? ] Dark Reading - Researchers Develop Cross-VM Side-Channel Attack. Retrieved on May 6, 2014."}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-014-0007-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13174-014-0007-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-014-0007-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T22:14:55Z","timestamp":1644444895000},"score":1,"resource":{"primary":{"URL":"http:\/\/jisajournal.springeropen.com\/articles\/10.1186\/s13174-014-0007-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,25]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["7"],"URL":"https:\/\/doi.org\/10.1186\/s13174-014-0007-z","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"value":"1867-4828","type":"print"},{"value":"1869-0238","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,25]]},"article-number":"7"}}