Security and Privacy Architecture for Cloud Computing

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (28 February 2022) | Viewed by 4909

Special Issue Editor


E-Mail Website
Guest Editor
Information System Security Laboratory, Department of Computer Science and Engineering, Korea University, Seoul 02841, Korea
Interests: information security; applied cryptography; network security; cyber security

Special Issue Information

Dear Colleagues,

Cloud computing is a promising architecture in the current computing systems with many benefits such as collaboration, agility, scalability, availability, cost reduction potential, and computing efficiency. However, there are also some significant barriers to adoption. One of the most significant barriers to adoption is security and privacy.

There have been efforts to enhance cloud computing security and privacy in diverse aspects such as resilient cloud computing architecture, data encryption and anonymization, zero-trust, cloud network infrastructure, obfuscated cloud data structures, and so on. However, these new technologies sometimes give rise to new risks, or drawbacks, as a trade-off. Issues related to security and privacy architecture are one of the main concerns in today’s era of “cloud computing”. Thus, it is necessary to explore diverse security and privacy issues for secure cloud computing architecture to assure a high security level in our applications, transactions, data processing, and decision management in the cloud.

This Special Issue will focus on (but is not limited to) the following topics:

  • security, integrity, and privacy for cloud computing
  • secure cloud architecture and services
  • data encryption, obfuscation, differential privacy of cloud data
  • resilient cloud architecture and service against side-channel attacks
  • secure virtualization of cloud computing system
  • zero trust architecture in cloud computing
  • real-time attack detection in cloud computing

Prof. Dr. Junbeom Hur
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

11 pages, 1213 KiB  
Article
Breaking KASLR Using Memory Deduplication in Virtualized Environments
by Taehun Kim, Taehyun Kim and Youngjoo Shin
Electronics 2021, 10(17), 2174; https://doi.org/10.3390/electronics10172174 - 6 Sep 2021
Cited by 6 | Viewed by 4198
Abstract
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (KPTI) for protecting the kernel from all attacks that break the kernel address space layout randomization (KASLR) using various side-channel analysis techniques. In this paper, we demonstrate that KASLR [...] Read more.
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (KPTI) for protecting the kernel from all attacks that break the kernel address space layout randomization (KASLR) using various side-channel analysis techniques. In this paper, we demonstrate that KASLR can still be broken, even with the latest OSs where KPTI is applied. In particular, we present a novel memory-sharing-based side-channel attack that breaks the KASLR on KPTI-enabled Linux virtual machines. The proposed attack leverages the memory deduplication feature on a hypervisor, which provides a timing channel for inferring secret information regarding the victim. By conducting experiments on KVM and VMware ESXi, we show that the proposed attack can obtain the kernel address within a short amount of time. We also present several countermeasures that can prevent such an attack. Full article
(This article belongs to the Special Issue Security and Privacy Architecture for Cloud Computing)
Show Figures

Figure 1

Back to TopTop