Significant breakthrough in ‘cloud’ security achieved in North Carolina Reviews

  Review on: Significant breakthrough in ‘cloud’ security achieved in North Carolina

Product Rating

 
Review Details
Member Rating:
 
Member's Recommendation: No

Significant breakthrough in ‘cloud’ security achieved in North Carolina

By: Evabarnet | Oct 14, 2011 03:25 AM

A new technique for storing and processing information more securely in the ‘cloud’ has been devised by researchers at North Carolina State University. Cloud computing is a growing sector. However, any flaw in the hypervisor software which produces virtual machines will result in the visibility of sensitive data to other users of the same ‘cloud’. With the introduction of a software actuated framework, the hardware and firmware tools isolate various functions running on cloud servers and separate workflows the moment they turn up to be processed. This has resulted in the reduction of the area subject to attack by malicious software. In cloud computing the attackers can easily steel confidential data from other users. The technique known as ‘Strongly Isolated Computing Environment’ (SICE) makes use of a different layer of protection which has little impact on performance. A stripped down code enables easy security. ‘Trusted Computing Base’ is a software foundation with 300 lines of code. It means that only these lines need to be trusted for ensuring isolation. On the other hand earlier techniques had thousands of lines of code, liable for attack. Now there are only fewer lines to be protected. With this technique, sensitive workload is confined to one or two or a few cores of strong isolation. In the meantime other functions can be in operation on other cores. .

Pros:

cons:

conclusion:

How useful was this review?





Post a comment on this Review of Significant breakthrough in ‘cloud’ security achieved in North Carolina

Reload Image