TY - GEN
T1 - MUSHI
T2 - 2012 IEEE Military Communications Conference, MILCOM 2012
AU - Zhang, Ning
AU - Li, Ming
AU - Lou, Wenjing
AU - Hou, Y. Thomas
PY - 2012
Y1 - 2012
N2 - Multiple Level Security (MLS) has always been a center of focus since the usage of computers in military and intelligence systems. Extensive studies have been done on how to utilize virtualization technologies to provide multiple level secured execution in the cloud, yet the general assumption is that all components in the cloud service provider are trusted. With the advanced persistent threats currently faced by the military and intelligence community, it is unrealistic to assume complex information systems can remain trustworthy all the time. In this work, we present MUltiple level Security cloud with strong Hardware level Isolation (MUSHI), a novel framework that can provide hardware level isolation and protection to individual guest virtual machine (VM) execution. With MUSHI, a user can maintain confidentiality and integrity of her VM in a multicore environment even in the presence of malicious attacks from both within and outside the cloud infrastructure.
AB - Multiple Level Security (MLS) has always been a center of focus since the usage of computers in military and intelligence systems. Extensive studies have been done on how to utilize virtualization technologies to provide multiple level secured execution in the cloud, yet the general assumption is that all components in the cloud service provider are trusted. With the advanced persistent threats currently faced by the military and intelligence community, it is unrealistic to assume complex information systems can remain trustworthy all the time. In this work, we present MUltiple level Security cloud with strong Hardware level Isolation (MUSHI), a novel framework that can provide hardware level isolation and protection to individual guest virtual machine (VM) execution. With MUSHI, a user can maintain confidentiality and integrity of her VM in a multicore environment even in the presence of malicious attacks from both within and outside the cloud infrastructure.
UR - http://www.scopus.com/inward/record.url?scp=84874298529&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84874298529&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2012.6415698
DO - 10.1109/MILCOM.2012.6415698
M3 - Conference contribution
AN - SCOPUS:84874298529
SN - 9781467317290
T3 - Proceedings - IEEE Military Communications Conference MILCOM
BT - MILCOM 2012 - 2012 IEEE Military Communications Conference
Y2 - 1 November 2012 through 1 November 2012
ER -