Security

Fingerprinting Large Data Sets Through Memory De-Duplication Technique in Virtual Machines

Date Added: Jan 2012
Format: PDF

Because of intellectual property, user privacy, and several other reasons, many scientific and military projects choose to hide the information about the data sets that the authors are using for analysis and computation. Attackers have designed various mechanisms to compromise the operating system or database management system to steal such information. In this paper, they propose a non-interactive mechanism to identify the data sets in use in a cloud computing environment when the Virtual Machine (VM) hypervisors adopt the memory de-duplication technique.