Download Now Free registration required
Because of intellectual property, user privacy, and several other reasons, many scientific and military projects choose to hide the information about the data sets that the authors are using for analysis and computation. Attackers have designed various mechanisms to compromise the operating system or database management system to steal such information. In this paper, they propose a non-interactive mechanism to identify the data sets in use in a cloud computing environment when the Virtual Machine (VM) hypervisors adopt the memory de-duplication technique.
- Format: PDF
- Size: 573.62 KB