Security

Fingerprinting Large Data Sets Through Memory De-Duplication Technique in Virtual Machines

Download Now Free registration required

Executive Summary

Because of intellectual property, user privacy, and several other reasons, many scientific and military projects choose to hide the information about the data sets that the authors are using for analysis and computation. Attackers have designed various mechanisms to compromise the operating system or database management system to steal such information. In this paper, they propose a non-interactive mechanism to identify the data sets in use in a cloud computing environment when the Virtual Machine (VM) hypervisors adopt the memory de-duplication technique.

  • Format: PDF
  • Size: 573.62 KB