Fingerprinting Large Data Sets Through Memory De-Duplication Technique in Virtual Machines

Because of intellectual property, user privacy, and several other reasons, many scientific and military projects choose to hide the information about the data sets that the authors are using for analysis and computation. Attackers have designed various mechanisms to compromise the operating system or database management system to steal such information. In this paper, they propose a non-interactive mechanism to identify the data sets in use in a cloud computing environment when the Virtual Machine (VM) hypervisors adopt the memory de-duplication technique.

Provided by: University of North Carolina at Charlotte Topic: Security Date Added: Jan 2012 Format: PDF

Find By Topic