Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
MyCloud: supporting user-configured privacy protection in cloud computing
Li M., Zang W., Bai K., Yu M., Liu P.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA, Dec 9-13, 2013)59-68.2013.Type:Proceedings
Date Reviewed: Feb 18 2014

The authors of this paper propose MyCloud, an architecture for improving the confidentiality of the data in virtual machines (VMs) in cloud systems. The main idea is to remove the privileges of the control VM (which normally gives the cloud provider full access to the users’ VMs) and let VM owners define an access matrix to control access to their data. This approach narrows the trusted computing base (TCB) of the cloud system, thus improving the overall security by making the virtual machine monitor (VMM) simpler and easier to verify for security.

The paper describes the proposed architecture, compares it to standard clouds, and then presents an evaluation of its performance overhead and security. I found the content well organized, with good coverage of the important points of the proposed approach. It successfully shows how a complex system can be restructured to make it more secure. The motivation is compelling and there is a good survey of related work.

The only weak point of the paper lies in the English usage. The authors talk of “privacy” when they mean “confidentiality.” Privacy is an individual’s right, so one cannot talk about the privacy of a VM or its data. There are also numerous grammatical errors. I think the authors might have mentioned that the access matrix in their VMs can also protect against integrity attacks. In spite of this, the paper is worth reading for those involved in the security design of cloud systems and general complex systems.

Reviewer:  E. B. Fernandez Review #: CR142011 (1405-0367)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
Cloud Computing (C.2.4 ... )
 
 
Organization And Design (D.4.7 )
 
 
Performance (D.4.8 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy