Featured Research

from universities, journals, and other organizations

New technique offers enhanced security for sensitive data in cloud computing

Date:
October 13, 2011
Source:
North Carolina State University
Summary:
Researchers have developed a new, experimental technique to better protect sensitive information in cloud computing -- without significantly affecting the system's overall performance.

Researchers from North Carolina State University and IBM have developed a new, experimental technique to better protect sensitive information in cloud computing -- without significantly affecting the system's overall performance.

Under the cloud-computing paradigm, the computational power and storage of multiple computers is pooled, and can be shared by multiple users. Hypervisors are programs that create the virtual workspace that allows different operating systems to run in isolation from one another -- even though each of these systems is using computing power and storage capability on the same computer. A longstanding concern in cloud computing is that attackers could take advantage of vulnerabilities in a hypervisor to steal or corrupt confidential data from other users in the cloud.

The NC State research team has developed a new approach to cloud security, which builds upon existing hardware and firmware functionality to isolate sensitive information and workload from the rest of the functions performed by a hypervisor. The new technique, called "Strongly Isolated Computing Environment" (SICE), demonstrates the introduction of a different layer of protection.

"We have significantly reduced the 'surface' that can be attacked by malicious software," says Dr. Peng Ning, a professor of computer science at NC State and co-author of a paper describing the research. "For example, our approach relies on a software foundation called the Trusted Computing Base, or TCB, that has approximately 300 lines of code, meaning that only these 300 lines of code need to be trusted in order to ensure the isolation offered by our approach. Previous techniques have exposed thousands of lines of code to potential attacks. We have a smaller attack surface to protect."

SICE also lets programmers dedicate specific cores on widely-available multi-core processors to the sensitive workload -- allowing the other cores to perform all other functions normally. A core is the brain of a computer chip, and many computers now use chips that have between two and eight cores. By confining the sensitive workload to one or a few cores with strong isolation, and allowing other functions to operate separately, SICE is able to provide both high assurance for the sensitive workload and efficient resource sharing in a cloud.

In testing, the SICE framework generally took up approximately 3 percent of the system's performance overhead on multi-core processors for workloads that do not require direct network access. "That is a fairly modest price to pay for the enhanced security," Ning says. "However, more research is needed to further speed up the workloads that require interactions with the network."

The paper, "SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms," was co-authored by Ning; NC State Ph.D. student Ahmed Azab; and Dr. Xiaolan Zhang of IBM's T.J. Watson Research Center. The paper will be presented at the 18th ACM Conference on Computer and Communications Security, Oct. 17-21 in Chicago, Ill. The research was funded by the National Science Foundation, U.S. Army Research Office and IBM.


Story Source:

The above story is based on materials provided by North Carolina State University. Note: Materials may be edited for content and length.


Cite This Page:

North Carolina State University. "New technique offers enhanced security for sensitive data in cloud computing." ScienceDaily. ScienceDaily, 13 October 2011. <www.sciencedaily.com/releases/2011/10/111005110955.htm>.
North Carolina State University. (2011, October 13). New technique offers enhanced security for sensitive data in cloud computing. ScienceDaily. Retrieved July 29, 2014 from www.sciencedaily.com/releases/2011/10/111005110955.htm
North Carolina State University. "New technique offers enhanced security for sensitive data in cloud computing." ScienceDaily. www.sciencedaily.com/releases/2011/10/111005110955.htm (accessed July 29, 2014).

Share This




More Computers & Math News

Tuesday, July 29, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Teen's Phone Ignites Under Her Pillow; How Real Is The Risk?

Teen's Phone Ignites Under Her Pillow; How Real Is The Risk?

Newsy (July 28, 2014) A Texas teen's Samsung phone apparently ignited while she slept, but what was the real problem here? Video provided by Newsy
Powered by NewsLook.com
Google's Next Frontier: The Human Body

Google's Next Frontier: The Human Body

Newsy (July 27, 2014) Google is collecting genetic and molecular information to paint a picture of the perfectly healthy human. Video provided by Newsy
Powered by NewsLook.com
Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Reuters - US Online Video (July 27, 2014) Congress gets rid of pesky law that made it illegal to "unlock" mobile phones without permission, giving consumers the option to use the same phone on a competitor's wireless network. Mana Rabiee reports. Video provided by Reuters
Powered by NewsLook.com
Congress OKs Unlocking Phones From Carriers

Congress OKs Unlocking Phones From Carriers

Newsy (July 26, 2014) A bill legalizing "unlocking," or untethering a phone from its default wireless carrier, has passed Congress and is expected to be signed into law. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins