Skip to main content

Showing 1–5 of 5 results for author: Schear, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:1907.07627  [pdf, other

    cs.DC cs.CR

    A Secure Cloud with Minimal Provider Trust

    Authors: Amin Mosayyebzadeh, Gerardo Ravago, Apoorve Mohan, Ali Raza, Sahil Tikale, Nabil Schear, Trammell Hudson, Jason Hennessey, Naved Ansari, Kyle Hogan, Charles Munson, Larry Rudolph, Gene Cooperman, Peter Desnoyers, Orran Krieger

    Abstract: Bolted is a new architecture for a bare metal cloud with the goal of providing security-sensitive customers of a cloud the same level of security and control that they can obtain in their own private data centers. It allows tenants to elastically allocate secure resources within a cloud while being protected from other previous, current, and future tenants of the cloud. The provisioning of a new s… ▽ More

    Submitted 13 July, 2019; originally announced July 2019.

    Comments: 7 Pages, 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '18). arXiv admin note: text overlap with arXiv:1907.06110

  2. arXiv:1907.06110  [pdf, other

    cs.DC cs.CR

    Supporting Security Sensitive Tenants in a Bare-Metal Cloud

    Authors: Amin Mosayyebzadeh, Apoorve Mohan, Sahil Tikale, Mania Abdi, Nabil Schear, Charles Munson, Trammell Hudson, Larry Rudolph, Gene Cooperman, Peter Desnoyers, Orran Krieger

    Abstract: Bolted is a new architecture for bare-metal clouds that enables tenants to control tradeoffs between security, price, and performance. Security-sensitive tenants can minimize their trust in the public cloud provider and achieve similar levels of security and control that they can obtain in their own private data centers. At the same time, Bolted neither imposes overhead on tenants that are securit… ▽ More

    Submitted 13 July, 2019; originally announced July 2019.

    Comments: 16 Pages, 2019 USENIX Annual Technical Conference (ATC'19)

  3. arXiv:1609.00266  [pdf, other

    cs.CR

    Retrofitting Applications with Provenance-Based Security Monitoring

    Authors: Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, Nabil Schear

    Abstract: Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's actions following an intrusion, or even control the flow of outbound data within an organization. Unfortunately, providing relevant data provenance for c… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.

  4. arXiv:1406.5751  [pdf

    cs.CR astro-ph.IM cs.DB cs.IR

    Computing on Masked Data: a High Performance Method for Improving Big Data Veracity

    Authors: Jeremy Kepner, Vijay Gadepally, Pete Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham

    Abstract: The growing gap between data and users calls for innovative tools that address the challenges faced by big data volume, velocity and variety. Along with these standard three V's of big data, an emerging fourth "V" is veracity, which addresses the confidentiality, integrity, and availability of the data. Traditional cryptographic techniques that ensure the veracity of data can have overheads that a… ▽ More

    Submitted 22 June, 2014; originally announced June 2014.

    Comments: to appear in IEEE High Performance Extreme Computing 2014 (ieee-hpec.org)

  5. arXiv:1109.0097  [pdf, other

    cs.CR

    Website Detection Using Remote Traffic Analysis

    Authors: Xun Gong, Negar Kiyavash, NabĂ­l Schear, Nikita Borisov

    Abstract: Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be used to recover important semantic information. For instance, attackers can find out which website, or which page on a website, a user is accessing simply by monitoring the packet size distribution. We show that traffic analysis is even a greater threat to privacy than previously thought by introduc… ▽ More

    Submitted 1 September, 2011; originally announced September 2011.