Building sand castles within iaas - based cloud instances

dc.contributor.authorSharma, K
dc.contributor.authorCarnage, C
dc.contributor.editorRodrigo, R
dc.date.accessioned2022-12-22T06:25:32Z
dc.date.available2022-12-22T06:25:32Z
dc.date.issued2013-02
dc.description.abstractEnterprises continually seek innovative approaches to reduce operational computing costs while extracting the maximum utility from their resources. Cloud Computing technology play a major role in helping organizations to reduce the operational cost and it is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud consumers are allowed to upload and execute their code inside Cloud Instances(CI) to perform different tasks. At the same time they need to run applications which they cannot trust completely. A compelling approach is needed to mitigate the security risk of executing untrusted applications that could potentially corrupt the resources available for CIs. This paper proposes a confined execution environment, which provides security and protection for CIs running untrusted applications. Cloud consumers can enable the proposed confined execution environment as and when required.en_US
dc.identifier.citation*****en_US
dc.identifier.conferenceNational Engineering Conference Engineering Research For Nation Buildingen_US
dc.identifier.departmentEngineering Research Unit, University of Moratuwaen_US
dc.identifier.facultyEngineeringen_US
dc.identifier.pgnospp. 90-95en_US
dc.identifier.placeKatubeddaen_US
dc.identifier.proceedingProceedings of the 18th Annual Research Symposiumen_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/19863
dc.identifier.year2013en_US
dc.language.isoenen_US
dc.publisherThe Engineering Research Unit, University of Moratuwaen_US
dc.titleBuilding sand castles within iaas - based cloud instancesen_US
dc.typeConference-Full-texten_US

Files

Collections