{"id":"https://openalex.org/W3007918824","doi":"https://doi.org/10.1109/globecom38437.2019.9014033","title":"Secure Cryptography Infrastructures in the Cloud","display_name":"Secure Cryptography Infrastructures in the Cloud","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3007918824","doi":"https://doi.org/10.1109/globecom38437.2019.9014033","mag":"3007918824"},"language":"en","primary_location":{"id":"doi:10.1109/globecom38437.2019.9014033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9014033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057258570","display_name":"Dawei Chu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dawei Chu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009692602","display_name":"Kaijie Zhu","orcid":"https://orcid.org/0000-0002-3235-188X"},"institutions":[{"id":"https://openalex.org/I918919364","display_name":"Switch","ror":"https://ror.org/02yw51758","country_code":"CH","type":"nonprofit","lineage":["https://openalex.org/I918919364"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Kaijie Zhu","raw_affiliation_strings":["National Digital Switching System Engineering & Technological R&D Center, CHINA"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering & Technological R&D Center, CHINA","institution_ids":["https://openalex.org/I918919364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027215089","display_name":"Quanwei Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quanwei Cai","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014556254","display_name":"Fengjun Li","orcid":"https://orcid.org/0000-0003-4079-2228"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fengjun Li","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, The University of Kansas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, The University of Kansas, USA","institution_ids":["https://openalex.org/I146416000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057991555","display_name":"Le Guan","orcid":"https://orcid.org/0000-0002-8205-5616"},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Le Guan","raw_affiliation_strings":["Department of Computer Science, University of Georgia, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Georgia, USA","institution_ids":["https://openalex.org/I165733156"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030277015","display_name":"Lingchen Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingchen Zhang","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5057258570"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60310689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8177933692932129},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.7941483855247498},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7844337224960327},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6990357637405396},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.6867691874504089},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.49675899744033813},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4296705424785614},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33002549409866333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8177933692932129},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.7941483855247498},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7844337224960327},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6990357637405396},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.6867691874504089},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.49675899744033813},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4296705424785614},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33002549409866333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom38437.2019.9014033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9014033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W19255610","https://openalex.org/W161094530","https://openalex.org/W180396117","https://openalex.org/W1553586369","https://openalex.org/W1583301963","https://openalex.org/W1729172517","https://openalex.org/W1971739358","https://openalex.org/W1984382557","https://openalex.org/W1995727142","https://openalex.org/W2029224396","https://openalex.org/W2097128585","https://openalex.org/W2100678175","https://openalex.org/W2107691219","https://openalex.org/W2113586407","https://openalex.org/W2131202839","https://openalex.org/W2151329337","https://openalex.org/W2170961388","https://openalex.org/W2175377689","https://openalex.org/W6606453090","https://openalex.org/W6634781821","https://openalex.org/W6637474167","https://openalex.org/W6679268441"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W1973516247","https://openalex.org/W2271326670","https://openalex.org/W2552925293","https://openalex.org/W1478590381","https://openalex.org/W3074768883","https://openalex.org/W1996880143","https://openalex.org/W2384916795","https://openalex.org/W1039201998","https://openalex.org/W2779209348"],"abstract_inverted_index":{"Information":[0],"systems":[1,134],"are":[2,116,174,180],"deployed":[3],"in":[4,29,59,71,82,108,220],"clouds":[5],"as":[6,142,144],"virtual":[7,67,88,136,163],"machines":[8],"(VMs)":[9],"for":[10,57,212],"better":[11],"agility,":[12],"elasticity":[13],"and":[14,31,75,101,170,194,214],"reliability.":[15],"It":[16],"is":[17,63,215],"necessary":[18],"to":[19,139,185],"safekeep":[20],"their":[21],"cryptographic":[22,68,96,137,172,209],"keys,":[23],"e.g.,":[24],"the":[25,43,60,83,99,109,121,126,129,148,160,171,178,189],"private":[26],"keys":[27,97,105],"used":[28],"TLS":[30],"SSH,":[32],"against":[33,217],"various":[34],"attacks.":[35],"However,":[36],"existing":[37,204],"virtualization":[38,84,132,205],"solutions":[39],"do":[40],"not":[41,175],"improve":[42],"cryptography":[44,55],"facilities":[45],"of":[46,65,131,152],"in-cloud":[47],"systems.":[48],"This":[49],"paper":[50],"presents":[51],"SECRIN,":[52],"a":[53,77,140,153,183],"secure":[54,216],"infrastructure":[56],"VMs":[58,122,179],"cloud.":[61],"SECRIN":[62,190],"composed":[64],"a)":[66],"devices":[69,138,164],"implemented":[70],"VM":[72,141,154],"monitors":[73],"(VMMs),":[74],"b)":[76],"device":[78,89],"management":[79,85,127,133],"tool":[80],"integrated":[81],"system.":[86],"A":[87],"receives":[90],"requests":[91],"from":[92,182],"VMs,":[93],"computes":[94],"with":[95,167,192,203],"within":[98],"VMM":[100],"returns":[102],"results.":[103],"The":[104,162],"appear":[106],"only":[107],"VMM's":[110],"memory":[111],"space,":[112],"so":[113],"that":[114],"they":[115],"kept":[117],"secret":[118],"even":[119],"if":[120],"were":[123],"compromised.":[124],"With":[125],"tool,":[128],"operator":[130],"assigns":[135],"well":[143],"other":[145],"resources,":[146],"while":[147],"tenant":[149],"(or":[150],"owner)":[151],"still":[155],"holds":[156],"proper":[157],"controls":[158],"on":[159],"keys.":[161],"work":[165],"compatibly":[166,202],"live":[168],"migration,":[169],"computations":[173],"interrupted":[176],"when":[177],"moving":[181],"host":[184],"another.":[186],"We":[187],"develop":[188],"prototype":[191],"KVM-QEMU":[193],"oVirt.":[195],"Experimental":[196],"results":[197],"show":[198],"that,":[199],"it":[200],"works":[201],"solutions,":[206],"provides":[207],"reliable":[208],"computing":[210],"services":[211],"applications,":[213],"attacks":[218],"happening":[219],"VMs.":[221]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
