{"id":"https://openalex.org/W4200405021","doi":"https://doi.org/10.1109/pst52912.2021.9647766","title":"Secure Allocation for Graph-Based Virtual Machines in Cloud Environments","display_name":"Secure Allocation for Graph-Based Virtual Machines in Cloud Environments","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200405021","doi":"https://doi.org/10.1109/pst52912.2021.9647766"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647766","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069866877","display_name":"Mansour Aldawood","orcid":null},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mansour Aldawood","raw_affiliation_strings":["Department of Computer Science, University of Warwick Coventry, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Warwick Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005426902","display_name":"Arshad Jhumka","orcid":"https://orcid.org/0000-0003-0540-2845"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Arshad Jhumka","raw_affiliation_strings":["Department of Computer Science, University of Warwick Coventry, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Warwick Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069866877"],"corresponding_institution_ids":["https://openalex.org/I39555362"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.29681041,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8294468522071838},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.7994060516357422},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7210888862609863},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6085172891616821},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5757682919502258},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4869145154953003},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45854949951171875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3663521409034729},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14924150705337524}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8294468522071838},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.7994060516357422},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7210888862609863},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6085172891616821},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5757682919502258},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4869145154953003},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45854949951171875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3663521409034729},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14924150705337524}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst52912.2021.9647766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647766","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:163782","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W104805067","https://openalex.org/W1575758330","https://openalex.org/W1975176368","https://openalex.org/W1982989685","https://openalex.org/W2023419890","https://openalex.org/W2042876290","https://openalex.org/W2052383681","https://openalex.org/W2125212367","https://openalex.org/W2157614013","https://openalex.org/W2336467084","https://openalex.org/W2541060022","https://openalex.org/W2586677657","https://openalex.org/W2587130621","https://openalex.org/W2644225658","https://openalex.org/W2754073568","https://openalex.org/W2754249243","https://openalex.org/W2755364709","https://openalex.org/W2759962686","https://openalex.org/W2782078190","https://openalex.org/W2795285535","https://openalex.org/W2946517659","https://openalex.org/W2964958129","https://openalex.org/W2995691346","https://openalex.org/W3010543330","https://openalex.org/W3127541545","https://openalex.org/W3157413731","https://openalex.org/W4294618594","https://openalex.org/W6743860604","https://openalex.org/W6744244758","https://openalex.org/W6775201933"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W572531444","https://openalex.org/W2921575628","https://openalex.org/W2743348030","https://openalex.org/W2947629119","https://openalex.org/W1963799338","https://openalex.org/W2174174426","https://openalex.org/W2542775576","https://openalex.org/W2900408237","https://openalex.org/W2036412865"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,9],"systems":[2],"(CCSs)":[3],"enable":[4],"the":[5,22,69,90,99,109,132],"sharing":[6,32],"of":[7,16,26,83,112,134],"physical":[8,24,71],"resources":[10,25],"through":[11],"virtualisation,":[12],"where":[13],"a":[14,27,36,44,75,123,142,159],"group":[15],"virtual":[17],"machines":[18],"(VMs)":[19],"can":[20,33,52],"share":[21],"same":[23,70],"given":[28],"machine.":[29,72],"However,":[30],"this":[31,84],"lead":[34,121],"to":[35,47,80,88,103,120,122,130,149,165],"so-called":[37],"side-channel":[38],"attack":[39],"(SCA),":[40],"widely":[41],"recognised":[42],"as":[43],"potential":[45],"threat":[46],"CCSs.":[48],"Specifically,":[49],"malicious":[50,91],"VMs":[51,94,145,168],"capture":[53],"information":[54],"from":[55],"(target)":[56],"VMs,":[57],"i.e.,":[58,98],"those":[59,171],"with":[60,66],"sensitive":[61],"information,":[62],"by":[63],"merely":[64],"co-located":[65],"them":[67],"on":[68],"As":[73],"such,":[74],"VM":[76,113,135],"allocation":[77,100,110,114,146,169],"algorithm":[78,101,147],"needs":[79,102],"be":[81,104],"cognizant":[82],"issue":[85],"and":[86,92],"attempts":[87],"allocate":[89],"target":[93],"onto":[95],"different":[96],"machines,":[97],"security-aware.":[105],"This":[106],"paper":[107],"investigates":[108],"patterns":[111],"algorithms":[115,157],"that":[116,156],"are":[117,162],"more":[118,163],"likely":[119,164],"secure":[124,144,167],"allocation.":[125,138],"A":[126],"driving":[127],"objective":[128],"is":[129],"reduce":[131],"number":[133],"migrations":[136],"during":[137],"We":[139],"also":[140],"propose":[141],"graph-based":[143],"(GbSRS)":[148],"minimise":[150],"SCA":[151],"threats.":[152],"Our":[153],"results":[154],"show":[155],"following":[158,172],"stacking-based":[160],"behaviour":[161],"produce":[166],"than":[170],"spreading":[173],"or":[174],"random":[175],"behaviours.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
