Securing Virtual Machine Orchestration with Blockchains

被引:0
|
作者
Bozic, Nikola [1 ,2 ]
Pujolle, Guy [2 ]
Secci, Stefano [2 ]
机构
[1] SQUAD, Paris, France
[2] UPMC Univ Paris 06, Sorbonne Univ, UMR 7606, LIP6, Paris, France
来源
2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET) | 2017年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The blockchain technology is gaining momentum because of its possible application to other systems than the cryptocurrency one. Indeed, blockchain, as a de-centralized system based on a distributed digital ledger, can be utilized to securely manage any kind of assets, constructing a system that is independent of any authorization entity. In this paper, we briefly present blockchain and our work in progress, the VMOA blockchain, to secure virtual machine orchestration operations for cloud computing and network functions virtualization systems. Using tutorial examples, we describe our design choices and draw implementation plans.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] An Authentication Framework for Securing Virtual Machine Migration
    Majhi, Santosh Kumar
    Dhal, Sunil Kumar
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1283 - 1286
  • [2] Securing Cognitive Radio Networks using blockchains
    Sajid, Adnan
    Khalid, Bilal
    Ali, Mudassar
    Mumtaz, Shahid
    Masud, Usman
    Qamar, Farhan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 816 - 826
  • [3] Securing the LoRaWAN join procedure using blockchains
    Danish, Syed Muhammad
    Lestas, Marios
    Qureshi, Hassaan Khaliq
    Zhang, Kaiwen
    Asif, Waqar
    Rajarajan, Muttukrishnan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 2123 - 2138
  • [4] Securing the LoRaWAN join procedure using blockchains
    Syed Muhammad Danish
    Marios Lestas
    Hassaan Khaliq Qureshi
    Kaiwen Zhang
    Waqar Asif
    Muttukrishnan Rajarajan
    Cluster Computing, 2020, 23 : 2123 - 2138
  • [5] Securing Virtual Machine Images of Cloud by Encryption through Kerberos
    Islam, S. M. Neamul
    Rahman, Md Mahbubur
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1074 - 1079
  • [6] Securing Cloud Virtual Machine Image Using Ethereum Blockchain
    Basu, Srijita
    Karmakar, Sandip
    Bera, Debasish
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [7] DLCP: A Protocol for Securing Light Client Operation in Blockchains
    da Costa, Leonardo
    Neto, Andre
    Pinheiro, Billy
    Araujo, Roberto
    Abelem, Antonio
    Cordeiro, Weverton
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [8] Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains
    Wagner, Matthew
    McMillin, Bruce
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 64 - 73
  • [9] A Usage-Based Mechanism for Securing Systems via Blockchains
    Brigham, Eric
    Doucette, John A.
    Lepinski, Matthew
    2019 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPCON), 2019, : 49 - 58
  • [10] Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
    Cambou, Bertrand
    Gowanlock, Michael
    Heynssens, Julie
    Jain, Saloni
    Philabaum, Christopher
    Booher, Duane
    Burke, Ian
    Garrard, Jack
    Telesca, Donald
    Njilla, Laurent
    CRYPTOGRAPHY, 2020, 4 (02) : 1 - 26