Transpro: Mandatory sensitive information protection based on virtualization and encryption

Xue Zhi Xie, Hu Qiu Liu, Yu Ping Wang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the growing population of networked devices, the potential risk of leaking sensitive data has been seriously increased. This paper proposes a novel approach named TransPro based on virtualization technology, which can provide mandatory protected transmission between different network hosts. Through TransPro, all output sensitive data is encrypted before sent to network, and all input network data is decrypted before handled by the sensitive application. TransPro works in the host OS and VMM, and it does not need to manually modify application code. We have evaluated TransPro using security analysis and attack tests. The results show that TransPro can offer a safe information transmission with a little overhead.

Original languageEnglish
Title of host publicationCloud Computing and Security - 2nd International Conference, ICCCS 2016, Revised Selected Papers
EditorsXingming Sun, Alex Liu, Elisa Bertino, Han-Chieh Chao
PublisherSpringer Verlag
Pages443-455
Number of pages13
ISBN (Print)9783319486703
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event2nd International Conference on Cloud Computing and Security, ICCCS 2016 - Nanjing, China
Duration: 29 Jul 201631 Jul 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10039 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Cloud Computing and Security, ICCCS 2016
Country/TerritoryChina
CityNanjing
Period29/07/1631/07/16

Keywords

  • Encryption
  • Mandatory transmission
  • Sensitive information protection
  • Virtualization

Fingerprint

Dive into the research topics of 'Transpro: Mandatory sensitive information protection based on virtualization and encryption'. Together they form a unique fingerprint.

Cite this