ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article An Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data
Cited 1 time in scopus Download 141 time Share share facebook twitter linkedin kakaostory
Authors
Kyung-Soo Lim, Jinho Park, Jong Hyuk Park
Issue Date
2017-07
Citation
Sustainability, v.9, no.7, pp.1-16
ISSN
2071-1050
Publisher
MDPI
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.3390/su9071250
Project Code
17HH4400, Development of Cloud-based Intelligent Video Security Incubating Platform, Kim Geonwoo
Abstract
Currently, the exchange cycles of various computers, smartphones, tablets, and others have become shorter, because new high-performance devices continue to roll out rapidly. However, existing legacy devices are not old-fashioned or obsolete to use. From the perspective of sustainable information technology (IT), energy-efficient virtualization can apply a way to increase reusability for special customized devices and enhance the security of existing legacy devices. It means that the virtualization can customize a specially designed purpose using the guest domain from obsolete devices. Thus, this could be a computing scheme that keeps energy supplies and demands in balance for future sustainable IT. Moreover, energy-efficient virtualization can be the long-term and self-sustainable solution such as cloud computing, big data and so forth. By separating the domain of the host device based on virtualization, the guest OS on the segmented domain can be used as a Trusted Execution Environment to perform security features. In this paper, we introduce a secure platform to protect sensitive user data by domain isolation utilizing virtualization. The sensitive user data on our secure platform can protect against the infringement of personal information by malicious attacks. This study is an effective solution in terms of sustainability by recycling them for special purposes or enhancing the security of existing devices.
KSP Keywords
Big Data, Cloud Computing, High performance, Host device, Information Technology, Personal information, Trusted execution environment, User data, energy-efficient, legacy devices, malicious attacks
This work is distributed under the term of Creative Commons License (CCL)
(CC BY)
CC BY