TY - CHAP U1 - Konferenzveröffentlichung A1 - Betz, Johann-Wolfram A1 - Westhoff, Dirk T1 - C3-Sched — A cache covert channel robust cloud computing scheduler T2 - 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) N2 - Several cloud schedulers have been proposed in the literature with different optimization goals such as reducing power consumption, reducing the overall operational costs or decreasing response times. A less common goal is to enhance the system security by applying specific scheduling decisions. The security risk of covert channels is known for quite some time, but is now back in the focus of research because of the multitenant nature of cloud computing and the co-residency of several per-tenant virtual machines on the same physical machine. Especially several cache covert channels have been identified that aim to bypass a cloud infrastructure's sandboxing mechanism. For instance, cache covert channels like the one proposed by Xu et. al. use the idealistic scenario with two alternately running colluding processes in different VMs accessing the cache to transfer bits by measuring cache access time. Therefore, in this paper we present a cascaded cloud scheduler coined C 3 -Sched aiming at mitigating the threat of a leakage of customers data via cache covert channels by preventing processes to access cache lines alternately. At the same time we aim at maintaining the cloud performance and minimizing the global scheduling overhead. KW - Cloud Computing KW - Web-Applikation Y1 - 2014 SN - 978-1-908320-39-1 SB - 978-1-908320-39-1 U6 - https://doi.org/10.1109/ICITST.2014.7038775 DO - https://doi.org/10.1109/ICITST.2014.7038775 SP - 55 EP - 61 PB - IEEE ER -