Multiprocessor system-on-chip for processing data in cloud computing

Multiprocessor system-on-chip for processing data in cloud computing

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Data Security in Cloud Computing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Cloud computing enables cloud customers to obtain shared processing resources and data on demand. Cloud providers configure computing resources to provide different services to users and enterprises. These cloud providers satisfy the need for highperformance computing by bringing more PEs inside a chip (known as Multiprocessor System-on-Chip (MPSoC)) instead of increasing operating frequency. An MPSoC usually employs Network-on-Chip (NoC) as the scalable on-chip communication medium. An MPSoC can contain multiple Trusted Execution Environments (TEEs) and Rich Execution Environments (REEs). Security critical applications run in TEEs and normal applications run in REEs. Due to sharing of resources (for example, NoC) in cloud computing, applications running in two TEEs may need to communicate over an REE that is running applications of a malicious user (attacker). This scenario can cause unauthorized access attack if the attacker launches router attack inside the NoC. Apart from this attack, an attacker can also launch misrouting attack using router attack causing various types of ill effects. To deal with these security concerns, we discuss in detail different hardware-based security mechanisms. These mechanisms mainly employ monitoring to detect a router attack and possibly a malicious router location. The hardware-based mechanisms can provide much-needed protection to users' data in a cloud computing MPSoC platform. Apart from the threat model with practical examples, detailed hardware description of each security mechanism is given in this chapter for easy understanding of the readers.

Chapter Contents:

  • Abstract
  • 4.1 Introduction
  • 4.2 Current approaches to secure MPSoC cloud platforms
  • 4.3 Threat model
  • 4.3.1 Router attack description
  • 4.3.2 The malicious effects of router attack
  • Effects of misrouting attack
  • Effects of unauthorized access attack
  • 4.3.3 Examples of router attack
  • 4.4 Countermeasure for unauthorized access attack
  • 4.4.1 Runtime monitor
  • 4.4.2 Restart monitor
  • 4.4.3 Ejection address checker
  • 4.4.4 Simulation and synthesis results
  • 4.5 Countermeasure for misrouting attack
  • 4.5.1 Local monitoring module
  • 4.5.2 Intermediate manager
  • 4.5.3 Simulation and synthesis results
  • 4.6 Summary, future research directions, and further readings
  • Acknowledgments
  • References

Inspec keywords: cloud computing; parallel processing; network routing; authorisation; multiprocessing systems; trusted computing; network-on-chip

Other keywords: scalable on-chip communication medium; hardware-based security mechanisms; security critical applications; TEEs; REEs; rich execution environments; malicious router location; network-on-chip; unauthorized access attack; misrouting attack; router attack; cloud computing MPSoC platform; high-performance computing; multiprocessor system-on-chip; trusted execution environments

Subjects: Data security; Internet software; Network-on-chip; Multiprocessing systems; Network-on-chip; System-on-chip; System-on-chip

Preview this chapter:
Zoom in

Multiprocessor system-on-chip for processing data in cloud computing, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch4-1.gif /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch4-2.gif

Related content

This is a required field
Please enter a valid email address