@inproceedings{0b18f4d722e24517bd8ebd3211c03588,
title = "Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds",
abstract = "A common feature provided by any Cloud Service Provider (CSP) is their library of pre-built and ready to use operating system images that contribute to the overall flexibility, usability and cost savings advantages of Cloud Computing. The pedigree of CSP library images can vary, and some concerns have been raised about confidentiality of user historical data via publicly available images which have not been prepared in a manner consistent with recommended security best practices. In this paper we explore data remanence security concerns associated with virtual machine (VM) instances templates, a popular technique for configuring VMs for new users. We show how forensics tools can be used to check for data remanence and how to appropriately deconflict findings for improved assurance.",
keywords = "Cloud Computing, residual data, security",
author = "B. Albelooshi and K. Salah and T. Martin and E. Damiani",
note = "Publisher Copyright: {\textcopyright} 2015 IEEE.; 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015 ; Conference date: 17-11-2015 Through 20-11-2015",
year = "2016",
month = jul,
day = "7",
doi = "10.1109/AICCSA.2015.7507234",
language = "British English",
series = "Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA",
publisher = "IEEE Computer Society",
booktitle = "2015 IEEE/ACS 12th International Conference of Computer Systems and Applications, AICCSA 2015",
address = "United States",
}