Q2. What is the purpose of the multi-tenancy aspect of cloud computing?
The multi-tenancy aspect is addressed by deploying strong virtual machine managers and operating systems that ensure separation between processes; that was always their purpose.
Q3. How many lines of code is Flicker capable of encrypting?
The main achievement of Flicker is to reduce the size of the trusted computing base (TCB)—that is, the program that has to be trusted (in addition to p)—to about 250 lines of code.
Q4. What are the main reasons for the cloud-based conference management systems?
Systems such as EasyChair and EDAS allow a conference chair or manager to create the conference account “in the cloud”, and those systems handle all the necessary administration such as distribution of papers to programme committee (PC) members, collection and distribution of reviews and discussion, and production of emails to authors and reviewers and reports such as acceptance statistics and the conference programme.
Q5. What are the privacy concerns of cloud-based conference management systems?
The privacy concerns with cloud-computing-based conference management systems such as EDAS and EasyChair arise because the system administrators are custodians of a huge quantity of data about the submission and reviewing behaviour of thousands of researchers, aggregated across multiple conferences.
Q6. What is the process manager doing when the data is uploaded?
when the process manager needs to make this data available to reviewers, s/he downloads the data keys, decrypts them using the private key, and encrypts them again using a symmetric key that has been shared by an out-of-band protocol with the evaluators, and then uploads them again.
Q7. How can a VM be securely provisioned?
This VM can be securely provisioned with a symmetric key (for disk storage) and the secret part of a public key (for TLS communication) by a conference chair at the time the conference account is created.
Q8. What can be done by the web browser?
This downloading, decryption, encryption and uploading can take place automatically by the web browser being used by the manager.
Q9. What is the definition of a key translation in the browser?
Key translation in the browser is so far restricted to a rather narrow class of applications, which roughly may be characterised as “store-and-forward”.
Q10. What is the way to secure the conference management data?
There are several ways to leverage hardware-anchored security on the cloud side to achieve confidentiality for the conference management data.