Skip to main content

Toward Trustworthy Clouds’ Internet Scale Critical Infrastructure

  • Conference paper
Book cover Information Security Practice and Experience (ISPEC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6672))

Abstract

Cloud computing is a new concept using old technologies that has emerged from industry to academia. This result in some confusion about Cloud potential capabilities by overestimating some features and underestimating the challenges, which we attempt to clarify in this paper. We present an overview of Cloud critical infrastructure focusing on what is known as IaaS (Infrastructure as a Service) Cloud type. We then discuss security challenges and requirements, which would hopefully contribute in moving current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical infrastructure. We are mainly focusing on: (a.) Cloud resource management for virtual infrastructure, (b.) security threats from Cloud insiders, (c.) Cloud user-centric security model, and (d.) Cloud infrastructure self-managed services. We have just start working on these areas as part of EU funded TCloud project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Trusted computing group, TPM Main, Part 1, Design Principles. Specification version 1.2 Revision 103 (2007)

    Google Scholar 

  2. Alawneh, M., Abbadi, I.M.: Sharing but protecting content against internal leakage for organisations. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 238–253. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Amazon: Amazon elastic compute cloud (amazon ec2) (2010), http://aws.amazon.com/ec2/

  4. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing (2009), http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf

  5. Griffin, J.L., Jaeger, T., Perez, R., Sailer, R., Doorn, L.V., Cceres, R.: Trusted virtual domains: Toward secure distributed services. In: Proc. of the First Workshop on Hot Topics in System Dependability (Hotdep 2005). IEEE Press, Los Alamitos (2005)

    Google Scholar 

  6. Jeffery, K., NeideckerLutz, B.: The Future of Cloud Computing — Opportunities For European Cloud Computing Beyond 2010 (2010)

    Google Scholar 

  7. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, vol. 0, pp. 109–116. IEEE Press, Los Alamitos (2009)

    Google Scholar 

  8. McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V.D., Perrig, A.: Trustvisor: Efficient tcb reduction and attestation. In: IEEE Symposium on Security and Privacy, pp. 143–158. IEEE Computer Society, Los Alamitos (2010)

    Google Scholar 

  9. Mell, P., Grance, T.: The NIST Definition of Cloud Computing

    Google Scholar 

  10. Microsoft: Microsoft system center it infrastructure server management solutions (2010), http://www.microsoft.com/systemcenter/

  11. Microsystems, S.: Take your business to a higher level (2009)

    Google Scholar 

  12. Murray, D.G., Milos, G., Hand, S.: Improving xen security through disaggregation. In: Gregg, D., Adve, V.S., Bershad, B.N. (eds.) VEE, pp. 151–160. ACM, New York (2008)

    Chapter  Google Scholar 

  13. OpenSource: Opennebula (2010), http://www.opennebula.org/

  14. OpenSource: Openstack (2010), http://www.openstack.org/

  15. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM Conference on Computer and Communications Security, pp. 199–212. ACM, New York (2009)

    Google Scholar 

  16. VMware: VMware vCenter Server (2010), http://www.vmware.com/products/vcenter-server/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abbadi, I.M. (2011). Toward Trustworthy Clouds’ Internet Scale Critical Infrastructure. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21031-0_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21030-3

  • Online ISBN: 978-3-642-21031-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics