Abstract
Cloud computing is a new concept using old technologies that has emerged from industry to academia. This result in some confusion about Cloud potential capabilities by overestimating some features and underestimating the challenges, which we attempt to clarify in this paper. We present an overview of Cloud critical infrastructure focusing on what is known as IaaS (Infrastructure as a Service) Cloud type. We then discuss security challenges and requirements, which would hopefully contribute in moving current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical infrastructure. We are mainly focusing on: (a.) Cloud resource management for virtual infrastructure, (b.) security threats from Cloud insiders, (c.) Cloud user-centric security model, and (d.) Cloud infrastructure self-managed services. We have just start working on these areas as part of EU funded TCloud project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Trusted computing group, TPM Main, Part 1, Design Principles. Specification version 1.2 Revision 103 (2007)
Alawneh, M., Abbadi, I.M.: Sharing but protecting content against internal leakage for organisations. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 238–253. Springer, Heidelberg (2008)
Amazon: Amazon elastic compute cloud (amazon ec2) (2010), http://aws.amazon.com/ec2/
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing (2009), http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
Griffin, J.L., Jaeger, T., Perez, R., Sailer, R., Doorn, L.V., Cceres, R.: Trusted virtual domains: Toward secure distributed services. In: Proc. of the First Workshop on Hot Topics in System Dependability (Hotdep 2005). IEEE Press, Los Alamitos (2005)
Jeffery, K., NeideckerLutz, B.: The Future of Cloud Computing — Opportunities For European Cloud Computing Beyond 2010 (2010)
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, vol. 0, pp. 109–116. IEEE Press, Los Alamitos (2009)
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V.D., Perrig, A.: Trustvisor: Efficient tcb reduction and attestation. In: IEEE Symposium on Security and Privacy, pp. 143–158. IEEE Computer Society, Los Alamitos (2010)
Mell, P., Grance, T.: The NIST Definition of Cloud Computing
Microsoft: Microsoft system center it infrastructure server management solutions (2010), http://www.microsoft.com/systemcenter/
Microsystems, S.: Take your business to a higher level (2009)
Murray, D.G., Milos, G., Hand, S.: Improving xen security through disaggregation. In: Gregg, D., Adve, V.S., Bershad, B.N. (eds.) VEE, pp. 151–160. ACM, New York (2008)
OpenSource: Opennebula (2010), http://www.opennebula.org/
OpenSource: Openstack (2010), http://www.openstack.org/
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM Conference on Computer and Communications Security, pp. 199–212. ACM, New York (2009)
VMware: VMware vCenter Server (2010), http://www.vmware.com/products/vcenter-server/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abbadi, I.M. (2011). Toward Trustworthy Clouds’ Internet Scale Critical Infrastructure. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-21031-0_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21030-3
Online ISBN: 978-3-642-21031-0
eBook Packages: Computer ScienceComputer Science (R0)