Zusammenfassung
Das von der Europäischen Kommission gef:orderte Projekt „TClouds“ hat die Entwicklung einer sicheren und datenschutzkonformen Cloud-Infrastruktur zum Ziel. Dieser Beitrag beschreibt die Herausforderungen und die ersten Lösungsideen.
Literaturverzeichnis
Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2011). DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. EuroSys’11: The 6th ACM SIGOPS/EuroSys European Systems Conference. Salzburg.
Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.V., Ramunno, G., Sadeghi, A.R., Schunter, M., Stüble, C. (2010): Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18, 89–121.
Catuogno, L., Löhr, H., Manulis, M., Sadeghi, A.-R., & Stüble, C. (5 2010). Trusted Virtual Domains: Color Your Network. Datenschutz und Datensicherheit (DuD), S. 289–298.
Chien, E (2010): W32.Stuxnet dossier. From http://www.symantec.com/connect/blogs/w32stuxnet-dossier, retrieved 2010-13-03
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J. (2009): Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud Computing Security (CCSW’09). pp. 85–90. ACM Press
Cloud Security Alliance (2010): Top threats to cloud computing, version 1.0. http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
Glott, Rüdiger, E. Husmann, A. Sadeghi, and Matthias Schunter (2011): Trustworthy Clouds underpinning the Future Internet, to appear in Future Internet Assembly — Book 3, Springer LNCS 6656
Grobauer, B., Schreck, T. (2010): Towards incident handling in the cloud: challenges and approaches. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. pp. 77–86. CCSW’ 10, ACM, New York, NY, USA
Kaliski, Jr., B.S., Pauley, W. (2010): Toward risk assessment as a service in cloud environments. In: Proceed-ings of the 2nd USENIX conference on Hot topics in cloud computing. pp. 13–13. HotCloud’10, USENIX Association, Berkeley, CA, USA
Organization for Economic Co-Operation and Development (2009): Guidelines on the protection of privacy and transborder flows of personal data. From http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html (last modified January 5 1999), the OECD Privacy Principles
Penn, J.: (2010): Security and the cloud: Looking at the opportunity beyond the obstacle. Forrester Research
Rajan, S.S. (2010): Cloudsourcing vs outsourcing. Available online at http://cloudcomputing.syscon.com/node/1611752
Ristenpart, T., Tromer, E., Shacham, H., Savage, S. (2009): Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security. pp. 199–212. CCS’ 09, ACM, New York, NY, USA
Sadeghi, A.R., Schneider, T., Winandy, M. (2010): Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Proceedings of the 3rd international conference on Trust and trustworthy computing. pp. 417–429. TRUST’10, Springer-Verlag, Berlin, Heidelberg
Santos, N., Gummadi, K., & Rodrigues, R. (2009). Towards trusted cloud computing. Proceedings of the 2009 conference on Hot topics in cloud computing. Berkeley: USENIX Association.
Santos, N., Gummadi, K.P., Rodrigues, R. (2009): Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. pp. 3–3. HotCloud’09, USENIX Association, Berkeley, CA, USA
Vukolić, M. (2010): The byzantine empire in the intercloud. SIGACT News 41, 105–111
Weichert, T. (2009): Cloud Computing und Datenschutz. Available online at http://www.datenschutzzentrum.de/cloud-computing/
Additional information
Ninja Marnau ist Juristin im Unabhängigen Landeszentrum für Datenschutz Schleswig-Holstein (ULD) und Mitarbeiterin des EUProjekts TClouds.
Dr. Norbert Schirmer ist Senior System Architect bei der Sirrix AG security solutions in Bochum und Mitarbeiter des EU-Projekts TClouds.
Eva Schlehahn ist Juristin des Unabhängigen Landeszentrums für Datenschutz Schleswig-Holstein (ULD) und rechtsberatend für das EU-Projekt TClouds tätig.
Dr. Matthias Schunter ist Leiter für „Cloud Computing und Sicherheit“ bei IBM Research — Zurich und Technischer Leiter des EUProjekts TClouds.
Rights and permissions
About this article
Cite this article
Marnau, N., Schirmer, N., Schlehahn, E. et al. TClouds. DuD 35, 333–337 (2011). https://doi.org/10.1007/s11623-011-0081-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-011-0081-3