Skip to main content
Log in

TClouds

Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud

Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Das von der Europäischen Kommission gef:orderte Projekt „TClouds“ hat die Entwicklung einer sicheren und datenschutzkonformen Cloud-Infrastruktur zum Ziel. Dieser Beitrag beschreibt die Herausforderungen und die ersten Lösungsideen.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Literaturverzeichnis

  • Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2011). DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. EuroSys’11: The 6th ACM SIGOPS/EuroSys European Systems Conference. Salzburg.

  • Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.V., Ramunno, G., Sadeghi, A.R., Schunter, M., Stüble, C. (2010): Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18, 89–121.

    Article  Google Scholar 

  • Catuogno, L., Löhr, H., Manulis, M., Sadeghi, A.-R., & Stüble, C. (5 2010). Trusted Virtual Domains: Color Your Network. Datenschutz und Datensicherheit (DuD), S. 289–298.

    Article  Google Scholar 

  • Chien, E (2010): W32.Stuxnet dossier. From http://www.symantec.com/connect/blogs/w32stuxnet-dossier, retrieved 2010-13-03

  • Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J. (2009): Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud Computing Security (CCSW’09). pp. 85–90. ACM Press

  • Cloud Security Alliance (2010): Top threats to cloud computing, version 1.0. http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

  • Glott, Rüdiger, E. Husmann, A. Sadeghi, and Matthias Schunter (2011): Trustworthy Clouds underpinning the Future Internet, to appear in Future Internet Assembly — Book 3, Springer LNCS 6656

  • Grobauer, B., Schreck, T. (2010): Towards incident handling in the cloud: challenges and approaches. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. pp. 77–86. CCSW’ 10, ACM, New York, NY, USA

    Chapter  Google Scholar 

  • Kaliski, Jr., B.S., Pauley, W. (2010): Toward risk assessment as a service in cloud environments. In: Proceed-ings of the 2nd USENIX conference on Hot topics in cloud computing. pp. 13–13. HotCloud’10, USENIX Association, Berkeley, CA, USA

    Google Scholar 

  • Organization for Economic Co-Operation and Development (2009): Guidelines on the protection of privacy and transborder flows of personal data. From http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html (last modified January 5 1999), the OECD Privacy Principles

  • Penn, J.: (2010): Security and the cloud: Looking at the opportunity beyond the obstacle. Forrester Research

  • Rajan, S.S. (2010): Cloudsourcing vs outsourcing. Available online at http://cloudcomputing.syscon.com/node/1611752

  • Ristenpart, T., Tromer, E., Shacham, H., Savage, S. (2009): Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security. pp. 199–212. CCS’ 09, ACM, New York, NY, USA

    Google Scholar 

  • Sadeghi, A.R., Schneider, T., Winandy, M. (2010): Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Proceedings of the 3rd international conference on Trust and trustworthy computing. pp. 417–429. TRUST’10, Springer-Verlag, Berlin, Heidelberg

    Chapter  Google Scholar 

  • Santos, N., Gummadi, K., & Rodrigues, R. (2009). Towards trusted cloud computing. Proceedings of the 2009 conference on Hot topics in cloud computing. Berkeley: USENIX Association.

    Google Scholar 

  • Santos, N., Gummadi, K.P., Rodrigues, R. (2009): Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. pp. 3–3. HotCloud’09, USENIX Association, Berkeley, CA, USA

    Google Scholar 

  • Vukolić, M. (2010): The byzantine empire in the intercloud. SIGACT News 41, 105–111

    Article  Google Scholar 

  • Weichert, T. (2009): Cloud Computing und Datenschutz. Available online at http://www.datenschutzzentrum.de/cloud-computing/

Download references

Authors

Additional information

Ninja Marnau ist Juristin im Unabhängigen Landeszentrum für Datenschutz Schleswig-Holstein (ULD) und Mitarbeiterin des EUProjekts TClouds.

Dr. Norbert Schirmer ist Senior System Architect bei der Sirrix AG security solutions in Bochum und Mitarbeiter des EU-Projekts TClouds.

Eva Schlehahn ist Juristin des Unabhängigen Landeszentrums für Datenschutz Schleswig-Holstein (ULD) und rechtsberatend für das EU-Projekt TClouds tätig.

Dr. Matthias Schunter ist Leiter für „Cloud Computing und Sicherheit“ bei IBM Research — Zurich und Technischer Leiter des EUProjekts TClouds.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Marnau, N., Schirmer, N., Schlehahn, E. et al. TClouds. DuD 35, 333–337 (2011). https://doi.org/10.1007/s11623-011-0081-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-011-0081-3

Navigation