Security Issues in Cloud Federations
Author:
Rak Massimiliano1, Ficco Massimo1, Luna Jesus2, Ghani Hamza2, Suri Neeraj2, Panica Silviu3, Petcu Dana3
Affiliation:
1. Second University of Naples, Italy 2. TU Darmstadt, Germany 3. Institute e-Austria Timisoara, Romania
Abstract
The cloud paradigm, based on the idea of delegating to the network any kind of computational resources, is showing a considerable success. The estimated trend is that the number of different cloud-based solutions, approaches, and service providers (CSP) will continue growing. Despite the big number of different cloud solutions that currently exist, most of them are “walled gardens” unable to interoperate. On the other side, a large effort is taking place in the cloud community to develop and identify open solutions and standards. In such a context the concept of cloud federation, an architecture that combines the functionalities of different CSP, is a hot topic. This chapter presents an overview of the cloud federation topic, with special focus on its most important security challenges. Furthermore, it proposes a taxonomy of possible approaches to federation. Then it proposes a comparison of security problems in cloud and grid environment, and a detailed analysis of two relevant security problems, identity management and Cyber Attacks analysis, trying to outline how they can be applied in a federated context.
Reference71 articles.
1. Bernstein, D., & Vij, D. (2010), Intercloud Security Considerations, In 2010 IEEE Second International Conference on Cloud Computing Technology and Science, (pp. 537-544), Nov. 2010 2. Bertino E, Paci F, Ferrini R, and Shang N (2009), Privacy-preserving digital identity management for cloud computing, Data Engineering 32,(1) 3. Bessani, A., Correia, M., Quaresma, B., Andre, F., & Sousa, P. (2011). DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds, Proceedings of the sixth conference on Computer systems, EuroSys’11, (, pp. 31—46) Salzburg, Austria: ACM 4. Bugiel, S., Nürnberger, S., Sadeghi, A. R., & Schneider, T. (2011). TwinClouds - Secure Cloud Computing with Low Latency, In Communications and Multimedia Security (CMS'11) conference, LNCS. 5. Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., & Meyerovich, M. (2006), How to win the clonewars: efficient periodic n-times anonymous authentication, in Proceedings of the 13th ACM conference on Computer and communications security, 2006, (pp. 201–210.) New York, NY: ACM Press
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|