Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series)
Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series)
vTPM: virtualizing the trusted platform module
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
TVDc: managing security in the trusted virtual datacenter
ACM SIGOPS Operating Systems Review
APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Secure Document Service for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems
Proceedings of the sixth ACM workshop on Scalable trusted computing
Trusted VM snapshots in untrusted cloud infrastructures
RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
Designing a Secure Cloud Architecture: The SeCA Model
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Cloud computing places an organization's sensitive data in the control of a third party, introducing a significant level of risk on the privacy and security of the data. We propose a new management and security model for cloud computing called the Private Virtual Infrastructure (PVI) that shares the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. The PVI datacenter is under control of the information owner while the cloud fabric is under control of the service provider. A cloud Locator Bot pre-measures the cloud for security properties, securely provisions the datacenter in the cloud, and provides situational awareness through continuous monitoring of the cloud security. PVI and Locator Bot provide the tools that organizations require to maintain control of their information in the cloud and realize the benefits of cloud computing.