Improving Xen security through disaggregation
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Sharing but Protecting Content Against Internal Leakage for Organisations
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
On Technical Security Issues in Cloud Computing
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
TrustVisor: Efficient TCB Reduction and Attestation
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Trusted virtual domains: toward secure distributed services
HotDep'05 Proceedings of the First conference on Hot topics in system dependability
A framework for establishing trust in the Cloud
Computers and Electrical Engineering
Hi-index | 0.00 |
Cloud computing is a new concept using old technologies that has emerged from industry to academia. This result in some confusion about Cloud potential capabilities by overestimating some features and underestimating the challenges, which we attempt to clarify in this paper. We present an overview of Cloud critical infrastructure focusing on what is known as IaaS (Infrastructure as a Service) Cloud type. We then discuss security challenges and requirements, which would hopefully contribute in moving current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical infrastructure. We are mainly focusing on: (a.) Cloud resource management for virtual infrastructure, (b.) security threats from Cloud insiders, (c.) Cloud user-centric security model, and (d.) Cloud infrastructure self-managed services. We have just start working on these areas as part of EU funded TCloud project.