Preventing information leakage between collaborating organisations
Proceedings of the 10th international conference on Electronic commerce
Sharing but Protecting Content Against Internal Leakage for Organisations
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Digital rights management architectures
Computers and Electrical Engineering
Controlling data in the cloud: outsourcing computation without outsourcing control
Proceedings of the 2009 ACM workshop on Cloud computing security
Trusted computing: special aspects and challenges
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
TrustVisor: Efficient TCB Reduction and Attestation
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Seeding clouds with trust anchors
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Establishing Trust in Cloud Computing
IT Professional
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments
COMPSACW '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops
Storm Clouds Rising: Security Challenges for IaaS Cloud Computing
HICSS '11 Proceedings of the 2011 44th Hawaii International Conference on System Sciences
Trustworthy clouds underpinning the future internet
The future internet
Review: Large scale distributed visualization on computational Grids: A review
Computers and Electrical Engineering
Toward trustworthy clouds' internet scale critical infrastructure
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems
Proceedings of the sixth ACM workshop on Scalable trusted computing
TrustCloud: A Framework for Accountability and Trust in Cloud Computing
SERVICES '11 Proceedings of the 2011 IEEE World Congress on Services
Secure Virtual Layer Management in Clouds
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
A fault-tolerant scheduling system for computational grids
Computers and Electrical Engineering
Operational trust in Clouds' environment
ISCC '11 Proceedings of the 2011 IEEE Symposium on Computers and Communications
Intention-oriented programming support for runtime adaptive autonomic cloud-based applications
Computers and Electrical Engineering
Data dynamics for remote data possession checking in cloud storage
Computers and Electrical Engineering
Hi-index | 0.00 |
Cloud infrastructure is expected to be able to support Internet scale critical applications (e.g. hospital systems and smart grid systems). Critical infrastructure services and organizations alike will not outsource their critical applications to a public Cloud without strong assurances that their requirements will be enforced. Central to this concern is that the user should be provided with evidence of the trustworthiness of the elements of the Cloud without getting involved into infrastructure details. In addition, users should be able to control their outsourced data at public Clouds. Establishing Cloud's trust model is important but the Cloud's infrastructure complexity and dynamism makes it difficult to address. This paper focuses on an important angle in this direction. We start by identifying the related challenges for establishing trust in the Cloud, and then propose a foundation framework which can help in addressing the identified challenges. Our focus is on IaaS Cloud type and on organizations as Cloud users.