dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
TVDc: managing security in the trusted virtual datacenter
ACM SIGOPS Operating Systems Review
The role of virtualization in embedded systems
Proceedings of the 1st workshop on Isolation and integration in embedded systems
Virtual Infrastructure Management in Private and Hybrid Clouds
IEEE Internet Computing
IEEE Internet Computing
Network virtualization: state of the art and research challenges
IEEE Communications Magazine
Rootkits on smart phones: attacks, implications and opportunities
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration
SNPD '10 Proceedings of the 2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
The OKL4 microvisor: convergence point of microkernels and hypervisors
Proceedings of the first ACM asia-pacific workshop on Workshop on systems
The VMware mobile virtualization platform: is that a hypervisor in your pocket?
ACM SIGOPS Operating Systems Review
A survey of mobile malware in the wild
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing
UCC '11 Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing
Automated Configuration of Legacy Applications in the Cloud
UCC '11 Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing
Trusted virtual domains – design, implementation and lessons learned
INTRUST'09 Proceedings of the First international conference on Trusted Systems
VESPA: multi-layered self-protection for cloud resources
Proceedings of the 9th international conference on Autonomic computing
Cross-VM side channels and their use to extract private keys
Proceedings of the 2012 ACM conference on Computer and communications security
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
IEEE Internet Computing
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
IEEE Transactions on Dependable and Secure Computing
Hi-index | 0.00 |
End-to-end security is one of the biggest challenges for mobile clouds today: mobile cloud computing may mean the worst of cloud and device worlds regarding threats. Unfortunately, previous solutions considered the problem from one end only, lacking device-to-cloud virtual organizations (VOrgs), end-to-end VOrg isolation, and automated security supervision. This paper presents Orange MC2, a new security architecture and implementation overcoming such limitations. For homogeneous security SLA guarantees, execution environments in device and cloud domains are dynamically set up into VOrgs called MC2s, forming end-to-end security planes over the infrastructure. Strict plane separation is agnostic to underlying isolation mechanisms using a policy framework for security policy distribution and enforcement throughout an MC2. Security may be autonomically regulated at several levels of granularity in MC2s, both across domains and infrastructure layers. The paper also reports on a case study implementation. Results show that the architecture may be deployed effectively in practice, offering a first simple solution for selective end-to-end mobile cloud security, with interesting perspectives for a network operator.