메뉴 건너뛰기




Volumn , Issue , 2012, Pages 113-120

Thunder in the Clouds: Security challenges and solutions for federated Clouds

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING SECURITIES; CLOUD FEDERATIONS; CUSTOMER REQUIREMENTS; DIFFERENT SERVICES; FEDERATED CLOUDS; FURTHER WORKS; PAPER SURVEYS; SECURITY CHALLENGES; SECURITY RISKS; STATE OF THE ART;

EID: 84874283233     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2012.6427547     Document Type: Conference Paper
Times cited : (22)

References (56)
  • 2
    • 84874242180 scopus 로고    scopus 로고
    • And Beyond
    • K. Subramanian. Research Report: Cloud Trends In 2011 And Beyond. [Online]. Available: http://www.cloudave.com/9587/research-report-cloud-trends- in-2011-and-beyond/
    • (2011) Research Report: Cloud Trends
    • Subramanian, K.1
  • 4
    • 84874240071 scopus 로고    scopus 로고
    • K. Salmon, "Demystifying the Cloud." [Online]. Available: http://www.kurtsalmon.com/publications/demystifying-the-cloud/
    • Demystifying the Cloud
    • Salmon, K.1
  • 7
    • 84856104767 scopus 로고    scopus 로고
    • Service injection: A threat to self-managed complex systems
    • Los Alamitos, CA, USA: IEEE Computer Society
    • P. H. Meland, "Service injection: A threat to self-managed complex systems," in Dependable, Autonomic and Secure Computing, IEEE International Symposium on. Los Alamitos, CA, USA: IEEE Computer Society, 2011, pp. 1-6.
    • (2011) Dependable, Autonomic and Secure Computing IEEE International Symposium on , pp. 1-6
    • Meland, P.H.1
  • 9
    • 84872361020 scopus 로고    scopus 로고
    • Trend Micro Inc.
    • (2011) Cloud Security Survey Global Executive Summary. Trend Micro Inc. [Online]. Available: http://us.trendmicro.com/imperia/md/content/us/trendwatch/ cloud/global cloud survey exec summary final.pdf
    • (2011) Cloud Security Survey Global Executive Summary
  • 10
    • 77954327465 scopus 로고    scopus 로고
    • EECS Department University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5 Jan
    • Y. Chen, V. Paxson, and R. H. Katz, "What's New About Cloud Computing Security?" EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5, Jan 2010. [Online]. Available: http://www.eecs. berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
    • (2010) What's New about Cloud Computing Security?
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 14
    • 84874229322 scopus 로고    scopus 로고
    • Cloud computing: Emerging legal issues for access to data, anywhere, anytime
    • July
    • W. M. H. and D. J. Buller, "Cloud computing: Emerging legal issues for access to data, anywhere, anytime," Journal of Internet Law, July 2010.
    • (2010) Journal of Internet Law
    • M, H.W.1    Buller, D.J.2
  • 15
    • 68649100902 scopus 로고    scopus 로고
    • A break in the clouds: Towards a cloud definition
    • December
    • L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," SIGCOMM Comput. Commun. Rev., vol. 39, pp. 50-55, December 2008. [Online]. Available: http://doi.acm.org/10.1145/1496091.1496100
    • (2008) SIGCOMM Comput. Commun. Rev , vol.39 , pp. 50-55
    • Vaquero, L.M.1    Rodero-Merino, L.2    Caceres, J.3    Lindner, M.4
  • 20
    • 84875980858 scopus 로고    scopus 로고
    • Private virtual infrastructure for cloud computing
    • Berkeley, CA, USA: USENIX Association
    • F. J. Krautheim, "Private virtual infrastructure for cloud computing," in Proceedings of the 2009 conference on Hot topics in cloud computing, ser. HotCloud'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 5-5. [Online]. Available: http://portal.acm.org/citation.cfm?id=1855533. 1855538
    • (2009) Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, Ser. HotCloud , vol.9 , pp. 5-5
    • Krautheim, F.J.1
  • 25
    • 79955532534 scopus 로고    scopus 로고
    • Fully homomorphic encryption with relatively small key and ciphertext sizes
    • Springer
    • N. Smart and F. Vercauteren, "Fully homomorphic encryption with relatively small key and ciphertext sizes," in Proceedings of Public Key Cryptography-PKC 2010. Springer, 2010, pp. 420-443.
    • (2010) Proceedings of Public Key Cryptography-PKC 2010 , pp. 420-443
    • Smart, N.1    Vercauteren, F.2
  • 26
    • 84864578620 scopus 로고    scopus 로고
    • Enhancing privacy in cloud computing via policy-based obfuscation
    • 10.1007/s11227-010-0425-z
    • M. Mowbray, S. Pearson, and Y. Shen, "Enhancing privacy in cloud computing via policy-based obfuscation," The Journal of Supercomputing, pp. 1-25, 2010, 10.1007/s11227-010-0425-z. [Online]. Available: http://dx.doi.org/10.1007/s11227-010-0425-z
    • (2010) The Journal of Supercomputing , pp. 1-25
    • Mowbray, M.1    Pearson, S.2    Shen, Y.3
  • 28
    • 84926426283 scopus 로고    scopus 로고
    • The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
    • M. G. Jaatun, G. Zhao, A. Vasilakos, A. A. Nyre, S. Alapnes, and Y. Tang, "The design of a redundant array of independent net-storages for improved confidentiality in cloud computing," Journal of Cloud Computing: Advances, Systems and Applications, vol. 1, no. 1, p. 13, 2012. [Online]. Available: http://www.journalofcloudcomputing.com/content/1/1/13
    • (2012) Journal of Cloud Computing: Advances, Systems and Applications , vol.1 , Issue.1 , pp. 13
    • Jaatun, M.G.1    Zhao, G.2    Vasilakos, A.3    Nyre, A.A.4    Alapnes, S.5    Tang, Y.6
  • 30
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • 10.1007/BF00206326
    • D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol. 1, pp. 65-75, 1988, 10.1007/BF00206326. [Online]. Available: http://dx.doi.org/10.1007/ BF00206326
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 31
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-90, February 1981. [Online]. Available: http://doi.acm.org/10.1145/358549.358563
    • (1981) Commun ACM , vol.24 , pp. 84-90
    • Chaum, D.L.1
  • 33
    • 77954899284 scopus 로고    scopus 로고
    • Racs: A case for cloud storage diversity
    • ACM symposium on Cloud computing, ser. SoCC '10. New York, NY, USA: ACM
    • H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, "Racs: a case for cloud storage diversity," in Proceedings of the 1st ACM symposium on Cloud computing, ser. SoCC '10. New York, NY, USA: ACM, 2010, pp. 229-240. [Online]. Available: http://doi.acm.org/10.1145/1807128.1807165
    • (2010) Proceedings of the 1st , pp. 229-240
    • Abu-Libdeh, H.1    Princehouse, L.2    Weatherspoon, H.3
  • 34
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • New York, NY, USA ACM
    • R. R. Henning, "Security service level agreements: quantifiable security for the enterprise?" in Proceedings of the 1999 workshop on New security paradigms, ser. NSPW '99. New York, NY, USA: ACM, 2000, pp. 54-60.
    • (2000) Proceedings of the 1999 Workshop on New Security Paradigms, Ser. NSPW , vol.99 , pp. 54-60
    • Henning, R.R.1
  • 35
    • 84882690392 scopus 로고    scopus 로고
    • A SLA evaluation methodology in Service Oriented Architectures
    • D. Gollmann, F. Massacci, and A. Yautsiukhin, Eds Springer US
    • V. Casola, A. Mazzeo, N. Mazzocca, and M. Rak, "A SLA evaluation methodology in Service Oriented Architectures," in Quality of Protection, ser. Advances in Information Security, D. Gollmann, F. Massacci, and A. Yautsiukhin, Eds. Springer US, 2006, vol. 23, pp. 119-130.
    • (2006) Quality of Protection, Ser. Advances in Information Security , vol.23 , pp. 119-130
    • Casola, V.1    Mazzeo, A.2    Mazzocca, N.3    Rak, M.4
  • 40
    • 0035149461 scopus 로고    scopus 로고
    • SLA management in federated environments
    • January
    • P. Bhoj, S. Singhal, and S. Chutani, "SLA management in federated environments," Comput. Netw., vol. 35, pp. 5-24, January 2001. [Online]. Available: http://portal.acm.org/citation.cfm?id=370802. 370805
    • (2001) Comput. Netw , vol.35 , pp. 5-24
    • Bhoj, P.1    Singhal, S.2    Chutani, S.3
  • 50
    • 84874280149 scopus 로고    scopus 로고
    • "VISION Cloud," http://www.visioncloud.eu/.
    • VISION Cloud
  • 53
    • 78649302229 scopus 로고    scopus 로고
    • Cloud computing: State-ofthe-art and research challenges
    • Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-ofthe-art and research challenges," Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7-18, 2010. [Online]. Available: http://www.springerlink.com/index/10.1007/s13174-010-0007-6
    • (2010) Journal of Internet Services and Applications , vol.1 , Issue.1 , pp. 7-18
    • Zhang, Q.1    Cheng, L.2    Boutaba, R.3
  • 55
    • 80455123236 scopus 로고    scopus 로고
    • The truth about microsoft azure-and where your data will be kept
    • August
    • J. Honeyball, "The truth about microsoft azure-and where your data will be kept," PC Pro, August 2009.
    • (2009) PC Pro
    • Honeyball, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.