The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The spring up of cloud storage, such as Hadoop HDFS, Open Stack Swift, brings us more intelligent storage solutions. Nowadays, the most commercial version of cloud storage system puts more emphasis on high-performance and high-availability, very little attention is given to privacy protection. This paper proposes a user influence-based data distribution optimization method, User Rank, which migrate...
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and...
With the development of cloud computing, there is a growing number of virtual machines (VMs) in the IaaS cloud. The VM owners can install different kinds of software on demand. However, if the software is not updated in time, it would be a great threat to the security of the cloud. But for the VM owners, it is a tedious task to keep all of the installed software up to date. In this paper we present...
Managing and optimising cloud services is one of the main challenges faced by industry and academia. A possible solution is resorting to self-management, as fostered by autonomic computing. However, the abstraction layer provided by cloud computing obfuscates several details of the provided services, which, in turn, hinders the effectiveness of autonomic managers. Data-driven approaches, particularly...
Traditional intrusion detection systems are not adaptive enough to cope with the dynamic characteristics of cloud-hosted virtual infrastructures. This makes them unable to address new cloud-oriented security issues. In this paper we introduce SAIDS, a self-adaptable intrusion detection system tailored for cloud environments. SAIDS is designed to re-configure its components based on environmental changes...
As military, academic, and commercial computing systems evolve from autonomous entities that deliver computing products into network centric enterprise systems that deliver computing as a service, opportunities emerge to consolidate computing resources, software, and information through cloud computing. Along with these opportunities come challenges, particularly to service providers and operations...
Cloud service certifications attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt the reliability of such certifications. We argue that continuous auditing of selected certification criteria is required to assure continuously reliable and secure cloud services and thereby...
Maintaining security and privacy in the Cloud is a complex task. The task is made even more challenging as the number of vulnerabilities associated with the cloud infrastructure and applications are increasing very rapidly. Understanding the security service level agreements (SSLAs) and privacy policies offered by service and infrastructure providers is critical for consumers to assess the risks of...
The world is witnessing a spectacular shift in the delivery of health and wellness care. The key ingredient of this transformation consists in the use of revolutionary digital technologies to empower people in their self-management as well as to enhance traditional care procedures. While substantial domain-specific contributions have been provided to that end in the recent years, there is a clear...
Cloud computing has good prospects in many application fields, because it dramatically reduces the construction cost, brings data integration capability, and has efficient and flexible working models. One core layer of cloud platform is the IaaS layer. In this paper, an instance of IaaS platform is proposed, called G-Cloud, which is a cloud operating system and supports the virtualization and unified...
Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud...
Private cloud storage solutions, such as Oxygen Cloud and COSA (Cloud Object Storage Appliance), which provide file synchronization and sharing with high performance and integral security for enterprises. Those solutions have welldefined functions for integrating with enterprise environment. However, not all enterprises have enough resource to deploy, maintain and manage their own services. On the...
All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the...
In order to be an accountable organisation, Cloud Providers need to commit to being responsible stewards of other people's information. This implies demonstrating both willingness and capacity for such stewardship. This paper outlines the fundamental requirements that must be met by accountable organisations, and sketches what kind of tools, mechanisms and guidelines support this in practice.
Cloud computing has emerged as a technology in demand both from the industry as well as from the academia's perspectives. Wide spread use of cloud computing has not reached its potential owing to various challenges - security being the foremost one. Customers still hesitate to trust the cloud environment as they feel that security mechanisms are inadequate. Building trust on the Cloud Service Providers...
Cloud computing is not just a promising approach to the service provisioning: nowadays it represents the reference model in such field. Several cloud service providers have emerged as de facto standards and an increasing number of companies are choosing to migrate their business in the Cloud "ecosystem". Nevertheless, each provider adopts a particular interface to manage its services and...
Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel virtualization security solution which aims to provide comprehensive protection of the virtualization environment.
In this paper, we consider the problem of trust in cloud monitoring systems. We design and develop a novel scheme for trust certification using property based attestation (PBA). The PBA is based on a trusted platform module (TPM) installed on the monitoring system called Cloud Pass. This certification scheme can be applied to any other monitoring system. In our proposal, two security properties are...
This position paper brings to discussion a next step in the evolution of Cloud Computing as the organisation of multiple clouds. We summarise concepts related to the set of clouds called Inter-Cloud and its main elements (hybrid clouds, multi-clouds, etc.). We explore in more detail the Cloud Federation, which has stood as a well-behaved and voluntary organisation of clouds, focusing on its key features,...
We propose a Cloud Advisor framework that couples two salient features: trustworthiness and transparency measurement. It provides a mechanism to measure trustworthiness based on the history of the cloud provider taking into account evidence support and to measure transparency based on the Cloud Controls Matrix (CCM) framework. The selection process is based on a set of assurance requirements that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.