Cloud Computing Security: From Single to Multi-clouds

作者: Mohammed A AlZain , Eric Pardede , Ben Soh , James A Thom , None

DOI: 10.1109/HICSS.2012.153

关键词: Work (electrical)Cloud computingCloud computing securityService (systems architecture)Cloud storageInformation sensitivityInternet privacyComputer securityComputer scienceData integrityServer

摘要: The use of cloud computing has increased rapidly in many organizations. Cloud provides benefits terms low cost and accessibility data. Ensuring the security is a major factor environment, as users often store sensitive information with storage providers but these may be untrusted. Dealing "single cloud" predicted to become less popular customers due risks service availability failure possibility malicious insiders single cloud. A movement towards "multi-clouds", or other words, "interclouds" "cloud-of-clouds" emerged recently. This paper surveys recent research related multi-cloud addresses possible solutions. It found that into maintain received attention from community than clouds. work aims promote multi-clouds its ability reduce affect user.

参考文章(48)
Edward W. Felten, Michael J. Freedman, Ariel J. Feldman, William P. Zeller, SPORC: group collaboration using untrusted cloud resources operating systems design and implementation. pp. 337- 350 ,(2010) , 10.5555/1924943.1924967
Dan Boneh, Hovav Shacham, Nagendra Modadugu, Eu-Jin Goh, SiRiUS: Securing Remote Untrusted Storage. network and distributed system security symposium. ,(2003)
John F. Farrell, S. Jeff Turner, Peter A. Loscocco, Ruth C. Taylor, Stephen D. Smalley, Patrick A. Muckelbauer, The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments ,(2000)
Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin, Minimal Byzantine Storage Lecture Notes in Computer Science. pp. 311- 325 ,(2002) , 10.1007/3-540-36108-1_21
S.L. Garfinkel, Email-based identification and authentication: an alternative to PKI? ieee symposium on security and privacy. ,vol. 1, pp. 20- 26 ,(2003) , 10.1109/MSECP.2003.1253564
Seny Kamara, Kristin Lauter, Cryptographic Cloud Storage Financial Cryptography and Data Security. ,vol. 6054, pp. 136- 149 ,(2010) , 10.1007/978-3-642-14992-4_13
R. Canetti, H. Krawczyk, M. Bellare, HMAC: Keyed-Hashing for Message Authentication RFC. ,vol. 2104, pp. 1- 11 ,(1997)
Ari Juels, Marten Van Dijk, On the impossibility of cryptography alone for privacy-preserving cloud computing usenix conference on hot topics in security. pp. 1- 8 ,(2010)
Ronald Perez, Reiner Sailer, Leendert van Doorn, None, vTPM: virtualizing the trusted platform module usenix security symposium. pp. 21- ,(2006)
Krishna P. Gummadi, Nuno Santos, Rodrigo Rodrigues, Towards trusted cloud computing ieee international conference on cloud computing technology and science. pp. 1- 5 ,(2009)