Trusted Clouds
نویسنده
چکیده
A new paradigm for network applications emerged in the 1990s as the centralized mainframe computer model evolved into a PC client/server based model. This captured a broader scope including business, commerce and finance. Recent Cloud computing and Big Data deployments suggest that we have now come full circle with centrally managed trust infrastructures supporting an even broader application base for any-time, any-where, synchronized access to data and services. This extends the flexibility/manageability of the client/server paradigm and allows for ubiquitous lightweight service endpoints such as notebooks, tablets or smart phones that do not need to store sensitive data (other than cryptographic keys in “sealed storage”). Even though it may take some time before we understand the full extent of the Cloud paradigm, some features have already emerged and can be analyzed and studied. For example for backward compatibility, legacy practices will be maintained. In particular, cloud deployment models will comprise several technologies including public, private and hybrid. Also, past practices strongly support open virtualization, so clouds can be customized and tailored to specific security settings. Finally, the emerging paradigm will clearly be impacted by social media technologies and the Internet of Things, suggesting that social behavior, profiling and causal reasoning will play a major role. In this report we analyze the cloud paradigm from a security point of view. Our goal is to show that for critical applications, not only is the new paradigm more flexible, but it is also technically easier to secure. Finally, the Cloud has a dark side, at least from a security point of view. We shall discuss some of its more obnoxious features.
منابع مشابه
Trusted Bridge
Nowadays, there are many online file storage services providing convienent, accessible and giant clouds for people’s daily usage. However, the convenience always comes with trust issues. There are many hackers around the world, sometimes your precious even private information is under peeking. This kind of hackers can also be extended to business services, e.g. data mining, machine learning, an...
متن کاملKey Management as a Service
In this paper we consider the security issues related to the key management in cloud computing. We focus on the difficulty of managing cryptographic keys necessary to maintain for example the confidentiality of information stored in the clouds. In this framework, we present a threshold cryptosystem as well as three protocols, based on cooperation between cloud providers and a random number gene...
متن کاملTrusted Attributes Based Middleware for Cloud Trust Management and Cloud Service Matching
The lack of trust between the cloud users and providers has hampered the overall acceptance of clouds as outsourcing computing services. So the development of trust has awareness technology for cloud computing has become an important and urgent research direction. In this project, a middleware system has been proposed, that is built on trust key attributes of cloud services that will be used fo...
متن کاملRunning ZooKeeper Coordination Services in Untrusted Clouds
Cloud computing is a recent trend in computer science. However, privacy concerns and a lack of trust in cloud providers are an obstacle for many deployments. Maturing hardware support for implementing Trusted Execution Environments (TEEs) aims at mitigating these problems. Such technologies allow to run applications in a trusted environment, thereby protecting data from unauthorized access. To ...
متن کاملAn Approach to Identity Management in Clouds without Trusted Third Parties
The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme ...
متن کاملSecure data sharing in public cloud
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don’t fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multi-party computation guarantee privacy ...
متن کامل