Toward a solution for the cloud account delegation problem
نویسندگان
چکیده
Cloud account delegation refers to the situation in which a cloud account owner (delegator) allows one or more second parties (i.e., delegates) to acquire and use cloud infrastructure resources from the owner’s account at the expense of the owner. This situation can exist in research groups, cloud testbeds, university courses, software development teams, and in general in cases where pooled resources are managed as software-defined infrastructure. The delegator assumes the risk of inefficient, wasted, or abused resources, and must rely on delegates, who are often not experienced cloud users, using the virtual infrastructure effectively and responsibly. This paper introduces the cloud account delegation problem, including three primary categories of risk, introduces a solution outline, and identifies research challenges.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملProxy Re-Encryption: Analysis of constructions and its application to secure access delegation
This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy ReEncryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to...
متن کاملRefereed Computation Delegation of Private Sequence Comparison in Cloud Computing
Sequence comparison has been widely used in many engineering systems, such as fuzzy keyword search, plagiarism detection, and comparison of gene sequences. However, when the length of the string is extraordinarily long, like the DNA sequence that contains millions of nucleotides, sequence comparison becomes an intractable work, especially when the DNA database is big and the computation resourc...
متن کاملامکانسنجی به کارگیری فناوری رایانش ابری از دیدگاه کتابداران کتابخانههای دانشگاههای علوم پزشکی شهر تهران
Background and Aim: By conducting cloud computing and using cloud library, better library's services were prepared for universities’ libraries. The present research aims to determine the possibility of conducting cloud computing in Medical Sciences Universities’ libraries in Tehran from the librarian's perspective. Materials and Methods: This was a descriptive, cross sectional study. A questio...
متن کاملA cloud-based simulated annealing algorithm for order acceptance problem with weighted tardiness penalties in permutation flow shop scheduling
Make-to-order is a production strategy in which manufacturing starts only after a customer's order is received; in other words, it is a pull-type supply chain operation since manufacturing is carried out as soon as the demand is confirmed. This paper studies the order acceptance problem with weighted tardiness penalties in permutation flow shop scheduling with MTO production strategy, the objec...
متن کامل