Toward a solution for the cloud account delegation problem

نویسندگان

  • Bradley Simmons
  • Mark Shtern
  • Marin Litoiu
  • Michael Smit
چکیده

Cloud account delegation refers to the situation in which a cloud account owner (delegator) allows one or more second parties (i.e., delegates) to acquire and use cloud infrastructure resources from the owner’s account at the expense of the owner. This situation can exist in research groups, cloud testbeds, university courses, software development teams, and in general in cases where pooled resources are managed as software-defined infrastructure. The delegator assumes the risk of inefficient, wasted, or abused resources, and must rely on delegates, who are often not experienced cloud users, using the virtual infrastructure effectively and responsibly. This paper introduces the cloud account delegation problem, including three primary categories of risk, introduces a solution outline, and identifies research challenges.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy ReEncryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to...

متن کامل

Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing

Sequence comparison has been widely used in many engineering systems, such as fuzzy keyword search, plagiarism detection, and comparison of gene sequences. However, when the length of the string is extraordinarily long, like the DNA sequence that contains millions of nucleotides, sequence comparison becomes an intractable work, especially when the DNA database is big and the computation resourc...

متن کامل

امکان‌سنجی به کارگیری فناوری رایانش ‌ابری از دیدگاه کتابداران کتابخانه‌های دانشگاه‌های علوم پزشکی شهر تهران

Background and Aim: By conducting cloud computing and using cloud library, better library's services were prepared for universities’ libraries. The present research aims to determine the possibility of conducting cloud computing in Medical Sciences Universities’ libraries in Tehran from the librarian's perspective. Materials and Methods: This was a descriptive, cross sectional study. A questio...

متن کامل

A cloud-based simulated annealing algorithm for order acceptance problem with weighted tardiness penalties in permutation flow shop scheduling

Make-to-order is a production strategy in which manufacturing starts only after a customer's order is received; in other words, it is a pull-type supply chain operation since manufacturing is carried out as soon as the demand is confirmed. This paper studies the order acceptance problem with weighted tardiness penalties in permutation flow shop scheduling with MTO production strategy, the objec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014