Security issues and threats that may affect the hybrid cloud of FINESCE
نویسندگان
چکیده
FINESCE is the Smart Energy use case project of the Future Internet Public Private Partnership Programme. It aims at defining an open infrastructure based on Information and Communications Technology (ICT) used to develop new solutions and applications in all fields of Future Internet related to the energy sector. To accomplish this goal a cloud-based environment is proposed, providing high scalability, fast provisioning, resilience and cost efficiency, while facilitating the deployment of applications and services for utilities. The proposed solution for Smart Energy system encompasses Cloud Computing technologies taking advantage of the service delivery models that it provides (Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS)) over different cloud deployment solutions (Private, Public, Hybrid, Community). Therefore, it is necessary to study their implications, particularly with regard to security and data privacy, whether in transit or stored data, of the cloud solution chosen. The present paper aims to gather basic security requirements in deploying a solution based on Cloud Computing highlighting issues in hybrid clouds because this is the deployment model used in Smart Energy use case. It also exposes attacks and vulnerabilities related to Cloud Computing to be considered for implementing a secure environment for FIDEV, the private platform implementation. Moreover, the security requirements for Smart Energy use case are defined. And, finally, the results of a security audit performed over the testbed platform that simulates a distributed storage solution for FINESCE project are presented.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملSecurity Issues: Public vs Private vs Hybrid Cloud Computing
Cloud computing appears as a new paradigm and its main objective is to provide secure, quick, convenient data storage and net computing service. Even though cloud computing effectively reduces the cost and maintenance of IT industry security issues plays a very important role. More and more IT companies are shifting to cloud based service like Private, Public and Hybrid cloud computing. But at ...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Network Protocols & Algorithms
دوره 8 شماره
صفحات -
تاریخ انتشار 2016