Federated Cloud Security Architecture for Secure and Agile Clouds
نویسندگان
چکیده
Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set of seamlessly integrated systematic security mechanisms at the application layer, the network layer and the system layer in federated cloud computing environments. Features of the architecture include: (1) it is centered on proactive cyber defense; (2) it facilitates to detect early warning cyber attacks against at one layer and deploy early warning signs of attacks to other layers for countermeasures; (3) it uses command and control (C2) to coordinate both in-cloud and cross-cloud defense activities via federated cloud security centers.
منابع مشابه
Formal verification of secure information flow in cloud computing
Federated cloud systems increase the reliability and reduce the cost of computational support to an organisation. However, the resulting combination of secure private clouds and less secure public clouds impacts on the overall security of the system as applications need to be located within different clouds. In this paper, the entities of a federated cloud system as well as the clouds are assig...
متن کاملSecurity Architecture for Federated Mobile Cloud Computing
Mobile cloud computing systems are getting increasingly popular because they can facilitate many new applications, such as opportunistic social computing by smartphone users who happen to be at a scene of importance (e.g., disaster rescue), while possibly uploading compute-heavy tasks to the resource-rich clouds. Federated mobile cloud computing further allows to coordinate and optimize the ser...
متن کاملCOMPUTING SCIENCE A Flow Sensitive Security Model for Cloud Computing Systems
Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. The resulting combination of secure private clouds and less secure public clouds impacts on the security requirements of the system. To meet these security requirements, applications need to be located within different clouds, which strongly affects the information flow security of ...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013