High Level Security Trust Zones for Private Clouds

نویسنده

  • R. VINOTH
چکیده

The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is significant. So a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP) is used. Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud architectures equipped with alternative cloud security controls and to show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Trust-Manager Service for Hybrid Clouds

Cloud computing changed recently business view regarding their Information System through an on-demand provisioning of computing resources. Recent discussions about data security requirements in cloud computing environment tend to conflict with other requirement including usability and economic. In hybrid clouds that combine private and public clouds usage, private clouds are able both to exter...

متن کامل

Secure Watermarking Technique for Emerging Clouds

Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized datacenter resources, uphold user privacy, and preserve data integrity. It is suggested using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data colori...

متن کامل

Trust Model to Enhance Security and Interoperability of Cloud Environment

Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers’ services a...

متن کامل

A Conceptual Architecture for Securing public Cloud: Moving from Trust toward Security

Cloud computing is next generation era of IT enterprise, which provide services like resource pooling, on demand and metered service. It provides the burden free environment for the consumer, to get rid of resource management. It also shifts all digital assets (data and application) to the centralized large datacentre. These datacentre can be onpremise or off-premise cloud service provider, dep...

متن کامل

Secure data sharing in public cloud

Secure multi-party protocols have been proposed for entities (organizations or individuals) that don’t fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multi-party computation guarantee privacy ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016