Towards Establishing Security-Aware Cloud Markets

被引:1
|
作者
Wenge, Olga [1 ]
Schuller, Dieter [1 ]
Steinmetz, Ralf [1 ]
机构
[1] Tech Univ Darmstadt, Multimedia Commun Lab KOM, Darmstadt, Germany
关键词
cloud computing security; cloud collaborations; cloud brokerage; information security governance; risk assessment; cloud certification; security labeling;
D O I
10.1109/CloudCom.2014.159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's cloud environments are very heterogeneous. This cloud heterogeneity, as the consequence of lacking cloud standards, builds technical and security barriers between cloud providers and blocks them from intended cloud collaborations within cloud marketplaces. A cloud broker, who acts on behalf of cloud providers, matches compatible collaborative partners according to their requirements and attempts to support the optimal exchange of cloud resources between them. The fulfillment of security requirements in cloud collaborations usually involves providing risk assessments, which are still very time-consuming and not applicable for ad hoc cloud collaborations within cloud marketplaces. Aiming to design and develop a security model for trading with cloud services, we identify in this paper concepts, mechanism and available tools that can support establishing of security-aware cloud markets. Furthermore, we introduce our information security governance driven cloud brokerage model with security labeling of tradable cloud products that can be the next step in the standardization process of tradable cloud products and optimize the selection of collaborative cloud partners.
引用
收藏
页码:1027 / 1032
页数:6
相关论文
共 50 条
  • [1] Towards Security-Aware Virtual Server Migration Optimization to the Cloud
    Zhang, Bowu
    Hwang, Jinho
    Ma, Liran
    Wood, Timothy
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 2015, : 71 - 80
  • [2] An Advanced Security-Aware Cloud Architecture
    Bobelin, Laurent
    Bousquet, Aline
    Briffaut, Jeremy
    Couturier, Jean-Francois
    Toinard, Christian
    Caron, Eddy
    Lefray, Arnaud
    Rouzaud-Cornabas, Jonathan
    [J]. 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 572 - 579
  • [3] Towards Security-aware Mutation Testing
    Loise, Thomas
    Devroey, Xavier
    Perrouin, Gilles
    Papadakis, Mike
    Heymans, Patrick
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 97 - 102
  • [4] Towards security-aware virtual network embedding
    Liu, Shuhao
    Cai, Zhiping
    Xu, Hong
    Xu, Ming
    [J]. COMPUTER NETWORKS, 2015, 91 : 151 - 163
  • [5] Privacy and security-aware workflow scheduling in a hybrid cloud
    Lei, Jian
    Wu, Quanwang
    Xu, Jin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 269 - 278
  • [6] Security-aware job allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    [J]. 21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 713 - 719
  • [7] Towards Security-Aware Virtual Environments for Digital Twins
    Eckhart, Matthias
    Ekelhart, Andreas
    [J]. CPSS'18: PROCEEDINGS OF THE 4TH ACM WORKSHOP ON CYBER-PHYSICAL SYSTEM SECURITY, 2018, : 61 - 72
  • [8] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    Krishnan, C. Gopala
    Julie, E. Golden
    Robinson, Y. Harold
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 9 - 26
  • [9] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    C. Gopala Krishnan
    E. Golden Julie
    Y. Harold Robinson
    [J]. Wireless Personal Communications, 2021, 120 : 9 - 26
  • [10] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,