Deploying Trusted Cloud Computing for Data Intensive Power System Applications

被引:0
|
作者
Sule, Mary-Jane [1 ]
Li, Maozhen [1 ]
Taylor, Gareth A. [2 ]
Furber, Simon [3 ]
机构
[1] Brunel Univ London, Dept Elect & Comp Engn, London, England
[2] Brunel Univ London, Brunel Inst Power Syst, London, England
[3] Brunel Univ London, Comp Serv, London, England
关键词
Cloud computing; energy sector; integrity; power system applications; security; trusted computing; trusted platform module;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Cloud computing deployment is gaining popularity among sensitive mission-critical sectors like the energy sector. Cloud computing can provide cost effective scalable deployment of ICT services and infrastructure to the energy sector. However, the security, confidentiality and integrity of data are paramount and are of great concern to the energy sector. This paper presents the deployment of trusted Cloud computing for mission critical applications in the energy sector. The research presented in this paper simplifies the integration of trusted platform module based integrity measurement into commodity cloud infrastructure by eliminating the need for "custom" software and patches; it also enhances instance-level security by including a distributed file and directory integrity checker for added security. The deployment of trusted cloud computing using the Eucalyptus Cloud software on server-grade hardware is discussed, as well as the results of a comparative evaluation of the additional overhead in instance creation/start-up based on a simulation of low, medium and high security settings. The trusted cloud computing infrastructure is also currently available for deployment and testing by power system application developers and users.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Enabling Trusted Data-Intensive Execution in Cloud Computing
    Zhang, Ning
    Lou, Wenjing
    Jiang, Xuxian
    Hou, Y. Thomas
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 355 - 363
  • [2] Splitting and placement of data-intensive applications with machine learning for power system in cloud computing
    Xu, Zhanyang
    Zhu, Dawei
    Chen, Jinhui
    Yu, Baohua
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (04) : 476 - 484
  • [3] Splitting and placement of data-intensive applications with machine learning for power system in cloud computing
    Zhanyang Xu
    Dawei Zhu
    Jinhui Chen
    Baohua Yu
    Digital Communications and Networks, 2022, 8 (04) : 476 - 484
  • [4] Software RAID for Data Intensive Applications in Cloud Computing
    Song, Seokil
    Khil, Ki-jeong
    Kwak, Yun Sik
    Ko, Daesik
    Cheong, Seung-Kook
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (03): : 529 - 534
  • [5] Improvement Of Data Throughput In Data-Intensive Cloud Computing Applications
    Ibrahim, Ibrahim Adel
    Bassiouni, Mostafa
    2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 49 - 54
  • [6] Data Provenance Trusted Model in Cloud Computing
    Saad, Mohd Izuan Mohd
    Jalil, Kamarularifin Abd
    Manaf, Mazani
    2013 INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS), 2013, : 257 - 262
  • [7] Trusted secure model for data services in cloud computing
    Xu, Zheng-Quan, 1600, Editorial Board of Journal on Communications (35):
  • [8] Trusted Cloud Computing with Secure Resources and Data Coloring
    Hwang, Kai
    Li, Deyi
    IEEE INTERNET COMPUTING, 2010, 14 (05) : 14 - 22
  • [9] Scheduling Method of Data-Intensive Applications in Cloud Computing Environments
    Fu, Xiong
    Cang, Yeliang
    Zhu, Xinxin
    Deng, Song
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [10] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600