Cloud Federation? We are not ready yet

被引:1
作者
Abdo, Jacques Bou [1 ]
Demerjian, Jacques [2 ]
Chaouchi, Hakima [3 ]
Barbar, Kabalan [4 ]
Pujolle, Guy [5 ]
Atechian, Talar [2 ]
机构
[1] Notre Dame Univ, Fac Nat & Appl Sci, Deir El Qamar, Lebanon
[2] Antonine Univ, Fac Engn, Baabda, Lebanon
[3] Telecom Sud Paris, Inst Telecom, CNRS, UMR 5751,SAMOVAR, Paris, France
[4] Lebanese Univ, Fac Sci, Fanar, Lebanon
[5] Univ Paris 04, UPMC, Paris, France
来源
2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS) | 2014年
关键词
cloud computing; cloud resource federation; Bell-LaPadula model;
D O I
10.1109/HPCC.2014.139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Lot of effort and money has been invested in developing applications and services for cloud networks. Cloud providers offer dynamicity, abstraction and centralized management to make their cloud services more attractive for prospective clients. With the formation of cloud computing market's ecosystem, cloud providers will find themselves in need to cooperate between each other to gain economy of scale using federation. Cloud resource federation introduces extra-dynamicity into services, but might lead rigidly developed applications to fail in satisfying its basic role. Losing all the investment made on an application is definitely not an option for most cloud providers. In this paper we are interested in proving that not all cloud applications are ready for federation and this will highlight the need to create a formal verification method to check the readiness of an application to be federated. In this context we study "Privacy-as-a-Service" as a sample of rigidly developed cloud services and prove that critical security vulnerability will be created if this service is federated. We then propose a federation ready message flow that covers the confidentiality vulnerabilities in PasS and this highlights possible criteria to be checked in future verification methods.
引用
收藏
页码:831 / 834
页数:4
相关论文
共 12 条
  • [1] [Anonymous], 8 IEEE INT C DEP AUT
  • [2] Best R., 1980, IEEE SPRING COMPCON
  • [3] Bittman T., EVOLUTION CLOUD COMP
  • [4] Bou Abdo J., 2014, 3 INT C E TECHN NETW
  • [5] Bou Abdo J., IEEE WIR COMM NETW C
  • [6] Bou Abdo J., 17 IEEE MED EL C MEL
  • [7] Bou Abdo J., 8 INT C INT TECHN SE
  • [8] Ramachandran K., 2011, 2 INT C TECHN LEG AS
  • [9] Tygar J., 1994, IP WORKSH
  • [10] W3C Recommendation, 2007, SOAP VERS 1 2 PART 0