AGENT-BASED CLOUD RESOURCE MANAGEMENT FOR SECURE CLOUD INFRASTRUCTURES

被引:0
作者
Balogh, Zoltan [1 ]
Gatial, Emil [1 ]
Hluchy, Ladislav [1 ]
机构
[1] Slovak Acad Sci, Inst Informat, Bratislava 84507, Slovakia
关键词
Cloud computing; data privacy; cloud confidentiality; computer security; cryptography; privacy; trusted computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The cloud offers clear benefits for computations as well as for storage for diverse application areas. Security concerns are by far the greatest barriers to the wider uptake of cloud computing, particularly for privacy-sensitive applications. The aim of this article is to propose an approach for establishing trust between users and providers of cloud infrastructures (IaaS model) based on certified trusted agents. Such approach would remove barriers that prevent security sensitive applications being moved to the cloud. The core technology encompasses a secure agent platform for providing the execution environment for agents and the secure attested software base which ensures the integrity of the host platform. In this article we describe the motivation, concept, design and initial implementation of these technologies.
引用
收藏
页码:1333 / 1355
页数:23
相关论文
共 42 条
  • [1] [Anonymous], 2009, SEC GUID CRIT AR FOC
  • [2] [Anonymous], P 12 ASPLOS SAN JOS
  • [3] [Anonymous], VIRTUALIZATION LINUX
  • [4] [Anonymous], 2011, TCG TPM SPEC VERS 1
  • [5] Azab A. M., P 18 ACM C COMP COMM, P375
  • [6] Balogh Z., 2010, P 6 INT WORKSH GRID, P124
  • [7] Berger Stefan, 2008, Operating Systems Review, V42, P40, DOI 10.1145/1341312.1341321
  • [8] Bieszczad Andrzej, 1998, IEEE Communications Surveys & Tutorials, V1, P2, DOI 10.1109/COMST.1998.5340400
  • [9] Brown A, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P15
  • [10] Cabuk S, 2010, LECT NOTES COMPUT SC, V6163, P180