Security and trust in cloud application life-cycle management

被引:2
作者
Albanese, Massimiliano [1 ]
De Benedictis, Alessandra [2 ]
de Macedo, Douglas D. J. [3 ]
Messina, Fabrizio [4 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[2] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
[3] Univ Fed Santa Catarina, Dept Informat Sci, Florianopolis, SC, Brazil
[4] Univ Catania, Dept Math & Informat, Catania, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 111卷
关键词
Cloud application life-cycle; Cloud security; Cloud Trust; Cloud Service Level Agreements;
D O I
10.1016/j.future.2020.01.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud technologies are currently experiencing a remarkable degree of pervasiveness in most of the applications and services that are consumed daily by both individual users and companies. The sheer volume of sensitive data and operations that are regularly outsourced to the cloud calls for the adoption of adequate measures to fulfill the existing security requirements and to increase the trust into cloud providers. The papers included in this special issue address a variety of concerns related to the development of secure, reliable, and trusted cloud applications, including: enforcement of specific security mechanisms (e.g., to protect shared data), integrity verification of virtualized environments, and selection of the most appropriate cloud services/resources for application deployment. (C) 2020 Published by Elsevier B.V.
引用
收藏
页码:934 / 936
页数:3
相关论文
共 15 条
[1]   Secure virtual machine placement in cloud data centers [J].
Agarwal, Amit ;
Ta Nguyen Binh Duong .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :210-222
[2]  
Alaranta A., 2016, uS Patent, Patent No. [9, 253, 185, 9253185]
[3]   Security-by-design in multi-cloud applications: An optimization approach [J].
Casola, Valentina ;
De Benedictis, Alessandra ;
Rak, Massimiliano ;
Villano, Umberto .
INFORMATION SCIENCES, 2018, 454 :344-362
[4]  
Cavoukian A., 2013, Privacy and security by design: An enterprise architecture approach
[5]  
Clark D.D., 2010, Fed. Comm. LJ, V63, P357
[6]   Wale: A solution to share libraries in Docker containers [J].
D'Urso, Fabio ;
Santoro, Corrado ;
Santoro, Federico Fausto .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :513-522
[7]   Integrity verification of Docker containers for a lightweight cloud environment [J].
De Benedictis, Marco ;
Lioy, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :236-246
[8]   Using trust and local reputation for group formation in the Cloud of Things [J].
Fortino, G. ;
Messina, F. ;
Rosaci, D. ;
Sarne, G. M. L. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :804-815
[9]   Forming Groups in the Cloud of Things Using Trust Measures [J].
Fortino, Giancarlo ;
Fotia, Lidia ;
Messina, Fabrizio ;
Rosaci, Domenico ;
Sarne, Giuseppe M. L. .
INTELLIGENT DISTRIBUTED COMPUTING XII, 2018, 798 :298-308
[10]   Establishing Trust in Cloud Computing [J].
Khan, Khaled M. ;
Malluhi, Qutaibah .
IT PROFESSIONAL, 2010, 12 (05) :20-26