Skip to main content

Key Enabling Technologies for Virtual Private Clouds

  • Chapter
  • First Online:

Abstract

The concept of a virtual private cloud (VPC) has emerged recently as a way of managing information technology resources so that they appear to be operated for a single organization from a logical point of view, but may be built from underlying physical resources that belong to the organization, an external service provider, or a combination of both. Several technologies are essential to the effective implementation of a VPC. Virtual data centers provide the insulation that sets one organization’s virtual resources apart from those of other organizations and from the underlying physical infrastructure. Virtual applications collect those resources into separately manageable units. Policy-based deployment and policy compliance offer a means of control and verification of the operation of the virtual applications across the virtual data centers. Finally, service management integration bridges across the underlying resources to give an overall, logical and actionable view. These key technologies enable cloud providers to offer organizations the cost and efficiency benefits of cloud computing as well as the operational autonomy and flexibility to which they have been accustomed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Bowers, K. D., Juels, A., & Oprea, A. (November 2009). HAIL: A high-availability and integrity layer for cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), ACM, Chicago, IL, USA, 187–198.

    Google Scholar 

  • Cohen, R. (May 2008). Virtual private cloud, Elastic vapor: Life in the cloud. Retrieved January 2010, from http://www.elasticvapor.com/2008/05/virtual-private-cloud-vpc.html.

  • Chen, H., Chen, J., Mao, W., & Yan, F. (June 2007). Daonity – Grid security from two levels of virtualization. Elsevier Journal of Information Security Technical Report, 12(3), 123–138.

    Article  Google Scholar 

  • Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., & Boneh, D. (December 2003). Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Operating Systems Review, 37(5), 193–206.

    Article  Google Scholar 

  • Juels, A., & Kaliski, B. S., Jr. (October 2007). PORs: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), ACM, Alexandria, VA, USA, 584–597.

    Google Scholar 

  • Matthews, J., Garfinkel, T., Hoff, C., & Wheeler, J. (June 2009). Virtual machine contracts for datacenter and cloud computing environments. Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds, ACM, Barcelona, 25–30.

    Google Scholar 

  • Mell, P., & Grance, T. (2009). The NIST definition of cloud computing, version 15, NIST. Retrieved January 2010, from http://csrc.nist.gov/groups/SNS/cloud-computing/.

  • Mitchell, C. (Ed.). (2005). Trusted computing. London: IET.

    Google Scholar 

  • OVF (January 2010). Open virtualization format specification, DMTF Document DSP0243, Version 1.0.0, Retrieved January 2010, from http://www.dmtf.org/.

  • Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (November 2009). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), ACM, Chicago, IL, 199–212.

    Google Scholar 

  • Sapuntzakis, C., & Lam, M. S. (May 2003), Virtual appliances in the collective: A road to hassle-free computing. Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems, USENIX, Lihue, Hawaii, 55–60.

    Google Scholar 

  • Wood, T., Shenoy, P., Gerber, A., Ramakrishnan, K. K., & Van der Merwe, J. (June 2009). The case for enterprise-ready virtual private clouds. Proceedings of HotCloud ’09 Workshop on Hot Topics in Cloud Computing, San Diego, CA, USA, Retrieved January 2010, from http://www.usenix.org/event/hotcloud09/tech/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeffrey M. Nick .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Nick, J.M., Cohen, D., Kaliski, B.S. (2010). Key Enabling Technologies for Virtual Private Clouds. In: Furht, B., Escalante, A. (eds) Handbook of Cloud Computing. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-6524-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-6524-0_3

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-6523-3

  • Online ISBN: 978-1-4419-6524-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics