Skip to main content

Advertisement

SpringerLink
Book cover

The Future Internet Assembly

FIA 2011: The Future Internet pp 209–221Cite as

  1. Home
  2. The Future Internet
  3. Conference paper
Trustworthy Clouds Underpinning the Future Internet

Trustworthy Clouds Underpinning the Future Internet

  • Rüdiger Glott18,
  • Elmar Husmann19,
  • Ahmad-Reza Sadeghi20 &
  • …
  • Matthias Schunter19 
  • Conference paper
  • Open Access
  • 32k Accesses

  • 9 Citations

Part of the Lecture Notes in Computer Science book series (LNCCN,volume 6656)

Abstract

Cloud computing is a new service delivery paradigm that aims to provide standardized services with self-service, pay-per-use, and seemingly unlimited scalability. This paradigm can be implemented on multiple service levels (infrastructures, run-time platform, or actual Software as a Service). They are are expected to be an important component in the future Internet.

This article introduces upcoming security challenges for cloud services such as multi-tenancy, transparency and establishing trust into correct operation, and security interoperability. For each of these challenges, we introduce existing concepts to mitigate these risks and survey related research in these areas.

Keywords

  • Cloud Computing
  • Cloud Service
  • Intrusion Detection
  • Cloud Provider
  • Cloud Service Provider

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. Babcock, C.: Management Strategies for the Cloud Revolution. McGraw-Hill, New York (2010)

    Google Scholar 

  2. Basak, D., Toshniwal, R., Maskalik, S., Sequeira, A.: Virtualizing networking and security in the cloud. SIGOPS Oper. Syst. Rev. 44, 86–94 (2010), doi:10.1145/1899928.1899939

    CrossRef  Google Scholar 

  3. Brassil, J.: Physical layer network isolation in multi-tenant clouds. In: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, Washington, DC, USA. ICDCSW ’10, pp. 77–81. IEEE Computer Society Press, Los Alamitos (2010), doi:10.1109/ICDCSW.2010.39

    CrossRef  Google Scholar 

  4. Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.V., Ramunno, G., Sadeghi, A.-R., Schunter, M., Stüble, C.: Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18, 89–121 (2010)

    CrossRef  Google Scholar 

  5. Chien, E.: W32.Stuxnet dossier. retrieved 2010-13-03, (Sep 2010), From http://www.symantec.com/connect/blogs/w32stuxnet-dossier

  6. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud Computing Security (CCSW’09), pp. 85–90. ACM Press, New York (2009)

    Google Scholar 

  7. Cloud Security Alliance (CSA): Top threats to cloud computing, version 1.0. (March 2010), http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

  8. Computer and Communication Industry Association (CCIA): Cloud computing (2009), http://www.ccianet.org/CCIA/files/ccLibraryFiles/Filename/000000000151/Cloud_Computing.pdf

  9. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on Theory of computing, Bethesda, MD, USA. STOC ’09, pp. 169–178. ACM Press, New York (2009), doi:10.1145/1536414.1536440

    Google Scholar 

  10. Grobauer, B., Schreck, T.: Towards incident handling in the cloud: challenges and approaches. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, Chicago, Illinois, USA. CCSW ’10, pp. 77–86. ACM Press, New York (2010), doi:10.1145/1866835.1866850

    CrossRef  Google Scholar 

  11. Guerraoui, R., Yabandeh, M.: Independent faults in the cloud. In: Proceedings of the 4th International Workshop on Large Scale Distributed Systems and Middleware, Zürich, Switzerland. LADIS ’10, pp. 12–17. ACM Press, New York (2010), doi:10.1145/1859184.1859188

    CrossRef  Google Scholar 

  12. International Organization for Standardization (ISO): ISO27001: Information security management system (ISMS) standard (Oct 2005), http://www.27000.org/iso-27001.htm

  13. Kaliski, Jr., B.S., Pauley, W.: Toward risk assessment as a service in cloud environments. In: Proceedings of the 2nd USENIX conference on Hot topics in cloud computing. pp. 13–13. HotCloud’10, USENIX Association, Berkeley, CA, USA (2010), http://portal.acm.org/citation.cfm?id=1863103.1863116

  14. Marko, K.: Cloudsourcing - the cloud sparks a new generation of consultants & service brokers (2010), http://www.processor.com/editorial/article.asp?article=articles%2Fp3203%2F39p03%2F39p03.asp

  15. Oclassen, G.: Why not cloudsourcing for enterprise app user adoption/training? (2009), http://velocitymg.com/explorations/why-not-cloudsourcing-for-enterprise-app-user-adoptiontraining/

  16. Organization for Economic Co-Operation and Development (OECD): Guidelines on the protection of privacy and transborder flows of personal data. From http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html (last modified January 5 1999), the OECD Privacy Principles

  17. Penn, J.: Security and the cloud : Looking at the opportunity beyond the obstacle. Forrester Research (October 2010)

    Google Scholar 

  18. Rajan, S.S.: Cloudsourcing vs outsourcing (2010), http://cloudcomputing.sys-con.com/node/1611752

  19. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA. CCS ’09, pp. 199–212. ACM Press, New York (2009), doi:10.1145/1653662.1653687

    Google Scholar 

  20. Sadeghi, A.-R., Schneider, T., Winandy, M.: Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency. In: Acquisti, A., Smith, S., Sadeghi, A.-R. (eds.) Proceedings of the 3rd international conference on Trust and trustworthy computing, Berlin, Germany, June 21-23, 2010. LNCS, vol. 6101, pp. 417–429. Springer, Heidelberg (2010)

    CrossRef  Google Scholar 

  21. Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. pp. 3–3. HotCloud’09, USENIX Association, Berkeley, CA, USA (2009), http://portal.acm.org/citation.cfm?id=1855533.1855536

  22. Sotto, L.J., Treacy, B.C., McLellan, M.L.: Privacy and data security risks in cloud computing. Electronic Commerce & Law Report 15, 186 (2010)

    Google Scholar 

  23. Van Dijk, M., Juels, A.: On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. IACR ePrint 305 (2010)

    Google Scholar 

  24. Vukolić, M.: The byzantine empire in the intercloud. SIGACT News 41, 105–111 (2010), doi:10.1145/1855118.1855137

    CrossRef  Google Scholar 

  25. Waidner, M.: Cloud computing and security. Lecture Univ. Stuttgart (November 2009)

    Google Scholar 

  26. Weichert, T.: Cloud Computing und Datenschutz (2009), http://www.datenschutzzentrum.de/cloud-computing/

Download references

Author information

Authors and Affiliations

  1. Maastricht University, The Netherlands

    Rüdiger Glott

  2. IBM Research – Zürich, Rüschlikon, Switzerland

    Elmar Husmann & Matthias Schunter

  3. TU Darmstadt, Germany

    Ahmad-Reza Sadeghi

Authors
  1. Rüdiger Glott
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Elmar Husmann
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Ahmad-Reza Sadeghi
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Matthias Schunter
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Knowledge Media Institute (KMi), The Open University, Milton Keynes, UK

    John Domingue

  2. Dept. of Electronic and Electrical Engineering, University College London, London, UK

    Alex Galis

  3. Eurescom GmbH, Heidelberg, Germany

    Anastasius Gavras

  4. Synelixis/TEI of Chalkida, Greece

    Theodore Zahariadis

  5. Knowledge Media Institute, The Open University, Milton Keynes, UK

    Dave Lambert

  6. Waterford Institute of Technology –TSSG, Waterford, Ireland

    Frances Cleary

  7. CERTH-ITI, Thessaloniki, Greece

    Petros Daras

  8. Ericsson Serbia, Belgrade, Serbia

    Srdjan Krco

  9. Business Information Systems, University of Applied Sciences Western Switzerland, Sierre, Switzerland

    Henning Müller

  10. IC Focus, London, UK

    Man-Sze Li

  11. ESoCE Net, Dialogic, Aalto University School of Economics (CKIR), Aalto, Finland

    Hans Schaffers

  12. SAP Research, Sophia Antipolis, France

    Volkmar Lotz

  13. Universidad Politécnica de Madrid, Spain

    Federico Alvarez

  14. University of Zurich, Switzerland

    Burkhard Stiller

  15. SAP Research, Karlsruhe, Germany

    Stamatis Karnouskos

  16. Université Pierre et Marie Curie (UPMC), Paris, France

    Susanna Avessta

  17. Lulea University of Technology, Lulea, Sweden

    Michael Nilsson

Rights and permissions

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Reprints and Permissions

Copyright information

© 2011 The Author(s)

About this paper

Cite this paper

Glott, R., Husmann, E., Sadeghi, AR., Schunter, M. (2011). Trustworthy Clouds Underpinning the Future Internet. In: , et al. The Future Internet. FIA 2011. Lecture Notes in Computer Science, vol 6656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20898-0_15

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-20898-0_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20897-3

  • Online ISBN: 978-3-642-20898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Over 10 million scientific documents at your fingertips

Switch Edition
  • Academic Edition
  • Corporate Edition
  • Home
  • Impressum
  • Legal information
  • Privacy statement
  • California Privacy Statement
  • How we use cookies
  • Manage cookies/Do not sell my data
  • Accessibility
  • FAQ
  • Contact us
  • Affiliate program

Not affiliated

Springer Nature

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.