Abstract
Complying with security and privacy requirements of appliances such as mobile handsets, personal computers, servers for customers, enterprises and governments is mandatory to prevent from theft of sensitive data and to preserve their integrity. Nowadays, with the rising of the Cloud Computing approach in business fields, security and privacy are even more critical. The aim of this article is then to propose a way to build a secure and trustable Cloud. The idea is to spread and embed Secure Elements (SE) on each level of the Cloud in order to make a wide trusted infrastructure which complies with access control and isolation policies. This article presents therefore this new approach of trusted Cloud infrastructure based on a Network of Secure Elements (NoSE), and it illustrates this approach through different use cases.
Chapter PDF
References
Song, D., Shi, E., Fischer, I., Shankar, U.: Cloud Data Protection for the Masses. IEEE Computer Magazine 45(1) (2012)
Pearson, S., Shen, Y., Mowbray, M.: A Privacy Manager for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)
Betgé-Brezetz, S., Kamga, G.B., Dupont, M.P., Ghorbel, M.: Privacy Control in the Cloud based on Multilevel Policy Enforcement. In: IEEE 1st International Conference on Cloud Networking (CloudNet 2012), Paris, November 28-29 (2012)
Srinivasamurthy, S., Liu, D.Q.: Survey on Cloud Computing Security. In: Proc. Conf. on Cloud Computing, CloudCom 2010 (2010)
Rashid, F.Y.: Epsilon Data Breach Highlights Cloud Computing Security Concerns, eWeek.com (2011)
Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. NIST (2011)
Article 29 Data Protection Working Party, “Opinion 05/2012 on Cloud Computing”, WP 196, Brussels (July 2012)
Caron, E., Desprez, F.: DIET: A scalable toolbox to build network enabled servers on the grid. International Journal of High Performance Computing Applications 20(3) (2006)
Afoulki, Z., Bousquet, A., Briffaut, J., Rouzaud-Cornabas, J., Toinard, C.: MAC protection of the OpenNebula Cloud environment. In: International Conference on High Performance Computing and Simulation (HPCS), July 2-6 (2012)
Bolze, R., et al.: Grid’5000: A large scale and highly reconfigurable experimental grid testbed. International Journal of High Performance Computing Applications 20(4) (2006)
NCSC DoD/NIST Orange book Part I section 6.3 (December 1987), http://www.kernel.org/pub/linux/libs/security/Orange-Linux/refs/Orange/OrangeI-II.html#toc6
http://www.trustedcomputinggroup.org/resources/trusted_platform_module_tpm_summary
http://cordis.europa.eu/fp7/ict/security/projects_en.html#CLO
http://www.etsi.org/deliver/etsi_ts/102400_102499/102484/07.00.00_60/ts_102484v070000p.pdf
http://www.celtic-initiative.org/Projects/Celtic-Plus-Projects/2011/SEED4C/seed4c-default.asp
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
This chapter is published under an open access license. Please check the 'Copyright Information' section either on this page or in the PDF for details of this license and what re-use is permitted. If your intended use exceeds what is permitted by the license or if you are unable to locate the licence and re-use information, please contact the Rights and Permissions team.
Copyright information
© 2013 Authors
About this paper
Cite this paper
Betgé-Brezetz, S. et al. (2013). Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures. In: Galis, A., Gavras, A. (eds) The Future Internet. FIA 2013. Lecture Notes in Computer Science, vol 7858. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38082-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-38082-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38081-5
Online ISBN: 978-3-642-38082-2
eBook Packages: Computer ScienceComputer Science (R0)