Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures

  • Stéphane Betgé-Brezetz
  • Aline Bousquet
  • Jérémy Briffaut
  • Eddy Caron
  • Laurent Clevy
  • Marie-Pascale Dupont
  • Guy-Bertrand Kamga
  • Jean-Marc Lambert
  • Arnaud Lefray
  • Bertrand Marquet
  • Jonathan Rouzaud-Cornabas
  • Lamiel Toch
  • Christian Toinard
  • Benjamin Venelle
Open Access
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7858)

Abstract

Complying with security and privacy requirements of appliances such as mobile handsets, personal computers, servers for customers, enterprises and governments is mandatory to prevent from theft of sensitive data and to preserve their integrity. Nowadays, with the rising of the Cloud Computing approach in business fields, security and privacy are even more critical. The aim of this article is then to propose a way to build a secure and trustable Cloud. The idea is to spread and embed Secure Elements (SE) on each level of the Cloud in order to make a wide trusted infrastructure which complies with access control and isolation policies. This article presents therefore this new approach of trusted Cloud infrastructure based on a Network of Secure Elements (NoSE), and it illustrates this approach through different use cases.

References

  1. 1.
    Song, D., Shi, E., Fischer, I., Shankar, U.: Cloud Data Protection for the Masses. IEEE Computer Magazine 45(1) (2012)Google Scholar
  2. 2.
    Pearson, S., Shen, Y., Mowbray, M.: A Privacy Manager for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Betgé-Brezetz, S., Kamga, G.B., Dupont, M.P., Ghorbel, M.: Privacy Control in the Cloud based on Multilevel Policy Enforcement. In: IEEE 1st International Conference on Cloud Networking (CloudNet 2012), Paris, November 28-29 (2012)Google Scholar
  4. 4.
    Srinivasamurthy, S., Liu, D.Q.: Survey on Cloud Computing Security. In: Proc. Conf. on Cloud Computing, CloudCom 2010 (2010)Google Scholar
  5. 5.
    Rashid, F.Y.: Epsilon Data Breach Highlights Cloud Computing Security Concerns, eWeek.com (2011)
  6. 6.
    Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. NIST (2011)Google Scholar
  7. 7.
    Article 29 Data Protection Working Party, “Opinion 05/2012 on Cloud Computing”, WP 196, Brussels (July 2012)Google Scholar
  8. 8.
    Caron, E., Desprez, F.: DIET: A scalable toolbox to build network enabled servers on the grid. International Journal of High Performance Computing Applications 20(3) (2006)Google Scholar
  9. 9.
    Afoulki, Z., Bousquet, A., Briffaut, J., Rouzaud-Cornabas, J., Toinard, C.: MAC protection of the OpenNebula Cloud environment. In: International Conference on High Performance Computing and Simulation (HPCS), July 2-6 (2012)Google Scholar
  10. 10.
    Bolze, R., et al.: Grid’5000: A large scale and highly reconfigurable experimental grid testbed. International Journal of High Performance Computing Applications 20(4) (2006)Google Scholar
  11. 11.
    NCSC DoD/NIST Orange book Part I section 6.3 (December 1987), http://www.kernel.org/pub/linux/libs/security/Orange-Linux/refs/Orange/OrangeI-II.html#toc6
  12. 12.
  13. 13.
  14. 14.
  15. 15.
  16. 16.

Copyright information

© Authors 2013

Authors and Affiliations

  • Stéphane Betgé-Brezetz
    • 1
  • Aline Bousquet
    • 3
  • Jérémy Briffaut
    • 3
  • Eddy Caron
    • 2
  • Laurent Clevy
    • 1
  • Marie-Pascale Dupont
    • 1
  • Guy-Bertrand Kamga
    • 1
  • Jean-Marc Lambert
    • 4
  • Arnaud Lefray
    • 2
    • 3
  • Bertrand Marquet
    • 1
  • Jonathan Rouzaud-Cornabas
    • 2
  • Lamiel Toch
    • 2
  • Christian Toinard
    • 3
  • Benjamin Venelle
    • 1
  1. 1.Bell LabsAlcatel-LucentFrance
  2. 2.LIP Lab, UMR CNRS - ENS Lyon - INRIA - UCBUniversity of LyonLyonFrance
  3. 3.LIFO LaboratoryENSI BourgesFrance
  4. 4.GemaltoFrance

Personalised recommendations