introduction to secure cloud computing minit-track

1
Introduction to Secure Cloud Computing mini-track William J. Yeager Semi-retired Formerly of Stanford University and Sun Microsystems, Inc. [email protected] Jean-Henry Morin Institute of Services Science University of Geneva, Switzerland [email protected] Cloud Computing offers SaaS, PaaS, and IaaS as cost effective ways of doing computation. Initiatives by Governments as well as large and small businesses are motivating the migration of localized data centers, and IT to Internet Cloud Computing facilities. This rapid deployment of Cloud Computing comes with a cost that can leave users open to vulnerabilities such as: disruptions that may shutdown 24x7 computation availability of essential services since the concentration of government and or multiple businesses resources at a single site is a convenient target for effective cyber-terrorist attacks; possible theft of Cloud resident software Intellectual Property and confidential Personal Information; and the unwarranted invasions of user data privacy because users and their data may reside in conflicting legal jurisdictions. While this mini-track cannot adequately cover all of the issues with respect to Secure Cloud Computing, the following five papers open for discussion several significant issues in this area. Management as a Service: An approach to Manage Policy Heterogeneity in Cloud Computing Environment, by Hassan Takabi, et. al., introduce Policy Management as a Service (PmaaS) which is a cloud based policy management framework that is designed to give users a unified control point for managing access policies to their data and resources in The Cloud. Cloud Computing Security: From Single to Multi-Clouds, by Mohammed A. Alzain, et. al., discusses the movement towards multi-clouds and surveys recent recent research in this area. Are Your Papers in Order? Developing and Enforcing Multi-Tenancy and Migration Policies in The Cloud, by Brian Hay, et. al., explores the analogy between human migration and virtual machine migration in an IaaS cloud environment. Challenges in Cross-Organizational Security Management, by Stefan Thalmann, et. al., argue that the key challenges leading to security and compliance concerns in corss-organizational have not yet been adequately discussed in scholarly literature. To this end challenges gathered in this area are discussed by the means of guideline based interviews. A New Deliberation Mechanism for Service-Oriented Operating Systems, by Javier Palanca, et. al., argue that the multi- agent systems paradigm and service-oriented computing offer new ideas for the development of more intelligent and effective OSs that can be applied to Cloud Computing. Towards Cloud Computing SLA Risk Management: Issues and Challenges, by Jean-Henry Morin et. al., identify key issues and their corresponding challenges, proposing to use risk and Service Level Agreement (SLA) management as the basis for a service level framework to improve governance, risk and compliance in cloud computing environments. 2012 45th Hawaii International Conference on System Sciences 978-0-7695-4525-7/12 $26.00 © 2012 IEEE DOI 10.1109/HICSS.2012.676 5462 2012 45th Hawaii International Conference on System Sciences 978-0-7695-4525-7/12 $26.00 © 2012 IEEE DOI 10.1109/HICSS.2012.676 5462

Upload: sfaizullahbasha

Post on 01-Oct-2015

214 views

Category:

Documents


1 download

DESCRIPTION

ieee papers for students

TRANSCRIPT

  • Introduction to Secure Cloud Computing mini-track

    William J. Yeager

    Semi-retired Formerly of Stanford University and Sun

    Microsystems, Inc. [email protected]

    Jean-Henry Morin

    Institute of Services Science University of Geneva, Switzerland

    [email protected]

    Cloud Computing offers SaaS, PaaS, and IaaS as cost effective ways of doing computation. Initiatives by Governments as well as large and small businesses are motivating the migration of localized data centers, and IT to Internet Cloud Computing facilities. This rapid deployment of Cloud Computing comes with a cost that can leave users open to vulnerabilities such as: disruptions that may shutdown 24x7 computation availability of essential services since the concentration of government and or multiple businesses resources at a single site is a convenient target for effective cyber-terrorist attacks; possible theft of Cloud resident software Intellectual Property and confidential Personal Information; and the unwarranted invasions of user data privacy because users and their data may reside in conflicting legal jurisdictions. While this mini-track cannot adequately cover all of the issues with respect to Secure Cloud Computing, the following five papers open for discussion several significant issues in this area.

    Management as a Service: An approach to Manage Policy Heterogeneity in Cloud Computing Environment, by Hassan Takabi, et. al., introduce Policy Management as a Service (PmaaS) which is a cloud based policy management framework that is designed to give users a unified control point for managing access policies to their data and resources in The Cloud.

    Cloud Computing Security: From Single

    to Multi-Clouds, by Mohammed A. Alzain, et. al., discusses the movement towards multi-clouds and surveys recent recent research in this area.

    Are Your Papers in Order? Developing and Enforcing Multi-Tenancy and Migration Policies in The Cloud, by Brian Hay, et. al., explores the analogy between human migration and virtual machine migration in an IaaS cloud environment.

    Challenges in Cross-Organizational Security Management, by Stefan Thalmann, et. al., argue that the key challenges leading to security and compliance concerns in corss-organizational have not yet been adequately discussed in scholarly literature. To this end challenges gathered in this area are discussed by the means of guideline based interviews.

    A New Deliberation Mechanism for Service-Oriented Operating Systems, by Javier Palanca, et. al., argue that the multi-agent systems paradigm and service-oriented computing offer new ideas for the development of more intelligent and effective OSs that can be applied to Cloud Computing.

    Towards Cloud Computing SLA Risk Management: Issues and Challenges, by Jean-Henry Morin et. al., identify key issues and their corresponding challenges, proposing to use risk and Service Level Agreement (SLA) management as the basis for a service level framework to improve governance, risk and compliance in cloud computing environments.

    2012 45th Hawaii International Conference on System Sciences

    978-0-7695-4525-7/12 $26.00 2012 IEEEDOI 10.1109/HICSS.2012.676

    5462

    2012 45th Hawaii International Conference on System Sciences

    978-0-7695-4525-7/12 $26.00 2012 IEEEDOI 10.1109/HICSS.2012.676

    5462