2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and PHD Forum 2011
DOI: 10.1109/ipdps.2011.304
|View full text |Cite
|
Sign up to set email alerts
|

A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(32 citation statements)
references
References 3 publications
0
32
0
Order By: Relevance
“…For instance, in A4CLOUD [9] project researchers are thriving to devise models that can help put in place the set of mechanisms to ensure that cloud providers are accountable for any SLA breach or a security incident that emanated a lax in their security. A federated cloud monitoring infrastructure is introduced by [21], to monitor where data is actually saved without compromising cloud isolation by collaborating among infrastructure provider, service provider and cloud consumers. As stated previously, CSA control matrix also emphasizes compliance and audit of the related objectives.…”
Section: Cloud Related Standards and Auditmentioning
confidence: 99%
“…For instance, in A4CLOUD [9] project researchers are thriving to devise models that can help put in place the set of mechanisms to ensure that cloud providers are accountable for any SLA breach or a security incident that emanated a lax in their security. A federated cloud monitoring infrastructure is introduced by [21], to monitor where data is actually saved without compromising cloud isolation by collaborating among infrastructure provider, service provider and cloud consumers. As stated previously, CSA control matrix also emphasizes compliance and audit of the related objectives.…”
Section: Cloud Related Standards and Auditmentioning
confidence: 99%
“…Many argued that the lack of influence on the placement of workflow or service components is a hindrance for the adoption of the technology [10], [11]. Even though performance and economical benefits of cloud computing are clear, potential users hesitate to deploy the technology because legal, privacy, efficiency and resilience aspects are completely out of their control.…”
Section: Related Workmentioning
confidence: 99%
“…The evaluations were carried out using the STEVIN Supercomputer Infrastructure at Ghent University 11 . The nodes are equipped with 2 Intel Xeon CPU E5-2680 v3 12-core processors and 32GB of physical memory.…”
Section: A Simulation Frameworkmentioning
confidence: 99%
“…Many argued that the lack of influence on the placement of workflow or service components is a hindrance for the adoption of the technology [14], [15]. Even though performance and economical benefits of cloud computing are clear, potential users hesitate to use the technology because legal, privacy, efficiency and resilience aspects are completely out of their control.…”
Section: Related Workmentioning
confidence: 99%