2011 IEEE Third International Conference on Cloud Computing Technology and Science 2011
DOI: 10.1109/cloudcom.2011.41
|View full text |Cite
|
Sign up to set email alerts
|

myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment

Abstract: Cloud Computing provides an optimal infrastructure to utilise and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximise its utilisation. Cloud Computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to the time and financial constraints of many user communities. The growing number of communities that are adopting large public cloud resource… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…This provides an additional layer of trust and security for the data and applications deployed in the cloud, providing a more reliable and secure platform. As with all cloud platforms, different levels of access can also be created, so an administrator can access the underlying infrastructure of the cloud, while end users can only view the data or results stored [6].…”
Section: Cloud Computingmentioning
confidence: 99%
“…This provides an additional layer of trust and security for the data and applications deployed in the cloud, providing a more reliable and secure platform. As with all cloud platforms, different levels of access can also be created, so an administrator can access the underlying infrastructure of the cloud, while end users can only view the data or results stored [6].…”
Section: Cloud Computingmentioning
confidence: 99%
“…The VerifyMyVM protocol uses a virtual TPM to remotely attest the integrity of VMs. myTrustedCloud [10] integrated the trust computing with the Eucalyptus cloud to meet the urgent security needs of energy industry. It verified a VM to guarantee that only the intended programs and configuration files can be loaded in the VM.…”
Section: R Elated Workmentioning
confidence: 99%
“…Response: National Grid, in conjunction with Brunel University, Oxford eResearch Centre and Open Grid Systems have simulated a network model exchange with UK Power Networks through a trusted cloud infrastructure [13]. This project demonstrated that network models could be exchanged between utilities via a secure private cloud infrastructure built upon an open source solution -Eucalyptus.…”
Section: Business Use Cases For Initial Model Driven Data Integrmentioning
confidence: 99%