2011 IEEE Third International Conference on Cloud Computing Technology and Science 2011
DOI: 10.1109/cloudcom.2011.42
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: Abstract-Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the IaaS operation and dynamic security services provisioning: (1) provide security infrastructure for secure Cloud IaaS operation; (2) provisioning dynamic security services, including creation and management o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 10 publications
(13 reference statements)
0
6
0
Order By: Relevance
“…Consider existing private and public extranets, and take into account partner connections when making such a comparison. For large enterprises without significant resources, or for small to medium-size businesses (SMBs) [4,5,6], is the risk of using public clouds (assuming that such enterprises lack the resources necessary for private clouds) really higher than the risks inherent in their current infrastructures? In many cases, the answer is probably nothere is not a higher level of risk.…”
Section: Network-level Mitigationmentioning
confidence: 99%
“…Consider existing private and public extranets, and take into account partner connections when making such a comparison. For large enterprises without significant resources, or for small to medium-size businesses (SMBs) [4,5,6], is the risk of using public clouds (assuming that such enterprises lack the resources necessary for private clouds) really higher than the risks inherent in their current infrastructures? In many cases, the answer is probably nothere is not a higher level of risk.…”
Section: Network-level Mitigationmentioning
confidence: 99%
“…Some argue that such trust relations must be formed dynamically (Demchenko et al, 2011). Many services, like Google email, Orkut mail services, and some social networking services, use trust or referral-based information filtering to protect mail servers from spammers (Golbeck, 2004).…”
Section: Cloud-specific Security Liabilitiesmentioning
confidence: 99%
“…The direct trust relationship between Cloud client and its Cloud provider are setup during the deployment phase of the Cloud security services provisioning life-cycles in [6]. The establishment workflow is described as below:…”
Section: B Dynamic Trust Establishmentsmentioning
confidence: 99%