Proceedings of the 5th Workshop on CrossCloud Infrastructures &Amp; Platforms - CrossCloud'18 2018
DOI: 10.1145/3195870.3195874
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Cloud Orchestration for Multi-Cloud Deployments

Abstract: Cloud orchestration frameworks are commonly used to deploy and operate cloud infrastructure. Their role spans both vertically (deployment on infrastructure, platform, application and microservice levels) and horizontally (deployments from many distinct cloud resource providers). However, despite the central role of orchestration, the popular orchestration frameworks lack mechanisms to provide security guarantees for cloud operators. In this work, we analyze the security landscape of cloud orchestration framewo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
3

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 20 publications
0
3
0
3
Order By: Relevance
“…14. Security handling -The support for security enforcement enablers that provide security guarantees of the overall system against different attack scenarios in relation to the orchestration frameworks [76].…”
Section: Application-level Cloud-to-edge Orchestrationmentioning
confidence: 99%
“…14. Security handling -The support for security enforcement enablers that provide security guarantees of the overall system against different attack scenarios in relation to the orchestration frameworks [76].…”
Section: Application-level Cloud-to-edge Orchestrationmentioning
confidence: 99%
“…em ambientes NFV multi-inquilino e multidomínio [Pattaranantakul et al 2018, Paladi et al 2018. Os autores mostram que a confiança nos provedores de nuvemé incerta e que o comprometimento de umaúnica VNF no núcleo da rede põe em risco todo o serviço fim-a-fim, porém não propõem soluções para o problema.…”
Section: Outros Trabalhos Investigam O Problema De Vulnerabilidades De Segurançaunclassified
“…Khettab et al propõem utilizar tecnologias NFV e SDN para proteger fatias de rede de múltiplos domínios instanciando funções de rede de segurança, como firewalls e sistemas de detecção de intrusão [Khettab et al 2018]. As soluções propostas, no entanto, são vulneráveis aos possíveis comportamentos maliciosos de provedores de nuvem apontados por [Pattaranantakul et al 2018] e [Paladi et al 2018].…”
Section: Outros Trabalhos Investigam O Problema De Vulnerabilidades De Segurançaunclassified
“…Outros trabalhos investigam o problema de vulnerabilidades de segurança em ambientes NFV multi-inquilino e multi-domínio [Pattaranantakul et al 2018, Paladi et al 2018. Eles mostram que a confiança nos provedores de nuvemé incerta e que o comprometimento de umaúnica VNF no núcleo da rede põe em risco todo o serviço fim-a-fim.…”
Section: Trabalhos Relacionadosunclassified