Academic
Publications
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure

Toward Trustworthy Clouds' Internet Scale Critical Infrastructure,10.1007/978-3-642-21031-0_6,Imad M. Abbadi

Toward Trustworthy Clouds' Internet Scale Critical Infrastructure   (Citations: 4)
BibTex | RIS | RefWorks Download
Cloud computing is a new concept using old technologies that has emerged from industry to academia. This result in some confusion about Cloud potential capabilities by overestimating some features and underestimating the challenges, which we attempt to clarify in this paper. We present an overview of Cloud critical infrastructure focusing on what is known as IaaS (Infrastructure as a Service) Cloud type. We then discuss security challenges and requirements, which would hopefully contribute in moving current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical infrastructure. We are mainly focusing on: (a.) Cloud resource management for virtual infrastructure, (b.) security threats from Cloud insiders, (c.) Cloud user-centric security model, and (d.) Cloud infrastructure self-managed services. We have just start working on these areas as part of EU funded TCloud project.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...Establishing trust in the Cloud is an important subject that has not yet received the required level of attention from both academia and industry [4], [6], [7], [10]...

    Imad M. Abbadi. Operational trust in Clouds' environment

    • ...In this paper we extend our previous work ([2], [3], [4])...
    • ...In ([4]) we motivated the need for self-managed services, and for space limitations, we identify it as future research...
    • ...However, such tools have many security vulnerabilities ([4]) and only provide limited automated management services, which we discuss next in this section...
    • ...In our previous work ([4]) we have identified part of the security challenges, but we did not discuss them in detail for space limitations and we left it as a planned future work...
    • ...In our previous work ([4]) we identified the set of requirements for mitigating insider threats...

    Imad M. Abbadi. Middleware Services at Cloud Virtual Layer

    • ...Fully automated management services are not yet available, at the time of writing, for many Cloud services, which are required by different types of applications including but not limited to critical applications [2]...
    • ...Virtualization technology, which is the foundation of the Cloud infrastructure, brings tremendous advantages in terms of consolidating resources; however, it is also associated with other problems, e.g. security and privacy problems [2]...
    • ...However, we are still at an early stage for providing fully automated services for many limitations, which we partially discuss in [1,2]...
    • ...In this paper we continue our previous work in [2] which discusses the misconceptions about Cloud computing, introduces Cloud layering concept, and derives the main security challenges in the Cloud...
    • ...In our previous work ([2]) we have outlined VCC which helped us to derive cloud unique security challenges...
    • ...In our previous work ([1,2]) we have discussed Cloud security challenges...

    Imad M. Abbadi. Clouds’ Infrastructure Taxonomy, Properties, and Management Services

    • ...In this paper we continue our previous work in [4], which discusses the misconceptions about Cloud computing, discusses Cloud structural components, and derives the main security challenges in the Cloud...

    Imad M. Abbadi. Middleware Services at Cloud Application Layer

Sort by: