TITLE

On Retaining Data Control to the Client in Infrastructure Clouds

AUTHOR(S)
Descher, Marco; Masser, Philip; Feilhauer, Thomas; Huemer, David; Tjoa, A. Min
PUB. DATE
December 2009
SOURCE
Journal of Information System Security;2009, Vol. 5 Issue 4, p27
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Cloud computing allows delivering information technology power on demand. Be it either the hosting of a certain web application or the outsourcing of an entire server or data center by means of virtualization. Applying these techniques however goes along with handing over the ultimate control of data to a third party. This paper investigates the application of Nimbus as a cloud resource and shows an example implementation for retaining data control to the user, based on virtual machine images encrypted on the client side. This means that the procedures involved for verifying validity and accessing the virtual machine are entirely provided by the cloud client. We provide a sample implementation of a secure virtual machine consisting of an encrypted partition, containing the data to be hosted, and a boot system, containing the logic to verify and access the encrypted partition. The details of the implementation are depicted, as applied on a cloud resource available within the AustrianGrid project.
ACCESSION #
48239355

 

Related Articles

  • Next-generation data center services face accountability concerns.  // ComputerWorld Hong Kong;Dec2015, p66 

    The article discusses the highlights of the 2015 Data Center Summit organized by "Computer World Hong Kong". Featured speakers include new Office of the Governemtn Chief Information Officer (OGCIO) Allen Yeung discussing government support for startups through data centers (DCs) while 451...

  • The Framework of Information Resource View in Cloud Computing Environment. Yong Ai; Chengyu Tan; Hongbin Dong; Sai Liu; Yiwen Liang; Jiaqi Qu; Jinhua Xiong // Journal of Convergence Information Technology;Feb2013, Vol. 8 Issue 3, p1 

    In Internet environment, the information resource could be modified, divided and integrated while transmitting. This would result in that origins of different sections within an information resource are different. Users cannot trace the path of propagation of the information resource, so they...

  • RE-PLUGGING THE DATA CENTER. CHAWLA, MEHAK // Express Computer;10/ 1/2013, Vol. 24 Issue 15, p8 

    The article discusses the successful migration of data centers and all information technology (IT) assets in India. Topics include the the forecast for the country's IT infrastructure market by 2016, the advent of cloud computing, and the benefits of IT consolidation and virtualization. Also...

  • Kent Police boosts data storage system.  // Data Strategy;Jul/Aug2007, Vol. 3 Issue 8, p6 

    The article reports that the Kent Police has chosen a virtualised storage area network (SAN) for its IT storage environment. The solution will be integrated into existing servers at both central and off-site locations. The integration of Kent Police's data storage system is being delivered by...

  • FLAT NETWORKS TURN THE TIDE. Duffy, Jim // Network World;1/9/2012, Vol. 29 Issue 1, p30 

    The article discusses the emergence of real-world implementations of the next generation information technology (IT) technologies in the U.S. in 2012. It highlights a considerable amount of activity in the data center and cloud switching fabric environment in 2011. Shehzad Merchant, senior...

  • Wringing value from IT. Kilcarr, Sean // Fleet Owner Blog;6/16/2014, p2 

    The article focuses on the function of information technology (IT) in trucking industry operations for storing and recording safety data. Topics covered include a poll of 100 IT decision-makers where 28% say they are effectively delivering business needs while plans of organizations on IT...

  • Software Defined Networking: It's Not a Y2K Thing. Sellers, William // Information-management.com;3/4/2015, p8 

    The article offers insights into software defined networking (SDN) as a promising technology that lacks compelling deadline events to trigger prompt adoption. It talks about the challenges in developing SDN compared to virtualization in terms of SDN performance in the lab environment and...

  • The key to broad use of 10GigE. Dalmia, Kamal // Communications News;Feb2008, Vol. 45 Issue 2, p40 

    The article offers information on the BASE-T, twisted-pair copper cable with RJ-45 connectors. The RJ-45 has been mentioned as the most cost-effective and easiest way to create Ethernet local area networks. It offers a simple plug-and-play paradigm that allows Information Technology managers to...

  • How to Shrink Your Data Center. SHARMA, PRERNA // Dataquest;2/15/2013, Vol. 31 Issue 3, p39 

    The article offers tips on reducing complexities in data centers. It states that a multi-tier protocol can be used to manage all data emphasizing its performance and serves as storage architecture archiving the data. It mentions that a centralized information technology (IT) process where all...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics