IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Issues in Cloud Federations

Security Issues in Cloud Federations
View Sample PDF
Author(s): Massimiliano Rak (Second University of Naples, Italy), Massimo Ficco (Second University of Naples, Italy), Jesus Luna (TU Darmstadt, Germany), Hamza Ghani (TU Darmstadt, Germany), Neeraj Suri (TU Darmstadt, Germany), Silviu Panica (Institute e-Austria Timisoara, Romania)and Dana Petcu (Institute e-Austria Timisoara, Romania)
Copyright: 2012
Pages: 19
Source title: Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice
Source Author(s)/Editor(s): Massimo Villari (Università degli Studi di Messina, Italy), Ivona Brandic (Vienna University of Technology, Austria)and Francesco Tusa (Università degli Studi di Messina, Italy)
DOI: 10.4018/978-1-4666-1631-8.ch010

Purchase

View Security Issues in Cloud Federations on the publisher's website for pricing and purchasing information.

Abstract

The cloud paradigm, based on the idea of delegating to the network any kind of computational resources, is showing a considerable success. The estimated trend is that the number of different cloud-based solutions, approaches, and service providers (CSP) will continue growing. Despite the big number of different cloud solutions that currently exist, most of them are “walled gardens” unable to interoperate. On the other side, a large effort is taking place in the cloud community to develop and identify open solutions and standards. In such a context the concept of cloud federation, an architecture that combines the functionalities of different CSP, is a hot topic. This chapter presents an overview of the cloud federation topic, with special focus on its most important security challenges. Furthermore, it proposes a taxonomy of possible approaches to federation. Then it proposes a comparison of security problems in cloud and grid environment, and a detailed analysis of two relevant security problems, identity management and Cyber Attacks analysis, trying to outline how they can be applied in a federated context.

Related Content

Azeem Khan, Noor Zaman Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar. © 2024. 30 pages.
Siva Raja Sindiramutty, Chong Eng Tan, Sei Ping Lau, Rajan Thangaveloo, Abdalla Hassan Gharib, Amaranadha Reddy Manchuri, Navid Ali Khan, Wee Jing Tee, Lalitha Muniandy. © 2024. 67 pages.
Ruchi Doshi, Kamal Kant Hiran. © 2024. 16 pages.
N. Ambika. © 2024. 9 pages.
Siva Raja Sindiramutty, Wee Jing Tee, Sumathi Balakrishnan, Sukhminder Kaur, Rajan Thangaveloo, Husin Jazri, Navid Ali Khan, Abdalla Gharib, Amaranadha Reddy Manchuri. © 2024. 54 pages.
Azeem Khan, NZ Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar. © 2024. 22 pages.
Azeem Khan, Noor Zaman Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar. © 2024. 36 pages.
Body Bottom