Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2361999.2362014acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecsaConference Proceedingsconference-collections
research-article

myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management

Published: 20 August 2012 Publication History

Abstract

Cloud Computing provides an infrastructure to utilise and share both computational and data resources whilst allowing a pay-per-use model. It is useful to cost-effectively manage hardware investment or to maximise its utilisation. Cloud Computing also offers transitory access to scalable amounts of computational resources, something that is especially important due to the time and financial constraints of many user communities. The typical use cases for public clouds involve non-business critical applications, particularly where issues around security of utilization of applications or deposited data within shared public services are binding requisites. In this poster, a use case is presented illustrating how the integration of Trusted Computing technologies into an available Infrastructure as a Service (IaaS) platform -- Eucalyptus -- allows the security-critical energy industry to exploit the flexibility and potential economic benefits of Cloud Computing for their business-critical applications.

References

[1]
Pearson, S. 2002. Trusted computing platforms: TCPA technology in context. Prentice Hall PTR Upper Saddle River, NJ, USA.
[2]
Trusted Computing Group, http://www.trustedcomputinggroup.org.
[3]
Nurmi, D. et al. 2008. The Eucalyptus Open-Source Cloud-Computing System. Cloud Computing and Applications 2008 (CCA 08).
[4]
Hargreaves, N. et al. 2011. Developing emerging standards for power system data exchange to enable interoperable and scalable operational modelling and analysis, 46th International Universities' Power Engineering Conference (UPEC2011), pp. 1--5.
[5]
Wallom, D., Turilli, M. et al. 2011. myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Management. In CLOUDCOM '11 Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pp. 247--254.

Cited By

View all
  • (2023)A Scientometric Study of Research Development on Cloud Computing-Based Data Management TechniqueProceedings of Fourth Doctoral Symposium on Computational Intelligence10.1007/978-981-99-3716-5_50(617-625)Online publication date: 17-Sep-2023
  • (2020)Toward security as a service: A trusted cloud service architecture with policy customizationJournal of Parallel and Distributed Computing10.1016/j.jpdc.2020.11.002Online publication date: Nov-2020
  • (2015)Distributed trust protocol for IaaS Cloud Computing2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)10.1109/IBCAST.2015.7058516(275-279)Online publication date: Jan-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WICSA/ECSA '12: Proceedings of the WICSA/ECSA 2012 Companion Volume
August 2012
201 pages
ISBN:9781450315685
DOI:10.1145/2361999

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 August 2012

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

WICSA/ECSA '12

Acceptance Rates

Overall Acceptance Rate 48 of 72 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Scientometric Study of Research Development on Cloud Computing-Based Data Management TechniqueProceedings of Fourth Doctoral Symposium on Computational Intelligence10.1007/978-981-99-3716-5_50(617-625)Online publication date: 17-Sep-2023
  • (2020)Toward security as a service: A trusted cloud service architecture with policy customizationJournal of Parallel and Distributed Computing10.1016/j.jpdc.2020.11.002Online publication date: Nov-2020
  • (2015)Distributed trust protocol for IaaS Cloud Computing2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)10.1109/IBCAST.2015.7058516(275-279)Online publication date: Jan-2015
  • (2013)Perspectives and reflections on cloud computing and internet technologies from NordiCloud 2012Proceedings of the Second Nordic Symposium on Cloud Computing & Internet Technologies10.1145/2513534.2513547(72-79)Online publication date: 2-Sep-2013

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media