Advertisement

TClouds

Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud
  • Ninja Marnau
  • Norbert Schirmer
  • Eva Schlehahn
  • Matthias Schunter
Article
  • 182 Downloads

Zusammenfassung

Das von der Europäischen Kommission gef:orderte Projekt „TClouds“ hat die Entwicklung einer sicheren und datenschutzkonformen Cloud-Infrastruktur zum Ziel. Dieser Beitrag beschreibt die Herausforderungen und die ersten Lösungsideen.

Literaturverzeichnis

  1. Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2011). DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. EuroSys’11: The 6th ACM SIGOPS/EuroSys European Systems Conference. Salzburg.Google Scholar
  2. Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.V., Ramunno, G., Sadeghi, A.R., Schunter, M., Stüble, C. (2010): Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18, 89–121.CrossRefGoogle Scholar
  3. Catuogno, L., Löhr, H., Manulis, M., Sadeghi, A.-R., & Stüble, C. (5 2010). Trusted Virtual Domains: Color Your Network. Datenschutz und Datensicherheit (DuD), S. 289–298.CrossRefGoogle Scholar
  4. Chien, E (2010): W32.Stuxnet dossier. From http://www.symantec.com/connect/blogs/w32stuxnet-dossier, retrieved 2010-13-03
  5. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J. (2009): Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud Computing Security (CCSW’09). pp. 85–90. ACM PressGoogle Scholar
  6. Cloud Security Alliance (2010): Top threats to cloud computing, version 1.0. http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
  7. Glott, Rüdiger, E. Husmann, A. Sadeghi, and Matthias Schunter (2011): Trustworthy Clouds underpinning the Future Internet, to appear in Future Internet Assembly — Book 3, Springer LNCS 6656Google Scholar
  8. Grobauer, B., Schreck, T. (2010): Towards incident handling in the cloud: challenges and approaches. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. pp. 77–86. CCSW’ 10, ACM, New York, NY, USACrossRefGoogle Scholar
  9. Kaliski, Jr., B.S., Pauley, W. (2010): Toward risk assessment as a service in cloud environments. In: Proceed-ings of the 2nd USENIX conference on Hot topics in cloud computing. pp. 13–13. HotCloud’10, USENIX Association, Berkeley, CA, USAGoogle Scholar
  10. Organization for Economic Co-Operation and Development (2009): Guidelines on the protection of privacy and transborder flows of personal data. From http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html (last modified January 5 1999), the OECD Privacy Principles
  11. Penn, J.: (2010): Security and the cloud: Looking at the opportunity beyond the obstacle. Forrester ResearchGoogle Scholar
  12. Rajan, S.S. (2010): Cloudsourcing vs outsourcing. Available online at http://cloudcomputing.syscon.com/node/1611752
  13. Ristenpart, T., Tromer, E., Shacham, H., Savage, S. (2009): Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security. pp. 199–212. CCS’ 09, ACM, New York, NY, USAGoogle Scholar
  14. Sadeghi, A.R., Schneider, T., Winandy, M. (2010): Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Proceedings of the 3rd international conference on Trust and trustworthy computing. pp. 417–429. TRUST’10, Springer-Verlag, Berlin, HeidelbergCrossRefGoogle Scholar
  15. Santos, N., Gummadi, K., & Rodrigues, R. (2009). Towards trusted cloud computing. Proceedings of the 2009 conference on Hot topics in cloud computing. Berkeley: USENIX Association.Google Scholar
  16. Santos, N., Gummadi, K.P., Rodrigues, R. (2009): Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. pp. 3–3. HotCloud’09, USENIX Association, Berkeley, CA, USAGoogle Scholar
  17. Vukolić, M. (2010): The byzantine empire in the intercloud. SIGACT News 41, 105–111CrossRefGoogle Scholar
  18. Weichert, T. (2009): Cloud Computing und Datenschutz. Available online at http://www.datenschutzzentrum.de/cloud-computing/

Copyright information

© Springer Fachmedien Wiesbaden 2011

Authors and Affiliations

  • Ninja Marnau
  • Norbert Schirmer
  • Eva Schlehahn
  • Matthias Schunter

There are no affiliations available

Personalised recommendations