In current cloud services hosting solutions, various mechanisms have been developed to minimize the possibility of hosting staff from breaching security. However, while functions such as replicating and moving machines are legitimate actions in clouds, we show that there are risks in administrators being able to perform them. We describe three threat scenarios related to hosting staff on the cloud architecture and indicate how an appropriate accountability architecture can mitigate these risks in the sense that the attacks can be detected and the perpetrators identified. We identify requirements and future research and development needed to protect cloud service environments from these attacks.
History
Event
International Conference on Cloud Computing and Services Science (1st : 2011 : Noordwijkerhout, The Netherlands)
Pagination
43 - 48
Publisher
INSTICC
Location
Noordwijkerhout, The Netherlands
Place of publication
[Noordwijkerhout, The Netherlands]
Start date
2011-05-07
End date
2011-05-09
ISBN-13
9789898425522
Language
eng
Notes
Reproduced with the kind permission of the copyright owner.
Publication classification
E1 Full written paper - refereed
Copyright notice
2011, INSTICC
Title of proceedings
CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science