File(s) under permanent embargo
Dealing with rogue virtual machines in a cloud services environment
conference contribution
posted on 2011-01-01, 00:00 authored by Bernard Colbert, Lynn BattenLynn BattenIn current cloud services hosting solutions, various mechanisms have been developed to minimize the possibility of hosting staff from breaching security. However, while functions such as replicating and moving machines are legitimate actions in clouds, we show that there are risks in administrators being able to perform them. We describe three threat scenarios related to hosting staff on the cloud architecture and indicate how an appropriate accountability architecture can mitigate these risks in the sense that the attacks can be detected and the perpetrators identified. We identify requirements and future research and development needed to protect cloud service environments from these attacks.
History
Event
International Conference on Cloud Computing and Services Science (1st : 2011 : Noordwijkerhout, The Netherlands)Pagination
43 - 48Publisher
INSTICCLocation
Noordwijkerhout, The NetherlandsPlace of publication
[Noordwijkerhout, The Netherlands]Start date
2011-05-07End date
2011-05-09ISBN-13
9789898425522Language
engNotes
Reproduced with the kind permission of the copyright owner.Publication classification
E1 Full written paper - refereedCopyright notice
2011, INSTICCTitle of proceedings
CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services ScienceUsage metrics
Categories
No categories selectedLicence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC