[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/CloudCom.2011.41guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment

Published: 29 November 2011 Publication History

Abstract

Cloud Computing provides an optimal infrastructure to utilise and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximise its utilisation. Cloud Computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to the time and financial constraints of many user communities. The growing number of communities that are adopting large public cloud resources such as Amazon Web Services [1] or Microsoft Azure [2] proves the success and hence usefulness of the Cloud Computing paradigm. Nonetheless, the typical use cases for public clouds involve non-business critical applications, particularly where issues around security of utilization of applications or deposited data within shared public services are binding requisites. In this paper, a use case is presented illustrating how the integration of Trusted Computing technologies into an available cloud infrastructure--Eucalyptus--allows the security-critical energy industry to exploit the flexibility and potential economical benefits of the Cloud Computing paradigm for their business-critical applications.

Cited By

View all
  • (2019)Trusted Cloud Computing Architectures for infrastructure as a serviceComputers and Security10.1016/j.cose.2018.12.01482:C(196-226)Online publication date: 1-May-2019
  • (2012)An architecture for overlaying private clouds on public providersProceedings of the 8th International Conference on Network and Service Management10.5555/2499406.2499465(371-377)Online publication date: 22-Oct-2012
  • (2012)myTrustedCloudProceedings of the WICSA/ECSA 2012 Companion Volume10.1145/2361999.2362014(82-83)Online publication date: 20-Aug-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CLOUDCOM '11: Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science
November 2011
809 pages
ISBN:9780769546223

Publisher

IEEE Computer Society

United States

Publication History

Published: 29 November 2011

Author Tags

  1. Cloud Computing
  2. Cloud Security
  3. Trusted Computing
  4. energy industry

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Trusted Cloud Computing Architectures for infrastructure as a serviceComputers and Security10.1016/j.cose.2018.12.01482:C(196-226)Online publication date: 1-May-2019
  • (2012)An architecture for overlaying private clouds on public providersProceedings of the 8th International Conference on Network and Service Management10.5555/2499406.2499465(371-377)Online publication date: 22-Oct-2012
  • (2012)myTrustedCloudProceedings of the WICSA/ECSA 2012 Companion Volume10.1145/2361999.2362014(82-83)Online publication date: 20-Aug-2012
  • (2012)Delivering ICT infrastructure for biomedical researchProceedings of the WICSA/ECSA 2012 Companion Volume10.1145/2361999.2362006(37-44)Online publication date: 20-Aug-2012
  • (2012)Lightweight distributed heterogeneous attested android cloudsProceedings of the 5th international conference on Trust and Trustworthy Computing10.1007/978-3-642-30921-2_8(122-141)Online publication date: 13-Jun-2012

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media