We address the problem of guaranteeing security, with additional consideration on reliability and availability issues, in the management of resources in Cloud environments. We investigate and formulate different requirements that users or service providers may wish to specify. Our framework allows providers to impose restrictions on the allocations to be made to their hosts and users to express constraints on the placement of their virtual machines (VMs). User's placement constraints may impose restrictions in performing allocation to specific locations, within certain boundaries, or depending on some conditions (e.g., requiring a VM to be allocated to a different host wrt other VMs). Our approach for VM allocation goes beyond the classical (performance/cost-oriented) resource consumption to incorporate the security requirements specified by users and providers.
Supporting security requirements for resource management in Cloud Computing / R. Jhawar, V. Piuri, P. Samarati - In: Proceedings of the 15th IEEE International conference on computational science and engineering : CSE 2012 : 5-7 december 2012, Paphos, CyprusLos Alamitos : Institute of electrical and electronics engineers, 2012 Dec. - ISBN 9781467351652. - pp. 170-177 (( Intervento presentato al 15. convegno International Conference on Computational Science and Engineering (CSE) tenutosi a Paphos, Cyprus nel 2012 [10.1109/ICCSE.2012.32].
Supporting security requirements for resource management in Cloud Computing
R. JhawarPrimo
;V. PiuriSecondo
;P. SamaratiUltimo
2012
Abstract
We address the problem of guaranteeing security, with additional consideration on reliability and availability issues, in the management of resources in Cloud environments. We investigate and formulate different requirements that users or service providers may wish to specify. Our framework allows providers to impose restrictions on the allocations to be made to their hosts and users to express constraints on the placement of their virtual machines (VMs). User's placement constraints may impose restrictions in performing allocation to specific locations, within certain boundaries, or depending on some conditions (e.g., requiring a VM to be allocated to a different host wrt other VMs). Our approach for VM allocation goes beyond the classical (performance/cost-oriented) resource consumption to incorporate the security requirements specified by users and providers.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.