Conference PaperPDF Available

Slides of Challenges in Management, Security and Sustainability for Cloud Computing

Authors:

Abstract and Figures

Challenges in autonomic management for a cloud; Challenges in risk analysis for cloud computing; Challenges in risk-­based access control for a cloud; Challenges in cloud application profiling; and Challenges in sustainability for cloud computing.
No caption available
… 
No caption available
… 
No caption available
… 
No caption available
… 
Content may be subject to copyright.
Challenges)in)Management,)
Security)and)Sustainability)for)
Cloud)Compu9ng)
!
!
!!
Carlos)Becker)Westphall)
!
Networks)and)Management)Laboratory)
Federal)University)of)Santa)Catarina)
FEBRUARY)27TH,)NICE,)FRANCE) ICN)2014)O)PANEL) "!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! *!
"7!189::;<=;>!?<!9@AB<BC?D!C9<9=;C;<A!EBF!9!D:B@G!
H!H!!
*7!189::;<=;>!?<!F?>I!9<9:J>?>!EBF!D:B@G!DBCK@L<=!!
H!!
M7!189::;<=;>!?<!F?>I4N9>;G!9DD;>>!DB<AFB:!EBF!9!D:B@G!!
H!!
37!189::;<=;>!?<!!D:B@G!9KK:?D9LB<!KFBO:?<=!!
H!!
P7!189::;<=;>!?<!>@>A9?<9N?:?AJ!EBF!D:B@G!DBCK@L<=!
"7!189::;<=;>!?<!9@AB<BC?D!
C9<9=;C;<A!EBF!9!D:B@G!
4! QB<?ABF?<=! 9FD8?A;DA@F;! G;R?>;G!EBF!KF?R9A;!
1:B@G.! DB<>?G;F?<=!A8;!?<EBFC9LB<!9<G!
I<BS:;G=;!F;T@?F;C;<A>!BE!9@AB<BC?D!
>J>A;C>7!
4! 0A! EBD@>;>!B<!KFBR?G?<=!G9A9!9<9:JLD>!
D9K9N?:?L;>! AB! A8;! CB<?ABF?<=! >J>A;C! 9<G!
;CK89>?U;>!A8;!EB::BS?<=!KFBK;FL;>V!
>D9:9N?:?AJ.! F;>?:?;<D;.! 9G9KA9N?:?AJ.! LC;:?<;>>!
9<G!;WA;<>?N?:?AJ7!!
!
!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! M!
"7!189::;<=;>!?<!9@AB<BC?D!
C9<9=;C;<A!EBF!9!D:B@G!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! 3!
*7!189::;<=;>!?<!F?>I!9<9:J>?>!EBF!D:B@G!
DBCK@L<=!
40A! KFBKB>;>! 9! CBG;:!S8;F;! A8;! D:B@G!
DB<>@C;F! D9<! K;FEBFC!F?>I! 9<9:J>?>! B<!
KFBR?G;F>!N;EBF;! 9<G! 9X;F! DB<AF9DL<=!
A8;!>;FR?D;7!!
4,8;! KFBKB>;G!CBG;:!;>A9N:?>8;>!A8;!
F;>KB<>?N?:?L;>!BE!A8F;;!9DABF>V!
1B<>@C;F.!5FBR?G;F!9<G!Y;D@F?AJ!69N>7!!
!
!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! P!
*7!189::;<=;>!?<!F?>I!9<9:J>?>!EBF!D:B@G!
DBCK@L<=!
!!!
!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! Z!
M7!189::;<=;>!?<!F?>I4N9>;G!9DD;>>!
DB<AFB:!EBF!9!D:B@G!!!
4[<;!BE!A8;!=F;9A!D89::;<=;>!?<!A8;!G;K:BJC;<A!
BE! D:B@G! E;G;F9LB<>! ?>! 0G;<LAJ! 9<G! (DD;>>!
Q9<9=;C;<A7!!
40A! KFBKB>;>! 9<! 9DD;>>! DB<AFB:! >J>A;C! EBF! 9!
8?=8:J!>D9:9N:;!D:B@G!E;G;F9LB<7!!
4,8;! KF;>;<A;G! >J>A;C! ?>! GJ<9C?D! 9<G! F?>I4
N9>;G.! 9::BS?<=! A8;!@>;!BE!D:B@G! E;G;F9LB<>!
S?A8B@A!A8;!<;;G!BE!?G;<LAJ!E;G;F9LB<>7!!
!
!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! +!
M7!189::;<=;>!?<!F?>I4N9>;G!9DD;>>!
DB<AFB:!EBF!9!D:B@G!!!
!
!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! \!
37!189::;<=;>!?<!D:B@G!9KK:?D9LB<!
KFBO:?<=!
4,8;F;!C9<J!CBG;:>!9<G!ABB:>!A89A!9GGF;>>!A8;!
DF;9LB<!BE!9<!9KK:?D9LB<!KFBO:;!AB!:9];.!A8;<!
9KK:J!>BC;!KF;G?DLR;!CBG;:! AB! >@==;>A! A8;!
9CB@<A!BE!F;>B@FD;!EBF!9!SBFI:B9G7!!
40A! KF;>;<A>!9!A9WB<BCJ!EBF!9KK:?D9LB<!
KFBO:?<=!CBG;:>!9<G!ABB:>.!KF;>;<L<=!?A>!C9?<!
D89F9DA;F?>LD>.! D89::;<=;>.! G;>DF?N?<=!9<G!
DBCK9F?<=!>@D8!CBG;:>!9<G!ABB:7!!
!!
!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! ^!
37!189::;<=;>!?<!D:B@G!9KK:?D9LB<!
KFBO:?<=!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! "2!
P7!189::;<=;>!?<!>@>A9?<9N?:?AJ!EBF!D:B@G!
DBCK@L<=!
!!
4,8;! 9?C! BE!_F;;<!1:B@G!1BCK@L<=!?>! AB!
9D8?;R;! 9! N9:9<D;! N;AS;;<!F;>B@FD;!
DB<>@CKLB<!9<G!T@9:?AJ!BE!>;FR?D;7!!
40A!KFBKB>;>!ASB!8JNF?G!>AF9A;=?;>!N9>;G!B<!
9!G?>AF?N@A;G!>J>A;C!C9<9=;C;<A!CBG;:`!?A!
G;>DF?N;>! A8;! N9>;! >AF9A;=?;>.! BK;F9LB<!
KF?<D?K:;>.!?A!R9:?G9A;>!9<G!9<9:JU;>!A8;C7!!
!
!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! ""!
P7!189::;<=;>!?<!>@>A9?<9N?:?AJ!EBF!D:B@G!
DBCK@L<=!
!!
#$%&'(&)!*+,-.!/01$.!#&(/1$! 01/!*2"3!4!5(/$6! "*!
... One of these ideas is the deployment of Cloud federations. A Cloud federation is an association among different Cloud Service Providers (CSPs) with the goal of sharing resources and data (Westphall et al. 2014). In order to cope with the resource capacity limits of a single Cloud provider, the concept of federating multiple heterogeneous organisations is receiving attention. ...
Conference Paper
Full-text available
Cloud Computing is being adopted in critical sectors such as energy, transport, and finance. This makes Cloud Computing services critical in themselves. Cloud Computing is a model in which vast quantities of computer resources are used to provide services to many concurrent users. The services may be offered directly or as part of a composite system. The greater scalability and larger size of Clouds compared to traditional service hosting infrastructure, involve more complex monitoring systems, which have to be scalable and robust. Therefore, monitoring systems and intrusion detection systems (IDSs) must be refined and adapted to different situations in Cloud environments. To embrace the above challenge, we propose a methodology that develops a robust collaborative IDS in a federated Cloud environment. Federated Clouds are a logical evolution of the centralised approach. A Cloud federation is an association among different Cloud Service Providers (CSPs) with the goal of sharing resources and data. Our approach offers a proactive collaborative model for Cloud intrusion detection based on the distribution of responsibilities. The responsibility for managing the elements of the Cloud is distributed among several monitoring nodes. Our architecture consists of four major entities: the Cloud Broker, the Monitoring Nodes, the Local Coordinator (Super Nodes), and the Global Coordinator (Command and Control: C2). For collaborative intrusion detection, we use the Dempster-Shafer theory of evidence. Dempster-Shafer executes as a main fusion node, with the role to collect and fuse the beliefs provided by the monitoring entities, taking the final decision regarding a possible attack. This type of detection and prevention helps increase resilience to attacks in the Cloud. Collaboration among CSPs can ensure that they are up to date on different Cloud threats. Protecting the federated Cloud against cyber attacks is a key concern, since there are potential significant economic consequences. Our current work focuses on the deployment of such a solution for Cloud service provider collaboration: Security as a Service.
ResearchGate has not been able to resolve any references for this publication.