Mutual Protection in a Cloud Computing Environment
The term "cloud computing" has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing conc...
        Saved in:
      
    
          | Published in | 2010 IEEE 12th International Conference on High Performance Computing and Communications pp. 641 - 646 | 
|---|---|
| Main Authors | , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.09.2010
     | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9781424483358 1424483352  | 
| DOI | 10.1109/HPCC.2010.87 | 
Cover
| Summary: | The term "cloud computing" has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary "mutual protection" in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment. | 
|---|---|
| ISBN: | 9781424483358 1424483352  | 
| DOI: | 10.1109/HPCC.2010.87 |