krautheim

krautheim - Private Virtual Infrastructure for Cloud...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Private Virtual Infrastructure for Cloud Computing F. John Krautheim University of Maryland, Baltimore County, 1000 Hilltop Circle, Baltimore, MD 21250 john.krautheim@umbc.edu Abstract Cloud computing places an organization’s sensitive data in the control of a third party, introducing a significant level of risk on the privacy and security of the data. We propose a new management and security model for cloud computing called the Private Virtual Infrastructure (PVI) that shares the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. The PVI datacenter is under control of the information owner while the cloud fabric is under control of the service provider. A cloud Locator Bot pre-measures the cloud for security properties, securely provisions the datacenter in the cloud, and provides situational awareness through continuous monitoring of the cloud security. PVI and Locator Bot provide the tools that organizations require to maintain control of their information in the cloud and realize the benefits of cloud computing. 1 Introduction Cloud computing is poised to revolutionize computing as a service. With the ability to provide on- demand computing resources dynamically, companies can fundamentally change their information technology strategy. As with any new technology, this new way of doing business brings with it new challenges, especially when considering the security and privacy of the information stored and processed within the cloud. Cloud computing utilizes massively scalable computing resources delivered as a service using Internet technologies. Cloud computing allows these computational resources to be shared among a vast number of consumers to allow for a lower cost of ownership of information technology. The Infrastructure as a Service (IaaS) model of cloud computing [1] provides on-demand online computing infrastructure resource at a reduced overall cost of ownership. The IaaS model makes all of the facilities required for a datacenter application available over the Internet which clients purchase as an outsourced service. Companies are turning to the cloud for datacenter services to improve scalability and global reach, and to lower overhead. But as they do, they must proceed cautiously and evaluate all risks and issues carefully. One of the risks of cloud computing is that the users, who are the information owners, lose control of their data when they release the information into the cloud for processing. Relinquishing physical control of the datacenter infrastructure and information increases the risk of data compromise considerably [2]; however, the benefits of moving to cloud computing for services may be significant enough to justify the risk. These benefits include lower operating costs, physical space savings, energy savings and increased availability [3]. Ensuring the security and integrity of information in
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/27/2012 for the course CS 600 taught by Professor Smith,r during the Winter '08 term at Alabama.

Page1 / 5

krautheim - Private Virtual Infrastructure for Cloud...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online