Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An architecture for cross-cloud auditing
Xie R., Gamble R.  CSIIRW 2013 (Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, Jan 8-10, 2013)1-4.2013.Type:Proceedings
Date Reviewed: Jul 19 2013

Cloud computing enables on-demand, self-provisioned elastic computing. In addition to public cloud offerings, the private cloud has emerged on a wider scale and has been adopted by both the enterprise and public sectors. Several open-source middleware products have appeared for use with private cloud deployments. One challenge with these various cloud products is connectivity between different organizations. The idea of federated cloud services is new, and various research papers and projects are addressing it.

There can be various levels of federation, such as authentication, accounting, and virtual machine sharing. This paper addresses the issue of how to enable federation of logging and audit records. In this scenario, a user from an organization might launch a cloud instance in a different organization. During this cross-organizational process, the user’s audit records have to be maintained and transmitted back to the initiating organization for auditing. This paper deals with this problem and proposes a solution.

The authors’ approach is novel and the solution presented advances the field. This detailed paper will benefit cloud system administrators.

Reviewer:  Zeeshan Ali Shah Review #: CR141376 (1310-0944)
Bookmark and Share
  Reviewer Selected
 
 
Authentication (K.6.5 ... )
 
 
Cloud Computing (C.2.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Cyberpunk
Hafner K., Markoff J., Simon & Schuster, Inc., New York, NY, 1991. Type: Book (9780671778798)
Nov 1 1993
How to sign digital streams
Gennaro R., Rohatgi P. Information and Computation 165(1): 100-116, 2001. Type: Article
Dec 1 2001
Signature schemes based on the strong RSA assumption
Cramer R., Shoup V. ACM Transactions on Information and System Security 3(3): 161-185, 2000. Type: Article
Mar 1 2001
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy