Building a Flexible Service Architecture for User Controlled Hybrid Clouds

Virtualization and broadband Internet connections enabled existing technologies to form up under the nebulous term cloud. Cloud computing promises near infinite scalability and cost reduction by pay per use agreements. However for data outsourced to existing cloud solutions - which can be considered synonymous with unknown locations and potentially hostile environments - the security protection objectives can not be guaranteed. We present an approach that enables users to benefit from cloud computing and retain data sovereignty.

[1]  Weimin Zheng,et al.  Enabling Cloud Storage to Support Traditional Applications , 2010, 2010 Fifth Annual ChinaGrid Conference.

[2]  Marek Karpinski,et al.  An XOR-based erasure-resilient coding scheme , 1995 .

[3]  James S. Plank,et al.  AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.

[4]  Cloud Storage and Peer-to-Peer Storage End-user considerations and product overview , 2010 .

[5]  Changsheng Xie,et al.  Middleware enabled data sharing on cloud storage services , 2010, MW4SOC '10.

[6]  Alexander Schill,et al.  Towards User Centric Data Governance and Control in the Cloud , 2011, iNetSeC.

[7]  Sebastian Möller,et al.  Usable Security und Privacy , 2010, Datenschutz und Datensicherheit - DuD.

[8]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[9]  Stefan Schmid,et al.  Cryptree: A Folder Tree Structure for Cryptographic File Systems , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).

[10]  Karl Aberer,et al.  A self-organized, fault-tolerant and scalable replication scheme for cloud storage , 2010, SoCC '10.

[11]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[12]  Brian Warner,et al.  Tahoe: the least-authority filesystem , 2008, StorageSS '08.

[13]  Ralf Lehmann IPsec Protocol Acceleration using Network Processors , 2003 .

[14]  Ronny Seiger,et al.  SecCSIE: A Secure Cloud Storage Integrator for Enterprises , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.