1P. A Cloud Computing Encapsulated Layer for Security and Availability

The main drivers of the information economy shaping a large number of organisations throughout the world are: globalization, electronic connectivity, outsourcing and the appearance of innovative business models. The cloud computing concept promises business continuity through the deployment of different internet-based private, public and hybrid “clouds”. The technology has a layered structure based on software as a service, platform as a service and infrastructure as a service. One of the main concerns regarding the use of cloud computing is the provision of connectivity based on confidentiality, integrity and availability. Its layered structure, in its current form, does not support the type of secure transmission needed to satisfy those requirements. In this paper, a sub-layer based on Multi Protocol Label Switching is suggested as a mechanism for the secure cloud-based transmission of information.

[1]  Anirban Banerjee,et al.  MPLS based mobility framework in 4G architectures , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.

[2]  Rich Maggiani Cloud computing is changing how we communicate , 2009, 2009 IEEE International Professional Communication Conference.

[3]  Jiwu Shu,et al.  Design and Implementation of an Out-of-Band Virtualization System for Large SANs , 2007, IEEE Transactions on Computers.

[4]  Shinji Shimojo,et al.  Future Internet: Challenges in Virtualization and Federation , 2009, 2009 Fifth Advanced International Conference on Telecommunications.

[5]  Liwen He,et al.  Pure MPLS Technology , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[6]  M. Lynne Markus,et al.  Technochange management: using IT to drive organizational change , 2004, J. Inf. Technol..

[7]  Iván Arce,et al.  Ghost in the Virtual Machine , 2007, IEEE Security & Privacy.

[8]  Norbert A. Streitz,et al.  Roomware-Moving Toward Ubiquitous Computers , 2002, IEEE Micro.

[9]  Leendert van Doorn,et al.  Virtualization and Hardware-Based Security , 2008, IEEE Security & Privacy.

[10]  Iman Poernomo,et al.  12th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2008) , 2008, EDOC 2008.

[11]  Michael D. Myers,et al.  Dominant actors, political agendas, and strategic shifts over time: a critical ethnography of an enterprise systems implementation , 2004, J. Strateg. Inf. Syst..

[12]  H.S. Kim,et al.  GiSK: making secure, reliable and scalable VO repository virtualizing generic disks in the grid , 2005, Eighth International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA'05).

[13]  N.K. Sehgal,et al.  Applications of Virtualization for Server Management and Security , 2006, 2006 IEEE International Conference on Industrial Technology.

[14]  Torsten Grust,et al.  Multi-tenant databases for software as a service: schema-mapping techniques , 2008, SIGMOD Conference.

[15]  Dean Jacobs Implementing Software as a Service , 2008, EDOC.

[16]  Anjali Agarwal,et al.  Resiliency issues in MPLS networks , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[17]  Raouf Boutaba,et al.  Network virtualization: state of the art and research challenges , 2009, IEEE Communications Magazine.

[18]  Sascha Uhrig,et al.  Risks and chances of many-core processors , 2009, 2009 International Conference on High Performance Computing & Simulation.

[19]  Lorin M. Hitt,et al.  Productivity, Business Profitability, and Consumer Surplus: Three Different Measures of Information Technology Value , 1996, MIS Q..

[20]  Fang Hao,et al.  Enhancing dynamic cloud-based services using network virtualization , 2009, CCRV.

[21]  Thomas Kern,et al.  ERP critical success factors: an exploration of the contextual factors in public sector institutions , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[22]  Nicholas G. Carr,et al.  The Big Switch: Rewiring the World, from Edison to Google , 2008 .

[23]  Dean Jacobs,et al.  Enterprise Software as Service , 2005, ACM Queue.

[24]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[25]  Yinong Chen,et al.  SOAVM: A Service-Oriented Virtualization Management System with Automated Configuration , 2008, 2008 IEEE International Symposium on Service-Oriented System Engineering.

[26]  Michael D. Myers,et al.  When success turns into failure: a package-driven business process re-engineering project in the financial services industry , 1999, J. Strateg. Inf. Syst..

[27]  Bongsug Chae,et al.  Self-destructive dynamics in large-scale technochange and some ways of counteracting it , 2006, Inf. Technol. People.

[28]  J. Lawrence,et al.  Designing multiprotocol label switching networks , 2001, IEEE Commun. Mag..

[29]  Daniel A. Menascé,et al.  Autonomic Virtualized Environments , 2006, International Conference on Autonomic and Autonomous Systems (ICAS'06).

[30]  Craig D. Weissman,et al.  The design of the force.com multitenant internet application development platform , 2009, SIGMOD Conference.

[31]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[32]  Anand V. Hudli,et al.  Level-4 SaaS applications for healthcare industry , 2009, COMPUTE '09.

[33]  Claudia Eckert,et al.  Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[34]  David E. Culler,et al.  Virtualization considered harmful: OS design directions for well-conditioned services , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[35]  Zhang Jian,et al.  The Optimization of Xen Network Virtualization , 2008, 2008 International Conference on Computer Science and Software Engineering.

[36]  David C. Chou,et al.  Analysis of a new information systems outsourcing practice: software-as-a-service business model , 2007, Int. J. Inf. Syst. Chang. Manag..

[37]  Sang-Wook Kim,et al.  Standard-based virtual infrastructure resource management for distributed and heterogeneous servers , 2009, 2009 11th International Conference on Advanced Communication Technology.

[38]  Yanbo Han,et al.  Business-Oriented Virtualization of Web Services A Case Study , 2008, 2008 IEEE International Symposium on Service-Oriented System Engineering.

[39]  LiangHuigang,et al.  Assimilation of enterprise systems , 2007 .

[40]  Vincent Rijmen,et al.  The Block Cipher Rijndael , 1998, CARDIS.

[41]  Nicholas G. Carr,et al.  Does IT Matter? Information Technology and the Corrosion of Competitive Advantage , 2004 .

[42]  M. Porter,et al.  How Information Gives You Competitive Advantage , 1985 .