Architecture for Secure Computation Infrastructure and Self-Management of VM Security
Contributors
Contact persons:
- Walterscheid, Benjamin1
- Palesandro, Alex2
- Wailly, Aurélien2
- He, Ruan2
- Rafflé, Yvan2
- Wary, Jean-Philippe2
- Li, Yanhuang2
- Bleikertz, Sören3
- Bessani, Alysson4
- Yaich, Reda5
- Idrees, Sabir5
- Cuppens, Nora5
- Cuppens, Frédéric5
- Brasser, Ferdinand6
- Huang, Jialin6
- Sobhani, Majid6
- Oborzynski, Krzysztof7
- Vernekar, Gitesh7
- Veeningen, Meilof8
- Sousa, Paulo9
- 1. TEC
- 2. ORANGE
- 3. IBM
- 4. FFCUL
- 5. IMT
- 6. TUDA
- 7. PHHC
- 8. PEN
- 9. MAXDATA
Description
In this document we present the preliminary architecture of the SUPERCLOUD virtualization and security self-management for computation. We start by defining the design requirements of the architecture, and then review the state-of-the-art. We survey virtualization technologies and discuss designs for the virtualization infrastructure enabling the best trade-off between user control over infrastructure layers, strong security, and multi-provider interoperability. We also review isolation technologies, access control, and trust management to preserve end-to-end security between computing resources across clouds. We present a survey of security self-management, motivating the need to overcome administration complexity barriers through full security automation, seamlessly across layers and cloud provider domains. The document closes with the preliminary design of the SUPERCLOUD architecture for the virtualization and self-management infrastructure for computation, describing its different components and techniques enabling to fulfill the requirements of our design.
Files
SC-D2.1-Secure-Computation-Infrastructure-PU-M09.pdf
Files
(7.4 MB)
Name | Size | Download all |
---|---|---|
md5:2bd993c37900055db2be542fcd654749
|
7.4 MB | Preview Download |