Cloud Computing
Cloud Computing
Cloud Computing
Talk Objectives
A high-level discussion of the fundamental challenges and issues/characteristics of cloud computing Identify a few security and privacy issues within this framework Propose some approaches to addressing these issues Preliminary ideas to think about
Outline
Part I: Introduction Part II: Security and Privacy Issues in Cloud Computing Part III: Possible Solutions
Part I. Introduction
Cloud Computing Background Cloud Models Why do you still hesitate to use cloud computing? Causes of Problems Associated with Cloud Computing Taxonomy of Fear Threat Model
Attributes
Essential characteristics
Cloud computing is a compilation of existing techniques and technologies, packaged within a new infrastructure paradigm that offers improved scalability, elasticity, business agility, faster startup time, reduced management costs, and just-in-time availability of resources
From [1] NIST
Also a massive concentration of risk expected loss from a single breach can be significantly larger concentration of users represents a concentration of threats Ultimately, you can outsource responsibility but you cant outsource accountability.
Cloud computing definitely makes sense if your own security is weak, missing features, or below average. Ultimately, if the cloud providers security people are better than yours (and leveraged at least as efficiently), the web-services interfaces dont introduce too many new vulnerabilities, and the cloud provider aims at least as high as you do, at security goals, then cloud computing has better security.
Cloud Models
Delivery Models
SaaS PaaS IaaS
Deployment Models
Private cloud Community cloud Public cloud Hybrid cloud
We propose one more Model: Management Models (trust and tenancy issues)
Self-managed 3rd party managed (e.g. public clouds and VPC)
Delivery Models
While cloud-based software services are maturing, Cloud platform and infrastructure offering are still in their early stages !
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 9
10
11
[Chow09ccsw]
12
Lack of Trust in the Cloud A brief deviation from the talk Defining trust and risk
(But still related) Trusting a third party requires taking risks
Opposite sides of the same coin (J. Camp) People only trust when it pays (Economists view) Need for trust arises only in risky situations Hard to balance trust and risk e.g. Key Escrow (Clipper chip) Is the cloud headed toward the same path?
Taxonomy of Fear
Confidentiality Fear of loss of control over data
Will the cloud provider itself be honest and wont peek into the data? Integrity How do I know that the cloud provider is doing the computations correctly? How do I ensure that the cloud provider really stored my data without tampering with it?
From [5] www.cs.jhu.edu/~ragib/sp10/cs412 17
Will the sensitive data stored on a cloud remain confidential? Will cloud compromises leak confidential client data
If cloud provider subcontracts to third party clouds, will the data still be secure?
From [5] www.cs.jhu.edu/~ragib/sp10/cs412 20
Security is one of the most difficult task to implement in cloud computing. Different forms of attacks in the application side and in the hardware components Attacks with catastrophic effects only needs one security flaw
(http://www.exforsys.com/tutorials/cloud-computing/cloud-computing-security.html) 21
Threat Model
A threat model helps in analyzing a security problem, design mitigation strategies, and evaluate solutions Steps: Identify attackers, assets, threats and other components Rank the threats Choose mitigation strategies Build solutions based on the strategies
Threat Model
Basic components Attacker modeling
Choose what attacker to consider insider vs. outsider? single vs. collaborator? Attacker motivation and capabilities
Part II: Security and Privacy Issues in Cloud Computing - Big Picture
Infrastructure Security Data Security and Storage Identity and Access Management (IAM) Privacy
And more
Infrastructure Security
Network Level Host Level Application Level
29
However, as a customer, you still own the risk of managing information hosted in the cloud services.
Hypervisor (also called Virtual Machine Manager (VMM)) security is a key a small application that runs on top of the physical machine H/W layer implements and manages the virtual CPU, virtual memory, event channels, and memory shared by the resident VMs Also controls I/O and memory access to devices. Bigger problem in multitenant architectures The virtual instance of an OS Vulnerabilities have appeared in virtual instance of an OS e.g., VMWare, Xen, and Microsofts Virtual PC and Virtual Server Customers have full access to virtual servers.
33
34
Confidentiality + integrity using secured protocol Confidentiality with non-secured protocol and encryption
Generally, not encrypted , since data is commingled with other users data Encryption if it is not associated with applications? But how about indexing and searching? Then homomorphic encryption vs. predicate encryption?
For any application to process data, not encrypted
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 38
Data provenance
Why IAM?
Organizations trust boundary will become dynamic and will move beyond the control and will extend into the service provider domain. Managing access for diverse user populations (employees, contractors, partners, etc.) Increased demand for authentication personal, financial, medical data will now be hosted in the cloud S/W applications hosted in the cloud requires access control Need for higher-assurance authentication authentication in the cloud may mean authentication outside F/W Limits of password authentication Need for authentication from mobile devices
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 41
IAM considerations
The strength of authentication system should be reasonably balanced with the need to protect the privacy of the users of the system The system should allow strong claims to be transmitted and verified w/o revealing more information than is necessary for any given transaction or connection within the service Case Study: S3 outage authentication service overload leading to unavailability
2 hours 2/15/08 http://www.centernetworks.com/amazon-s3-downtimeupdate
42
What is Privacy?
The concept of privacy varies widely among (and sometimes within) countries, cultures, and jurisdictions. It is shaped by public expectations and legal interpretations; as such, a concise definition is elusive if not impossible. Privacy rights or obligations are related to the collection, use, disclosure, storage, and destruction of personal data (or Personally Identifiable InformationPII). At the end of the day, privacy is about the accountability of organizations to data subjects, as well as the transparency to an organizations practice around personal information.
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 43
Personal information should be managed as part of the data used by the organization Protection of personal information should consider the impact of the cloud on each phase
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 44
Storage
Is it commingled with information from other organizations that use the same CSP? The aggregation of data raises new privacy issues Some governments may decide to search through data without necessarily notifying the data owner, depending on where the data resides Whether the cloud provider itself has any right to see and access customer data? Some services today track user behaviour for a range of purposes, from sending targeted advertising to improving services
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 46
Retention
How long is personal information (that is transferred to the cloud) retained? Which retention policy governs the data? Does the organization own the data, or the CSP? Who enforces the retention policy in the cloud, and how are exceptions to this policy (such as litigation holds) managed?
47
Destruction
How does the cloud provider destroy PII at the end of the retention period? How do organizations ensure that their PII is destroyed by the CSP at the right point and is not available to other cloud users? Cloud storage providers usually replicate the data across multiple systems and sitesincreased availability is one of the benefits they provide. How do you know that the CSP didnt retain additional copies? Did the CSP really destroy the data, or just make it inaccessible to the organization? Is the CSP keeping the information longer than necessary so that it can mine the data for its own use?
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 48
Privacy breaches
How do you know that a breach has occurred? How do you ensure that the CSP notifies you when a breach occurs? Who is responsible for managing the breach notification process (and costs associated with the process)? If contracts include liability for breaches resulting from negligence of the CSP? How is the contract enforced? How is it determined who is at fault?
From [6] Cloud Security and Privacy by Mather and Kumaraswamy 50
52
Lack of trust
Data and apps may still need to be on the cloud But can they be managed in some way by the consumer?
Multi-tenancy
Private cloud
Third Party Cloud Computing Like Amazons EC2, Microsofts Azure Allow users to instantiate Virtual Machines Allow users to purchase required quantity when required Allow service providers to maximize the utilization of sunk capital costs Confidentiality is very important
More on attacks Collaborative attacks Mapping of internal cloud infrastructure Identifying likely residence of a target VM Instantiating new VMs until one gets coresident with the target Cross-VM side-channel attacks Extract information from target VM on the same machine
More on attacks
Can one determine where in the cloud infrastructure an instance is located? Can one easily determine if two instances are coresident on the same physical machine? Can an adversary launch instances that will be coresident with other user instances? Can an adversary exploit cross-VM information leakage once co-resident? Answer: Yes to all
59
Risk assessment
Some form of reputable, independent, comparable assessment and description of security features and assurance Sarbanes-Oxley, DIACAP, DISTCAP, etc (are they sufficient for a cloud environment?)
Performed by certified third parties Provides consumers with additional assurance
Minimize Loss of Control MONITORING UTILIZING DIFFERENT CLOUDS ACCESS CONTROL MANAGEMENT IDENTITY MANAGEMENT (IDM)
63
65
Policy incompatibility (combined, what is the overarching policy?) Data dependency between clouds Differing data semantics across clouds Knowing when to utilize the redundancy feature (monitoring technology) Is it worth it to spread your sensitive data across multiple clouds?
Redundancy could increase risk of exposure
Regardless of deployment model, provider needs to manage the user authentication and access control procedures (to the cloud)
Federated Identity Management: access control management burden still lies with the provider Requires user to place a large amount of trust on the provider in terms of security, management, and maintenance of access control policies. This can be burdensome when numerous users from different organizations with different access control policies, are involved
1. Authn request 3. Resource request (XACML Request) + SAML assertion 2. SAML Assertion
IDP
. . .
PEP
PDP
resources
(XACML policies)
ACM
8. Decrypt and verify signature 9. Retrieve capability from ticket 10. Grant or deny access based on capability
6. Determine whether user can access specified resource 7. Create ticket for grant/deny
1. 2. 3. 4. 5. 6.
1. 2. 3. 4. 5. 6.
1. 2. 3. 4. 5. 6.
1. 2. 3. 4. 5. 6.
These systems require a trusted third party and do not work on an untrusted host. If Trusted Third Party is compromised, all the identifying information of the users is also compromised [Latest: AT&T iPad leak]
Loss of control
Sharing sensitive identity information between services can lead to undesirable mapping of the identities to the user.
Minimize Loss of Control: IDM Goals of Proposed User-Centric IDM for the Cloud
1. Authenticate without disclosing identifying information 2. Ability to securely use a service while on an untrusted host (VM on the cloud) 3. Minimal disclosure and minimized risk of disclosure during communication between user and service provider (Man in the Middle, Side Channel and Correlation Attacks) 4. Independence of Trusted Third Party
Active Bundle Anonymous Identification Computing Predicates with encrypted data Multi-Party Computing Selective Disclosure
Includes metadata used for managing confidentiality Both privacy of data and privacy of the whole AB
Includes Virtual Machine (VM)
85
Sensitive Data:
* E( ) - Encrypted Information
Interprets metadata Checks active bundle integrity Enforces access and dissemination control policies
1. E-mail 2. Password
Authenticated
Security Services Agent (SSA) Directory Facilitator Active Bundle Coordinator Trust Evaluation Agent (TEA) Active Bundle Services
Predicate Request* E-mail Password E(Name) E(Shipping Address) E(Billing Address) E(Credit Card)
To become independent of a trusted third party Multiple Services hold shares of the secret key Minimize the risk
K1
K2
K3
Kn
Predicate Reply*
Name Billing Address Credit Card
K1
K2
K3
Kn
*Age Verified
*Credit Card Verified
Selective disclosure* E-mail Password E(Name) E(Shipping Address) E(Billing Address) E(Credit Card) E(E-mail) E(Name) E(Shipping Address)
Selective disclosure* E-mail Password E(Name) E(Shipping Address) E(Billing Address) E(Credit Card) E-mail E(Name) E(Shipping Address)
*e-bay seller shares the encrypted information based on the user policy
1. E-mail 2. Password
1. 2. 3. 4. 5. 6.
1. E-mail
Through putting the user in control of who has his data Identity is being used in the process of authentication, negotiation, and data exchange.
Minimize Multi-tenancy
100
Minimize Multi-tenancy Cant really force the provider to accept less tenants
Can try to increase isolation between tenants
Strong isolation techniques (VPC to some degree)
C.f. VM Side channel attacks (T. Ristenpart et al.)
Conclusion
Cloud computing is sometimes viewed as a reincarnation of the classic mainframe client-server model
However, resources are ubiquitous, scalable, highly virtualized Contains all the traditional threats, as well as new ones
In developing solutions to cloud computing security issues it may be helpful to identify the problems and approaches in terms of
Loss of control Lack of trust Multi-tenancy problems
CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?
Take Amazon cloud for example. store personal data (Simple Storage Service (S3) )
If you want to set up a business. low initial capital investment shorter start-up time for new services lower maintenance and operation costs higher utilization through virtualization easier disaster recovery
wireless bandwidth
Various studies have identified longer battery lifetime as the most desired feature of such systems. longer battery life to be more important than all other features, including cameras or storage. short battery life to be the most disliked characteristic of Apples iPhone 3GS battery life was the top concern of music phone users.
Adopt a new generation of semiconductor technology. Avoid wasting energy. (when it is idle, sleep mode) Execute programs slowly. (When a processors clock speed doubles, the power consumption nearly octuples). Eliminate computation all together. (offloading these applications to the cloud).
S : the speed of cloud to compute C instructions M : the speed of mobile to compute C instructions D : the data need to transmit B : the bandwidth of the wireless Internet
pc
the energy cost per second when the mobile phone is doing computing
Suppose the server is F times fasterthat is, S = F M. We can rewrite the formula as
Energy is saved when this formula produces a positive number. The formula is positive if D/B is sufficiently small compared with C/M and F is sufficiently large.
chess game. A chessboard has 8 8 = 64 positions. Each player controls 16 pieces at the beginning of the game. Each piece may be in one of the 64 possible locations and needs 6 bits to represent the location. To represent a chess games current state, it is sufficient to state that 6 bits 32 pieces = 192 bits = 24 bytes; this is smaller than the size of a typical wireless packet.
The amount of computation for chess is very large; Claude Shannon and Victor Allis estimated the complexity of chess to exceed the number of atoms in the universe. Since the amount of computation C is extremely large, and D is very small, chess provides an example where offloading is beneficial for most wireless networks.
regions like national parks the basement of a building interior of a tunnel, subway. In these cases, where the value of B in Equation can become very small or even zero, cloud computing does not save energy.
There is a fundamental assumption under-lying this analysis with the client-server model: Because the server does not already contain the data, all the data must be sent to the service provider. However, cloud computing changes that assumption: The cloud stores data and performs computation on it. For example, services like Amazon S3 can store data, and Amazon EC2 can be used to perform computation on the data stored using S3.
Another possible privacy and security solution is to use a technique called steganography : Multimedia content like images and videos have significant redundancy. This makes it possible to hide data in multimedia using steganography.
Steganographic techniques can be used to transform the data before storage so that operations can still be performed on the data.
Performing encryption or steganographic techniques before sending data to the cloud requires some additional processing on the mobile system. So the formula become:
cloud computing can potentially save energy for mobile users. not all applications are energy efficient when migrated to the cloud. cloud computing services would be significantly different from cloud services for desktops because they must offer energy savings. The services should consider the energy overhead for privacy, security, reliability, and data communication before offloading.
MOTIVATION
Many applications are being deployed in cloud to leverage the scalability provided by the cloud providers. Tools provided by the cloud providers do not give performance metrics from the network perspective. Network topology is not exposed to the cloud users and the applications consider all network links to be homogeneous. Metrics such as available bandwidth, latency etc. will be more useful to the cloud users.
Experimental Evaluation
Set up
o o o
19 EC2 small instances (US East) 342 links between VMs Ubuntu 10.04 server version
Predefined serialized schedule file at each VM instance. Schedule file contains a time stamp along with the nodes that should communicate for a single reading.
* Iperf - Network testing tool to measure the network throughput between end hosts.
Experimental Evaluation
Iperf takes 6 seconds to get a reading for a single link.
Each round of measurement takes around 30 minutes for finding available bandwidth for all 342 links. Total 5 rounds in total Throughput matrix: Matrix containing estimated values for available bandwidth
Bandwidth Estimation
Shows the CDF of link bandwidth estimation for all the rounds. Used throughput matrix having estimated 342 values. All links in clouds are not homogeneous. Only 10% of the links have available bandwidth less than 400Mbps.
Almost all the machines have average available bandwidth more than 400 Mbps.
CONCLUSIONS
Focussed on available bandwidth metric between each pair of VM instances. Amazon EC2 data center is optimally utilized with ample available bandwidth for almost all VMs. Some badly performing VMs can be pointed out based on the large variation in the available upload/download bandwidth and can be replaced with new VMs.
Future Work
More performance metric such as latency etc. can be considered. These performance metrics can be used to improve the performance of applications running in the cloud. These performance metric tests can be run on large EC2 instances.
Outline
Problem Statement Goals Challenges Context-aware Navigation Components Existing Blind Navigation Aids Proposed System Architecture Advantages of Mobile-Cloud Approach Traffic Lights Detection Related Work System Developed Experiments Work In Progress
Problem Statement
Indoor and outdoor navigation is becoming a harder task for blind and visually impaired people in the increasingly complex urban world Advances in technology are causing the blind to fall behind, sometimes even putting their lives at risk Technology available for context-aware navigation of the blind is not sufficiently accessible; some devices rely heavily on infrastructural requirements
Demographics
314 million visually impaired people in the world today 45 million blind More than 82% of the visually impaired population is age 50 or older The old population forms a group with diverse range of abilities The disabled are seldom seen using the street alone or public transportation
Goals
***Make a difference*** Bring mobile technology in the daily lives of blind and visually impaired people to help achieve a higher standard of life Take a major step in context-aware navigation of the blind and visually impaired Bridge the gap between the needs and available technology Guide users in a non-overwhelming way Protect user privacy
Challenges
Real-time guidance Portability Power limitations Appropriate interface Privacy preservation Continuous availability No dependence on infrastructure Low-cost solution Minimal training
Discussions
Cary Supalo: Founder of Independence Science LLC (http://www.independencescience.com/) T.V. Raman: Researcher at Google, leader of EyesFree project (speech enabled Android applications) American Council of the Blind of Indiana State Convention, 31 October 2009 Miami Lighthouse Organization
Mobility Requirements
Being able to avoid obstacles Walking in the right direction Safely crossing the road Knowing when you have reached a destination Knowing which is the right bus/train Knowing when to get off the bus/train
Gill, J. Assistive Devices for People with Visual Impairments. In A. Helal, M. Mokhtari and B. Abdulrazak, ed., The Engineering Handbook of Smart Technology for Aging, Disability and Indepen John Wiley & Sons, Hoboken, New Jersey, 2008.
Services:
Google Maps (outdoor navigation, pedestrian mode) Micello (indoor location-based service for mobile devices) Object recognition (Selectin software etc) Traffic assistance Obstacle avoidance (Time-of-flight camera technology) Speech interface (Android text-to-speech + speech recognition servers) Remote vision Obstacle minimized route planning
response time(ms)
Work In Progress
Develop fully context-aware navigation system with speech/tactile interface Develop robust object/obstacle recognition algorithms Investigate mobile-cloud privacy and security issues (minimal data disclosure principle) [10] Investigate options for mounting of the camera
Proposed identity-based authentication for cloud computing, based on the identity-based hierarchical model for cloud computing (IBHMCC) and corresponding encryption and signature schemes Being certificate-free, the authentication protocol aligned well with demands of cloud computing
Define the identity of node is the DN string from the root node to the current node itself. The identity of entity N is ID_N = DN_0 || DN_M || DN_N
Deployment of IBHMCC
After that, all nodes in the level-1 get and securely keep their secret keys and the secret points. The public key and the Q-value are publicized. Then, Each node in the level-1 similarly repeats the above steps (2-5).
Identity-Based Encryption
Identity-Based Signature
Jeff Sedayao, Steven Su, Xiaohao Ma, Minghao Jiang, and Kai Miao
CloudCom 09
Simple technique implemented with Open Source software solves the confidentiality of data stored on Cloud Computing Infrastructure by using public key encryption to render stored data at rest unreadable by unauthorized personnel, including system administrators of the cloud computing service on which the data is stored Validated their approach on a network measurement system implemented on PlanetLab Used it on a service where confidentiality is critical a scanning application that validates external firewall implementations
Problem Scope
Goal is to ensure the confidentiality of data at rest Data at rest means that the data that is stored in a readable form on a Cloud Computing service, whether in a storage product like S3 or in a virtual machine instance as in EC2
To protect data at rest, they want to prevent other users in the cloud infrastructure who might have access to the same storage from reading the data our process has stored They also want to prevent system administrators who run the cloud computing service from reading the data. They assume that it is unlikely for an adversary to snoop on the contents of memory. If the adversary had that capability, it is unlikely that we could trust the confidentiality of any of the data that we generated there.
While the administrative staff of the cloud computing service could theoretically monitor the data moving in memory before it is stored in disk, we believe that administrative and legal controls should prevent this from happening. They also do not guard against the modification of the data at rest, although we are likely to be able to detect this.
Solution Design
On a trusted host, collect the encrypted data, as shown in Figure 3, and decrypt it with the collection agents private key which stays on that host. Note that in this case, we are in exclusive control of the private key, which the cloud service provider has no view or control over. They will discuss this feature of our solution later.
Implementation Experiences
Trust Management
Definition of trust The willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor and control that other party.
Attribute of a subject is described by the data property The role in subject ontology represents the capability of a subject to implement a task. Access permission of resources can be encapsulated in the role.
If a subject is assigned to a role, it can access the resources indirectly.
Attribute of an object is described by the data property and object property of OWL with hasObjectDataAttribute and hasObjectAttribute respectively. Object group can also be used to define the rule to organize objects.
Each object group in fact establishes a new object concept, all object individuals of the object concept have object attribute values of the object group.
Action also has properties, known as the ActionAttribute, which describes various information of action for authorization and management. Action group can be defined with helpful for the definition of rules.
The definition of action group, nearly the same with the object group, will not repeat it again.
References
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of Cloud Computing (ver. 15)," National Institute of Standards and Technology, Information Technology Laboratory (October 7 2009). J. McDermott, (2009) "Security Requirements for Virtualization in Cloud Computing," presented at the ACSAC Cloud Security Workshop, Honolulu, Hawaii, USA, 2009. J. Camp. (2001), Trust and Risk in Internet Commerce, MIT Press T. Ristenpart et al. (2009) Hey You Get Off My Cloud, Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA Security and Privacy in Cloud Computing, Dept. of CS at Johns Hopkins University. www.cs.jhu.edu/~ragib/sp10/cs412 Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance by Tim Mather and Subra Kumaraswamy Afraid of outside cloud attacks? You're missing the real threat. http://www.infoworld.com/d/cloud-computing/afraidoutside-cloud-attacks-youre-missing-real-threat-894 Amazon downplays report highlighting vulnerabilities in its cloud service. http://www.computerworld.com/s/article/9140074/Amazon_downplays_report_highlighting_vulnerabilities_in_its_cloud_s ervice Targeted Attacks Possible in the Cloud, Researchers Warn. http://www.cio.com/article/506136/Targeted_Attacks_Possible_in_the_Cloud_Researchers_Warn Vulnerability Seen in Amazon's Cloud-Computing by David Talbot. http://www.cs.sunysb.edu/~sion/research/sion2009mitTR.pdf Cloud Computing Security Considerations by Roger Halbheer and Doug Cavit. January 2010. http://blogs.technet.com/b/rhalbheer/archive/2010/01/30/cloud-security-paper-looking-for-feedback.aspx Security in Cloud Computing Overview.http://www.halbheer.info/security/2010/01/30/cloud-security-paper-lookingfor-feedback Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by T. Ristenpart, E. Tromer, H. Shacham and Stefan Savage. CCS09 Cloud Computing Security. http://www.exforsys.com/tutorials/cloud-computing/cloud-computing-security.html Update From Amazon Regarding Fridays S3 Downtime by Allen Stern. Feb. 16, 2008. http://www.centernetworks.com/amazon-s3-downtime-update R. Ranchal, B. Bhargava, L.B. Othmane, L. Lilien, A. Kim, M. Kang, Protection of Identity Information in Cloud Computing without Trusted Third Party, Third International Workshop on Dependable Network Computing and Mobile Systems (DNCMS) in conjunction with 29th IEEE Symposium on Reliable Distributed System (SRDS) 2010 P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. Lilien, L.B. Othmane, A User-Centric Approach for Privacy and Identity Management in Cloud Computing, 29th IEEE Symposium on Reliable Distributed System (SRDS) 2010 H. Khandelwal, et al., "Cloud Monitoring Framework, Purdue University. Dec 2010.
14. 15.
16. 17. 18.