资源描述:
《Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、ControllingDataintheCloud:OutsourcingComputationwithoutOutsourcingControlRichardChow,PhilippeGolle,MarkusJakobsson,RyusukeMasuoka,JesusMolinaElaineShi,JessicaStaddonPARCFujitsuLaboratoriesofAmerica{rchow,pgolle,mjakobss,eshi,staddon}{ryusuke.masuoka,je
2、sus.molina}@parc.com@us.fujitsu.comABSTRACTregulatoryreasonsandtoeaseconcernoverthepotentialfordatabreaches.Becauseoftoday’sperceivedlackofcontrol,largerCloudcomputingisclearlyoneoftoday’smostenticingcompaniesaretestingthewaterswithsmallerprojectsandle
3、sstechnologyareasdue,atleastinpart,toitscost-efficiencyandsensitivedata.Inshort,thepotentialofthecloudisnotbeingflexibility.However,despitethesurgeinactivityandinterest,realized.therearesignificant,persistentconcernsaboutcloudcomputingthatareimpedingmo
4、mentumandwilleventuallycompromisetheWhenthinkingaboutsolutionstocloudcomputing’sadoptionvisionofcloudcomputingasanewITprocurementmodel.Inthisproblem,itisimportanttorealizethatmanyoftheissuesarepaper,wecharacterizetheproblemsandtheirimpactonadoption.ess
5、entiallyoldproblemsinanewsetting,althoughtheymaybeInaddition,andequallyimportantly,wedescribehowthemoreacute.Forexample,corporatepartnershipsandoffshorecombinationofexistingresearchthrustshasthepotentialtooutsourcinginvolvesimilartrustandregulatoryissu
6、es.Similarly,alleviatemanyoftheconcernsimpedingadoption.Inparticular,opensourcesoftwareenablesITdepartmentstoquicklybuildandwearguethatwithcontinuedresearchadvancesintrusteddeployapplications,butatthecostofcontrolandgovernance.computingandcomputation-s
7、upportingencryption,lifeintheFinally,virtualmachineattacksandWebservicevulnerabilitiescloudcanbeadvantageousfromabusinessintelligencestandpointexistedlongbeforecloudcomputingbecamefashionable.Indeed,overtheisolatedalternativethatismorecommontoday.thisv
8、eryoverlapisreasonforoptimism;manyofthese“cloudCategoriesandSubjectDescriptorsproblems”havelongbeenstudiedandthefoundationsforsolutionsexist.K.6.5[ManagementofComputingandInformationSystems]:SecurityandProtection(D.4.6,K.4.2)Inourvision