DocumentCode :
2027822
Title :
Flying over Mobile Clouds with Security Planes: Select Your Class of SLA for End-to-End Security
Author :
Lacoste, M. ; Wailly, A. ; Tabourin, Aymeric ; Habermacher, Loic ; Le Guillou, Xavier ; Wary, Jean-Philippe
Author_Institution :
Dept. of Security, Orange Labs., Issy-Les-Moulineaux, France
fYear :
2013
fDate :
9-12 Dec. 2013
Firstpage :
50
Lastpage :
59
Abstract :
End-to-end security is one of the biggest challenges for mobile clouds today: mobile cloud computing may mean the worst of cloud and device worlds regarding threats. Unfortunately, previous solutions considered the problem from one end only, lacking device-to-cloud virtual organizations (VOrgs), end-to-end VOrg isolation, and automated security supervision. This paper presents Orange MC2, a new security architecture and implementation overcoming such limitations. For homogeneous security SLA guarantees, execution environments in device and cloud domains are dynamically set up into VOrgs called MC2s, forming end-to-end security planes over the infrastructure. Strict plane separation is agnostic to underlying isolation mechanisms using a policy framework for security policy distribution and enforcement throughout an MC2. Security may be autonomically regulated at several levels of granularity in MC2s, both across domains and infrastructure layers. The paper also reports on a case study implementation. Results show that the architecture may be deployed effectively in practice, offering a first simple solution for selective end-to-end mobile cloud security, with interesting perspectives for a network operator.
Keywords :
cloud computing; mobile computing; security of data; Orange MC2; SLA; automated security supervision; device-to-cloud virtual organization; end-to-end VOrg isolation; end-to-end mobile security; mobile cloud computing; security architecture; security plane; security policy distribution; Cloud computing; Hardware; Logic gates; Mobile communication; Mobile computing; Security; Virtual machine monitors; End-to-End Security; Mobile Cloud Security; Security Architecture; Security SLA; Self-Protecting System;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Utility and Cloud Computing (UCC), 2013 IEEE/ACM 6th International Conference on
Conference_Location :
Dresden
Type :
conf
DOI :
10.1109/UCC.2013.25
Filename :
6809339
Link To Document :
بازگشت