Securing the Hybrid Cloud

Securing The Hybrid Cloud

With the increasing use of cloud computing, wireless technology, and mobile devices, you no longer have well-defined boundaries regarding what is internal and what is external to your systems. You must assess whether holes or vulnerabilities exist across servers, network, infrastructure components, and endpoints, and then continuously monitor them. In other words, you need to be able to trust your own infrastructure as well as a cloud provider’s infrastructure as a possible weakness in either or both will affect your data’s integrity.
In addition, security is not just about technology it is also about standard operating procedures and work practices. Policies and standards must be adapted and updated to address the challenges that cloud environments bring. A cloud customers overall security of its data must be addressed through service level agreements and regulations in addition to the use of technology for security provision. The work proposed here addresses the development of an appropriate service to enable users of the public Cloud to keep track of service providers and to determine whether they are offering the agreed level of service or not, in relation to a customer’s data, its security and integrity.

In this work an analyses of the strategic imperatives of the cloud computing industry as a whole is researched. The analysis is necessary so that an understanding of both the opportunities and challenges to the fledgling industry is gained. The various stakeholders in cloud computing are to be discussed and the relevant issues that they will need to consider will be presented. The nature and role of the regulatory bodies that oversee cloud computing will be fully discussed as they will be a necessary participant in any and all service level agreement discussions. Two sets of recommendations will be presented — one for the practitioners and the other for the researchers in the cloud computing area. Service level agreement (SLA) specification languages that integrate into Java will be used for the generation of the SLAs.

Funding

The project is funded by an Erasmus Leaders Scholarship.
The funded Researcher is Lubna Luxmi Dhirani (This email address is being protected from spambots. You need JavaScript enabled to view it.
Project Supervisors: Dr Thomas Newe (UL) and Dr Shahzad Nizamani (Mehran University of Engineering and Technology, Pakistan).