The Community for Technology Leaders
2011 IEEE Third International Conference on Cloud Computing Technology and Science (2011)
Athens, Greece
Nov. 29, 2011 to Dec. 1, 2011
ISBN: 978-0-7695-4622-3
pp: 247-254
ABSTRACT
Cloud Computing provides an optimal infrastructure to utilise and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximise its utilisation. Cloud Computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to the time and financial constraints of many user communities. The growing number of communities that are adopting large public cloud resources such as Amazon Web Services [1] or Microsoft Azure [2] proves the success and hence usefulness of the Cloud Computing paradigm. Nonetheless, the typical use cases for public clouds involve non-business critical applications, particularly where issues around security of utilization of applications or deposited data within shared public services are binding requisites. In this paper, a use case is presented illustrating how the integration of Trusted Computing technologies into an available cloud infrastructure -- Eucalyptus -- allows the security-critical energy industry to exploit the flexibility and potential economical benefits of the Cloud Computing paradigm for their business-critical applications.
INDEX TERMS
Cloud Computing, Trusted Computing, Cloud Security, energy industry
CITATION

M. Turilli et al., "myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment," 2011 IEEE Third International Conference on Cloud Computing Technology and Science(CLOUDCOM), Athens, Greece, 2011, pp. 247-254.
doi:10.1109/CloudCom.2011.41
694 ms
(Ver 3.3 (11022016))