{"title":"Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement Algorithms","authors":"E. Caron, Anh Dung Le, Arnaud Lefray, C. Toinard","doi":"10.1109/CyberC.2013.28","DOIUrl":null,"url":null,"abstract":"Nowadays, Cloud Computing is becoming a key factor in computer science. Besides the great benefits it brought to the information technology and to the economy, Cloud Computing shows some weakness when looking at the security. An IaaS client should be able to specify its security requirements. But the lack of a system of security metrics leads to the incapability of quantifying the security level of a client deployment in a Cloud. Therefore, we propose a system of security metrics specific to the Cloud Computing and use it to develop virtual machines placement algorithms.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberC.2013.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
Nowadays, Cloud Computing is becoming a key factor in computer science. Besides the great benefits it brought to the information technology and to the economy, Cloud Computing shows some weakness when looking at the security. An IaaS client should be able to specify its security requirements. But the lack of a system of security metrics leads to the incapability of quantifying the security level of a client deployment in a Cloud. Therefore, we propose a system of security metrics specific to the Cloud Computing and use it to develop virtual machines placement algorithms.