• Save
Security in the Clouds Panel Chair: Mike Surridge
Upcoming SlideShare
Loading in...5
×
 

Security in the Clouds Panel Chair: Mike Surridge

on

  • 915 views

Security in the Clouds Panel Chair: Mike Surridge

Security in the Clouds Panel Chair: Mike Surridge

Statistics

Views

Total Views
915
Views on SlideShare
915
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Security in the Clouds Panel Chair: Mike Surridge Security in the Clouds Panel Chair: Mike Surridge Presentation Transcript

  • Security in the Clouds
    Service Wave 2010 Panel Discussion
    Chair: Mike Surridge, IT Innovation
    ms@it-innovation.soton.ac.uk
  • Clouds: Pros and Cons
    Pros of Cloud-based ICT
    low up-front investment cost
    low maintenance costs
    elastic and scalable
    Cons of Cloud-based ICT
    legal, financial and societal risks
    operational security, continuity, user management, federation management, etc
    technical security: authentication, access control, accountability, user isolation, etc
  • Edutain@Grid Project (2006-2009)
  • Edutain@Grid Business Models
    Hosters
    Customers
    Coordinators
  • Edutain@Grid Architecture
    Cm
    Cm
    Cm
    Cm
    C
    C
    C
    C
    Co
    Co
    Co
    H
    H
    H
    H
    B
    D
    A
    D
    A
    A
    H
    H
    A
    Client layer
    user-friendly single sign-on
    Business layer
    business trust and security federation
    Management layer
    access to resources linked to business trust
    accounting and billing
    Real-time layer
    secure app protocols
    hoster-hoster
    client-hoster
    The Client layer
    The Business layer
    The Management layer
    The real-time layer
  • The Panel
    Philippe Massonet, CETIC
    cloud trust and security research challenges
    Martine Lapierre, Thales
    secure clouds in practice
    Peter Burgess, PRIO
    social/ethical issues
    Jesus Villesante, CEC
    the current and future European research programme