Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Security in the Clouds<br />Service Wave 2010 Panel Discussion<br />Chair: Mike Surridge, IT Innovation<br />ms@it-innovat...
Clouds: Pros and Cons<br />Pros of Cloud-based ICT<br />low up-front investment cost<br />low maintenance costs<br />elast...
Edutain@Grid Project (2006-2009)<br />
Edutain@Grid Business Models<br />Hosters<br />Customers<br />Coordinators<br />
Edutain@Grid Architecture<br />Cm<br />Cm<br />Cm<br />Cm<br />C<br />C<br />C<br />C<br />Co<br />Co<br />Co<br />H<br />...
The Panel<br />Philippe Massonet, CETIC<br />cloud trust and security research challenges<br />Martine Lapierre, Thales<br...
Upcoming SlideShare
Loading in …5
×

Security in the Clouds Panel Chair: Mike Surridge

1,045 views

Published on

Security in the Clouds Panel Chair: Mike Surridge

  • Be the first to comment

Security in the Clouds Panel Chair: Mike Surridge

  1. 1. Security in the Clouds<br />Service Wave 2010 Panel Discussion<br />Chair: Mike Surridge, IT Innovation<br />ms@it-innovation.soton.ac.uk<br />
  2. 2. Clouds: Pros and Cons<br />Pros of Cloud-based ICT<br />low up-front investment cost<br />low maintenance costs<br />elastic and scalable<br />Cons of Cloud-based ICT<br />legal, financial and societal risks<br />operational security, continuity, user management, federation management, etc<br />technical security: authentication, access control, accountability, user isolation, etc<br />
  3. 3. Edutain@Grid Project (2006-2009)<br />
  4. 4. Edutain@Grid Business Models<br />Hosters<br />Customers<br />Coordinators<br />
  5. 5. Edutain@Grid Architecture<br />Cm<br />Cm<br />Cm<br />Cm<br />C<br />C<br />C<br />C<br />Co<br />Co<br />Co<br />H<br />H<br />H<br />H<br />B<br />D<br />A<br />D<br />A<br />A<br />H<br />H<br />A<br />Client layer<br />user-friendly single sign-on<br />Business layer<br />business trust and security federation<br />Management layer<br />access to resources linked to business trust<br />accounting and billing<br />Real-time layer<br />secure app protocols<br />hoster-hoster<br />client-hoster<br />The Client layer<br />The Business layer<br />The Management layer<br />The real-time layer<br />
  6. 6. The Panel<br />Philippe Massonet, CETIC<br />cloud trust and security research challenges<br />Martine Lapierre, Thales<br />secure clouds in practice<br />Peter Burgess, PRIO<br />social/ethical issues<br />Jesus Villesante, CEC<br />the current and future European research programme<br />

×