PUMA
Istituto di Informatica e Telematica     
Lazouski A., Mancini G., Martinelli F., Mori P. Usage Control in Cloud Systems. Technical report, 2012.
 
 
Abstract
(English)
Cloud systems [1] are becoming very common in the last years because of their advantages, such as the big computational power available on demand, and the possibility to ask for further resources or to release unused resources while the computation is running. As a matter of fact, the Cloud environment allows the user to exploit the resources he needs for his computation only when he actually needs them. Distinct Cloud service models are available, depending on the kind of resources that are provided to users. This document is focused on the Infrastructure as a Service (IaaS) model, where the provided resources are virtual machines connected by a virtual network. When requesting virtual machines, users can choose the features of these machines, such as the computational power and the storage capacity, the most proper network configuration and operating system and can run on these virtual machines the applications they need. Once requested, the machines are available in few time and the number and/or the features of these machines can be updated by the users (increased or decreased) on demand during the computation according to their needs. At the end of their computation, users will pay a fee depending on the number of machines and the computational time they exploited.
Subject usage control
Cloud Systems
D.4.6 Security and Protection


Icona documento 1) Download Document PDF


Icona documento Open access Icona documento Restricted Icona documento Private

 


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional