An architecture for a resilient cloud computing infrastructure

Technologies for Homeland Security(2013)

引用 6|浏览2
暂无评分
摘要
This paper proposes an architecture for a resilient cloud computing infrastructure that provably maintains cloud functionality against persistent successful corruptions of cloud nodes. The architecture is composed of a self-healing software mechanism for the entire cloud, as well as hardware-assisted regeneration of compromised (or faulty) nodes from a pristine state. Such an architecture aims to secure critical distributed cloud computations well beyond the current state of the art by tolerating, in a seamless fashion, a continuous rate of successful corruptions up to certain corruption rate limit, e.g., 30% of all cloud nodes may be corrupted within a tunable window of time. The proposed architecture achieves these properties based on a principled separation of distributed task supervision from the computation of user-defined jobs. The task supervision and enduser communication are performed by a new software mechanism called the Control Operations Plane (COP), which builds a trustworthy and resilient, self-healing cloud computing infrastructure out of the underlying untrustworthy and faulty hosts. The COP leverages provably-secure cryptographic protocols that are efficient and robust in the presence of many corrupted participants - such a cloud regularly and unobtrusively refreshes itself by restoring COP nodes from a pristine state at regular intervals.
更多
查看译文
关键词
cloud computing,cryptographic protocols,fault tolerant computing,software architecture,cop,cloud functionality,cloud nodes,compromised nodes,control operations plane,corruption rate limit,critical distributed cloud computations,distributed task supervision,enduser communication,faulty nodes,hardware-assisted regeneration,principled separation,pristine state,provably-secure cryptographic protocols,resilient cloud computing infrastructure,self-healing cloud computing infrastructure,self-healing software mechanism,user-defined jobs,proactive security,resilient computation,secure computation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要