2015 IEEE International Conference on Cloud Engineering 2015
DOI: 10.1109/ic2e.2015.40
|View full text |Cite
|
Sign up to set email alerts
|

Using Open Stack for an Open Cloud Exchange(OCX)

Abstract: Abstract-We are developing a new public cloud, the Massachusetts Open Cloud (MOC) based on the model of an Open Cloud eXchange (OCX). We discuss in this paper the vision of an OCX and how we intend to realize it using the OpenStack open-source cloud platform in the MOC. A limited form of an OCX can be achieved today by layering new services on top of OpenStack. We have performed an analysis of OpenStack to determine the changes needed in order to fully realize the OCX model. We describe these proposed changes,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…We then construct a new, stronger one-time token mechanism that is a more stringent variant of the mechanism proposed in [25], and we prove that this mechanism suffices for realizing an ideal cloud that provides some meaningful security properties even when some of the services are fully corrupted. In a nutshell, our mechanism has Keystone generate a token that is authenticated via a cryptographic authentication tag, using Keystone's own master secret key.…”
Section: Security Weaknesses Formalizedmentioning
confidence: 98%
See 1 more Smart Citation
“…We then construct a new, stronger one-time token mechanism that is a more stringent variant of the mechanism proposed in [25], and we prove that this mechanism suffices for realizing an ideal cloud that provides some meaningful security properties even when some of the services are fully corrupted. In a nutshell, our mechanism has Keystone generate a token that is authenticated via a cryptographic authentication tag, using Keystone's own master secret key.…”
Section: Security Weaknesses Formalizedmentioning
confidence: 98%
“…Indeed, previous works (e.g. [25]) have already pointed out this weakness and proposed limiting the scope of these bearer tokens by setting expiration times and other scoping mechanisms. 1 It should be stressed that, upon each new use of the token, each new service verifies the token again with Keystone.…”
Section: Security Weaknesses Formalizedmentioning
confidence: 99%
“…These applications need to be composed and made to interoperate to support citizens' needs for online services. Similarly, the Massachusetts Open Cloud [4] is a marketplace (Open Cloud Exchange (OCX)) to encourage small business development. Solutions are open and one may build on the services of another.…”
Section: Introductionmentioning
confidence: 99%
“…The triangleended purple line indicates the hourly profit that this vendor can make by renting all of these extra 5000 instances over the spot market. The spot market prices used for the c4.xlarge instances in this figure are obtained from Amazon for July [13][14][15][16][17][18][19][20]2015.…”
Section: An Economical Incentive Analysismentioning
confidence: 99%
“…• enable a marketplace model for data centers [11,17], providing the interface between hardware providers and users of this hardware, who are in turn free to adopt whichever provisioning tool or software deployment mechanism that best fits their needs,…”
Section: Introductionmentioning
confidence: 99%