With our publications we cover the most diverse research areas that arise in the field of man, task and technology. In addition to traditional Business Information Systems topics such as knowledge management and business process management, you will also find articles on current topics such as blended learning, cloud computing or smart grids. Use this overview to get an impression of the range and possibilities of research in Business Information Systems at the University of Duisburg-Essen.
Type of Publication: Article in Collected Edition
Towards Secure and At-Runtime Tailorable Customer-Driven Public Cloud Deployment
- Karatas, Fatih; Bourimi, Mohamed; Gimenez, Rafael; Schwittek, Widura; Planaguma, Marc
- Title of Anthology:
- Proceedings of the 9th International IEEE Workshop on Managing Ubiquitous Communications and Services, part of the IEEE International Conference on Pervasive Computing and Communications, (PerCom) 2012
- Publication Date:
- Digital Object Identifier (DOI):
- Link to complete version:
- Download BibTeX
Cloud computing as a facility for outsourcing IT related tasks is a growing trend. Customer-driven application deployment in public clouds has to be secure and flexible by means of easing security configuration as well as by avoiding the vendor lock-in problem. In this paper we present an approach intending to meet these needs by (1) easing security configuration(s), (2) automating the consideration of security best practices and adding/enabling anonymity components at-runtime, and (3) by using Open Virtualization Format (OVF) in order to overcome the vendor lock-in problem. The requirements gathering is based on the needs of three projects from different business domains, the EU FP7 digital.me project, the multidisciplinary iFishWatcher/iAngle combined project and the joint german-french research and development project ReSCUe IT. All projects require empowering lay as well as experienced customers to (re-)deploy their own applications and migrate them easily by considering security thereby. Supporting tailorability of the deployed environment by adding anonymity components at-runtime without downtimes is a specific requirement in these projects. We present first results and discuss experiences and future work directions.