DocumentCode
2933834
Title
TRONE: Trustworthy and Resilient Operations in a Network Environment
Author
Casimiro, Antonio ; Verissimo, P. ; Kreutz, Diego ; Araujo, Filipe ; Barbosa, Ramiro ; Neves, S. ; Sousa, Bruno ; Curado, Marilia ; Silva, Claudio ; Gandhi, Rajeev ; Narasimhan, Priya
Author_Institution
Univ. of Lisbon, Lisbon, Portugal
fYear
2012
fDate
25-28 June 2012
Firstpage
1
Lastpage
6
Abstract
Cloud infrastructures play an increasingly important role for telecom operators, because they enable internal consolidation of resources with the corresponding savings in hardware and management costs. However, this same consolidation exposes core services of the infrastructure to very disruptive attacks. This is indeed the case with monitoring, which needs to be dependable and secure to ensure proper operation of large datacenters and cloud infrastructures. We argue that currently existing centralized monitoring approaches (e.g., relying on a single solution provider, using single point of failure components) represent a huge risk, because a single vulnerability may compromise the entire monitoring infrastructure. In this paper, we describe the TRONE approach to trustworthy monitoring, which relies on multiple components to achieve increased levels of reliance on the monitoring data and hence increased trustworthiness. In particular, we focus on the TRONE framework for event dissemination, on security-oriented diagnosis based on collected events and on fast network adaptation in critical situations based on multi-homing application support. To validate our work, we will deploy and demonstrate our solutions in a live environment provided by Portugal Telecom.
Keywords
cloud computing; computer network security; trusted computing; Portugal Telecom; TRONE framework; centralized monitoring approach; cloud infrastructures; datacenters; disruptive attacks; event dissemination; multihoming application support; network adaptation; resource consolidation; security-oriented diagnosis; telecom operators; trustworthy and resilient operations in a network environment; trustworthy monitoring; Cloud computing; Monitoring; Peer to peer computing; Quality of service; Resilience; Security; Telecommunications; Cloud Computing; Intrusion Tolerance; Root-Cause Analysis; Trustworthy Monitoring;
fLanguage
English
Publisher
ieee
Conference_Titel
Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on
Conference_Location
Boston, MA
Print_ISBN
978-1-4673-2264-5
Electronic_ISBN
978-1-4673-2265-2
Type
conf
DOI
10.1109/DSNW.2012.6264694
Filename
6264694
Link To Document