Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds

被引:0
|
作者
Farroha, Bassam S. [1 ]
Farroha, Deborah L. [1 ]
机构
[1] US Dept Def, Ft George G Meade, MD USA
关键词
D O I
10.1117/12.885023
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Multi-level security requirements for hypervisors
    Karger, PA
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 240 - 248
  • [2] Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network
    Patel, Jaykumar Shantilal
    Chavda, Vijaykumar M.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 23 - 28
  • [3] Multi-Level Proactive Security Auditing for Clouds
    Majumdar, Suryadipta
    Tabiban, Azadeh
    Mohammady, Meisam
    Oqaily, Alaa
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    [J]. 2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 219 - 226
  • [4] A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Yahyapour, Ramin
    Khodadadix, Touraj
    [J]. 2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2018, : 505 - 510
  • [5] CloudS: A Multi-Cloud Storage System with Multi-Level Security
    Shen, Lu
    Feng, Shifang
    Sun, Jinjin
    Li, Zhongwei
    Su, Ming
    Wang, Gang
    Liu, Xiaoguang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2036 - 2043
  • [6] Analyzing and Evaluating Security Features in Software Requirements
    Malhotra, Ruchika
    Chug, Anuradha
    Hayrapetian, Allenoush
    Raje, Rajeev
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
  • [7] Analyzing Security Requirements in Timed Workflow Processes
    Du, Yanhua
    Wang, Yang
    Yang, Benyuan
    Hu, Hesuan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 190 - 207
  • [8] Analyzing and Enforcing Security Mechanisms on Requirements Specifications
    Li, Tong
    Horkoff, Jennifer
    Mylopoulos, John
    [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY ( REFSQ 2015), 2015, 9013 : 115 - 131
  • [9] Analyzing regulatory rules for privacy and security requirements
    Breaux, Travis D.
    Anton, Annie I.
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 5 - 20
  • [10] Robust unit commitment with security criteria
    Gourtani, Arash
    Xu, Huifu
    Pozo, David
    Tri-Dung Nguyen
    [J]. MATHEMATICAL METHODS OF OPERATIONS RESEARCH, 2016, 83 (03) : 373 - 408