Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds

被引:0
|
作者
Farroha, Bassam S. [1 ]
Farroha, Deborah L. [1 ]
机构
[1] US Dept Def, Ft George G Meade, MD USA
关键词
D O I
10.1117/12.885023
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] MULTI-LEVEL SECURITY IN DATABASE MANAGEMENT SYSTEMS.
    Dwyer, Patricia A.
    Jelatis, George D.
    Thuraisingham, Bhavani M.
    Computers and Security, 1987, 6 (03): : 252 - 260
  • [22] Security Policies Based On Security Requirements Of City Emergency Management Information System Multi-layer Structure
    Yan Hai
    Zhao Chong
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 351 - 354
  • [23] Security-Aware Energy Management in Clouds
    Mao, Jianzhou
    Cao, Ting
    Peng, Xiaopu
    Bhattacharya, Tathagata
    Ku, Wei-Shinn
    Qin, Xiao
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 284 - 293
  • [24] Per-service Security SLA: a New Model for Security Management in Clouds
    Casola, Valentina
    De Benedictis, Alessandra
    Modic, Jolanda
    Rak, Massimiliano
    Villano, Umberto
    2016 IEEE 25TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2016, : 83 - 88
  • [25] Access Control and Security Properties Requirements Specification for Clouds' SecLAs
    Guesmi, Asma
    Clemente, Patrice
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 723 - 729
  • [26] Towards security requirements management for software product lines:: A security domain requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 361 - 371
  • [27] Formalizing workflows partitioning over federated clouds: multi-level security and costs
    Freitas, Leo
    Watson, Paul
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2014, 91 (05) : 881 - 906
  • [28] Cloud Security Distributary Set (CSDS): A Policy-Based Framework to Define Multi-Level Security Structure in Clouds
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Cemberci, Suleyman Berk
    Yahyapour, Ramin
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 74 - 79
  • [29] SemanticLIFE collaboration: Security requirements and solutions - Security aspects of semantic knowledge management
    Weippl, ER
    Schatten, A
    Karim, S
    Tjoa, AM
    PRACTICAL ASPECTS OF KNOWLEDGE MANAGEMENT, PROCEEDINGS, 2004, 3336 : 365 - 377
  • [30] Security Requirements of a Mobile Device Management System
    Rhee, Keunwoo
    Jeon, Woongryul
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 353 - 358