Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds

被引:0
|
作者
Farroha, Bassam S. [1 ]
Farroha, Deborah L. [1 ]
机构
[1] US Dept Def, Ft George G Meade, MD USA
关键词
D O I
10.1117/12.885023
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Management of groups and group keys in multi-level security environments
    Alhammouri, Mohammad
    Muftic, Sead
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2007, 4680 : 75 - 80
  • [32] Security Management in the industrial Automation Requirements and Functions
    Kobes, P.
    Gummersbach, J. -L.
    Palmin, A.
    Talanis, T.
    Schoenmueller, B.
    AUTOMATION 2011, 2011, 213 : 191 - 194
  • [33] A Scalable Method for Partitioning Workflows with Security Requirements over Federated Clouds
    Wen, Zhenyu
    Cala, Jacek
    Watson, Paul
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 122 - 129
  • [34] Using the common criteria to elicit security requirements with use cases
    Ware, Michael S.
    Bowles, John B.
    Eastman, Caroline M.
    PROCEEDINGS OF THE IEEE SOUTHEASTCON 2006, 2006, : 273 - 278
  • [35] Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
    Sun, Nan
    Li, Chang-Tsun
    Chan, Hin
    Le, Ba Dung
    Islam, Md Zahidul
    Zhang, Leo Yu
    Islam, Md Rafiqul
    Armstrong, Warren
    IEEE ACCESS, 2022, 10 : 44756 - 44777
  • [36] A comparison of the common criteria with proposals of information systems security requirements
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 654 - +
  • [37] Ontological mapping of common criteria's security assurance requirements
    Ekelhart, Andreas
    Fenz, Stefan
    Goluch, Gernot
    Wcippl, Edgar
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 85 - +
  • [38] Security Requirements Elicitation Using Method Weaving and Common Criteria
    Saeki, Motoshi
    Kaiya, Haruhiko
    MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
  • [39] Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection
    Aladwan, Mohammad
    Awaysheh, Feras
    Cabaleiro, Jose
    Pena, Tomas
    Alabool, Hamzeh
    Alazab, Mamoun
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 814 - 820
  • [40] The Methodology of Security Management Cost Reduction using Security Level Lifecycle
    Kim, Sung-Hwan
    Eom, Jung -Ho
    Chung, Tai-Myoung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 205 - 214