Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds

被引:0
|
作者
Farroha, Bassam S. [1 ]
Farroha, Deborah L. [1 ]
机构
[1] US Dept Def, Ft George G Meade, MD USA
关键词
D O I
10.1117/12.885023
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements
    Lamp, Josephine
    Rubio-Medrano, Carlos E.
    Zhao, Ziming
    Ahn, Gail-Joon
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 1 - 10
  • [42] The Management of Security: How Robust is the Justification Process?
    Giovanni Manunta
    [J]. Security Journal, 2000, 13 (1) : 33 - 43
  • [43] Analyzing security and energy tradeoffs in autonomic capacity management
    Cunha, Italo
    Viana, Itamar
    Palotti, Jaao
    Almeida, Jussara
    Almeida, Virgilio
    [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 302 - 309
  • [44] Multi-agent systems and security requirements analysis
    Bresciani, P
    Giorgini, P
    Mouratidis, H
    Manson, G
    [J]. SOFTWARE ENGINEERING FOR MULTI-AGENT SYSTEMS II: RESEARCH ISSUES AND PRACTICAL APPLICATIONS, 2004, 2940 : 35 - 48
  • [45] AMSEP: Automated Multi-level Security Management for Multimedia Event Processing
    Ben Abdallah, Hichem
    Abdellatif, Takoua
    Chekir, Faouzi
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 452 - 457
  • [46] Enhancing Security of the Android Platform via Multi-level Security Model
    Oh, Ji-Soo
    Park, Min-Woo
    Chung, Tai-Myoung
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 13 - 24
  • [47] Security requirements for management systems using mobile agents
    Reiser, H.
    Vogt, G.
    [J]. IEEE Symposium on Computers and Communications - Proceedings, 2000, : 160 - 165
  • [48] Supporting Security Requirements for Resource Management in Cloud Computing
    Jhawar, Ravi
    Piuri, Vincenzo
    Samarati, Pierangela
    [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 170 - 177
  • [49] Security requirements model for grid data management systems
    Naqvi, Syed
    Massonet, Philippe
    Arenas, Alvaro
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 30 - 41
  • [50] IOTA: A Framework for Analyzing System-Level Security of IoTs
    Fang, Zheng
    Fu, Hao
    Gu, Tianbo
    Hu, Pengfei
    Song, Jinyue
    Jaeger, Trent
    Mohapatra, Prasant
    [J]. 7TH ACM/IEEE CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2022), 2022, : 143 - 155