A formal model for data storage security evaluation

被引:0
|
作者
Bilski, Tomasz [1 ]
机构
[1] Poznan Tech Univ, Poznan, Poland
关键词
D O I
10.1109/ICCSA.2007.17
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Backup systems use LAN or WAN. The networks and remote systems are not managed by data owner. It is necessary to integrate network storage systems with security mechanisms. There are many solutions to the backup confidentiality problem. In a given application one has to select the solution according to many factors such as: security level, performance, key management issues and overall cost. The optimization problem may be solved with a use of simulation tools. Diverse, general and specific models have been proposed Most of them deal only with parts of the problem. The model presented in the paper is more general. It deals simultaneously with all 3 security attributes. It deals with data lifecycle and utilizes storage and transmission convergence.
引用
收藏
页码:253 / 257
页数:5
相关论文
共 50 条
  • [1] Formal Security Policy Model for a Common Criteria evaluation
    Park, Junkil
    Choi, Jin-Young
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 277 - +
  • [2] Formal methods and security evaluation
    Bolignano, D
    [J]. THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 1999, 1690 : 291 - 291
  • [3] A Security Model for Protecting Data Storage On Cloud to Enhance Security Level by Evasive the Data
    Saxena, Shivani
    Shrivastava, Amit
    Saxena, Aumreesh
    Manoria, Manish
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATION AND TELECOMMUNICATION (ICACAT), 2018,
  • [4] Formal security model of multisignatures
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 146 - 160
  • [5] Reconstructing a formal security model
    Ahn, GJ
    Hong, SP
    Shin, ME
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (11) : 649 - 657
  • [6] Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
    Cremers, Cas
    Dax, Alexander
    Naska, Aurora
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6611 - 6628
  • [7] A NEURAL DATA SECURITY MODEL: ENSURE HIGH CONFIDENTIALITY AND SECURITY IN CLOUD DATA STORAGE ENVIRONMENT
    Jegadeeswari, S.
    Dinadayalan, P.
    Gnanambigai, N.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 400 - 406
  • [8] A Robust Lightweight Data Security Model for Cloud Data Access and Storage
    Pajany, M.
    Zayaraz, G.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2021, 16 (03) : 39 - 53
  • [9] Data Encryption Framework Model with Watermark Security for Data Storage in Public Cloud Model
    Boopathy, D.
    Sundaresan, M.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 903 - 907
  • [10] Data Security Storage Model of the Internet of Things Based on Blockchain
    Wang, Pingshui
    Susilo, Willy
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 36 (01): : 213 - 224