GEODAC: A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services

被引:12
|
作者
Li, Jun [1 ]
Stephenson, Bryan [1 ]
Motahari-Nezhad, Hamid R. [1 ]
Singhal, Sharad [1 ]
机构
[1] Hewlett Packard Labs, Palo Alto, CA 94304 USA
关键词
Security and privacy in services; security and privacy management in data collection; transformation and dissemination; service oriented computing; software as a service; services delivery platform and methodology;
D O I
10.1109/TSC.2010.53
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many cloud service providers offer outsourcing capabilities to businesses using the software-as-a-service delivery model. In this delivery model, sensitive business data need to be stored and processed outside the control of the business. The ability to manage data in compliance with regulatory and corporate policies, which we refer to as data assurance, is an essential success factor for this delivery model. There exist challenges to express service data assurance capabilities, capture customers' requirements, and enforce these policies inside service providers' environments. This paper addresses these challenges by proposing Global Enforcement Of Data Assurance Controls (GEODAC), a policy framework that enables the expression of both service providers' capabilities and customers' requirements, and enforcement of the agreed-upon data assurance policies in service providers' environments. High-level policy statements are backed in the service environment with a state machine-based representation of policies in which each state represents a data lifecycle stage. Data assurance policies that define requirements on data retention, data migration, data appropriateness for use, etc. can be described and enforced. The approach has been implemented in a prototype tool and evaluated in a services environment.
引用
收藏
页码:340 / 354
页数:15
相关论文
共 50 条
  • [1] The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
    Ferraiolo, David
    Atluri, Vijayalakshmi
    Gavrila, Serban
    JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (04) : 412 - 424
  • [2] Confidentiality enforcement for XML outsourced data
    Carminati, Barbara
    Ferrari, Elena
    CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 234 - 249
  • [3] Outsourced Private Function Evaluation with Privacy Policy Enforcement
    Kunihiro, Noboru
    Nishide, Takashi
    Lu, Wen-Jie
    Sakuma, Jun
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 412 - 423
  • [4] Using RDF for policy specification and enforcement
    Carminati, B
    Ferrari, E
    Thuraisingham, B
    15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 163 - 167
  • [5] FRAMEWORK FOR DATA QUALITY ASSURANCE BETWEEN COMPOSITE SERVICES
    Lee, Jung-Won
    Choi, Byoungju
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2009, 19 (03) : 307 - 337
  • [6] Offshoring IT Services: A Framework for Managing Outsourced Projects
    Lo, Henry
    ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 2006, 24 (01):
  • [7] Qualitative constraint enforcement in advanced policy specification
    Mileo, Alessandra
    Schaub, Torsten
    SYMBOLIC AND QUANTITATIVE APPROACHES TO REASONING WITH UNCERTAINTY, PROCEEDINGS, 2007, 4724 : 695 - +
  • [8] A framework for composable security definition, assurance, and enforcement
    Pavlich-Mariscal, JA
    Demurjian, SA
    Michel, LD
    SATELLITE EVENTS AT THE MODELS 2005 CONFERENCE, 2006, 3844 : 353 - 354
  • [9] Specification and Deployment of Integrated Security Policies for Outsourced Data
    Bkakria, Anis
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Gross-Amblard, David
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 17 - 32
  • [10] A Policy Framework for Data Management in Services Marketplaces
    Li, Jun
    Stephenson, Bryan
    Singhal, Sharad
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 560 - 565