Location-Based Security Framework for Cloud Perimeters

被引:7
|
作者
Jaiswal, Chetan [1 ]
Nath, Mahesh [1 ]
Kumar, Vijay [2 ]
机构
[1] Univ Missouri, Kansas City, MO 64110 USA
[2] Univ Missouri, Dept Comp Sci, Kansas City, MO 64110 USA
来源
IEEE CLOUD COMPUTING | 2014年 / 1卷 / 03期
基金
美国国家科学基金会;
关键词
cloud; firewall; geolocation; mobile perimeter protection; security; unsafe locations;
D O I
10.1109/MCC.2014.59
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authors present an approach to compose firewall policies to protect mobile and static cloud perimeters. The approach introduces location in the firewall to filter out attacks from unsafe locations, which requires identification of unsafe locations. The authors present two ways to discover attack locations for mobile and static clouds. © 2014 IEEE.
引用
收藏
页码:56 / 64
页数:9
相关论文
共 50 条
  • [31] Enabling Location-based Policies in a Healthcare Cloud Computing Environment
    Zickau, Sebastian
    Thatmann, Dirk
    Ermakova, Tatiana
    Repschlaeger, Jonas
    Zarnekow, Ruediger
    Kuepper, Axel
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 333 - 338
  • [32] LocaWard: A Security and Privacy Aware Location-Based Rewarding System
    Li, Ming
    Salinas, Sergio
    Li, Pan
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 343 - 352
  • [33] Trust-enhanced Security in Location-based Adaptive Authentication
    Lenzini, Gabriele
    Bargh, Mortaza S.
    Hulsebosch, Bob
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 105 - 119
  • [34] Investigating the relationship between location-based services and national security
    Tootell, Holly
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2518 - 2521
  • [35] Control, trust, privacy, and security: Evaluating location-based services
    Perusco, Laura
    Michael, Katina
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2007, 26 (01) : 4 - 16
  • [36] Security awareness and the use of location-based services, technologies and games
    School of Computer, Statistical and Mathematical Sciences, North-West University, Potchefstroom Campus, South Africa
    [J]. Int. J. Electron. Secur. Digit. Forensics, 4 (293-325):
  • [37] Improved Fast Location-Based Handover with Integrated Security Features
    Kastell, Kira
    [J]. FREQUENZ, 2009, 63 (1-2) : 32 - 35
  • [38] A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks
    Yan, Gongjun
    Lin, Jingli
    Rawat, Danda B.
    Yang, Weiming
    [J]. INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 693 - +
  • [39] The transfer of location-based control requires location-based conflict
    Lauren Pickel
    Jay Pratt
    Blaire J. Weidler
    [J]. Attention, Perception, & Psychophysics, 2019, 81 : 2788 - 2797
  • [40] The transfer of location-based control requires location-based conflict
    Pickel, Lauren
    Pratt, Jay
    Weidler, Blaire J.
    [J]. ATTENTION PERCEPTION & PSYCHOPHYSICS, 2019, 81 (08) : 2788 - 2797