Tackling cloud security issues and forensics model

Shaftab Ahmed, M. Yasin, Akhtar Raja
{"title":"Tackling cloud security issues and forensics model","authors":"Shaftab Ahmed, M. Yasin, Akhtar Raja","doi":"10.1109/HONET.2010.5715771","DOIUrl":null,"url":null,"abstract":"Cloud computing is getting increased attention of the information and communication technologies (ICT) industry recently. The cloud service providers foresee it as a source of promising financial gains, the clients find it a convenient solution where the enterprises may get started on their computing activities without investing on the in-house facilities of hardware and software. They can outsource the computing and archiving activities to the cloud service providers (CSP) though Internet. There are many dimensions of these activities and the researchers are trying to find acceptable solutions for the industry. In this paper, we have focused on the information security issues when migrating to a cloud environment. The confidence of end user can be won partially by the guarantees of service provider and use of cryptographic techniques. It is important that the Intrusion Detection Systems (IDS) should be included in the models which support forensic study whenever required. It is equally important to address the issue of anti-forensic methods that the service providers may use to hide their malicious activities. Therefore the clients would like to have a better, in-depth knowledge of information management at service providers' end. For this purpose tools to probe into the cloud services are required. To elaborate on this issue we have chosen the data archiving and storage model used for medical service providers and hospitals. It is a classic test-case where Patients' history has to be maintained under the guidelines of HIPPA. The Amazon security model has been reviewed for this purpose both for archiving and disaster recovery. An acceptable security model over the cloud architecture is also proposed.","PeriodicalId":197677,"journal":{"name":"7th International Symposium on High-capacity Optical Networks and Enabling Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"38","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"7th International Symposium on High-capacity Optical Networks and Enabling Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HONET.2010.5715771","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 38

Abstract

Cloud computing is getting increased attention of the information and communication technologies (ICT) industry recently. The cloud service providers foresee it as a source of promising financial gains, the clients find it a convenient solution where the enterprises may get started on their computing activities without investing on the in-house facilities of hardware and software. They can outsource the computing and archiving activities to the cloud service providers (CSP) though Internet. There are many dimensions of these activities and the researchers are trying to find acceptable solutions for the industry. In this paper, we have focused on the information security issues when migrating to a cloud environment. The confidence of end user can be won partially by the guarantees of service provider and use of cryptographic techniques. It is important that the Intrusion Detection Systems (IDS) should be included in the models which support forensic study whenever required. It is equally important to address the issue of anti-forensic methods that the service providers may use to hide their malicious activities. Therefore the clients would like to have a better, in-depth knowledge of information management at service providers' end. For this purpose tools to probe into the cloud services are required. To elaborate on this issue we have chosen the data archiving and storage model used for medical service providers and hospitals. It is a classic test-case where Patients' history has to be maintained under the guidelines of HIPPA. The Amazon security model has been reviewed for this purpose both for archiving and disaster recovery. An acceptable security model over the cloud architecture is also proposed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
解决云安全问题和取证模型
云计算最近越来越受到信息通信技术(ICT)行业的关注。云服务提供商将其视为有希望的财务收益的来源,客户发现它是一个方便的解决方案,企业可以在不投资硬件和软件的内部设施的情况下开始其计算活动。他们可以通过互联网将计算和存档活动外包给云服务提供商(CSP)。这些活动有很多方面,研究人员正试图为行业找到可接受的解决方案。在本文中,我们重点讨论了迁移到云环境时的信息安全问题。服务提供商的保证和加密技术的使用可以在一定程度上赢得终端用户的信任。重要的是,入侵检测系统(IDS)应该包括在模型中,以便在需要时支持法医研究。解决服务提供商可能用来隐藏其恶意活动的反取证方法问题同样重要。因此,客户希望在服务提供商端对信息管理有一个更好、更深入的了解。为此,需要探测云服务的工具。为了详细说明这个问题,我们选择了医疗服务提供商和医院使用的数据归档和存储模型。这是一个典型的测试案例,患者的病史必须在HIPPA的指导下保存。为了归档和灾难恢复的目的,我们审查了Amazon安全模型。提出了一种基于云架构的可接受的安全模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The influence of quantum-dash height on the differential gain and linewidth enhancement factor of InAs/InP quantum-dash lasers Design of high-sensitivity plasmonics-assisted GaAs metal-semiconductor-metal photodetectors LED spectrum slicing for ZCC SAC-OCDMA coding system Water salinity fiber sensor with selectable sensitivity using a liquid-fillable composite in-fiber Fabry-Perot cavity Increasing the bandwidth utilization of a wireless optical broadband access network through efficient routing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1