信息流控制以保护云中的数据

F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon
{"title":"信息流控制以保护云中的数据","authors":"F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon","doi":"10.1109/CSCI51800.2020.00241","DOIUrl":null,"url":null,"abstract":"Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Information Flow Control to Secure Data in the Cloud\",\"authors\":\"F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon\",\"doi\":\"10.1109/CSCI51800.2020.00241\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.\",\"PeriodicalId\":336929,\"journal\":{\"name\":\"2020 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCI51800.2020.00241\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI51800.2020.00241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

对于考虑使用云服务来存储其机密的业务关键型数据的组织来说,数据安全仍然是一个主要问题。在本文中,我们研究了如何在云中使用信息流控制来增强企业的信心,从而使他们能够安全可靠地采用云解决方案来满足他们的数据存储需求。我们将讨论如何将不同的技术与CloudMonitor工具一起使用,以确保云中的数据得到保护。然后,我们概述了集中式和分散式信息流控制系统是如何运作的,以及每种方法的比较优势和劣势。我们的分析表明,CloudMonitor可以通过使用分散的信息流控制来实现更好的数据安全性。然后,我们讨论了应用于监控云中的数据的不同分散信息流跟踪工具。CloudMonitor使云服务的消费者和提供商能够就可接受的安全策略及其实现达成一致,以确保云中的数据存储安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Information Flow Control to Secure Data in the Cloud
Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
First Success of Cancer Gene Data Analysis of 169 Microarrays for Medical Diagnosis Artificial Intelligence in Computerized Adaptive Testing Evidence for Monitoring the User and Computing the User’s trust Transfer of Hierarchical Reinforcement Learning Structures for Robotic Manipulation Tasks An open-source application built with R programming language for clinical laboratories to innovate process of excellence and overcome the uncertain outlook during the global healthcare crisis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1