F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon
{"title":"信息流控制以保护云中的数据","authors":"F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon","doi":"10.1109/CSCI51800.2020.00241","DOIUrl":null,"url":null,"abstract":"Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Information Flow Control to Secure Data in the Cloud\",\"authors\":\"F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon\",\"doi\":\"10.1109/CSCI51800.2020.00241\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.\",\"PeriodicalId\":336929,\"journal\":{\"name\":\"2020 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCI51800.2020.00241\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI51800.2020.00241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Flow Control to Secure Data in the Cloud
Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.