A Decentralized Information Flow Model for SaaS Application Security

被引:2
|
作者
Liu Tingting [1 ]
Zhao Yong [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450012, Henan, Peoples R China
关键词
Software as a Service; Cloud computing security; information flow control; decentralized privileges;
D O I
10.1109/ISDEA.2012.17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Software as a Service(SaaS) is a popular cloud service, but the SaaS providers have no security garantee for users. The SaaS providers may insert some malicious code in their applications with the primary goal of lifting user data. In order to address this problem, we introduce the security approach of Decentralized Information Flow Control (DIFC) and present a DIFC model that applies at the granularity of operating system processes for SaaS application security. The model allows untrusted software to compute with private data while trusted code controls the dissemination of that data. The trusted code is small which can be monitored easily. In addition, the model can be used in existing applications and allows safe interaction between conventional and DIFC-aware processes. Finally, we prove that the new model can enforce the security requirements of SaaS users.
引用
收藏
页码:40 / 43
页数:4
相关论文
共 50 条
  • [1] Information Flow Control with Decentralized Labeling Model in Information Security
    Hakkoymaz, Veli
    Bakir, Cigdem
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 903 - 930
  • [2] A Study on a Decentralized SaaS Business Model
    Wu, Jinyi
    Winoto, Pinata
    Paik, Woojin
    2015 International Conference on Network and Information Systems for Computers (ICNISC), 2015, : 389 - 394
  • [3] Optimal mining on security labels for decentralized information flow control
    Yang, Zhi
    Yin, Lihua
    Jin, Shuyuan
    Chen, Xingyuan
    COMPUTERS & SECURITY, 2012, 31 (08) : 912 - 924
  • [4] Data Security of SaaS Platform based on Blockchain and Decentralized Technology
    Wang, Weiwei
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 848 - 851
  • [5] TOWARDS FORMAL SECURITY ANALYSIS OF DECENTRALIZED INFORMATION FLOW CONTROL POLICIES
    Yang, Zhi
    Yin, Lihua
    Jin, Shuyuan
    Duan, MiYi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 7969 - 7981
  • [6] Information flow model of integrated security system
    Valinevicius, A
    Zilys, M
    Eidukas, D
    ITI 2004: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2004, : 567 - 572
  • [7] A decentralized model for usage and information flow control in distributed systems
    Denis, Nathanael
    Laurent, Maryline
    Chabridon, Sophie
    COMPUTERS & SECURITY, 2024, 144
  • [8] An Application of the (max, plus ) Algebra to Information Flow Security
    Werner, Matthias
    Jaeger, Michael A.
    Parzyjegla, Helge
    ICN 2008: SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING, PROCEEDINGS, 2008, : 262 - +
  • [9] SECURITY FOR DECENTRALIZED HEALTH INFORMATION-SYSTEMS
    BLEUMER, G
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1994, 35 : 139 - 145
  • [10] An information flow security model to trusted computing system
    Hu Jun
    Shen Changxiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +