A Policy-based Security Framework for Storage and Computation on Enterprise Data in the Cloud

被引:0
|
作者
De, Sourya Joyee [1 ]
Pal, Asim K. [1 ]
机构
[1] Indian Inst Management, Management Informat Syst Grp, Kolkata 700027, W Bengal, India
关键词
D O I
10.1109/HICSS.2014.613
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A whole range of security concerns that can act as barriers to the adoption of cloud computing have been identified by researchers over the last few years. While outsourcing its business-critical data and computations to the cloud, an enterprise loses control over them. How should the organization decide what security measures to apply to protect its data and computations that have different security requirements from a Cloud Service Provider (CSP) with an unknown level of corruption? The answer to this question relies on the organization's perception about the CSP's trustworthiness and the security requirements of its data. This paper proposes a decentralized, dynamic and evolving policy-based security framework that helps an organization to derive such perceptions from knowledgeable and trusted employee roles and based on that, choose the most relevant security policy specifying the security measures necessary for outsourcing data and computations to the cloud. The organizational perception is built through direct user participation and is allowed to evolve over time.
引用
收藏
页码:4986 / 4997
页数:12
相关论文
共 50 条
  • [31] A User Profile-Aware Policy-Based Management Framework for Greening the Cloud
    Alhaddadin, Fadi
    Liu, William
    Gutierrez, Jairo A.
    2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, : 682 - 687
  • [32] PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage
    Rafique, Ansar
    Van Landuyt, Dimitri
    Joosen, Wouter
    JOURNAL OF GRID COMPUTING, 2018, 16 (02) : 165 - 194
  • [33] PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage
    Ansar Rafique
    Dimitri Van Landuyt
    Wouter Joosen
    Journal of Grid Computing, 2018, 16 : 165 - 194
  • [34] Security checker architecture for policy-based security management
    Tishkov, A
    Kotenko, I
    Sidelnikova, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
  • [35] Policy-based Bigdata Security and QoS Framework for SDN/IoT: An Analytic Approach
    Pokhrel, Shiva Raj
    Sood, Keshav
    Yu, Shui
    Nosouhi, Mohammad Reza
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 73 - 78
  • [36] A policy-based privacy storage approach
    Nowalczyk, Julien
    Tastet-Cherel, Frederique
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, : 605 - 608
  • [37] Policy-based proactive monitoring of security policy performance
    Bogdanov, Vitaly
    Kotenko, Igor
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 197 - +
  • [38] An adaptive policy-based framework for China's Carbon Capture and Storage development
    Yang, Xiaoliang
    Heidug, Wolfgang
    Cooke, Douglas
    FRONTIERS OF ENGINEERING MANAGEMENT, 2019, 6 (01) : 78 - 86
  • [39] Security and privacy for storage and computation in cloud computing
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Dong, Xiaolei
    Jia, Weiwei
    Chen, Yunlu
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2014, 258 : 371 - 386
  • [40] Policy-based autonomic storage allocation
    Devarakonda, M
    Chess, D
    Whalley, I
    Segal, A
    Goyal, P
    SELF-MANAGING DISTRIBUTED SYSTEMS, 2003, 2867 : 143 - 154