A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds

被引:0
作者
Moghaddam, Faraz Fatemi [1 ,2 ]
Wieder, Philipp [1 ]
Yahyapour, Ramin [1 ,2 ]
Khodadadix, Touraj [3 ]
机构
[1] Gesell Wissensch Datenverarbeitung mbH Gottingen, Gottingen, Germany
[2] Georg August Univ, Inst Informat, Gottingen, Germany
[3] MUST, Dept Informat Technol, Petaling Jaya, Malaysia
来源
2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP) | 2018年
关键词
Cloud Computing; Security; Policy Management; Semantic Mapping; Security Management;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security and Privacy challenges are the most obstacles for the advancement of cloud computing and the erosion of trust boundaries already happening in organizations is amplified and accelerated by this emerging technology. Policy Management Frameworks are the most proper solutions to create dedicated security levels based on the sensitivity of resources and according to the mapping process between requirements cloud customers and capabilities of service providers. The most concerning issue in these frameworks is the rate of perfect matches between capabilities and requirements. In this paper, a reliable ring analysis engine has been introduced to efficiently map the security requirements of cloud customers to the capabilities of service provider and to enhance the rate of perfect matches between them for establishment of different security levels in clouds. In the suggested model a structural index has been introduced to receive the requirement and efficiently map them to the most proper security mechanism of the service provider. Our results show that this index-based engine enhances the rate of perfect matches considerably and decreases the detected conflicts in syntactic and semantic analysis.
引用
收藏
页码:505 / 510
页数:6
相关论文
共 14 条
[1]  
[Anonymous], 2004, F OWL INFERENCE ENGI
[2]   From OWL-S to Timed Automata Network: Operational Semantic [J].
Boumaza, Amel ;
Maamri, Ramedane .
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 :409-416
[3]   Ontology-based access control model for security policy reasoning in cloud computing [J].
Choi, Chang ;
Choi, Junho ;
Kim, Pankoo .
JOURNAL OF SUPERCOMPUTING, 2014, 67 (03) :711-722
[4]   Cloud security: Emerging threats and current solutions [J].
Coppolino, Luigi ;
D'Antonio, Salvatore ;
Mazzeo, Giovanni ;
Romano, Luigi .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 :126-140
[5]  
Damianou N, 2001, LECT NOTES COMPUT SC, V1995, P18
[6]   Interoperability results for Semantic Web technologies using OWL as the interchange language [J].
Garcia-Castro, Raul ;
Gomez-Perez, Asuncion .
JOURNAL OF WEB SEMANTICS, 2010, 8 (04) :278-291
[7]   OWL-L: An OWL-based language for Web resources links [J].
Hsu, I-Ching ;
Tzeng, Yuan Kwei ;
Huang, Der-Cheng .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :846-855
[8]  
Hu Y.H., 2012, 2011 IEEE International 3D Systems Integration Conference (3DIC), 2011 IEEE International, P1
[9]  
Khurat A., 2017, COMPUT SECUR
[10]  
Modica G. D., 2011, Proceedings of the 2011 IEEE World Congress on Services (SERVICES 2011), P399, DOI 10.1109/SERVICES.2011.110