On Cloud Computing Security

被引:0
作者
Bai, Yun [1 ]
Policarpio, Sean [1 ]
机构
[1] Univ Western Sydney, Intelligent Syst Lab, Sch Comp & Math, Penrith, NSW 2751, Australia
来源
RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS | 2011年 / 162卷
关键词
Access Control; Security Model; Cloud Computing; Formal Specification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance. The organizations can reduce their operational cost and concentrate on their strategic planning by using services provided by cloud computing. Generally, the success of cloud computing depends on three key issues: data security, fast Internet access and standardization [17]. Among the three issues, the biggest concern is data security. In this paper, we investigate the security issue related to datacenter of cloud computing. By analyzing the properties of the data stored at the datacenter. we propose a logical approach to specify the data and employ intelligent agents to enforce appropriate security policies on it. We expect such approach will protect the datacenter by only allowing the legitimate users accessing the data and preventing any malicious attempt to it.
引用
收藏
页码:388 / 396
页数:9
相关论文
共 22 条
[1]  
[Anonymous], 2010, Cloud Computing for Dummies
[2]  
Atluri V., 2002, ACM Transactions on Information and Systems Security, V5, P62, DOI 10.1145/504909.504912
[3]   A logical framework for reasoning about access control models [J].
Bertino, Elisa ;
Catania, Barbara ;
Ferrari, Elena ;
Perlasca, Paolo .
ACM Transactions on Information and System Security, 2003, 6 (01) :71-127
[4]   Supporting multiple access control policies in database systems [J].
Bertino, E ;
Jajodia, S ;
Samarati, P .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :94-107
[5]  
Chomicki J., 2000, PROC 9 INT C PRINCIP, P121
[6]   Delegation in role-based access control [J].
Crampton, Jason ;
Khambhammettu, Hemanth .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) :123-136
[7]  
Dacier M., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P319
[8]  
DAS S, 1992, DEDUCTIVE DATABASES
[9]   LATTICE MODEL OF SECURE INFORMATION-FLOW [J].
DENNING, DE .
COMMUNICATIONS OF THE ACM, 1976, 19 (05) :236-243
[10]  
Fagin R., 1995, Reasoning about Knowledge