Unified Model for Data Security - A Position Paper

被引:1
作者
Akram, Raja Naeem [1 ]
Ko, Ryan K. L. [1 ]
机构
[1] Univ Waikato, Dept Comp Sci, Cyber Secur Lab, Hamilton, New Zealand
来源
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) | 2014年
关键词
Data Security; Data Provenance; DRM; Access Control; Information Sharing; Cryptography; PROTECTION;
D O I
10.1109/TrustCom.2014.110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most crucial components of modern Information Technology (IT) systems is data. It can be argued that the majority of IT systems are built to collect, store, modify, communicate and use data, enabling different data stakeholders to access and use it to achieve different business objectives. The confidentiality, integrity, availability, auditability, privacy, and quality of the data is of paramount concern for end-users ranging from ordinary consumers to multi-national companies. Over the course of time, different frameworks have been proposed and deployed to provide data security. Many of these previous paradigms were specific to particular domains such as military or media content providers, while in other cases they were generic to different verticals within an industry. There is a much needed push for a holistic approach to data security instead of the current bespoke approaches. The age of the Internet has witnessed an increased ease of sharing data with or without authorisation. These scenarios have created new challenges for traditional data security. In this paper, we study the evolution of data security from the perspective of past proposed frameworks, and present a novel Unified Model for Data Security (UMDS). The discussed UMDS reduces the friction from several cross-domain challenges, and has the functionality to possibly provide comprehensive data security to data owners and privileged users.
引用
收藏
页码:831 / 839
页数:9
相关论文
共 53 条
  • [1] Covert Channels in Multiple Access Protocols
    Ahmadzadeh, Seyed Ali
    Agnew, Gordon B.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 404 - 405
  • [2] Aimin Yu, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P671, DOI 10.1109/CSE.2009.15
  • [3] Akram R. N., 2012, NEW TECHNOLOGIES MOB
  • [4] [Anonymous], 2010, HotSec
  • [5] [Anonymous], 2001, THESIS CAMBRIDGE
  • [6] [Anonymous], 2007, TRUSTED COMPUTING GR
  • [7] [Anonymous], 2009, A survey of access control models
  • [8] [Anonymous], 1992, 15 NAT COMP SEC C
  • [9] [Anonymous], 2008, AGENT TECHNOLOGY HLT
  • [10] [Anonymous], 1997, MACHINE LEARNING, MCGRAW-HILL SCIENCE/ENGINEERING/MATH