Skip to main content

On Cloud Computing Security

  • Conference paper
Recent Trends in Wireless and Mobile Networks (CoNeCo 2011, WiMo 2011)

Abstract

Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance. The organizations can reduce their operational cost and concentrate on their strategic planning by using services provided by cloud computing. Generally, the success of cloud computing depends on three key issues: data security, fast Internet access and standardization [17]. Among the three issues, the biggest concern is data security. In this paper, we investigate the security issue related to datacenter of cloud computing. By analyzing the properties of the data stored at the datacenter, we propose a logical approach to specify the data and employ intelligent agents to enforce appropriate security policies on it. We expect such approach will protect the datacenter by only allowing the legitimate users accessing the data and preventing any malicious attempt to it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atluri, V., Gal, A.: An authorization model for temporal and derived data: securing information protals. ACM Transactions on Information and System Security 5(1), 62–94 (2002)

    Article  Google Scholar 

  2. Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Transactions on Information and System Security 6(1), 71–127 (2003)

    Article  Google Scholar 

  3. Bertino, E., Jajodia, S., Samarati, P.: Supporting multiple access control policies in database systems. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 94–107 (1996)

    Google Scholar 

  4. Chomicki, J., Lobo, J., Naqvi, S.: A logical programming approach to conflict resolution in policy management. In: Proceedings of International Conference on Principles of Knowledge Representation and Reasoning, pp. 121–132 (2000)

    Google Scholar 

  5. Crampton, J., Khambhammettu, H.: Delegation in role-based access control. International Journal of Information Security 7, 123–136 (2008)

    Article  Google Scholar 

  6. Dacier, M., Deswarte, Y.: Privilege graph: an extension to the typed access matrix model. In: Proceedings of European Symposium on Research in Computer Security, pp. 319–334 (1994)

    Google Scholar 

  7. Das, S.K.: Deductive Databases and Logic Programming. Addison-Wesley Publishing Company, UK (1992)

    MATH  Google Scholar 

  8. Denning, D.E.: A lattice model of secure information flow. Communication of ACM 19, 236–243 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  9. Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning about knowledge. MIT Press, Cambridge (1995)

    MATH  Google Scholar 

  10. Fernandez, E.B., France, R.B., Wei, D.: A formal specification of an authorization model for object-oriented databases. In: Database Security, IX: Status and Prospects, pp. 95–109 (1995)

    Google Scholar 

  11. Hsu, F., Chen, H.: H Chen, Secure File System Services for Web 2.0 Application. In: ACM Cloud Computing Security Workshop, pp. 11–17 (2009)

    Google Scholar 

  12. Hurwitz, J., Bloor, R., Kaufman, M., Halper, F.: Cloud Computing for Dummies. Wiley Publishing Inc., Chichester (2010)

    Google Scholar 

  13. Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 29(2), 214–260 (2001)

    Article  MATH  Google Scholar 

  14. Murray, T., Grove, D.: Non-delegatable authorities in capability systems. Journal of Computer Security 16, 743–759 (2008)

    Article  Google Scholar 

  15. Raj, H., Nathuji, R., Singh, A.P.: England Resource management for Isolation Enhanced Cloud Services. In: ACM Cloud Computing Security Workshop, pp. 77–84 (2009)

    Google Scholar 

  16. Reiter, R.: A logic for default reasoning. Artificial Intelligence 13, 81–132 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  17. Rittinghouse, J.w., Ransome, J.F.: Cloud Computing, Implementation, management, and Security. CRC Press, Boca Raton (2010)

    Google Scholar 

  18. Stallings, W.: Cryptography and Network Security - principles and Practice, 5th edn. Pearson, London (2006)

    Google Scholar 

  19. Velte, A.T., Velte, T.J., Elsenpeter, R.: Cloud Computing - A Practical Approach. McGraw Hill, New York (2010)

    Google Scholar 

  20. Winslett, M.: Updating Logical Databases. Cambridge University Press, New York (1990)

    Book  MATH  Google Scholar 

  21. Woo, T.Y.C., Lam, S.S.: Authorization in distributed systems: A formal approach. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 33–50 (1992)

    Google Scholar 

  22. Zhou, J., Alves-Foss, J.: Security policy refinement and enforcement for the design of multi-level secure systems. Journal of Computer Security 16, 107–131 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bai, Y., Policarpio, S. (2011). On Cloud Computing Security. In: Özcan, A., Zizka, J., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. CoNeCo WiMo 2011 2011. Communications in Computer and Information Science, vol 162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21937-5_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21937-5_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21936-8

  • Online ISBN: 978-3-642-21937-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics