2,416 research outputs found

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    An Overview of Cloud Computing Challenges and Its Security Concerns

    Get PDF
    There has been an increasing advancement about Cloud computing during the past couple of years. Cloud computing has become a new computer model which aims to deliver reliable, customizable and scalable computing environment for end-users. Companies are choosing to move their data, applications and services to the Cloud. The advantages are significant ranging from increasing the availability, reliability, light weight, easily accessible applications, and low cost but so are the risks associated with. Companies that require application hosting could potentially benefit from the provisioning of computing infrastructure resources as a service. In addition to the economic advantages of an on-demand computing environment, businesses also enjoy the flexibility to scale up or down their services to accommodate the changing nature or the business requirement without having to invest in new equipment however, migrating data to the Cloud exposed the data to be an easy and vulnerable target for all the maliciously intended actors all over the world. This paper brings an introduction overview to Cloud computing, it’s enabling technologies behind such a design, its evolution and finally the security concerns that is entails
    • …
    corecore