SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
A Survey on Context Security Policies in the
Cloud
Yiannis Verginadis, Gregoris Mentzas, Simeon Veloudis,
Iraklis Paraskakis
1st International Workshop on Cloud Security and Data
Privacy by Design (CloudSPD'15) Limassol, Cyprus,
December 10, 2015
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
What is Context?
“Any information that can be
used to characterize the
situation of an entity. An entity is
a person, place, or object that is
considered relevant to the
interaction between a user and
an application, including the
user and applications
themselves” (Abowd, et al.,
1999; Dey, 2001)
3
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
What is Context-Aware Security?
“Context-aware security is the use of supplemental information to
improve security decisions at the time they are made, resulting in
more accurate security decisions capable of supporting dynamic
business and IT environments” (Gartner)
4
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
The Adoption of Cloud Computing
 Many users have started relying on cloud services without realizing it
 Many companies have remained cautious due to security concerns
 Applications and storage volumes often reside next to potentially hostile
virtual environments, leaving sensitive information at risk to theft,
unauthorized exposure or malicious manipulation
 Governmental regulation presents an additional concern of significant
legal and financial consequences if data confidentiality is breached
Focused interest Experimentation Near ubiquitous use
CloudAdoption
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Security Challenges in the Cloud
 Top four threats identified (CSA, 2013) are:
 data leakage
 data loss
 account hijacking
 insecure APIs
 The OWASP foundation has categorized the database-related
attacks as the most critical ones
 These attacks were responsible for 83% of the total records stolen
 The most critical part of a
modern cloud application is the
data persistency layer and the
database itself
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Related Work
 Commonly used access control models (Ferrari 2010) are:
 Mandatory Access Control (MAC)
 Discretionary Access Control (DAC)
 Role-Based Access Control (RBAC)
 The Attribute Based Access Control (ABAC)
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
MAC and DAC Related Approaches
 Solutions that are based on MAC access control they
involve rigid and static methods (Jürjens, 2001)
 DAC models rely on access control matrices
 rows and columns correspond to subjects and objects
respectively
 their intersection points correspond to a set of allowed access
operations
 Access control lists (ACL)
 the controls are discretionary
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Role-Based Access Control (RBAC)
 Role
 a grouping mechanism for categorizing individual users (called subjects) based
on various properties (e.g. job title, user functions, responsibilities etc.).
 Each subject has a role set, which consists of all the roles
that the subject has been authorized to use.
 It lacks support for expressing access control conditions that refer to
the state of a system
 e.g. the state of a protected resource, parameter values, date or time
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Role-Based Access Control (RBAC)
 Extensions included
 Organization Role Base Access Control (ORBAC)
 authorization is given to users depending on their role in an organization in a
given context
 (Boustia & Mokhtari, 2008)
 Generalized RBAC (GRBAC)
 incorporates the concept of environment roles (Convington et al., 2001)
 Shortcomings
 proposes a domain specific environment role hierarchy, not easily extensible and manageable
in heterogeneous domains
 it doesn’t support the fine-grained modelling of different data objects
 Context-aware access control (CAAC)
 Shortcomings
 incorporate only specific types of contexts (Chandran & Joshi, 2005)
 lack of fine-grained data access control (Zhang & Parashar, 2004)
 inefficient inferring of context (Kayes et al., 2013)
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
ABAC Related Approaches
 Authorization to perform operations is determined by
 evaluating attributes associated with the subject, object,
requested operations, and environment conditions
 Key difference
 It can express a complex Boolean rule set that can evaluate
many different attributes
 e.g. OASIS eXtensible Access Control Markup Language (XACML)
 declarative access control policies encouraging the separation of the access
decision from the point of use
 Location-aware access control (LAAC)
 No support of additional pertinent contextual information (Cleeff et
al.,2010)
 OWL-based inefficient inferring of context
 Onto-ACM (Choi et al., 2014), CONON (Wang et al., 2004), (Costabello et
al., 2012)
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Policy Modeling
 Provide a set of unambiguous rules
 which are interpreted by enforcement mechanisms and which
constrain the behaviour of the entities.
 There is lack of proper separation of concerns (Kourtesis
and Paraskakis, 2012)
 The policy definition and policy enforcement are entangled in the
implementation of a single software component, leading to the
lack of
 portability
 explicit representation of policy relationships
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Policy Modeling
 Syntactic Policy Description
 promotes a declarative approach to policy expression,
 where access rules are encoded imperatively, as part of the same
software that checks for their compliance.
 RuleML, XACML, WS-Trust
 fail to capture the knowledge lurking behind policies
 any interoperability relies on the use of vocabularies that are shared
among all parties involved in an interaction.
 leads to ad-hoc reasoning about policy compliance
 limits the reusability and portability of policies
 precludes the identification of inter-policy relations
 limits the ability to perform policy governance
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Policy Modeling
 Semantically-rich Policy Description
 employs ontologies in order to assign meaning to actors, actions
and resources
 ability to reason about policy compliance generically
 identification of inter-policy relations such as inconsistent policies, and
overlapping policies
 portability, visibility, and reusability of policies
 facilitates policy governance
 KAoS [Uszok et al., 2004], Rei [Kagal et al., 2003], [Hu et al.,
2011]
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context-aware Security Model
 A model for semantically describing associations
between types of access depending on the data objects
and circumstances under which this access should be
allowed
 These circumstances are determined based on contextual
information
 This model will constitute the background knowledge for
the DAO Annotations
 It will involve lightweight semantics for allowing efficient
inferencing
 It comprises of two dimensions related to
 dynamic security controls
 static security controls
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context-aware Security Model
SMM: Security model management
DLM: Design-Time Library Management
AF: Annotation-formation
DAO: Data access object
SPM: Security Policies Management
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Ontologically Describing an Access Rule Template
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Data Security Challenges in the Cloud
 PaaSword Framework
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Conclusions & Next Steps
 Future work involves the development of appropriate Context and
Policy models editors
 Implementation and validation of the proposed framework in 5
pilots:
 Encrypted persistency as a service in a PaaS provider
 Intergovernmental secure document and personal data exchange
 Secure sensors data fusion and analytics
 Protection of personal data in a multi-tenant CRM
 Protection of sensible enterprise information in multi-tenant ERP
Thank you for listening!
Acknowledgements:
This work is related to the PaaSword project and
has received funding from the European Union’s
Horizon 2020 research and innovation
programme under grant agreement No 644814

Contenu connexe

Tendances

Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Arushi00
 
Prevention is futile in 2020 - Gartner Report in Retrospect
Prevention is futile in 2020 - Gartner Report in RetrospectPrevention is futile in 2020 - Gartner Report in Retrospect
Prevention is futile in 2020 - Gartner Report in RetrospectJermund Ottermo
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1pk4
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET Journal
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governancejkllee
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Key Enterprise Mobility Trends of 2015
Key Enterprise Mobility Trends of 2015Key Enterprise Mobility Trends of 2015
Key Enterprise Mobility Trends of 2015ANOOP KUMAR P
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3City of Toronto
 
Zachman Enterprise Security Architecture
Zachman Enterprise Security ArchitectureZachman Enterprise Security Architecture
Zachman Enterprise Security ArchitectureJoaquin Marques
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architectureMubashirAslam5
 
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...ijsptm
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Maganathin Veeraragaloo
 
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Cybersecurity Risk  -- Redefing real risk measurement for the CISOCybersecurity Risk  -- Redefing real risk measurement for the CISO
Cybersecurity Risk -- Redefing real risk measurement for the CISODavid Sweigert
 

Tendances (19)

Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025
 
Prevention is futile in 2020 - Gartner Report in Retrospect
Prevention is futile in 2020 - Gartner Report in RetrospectPrevention is futile in 2020 - Gartner Report in Retrospect
Prevention is futile in 2020 - Gartner Report in Retrospect
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
Bf25342345
Bf25342345Bf25342345
Bf25342345
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Key Enterprise Mobility Trends of 2015
Key Enterprise Mobility Trends of 2015Key Enterprise Mobility Trends of 2015
Key Enterprise Mobility Trends of 2015
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3
 
Zachman Enterprise Security Architecture
Zachman Enterprise Security ArchitectureZachman Enterprise Security Architecture
Zachman Enterprise Security Architecture
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Cybersecurity Risk  -- Redefing real risk measurement for the CISOCybersecurity Risk  -- Redefing real risk measurement for the CISO
Cybersecurity Risk -- Redefing real risk measurement for the CISO
 

En vedette

Sinclair powerpoint
Sinclair powerpointSinclair powerpoint
Sinclair powerpointToriChaney
 
PaaSword Presentation - Project Overview
PaaSword Presentation - Project OverviewPaaSword Presentation - Project Overview
PaaSword Presentation - Project OverviewPaaSword EU Project
 
FLEXIGRIP Thoracic Trauma Workshop Mons 230115
FLEXIGRIP Thoracic Trauma Workshop Mons 230115FLEXIGRIP Thoracic Trauma Workshop Mons 230115
FLEXIGRIP Thoracic Trauma Workshop Mons 230115Christophe Debatice
 
NEOVEIL presentation UZ Leuven 230315
NEOVEIL presentation UZ Leuven 230315NEOVEIL presentation UZ Leuven 230315
NEOVEIL presentation UZ Leuven 230315Christophe Debatice
 
малообеспеченные семьи лютова
малообеспеченные семьи лютовамалообеспеченные семьи лютова
малообеспеченные семьи лютоваAlexandriaFox
 
1. Membuat Blog Dengan Wordpress
1. Membuat Blog Dengan Wordpress1. Membuat Blog Dengan Wordpress
1. Membuat Blog Dengan WordpressYuli Anto
 
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseo
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseoDMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseo
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseoRobert Nagy
 
Enviroment Project
Enviroment ProjectEnviroment Project
Enviroment ProjectCiaraMunuera
 
Production of double page spread image
Production of double page spread image Production of double page spread image
Production of double page spread image danny19982
 
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short version
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short versionSTRATOS ICU Presentation CHR La Citadelle Liège 280315 short version
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short versionChristophe Debatice
 

En vedette (17)

Williams stephanie finalppp
Williams stephanie finalpppWilliams stephanie finalppp
Williams stephanie finalppp
 
језичке недоумице
језичке недоумицејезичке недоумице
језичке недоумице
 
Sinclair powerpoint
Sinclair powerpointSinclair powerpoint
Sinclair powerpoint
 
Asthma phenotypes
Asthma phenotypesAsthma phenotypes
Asthma phenotypes
 
PaaSword Presentation - Project Overview
PaaSword Presentation - Project OverviewPaaSword Presentation - Project Overview
PaaSword Presentation - Project Overview
 
HomeClass KEUKENS en BADKAMERS
HomeClass KEUKENS en BADKAMERS HomeClass KEUKENS en BADKAMERS
HomeClass KEUKENS en BADKAMERS
 
FLEXIGRIP Thoracic Trauma Workshop Mons 230115
FLEXIGRIP Thoracic Trauma Workshop Mons 230115FLEXIGRIP Thoracic Trauma Workshop Mons 230115
FLEXIGRIP Thoracic Trauma Workshop Mons 230115
 
NEOVEIL presentation UZ Leuven 230315
NEOVEIL presentation UZ Leuven 230315NEOVEIL presentation UZ Leuven 230315
NEOVEIL presentation UZ Leuven 230315
 
малообеспеченные семьи лютова
малообеспеченные семьи лютовамалообеспеченные семьи лютова
малообеспеченные семьи лютова
 
1. Membuat Blog Dengan Wordpress
1. Membuat Blog Dengan Wordpress1. Membuat Blog Dengan Wordpress
1. Membuat Blog Dengan Wordpress
 
C
CC
C
 
Press Release 1
Press Release 1Press Release 1
Press Release 1
 
Catalogo lacovadonga2015
Catalogo lacovadonga2015Catalogo lacovadonga2015
Catalogo lacovadonga2015
 
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseo
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseoDMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseo
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseo
 
Enviroment Project
Enviroment ProjectEnviroment Project
Enviroment Project
 
Production of double page spread image
Production of double page spread image Production of double page spread image
Production of double page spread image
 
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short version
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short versionSTRATOS ICU Presentation CHR La Citadelle Liège 280315 short version
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short version
 

Similaire à A Survey on Context Security Policies in the Cloud

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword EU Project
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...ijcseit
 
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNINGPLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNINGCSEIJJournal
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data IJECEIAES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESijwscjournal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES ijwscjournal
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxjeanettehully
 
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIJCSEA Journal
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...Tutors India
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docxaulasnilda
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docxcroftsshanon
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 

Similaire à A Survey on Context Security Policies in the Cloud (20)

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
 
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNINGPLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
DISTRIBUTED DATABASE
DISTRIBUTED DATABASEDISTRIBUTED DATABASE
DISTRIBUTED DATABASE
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 

Plus de PaaSword EU Project

PaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword EU Project
 
PaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSwordPaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSwordPaaSword EU Project
 
PaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword EU Project
 
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design FrameworkNo More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design FrameworkPaaSword EU Project
 
A Data Privacy and Security by Design Platform‐as‐a‐Service Framework
A Data Privacy and Security by Design Platform‐as‐a‐Service FrameworkA Data Privacy and Security by Design Platform‐as‐a‐Service Framework
A Data Privacy and Security by Design Platform‐as‐a‐Service FrameworkPaaSword EU Project
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudPaaSword EU Project
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...PaaSword EU Project
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword EU Project
 

Plus de PaaSword EU Project (12)

PaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption Engine
 
PaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSwordPaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSword
 
PaaSword - Technology Baseline
PaaSword - Technology BaselinePaaSword - Technology Baseline
PaaSword - Technology Baseline
 
PaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword - Context-aware Access Control
PaaSword - Context-aware Access Control
 
PaaSword-Business Cases
PaaSword-Business CasesPaaSword-Business Cases
PaaSword-Business Cases
 
Daten unter Kontrolle
Daten unter KontrolleDaten unter Kontrolle
Daten unter Kontrolle
 
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design FrameworkNo More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
 
A Data Privacy and Security by Design Platform‐as‐a‐Service Framework
A Data Privacy and Security by Design Platform‐as‐a‐Service FrameworkA Data Privacy and Security by Design Platform‐as‐a‐Service Framework
A Data Privacy and Security by Design Platform‐as‐a‐Service Framework
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the Cloud
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 

Dernier

Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSSLeenakshiTyagi
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 

Dernier (20)

Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 

A Survey on Context Security Policies in the Cloud

  • 1. A Survey on Context Security Policies in the Cloud Yiannis Verginadis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15) Limassol, Cyprus, December 10, 2015
  • 2. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 3. Information Management Unit / ICCS of NTUA www.imu.iccs.gr What is Context? “Any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications themselves” (Abowd, et al., 1999; Dey, 2001) 3
  • 4. Information Management Unit / ICCS of NTUA www.imu.iccs.gr What is Context-Aware Security? “Context-aware security is the use of supplemental information to improve security decisions at the time they are made, resulting in more accurate security decisions capable of supporting dynamic business and IT environments” (Gartner) 4
  • 5. Information Management Unit / ICCS of NTUA www.imu.iccs.gr The Adoption of Cloud Computing  Many users have started relying on cloud services without realizing it  Many companies have remained cautious due to security concerns  Applications and storage volumes often reside next to potentially hostile virtual environments, leaving sensitive information at risk to theft, unauthorized exposure or malicious manipulation  Governmental regulation presents an additional concern of significant legal and financial consequences if data confidentiality is breached Focused interest Experimentation Near ubiquitous use CloudAdoption
  • 6. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Security Challenges in the Cloud  Top four threats identified (CSA, 2013) are:  data leakage  data loss  account hijacking  insecure APIs  The OWASP foundation has categorized the database-related attacks as the most critical ones  These attacks were responsible for 83% of the total records stolen  The most critical part of a modern cloud application is the data persistency layer and the database itself
  • 7. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 8. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Related Work  Commonly used access control models (Ferrari 2010) are:  Mandatory Access Control (MAC)  Discretionary Access Control (DAC)  Role-Based Access Control (RBAC)  The Attribute Based Access Control (ABAC)
  • 9. Information Management Unit / ICCS of NTUA www.imu.iccs.gr MAC and DAC Related Approaches  Solutions that are based on MAC access control they involve rigid and static methods (Jürjens, 2001)  DAC models rely on access control matrices  rows and columns correspond to subjects and objects respectively  their intersection points correspond to a set of allowed access operations  Access control lists (ACL)  the controls are discretionary
  • 10. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Role-Based Access Control (RBAC)  Role  a grouping mechanism for categorizing individual users (called subjects) based on various properties (e.g. job title, user functions, responsibilities etc.).  Each subject has a role set, which consists of all the roles that the subject has been authorized to use.  It lacks support for expressing access control conditions that refer to the state of a system  e.g. the state of a protected resource, parameter values, date or time
  • 11. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Role-Based Access Control (RBAC)  Extensions included  Organization Role Base Access Control (ORBAC)  authorization is given to users depending on their role in an organization in a given context  (Boustia & Mokhtari, 2008)  Generalized RBAC (GRBAC)  incorporates the concept of environment roles (Convington et al., 2001)  Shortcomings  proposes a domain specific environment role hierarchy, not easily extensible and manageable in heterogeneous domains  it doesn’t support the fine-grained modelling of different data objects  Context-aware access control (CAAC)  Shortcomings  incorporate only specific types of contexts (Chandran & Joshi, 2005)  lack of fine-grained data access control (Zhang & Parashar, 2004)  inefficient inferring of context (Kayes et al., 2013)
  • 12. Information Management Unit / ICCS of NTUA www.imu.iccs.gr ABAC Related Approaches  Authorization to perform operations is determined by  evaluating attributes associated with the subject, object, requested operations, and environment conditions  Key difference  It can express a complex Boolean rule set that can evaluate many different attributes  e.g. OASIS eXtensible Access Control Markup Language (XACML)  declarative access control policies encouraging the separation of the access decision from the point of use  Location-aware access control (LAAC)  No support of additional pertinent contextual information (Cleeff et al.,2010)  OWL-based inefficient inferring of context  Onto-ACM (Choi et al., 2014), CONON (Wang et al., 2004), (Costabello et al., 2012)
  • 13. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 14. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Policy Modeling  Provide a set of unambiguous rules  which are interpreted by enforcement mechanisms and which constrain the behaviour of the entities.  There is lack of proper separation of concerns (Kourtesis and Paraskakis, 2012)  The policy definition and policy enforcement are entangled in the implementation of a single software component, leading to the lack of  portability  explicit representation of policy relationships
  • 15. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Policy Modeling  Syntactic Policy Description  promotes a declarative approach to policy expression,  where access rules are encoded imperatively, as part of the same software that checks for their compliance.  RuleML, XACML, WS-Trust  fail to capture the knowledge lurking behind policies  any interoperability relies on the use of vocabularies that are shared among all parties involved in an interaction.  leads to ad-hoc reasoning about policy compliance  limits the reusability and portability of policies  precludes the identification of inter-policy relations  limits the ability to perform policy governance
  • 16. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Policy Modeling  Semantically-rich Policy Description  employs ontologies in order to assign meaning to actors, actions and resources  ability to reason about policy compliance generically  identification of inter-policy relations such as inconsistent policies, and overlapping policies  portability, visibility, and reusability of policies  facilitates policy governance  KAoS [Uszok et al., 2004], Rei [Kagal et al., 2003], [Hu et al., 2011]
  • 17. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 18. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Context-aware Security Model  A model for semantically describing associations between types of access depending on the data objects and circumstances under which this access should be allowed  These circumstances are determined based on contextual information  This model will constitute the background knowledge for the DAO Annotations  It will involve lightweight semantics for allowing efficient inferencing  It comprises of two dimensions related to  dynamic security controls  static security controls
  • 19. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Context-aware Security Model SMM: Security model management DLM: Design-Time Library Management AF: Annotation-formation DAO: Data access object SPM: Security Policies Management
  • 20. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Ontologically Describing an Access Rule Template
  • 21. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Data Security Challenges in the Cloud  PaaSword Framework  Conclusions
  • 22. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Conclusions & Next Steps  Future work involves the development of appropriate Context and Policy models editors  Implementation and validation of the proposed framework in 5 pilots:  Encrypted persistency as a service in a PaaS provider  Intergovernmental secure document and personal data exchange  Secure sensors data fusion and analytics  Protection of personal data in a multi-tenant CRM  Protection of sensible enterprise information in multi-tenant ERP
  • 23. Thank you for listening! Acknowledgements: This work is related to the PaaSword project and has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644814