英文摘要
|
Purpose-Due to the growing intelligent attacks, internet service providers are facing more and more risks. It has become a big concern, especially in the emerging cloud computing environment, whether the service providers have the capability to properly protect users’ data from attacks and prevent unauthorized access. Design/methodology/approach - In order to meet the information security requirements of confidentiality, integrity and availability with consideration of access efficiency in the presence of huge amount of data, we proposed an efficient and secure data access model covering active authentication, encryption/decryption, and access to databases. Findings-Through experiments, we found that the control of "read" will solve most unauthorized access problems and serialization of "write" will avoid deadlocks. Research limitations/implications-We designed a multi-layered, distributed database system and proposed a secure access model in which only two locking mechanisms, two-phase locking and altruistic locking, are compared. Other mechanisms are not considered in this study. Practical implications-A prototype was implemented to test the applicability of the proposed model. The system first authenticates a user and then assigns him a ticket. This process accomplishes fined-grained access control. After analyzing the data obtained from the experiments, we found that the proposed data access model is well suited for the cloud computing environment in terms of security and efficiency. Originality/value-This study proposes a new approach to system security, permitting distributed database access and efficient scheduling. The system allows active identity verification, secure data isolation and information exchange, multi-level scheduling based on priorities, distributed access control and use of encryption technology.
|
参考文献
|
-
陳志誠、林淑瓊、李興漢、許派立(2009)。資訊資產分類與風險評鑑之研究-以銀行業者為例。中華民國資訊管理學報,16(3),55-84。
連結:
-
葉桂珍、張榮庭(2006)。企業之資訊安全策略與其產業別及資訊化程度關係探討。中華民國資訊管理學報,13(2),113-143。
連結:
-
Brodkin, J. “Gartner: Seven Cloud-computing Security Risks,” http://www.networkworld.com/news/2008/070208-cloud.html, Network World, 2008/07/02.
-
European Network and Information Security Agency (2010), 'Cloud computing: benefits, risks and recommendations for information security', European Network and Information Security Agency, available at http://www.enisa.europa.eu/act/rm/files/eliverables/cloud-computing-risk-assessment (accessed 17 February 2014).
-
CSA (2012), Security Guidance for Critical Areas of Focus in Cloud Computing v3.0.https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
-
Gartner(2010), http://www.garther.com/technology/home.jsp.
-
Bell, D.E.,LaPadula, L.J.(1976).Technical RePort MTR-2997Technical RePort MTR-2997,Bedford MA:Mitre corp.
-
Chen, P.S.,Li, S.H.,Liu, Y.K.(2010).Scheduling the access to multi-level secure databases in a wireless network environment.International Journal of Innovative Computing, Information and Control,6(12),5381-5403.
-
David, R.,Son, S.H.(1993).A secure two phase locking protocol.Proceedings of the twelfth IEEE Symposium on Reliable Distributed Systems (SRDS 1993),Princeton, NJ, USA:
-
Ferraiolo, D.F.,Sandhu, R.,Gavrila, S.,Kuhn, D.,Chandramouli, R.(2001).Proposed NIST standard for role-based access control.ACM Transactions on Information and Systems Security,4(3),224-274.
-
Garcia-Molina, H.,Ullman, J.,Widom, J.(2008).Database Systems: The Complete Book.India:Pearson Education.
-
Goodhue, D.L.,Straub, D.W.(1991).Security Concerns of System Users:A Study of Perceptions of the Adequacy of Security Measures.Information & Management,20(1),13-27.
-
Hinke, T.,Schaefer, M.(1975).Rome Air Development Center Technical ReportRome Air Development Center Technical Report,System Development Corp..
-
Jung, D.(2001).Transformational and transactional leadership and their effects on creativity in groups.Creativity Research Journal,13,185-195.
-
Jung, J.-Y.,Qiu, J.L.,Kim, Y.-C.(2001).Internet Connectedness and Inequality: Beyond the "Divide".Communication Research,28(4),507-535.
-
Kankanhalli, A.,Tan, B.C.Y.,Wei, K.K..Contributing knowledge to electronic knowledge repositories:An Empirical Investigation.Mis Quarterly,29(1),113-143.
-
Kim, H.W.,Park, D.S.,Rhee, H.K.,Kim, U.M.(2001).Advanced transaction scheduling protocol for multilevel secure database in wireless mobile network environment.Proceedings of Joint fourth IEEE International Conference on ATM (ICATM 2001) and High Speed Intelligent Internet Symposium,Seoul, Korea:
-
Lang, U.(2010).OpenPMF SCaaS: Authorization as a service for cloud & SOA applications.Proceedings of the second IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2010),Indianapolis, Indiana, USA:
-
Lewis, S.,Wiseman, S.(1997).Securing an object relational database.Proceedings of the thirteenth Anunual Computer Security Applications Conference (ACSAC 1997),San Diego, California, USA:
-
Lin, J.,Lu, X.,Yu, L.,Zou, Y.,Zha, L.(2010).Vega Warden: A uniform user management system for cloud applications.Proceedings of the 2010 IEEE International Conference on Networking, Architecture and Storage (NAS 2010),Macau, China:
-
Niemeyer, R. E.(1997).Using Web technologies in two MLS environment: A security analysis.Proceedings of the thirteenth Anunual Computer Security Applications Conference (ACSAC 1997),San Diego, California, USA:
-
Pang, H.,Carey, M.J.,Livny, M.(1995).Multiclass query scheduling in real-time database systems.IEEE Transactions on Knowledge and Data Engineering,7(4),533-551.
-
Pfleeger, C.P.,Pfleeger, S.L.(2002).Security in Computing.USA:Prentice-Hall Int..
-
Salem, K.,Garcia-Molina, H.,Shands, J.(1994).Altruistic Locking.ACM Transactions on Database Systems,19(1),117-169.
-
Sandhu, R.S.,Coyne, E.J.,Feinstein, H.L.,Youman, C.(1996).Role-based access control models.IEEE Computer,29(2),38-47.
-
Wood, C.,Summers, R.C.,Fernandez, E.B.(1979).Authorization in multilevel database models.Information Systems,4(2),155-161.
-
陳志誠、王瀞慧(2011)。金融機構雲端運算架構下客戶資料防護之探討。2011產業資訊應用暨個案競賽(CIIA 2011),台灣:
-
陳志誠、宋子傑(2005)。在無線網路環境中基於用戶優先權與利他鎖定之多級安全資料庫存取控制。資訊安全通訊,11(3),51-67。
-
劉家驊、洪士凱(2010)。雲端運算資料安全防護機制之研究。2010 電腦視覺、影像處理與資訊技術研討會(CVIPIT 2010),台灣:
|