MISP: Model for IaaS Security and Privacy

نویسندگان

چکیده

Paradigm shift towards cloud computing offers plethora of advantages both for users and Cloud Service Provider (CSP). For users, it saving cost, scaling resources, pay per use, elastic on-demand services. On the other hand, centralized resource management provisioning operations, safety security CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components software) over internet, Infrastructure-as-a-Service (IaaS) serves as fundamental layer all delivery models. Along with benefits IaaS, there exists several privacy issues threats to confidentiality, integrity, authentication, access control availability. In this paper, detailed study IaaS components, associated are explored counter measures same determined. Furthermore, a result study, Model Security Privacy (MISP) is proposed. The model presents cubical structure adds more features than existing models enhance data operations guide assessment safer adoption by enterprises.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A trusted measurement model based on dynamic policy and privacy protection in IaaS security domain

In Infrastructure as a Service (IaaS) environments, the user virtual machine is the user’s private property. However, in the case of privacy protection, how to ensure the security of files in the user virtual machine and the user virtual machine’s behavior does not affect other virtual machines; it is a major challenge. This paper presents a trusted measurement model based on dynamic policy and...

متن کامل

Security checklist for IaaS cloud deployments

In this article, we provide a cloud-security checklist for IaaS cloud deployments. The elements of the checklist are established by surveying the related literature on cloud-threat models and various security recommendations. We define the elements of the list on a level of abstraction that helps keep the size of the list manageable while preserving the lists practical applicability.

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in parallel computing

سال: 2021

ISSN: ['1879-808X', '0927-5452']

DOI: https://doi.org/10.3233/apc210188