Protecting Cloud Data Using the Decentralized Information Flow Control with Authorization Condition
نویسندگان
چکیده
منابع مشابه
Mostly-static decentralized information flow control
The growing use of mobile code in downloaded programs such as applets and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Common security mechanisms such as sandboxing and access control are either too restrictive or too weak—they prevent applications from sharing data usefully, or allow private information to leak. For example, security mechanisms in Java...
متن کاملDecentralized information flow control for databases
Privacy and integrity concerns have been mounting in recent years as sensitive data such asmedical records, social network records, and corporate and government secrets are increasingly being stored in online systems. The rate of high-profile breaches has illustrated that current techniques are inadequate for protecting sensitive information. Many of these breaches involve databases that handle...
متن کاملToward protecting control flow confidentiality in cloud-based computation
Idea: • Transform each original program into a public program and a private program. • Public program: execute on the public cloud; perform most execution except for evaluating predicates of branch statements. • Private program: execute on private cloud; evaluate predicates. Proposed Techniques: • Replace predicates of the branch statements in the original program with control flow query (CFQ) ...
متن کاملMacaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud
Controlled sharing is fundamental to distributed systems; yet, on the Web, and in the Cloud, sharing is still based on rudimentary mechanisms. More flexible, decentralized cryptographic authorization credentials have not been adopted, largely because their mechanisms have not been incrementally deployable, simple enough, or efficient enough to implement across the relevant systems and devices. ...
متن کاملProtecting Private Data in the Cloud
Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company. We describe a system organization that prevents host administrators from directly accessing or installing eaves-dropping software on the machine that holds the client’s valuable data. Clients are...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Machine Learning and Computing
سال: 2015
ISSN: 2010-3700
DOI: 10.7763/ijmlc.2015.v5.512