Title :
Implementation of Chinese wall model in cloud computing for enhanced security
Author :
Kesarwani, A. ; Gupta, Chaitali ; Tripathi, M.M. ; Gupta, V. ; Gupta, Rajesh ; Chaurasiya, V.K.
Author_Institution :
Cyber Law & Inf. Security, Indian Inst. of Inf. Technol., Allahabad, India
Abstract :
In a cloud environment, it is very difficult to implement some of the very basic concepts of Information security, Identity and access management, segregation of duties, access control to name a few. Also due to lack of awareness in this emerging field there is no world acclaimed standard/model to cater to the above mentioned problems especially from the point of view of the customer. We have tried to come up with a novel concept of implementing access control and segregation of duties in cloud using the critically acclaimed Chinese wall security policy, particularly from the client´s perspective.
Keywords :
access control; cloud computing; security of data; Chinese wall model; access control; access management; client perspective; cloud computing; duty segregation; information security; security enhancement; Access control; Cloud computing; Companies; Computational modeling; Chinese wall model; IaaS; cloud computing; nodes; security policy;
Conference_Titel :
Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on
Conference_Location :
Udaipur
Print_ISBN :
978-1-4577-0239-6
DOI :
10.1109/ETNCC.2011.6255932