TY - GEN
T1 - Information Flow Control to Secure Data in the Cloud
AU - Alqahtani, Fahad
AU - Duraibi, Salahaldeen
AU - Tosic, Predrag T.
AU - Sheldon, Frederick T.
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/12
Y1 - 2020/12
N2 - Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.
AB - Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.
KW - cloud consumers
KW - cloud security
KW - cloud service providers
KW - data tracking
KW - information flow control
UR - http://www.scopus.com/inward/record.url?scp=85113389283&partnerID=8YFLogxK
U2 - 10.1109/CSCI51800.2020.00241
DO - 10.1109/CSCI51800.2020.00241
M3 - Conference contribution
AN - SCOPUS:85113389283
T3 - Proceedings - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
SP - 1288
EP - 1294
BT - Proceedings - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
Y2 - 16 December 2020 through 18 December 2020
ER -