Ðóñ Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

National Security
Reference:

Tsaregorodtsev, A.V., Kachkov, A.K. One of the approaches to modeling the route for spread of analysis of critical data in the hybrid area of cloud computing.

Abstract: Use of cloud computing when forming the IT – infrastructure of the organization presupposes that the organization shall not control the aspects of security directly. There is need to guarantee conifdentiality of the data, when forming the architecture based on the cloud computing. The approach of modelling the data processing with the Petri nets in accordance with the requirements of the security policy of the organization allows to gain important information on the structure of multi-level system of access management in the hybrid cloud area. In the end it allows to follow dynamic behavior of processing critical data in the modelled system.


Keywords:

security models for the computer systems, cloud computing, public cloud, private cloud, hybrid cloud, security requirements, data confidentiality, modelling.


This article can be downloaded freely in PDF format for reading. Download article

This article written in Russian. You can find original text of the article here .
References
1. Piterson Dzh. Teoriya setey Petri i modelirovanie sistem. – M.:MIR, 1981. – 263 s.
2. National Institute of Standards and Technology (NIST) Def init ion of Cloud Computing, http://csrc.nist.gov/groups/SNS/ cloud-computing/
3. R.L. Trope, E.M. Power, V.I. Polley and B.C.Morley. «A Coherent Strategy for Data Security through Data Governance». IEEE Security & Privacy, vol. 5, no. 3, pp. 32-39, May/ Jun. 2007.
4. Bishop M. Computer Security: art and science. ISBN 0-201-44099-7. 2002. 1084 p.
5. R. Accorsi, C. Wonnemann. «Auditing Workflow Execution against Dataflow Policies» In Proc. BIS, 2010, pp. 207-217.
6. Bell, D. E. and LaPadula, L. J.: Secure Computer System: Unif ied Exposit ion and Mult ics Interpretation, Tech report ESD-TR-75-306, Mitre Corp, Bedford, Ma. (1976)