56
views
0
recommends
+1 Recommend
0 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      CamFlow: Managed Data-sharing for Cloud Services

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]

          Related collections

          Most cited references12

          • Record: found
          • Abstract: not found
          • Article: not found

          A survey of fault tolerance mechanisms and checkpoint/restart implementations for high performance computing systems

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Automatic placement of authorization hooks in the linux security modules framework

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              From system-centric to data-centric logging - Accountability, trust & security in cloud computing

                Bookmark

                Author and article information

                Journal
                2015-06-14
                2015-12-21
                Article
                1506.04391
                d8e131c3-c112-4b5a-97c4-24e2f01501a6

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                14 pages, 8 figures
                cs.CR cs.DC

                Security & Cryptology,Networking & Internet architecture
                Security & Cryptology, Networking & Internet architecture

                Comments

                Comment on this article