The Effect of Firewall Testing Types on Cloud Security Policies

Author(s):  
Annie Shebanow ◽  
Richard Perez ◽  
Caroline Howard

An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.

2011 ◽  
pp. 750-776
Author(s):  
Seraphin B. Calo ◽  
Clare-Marie Karat ◽  
John Karat ◽  
Jorge Lobo ◽  
Robert Craven ◽  
...  

The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Virtualization plays a key role in the area of Mobile Cloud Computing (MCC). In MCC, the protection of distributed VMs and mobile users’ sensitive data, in terms of security and privacy, is highly required. This paper presents a novel cloud proxy known as Three Policies Secure Cloud Proxy (Proxy-3S) that combines three security policies: VM users’ access control, VMs’ secure allocation and VMs’ secure communication. The proposed approach aims to keep the distributed VMs safe in different servers on the cloud. It enhances the access authorization to permit intensive distributed application tasks on the cloud or mobile devices while processing and communicating private information between VMs. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. Several experiments were conducted using a real-world healthcare distributed application. The experiments achieved promising results for high-level data protection and good efficiency rating compared to existing works.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Sudha Devi Dorairaj ◽  
Thilagavathy Kaliannan

Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.


Author(s):  
Seraphin B. Calo ◽  
Clare-Marie Karat ◽  
John Karat ◽  
Jorge Lobo ◽  
Robert Craven ◽  
...  

The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.


Author(s):  
Philipp Zech ◽  
Philipp Kalb ◽  
Michael Felderer ◽  
Ruth Breu

Today's increasing trend towards outsourcing IT landscapes and business processes into the Cloud is a double-edged sword. On the one side, companies can save time and money; however, on the other side, moving possible sensitive data and business processes into the Cloud demands for a high degree of information security. In the course of this chapter, the authors give an overview of a Cloud's various vulnerabilities, how to address them properly, and last but not least, a model-driven approach to evaluate the state of security of a Cloud environment by means of negative testing. Besides, the authors incorporate the idea of living models to allow tracking and incorporating of changes in the Cloud environment and react properly and, more important, in time on evolving security requirements throughout the complete Cloud Life Cycle.


Author(s):  
Philipp Zech ◽  
Philipp Kalb ◽  
Michael Felderer ◽  
Ruth Breu

Today’s increasing trend towards outsourcing IT landscapes and business processes into the Cloud is a double-edged sword. On the one side, companies can save time and money; however, on the other side, moving possible sensitive data and business processes into the Cloud demands for a high degree of information security. In the course of this chapter, the authors give an overview of a Cloud’s various vulnerabilities, how to address them properly, and last but not least, a model-driven approach to evaluate the state of security of a Cloud environment by means of negative testing. Besides, the authors incorporate the idea of living models to allow tracking and incorporating of changes in the Cloud environment and react properly and, more important, in time on evolving security requirements throughout the complete Cloud Life Cycle.


2021 ◽  
Author(s):  
Gitta Szabó ◽  
Frederik Schulz ◽  
Alejandro Manzano-Marín ◽  
Elena Rebecca Toenshoff ◽  
Matthias Horn

AbstractAdelgids (Insecta: Hemiptera: Adelgidae) form a small group of insects but harbor a surprisingly diverse set of bacteriocyte-associated endosymbionts, which suggest multiple replacement and acquisition of symbionts over evolutionary time. Specific pairs of symbionts have been associated with adelgid lineages specialized on different secondary host conifers. Using a metagenomic approach, we investigated the symbiosis of the Adelges laricis/Adelgestardus species complex containing betaproteobacterial (“Candidatus Vallotia tarda”) and gammaproteobacterial (“Candidatus Profftia tarda”) symbionts. Genomic characteristics and metabolic pathway reconstructions revealed that Vallotia and Profftia are evolutionary young endosymbionts, which complement each other’s role in essential amino acid production. Phylogenomic analyses and a high level of genomic synteny indicate an origin of the betaproteobacterial symbiont from endosymbionts of Rhizopus fungi. This evolutionary transition was accompanied with substantial loss of functions related to transcription regulation, secondary metabolite production, bacterial defense mechanisms, host infection, and manipulation. The transition from fungus to insect endosymbionts extends our current framework about evolutionary trajectories of host-associated microbes.


2021 ◽  
Author(s):  
B. L. McGee ◽  
Lisa Jacka

Virtual reality in one form or another has been around for over 50 years, most notably in entertainment and business environments. Technology-focused teachers have been leading the way with attempts at utilising and integrating virtual reality into K-12 and Higher Education. However, as quickly as technology changes so does the enthusiasm for the use in educational contexts. Much of this is due to the high-level cost (time and money) with no evidence-based educational return. In 2020 the global pandemic forced the education sector to innovate to provide authentic learning environments for students. The time is right for virtual reality to take centre stage. Over 171 million people worldwide currently use virtual reality, and the market in education is expected to grow by 42% over the next five years. This paper focuses on a range of virtual reality literature encompassing work across the spectrum of software and hardware, identifying where more educational implementation and research needs to be done and providing a perspective on future possibilities focusing on current affordances.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Sign in / Sign up

Export Citation Format

Share Document