CamFlow: Managed data-sharing for cloud services

TFJM Pasquier, J Singh, D Eyers… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
IEEE Transactions on Cloud Computing, 2015ieeexplore.ieee.org
A model of cloud services is emerging whereby a few trusted providers manage the
underlying hardware and communications whereas many companies build on this
infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
From the start, strong isolation between cloud tenants was seen to be of paramount
importance, provided first by virtual machines (VM) and later by containers, which share the
operating system (OS) kernel. Increasingly it is the case that applications also require …
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed bythose applications. They also require flexible data sharingwith other applications, often across the traditional cloud-isolation boundaries; for example, when government, consisting of different departments, provides services to its citizens through a common platform. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows;a crucial issue once data has left its owner's control by cloud-hosted applications andwithin cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of clouddeployed IFC for enforcingowners' data flow policy with regard to protection and sharing, aswell as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency and offers system-wide visibility over data flows. This helps those responsible to meet their data management obligations, providing evidence of compliance, and aids in the identification ofpolicy errors and misconfigurations. We present our IFC model and describe and evaluate our IFC architecture and implementation (CamFlow). This comprises an OS level implementation of IFC with support for application management, together with an IFC-enabled middleware.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果