Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An autonomic cloud management system for enforcing security and assurance properties
Bobelin L., Bousquet A., Briffaut J.  CLHS 2015 (Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, Portland, OR, Jun 16, 2015)1-8.2015.Type:Proceedings
Date Reviewed: Jul 28 2015

In the 1970s, there were many papers describing models for authorization in file systems and relational databases. Some of those models are now being rediscovered in the context of cloud systems. This paper presents the management and assurance of security requirements in cloud systems. The authors of this paper appear to ignore the past work on similar subjects and claim that this is a new model because it applies to cloud systems.

The paper is well written and the details of the authors’ approach are interesting, but their model has little to do with cloud systems except that their example considers components executing in different virtual machines. However, this deployment has no effect on the security analysis. The example considers only file protection, and nothing is said about content-dependent authorization, which requires the use of databases. These models have not been implemented in an actual cloud, and it is not clear how they would relate to the infrastructure as a service (IaaS) support of vendors such as IBM, Amazon, or VMware.

I found the paper to be of some pedagogic value for students of security because the development is clear and detailed, but I don’t see much original work here.

Reviewer:  E. B. Fernandez Review #: CR143656 (1510-0892)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (D.4.6 )
 
 
Cloud Computing (C.2.4 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy