SECross: securing cross cloud boundary Online publication date: Wed, 03-Oct-2018
by Xianqing Yu; Mladen Alan Vouk; Young-Hyun Oh
International Journal of Cloud Computing (IJCC), Vol. 7, No. 3/4, 2018
Abstract: Multi-cloud system may be cost-efficient and practical to integrate resources of multiple clouds. However, different clouds are usually managed by different organisations with different security policies and management platforms. When some components of a multi-cloud system are compromised, attackers can potentially have a high privilege that impacts the rest of system. We analysed the threats to overall system when some components of the multi-cloud system in a public cloud are compromised. We developed a model we call SECross for fine-grain database access policy for SECross components, and the method for users to access computing machines. We analysed how SECross resists various potential attacks when any of SECross components are compromised.
Online publication date: Wed, 03-Oct-2018
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com