2015
DOI: 10.1007/s10207-015-0292-y
|View full text |Cite
|
Sign up to set email alerts
|

Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality

Abstract: As the cloud computing paradigm evolves, new types of cloud-based services have become available, including security services. Some of the most important and most commonly adopted security services are firewall services. These cannot be easily deployed in a cloud, however, because of a lack of mechanisms preserving firewall policy confidentiality. Even if they were provided, the customer traffic flowing through the Cloud Service Provider infrastructure would still be exposed to eavesdropping and information ga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…This model is not complete for the SecaaS services, however. It was shown by the authors that the original structure of the security policy can be restored by the CSP by eavesdropping and performing an analysis of the traffic flowing between the public and private clouds . To preserve the privacy of the customer, it is then insufficient to maintain the confidentiality of its security policy.…”
Section: Privacy Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…This model is not complete for the SecaaS services, however. It was shown by the authors that the original structure of the security policy can be restored by the CSP by eavesdropping and performing an analysis of the traffic flowing between the public and private clouds . To preserve the privacy of the customer, it is then insufficient to maintain the confidentiality of its security policy.…”
Section: Privacy Modelmentioning
confidence: 99%
“…Liu on the example of the stateless firewall service. Further remarks on these studies following a detailed description of the architecture and operations of BF were given by the authors . None of these works, however, considered using ciphered decisions to eliminate the risk of information leakage and generalizing the framework such that it could be used for the purpose of hosting other kinds of cloud‐based security services.…”
Section: Uniprivmentioning
confidence: 99%
See 2 more Smart Citations
“…We work towards implementing security mechanisms in a cloud computing infrastructure composed of public and private resources. Our research in the area of secure hybrid cloud infrastructure [28] is coordinated with the GETB-AR design, implementation and configuration. Public cloud infrastructure is composed of all DC nodes established in the GETB-AR testbed, private cloud computing resources are represented by all virtual machines attached to network nodes.…”
Section: Green Traffic Engineering Testbed -Anycast Routing (Getb-ar)mentioning
confidence: 99%