Share Email Print
cover

Proceedings Paper

Analyzing the requirements for a robust security criteria and management of multi-level security in the clouds
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.

Paper Details

Date Published: 24 May 2011
PDF: 15 pages
Proc. SPIE 8062, Defense Transformation and Net-Centric Systems 2011, 80620Q (24 May 2011); doi: 10.1117/12.885023
Show Author Affiliations
Bassam S. Farroha, U.S. Dept. of Defense (United States)
Deborah L. Farroha, U.S. Dept. of Defense (United States)


Published in SPIE Proceedings Vol. 8062:
Defense Transformation and Net-Centric Systems 2011
Raja Suresh, Editor(s)

© SPIE. Terms of Use
Back to Top