Repository logo
  • Log In
    New user? Click here to register.Have you forgotten your password?
University College Dublin
    Colleges & Schools
    Statistics
    All of DSpace
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Institutes and Centres
  3. Insight Centre for Data Analytics
  4. Insight Research Collection
  5. A New Distributed Chinese Wall Security Policy Model
 
  • Details
Options

A New Distributed Chinese Wall Security Policy Model

Author(s)
Fehis, Saad  
Nouali, Omar  
Kechadi, Tahar  
Uri
http://hdl.handle.net/10197/9295
Date Issued
2016
Date Available
2018-03-21T13:29:46Z
Abstract
The application of the Chinese wall security policy model (CWSPM ) to control the informationflows between two or more competing and/or conflicting companies in cloud computing(Multi-tenancy) or in the social network, is a very interesting solution.The main goal of the Chinese Wall Security Policy is to build a wall between the datasetsof competing companies, and among the system subjects. This is done by the applying tothe subjects mandatory rules, in order to control the information flow caused between them.This problem is one of the hottest topics in the area of cloud computing (as a distributedsystem) and has been attempted in the past; however the proposed solutions cannot dealwith the composite information flows problem (e.g., a malicious Trojan horses problem),caused by the writing access rule imposed to the subject on the objects.In this article, we propose a new CWSP model, based on the access query type of the subjectto the objects using the concepts of the CWSP. We have two types of walls placement, thefirst type consists of walls that are built around the subject, and the second around theobject. We cannot find inside each once wall two competing objects data. We showed thatthis mechanism is a good alternative to deal with some previous models limitations. Themodel is easy to implement in a distributed system (as Cloud-Computing). It is based on thetechnique of Object Oriented Programming (Can be used in Cloud computing Software asa service SaaS) or by using the capabilities as an access control in real distributed system
Sponsorship
Science Foundation Ireland
Other Sponsorship
Insight Research Centre
Type of Material
Journal Article
Publisher
Association of Digital Forensics, Security and Law
Journal
Journal of Digital Forensics, Security and Law
Volume
11
Issue
4
Start Page
149
End Page
168
Copyright (Published Version)
2016 ADFSL
Subjects

Security policy

Chinese Wall

Information flow

Distributed system

Cloud computing

DOI
10.15394/jdfsl.2016.1434
Language
English
Status of Item
Peer reviewed
This item is made available under a Creative Commons License
https://creativecommons.org/licenses/by-nc-nd/3.0/ie/
File(s)
Loading...
Thumbnail Image
Name

insight_publication.pdf

Size

314.97 KB

Format

Adobe PDF

Checksum (MD5)

e6a5c30ff06c5da92bea8cbf4c4ea66e

Owning collection
Insight Research Collection
Mapped collections
Computer Science Research Collection

Item descriptive metadata is released under a CC-0 (public domain) license: https://creativecommons.org/public-domain/cc0/.
All other content is subject to copyright.

For all queries please contact research.repository@ucd.ie.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement