By Topic

Implementation of Chinese wall model in cloud computing for enhanced security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Kesarwani, A. ; Cyber Law & Inf. Security, Indian Inst. of Inf. Technol., Allahabad, India ; Gupta, C. ; Tripathi, M.M. ; Gupta, V.
more authors

In a cloud environment, it is very difficult to implement some of the very basic concepts of Information security, Identity and access management, segregation of duties, access control to name a few. Also due to lack of awareness in this emerging field there is no world acclaimed standard/model to cater to the above mentioned problems especially from the point of view of the customer. We have tried to come up with a novel concept of implementing access control and segregation of duties in cloud using the critically acclaimed Chinese wall security policy, particularly from the client's perspective.

Published in:

Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on

Date of Conference:

22-24 April 2011