Scheduled System Maintenance:
On April 27th, single article purchases and IEEE account management will be unavailable from 2:00 PM - 4:00 PM ET (18:00 - 20:00 UTC).
We apologize for the inconvenience.
By Topic

Implementation of Chinese wall model in cloud computing for enhanced security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
6 Author(s)
Kesarwani, A. ; Cyber Law & Inf. Security, Indian Inst. of Inf. Technol., Allahabad, India ; Gupta, C. ; Tripathi, M.M. ; Gupta, V.
more authors

In a cloud environment, it is very difficult to implement some of the very basic concepts of Information security, Identity and access management, segregation of duties, access control to name a few. Also due to lack of awareness in this emerging field there is no world acclaimed standard/model to cater to the above mentioned problems especially from the point of view of the customer. We have tried to come up with a novel concept of implementing access control and segregation of duties in cloud using the critically acclaimed Chinese wall security policy, particularly from the client's perspective.

Published in:

Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on

Date of Conference:

22-24 April 2011