Cloud based deployments have been moving towards a positive trend over the past decade. A
variety of tooling has been introduced and the deployment procedure itself has been immensely eased. Thus, many large scale businesses are considering a move towards a fully cloud based solution. This enables them to take complete advantage of the data intensive computing facilities of the cloud. Nevertheless, the decision to move towards a complete cloud-deployment does pose some important concerns; the top priority concern being data security. The current service-levels (in terms of data security) provided by the cloud providers are proven to be strong.However, the threat model addressed by such SLAs are related to protection of the cloud Virtual Machine(VM)s from external access and against cross-communication between adjacent VMs.
Yet, an orthogonal security concern is ensuring security over internal threats. This requires a
defense in depth mechanism enforced on the processes internal to the deployment. The threat
model for such internal-threats is derived from the bogus behavior of applications in the deployment. The study that follows produces a solution that is immune to such threats in scheduled events with large volumes of sensitive tenant information in the cloud.

Sodipress vous remercie de renseigner votre email pour recevoir le document.
Envoyer le document
You May Also Like