{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T05:49:07Z","timestamp":1654148947982},"reference-count":25,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1,1]]},"abstract":"

Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories (e.g., Denial of Service attacks) may drastically degrade the overall performance of such systems and cannot be detected by typical authentication mechanisms. This article proposes a generic security management framework allowing providers of Cloud data management systems to define and enforce complex security policies. This security framework is designed to detect and stop a large array of attacks defined through an expressive policy description language and to be easily interfaced with various data management systems. The authors show that they can efficiently protect a data storage system by evaluating the security framework on top of the BlobSeer data management platform. The authors evaluate the benefits of preventing a DoS attack targeted towards BlobSeer through experiments performed on the Grid\u20195000 testbed.<\/p>","DOI":"10.4018\/jdst.2012010102","type":"journal-article","created":{"date-parts":[[2012,2,2]],"date-time":"2012-02-02T13:33:43Z","timestamp":1328189623000},"page":"17-34","source":"Crossref","is-referenced-by-count":1,"title":["Towards a Generic Security Framework for Cloud Data Management Environments"],"prefix":"10.4018","volume":"3","author":[{"given":"Alexandra","family":"Carpen-Amarie","sequence":"first","affiliation":[{"name":"Inria Rennes \u2013 Bretagne Atlantique, France"}]},{"given":"Alexandru","family":"Costan","sequence":"additional","affiliation":[{"name":"Inria Rennes \u2013 Bretagne Atlantique, France"}]},{"given":"Catalin","family":"Leordeanu","sequence":"additional","affiliation":[{"name":"University Politehnica Bucharest, Romania"}]},{"given":"Cristina","family":"Basescu","sequence":"additional","affiliation":[{"name":"University Politehnica Bucharest, Romania"}]},{"given":"Gabriel","family":"Antoniu","sequence":"additional","affiliation":[{"name":"Inria Rennes \u2013 Bretagne Atlantique, France"}]}],"member":"2432","reference":[{"key":"jdst.2012010102-0","unstructured":"Amazon Web Services. (2011). Amazon Elastic Compute Cloud (EC2). Retrieved September 30, 2011, from http:\/\/aws.amazon.com\/ec2\/"},{"key":"jdst.2012010102-1","unstructured":"Amazon Web Services. (2011). Amazon Simple Storage Service (S3). Retrieved September 30, 2011, from http:\/\/aws.amazon.com\/s3\/"},{"key":"jdst.2012010102-2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (pp. 1-10).","DOI":"10.1145\/1460877.1460889"},{"key":"jdst.2012010102-3","doi-asserted-by":"crossref","unstructured":"Basescu, C., Carpen-Amarie, A., Leordeanu, C., Costan, A., & Antoniu, G. (2011). Managing data access on clouds: A generic framework for enforcing security policies. In Proceedings of the 25th International Conference on Advanced Information Networking and Applications, Singapore (pp. 459-466).","DOI":"10.1109\/AINA.2011.61"},{"key":"jdst.2012010102-4","doi-asserted-by":"publisher","DOI":"10.1177\/1094342006070078"},{"key":"jdst.2012010102-5","author":"D.Borthakur","year":"2007","journal-title":"The Hadoop Distributed File System: Architecture and Design"},{"key":"jdst.2012010102-6","unstructured":"Borthakur, D. (2009). HDFS: the Hadoop distributed file system. Retrieved September 30, 2011, from http:\/\/hadoop.apache.org\/common\/docs\/r0.20.1\/hdfs_design.html"},{"key":"jdst.2012010102-7","doi-asserted-by":"crossref","unstructured":"Bowers, K. D., Juels, A., & Oprea, A. (2009). Hail: a high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 187-198).","DOI":"10.1145\/1653662.1653686"},{"key":"jdst.2012010102-8","doi-asserted-by":"crossref","unstructured":"Carpen-Amarie, A., Cai, J., Costan, A., Antoniu, G., & Boug\u00e9, L. (2010). Bringing introspection into the BlobSeer data- management system using the MonALISA distributed monitoring framework. In Proceedings of the First International Workshop on Autonomic Distributed Systems held in conjunction with the Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland (pp. 508-513).","DOI":"10.1109\/CISIS.2010.37"},{"key":"jdst.2012010102-9","doi-asserted-by":"publisher","DOI":"10.2478\/v10006-011-0017-y"},{"key":"jdst.2012010102-10","doi-asserted-by":"crossref","unstructured":"Descher, M., Masser, P., Feilhauer, T., Tjoa, A. M., & Huemer, D. (2009). Retaining data control to the client in infrastructure clouds. In Proceedings of the International Conference on Availability, Reliability and Security, Fukoka, Japan (pp. 9-16).","DOI":"10.1109\/ARES.2009.78"},{"key":"jdst.2012010102-11","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud computing. In Proceedings of the International Conference on Cloud Computing (pp. 109-116).","DOI":"10.1109\/CLOUD.2009.60"},{"key":"jdst.2012010102-12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.94"},{"key":"jdst.2012010102-13","unstructured":"Legrand, I., Newman, H., Voicu, R., Cirstoiu, C., Grigoras, C., Dobre, C., et al. (2004). MonALISA: An agent based, dynamic service system to monitor, control and optimize grid based applications. In Proceedings of the Conference on Computing for High Energy Physics, Interlaken, Switzerland."},{"key":"jdst.2012010102-14","unstructured":"Microsoft. (2011). Windows Azure Platform. Retrieved September 30, 2011, from http:\/\/microsoft.com\/azure"},{"key":"jdst.2012010102-15","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"jdst.2012010102-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.08.004"},{"key":"jdst.2012010102-17","doi-asserted-by":"crossref","unstructured":"Pearson, S., & Benameur, A. (2010). Privacy, security and trust issues arising from cloud computing. In Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science (pp. 693-702).","DOI":"10.1109\/CloudCom.2010.66"},{"key":"jdst.2012010102-18","unstructured":"Roy, I., Setty, S. T. V., Kilzer, A., Shmatikov, V., & Witchel, E. (2010). Airavat: security and privacy for MapReduce. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (p. 20)."},{"key":"jdst.2012010102-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"jdst.2012010102-20","doi-asserted-by":"crossref","unstructured":"Takabi, H., Joshi, J., & Ahn, G. (2010a). Securecloud: Towards a comprehensive security framework for cloud computing environments. In Proceedings of the 34th IEEE Annual Workshop on Computer Software and Applications, Seoul, Korea (pp. 393-398).","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"jdst.2012010102-21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"jdst.2012010102-22","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"key":"jdst.2012010102-23","doi-asserted-by":"crossref","unstructured":"Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., et al. (2003). Security for grid services. In Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (pp. 48-57).","DOI":"10.1109\/HPDC.2003.1210015"},{"key":"jdst.2012010102-24","unstructured":"Zissis, D., & Lekkas, D. (2010). Addressing cloud computing security issues. Future Generation Computer Systems. Retrieved September 30, 2011, from http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X10002554"}],"container-title":["International Journal of Distributed Systems and Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=63633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T05:23:17Z","timestamp":1654147397000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdst.2012010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,1,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jdst.2012010102","relation":{},"ISSN":["1947-3532","1947-3540"],"issn-type":[{"value":"1947-3532","type":"print"},{"value":"1947-3540","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,1]]}}}