A Security Model of Individual Cyberspace
Електронного архіву Харківського національного університету радіоелектроніки (Open Access Repository of KHNURE)
Переглянути архів ІнформаціяПоле | Співвідношення | |
Creator |
Alexander Adamov, Vladimir Hahanov
|
|
Date |
2016-07-06T07:46:19Z
2016-07-06T07:46:19Z 2011 |
|
Identifier |
Alexander Adamov A Security Model of Individual Cyberspace/Alexander Adamov, Vladimir Hahanov//Proceedings of IEEE East-West Design & Test Symposium (EWDTS’2011)
http://hdl.handle.net/123456789/3131 |
|
Description |
Previous studies in the field of cyberspace security were mostly based on an analysis of a computer network state and identifying vulnerabilities in it [1], or using as security criterion multi-perspective parameters to assess and predict a security state of a network system [2]. In later studies, this approach has been recognized as untenable because it ignores the behaviour of a user when a system anomaly occurs. According to [3] cyberspace is defined as "a massive socio technical system of systems, with a significant component being the humans involved". Thus, the authors attribute the cyber attacks with social, political, economic and cultural phenomena. Today an individual virtual space expanded by the widespread expansion of social networking and Internet services that allow process and store data in the cloud. Thus, users are becoming less tied to their personal digital device, which is only used for access to online services to obtain the necessary data and perform operations. This approach allows us to abstract from hardware characteristics accessing the Internet and use any mobile hardware and software platform for a wide range of tasks in the "cloud" [4]. The examples of such services are cloud office (Google Documents, Microsoft Office Live), sharing of files and images, map services, interpreters, calendars, and, finally, social networks, where each member of a network can store personal information and gain access to multimedia content of other users. All these are evidence of humanity's transition to cloud technology everywhere. The protection of cloud services is hot topic today because these technologies are widely used by organizations to create a business service infrastructure. Accordingly, it is necessary to guarantee the security of corporate data in the cloud, which is an elusive task. Solving this task a company may sign Service Level Agreement (SLA) with a service provider, where all security issues are determined at different levels of representation [5]. For instance, Intel has developed a suite of solutions for secure access and data storage in the cloud. Intel's technologies are supported by leading antivirus companies Symantec and McAfee [6]. Taking in consideration the existing technologies in this area a new model of ICS protection is suggested, which implies the creation of a secure environment for data storage and processing with the help of a cloud computing technology. This paper describes a security model for protection of individual cyberspace (ICS) as a way of ensuring a secured user’s virtual environment. A concept of cyberspace and its main definitions is determined, as well as a formal model that describes mapping of prototypes in cyberspace into real-world objects. Based on analysis of contemporary security threats and methods of protection against them basic requirements for a security model were declared to ensure availability, integrity and confidentiality of user data within cyberspace. Information on cyber threats, as well as a review of existing security solutions in cloud computing was taken as a basis for the proposed ICS security model. The goal of the paper is to represent an analysis of security issues related to ICS and propose the conceptual model of a modern security environment. IEEE |
|
Language |
en
|
|
Publisher |
EWDTS
|
|
Subject |
Security Model
Cyberspace |
|
Title |
A Security Model of Individual Cyberspace
|
|
Type |
Article
|
|