Запис Детальніше

A Security Model of Individual Cyberspace

Електронного архіву Харківського національного університету радіоелектроніки (Open Access Repository of KHNURE)

Переглянути архів Інформація
 
 
Поле Співвідношення
 
Creator Alexander Adamov, Vladimir Hahanov
 
Date 2016-07-06T07:46:19Z
2016-07-06T07:46:19Z
2011
 
Identifier Alexander Adamov A Security Model of Individual Cyberspace/Alexander Adamov, Vladimir Hahanov//Proceedings of IEEE East-West Design & Test Symposium (EWDTS’2011)
http://hdl.handle.net/123456789/3131
 
Description Previous studies in the field of cyberspace security
were mostly based on an analysis of a computer
network state and identifying vulnerabilities in it [1],
or using as security criterion multi-perspective
parameters to assess and predict a security state of a
network system [2]. In later studies, this approach has
been recognized as untenable because it ignores the
behaviour of a user when a system anomaly occurs.
According to [3] cyberspace is defined as "a massive
socio technical system of systems, with a significant
component being the humans involved". Thus, the
authors attribute the cyber attacks with social,
political, economic and cultural phenomena.
Today an individual virtual space expanded by the
widespread expansion of social networking and
Internet services that allow process and store data in
the cloud. Thus, users are becoming less tied to their
personal digital device, which is only used for access
to online services to obtain the necessary data and
perform operations.
This approach allows us to abstract from hardware
characteristics accessing the Internet and use any
mobile hardware and software platform for a wide
range of tasks in the "cloud" [4]. The examples of such
services are cloud office (Google Documents,
Microsoft Office Live), sharing of files and images,
map services, interpreters, calendars, and, finally,
social networks, where each member of a network can
store personal information and gain access to
multimedia content of other users. All these are
evidence of humanity's transition to cloud technology
everywhere.
The protection of cloud services is hot topic today
because these technologies are widely used by
organizations to create a business service
infrastructure. Accordingly, it is necessary to
guarantee the security of corporate data in the cloud,
which is an elusive task. Solving this task a company
may sign Service Level Agreement (SLA) with a
service provider, where all security issues are
determined at different levels of representation [5]. For
instance, Intel has developed a suite of solutions for
secure access and data storage in the cloud. Intel's
technologies are supported by leading antivirus
companies Symantec and McAfee [6].
Taking in consideration the existing technologies in
this area a new model of ICS protection is suggested,
which implies the creation of a secure environment for
data storage and processing with the help of a cloud
computing technology.
This paper describes a security model for
protection of individual cyberspace (ICS) as a way of
ensuring a secured user’s virtual environment. A
concept of cyberspace and its main definitions is
determined, as well as a formal model that describes
mapping of prototypes in cyberspace into real-world
objects. Based on analysis of contemporary security
threats and methods of protection against them basic
requirements for a security model were declared to
ensure availability, integrity and confidentiality of
user data within cyberspace. Information on cyber
threats, as well as a review of existing security
solutions in cloud computing was taken as a basis for
the proposed ICS security model.
The goal of the paper is to represent an analysis of
security issues related to ICS and propose the
conceptual model of a modern security environment.
IEEE
 
Language en
 
Publisher EWDTS
 
Subject Security Model
Cyberspace
 
Title A Security Model of Individual Cyberspace
 
Type Article