Vol.65, No.3, 2020, pp.2687-2705, doi:10.32604/cmc.2020.011232
Information Flow Security Models for Cloud Computing
  • Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1
1 Nanjing Audit University, Nanjing, 211815, China.
2 Center for Data Science, Courant Institute of Mathematical Sciences, New York University, New York, 10011-8868, USA.
* Corresponding Author: Congdong Lv. Email: lvcongdonglv@163.com.
Received 28 April 2020; Accepted 20 May 2020; Issue published 16 September 2020
Cloud computing provides services to users through Internet. This open mode not only facilitates the access by users, but also brings potential security risks. In cloud computing, the risk of data leakage exists between users and virtual machines. Whether direct or indirect data leakage, it can be regarded as illegal information flow. Methods, such as access control models can control the information flow, but not the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture. Typical noninterference models are not suitable to certificate information flow in cloud computing architecture. In this paper, we propose several information flow models for cloud architecture. One model is for transitive cloud computing architecture. The others are for intransitive cloud computing architecture. When concurrent access actions execute in the cloud architecture, we want that security domain and security domain do not affect each other, that there is no information flow between security domains. But in fact, there will be more or less indirect information flow between security domains. Our models are concerned with how much information is allowed to flow. For example, in the CIP model, the other domain can learn the sequence of actions. But in the CTA model, the other domain can’t learn the information. Which security model will be used in an architecture depends on the security requirements for that architecture.
Cloud computing security, information flow security, noninterference, noninterference models.
Cite This Article
C. Lv, J. Zhang, Z. Sun and G. Qian, "Information flow security models for cloud computing," Computers, Materials & Continua, vol. 65, no.3, pp. 2687–2705, 2020.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.