首页> 外文会议>International Conference on Image Information Processing >Secure E-Governance: From Observation to Policy Formulation
【24h】

Secure E-Governance: From Observation to Policy Formulation

机译:安全电子治理:从观察到政策制定

获取原文

摘要

This paper proposes to introduce a security policy as part of forensic readiness for a State who is or will be providing Digital Forensics as a Service (DFaaS) integrated with e-Government services. A few of the constituents of DFaaS are the investigating services for crimes which may even be committed by the Infrastructure Providers (IFP) in Cloud Computing Environment (CCE). The policy proposes to acquire a guarantee from IFP that it will not establish any direct connection with its Virtual Machine (VM)s while providing computing resources to any Cloud Service Provider (CSP) or end user. The basic objective of this policy is to maintain Confidentiality, Integrity and Availability (CIA) of information contained in any CCE in connection with possible threats from the IFP side. A few scenarios are depicted in this paper to show that an IFP can easily establish a connection with one or many VM(s) of a CCE and can violate the basic principles of CIA. In view of this, we have also proposed a few techniques in this paper to make the CSP and end user forensically ready so that such system can raise an immediate alert only when an unauthorized connection is established by a host towards its VM(s).
机译:本文建议将安全策略推出,作为州或将作为与电子政务服务一体化的服务(DFAAS)提供数字取证的法医准备的一部分。 DFAAS的一些成员是调查犯罪的服务,甚至可以由云计算环境(CCE)中的基础设施提供商(IFP)犯下的犯罪。该政策提出从IFP获取保证,即它不会与其虚拟机(VM)S的任何直接连接,同时向任何云服务提供商(CSP)或最终用户提供计算资源。本政策的基本目标是保持任何CCE所载的信息的机密性,完整性和可用性(CIA)与IFP方面的可能威胁有关。本文中描绘了几种情况,以表明IFP可以轻松地与CCE的一个或多个VM的连接,并违反中央情报局的基本原则。鉴于此,我们还提出了本文中的一些技术,以使CSP和最终用户取得准备好,因此才能在主机朝向其VM的未经授权的连接时才能提高立即警报。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号