Security and Architectural Issues for National Security Cloud Computing
Security concerns with respect to cloud computing have impelled the private sector to suggest a hybrid cloud architecture consisting of private and public clouds. For national security purposes, we advocate a hybrid cloud model that consists of private, public and community clouds. The community clo...
Uloženo v:
| Vydáno v: | 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops s. 21 - 25 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.06.2010
|
| Témata: | |
| ISBN: | 9781424474714, 142447471X |
| ISSN: | 1545-0678 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Security concerns with respect to cloud computing have impelled the private sector to suggest a hybrid cloud architecture consisting of private and public clouds. For national security purposes, we advocate a hybrid cloud model that consists of private, public and community clouds. The community clouds in this architecture are as defined by NIST, and will be used for inter-agency and community-of-interest (COI) information sharing and collaboration needs. The security requirements and characteristics of private and public clouds will not differ greatly from the private sector. However, while the architectural characteristics remain the same, we believe that national security community clouds will have different security features than the typical community cloud in order to support COI requirements. In this paper, we focus on the requirements and characteristics of national security community clouds that can meet the needs of COIs. |
|---|---|
| AbstractList | Security concerns with respect to cloud computing have impelled the private sector to suggest a hybrid cloud architecture consisting of private and public clouds. For national security purposes, we advocate a hybrid cloud model that consists of private, public and community clouds. The community clouds in this architecture are as defined by NIST, and will be used for inter-agency and community-of-interest (COI) information sharing and collaboration needs. The security requirements and characteristics of private and public clouds will not differ greatly from the private sector. However, while the architectural characteristics remain the same, we believe that national security community clouds will have different security features than the typical community cloud in order to support COI requirements. In this paper, we focus on the requirements and characteristics of national security community clouds that can meet the needs of COIs. |
| Author | McDermott, J Myong Kang Kim, Anya |
| Author_xml | – sequence: 1 givenname: Anya surname: Kim fullname: Kim, Anya email: anya.kim@nrl.navy.mil organization: Naval Res. Lab., Washington, DC, USA – sequence: 2 givenname: J surname: McDermott fullname: McDermott, J email: john.mcdermott@nrl.navy.mil organization: Naval Res. Lab., Washington, DC, USA – sequence: 3 surname: Myong Kang fullname: Myong Kang email: myong.kang@nrl.navy.mil organization: Naval Res. Lab., Washington, DC, USA |
| BookMark | eNo9jD1PwzAURY0oEqVkZWHxH0ixneevsQpQIlUwtBJj5TjPYNQmVZwM_fdEgLjL1Tm6ujdk1nYtEnLH2ZJzZh-q8rHcvi8Fm0QhLkhmtWFaWQlMW3n5wxwEgAbNYUbmXILMmdLmmmQpfbEpIIXiMCfrLfqxj8OZurahq95_xgH9MPbuQKuURkw0dD19dUPs2sn9z8tDNza07I6ncYjtxy25Cu6QMPvrBdk9P-3Kl3zztq7K1SaPlg25MrUOhcbA0FrPbBC6Zm4i4GC9CcGj1cgb9MZhESBIUFpYVYMqaibrYkHuf28jIu5PfTy6_ryXShgtVPENl0VRdA |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICDCSW.2010.32 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9780769540795 9781424474721 1424474728 0769540791 |
| EndPage | 25 |
| ExternalDocumentID | 5628726 |
| Genre | orig-research |
| GroupedDBID | 23M 29O 29Q 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL RNS |
| ID | FETCH-LOGICAL-i90t-68b7f37ef0e99c09f27b0af0e4149c8ffce97e1dec8ae3f4f5467296b463b05b3 |
| IEDL.DBID | RIE |
| ISBN | 9781424474714 142447471X |
| ISSN | 1545-0678 |
| IngestDate | Wed Aug 27 02:43:41 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-68b7f37ef0e99c09f27b0af0e4149c8ffce97e1dec8ae3f4f5467296b463b05b3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5628726 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-June |
| PublicationDateYYYYMMDD | 2010-06-01 |
| PublicationDate_xml | – month: 06 year: 2010 text: 2010-June |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops |
| PublicationTitleAbbrev | ICDCSW |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000452614 ssib015832234 ssj0019994 |
| Score | 1.8112844 |
| Snippet | Security concerns with respect to cloud computing have impelled the private sector to suggest a hybrid cloud architecture consisting of private and public... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 21 |
| SubjectTerms | Cloud computing Clouds Communities Computer architecture National security Organizations |
| Title | Security and Architectural Issues for National Security Cloud Computing |
| URI | https://ieeexplore.ieee.org/document/5628726 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH4B4sETKhh_pwePVrqtW9ejmaImhpBAlBtpt9eEhAyD4N9vu3XgwYu3dVm6tWvfe-3X730AtyGGTPFIU8NRUZ4nAdUiTqgsEG2EEQlV0cfe38RolM5mctyCux0XBhGrw2d47y4rLL9Y5Vu3VTawvjoVYdKGthBJzdVqxk4Qu6HpU51VVthpZzvX4xEFGwhVCLONGKiz0A3Jyy3KZk3uJ1_mPrtjwOTgNXvMJh_1GTCnUfJLg6VyQcPu_z7-CPp7Lh8Z77zUMbSwPIFuI-ZA_NzuwfPEK9kRVRbkYY8vqCWpJfqIjW-Jz6O9JLvHs-VqW5C6QvuGPkyHT9PshXqVBbqQbEOTVAsTCTQMpcyZNKHQTNkSt2unPDUmRykwKDBPFUaGm9ia1lAmmieRZrGOTqFTrko8A2IilSqujbExDmdFqnSAwsQaTWibbsJz6LlumX_WeTTmvkcu_r59CYc1Uu92PK6gs1lv8RoO8u_N4mt9U_38H5kBqOI |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH5BNNETKhh_24NHq_vRrevRTBEiEhKIciPt9pqQEDAI_v22WwcevHhbl2Xtmrf3Xvv1ex_AbYCBJ1moqGYoKctinyoexVTkiCbDCLks6GPvPd7vJ-OxGNTgbsOFQcTi8Bne28sCy88X2dpulT2YWJ3wIN6BXauc5dhalfX4kTVOV-ys8MNWPdsGH4cpmFSowJhNzkCtj65oXnZZNq6qP7k2c_UdfU88dNOndPhRngKzKiW_VFiKINRu_G_4h9DasvnIYBOnjqCG82NoVHIOxP3dTXgZOi07Iuc5edwiDHJGSpE-YjJc4ippz8jm8XS2WOekfKHpoQWj9vMo7VCns0CnwlvROFFchxy1h0JkntABV540LWZWT1midYaCo59jlkgMNdORca6BiBWLQ-VFKjyB-nwxx1MgOpSJZEprk-UwL0-k8pHrSKEOzKfr4Ayadlomn2UljYmbkfO_b9_Afmf01pv0uv3XCzgocXu7_3EJ9dVyjVewl32vpl_L68IQfgCbfKwr |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+30th+International+Conference+on+Distributed+Computing+Systems+Workshops&rft.atitle=Security+and+Architectural+Issues+for+National+Security+Cloud+Computing&rft.au=Kim%2C+Anya&rft.au=McDermott%2C+J&rft.au=Myong+Kang&rft.date=2010-06-01&rft.pub=IEEE&rft.isbn=9781424474714&rft.issn=1545-0678&rft.spage=21&rft.epage=25&rft_id=info:doi/10.1109%2FICDCSW.2010.32&rft.externalDocID=5628726 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-0678&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-0678&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-0678&client=summon |

