Wyniki 1-1 spośród 1 dla zapytania: authorDesc:"Tytus Kurek"


  Security services used to be outsourced to the cloud for many years [18]. With a rapid growth of the cloud market not only a number of Cloud Service Providers (CSPs) continues to grow, but also new types of cloudbased security services become available. A business model of outsourcing security services to the cloud is referred to as Security-as-a-Service (SecaaS) [15]. Although commonly adopted by organizations of a different size and purpose [3], SecaaS services pose a serious risk of confidential information leakage [10]. This is because in SecaaS model customer’s security policy is outsourced to the CSP and must be visible to a security engine running in the cloud. The security policy, defined as the representation of security standards that apply to all systems within an organization and define the security relationship between it and the outside world [2], contains confidential information about customer’s Information Technology (IT) infrastructure. Depending on the security service being outsourced these information can be a public Internet Protocol (IP) addresses, open Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, vulnerabilities, credentials, etc. In order to resolve the problem described above, privacy preserving solutions for SecaaS services have been proposed over the past years. These solutions aim to continue outsourcing the most computationallyexpensive operations to the cloud while preserving the privacy of customer’s security policy. As a result, customers keep taking the advantage of cloud outsourcing while protecting their confidential information from being stolen by an intruder. This PRZEGLĄD TELEKOMUNIKACYJNY - ROCZNIK XC - WIADOMOŚCI TELEKOMUNIKACYJNE - ROCZNIK LXXXVI - nr 8-9/2017 908 DOI: 10.15199/59.2017.8-9.58 cannot be achieved, however, without redesigning the existing model of hosting SecaaS services. The privacy preserving solutions for SecaaS [...]

 Strona 1