01339nas a2200217 4500000000100000000000100001008004100002653001900043653001900062653002200081653001800103653001200121653002000133100001900153700001600172700001900188245006500207300001100272490000700283520083100290 2022 d10aaccess control10aauthentication10acloud environment10aCybersecurity10aprivacy10asecure services1 aPiotr JurgaƂa1 aTytus Kurek1 aMarcin Niemiec00aPreserving Privacy of Security Services in the SecaaS Model a47-64 0 v533 a

Outsourcing security services to the cloud allows companies to minimize IT infrastructure costs, use services faster, improve manageability, and reduce their own maintenance effort. However, the security policy, which identifies the rules and procedures, also contains information about security architecture, threats, and vulnerabilities. Therefore, the privacy of security policies applied in a cloud environment is needed. This article describes a structure of security policies for selected network services that will ensure privacy protection and protect against the analysis of network traffic by an unauthorized person. The developed solution is based on the UNIPRIV model. This architecture for authentication and access control services was implemented and verified, taking into account safety and performance.