TY - JOUR KW - access control KW - authentication KW - cloud environment KW - Cybersecurity KW - privacy KW - secure services AU - Piotr JurgaĆa AU - Tytus Kurek AU - Marcin Niemiec AB -
Outsourcing security services to the cloud allows companies to minimize IT infrastructure costs, use services faster, improve manageability, and reduce their own maintenance effort. However, the security policy, which identifies the rules and procedures, also contains information about security architecture, threats, and vulnerabilities. Therefore, the privacy of security policies applied in a cloud environment is needed. This article describes a structure of security policies for selected network services that will ensure privacy protection and protect against the analysis of network traffic by an unauthorized person. The developed solution is based on the UNIPRIV model. This architecture for authentication and access control services was implemented and verified, taking into account safety and performance.
BT - Information & Security: An International Journal DO - https://doi.org/10.11610/isij.5304 IS - 1 LA - eng N2 -Outsourcing security services to the cloud allows companies to minimize IT infrastructure costs, use services faster, improve manageability, and reduce their own maintenance effort. However, the security policy, which identifies the rules and procedures, also contains information about security architecture, threats, and vulnerabilities. Therefore, the privacy of security policies applied in a cloud environment is needed. This article describes a structure of security policies for selected network services that will ensure privacy protection and protect against the analysis of network traffic by an unauthorized person. The developed solution is based on the UNIPRIV model. This architecture for authentication and access control services was implemented and verified, taking into account safety and performance.
PY - 2022 SE - 47 SP - 47 EP - 64 T2 - Information & Security: An International Journal TI - Preserving Privacy of Security Services in the SecaaS Model VL - 53 ER -