Overlay architectures enabling cloud computing for multi-level security environments

Christopher C. Lamb, Gregory L. Heileman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Herein, we consider how overlay architectures can be deployed in order to support usage management in cloud computing. We contrast filter-centric perimeter and policy-centric overlay approaches toward usage management of sensitive content from the perspective of cross-domain solutions and then demonstrate a path from current systems to distributed policy-centric overlay methods. We first cover the need for overlay networks supporting usage management by highlighting the pending migration to utility computing models and the current shortcomings of those kinds of systems from a variety of perspectives. We also briefly cover the state of usage management within these kinds of systems, also examining the known state of the art in proposed cross domain solutions. We then compare and contrast the advantages of policy-based overlay systems to solving usage management issues over sensitive materials within multi-level security environments. We then demonstrate a migration path from current to future solutions. We close with our current and future directions of research.

Original languageEnglish (US)
Title of host publicationProceedings - 2012 IEEE 8th World Congress on Services, SERVICES 2012
Pages116-124
Number of pages9
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE 8th World Congress on Services, SERVICES 2012 - Honolulu, HI, United States
Duration: Jun 24 2012Jun 29 2012

Publication series

NameProceedings - 2012 IEEE 8th World Congress on Services, SERVICES 2012

Conference

Conference2012 IEEE 8th World Congress on Services, SERVICES 2012
Country/TerritoryUnited States
CityHonolulu, HI
Period6/24/126/29/12

Keywords

  • cross domain solutions
  • overlay networks
  • usage management

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Overlay architectures enabling cloud computing for multi-level security environments'. Together they form a unique fingerprint.

Cite this