Survivability (Resilience)— Software that is resistant to or tolerant of
attacks and has the ability to recover as quickly as possible with as little
harm as possible
Seven complementary principles that support information assurance are
confidentiality, integrity, availability, authentication, authorization, auditing,
and accountability. These concepts are summarized in the following sections.
Confidentiality, Integrity, and Availability
Confidentiality, integrity, and availability are sometimes known as the CIA triadof
information system security, and are important pillars of cloud software assurance.
Confidentiality
Confidentialityrefers to the prevention of intentional or unintentional unauthorized disclosure of information. Confi dentiality in cloud systems is related to the
areas of intellectual property rights, covert channels, traffic analysis, encryption, and inference:
Intellectual property rights— Intellectual property (IP) includes
inventions, designs, and artistic, musical, and literary works. Rights to
intellectual property are covered by copyright laws, which protect creations of the mind, and patents, which are granted for new inventions.
Covert channels— A covert channelis an unauthorized and unintended
communication path that enables the exchange of information. Covert channels can be accomplished through timing of messages or inappropriate
use of storage mechanisms.
Traffic analysis— Traffic analysisis a form of confi dentiality breach that can
be accomplished by analyzing the volume, rate, source, and destination of
message traffi c, even if it is encrypted. Increased message activity and high
bursts of traffi c can indicate a major event is occurring. Countermeasures
to traffi c analysis include maintaining a near-constant rate of message
traffi c and disguising the source and destination locations of the traffic.
Encryption— Encryptioninvolves scrambling messages so that they cannot be read by an unauthorized entity, even if they are intercepted. The
amount of effort (work factor) required to decrypt the message is a function
of the strength of the encryption key and the robustness and quality of the
encryption algorithm.
Inference— Inferenceis usually associated with database security. Inference
is the ability of an entity to use and correlate information protected at
one level of security to uncover information that is protected at a higher
security level.
64 Chapter 3 Cloud Computing Software Security Fundamentals
Integrity
The concept of cloud information integrityrequires that the following three
principles are met:
Modifications
đang được dịch, vui lòng đợi..
