IMPLEMENTACIJA INFORMACIONE BEZBEDNOSTI AKVIZICIONO-UPRAVLJAČKIH SISTEMA NA CLOUD-U
Ključne reči:
Informaciona bezbednost, AUS, Cloud, autentifikacija, autorizacija
Apstrakt
U ovom radu je detaljno opisan podsistem za autentifikaciju i autorizaciju korisnika kako u tradicionalnom, tako i u Cloud okruženju. Za ove potrebe, razvijene su dve aplikacije koje simuliraju procese akviziciono-upravljačkih sistema i detaljno su opisani koraci koje je potrebno preduzeti kako bi se migriralo sa tradicionalnog okruženja na Cloud okruženje. Potreba za prelaskom sa tradicionalnog okruženja na Cloud okruženje se javlja iz činjenice da Cloud okruženje pruža brojne prednosti po pitanju performansi [1], ali i zbog lakoće implementacije sigurnosnih aspekata u već postojeća rešenja što je i demonstrirano u ovom radu.
Reference
[1] N. Popović, „Napredni distributivni menadžment sistem zasnovan na Cloud infrastrukturi,“ Fakultet tehničkih nauka, Novi Sad, 2018.
[2] O. Ashman and I. Damsky, "ThreatSTOP Report: BlackEnergy," THREATSTOPBME, 2016.
[3] F. Y. Rashid, "Telvent Hit by Sophisticated Cyber-Attack, SCADA Admin Tool Compromised," SecurityWeek, 26 September 2012. [Online]. Available: https://www.securityweek.com/telvent-hit-sophisticated-cyber-attack-scada-admin-tool-compromised. [Accessed 11 May 2022].
[4] K. Straub, "Information Security: Managing Risk with Defense in Depth," SANS Institute, 2003.
[5] M. E. Whitman and H. J. Mattord, Principles of Information Security, 4th ed., Boston: Course Technology, 2012.
[6] E. Bauer and R. Adams, Reliability and Availability of Cloud Computing, Hoboken, New Jersey: IEEE Press and John Wiley & Sons, Inc., 2012.
[7] J. Thornton, "matomo," 17 July 2020. [Online]. Available: https://matomo.org/blog/2020/07/storing-data-on-us-cloud-servers-dont-comply-with-gdpr/. [Accessed 15 May 2022].
[8] European Commission, "EU-US data transfers: How personal data transferred between the EU and US is protected.," European Commision, [Online]. Available: https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/eu-us-data-transfers_en. [Accessed 15 May 2022].
[9] European Commission, "European Commission and United States Joint Statement on Trans-Atlantic Data Privacy Framework," 25 March 2022. [Online]. Available: https://ec.europa.eu/commission/presscorner/detail/en/ip_22_2087. [Accessed 15 May 2022].
[10] A. Singh and K. Chatterjee, "Cloud security issues and challenges: A survey," Journal of Network and Computer Applications, vol. 79, pp. 88-115, 2017.
[11] Y. A. Younis, M. Merabti i K. Kifayat, „Secure Cloud Computing for Critical Infrastructure: A Survey,“ The 14th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNet 2013), Liverpool, UK, pp. 1-6, 2012.
[12] J. G. Steiner, C. Neuman and J. I. Schiller, "Kerberos: An Authentication Service for Open Network Systems".
[13] Microsoft, "What is Azure Active Directory?," [Online]. Available: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis. [Accessed September 2019].
[14] "Azure Active Directory and WCF authentication," 14 November 2014. [Online]. Available: https://stackoverflow.com/questions/26930018/azure-active-directory-and-wcf-authentication. [Accessed April 2019].
[2] O. Ashman and I. Damsky, "ThreatSTOP Report: BlackEnergy," THREATSTOPBME, 2016.
[3] F. Y. Rashid, "Telvent Hit by Sophisticated Cyber-Attack, SCADA Admin Tool Compromised," SecurityWeek, 26 September 2012. [Online]. Available: https://www.securityweek.com/telvent-hit-sophisticated-cyber-attack-scada-admin-tool-compromised. [Accessed 11 May 2022].
[4] K. Straub, "Information Security: Managing Risk with Defense in Depth," SANS Institute, 2003.
[5] M. E. Whitman and H. J. Mattord, Principles of Information Security, 4th ed., Boston: Course Technology, 2012.
[6] E. Bauer and R. Adams, Reliability and Availability of Cloud Computing, Hoboken, New Jersey: IEEE Press and John Wiley & Sons, Inc., 2012.
[7] J. Thornton, "matomo," 17 July 2020. [Online]. Available: https://matomo.org/blog/2020/07/storing-data-on-us-cloud-servers-dont-comply-with-gdpr/. [Accessed 15 May 2022].
[8] European Commission, "EU-US data transfers: How personal data transferred between the EU and US is protected.," European Commision, [Online]. Available: https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/eu-us-data-transfers_en. [Accessed 15 May 2022].
[9] European Commission, "European Commission and United States Joint Statement on Trans-Atlantic Data Privacy Framework," 25 March 2022. [Online]. Available: https://ec.europa.eu/commission/presscorner/detail/en/ip_22_2087. [Accessed 15 May 2022].
[10] A. Singh and K. Chatterjee, "Cloud security issues and challenges: A survey," Journal of Network and Computer Applications, vol. 79, pp. 88-115, 2017.
[11] Y. A. Younis, M. Merabti i K. Kifayat, „Secure Cloud Computing for Critical Infrastructure: A Survey,“ The 14th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNet 2013), Liverpool, UK, pp. 1-6, 2012.
[12] J. G. Steiner, C. Neuman and J. I. Schiller, "Kerberos: An Authentication Service for Open Network Systems".
[13] Microsoft, "What is Azure Active Directory?," [Online]. Available: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis. [Accessed September 2019].
[14] "Azure Active Directory and WCF authentication," 14 November 2014. [Online]. Available: https://stackoverflow.com/questions/26930018/azure-active-directory-and-wcf-authentication. [Accessed April 2019].
Objavljeno
2022-11-05
Sekcija
Elektrotehničko i računarsko inženjerstvo