Download now Free registration required
Information security has become increasingly important as organizations migrate systems to third-party infrastructure providers. Once migrated, however, previously transparent network topologies, information paths, and systems infrastructure became more opaque. This loss of control when coupled with storage of corporate and personally sensitive information lead to significant increases in potential vulnerability. In this paper, the authors present experimental evidence demonstrating the feasibility of using content-centric networks with integrated policy-based usage management. They describe a nation-spanning content network developed within Amazon and Rack space infrastructures and collect performance statistics to show the suitability of various confidentiality strategies in these kinds of large heterogeneous systems.
- Format: PDF
- Size: 875.64 KB