Advanced Architecture of the Integrated IT Platform with High Security Level

  • Gerard Frankowski
  • Marcin Jerzak
Part of the Communications in Computer and Information Science book series (CCIS, volume 287)

Abstract

“Advanced architecture of the Integrated IT Platform with high security level” is a development project within the area of the homeland security. The results of the project are intended to be used by a Polish Law Enforcement Authority. The goal of the project is to develop the architecture of a network and application IT environment for secure, reliable, efficient and scalable processing and storing data by current and future applications and services. Additionally, a clear migration path from the current infrastructure must be provided. Together with the increasing demand on the network bandwidth, expected growth of the multimedia mobile applications and with particular respect to strict security requirements it raises numerous IT security challenges. In this paper we would like to describe how security was addressed within the project and how external research, our own experience, and results of ther similar research projects (including those from the homeland security area) have been combined to provide the maximum possible protection level. We hope that the described approach may be used at least as an initial pattern in other similar initiatives.

Keywords

IT security defense-in-depth network infrastructure cloud computing project LEA homeland security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Motorola Solutions Media Center. Public safety organisations plan next generation services, http://mediacenter.motorolasolutions.com/content/detail.aspx?ReleaseID=14136
  2. 2.
  3. 3.
    Proteus. integrated mobile system for counterterrosrism and rescue operations, http://www.projektproteus.pl/?lg=_en
  4. 4.
    Indect: intelligent information system supporting observation, searching and detection for security of citizens in urban environment, http://www.indect-project.eu
  5. 5.
    Odlyzko, A.: Economics, Psychology, and Sociology of Security. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 182–189. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Morana, M.M.: Building security into the software life cycle, http://www.blackhat.com/presentations/bh-usa-06/bh-us-06-Morana-R3.0.pdf
  7. 7.
    Microsoft security development lifecycle, http://www.microsoft.com/security/sdl
  8. 8.
    Geant project, http://www.geant.net
  9. 9.
    Pl-grid project, http://www.plgrid.pl/en
  10. 10.
    Balcerek, B., Frankowski, G., Kwiecień, A., Smutnicki, A., Teodorczyk, M.: Security Best Practices: Applying Defense-in-Depth Strategy to Protect the NGI_PL. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol. 7136, pp. 128–141. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  11. 11.
    Jerzak, M., Czarniecki, L., Frankowski, G.: Ddos attacks in the future internet. In: Towards and Beyond Europe 2020: The Significance of Future Internet for Regional Development. Future Internet Event Report (in preparation)Google Scholar
  12. 12.
    ENISA. Cloud computing: Benefits, risks and recommendations for information security, http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessment/at_download/fullReport
  13. 13.
    Winkler, V.(J.R.): Securing the cloud - cloud computer security, techniques and tactics, pp. 195–209. Elsevier Inc. (2011)Google Scholar
  14. 14.
    Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)MathSciNetMATHCrossRefGoogle Scholar
  15. 15.
    Spada, F.E., Swanson, S., Wei, M., Grupp, L.M.: Reliably erasing data from flash-based solid state drives, http://static.usenix.org/events/fast11/tech/full_papers/Wei.pdf
  16. 16.
    Knowledge and security management in high security level services, http://ppbw.pcss.pl/en
  17. 17.
    Wojtysiak, M., Jerzak, M.: Distributed intrusion detection systems: Metalds case study. Computational Methods in Science in Technology, Special Issue 2010, 135–145 (2010)Google Scholar
  18. 18.
    Frankowski, G., Rzepka, M.: SARA – System for Inventory and Static Security Control in a Grid Infrastructure. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol. 7136, pp. 102–113. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  19. 19.
    ETSI Lawful Interception Technical Committee. Etsi ts 102 657 v1.9.1 - retained data handling: handover interface for the request and delivery of retained dataGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Gerard Frankowski
    • 1
  • Marcin Jerzak
    • 1
  1. 1.Poznań Supercomputing and Networking CenterInstitute of Bioorganic Chemistry of the Polish Academy of SciencesPoznańPoland

Personalised recommendations