You are here

A New Distributed Chinese Wall Security Policy Model


Saad Fehis, Omar Nouali, Tahar Kechadi

Publication Type: 
Refereed Original Article
The application of the Chinese wall security policy model (CWSPM ) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed system) and has been attempted in the past; however the proposed solutions cannot deal with the composite information flows problem (e.g., a malicious Trojan horses problem), caused by the writing access rule imposed to the subject on the objects. In this article, we propose a new CWSP model, based on the access query type of the subject to the objects using the concepts of the CWSP. We have two types of walls placement, the first type consists of walls that are built around the subject, and the second around the object. We cannot find inside each once wall two competing objects’ data. We showed that this mechanism is a good alternative to deal with some previous models’ limitations. The model is easy to implement in a distributed system (as Cloud-Computing). It is based on the technique of Object Oriented Programming (Can be used in Cloud computing ”Software as a service SaaS”) or by using the capabilities as an access control in real distributed system
Digital Object Identifer (DOI): 
Publication Status: 
Publication Date: 
Journal of Digital Forensics, Security & Law, 11(4), p149-168. 20p, 2016.
National University of Ireland, Dublin (UCD)
Open access repository: