Abstract:
An approach is provided for managing a message in a transfer from a computer. A level of security protecting the transfer of the data is determined. The level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the level of security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action changes a method of network layer encryption for the transfer and/or a protocol specifying whether application layer encryption is utilized for the transfer. The action is executed to connect the computer and transfer the message using the changed level of security.
Abstract:
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
Abstract:
An approach is provided for managing a message in a transfer from a computer. A level of security protecting the transfer of the data is determined. The level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the level of security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action changes a method of network layer encryption for the transfer and/or a protocol specifying whether application layer encryption is utilized for the transfer. The action is executed to connect the computer and transfer the message using the changed level of security.
Abstract:
Approaches for routing data to storage are provided. An approach includes determining implicit metadata from explicit metadata received with a request from a user to store a file. The approach also includes determining a storage resource based on the explicit metadata, the implicit metadata, and a registry of storage resources. The approach additionally includes routing data of the file to the determined storage resource.
Abstract:
Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.
Abstract:
An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.
Abstract:
An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level of security protecting the transfer of the data is determined. Based on the level of sensitivity, the level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the levels of sensitivity and security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action is executed to connect the computer and transfer the message using the changed level of security.
Abstract:
An approach for facilitating collaborative support to a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, specifications that describe a networked resource (e.g., a cloud resource) are retrieved. A set of preferences that specify a set of collaborators and a set of access limitations for the set of collaborators with respect to the networked resource are gathered in response to a request for help by a user. Also in response to the request, a clone of the networked resource is created. A collaborator from the set of collaborators is granted access to clone the networked resource having the set of access limitations. The collaborator can access the clone of the networked resource (e.g., to provide support to the user) until a terminating condition is met, at which time the collaborators' access to the clone is terminated.
Abstract:
An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted.
Abstract:
An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.