Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach

被引:4
|
作者
Goeke, Ludger [1 ]
Mohammadi, Nazila Gol [1 ]
Heisel, Maritta [1 ]
机构
[1] Univ Duisburg Essen, Paluno Ruhr Inst Software Technol, D-47157 Duisburg, Germany
基金
欧盟地平线“2020”;
关键词
cloud computing; information security; data protection; context analysis; pattern;
D O I
10.3390/fi10080072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing services bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboration and data exchange over the Internet. Hence, users have become more concerned about security and privacy aspects. For secure provisioning of a cloud computing service, security and privacy issues must be addressed by using a risk assessment method. To perform a risk assessment, it is necessary to obtain all relevant information about the context of the considered cloud computing service. The context analysis of a cloud computing service and its underlying system is a difficult task because of the variety of different types of information that have to be considered. This context information includes (i) legal, regulatory and/or contractual requirements that are relevant for a cloud computing service (indirect stakeholders); (ii) relations to other involved cloud computing services; (iii) high-level cloud system components that support the involved cloud computing services; (iv) data that is processed by the cloud computing services; and (v) stakeholders that interact directly with the cloud computing services and/or the underlying cloud system components. We present a pattern for the contextual analysis of cloud computing services and demonstrate the instantiation of our proposed pattern with real-life application examples. Our pattern contains elements that represent the above-mentioned types of contextual information. The elements of our pattern conform to the General Data Protection Regulation. Besides the context analysis, our pattern supports the identification of high-level assets. Additionally, our proposed pattern supports the documentation of the scope and boundaries of a cloud computing service conforming to the requirements of the ISO 27005 standard (information security risk management). The results of our context analysis contribute to the transparency of the achieved security and privacy level of a cloud computing service. This transparency can increase the trust of users in a cloud computing service. We present results of the RestAssured project related to the context analysis regarding cloud computing services and their underlying cloud computing systems. The context analysis is the prerequisite to threat and control identification that are performed later in the risk management process. The focus of this paper is the use of a pattern at the time of design systematic context analysis and scope definition for risk management methods.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Dedicated Instruction Set for Pattern-Based Data Transfers: An Experimental Validation on Systems Containing In-Memory Computing Units
    Mambu, Kevin
    Charles, Henri-Pierre
    Kooli, Maha
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (11) : 3757 - 3767
  • [22] An Approach of Using OS Through Cloud Computing
    Gupta, Devansh
    2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 163 - 168
  • [23] Systems approach to cloud computing adoption in an emerging economy
    Sharma, Mahak
    Gupta, Ruchita
    Acharya, Padmanav
    Jain, Karuna
    INTERNATIONAL JOURNAL OF EMERGING MARKETS, 2023, 18 (09) : 3283 - 3308
  • [24] Analysis of Working Process for Cloud Computing Systems
    Ji, Lanyang
    Ding, Jie
    Zhao, Xu
    2018 CROSS STRAIT QUAD-REGIONAL RADIO SCIENCE AND WIRELESS TECHNOLOGY CONFERENCE (CSQRWC), 2018,
  • [25] Virtual Network Mapping in Cloud Computing: A Graph Pattern Matching Approach
    Cao, Yang
    Fan, Wenfei
    Ma, Shuai
    COMPUTER JOURNAL, 2017, 60 (03): : 287 - 307
  • [26] Toward Cloud Computing QoS Architecture: Analysis of Cloud Systems and Cloud Services
    Ghahramani, M. H.
    Zhou, MengChu
    Hon, Chi Tin
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2017, 4 (01) : 6 - 18
  • [27] Toward Cloud Computing QoS Architecture:Analysis of Cloud Systems and Cloud Services
    Mohammad Hossein Ghahramani
    MengChu Zhou
    Chi Tin Hon
    IEEE/CAAJournalofAutomaticaSinica, 2017, 4 (01) : 6 - 18
  • [28] Scalable Intrusion Detection Systems Log Analysis using Cloud Computing Infrastructure
    Kumar, Manish
    Hanumanthappa, M.
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 206 - 209
  • [29] Researchment of Cloud Computing Platform Based Software Craftsmanship Pattern
    Wang, Qinghu
    Bai, Mingyu
    Jiang, Jingqing
    Jiang, Mingyang
    Pei, Zhili
    Ping, Huan
    Xu, Jian
    2017 2ND ASIA-PACIFIC CONFERENCE ON INTELLIGENT ROBOT SYSTEMS (ACIRS), 2017, : 114 - 117
  • [30] Dynamic Key Based Algorithm for Security in Cloud Computing Using Soft Computing and Dynamic Fuzzy Approach
    Kumar, P.
    Gupta, A.
    Kumar, S.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2019, 78 (09): : 596 - 600