Finding risk patterns in cloud system models

被引:5
作者
Kunz, Florian [1 ]
Mann, Zoltan Adam [1 ]
机构
[1] Univ Duisburg Essen, Paluno Ruhr Inst Software Technol, Essen, Germany
来源
2019 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2019) | 2019年
关键词
cloud computing; security; risk management; data protection; graph pattern matching; run-time model;
D O I
10.1109/CLOUD.2019.00051
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The risk of unauthorized access to confidential data is a major problem in cloud computing. In previous work, the notion of risk patterns was introduced to capture configurations of cloud systems that are prone to data protection issues. In this paper, we devise a program for the automatic detection of risk patterns in cloud system models. Our program makes use of the Eclipse Modeling Framework, the model transformation library Henshin, and the modeling workbench Sirius to (i) enable security experts to describe cloud risk patterns in a compact way, (ii) enable the efficient automatic detection of risk patterns in the model of a cloud system, and (iii) support cloud experts in experimenting with the security implications of different cloud configurations. A case study and experiments demonstrate the applicability and scalability of the proposed approach.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 17 条
[1]  
[Anonymous], 2018, IEEE T KNOWLEDGE DAT
[2]  
[Anonymous], 2017, IEEE T SERVICES COMP
[3]  
Arendt T, 2010, LECT NOTES COMPUT SC, V6394, P121
[4]   Toward Economic-Aware Risk Assessment on the Cloud [J].
Bellandi, Valerio ;
Cimato, Stelvio ;
Damiani, Ernesto ;
Gianini, Gabriele ;
Zilli, Antonio .
IEEE SECURITY & PRIVACY, 2015, 13 (06) :30-37
[5]   A framework for semi-automated co-evolution of security knowledge and system models [J].
Buerger, Jens ;
Strueber, Daniel ;
Gaertner, Stefan ;
Ruhroth, Thomas ;
Juerjens, Jan ;
Schneiders, Kurt .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 139 :142-160
[6]  
Council of the European Union, 2016, GEN DAT PROT REG
[7]   Resource Optimization Across the Cloud Stack [J].
Mann, Zoltan Adam .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2018, 29 (01) :169-182
[8]   Optimized Cloud Deployment of Multi-tenant Software Considering Data Protection Concerns [J].
Mann, Zoltan Adam ;
Metzger, Andreas .
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, :609-618
[9]  
Mann Zoltan Adam, 2018, Modellierung, V2018, P71
[10]   Towards a Top-down Policy Engineering Framework for Attribute-based Access Control [J].
Narouei, Masoud ;
Khanpour, Hamed ;
Takabi, Hassan ;
Parde, Natalie ;
Nielsen, Rodney .
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, :103-114