Using Risk Patterns to Identify Violations of Data Protection Policies in Cloud Systems

被引:5
作者
Schoenen, Stefan [1 ]
Mann, Zoltan Adam [1 ]
Metzger, Andreas [1 ]
机构
[1] Univ Duisburg Essen, Paluno Ruhr Inst Software Technol, Essen, Germany
来源
SERVICE-ORIENTED COMPUTING - ICSOC 2017 WORKSHOPS | 2018年 / 10797卷
基金
欧盟地平线“2020”;
关键词
Cloud computing; Data protection; Privacy; Run-time model; Risk pattern; FRAMEWORK; ISSUES;
D O I
10.1007/978-3-319-91764-1_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud services and cloud infrastructures become increasingly complex and dynamic: many different physical and virtual machines, applications and their components interact and all of these entities may be differently reconfigured, deployed, and migrated during run time. In addition, a multitude of stakeholders may be involved in cloud service offering and usage; e.g., service consumers, cloud providers, data subjects, data controllers, and actual end users. Thus, checking whether cloud services comply with data protection policies when storing or processing sensitive data becomes a challenge due to the involved complexity and dynamicity. We present a model-based approach for identifying violations of data protection policies at run-time. Key elements of our approach are (1) a run-time model to represent the actual cloud system and its stakeholders at runtime, and (2) risk patterns that commonly appear in the context of data protection issues. Our approach aims to find instances of these risk patterns in the run-time model. If an instance of a risk pattern is found, this indicates a risk of data protection violation. We demonstrate the applicability of our approach by using an industry scenario.
引用
收藏
页码:297 / 308
页数:12
相关论文
共 28 条
[1]   Cloud monitoring: A survey [J].
Aceto, Giuseppe ;
Botta, Alessio ;
de Donato, Walter ;
Pescape, Antonio .
COMPUTER NETWORKS, 2013, 57 (09) :2093-2115
[2]  
Al-Mozani D, 2015, 2015 GERMAN MICROWAVE CONFERENCE, P9, DOI 10.1109/GEMIC.2015.7107739
[3]   An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J].
Alhamazani, Khalid ;
Ranjan, Rajiv ;
Mitra, Karan ;
Rabhi, Fethi ;
Jayaraman, Prem Prakash ;
Khan, Samee Ullah ;
Guabtni, Adnene ;
Bhatnagar, Vasudha .
COMPUTING, 2015, 97 (04) :357-377
[4]  
[Anonymous], 2011, P ACM S APPL COMPUTI
[5]   From Security to Assurance in the Cloud: A Survey [J].
Ardagna, Claudio A. ;
Asal, Rasool ;
Damiani, Ernesto ;
Quang Hieu Vu .
ACM COMPUTING SURVEYS, 2015, 48 (01)
[6]   SeaClouds: An Open Reference Architecture for Multi-cloud Governance [J].
Brogi, Antonio ;
Carrasco, Jose ;
Cubo, Javier ;
D'Andria, Francesco ;
Di Nitto, Elisabetta ;
Guerriero, Michele ;
Perez, Diego ;
Pimentel, Ernesto ;
Soldani, Jacopo .
Software Architecture, ECSA 2016, 2016, 9839 :334-338
[7]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[8]   Fast graph pattern matching [J].
Cheng, Jiefeng ;
Yu, Jeffrey Xu ;
Ding, Bolin ;
Yu, Philip S. ;
Wang, Haixun .
2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, :913-+
[9]  
Council of the European Union, 2016, GEN DAT PROT REG
[10]   A Risk Assessment Framework for Cloud Computing [J].
Djemame, Karim ;
Armstrong, Django ;
Guitart, Jordi ;
Macias, Mario .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2016, 4 (03) :265-278