Security SLA based Monitoring in Clouds

被引:17
作者
Kaaniche, Nesrine [1 ]
Mohamed, Mohamed [2 ]
Laurent, Maryline [1 ]
Ludwig, Heiko [2 ]
机构
[1] Univ Paris Saclay, SAMOVAR, Telecom SudParis, CNRS, Paris, France
[2] IBM Res, Almaden Res Ctr, San Jose, CA USA
来源
2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE) | 2017年
关键词
Security Level Agreement; Security Monitoring; Cloud Security Monitoring; SLA;
D O I
10.1109/IEEE.EDGE.2017.20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due to their criticality for their customers. In order to speed up their adoption by service providers and consumers and to make them more actionable, security SLAs monitoring should be described in a machine-processable, agile and extensible way. Several tools for SLA management are available on the market but most deal with performance metrics and do not refer to security properties. There are other tools for monitoring cloud security, in a non-SLA way. However, they are not associated with SLA management systems. We propose an extension to an SLA language (i.e., rSLA) to enable the description of security requirements in an SLA document. We also extend the rSLA framework by a security methodology that makes use of known tools and that enables continuously checking that the security requirements are respected during runtime according to the SLA document.
引用
收藏
页码:90 / 97
页数:8
相关论文
共 19 条
[1]   Cloud monitoring: A survey [J].
Aceto, Giuseppe ;
Botta, Alessio ;
de Donato, Walter ;
Pescape, Antonio .
COMPUTER NETWORKS, 2013, 57 (09) :2093-2115
[2]   QoS-MONaaS: a Portable Architecture for QoS Monitoring in the Cloud [J].
Adinolfi, Ornella ;
Cristaldi, Rosario ;
Coppolino, Luigi ;
Romano, Luigi .
8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012), 2012, :527-532
[3]   An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J].
Alhamazani, Khalid ;
Ranjan, Rajiv ;
Mitra, Karan ;
Rabhi, Fethi ;
Jayaraman, Prem Prakash ;
Khan, Samee Ullah ;
Guabtni, Adnene ;
Bhatnagar, Vasudha .
COMPUTING, 2015, 97 (04) :357-377
[4]  
Bernsmed K., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P202, DOI 10.1109/ARES.2011.34
[5]  
Bowers D., 2011, CCS 11
[6]  
Bowers K. D., 2009, CCS 09
[7]  
de Chaves Shirlei Aparecida, 2010, 2010 Sixth International Conference on Networking and Services (ICNS), P212, DOI 10.1109/ICNS.2010.36
[8]  
Emeakaroha V. C., 2012, COMPSAC 12
[9]  
Ibrahim A. S., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P113, DOI 10.1109/ICNSS.2011.6059967
[10]   A Framework for Security Transparency in Cloud Computing [J].
Ismail, Umar Mukhtar ;
Islam, Shareeful ;
Ouedraogo, Moussa ;
Weippl, Edgar .
FUTURE INTERNET, 2016, 8 (01)