Adapting Compliance of Security Requirements in Multi-Tenant Applications

被引:2
作者
Alqahtani, Sarra [1 ]
He, Xinchi [1 ]
Gamble, Rose [1 ]
机构
[1] Univ Tulsa, Tandy Sch Comp Sci, Tulsa, OK 74104 USA
来源
2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W) | 2017年
关键词
compliance; security; detection; cloud; adaptive;
D O I
10.1109/FAS-W.2017.131
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-tenancy in cloud-based applications helps cloud providers improve their Quality of Service (QoS) and reduce service customization and maintenance time. This result is achieved by sharing resources among many tenants, which can be in the form of applications composed of multiple web services. However, distinct tenants may impose different security requirements on their perspective of the application. Thus, the application must comply with the individual tenant requirements while assuring compatibility across all tenants using the application. This assurance during runtime remains a challenge, especially if tenants are allowed to alter their security posture dynamically. Such self-adaptation within cloud tenants can help to shift security compliance tasks from the static design time to runtime. Security requirements have relied on human intervention or complex models to change or integrate the requirements at runtime. Our approach permits tenants to modify security requirements during runtime without changing the internal code of their offered services. The proposed approach externalizes the process of mapping and guaranteeing the modified security requirements outside the service while preserving the application functionality.
引用
收藏
页码:122 / 129
页数:8
相关论文
共 24 条
[1]  
Adamczyk P, 2011, REST: FROM RESEARCH TO PRACTICE, P35, DOI 10.1007/978-1-4419-8303-9_2
[2]  
Almorsy M., 2012, Proceedings, V4, P279
[3]   Adaptable, model-driven security engineering for SaaS cloud-based applications [J].
Almorsy, Mohamed ;
Grundy, John ;
Ibrahim, Amani S. .
AUTOMATED SOFTWARE ENGINEERING, 2014, 21 (02) :187-224
[4]  
Almorsy M, 2012, IEEE INT CONF AUTOM, P230, DOI 10.1145/2351676.2351709
[5]  
Alqahtani Sarra, 2014, International Journal of Business Process Integration and Management, V7, P166, DOI 10.1504/IJBPIM.2014.063520
[6]   Embedding a Distributed Auditing Mechanism in the Service Cloud [J].
Alqahtani, S. ;
Gamble, R. .
2014 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2014, :69-76
[7]  
Alqahtani S., 2017, ADV SCI TECHNOLOGY E, V2, P449
[8]   DDoS Attacks in Service Clouds [J].
Alqahtani, Sarra ;
Gamble, Rose .
2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, :5331-5340
[9]  
[Anonymous], 2014, SECURITY PRIVACY TRU
[10]   Unraveling the Web services Web - An introduction to SOAP, WSDL, and UDDI [J].
Curbera, F ;
Duftler, M ;
Khalaf, R ;
Nagy, W ;
Mukhi, N ;
Weerawarana, S .
IEEE INTERNET COMPUTING, 2002, 6 (02) :86-93