Enforcing Security and Assurance Properties in Cloud Environment

被引:6
|
作者
Bousquet, Aline [1 ]
Briffaut, Jeremy [1 ]
Caron, Eddy [2 ]
Maria Dominguez, Eva [5 ]
Franco, Javier [3 ]
Lefray, Arnaud [1 ,2 ]
Lopez, Oscar [4 ]
Ros, Saioa [4 ]
Rouzaud-Cornabas, Jonathan [6 ]
Toinard, Christian [1 ]
Uriarte, Mikel [4 ]
机构
[1] Univ Orleans, INSA Ctr Val Loire, LIFO EA 4022, Bourges, France
[2] Univ Lyon, LIP, CNRS, ENS Lyon,Inria,UCB Lyon, Villeurbanne, France
[3] Vicomtech IK4, Ind & Adv Mfg Dept, San Sebastian, Spain
[4] Nextel SA, Dept Res & Dev, Zamudio, Biscay, Spain
[5] IKUSI, Transport Technol & Dev, San Sebastian, Spain
[6] Univ Lyon, CNRS, Inria, INSA Lyon,LIRIS,UMR5205, F-69621 Villeurbanne, France
来源
2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC) | 2015年
关键词
Security; Cloud; Assurance; Enforcement; Use-case;
D O I
10.1109/UCC.2015.45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Before deploying their infrastructure (resources, data, communications, ... ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But describing and enforcing security properties and getting strong evidences of it is a complex task. To address this issue, in [1], we have proposed a language that can be used to express both security and assurance properties on distributed resources. Then, we have shown how these global properties can be cut into a set of properties to be enforced locally. In this paper, we show how these local properties can be used to automatically configure security mechanisms. Our language is context-based which allows it to be easily adapted to any resource naming systems e.g., Linux and Android (with SELinux) or PostgreSQL. Moreover, by abstracting low-level functionalities (e.g., deny write to a file) through capabilities, our language remains independent from the security mechanisms. These capabilities can then be combined into security and assurance properties in order to provide high-level functionalities, such as confidentiality or integrity. Furthermore, we propose a global architecture that receives these properties and automatically configures the security and assurance mechanisms accordingly. Finally, we express the security and assurance policies of an industrial environment for a commercialized product and show how its security is enforced.
引用
收藏
页码:271 / 280
页数:10
相关论文
共 50 条
  • [1] Security and service assurance issues in Cloud environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Abraham A.
    International Journal of System Assurance Engineering and Management, 2018, 9 (1) : 194 - 207
  • [2] Automatically Enforcing Security SLAs in the Cloud
    Casola, Valentina
    De Benedictis, Alessandra
    Erascu, Madalina
    Modic, Jolanda
    Rak, Massimiliano
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 741 - 755
  • [3] Enforcing Privacy and Security in Public Cloud Storage
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 309 - 313
  • [4] From Security to Assurance in the Cloud: A Survey
    Ardagna, Claudio A.
    Asal, Rasool
    Damiani, Ernesto
    Quang Hieu Vu
    ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [5] Developing a Conceptual Framework for Cloud Security Assurance
    Duncan, Bob
    Pym, David J.
    Whittington, Mark
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 120 - 125
  • [6] SIMILARITY-BASED CLUSTERING AND SECURITY ASSURANCE MODEL FOR BIG DATA PROCESSING IN CLOUD ENVIRONMENT
    Parthiban, Krishnamoorthy
    Sujatha, Sundaram
    ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH, 2018, 52 (02): : 175 - 200
  • [7] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [8] Security Analysis in Cloud Environment
    Akshay, M. S.
    Kakkar, Ashina
    Jayasree, K.
    Prudhvi, P.
    Metgal, Prathibha Shridhara
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 221 - 228
  • [9] Assessing the Security of the Cloud Environment
    Al Awadhi, Eman
    Salah, Khaled
    Martin, Thomas
    2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 251 - 256
  • [10] Security Assurance of (Multi-)Cloud Application with Security SLA Composition
    Rak, Massimiliano
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 786 - 799