Improving security in cloud by formal modeling of IaaS resources

被引:18
作者
Amato, Flora [1 ]
Moscato, Francesco [2 ]
Moscato, Vincenzo [1 ]
Colace, Francesco [3 ]
机构
[1] Univ Naples Federico II, DIETI, Naples, Italy
[2] Univ Campania Luigi Vanvitelli, DiSciPol, Caserta, Italy
[3] Univ Salerno, DIIN, Salerno, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 87卷
关键词
Cloud services; Verification; Big-Data; Security; ISSUES; SYSTEMS; ENERGY;
D O I
10.1016/j.future.2017.08.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, it is a matter of fact that Cloud is a "must" for all complex services requiring great amount of resources. Big-Data Services are a striking example: they actually perform many kind of analysis (like analytics) on very big repositories. Many File Systems and middleware exist for efficient distribution and management of data and they usually use Cloud Resources. Anyway Several problems arose about Security of data: Virtualization is the base of Cloud resources and, even if we consider data storage as virtually separated elements, security issues exist if privilege escalation allows for gaining control on any data on physical hosts. In this paper we show how it is possible to cope Model Driven Engineering techniques to security analysis and monitoring of Cloud infrastructures. For reducing overhead, we provide a formal profile of hosts thermal behaviors. Depending on services input workloads, we detect and forecast malicious actions by comparisons with real thermal data. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:754 / 764
页数:11
相关论文
共 51 条
[1]   Trust, Security and Privacy in Emerging Distributed Systems [J].
Abawajy, Jemal ;
Wang, Guojun ;
Yang, Laurence T. ;
Javadi, Bahman .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :224-226
[2]   Designing safe, reliable systems using scade [J].
Abdulla, Parosh Aziz ;
Deneux, Johann ;
Stalmarck, Gunnar ;
Agren, Herman ;
Akerlund, Ove .
LEVERAGING APPLICATIONS OF FORMAL METHODS, 2006, 4313 :115-+
[3]  
Aversa R, 2014, LECT NOTES COMPUT SC, V8696, P119, DOI 10.1007/978-3-319-10557-4_15
[4]  
Ayed R.B., 2014, AUTON AGENT MULTI-AG, V8477, P124
[5]  
Bao M, 2010, DES AUT TEST EUROPE, P21
[6]  
Bauer B., 2002, Agent-Oriented Software Engineering II. Second International Workshop, AOSE 2001. Revised Papers and Invited Contributions (Lecture Notes in Computer Science Vol.2222), P101
[7]  
Bauer B., 2000, 1 INT WORKSH AG OR S, P91
[8]   Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing [J].
Beloglazov, Anton ;
Abawajy, Jemal ;
Buyya, Rajkumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (05) :755-768
[9]  
Castiglione Arcangelo, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P157, DOI 10.1109/INCoS.2013.32
[10]  
Castiglione A., 2006, SPEECH SECURE PERSON, P287, DOI [10.1007/978-3-8348-9195-2_31, DOI 10.1007/978-3-8348-9195-2_31]