RADAR: Data Protection in Cloud-Based Computer Systems at Run Time

被引:9
|
作者
Mann, Zoltan Adam [1 ]
Kunz, Florian [1 ]
Laufer, Jan [1 ]
Bellendorf, Julian [1 ]
Metzger, Andreas [1 ]
Pohl, Klaus [1 ]
机构
[1] Univ Duisburg Essen, Paluno Ruhr Inst Software Technol, D-45127 Essen, Germany
关键词
Data protection; Cloud computing; Radar; Process control; Hardware; Edge computing; Software as a service; data protection; edge computing; fog computing; privacy; security; self-adaptation; BIG DATA; SECURITY; RISK;
D O I
10.1109/ACCESS.2021.3078059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The protection of confidential data (e.g., personal data) is a concern of increasing importance. Data processing applications are often deployed in cloud or fog/edge computing systems. Such cloud-based systems may change dynamically during operations, for example because of changes in the users, in the deployed software services, or in the infrastructure. As a result, both the threats to data protection and the availability of data protection mechanisms may change at run time, making efficient data protection very challenging. This paper presents RADAR (Run-time Adaptations for DAta pRotection), an approach for ensuring data protection in dynamically changing cloud-based systems. RADAR analyzes the configuration of the cloud-based system automatically at run time, to detect changes in the threats to data protection or in the availability of data protection mechanisms. If needed, RADAR automatically adapts the cloud-based system to ensure the continued satisfaction of data protection requirements. From multiple possible adaptations that lead to the satisfaction of data protection requirements, RADAR chooses an adaptation that has the lowest negative implication on other goals, like costs and the availability of functionality. RADAR is a comprehensive approach that combines pattern-based detection of problematic system configurations with model-based automatic run-time adaptations and a search algorithm for finding the best adaptation. RADAR is validated using two case studies from the cloud and fog computing domains, and the scalability of the approach is evaluated using a set of controlled experiments.
引用
收藏
页码:70816 / 70842
页数:27
相关论文
共 50 条
  • [1] Architectural Design for Data Security in Cloud-based Big Data Systems
    Jamali, Mujeeb-ur-Rehman
    Ali, Najma Imtiaz
    Memon, Abdul Ghafoor
    Maree, Mujeeb-u-Rehman
    Jamali, Aadil
    BAGHDAD SCIENCE JOURNAL, 2024, 21 (09) : 3062 - 3077
  • [2] Compatibility of a Security Policy for a Cloud-Based Healthcare System with the EU General Data Protection Regulation (GDPR)
    Georgiou, Dimitra
    Lambrinoudakis, Costas
    INFORMATION, 2020, 11 (12) : 1 - 19
  • [3] Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations
    Georgiou, Dimitra
    Lambrinoudakis, Costas
    FUTURE INTERNET, 2021, 13 (03) : 1 - 12
  • [4] Information Masking Theory for Data Protection in Future Cloud-Based Energy Management
    Xin, Shujun
    Guo, Qinglai
    Wang, Jianhui
    Chen, Chen
    Sun, Hongbin
    Zhang, Boming
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (06) : 5664 - 5676
  • [5] A Dynamic Classification Index to Enhance Data Protection Procedures in Cloud-Based Environments
    Moghaddam, Faraz Fatemi
    Majd, Aida
    Ahmadi, Mohammad
    Khodadadi, Touraj
    Madadipouya, Kasra
    2015 IEEE 6TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2015, : 17 - 22
  • [6] Towards an End-to-End Architecture for Run-time Data Protection in the Cloud
    Mohammadi, Nazila Gol
    Mann, Zoltan Adam
    Metzger, Andreas
    Heisel, Maritta
    Greig, James
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 514 - 518
  • [7] THREAT PROTECTION AND CONVENIENCE: ANTECEDENTS OF CLOUD-BASED DATA BACKUP
    Menard, Philip
    Gatlin, Robert
    Warkentin, Merrill
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2014, 55 (01) : 83 - 91
  • [8] Industrial Cyberphysical Systems Realizing Cloud-Based Big Data Infrastructures
    Cheng, Bo
    Zhang, Jingyi
    Hancke, Gerhard P.
    Karnouskos, Stamatis
    Colombo, Armando Walter
    IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2018, 12 (01) : 25 - 35
  • [9] Dynamic access policy in cloud-based personal health record (PHR) systems
    Liu, Xuhui
    Liu, Qin
    Peng, Tao
    Wu, Jie
    INFORMATION SCIENCES, 2017, 379 : 62 - 81
  • [10] Data Protection and Recovery Performance Analysis of Cloud-Based Recovery Service
    Nikolovski, Saso
    Mitrevski, Pece
    2023 58TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES, ICEST, 2023, : 139 - 142