RADAR: Data Protection in Cloud-Based Computer Systems at Run Time

被引:9
|
作者
Mann, Zoltan Adam [1 ]
Kunz, Florian [1 ]
Laufer, Jan [1 ]
Bellendorf, Julian [1 ]
Metzger, Andreas [1 ]
Pohl, Klaus [1 ]
机构
[1] Univ Duisburg Essen, Paluno Ruhr Inst Software Technol, D-45127 Essen, Germany
关键词
Data protection; Cloud computing; Radar; Process control; Hardware; Edge computing; Software as a service; data protection; edge computing; fog computing; privacy; security; self-adaptation; BIG DATA; SECURITY; RISK;
D O I
10.1109/ACCESS.2021.3078059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The protection of confidential data (e.g., personal data) is a concern of increasing importance. Data processing applications are often deployed in cloud or fog/edge computing systems. Such cloud-based systems may change dynamically during operations, for example because of changes in the users, in the deployed software services, or in the infrastructure. As a result, both the threats to data protection and the availability of data protection mechanisms may change at run time, making efficient data protection very challenging. This paper presents RADAR (Run-time Adaptations for DAta pRotection), an approach for ensuring data protection in dynamically changing cloud-based systems. RADAR analyzes the configuration of the cloud-based system automatically at run time, to detect changes in the threats to data protection or in the availability of data protection mechanisms. If needed, RADAR automatically adapts the cloud-based system to ensure the continued satisfaction of data protection requirements. From multiple possible adaptations that lead to the satisfaction of data protection requirements, RADAR chooses an adaptation that has the lowest negative implication on other goals, like costs and the availability of functionality. RADAR is a comprehensive approach that combines pattern-based detection of problematic system configurations with model-based automatic run-time adaptations and a search algorithm for finding the best adaptation. RADAR is validated using two case studies from the cloud and fog computing domains, and the scalability of the approach is evaluated using a set of controlled experiments.
引用
收藏
页码:70816 / 70842
页数:27
相关论文
共 50 条
  • [21] A Novel Centralized Cloud-Based Mobile Data Rollover Management
    Sadreddini, Zhaleh
    Yanikomeroglu, Halim
    IEEE WIRELESS COMMUNICATIONS, 2021, 28 (02) : 166 - 171
  • [22] Towards the Certification of Covert Channel Freeness in Cloud-Based Systems
    Jaskolka, Jason
    Khedri, Ridha
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 318 - 325
  • [23] Implementing cloud-based medical systems in hospitals and strategic implications
    Chen, Peng-Ting
    Chen, Jian-Hong
    TECHNOLOGY ANALYSIS & STRATEGIC MANAGEMENT, 2015, 27 (02) : 198 - 218
  • [24] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Iuon-Chang Lin
    Hung-Huei Hsu
    Chen-Yang Cheng
    Journal of Network and Systems Management, 2015, 23 : 978 - 997
  • [25] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    Cheng, Chen-Yang
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) : 978 - 997
  • [26] Attack Resilient Cloud-Based Control Systems for Industry 4.0
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    IEEE ACCESS, 2023, 11 : 27865 - 27882
  • [27] Cloud-based Personal Data Protection System and Its Performance Evaluation
    Liu, Jung-Chun
    Lin, Chu-Hsing
    Lee, Ken-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (06): : 1721 - 1727
  • [28] Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems
    Ma, Zhuo
    Zhang, Jiawei
    IEEE ACCESS, 2023, 11 : 45206 - 45221
  • [29] Protecting Data and Queries in Cloud-Based Scenarios
    De Capitani di Vimercati S.
    Foresti S.
    Samarati P.
    SN Computer Science, 4 (5)
  • [30] Using Risk Patterns to Identify Violations of Data Protection Policies in Cloud Systems
    Schoenen, Stefan
    Mann, Zoltan Adam
    Metzger, Andreas
    SERVICE-ORIENTED COMPUTING - ICSOC 2017 WORKSHOPS, 2018, 10797 : 297 - 308