RADAR: Data Protection in Cloud-Based Computer Systems at Run Time

被引:9
|
作者
Mann, Zoltan Adam [1 ]
Kunz, Florian [1 ]
Laufer, Jan [1 ]
Bellendorf, Julian [1 ]
Metzger, Andreas [1 ]
Pohl, Klaus [1 ]
机构
[1] Univ Duisburg Essen, Paluno Ruhr Inst Software Technol, D-45127 Essen, Germany
关键词
Data protection; Cloud computing; Radar; Process control; Hardware; Edge computing; Software as a service; data protection; edge computing; fog computing; privacy; security; self-adaptation; BIG DATA; SECURITY; RISK;
D O I
10.1109/ACCESS.2021.3078059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The protection of confidential data (e.g., personal data) is a concern of increasing importance. Data processing applications are often deployed in cloud or fog/edge computing systems. Such cloud-based systems may change dynamically during operations, for example because of changes in the users, in the deployed software services, or in the infrastructure. As a result, both the threats to data protection and the availability of data protection mechanisms may change at run time, making efficient data protection very challenging. This paper presents RADAR (Run-time Adaptations for DAta pRotection), an approach for ensuring data protection in dynamically changing cloud-based systems. RADAR analyzes the configuration of the cloud-based system automatically at run time, to detect changes in the threats to data protection or in the availability of data protection mechanisms. If needed, RADAR automatically adapts the cloud-based system to ensure the continued satisfaction of data protection requirements. From multiple possible adaptations that lead to the satisfaction of data protection requirements, RADAR chooses an adaptation that has the lowest negative implication on other goals, like costs and the availability of functionality. RADAR is a comprehensive approach that combines pattern-based detection of problematic system configurations with model-based automatic run-time adaptations and a search algorithm for finding the best adaptation. RADAR is validated using two case studies from the cloud and fog computing domains, and the scalability of the approach is evaluated using a set of controlled experiments.
引用
收藏
页码:70816 / 70842
页数:27
相关论文
共 50 条
  • [31] Toward Data Integrity Architecture for Cloud-Based AI Systems
    Witanto, Elizabeth Nathania
    Oktian, Yustus Eko
    Lee, Sang-Gon
    SYMMETRY-BASEL, 2022, 14 (02):
  • [32] Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems
    He, Debiao
    Kumar, Neeraj
    Zeadally, Sherali
    Wang, Huaqun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (03) : 1232 - 1241
  • [33] APPLICATION PROBLEMS OF CLOUD-BASED SCADA SYSTEMS IN THE OIL AND GAS INDUSTRY
    Alakbarov, R. G.
    Hashimov, M. A.
    SOCAR PROCEEDINGS, 2023, (04): : 149 - 155
  • [34] Cloud-Based Digital Twin for Robot Integration in Intelligent Manufacturing Systems
    Anton, Florin
    Borangiu, Theodor
    Raileanu, Silviu
    Anton, Silvia
    ADVANCES IN SERVICE AND INDUSTRIAL ROBOTICS, RAAD 2020, 2020, 84 : 565 - 573
  • [35] Cloud-based Platform for Computer Vision Applications
    Mahmoudi, Sidi Ahmed
    El Adoui, Mohammed
    Belarbi, Mohammed Amin
    Larhmam, Mohammed Amine
    Lecron, Fabian
    2017 INTERNATIONAL CONFERENCE ON SMART DIGITAL ENVIRONMENT (ICSDE'17), 2017, : 195 - 200
  • [36] Efficient and Unconditionally Anonymous Certificateless Provable Data Possession Scheme With Trusted KGC for Cloud-Based EMRs
    Shi, Huixian
    Guo, Rui
    Jing, Chunming
    Feng, Shaocong
    IEEE ACCESS, 2019, 7 : 69410 - 69421
  • [37] Data contracts for cloud-based data marketplaces
    Truong, Hong-Linh
    Comerio, Marco
    De Paoli, Flavio
    Gangadharan, G. R.
    Dustdar, Schahram
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2012, 7 (04) : 280 - 295
  • [38] A cloud-based remote sensing data production system
    Yan, Jining
    Ma, Yan
    Wang, Lizhe
    Choo, Kim-Kwang Raymond
    Jie, Wei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1154 - 1166
  • [39] Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach
    Yang, Kan
    Liu, Zhen
    Jia, Xiaohua
    Shen, Xuemin Sherman
    IEEE TRANSACTIONS ON MULTIMEDIA, 2016, 18 (05) : 940 - 950
  • [40] Performance analysis of cloud service-based data protection systems
    Nikolovski, Saso
    Mitrevski, Pece
    Petreska, Anita
    2024 59TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES, ICEST 2024, 2024,