Analyzing Component Composability of Cloud Security Configurations

被引:1
|
作者
Muniasamy, Kandasamy [1 ]
Chadha, Rohit [2 ]
Calyam, Prasad [2 ]
Sethumadhavan, M. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, TIFAC CORE Cyber Secur, Coimbatore 641112, Tamil Nadu, India
[2] Univ Missouri, Dept Elect Engn & Comp Sci, Columbia, MO 65211 USA
关键词
Security; Cognition; Databases; Cloud computing security; Symbols; Large-scale systems; Buildings; Formal concept analysis; Cloud security; composability; formal analysis; policy-based verification;
D O I
10.1109/ACCESS.2023.3340690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a major concern when building large-scale computer systems. Cloud services have made it easier to provision large-scale systems on demand over the Internet. While the cloud service providers provide the required building blocks such as compute units, database servers, and storage, customers are still responsible for securely combining these systems to satisfy their organization's security policy. The secure development and operation of such large-scale systems present technical challenges. Composing a larger system using components with known security properties that satisfy a given security policy without re-analyzing the individual components is a difficult problem. In this study, we attempted to analyze the composability of components from a security perspective using first-order predicate logic. We posit that if we build a system using individual components that satisfy a security policy, the composed system will be sound with regard to that policy. Additionally, the methodology can be used to identify drifts or violations during future changes in the system by running checks during the system release cycles for continuous verification.
引用
收藏
页码:139935 / 139951
页数:17
相关论文
共 50 条
  • [1] Preservation of Security Configurations in the Cloud
    Eghtesadi, Arash
    Jarraya, Yosr
    Debbabi, Mourad
    Pourzandi, Makan
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 17 - 26
  • [2] Checking component composability
    Attiogbe, Christian
    Andre, Pascal
    Ardourel, Gilles
    SOFTWARE COMPOSITION, 2006, 4089 : 18 - 33
  • [3] Analyzing composability of applications on MPSoC platforms
    Kumar, Akash
    Mesman, Bart
    Theelen, Bart
    Corporaal, Henk
    Ha, Yajun
    JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (3-4) : 369 - 383
  • [4] Analyzing Cloud Computing Security Issues and Challenges
    Mehra, Neeti
    Aggarwal, Shalu
    Shokeen, Ankita
    Bura, Deepa
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 193 - 202
  • [5] On the security and composability of the one time pad
    Raub, D
    Steinwandt, R
    Müller-Quade, J
    SOFSEM 2005:THEORY AND PRACTICE OF COMPUTER SCIENCE, 2005, 3381 : 288 - 297
  • [6] Towards a Security Stress-Test for Cloud Configurations
    Minna, Francesco
    Massacci, Fabio
    Tuma, Katja
    2022 IEEE 15TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2022), 2022, : 191 - 196
  • [7] Analyzing the security of Windows 7 and Linux for cloud computing
    Salah, Khaled
    Alcaraz Calero, Jose M.
    Bernabe, Jorge Bernal
    Perez, Juan M. Marin
    Zeadally, Sherali
    COMPUTERS & SECURITY, 2013, 34 : 113 - 122
  • [8] Surveying and Analyzing Security Problems in Cloud Computing Environments
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 689 - 693
  • [9] Simulatable security and polynomially bounded concurrent composability
    Hofheinz, Dennis
    Unruh, Dominique
    2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 169 - +
  • [10] Analyzing Composability in a Sparse Encoding Model of Memorization and Association
    Beal, Jacob
    Knight, Thomas F., Jr.
    2008 IEEE 7TH INTERNATIONAL CONFERENCE ON DEVELOPMENT AND LEARNING, 2008, : 180 - 185