Analyzing Component Composability of Cloud Security Configurations

被引:1
|
作者
Muniasamy, Kandasamy [1 ]
Chadha, Rohit [2 ]
Calyam, Prasad [2 ]
Sethumadhavan, M. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, TIFAC CORE Cyber Secur, Coimbatore 641112, Tamil Nadu, India
[2] Univ Missouri, Dept Elect Engn & Comp Sci, Columbia, MO 65211 USA
关键词
Security; Cognition; Databases; Cloud computing security; Symbols; Large-scale systems; Buildings; Formal concept analysis; Cloud security; composability; formal analysis; policy-based verification;
D O I
10.1109/ACCESS.2023.3340690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a major concern when building large-scale computer systems. Cloud services have made it easier to provision large-scale systems on demand over the Internet. While the cloud service providers provide the required building blocks such as compute units, database servers, and storage, customers are still responsible for securely combining these systems to satisfy their organization's security policy. The secure development and operation of such large-scale systems present technical challenges. Composing a larger system using components with known security properties that satisfy a given security policy without re-analyzing the individual components is a difficult problem. In this study, we attempted to analyze the composability of components from a security perspective using first-order predicate logic. We posit that if we build a system using individual components that satisfy a security policy, the composed system will be sound with regard to that policy. Additionally, the methodology can be used to identify drifts or violations during future changes in the system by running checks during the system release cycles for continuous verification.
引用
收藏
页码:139935 / 139951
页数:17
相关论文
共 50 条
  • [41] Cloud Security Can the cloud be secured?
    Karnad, Kiran
    Nagenthram, Saravanan
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 208 - 210
  • [42] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [43] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [44] Cloud Security Certifications: A Comparison to Improve Cloud Service Provider Security
    Di Giulio, Carlo
    Sprabery, Read
    Kamhoua, Charles
    Kwiat, Kevin
    Campbell, Roy H.
    Bashir, Masooda N.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [45] Election Security in the Cloud: A CTF Activity to Teach Cloud and Web Security
    Romano, Zachary
    Windsor, Jennifer
    VanDerPol, Mathew
    Coffman, Joel
    2021 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2021), 2021,
  • [46] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [47] Cloud Standards in Comparison Are New Security Frameworks Improving Cloud Security?
    Di Giulio, Carlo
    Kamhoua, Charles
    Campbell, Roy H.
    Sprabery, Read
    Kwiat, Kevin
    Bashir, Masooda N.
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 50 - 57
  • [48] Analyzing Load on Cloud: A Review
    Mall, Shalu
    Sharma, A. K.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 651 - 653
  • [49] Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial LTE/IMS Networks
    Yu, Chuan
    Chen, Shuhui
    Wei, Ziling
    Wang, Fei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3048 - 3064
  • [50] ON CLOUD-ANTICHAINS AND RELATED CONFIGURATIONS
    AHLSWEDE, R
    ZHANG, Z
    DISCRETE MATHEMATICS, 1990, 85 (03) : 225 - 245