Security assurance assessment methodology for hybrid clouds

被引:13
|
作者
Hudic, Aleksandar [1 ]
Smith, Paul [1 ]
Weippl, Edgar R. [2 ]
机构
[1] AIT, Donau City Str 1, A-1220 Vienna, Austria
[2] SBA Res, Favoritenstr 16, A-1040 Vienna, Austria
基金
欧盟地平线“2020”;
关键词
Assurance; Cloud computing; Security assessment; Security metric; Openstack; DATA REMNANTS; CERTIFICATION; SERVICES; SYSTEM;
D O I
10.1016/j.cose.2017.03.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the cloud computing paradigm has altered the delivery models for ICT services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced transparency and control over a user's information and services. In addition, there are a number of well-understood security and privacy challenges that are specific to this environment. These drawbacks are particularly problematic to operators of critical information infrastructures that want to leverage the benefits of cloud. To improve transparency and provide assurances that measures are in place to ensure security, novel approaches to security evaluation are needed. To evaluate the security of services that are deployed in the cloud requires an evaluation of complex multi-layered systems and services, including their interdependencies. This is a challenging task that involves significant effort, in terms of both computational and human resources. With these challenges in mind, we propose a novel security assessment methodology for analysing the security of critical services that are deployed in cloud environments. Our methodology offers flexibility, in that tailored policy-driven security assessments can be defined based on a user's requirements, relevant standards, policies, and guidelines. We have implemented and evaluated a system that supports online assessments using our methodology, which acquires and processes large volumes of security-related data without affecting the performance of the services in a cloud environment. (C) 2017 Published by Elsevier Ltd.
引用
收藏
页码:723 / 743
页数:21
相关论文
共 50 条
  • [31] Security Assessment Methodology for Isolated Systems of a Certain Class
    Wiechecki, Daniel
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (03) : 499 - 505
  • [32] Steady security assessment using linear programming methodology
    Shukla, M
    Sekar, A
    PROCEEDINGS OF THE THIRTY-SIXTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 141 - 144
  • [33] Security Assessment Methodology for Industrial Control System Products
    Hristova, Ana
    Schlegel, Roman
    Obermeier, Sebastian
    2014 IEEE 4TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2014, : 264 - 269
  • [34] Methodology of quantitative risk assessment for information system security
    Lin, MQ
    Wang, QM
    Li, JH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531
  • [35] Penetration Testing and Security Assessment Methodology for Biomedical Devices
    Kisielewicz, Maciej
    Kedziora, Michal
    Jozwiak, Ireneusz
    RECENT CHALLENGES IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2024, PT I, 2024, 2144 : 337 - 348
  • [36] Risk assessment and prevention in airport security assurance by integrating LSTM algorithm
    Hu, Yao
    Qiao, Liguang
    Gu, Feng
    PLOS ONE, 2025, 20 (01):
  • [37] System Effects: A Hybrid Methodology for Exploring the Determinants of Food In/Security
    Craven, Luke K.
    ANNALS OF THE AMERICAN ASSOCIATION OF GEOGRAPHERS, 2017, 107 (05) : 1011 - 1027
  • [38] Software assurance for security
    McGraw, G
    COMPUTER, 1999, 32 (04) : 103 - 105
  • [39] Search for assurance and security
    Burger, Rudolf
    MERKUR-DEUTSCHE ZEITSCHRIFT FUR EUROPAISCHES DENKEN, 2007, 61 (04): : 324 - 332
  • [40] A Cost-Effective Methodology Applied to Videoconference Services over Hybrid Clouds
    Cervino, Javier
    Rodriguez, Pedro
    Trajkovska, Irena
    Escribano, Fernando
    Salvachua, Joaquin
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (01): : 103 - 109