Identifying and Utilizing Dependencies Across Cloud Security Services

被引:7
|
作者
Taha, Ahmed [1 ]
Metzler, Patrick [1 ]
Trapero, Ruben [1 ]
Luna, Jesus [1 ]
Suri, Neeraj [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
来源
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
Cloud security; security quantification; security service level agreements; service dependencies;
D O I
10.1145/2897845.2897911
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud computing. Given that multiple Cloud Service Providers (CSPs) offer similar security services (e.g., "encryption key management") albeit with different capabilities and prices, the customers need to comparatively assess the offered security services in order to select the best CSP matching their security requirements. However, the presence of both explicit and implicit dependencies across security related services add further challenges for Cloud customers to (i) specify their security requirements taking service dependencies into consideration and (ii) to determine which CSP can satisfy these requirements. We present a framework to address these challenges. For challenge (i), our framework automatically detects conflicts resulting from inconsistent customer requirements. Moreover, our framework provides an explanation for the detected conflicts allowing customers to resolve these conflicts. To tackle challenge (ii), our framework assesses the security level provided by various CSPs and ranks the CSPs according to the desired customer requirements. We demonstrate the framework's effectiveness with real-world CSP case studies derived from the Cloud Security Alliance's Security, Trust and Assurance Registry.
引用
收藏
页码:329 / 340
页数:12
相关论文
共 50 条
  • [1] Utilizing Security Risk Approach in Managing Cloud Computing Services
    Bernardo, Danilo Valeros
    2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 119 - 125
  • [2] Identifying targetable metabolic dependencies across colorectal cancer progression
    Legge, Danny N.
    Collard, Tracey J.
    Stanko, Ewelina
    Hoskin, Ashley J.
    Holt, Amy K.
    Bull, Caroline J.
    Kollareddy, Madhu
    Bellamy, Jake
    Groves, Sarah
    Ma, Eric H.
    Hazelwood, Emma
    Qualtrough, David
    Amulic, Borko
    Malik, Karim
    Williams, Ann C.
    Jones, Nicholas
    Vincent, Emma E.
    MOLECULAR METABOLISM, 2024, 90
  • [3] Cloud Security and Privacy Metamodel Metamodel for Security and Privacy Knowledge in Cloud Services
    Xia, Tian
    Washizaki, Hironori
    Kato, Takehisa
    Kaiya, Haruhiko
    Ogata, Shinpei
    Fernandez, Eduardo B.
    Kanuka, Hideyuki
    Yoshino, Masayuki
    Yamamoto, Dan
    Okubo, Takao
    Yoshioka, Nobukazu
    Hazeyama, Atsuo
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2018, : 379 - 386
  • [4] Efficiency and Security in Similarity Cloud Services
    Kozak, Stepan
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (12): : 1450 - 1455
  • [5] CSSR: Cloud Services Security Recommender
    Abuhussein, Abdullah
    Shiva, Sajjan
    Sheldon, Frederick T.
    PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 48 - 55
  • [6] Security Framework for IoT Cloud Services
    Pacheco, Jesus
    Tunc, Cihan
    Hariri, Salim
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [7] Evaluating Security and Privacy in Cloud Services
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Shiva, Sajjan
    Sheldon, Frederick T.
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 683 - 686
  • [8] Ensuring Security for Virtualization in Cloud Services
    Kumar, Udaya N. L.
    Siddappa, M.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 248 - 251
  • [9] Modeling Composition of Cloud Services with Complex Dependencies for Availability Assessment
    Zhang, Xingjian
    Wang, Long
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS SUPPLEMENTAL VOLUME (DSN-S 2022), 2022, : 39 - 40
  • [10] A Framework for Ranking Cloud Security Services
    Taha, Ahmed
    Trapero, Ruben
    Luna, Jesus
    Suri, Neeraj
    2017 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC), 2017, : 322 - 329