Security-Aware Elasticity for NoSQL Databases

被引:1
|
作者
Naskos, Athanasios [1 ]
Gounaris, Anastasios [1 ]
Mouratidis, Haralambos [2 ]
Katsaros, Panagiotis [1 ]
机构
[1] Aristotle Univ Thessaloniki, Dept Informat, Thessaloniki, Greece
[2] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
来源
MODEL AND DATA ENGINEERING, MEDI 2015 | 2015年 / 9344卷
关键词
D O I
10.1007/978-3-319-23781-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on horizontally scaling NoSQL databases in a cloud environment, in order to meet performance requirements while respecting security constraints. The performance requirements refer to strict latency limits on the query response time. The security requirements are derived from the need to address two specific kinds of threats that exist in cloud databases, namely data leakage, mainly due to malicious activities of actors hosted on the same physical machine, and data loss after one or more node failures. We explain that usually there is a trade-off between performance and security requirements and we derive a model checking approach to drive runtime decisions that strike a user-defined balance between them. We evaluate our proposal using real traces to prove the effectiveness in configuring the trade-offs.
引用
收藏
页码:181 / 197
页数:17
相关论文
共 50 条
  • [1] Security Issues in NoSQL Databases
    Okman, Lior
    Gal-Oz, Nurit
    Gonen, Yaron
    Gudes, Ehud
    Abramov, Jenny
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 541 - 547
  • [2] Provenance-Aware NoSQL Databases
    Chacko, Anu Mary
    Fairooz, Munavar
    Kumar, S. D. Madhu
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 152 - 160
  • [3] Security-aware program transformations
    Bartoletti, M
    Degano, P
    Ferrari, GL
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2003, 2841 : 355 - 368
  • [4] Composing security-aware software
    Khan, KM
    Han, J
    IEEE SOFTWARE, 2002, 19 (01) : 34 - +
  • [5] On security-aware transmission scheduling
    He, Ting
    Agaskar, Ameya
    Tong, Lang
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1681 - +
  • [6] Security-aware Virtual Network Embedding
    Liu, Shuhao
    Cai, Zhiping
    Xu, Hong
    Xu, Ming
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 834 - 840
  • [7] Optimal Security-Aware Query Processing
    Guarnieri, Marco
    Basin, David
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (12): : 1307 - 1318
  • [8] Challenges in the design of security-aware processors
    Lee, RB
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 2 - 3
  • [9] An Advanced Security-Aware Cloud Architecture
    Bobelin, Laurent
    Bousquet, Aline
    Briffaut, Jeremy
    Couturier, Jean-Francois
    Toinard, Christian
    Caron, Eddy
    Lefray, Arnaud
    Rouzaud-Cornabas, Jonathan
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 572 - 579
  • [10] Security-Aware Database Migration Planning
    Subramani, K.
    Caskurlu, Bugra
    Acikalin, Utku Umur
    ALGORITHMIC ASPECTS OF CLOUD COMPUTING (ALGOCLOUD 2019), 2020, 12041 : 103 - 121