Security-Aware Elasticity for NoSQL Databases

被引:1
|
作者
Naskos, Athanasios [1 ]
Gounaris, Anastasios [1 ]
Mouratidis, Haralambos [2 ]
Katsaros, Panagiotis [1 ]
机构
[1] Aristotle Univ Thessaloniki, Dept Informat, Thessaloniki, Greece
[2] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
来源
MODEL AND DATA ENGINEERING, MEDI 2015 | 2015年 / 9344卷
关键词
D O I
10.1007/978-3-319-23781-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on horizontally scaling NoSQL databases in a cloud environment, in order to meet performance requirements while respecting security constraints. The performance requirements refer to strict latency limits on the query response time. The security requirements are derived from the need to address two specific kinds of threats that exist in cloud databases, namely data leakage, mainly due to malicious activities of actors hosted on the same physical machine, and data loss after one or more node failures. We explain that usually there is a trade-off between performance and security requirements and we derive a model checking approach to drive runtime decisions that strike a user-defined balance between them. We evaluate our proposal using real traces to prove the effectiveness in configuring the trade-offs.
引用
收藏
页码:181 / 197
页数:17
相关论文
共 50 条
  • [31] Network security-aware charging of electric vehicles
    Tian, Aina
    Li, Weixing
    Li, Zuyi
    Sun, Yong
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2018, 100 : 42 - 49
  • [32] Security-Aware SoC Test Access Mechanisms
    Rosenfeld, Kurt
    Karri, Ramesh
    2011 IEEE 29TH VLSI TEST SYMPOSIUM (VTS), 2011, : 100 - 104
  • [33] Efficient Security-Aware Virtual Memory Management
    Amirsoufi, Rahmatollah
    Taghiloo, Majid
    Ahmadi, Armin
    2009 INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION, 2009, : 208 - +
  • [34] On the verification of security-aware E-services
    Ranise, Silvio
    JOURNAL OF SYMBOLIC COMPUTATION, 2012, 47 (09) : 1066 - 1088
  • [35] Research Challenges in Security-aware Physical Design
    Karri, Ramesh
    ISPD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN, 2017, : 41 - 41
  • [36] SAFE: Security-Aware FlexRay Scheduling Engine
    Han, Gang
    Zeng, Haibo
    Li, Yaping
    Dou, Wenhua
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [37] Security-Aware Network Analysis for Network Controllability
    Zhang, Shuo
    Wolthusen, Stephen D.
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 508 - 514
  • [38] Security-Aware Scheduling of Embedded Control Tasks
    Lesi, Vuk
    Jovanov, Ilija
    Pajic, Miroslav
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
  • [39] A Security-Aware Near Field Communication Architecture
    Asaduzzaman, A.
    Mazumder, S.
    Salinas, S.
    Mridha, Muhammad F.
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 33 - 38
  • [40] A Framework for Security-Aware Virtual Network Embedding
    Wang, Yang
    Phanvu Chau
    Chen, Fuyu
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,