Cloud Security: from Per-Provider to Per-Service Security SLAs

被引:4
|
作者
De Benedictis, Alessandra [1 ]
Casola, Valentina [1 ]
Rakt, Massimiliano [2 ]
Villano, Umberto [3 ]
机构
[1] Univ Napoli Federico II, DIETI, Naples, Italy
[2] Seconda Univ Napoli, DII, Aversa, Italy
[3] Univ Sannio, DING, Benevento, Italy
关键词
Cloud; Cloud security; security SLA; comparing Cloud Service Providers;
D O I
10.1109/INCoS.2016.61
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Computing paradigm. Potential Cloud Service Customers (CSCs) do not trust delegating every kind of resources and data to external Cloud Service Providers (CSPs). The problem grows in complexity due to the increasing adoption of complex supply chains: CSPs that offer Sofware-as-a-Service (SaaS) cloud services often do not have their own data centers, but just acquire resources and services from other CSPs. This makes it hard, if not impossible, to ascribe the responsibility of a security incident. A possible solution is the adoption of Security Service Level Agreements (SLAs): CSPs should deliver services with an SLA that details each guarantee offered in terms of security, and CSCs should be able to compare offerings from different CSPs and verify that SLAs are respected during service life cycle. This paper shows how it is possible to build up a per-service Security SLA in a chain of cloud services, proposing a solution based on a security evaluation technique to compare different cloud service supply chains based on their Security SLAs.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [1] Per-service security SLAs for cloud security management: model and implementation
    Casola, Valentina
    De Benedictis, Alessandra
    Modic, Jolanda
    Rak, Massimiliano
    Villano, Umberto
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2018, 9 (02) : 128 - 138
  • [2] Per-service Security SLA: a New Model for Security Management in Clouds
    Casola, Valentina
    De Benedictis, Alessandra
    Modic, Jolanda
    Rak, Massimiliano
    Villano, Umberto
    2016 IEEE 25TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2016, : 83 - 88
  • [3] Cloud Security Certifications: A Comparison to Improve Cloud Service Provider Security
    Di Giulio, Carlo
    Sprabery, Read
    Kamhoua, Charles
    Kwiat, Kevin
    Campbell, Roy H.
    Bashir, Masooda N.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [4] An Initiation for Testing the Security of a Cloud Service Provider
    Ajay, D. M.
    Umamaheswari, E.
    PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON BIG DATA AND CLOUD COMPUTING CHALLENGES (ISBCC - 16'), 2016, 49 : 33 - 41
  • [5] Risk Propagation of Security SLAs in the Cloud
    Hale, Matthew L.
    Gamble, Rose
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 730 - 735
  • [6] Automatically Enforcing Security SLAs in the Cloud
    Casola, Valentina
    De Benedictis, Alessandra
    Erascu, Madalina
    Modic, Jolanda
    Rak, Massimiliano
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 741 - 755
  • [7] A new network anomaly detection technique based on per-flow and per-service statistics
    Waizumi, Y
    Kudo, D
    Kato, N
    Nemoto, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 252 - 259
  • [8] Cloud Service Provider Security Readiness Model: The Malaysian Perspective
    Ahmad, Nur Ilyani
    Mohamed, Ibrahim
    Daud, Maslina
    Jarno, Ahmad Dahari
    Hamid, Norlaili Abdul
    PROCEEDING OF 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI), 2019, : 75 - 80
  • [9] Measuring Security for Cloud Service Provider : A Third Party Approach
    Whaiduzzaman, Md
    Gani, Abdullah
    2013 INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2013,
  • [10] Cyber Security Risk Assessment Framework for Cloud Customer and Service Provider
    Kumari, N. Sujata
    Vurukonda, Naresh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) : 683 - 697