Academia.eduAcademia.edu

Outline

Policy Based Management for Security in Cloud Computing

2011, Communications in Computer and Information Science

https://doi.org/10.1007/978-3-642-22365-5_16

Abstract

Cloud computing is one of the biggest trends in information technology, with individuals, companies and even governments moving towards their use to save costs and increase flexibility. Cloud infrastructures are typically based on virtualised environments, to allow physical infrastructure to be shared by multiple end users. These infrastructures can be very large and complex, with many end users, making their configuration difficult, error-prone and timeconsuming. At the same time, the fact that diverse end users share the same physical infrastructure raises security concerns, and can lead to a significant impact from misconfiguration or being slow to react to attacks. In this paper, we focus on the use of Policy Based Management techniques to manage cloud infrastructure, identifying the requirements, surveying the state-of-the-art, identifying the challenges and proposing potential solutions.

References (26)

  1. Software as a Service Market Will Expand Rather than Contract Despite the Economic Crisis, IDC Finds, http://www.idc.com/getdoc.jsp?containerId=prUS21641409, January 2009 accessed March 2010
  2. Robinson J.J., Demand for software-as-a-service still growing, http://www.information- age.com/channels/commsand-networking/perspectives-and-trends/1046687/demand- forsoftwareasaservice-still-growing.thtml, May 2009, accessed March 2010
  3. PASSIVE project, http://ict-passive.eu/
  4. Chapin, P.C., Shalka, C., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Comput. Surv., 40, 3, Article 9 (August 2008) (2008)
  5. Bonatti, P., De Capitani Di Vimercati, S., Samarati, P.: An Algebra for Composing Access Control Policies. ACM Trans. Inf. Syst. Secur., 2002, 5(1) pp. 1-35 (2002)
  6. Inglesant, P., Sasse, M.A., Chadwick, D., Shi, L.L.: Expressions of Expertness: The Virtu- ous Circle of Natural Language for Access Control Policy Specification. Symposium On Usable Privacy and Security (SOUPS) 2008, July 23-25, 2008, Pittsburgh, PA, USA (2008)
  7. Dunlop, N., Indulska, J., Raymond, K.: Methods for Conflict Resolution in Policy-Based Management Systems. Proceedings of the 7th International Conference on Enterprise Distributed Object Computing (EDOC 2003) pp. 1-12 (2003)
  8. Chadha, R.: A Cautionary Note about Policy Conflict Resolution. Proc. IEEE Military Comms Conference 2006, MILCOM 2006, 23-25 Oct 2006, Washington DC (2006)
  9. Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: Traps, Events, Emulation, and En- forcement: Managing the Yin and Yang of Virtualization-based Security. VMSEC'08, Octo- ber 31, 2008, Fairfax, Virginia, USA pp. 49-58 (2008)
  10. Sailer R., Valdez E., Jaeger T., Perez R., van Doorn L., Griffin J. L., Berger S.: sHype: Se- cure Hypervisor Approach to Trusted Virtualized Systems. IBM Research Report RC23511, 2005 (2005)
  11. Spencer R., Smalley S., Loscocco P., Hibler M., Andersen D., Lepreau J.: The flask secu- rity architecture: system support for diverse security policies. Proceedings of the 8th confer- ence on USENIX Security Symposium -Volume 8, 1999 (1999)
  12. Kuhlmann D., Landfermann R., Ramasamy H. V., Schunter M., Ramunno G., Vernizzi D.: An Open Trusted Computing Architecture -Secure Virtual Machines Enabling User- Defined Policy Enforcement. OpenTC report, 2006 (2006)
  13. Payne A. D., Sailer R., Cáceres R., Perez R., Lee W.: A layered approach to simplified ac- cess control in virtualized systems. ACM SIGOPS Operating Systems Review, vol. 41, no. 7, p. 12-19, 2007 (2007)
  14. McCune J. M., Jaeger T., Berger S., Caceres R., Sailer R.: Shamon: A System for Distrib- uted Mandatory Access Control. Computer Security Applications Conference, p. 23-32, 2006 (2006)
  15. Berger S., Cáceres R., Pendarakis D., Sailer R., Valdez E., Perez R., Schildhauer W., Srini- vasan D.: TVDc: Managing Security in the Trusted Virtual Datacenter. ACM SIGOPS Op- erating Systems Review, v. 42, no. 1, p. 40-47, 2008 (2008)
  16. Bussani A., Griffin J.L., Jansen B., Julisch K., Karjoth G., Maruyama H., Nakamura M., Perez R., Schunter M., Tanner A., van Doorn L., Herreweghen E.V., Waidner M., Yoshi- hama S.: Trusted Virtual Domains: Secure foundation for business and IT services, Research Report RC 23792, IBM Research, November 2005 (2005)
  17. Chander, A., Dean, D., Mitchell, J.C.: A distributed high assurance reference monitor. In: Proceedings of the Seventh Information Security Conference Lecture Notes in Computer Science vol. 3225, pages 231-244, Berlin, September 2004. Springer-Verlag (2004)
  18. Montangero, C., Reiff-Marganiec, S., Semini, L.: Logic-Based Detection of Conflicts in APPEL Policies. FSEN 2007, LNCS 4767, pp. 257-271 (2007)
  19. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: Ponder: A Language for Specifying Secu- rity and Management Policies for Distributed Systems. The Language Specification Version 2.3. Imperial College Research Report DoC 2000/1, 20 October, 2000 (2000)
  20. OASIS website, www.oasis-open.org , February 2011
  21. Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM Trans. Inf. Syst. Secur., 2005, 8(4) pp. 351-387 (2005)
  22. Alvaro A., de Almeida E.S., de Lemos Meira S.R.: Software component certification: A survey. In Proc. of 31st EUROMICRO Conference on Software Engineering and Advanced Applications, Porto, Portugal, August-September 2005 (2005)
  23. Common Criteria for Information Technology Security Evaluation, ISO/IEC Standard 15408, version 3.1, 2008 (2008)
  24. ASSERT4SOA Project, http://www.assert4soa.eu/, March 2011
  25. Davy S., Jennings B., Strassner J.: The Policy Continuum -A Formal Model, in Proc. Modelling Autonomic Communications Environments, Multlicon Lecture Notes No. 6, Multicon, Berlin, pp. 65-78 (2007)
  26. AUTOI ICT-216404, Deliverable D4.1 -Initial Management Plane, December 2008. (2008)