SLA-Oriented Security Provisioning for Cloud Computing
2013, Communications in Computer and Information Science
https://doi.org/10.1007/978-3-319-04519-1_15Abstract
Cloud Computing represents both a technology for using distributed computing infrastructures in a more efficient way, and a business model for renting computing services and resources. It is an opportunity for customers to reduce costs and increase efficiency. Moreover, it gives to small and medium enterprises the possibility of using services and technologies that were prerogative of large ones, by paying only for the used resources and avoiding unnecessary investment. The possibility of dynamically acquire and use resources and services on the base of a payby-use model, implies an incredible flexibility in terms of management, which is otherwise often hard to address. In this paper, we propose an approach to to build up SLA-oriented Cloud applications, which enable a Cloud provider to offer service customized on the customer security needing. In particular, by using a Cloud-oriented API derived from the mOSAIC project, the developer can implement security features that can be offered by the Cloud provider within their Service Level Agreement. In particular, we focus on providing an intrusion tolerance service to grant an application service availability even when the host system is under attack.
References (23)
- C. B. Westphall and F. R. Lamin. SLA Perspective in Security Management for Cloud Computing. n Proc. of the Int. Conf. on Networking and Services, 2010, pp. 212-217.
- F. Cheng and C. Meinel. Intrusion Detection in the Cloud. In Proc. of the IEEE Int. Conf. on Dependable, Autonomic and Secure Computing, Dec. 2009, pp. 729-734.
- mOSAIC: Open Source API and platform for multiple Clouds, 2010, available at: http://www.mosaic-cloud.eu.
- Massimiliano Rak, Salvatore Venticinque, Rocco Aversa, Beniamino Di Martino. User Centric Service Level Management in mOSAIC Application. In Proc. of the Europar 2011 Workshop, 2011, pp. 106-115. IEEE CS Press.
- P. Kouznetsov, A. Haeberlen, and P. Druschel. The case for Byzantine fault detec- tion. In Proc. of the 2nd Workshop on Hot Topics in System Dependability, 2006, pp. 5-10.
- N. F. Neves, P. Sousa, and P. Verissimo. Proactive resilience through architectural hybridization. In Proc. of the ACM Symp. on AppliedComputing (SAC'06), 2006, pp. 686-690.
- R. Mista, D. Bakken C., Dyreron A. Franz and M. Medidi. Mrfusion: A pro- grammable data fusion middleware subsystem with a tunable statistical profiling service. In Proc. of the Int. Conference on Dependable Systems and Network (DSN- 2002), 2002, pp. 273-278.
- M. Ficco and M. Rak. Intrusion tolerance of stealth DoS attacks to web services. In Proc. of the Int. Conf. on Information Security and Privacy, Springer-Verlag LNCS, vol. 376, 2012. Pp. 579-584.
- L. Coppolino, S. D'Antonio, M. Esposito, and L. Romano. Exploiting diversity and correlation to improve the performance of intrusion detection systems. In Proc. of the Int. Conf. on Network and Service Security, 2009. pp. 24-26.
- M. Ficco and L. Romano. A generic intrusion detection and diagnoser system based on complex event processing. In Proc. of the 1st International Conference on Data Compression, Communication, and Processing (CCP 2011), 2011, pp. 285-292.
- D. Heimbigner., J. Knight, and A. Wolf. The willow architecture: Comprehensive survivability for large-scale distributed applications. In Proc. of the Intrusion Tol- erant System Workshop, 2002, pp. 71-78.
- Squid: an open source fully-featured HTTP/1.0 proxy, 2012, available at: http://www.squid-cache.org.
- Ganglia, a scalable distributed monitoring system for high-performance computing systems, 2012, available at: http://ganglia.sourceforge.net.
- M. Ficco and M. Rak. Intrusion tolerant approach for denial of service attacks to web services. In Proc. of the 1st Int. Conf. on Data Compression, Communications and Processing (CCP 2011), 2011, pp. 285-292. IEEE CS Press.
- TPC Benchmark W (TPC-W), a transactional web benchmark, 2012, available at: http://www.tpc.org/tpcw/.
- M. Ficco and M. Rak. Intrusion tolerance in cloud applications: The mOSAIC approach. In Proc. of the 6th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2012, 2012, pp. 170-176.
- M. Rak, L. Liccardo, and R. Aversa. A SLA-based Interface for Security Manage- ment in Cloud and GRID Integrations. In Proc. of the 7th International Conference on Information Assurance and Security (IAS), 2011, IEEE Press.
- G. Karjoth, B. Pfitzmann, M. Schunter, and M. Waidner. Service-oriented Assur- ance, Comprehensive Security by Explicit Assurances. In Quality of Protection, vol 23, 2006, Springer, p. 13-24.
- M. Smith, M. Schmidt, N. Fallenbeck, C. Schridde, and B. Freisleben. Optimising Security Configurations with Service Level Agreements. In Proc. of the 7th Int. Conf.on Optimization: Techniques and Applications (ICOTA 2007), 2007, pp. 367- 381, IEEE Press.
- I. Brandic, D. Music, S. Dustdar, S. Venugopal, and R. Buyya. Advanced QoS methods for Grid workflows based on meta-negotiations and SLA-mappings. In Proc. of the 3th Workshop on Workflows in Support of LargeScale Science, 2008.
- M. Ficco, M. Rak, and B. Di Martino. An intrusion detection framework for sup- porting SLA assessment in cloud computing. In Proc. of the 4th Int. Conf. on Computational Aspects of Social Networks (CASoN), Nov. 2012, pp. 244-249. IEEE CS Press.
- F. Palmieri, U. Fiore, and A. Castiglione. Automatic security assessment for next generation wireless mobile networks. In Mobile Information Systems, vol. 7, no. 3, 2011, pp. 217-239. IOS Press.
- M. Ficco, S. Venticinque, and B. Di Martino. mOSAIC-Based intrusion detection framework for cloud computing. Springer-Verlag LNCS, vol. 7566, 2012, pp. 628-644.