Abstract
Despite the diffusion of the cloud computing paradigm, cloud security is still considered one of the main inhibitors for the adoption of cloud-based solution. Security Service Level Agreements (Security SLAs), i.e. agreements among providers and customers that states the level of security granted on the services delivered, adopted to enable a Cloud Service Provider (CSP) to declare its security policy and a way to measure them from cloud service customer (CSC) point of view. Security SLAs, however, not completely solve the security issue in cloud when we have complex supply chains. This paper proposes a technique to automatically generate Security SLA, relying on CSP declaration and on the services, composing the application. Security SLAs and cloud applications are modeled, enabling automatic reasoning over the security offerings and the evaluation of the security policy over an orchestration of cloud services.
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
The process is in course and we have analyzed about 300 of them.
- 4.
Note that only some of the MACM relationships are reported in this paper.
References
Casola, V., De Benedictis, A., Rak, M., Villano, U.: Preliminary design of a platform-as-a-service to provide security in cloud. In: CLOSER - Proceedings of the 4th International Conference on Cloud Computing and Services Science, Barcelona, Spain, 3–5 April, pp. 752–757 (2014)
SLA Ready Consortium: The SLA ready project web site (2015). http://www.sla-ready.eu/
Casola, V., De Benedictis, A., Modic, J., Rak, M., Villano, U.: Per-service security SLA: a new model for security management in clouds. In: 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 83–88, June 2016
Bishop, D.M.: What is computer security? IEEE Secur. Priv. 1, 67–69 (2003). University of California
Casola, V., De Benedictis, A., Rak, M., Modic, J., Erascu, M.: Automatically enforcing security SLAs in the cloud. IEEE Trans. Serv. Comput. (2016, preprints)
Andreieux, A.: Web services agreement specification (2007). https://www.ogf.org/documents/GFD.107.pdf
NIST: SP 800-53 Rev 4: recommended security and privacy controls for federal information systems and organizations. National Institute of Standards and Technology, Technical report (2013). http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
Liu, H., Bu, F., Cai, H.: SLA-based service composition model with semantic support. In: IEEE Asia-Pacific Services Computing Conference (2012)
Zappatore, M., Longo, A., Bochicchio, M.A.: SLA composition in service networks. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing - SAC 2015, pp. 1219–1224. ACM Press, New York (2015). http://dl.acm.org/citation.cfm?doid=2695664.2699490
Bennani, N., Guegan, C., Musicante, M., Solar, G.: SLA-guided data integration on cloud environments. In: IEEE International Conference on Cloud Computing, CLOUD, pp. 934–935 (2014). http://www.scopus.com/inward/record.url?eid=2-s2.0-84919799134&partnerID=40&md5=ca5042e7d0fe0b96389d1cc764acd78c
Bennani, N., Ghedira-Guegan, C., Vargas-Solar, G., Musicante, M.A.: Towards a secure database integration using SLA in a multi-cloud context. Constraint no. 2 (2015)
Satoh, F., Tokuda, T.: Security policy composition for composite services. In: 2008 Eighth International Conference on Web Engineering, pp. 86–97. IEEE, July 2008. http://ieeexplore.ieee.org/document/4577872/
Satoh, F., Tokuda, T.: Security policy composition for composite web services. IEEE Trans. Serv. Comput. 4(4), 314–327 (2011). http://ieeexplore.ieee.org/document/5560635/
Lee, A.J., Boyer, J.P., Olson, L.E., Gunter, C.A.: Defeasible security policy composition for web services. In: Proceedings of the Fourth ACM Workshop on Formal Methods in Security - FMSE 2006, pp. 45–54 (2006). http://portal.acm.org/citation.cfm?doid=1180337.1180342
Errico, M.D., Malmignati, F., Andreotti, G.F.: A platform for secure and trustworthy service composition, pp. 67–72 (2014)
Zhou, B., Llewellyn-Jones, D., Shi, Q., Asim, M., Merabti, M., Lamb, D.: A compose language-based framework for secure service composition. In: 2012 International Conference on Cyber Security, SocialInformatics, pp. 195–202. IEEE, December 2012. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6542544ieeexplore.ieee.org/document/6542544/
Dell’Amico, M., Serme, G., Idrees, M.S., de Olivera, A.S., Roudier, Y.: HiPoLDS: a security policy language for distributed systems. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 97–112. Springer, Heidelberg (2012). doi:10.1007/978-3-642-30955-7_10
Pham, N., Riguidel, M.: Security assurance aggregation for IT infrastructures. In: ICSNC, pp. 37–39 (2007)
Acknowledgment
This research is partially supported by the grant H2020-ICT-07-2014-644429 (MUSA). The author would like to thank Marco Toscano, whose work during the master degree thesis was partially reused in this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Rak, M. (2017). Security Assurance of (Multi-)Cloud Application with Security SLA Composition. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-57186-7_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57185-0
Online ISBN: 978-3-319-57186-7
eBook Packages: Computer ScienceComputer Science (R0)