Unpredictability of cloud computing due to segregation of visibility and control between applications, data owners, and cloud providers increases tenants' uncertainty when using cloud services. Adaptation techniques become fundamental to provide a reliable cloud-based infrastructure with definite behavior, which preserves a stable quality of service for tenants. Existing adaptation techniques mostly focus on performance properties and are based on unverifiable evidence, which is collected in an untrusted way. In this paper, we propose a security-oriented adaptation technique for the cloud, based on evidence collected by means of a reliable certification process. Our approach adapts the cloud to maintain stable security properties over time, by continuously verifying certificate validity. It uses the output of verification activities to index a feature model, where equivalent configurations are used as the basis for adaptation. We also provide an analysis of the approach on British Telecommunications (BT) premises.

A certification technique for cloud security adaptation / C.A. Ardagna, R. Asal, E. Damiani, N. El Ioini, C. Pahl, T. Dimitrakos - In: Services Computing (SCC), 2016 IEEE International Conference on[s.l] : IEEE, 2016. - ISBN 9781509026289. - pp. 324-331 (( convegno SCC tenutosi a San Francisco nel 2016 [10.1109/SCC.2016.49].

A certification technique for cloud security adaptation

C.A. Ardagna;E. Damiani;
2016

Abstract

Unpredictability of cloud computing due to segregation of visibility and control between applications, data owners, and cloud providers increases tenants' uncertainty when using cloud services. Adaptation techniques become fundamental to provide a reliable cloud-based infrastructure with definite behavior, which preserves a stable quality of service for tenants. Existing adaptation techniques mostly focus on performance properties and are based on unverifiable evidence, which is collected in an untrusted way. In this paper, we propose a security-oriented adaptation technique for the cloud, based on evidence collected by means of a reliable certification process. Our approach adapts the cloud to maintain stable security properties over time, by continuously verifying certificate validity. It uses the output of verification activities to index a feature model, where equivalent configurations are used as the basis for adaptation. We also provide an analysis of the approach on British Telecommunications (BT) premises.
Adaptive cloud; Certification; Feature models
Settore INF/01 - Informatica
2016
IEEE Computer Society Technical Committee on Services Computing (TC-SVC)
Services Society (SS)
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
AADDEP.SCC2016.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 250.54 kB
Formato Adobe PDF
250.54 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/453691
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? 5
social impact