Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach

被引:4
|
作者
Goeke, Ludger [1 ]
Mohammadi, Nazila Gol [1 ]
Heisel, Maritta [1 ]
机构
[1] Univ Duisburg Essen, Paluno Ruhr Inst Software Technol, D-47157 Duisburg, Germany
基金
欧盟地平线“2020”;
关键词
cloud computing; information security; data protection; context analysis; pattern;
D O I
10.3390/fi10080072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing services bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboration and data exchange over the Internet. Hence, users have become more concerned about security and privacy aspects. For secure provisioning of a cloud computing service, security and privacy issues must be addressed by using a risk assessment method. To perform a risk assessment, it is necessary to obtain all relevant information about the context of the considered cloud computing service. The context analysis of a cloud computing service and its underlying system is a difficult task because of the variety of different types of information that have to be considered. This context information includes (i) legal, regulatory and/or contractual requirements that are relevant for a cloud computing service (indirect stakeholders); (ii) relations to other involved cloud computing services; (iii) high-level cloud system components that support the involved cloud computing services; (iv) data that is processed by the cloud computing services; and (v) stakeholders that interact directly with the cloud computing services and/or the underlying cloud system components. We present a pattern for the contextual analysis of cloud computing services and demonstrate the instantiation of our proposed pattern with real-life application examples. Our pattern contains elements that represent the above-mentioned types of contextual information. The elements of our pattern conform to the General Data Protection Regulation. Besides the context analysis, our pattern supports the identification of high-level assets. Additionally, our proposed pattern supports the documentation of the scope and boundaries of a cloud computing service conforming to the requirements of the ISO 27005 standard (information security risk management). The results of our context analysis contribute to the transparency of the achieved security and privacy level of a cloud computing service. This transparency can increase the trust of users in a cloud computing service. We present results of the RestAssured project related to the context analysis regarding cloud computing services and their underlying cloud computing systems. The context analysis is the prerequisite to threat and control identification that are performed later in the risk management process. The focus of this paper is the use of a pattern at the time of design systematic context analysis and scope definition for risk management methods.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] \Addressing security challenges in cloud computing a pattern-based approach
    Anand, Priya
    Ryoo, Jungwoo
    Kim, Hyoungshick
    PROCEEDINGS 2015 FIRST INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2015), 2015, : 13 - 18
  • [2] Pattern-Based and ISO 27001 Compliant Risk Analysis for Cloud Systems
    Alebrahim, Azadeh
    Hatebur, Denis
    Goeke, Ludger
    2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 42 - 47
  • [3] A Pattern-Based Formalization of Cloud-Based Elastic Systems
    Dustdar, Schahram
    Gambi, Alessio
    Krenn, Willibald
    Nickovic, Dejan
    7TH INTERNATIONAL WORKSHOP ON PRINCIPLES OF ENGINEERING SERVICE-ORIENTED AND CLOUD SYSTEMS PESOS 2015, 2015, : 31 - 37
  • [4] A Forensic Pattern-Based Approach for Investigations in Cloud System Environments
    Bennett, Juan-Carlos
    Diallo, Mamadou H.
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [5] A Pattern-Based Code Transformation Approach for Cloud Application Migration
    Cai, Zhengong
    Zhao, Liping
    Wang, Xinyu
    Yang, Xiaohu
    Qin, Juntao
    Yin, Keting
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 33 - 40
  • [6] A behavioral analysis approach to pattern-based composition
    Dong, J
    Alencar, PSC
    Cowan, DD
    OOIS 2001: 7TH INTERNATIONAL CONFERENCE ON OBJECT-ORIENTED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 540 - 549
  • [7] Formalising Middleware Systems: A Design Pattern-based Approach
    Rosa, Nelson Souto
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 658 - 667
  • [8] Chatbotification for Web Information Systems: A Pattern-based Approach
    Liang, Yan-Cih
    Ma, Shang-Pin
    Lin, Chih-Ying
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2290 - 2295
  • [9] A pattern-based approach for developing creativity applications supported by surface computing
    Magallanes, Yazmin
    Alfredo Sanchez, J.
    Cervantes, Ofelia
    Wan, Wanggen
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2018, 110 : 134 - 154
  • [10] An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example
    Beckers, Kristian
    Fassbender, Stephan
    Schmidt, Holger
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 463 - 472