Ontology-based Negotiation of Security Requirements in Cloud

被引:0
|
作者
Liccardo, Loredana [1 ]
Rak, Massimiliano [1 ]
Di Modica, Giuseppe [2 ]
Tomarchio, Orazio [2 ]
机构
[1] Univ Naples 2, Dipartimento Ingn Informaz, Naples, Italy
[2] Univ Catania, Dipartimento Ingn Elettr Elettron Informat, Catania, Italy
关键词
Cloud computing; Security; SLA; Negotiation; Otology;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Cloud Computing paradigm attracts many customers because of the potentialities it promises. Despite of many benefits, a widespread adoption is limited by many issues that potential customers still have to face. Security in the cloud is one of the main concern for the customer. The Cloud Service Provider (CSP) is responsible of providing security to customers and assuring that their data and application are properly secured. In this context, the concept of Service Level Agreement (SLA) assumes a great importance. It can be used as a means to formalize and establish in a contract what must effectively be granted in terms of security levels. There is actually Semantic Gap between how security guarantees are intended respectively by customers and providers. A customer is inclined to express security in terms of high-level requirements, while a CSP expresses guarantees through a technical, low-level language. To address this gap, the key is to find a common language for both the customer and the CSP. The goal of this paper is to offer an Ontology-based Negotiation Service allowing a customer to negotiate the interested security level among different CSPs, with the possibility to choose the best security offering; a Security Ontology was developed as a basis for a common semantic language that customers and providers will have to use to express security features and requirements.
引用
收藏
页码:192 / 197
页数:6
相关论文
共 50 条
  • [1] Ontology-Based SLA Negotiation and re-Negotiation for Cloud Computing
    Labidi, Taher
    Mtibaa, Achraf
    Gaaloul, Walid
    Gargouri, Faiez
    [J]. 2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 36 - 41
  • [2] An ontology-based framework for modelling security requirements
    Lasheras, Joaquin
    Valencia-Garcia, Rafael
    Tomas Fernandez-Breis, Jesualdo
    Toval, Ambrosio
    [J]. WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 78 - 88
  • [3] Ontology-Based Learning for Negotiation
    Aydogan, Reyhan
    Yolum, Pinar
    [J]. 2009 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 2, 2009, : 177 - 184
  • [4] Cloud SLA negotiation and re-negotiation: An ontology-based context-aware approach
    Labidi, Taher
    Mtibaa, Achraf
    Gaaloul, Walid
    Gargouri, Faiez
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15):
  • [5] An ontology-based learning approach for automatically classifying security requirements
    Li, Tong
    Chen, Zhishuai
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 165
  • [6] A Novel Method: Ontology-based Security Requirements Engineering Framework
    Salini, P.
    Kanmani, S.
    [J]. FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [7] Ontology-based Requirements Transformation
    Novacekt, Jan
    Viehl, Alexander
    Bringmann, Oliver
    Rosenstiel, Wolfgang
    [J]. 2019 5TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (IEEE ISSE 2019), 2019,
  • [8] Towards Ontology-Based MAS Methodologies: Ontology-Based Early Requirements
    Beydoun, G.
    Krishna, A. K.
    Ghose, A.
    Low, G. C.
    [J]. INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2, 2009, : 923 - 935
  • [9] Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service
    Choi, Chang
    Choi, Junho
    [J]. IEEE ACCESS, 2019, 7 : 110510 - 110517
  • [10] An ontology-based approach to automated trust negotiation
    Liu, Xinxin
    Tang, Shaohua
    Huang, Qiong
    Yu, Zhiwen
    [J]. COMPUTER STANDARDS & INTERFACES, 2013, 36 (01) : 219 - 230