Towards Model-Based Security Assessment of Cloud Applications

被引:0
|
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Nardone, Roberto [1 ]
机构
[1] Univ Napoli Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
基金
欧盟地平线“2020”;
关键词
Model-based security assessment; Secure cloud applications; Cloud security; SYSTEMS;
D O I
10.1007/978-3-319-57186-7_56
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security issues are still posing limitations to the full exploitation of the potential of the cloud computing paradigm, and cloud developers are more and more required to take security into account from the very beginning of the development process. Unfortunately, the application of classical security best practices may be not enough due to the involvement of cloud services provided by third-parties and out of the control of the developer. In this paper, to overcome this issue, we introduce and discuss a model-based process for the security assessment of cloud applications. In particular, we suggest a complete process that can be executed within the lifecycle of a cloud application, from the requirement elicitation up to the validation (both static and dynamic through the generation and execution of suitable test cases) of the final deployment against security requirements. In this work, we sketch the process main phases and illustrate the high-level modelling languages that have been defined to describe an application at different levels of abstraction and to formalize both security requirements of applications and security features offered by existing cloud services. A running example involving the assessment of a simple yet realistic cloud application is used throughout the paper to better illustrate the proposal and to demonstrate its feasibility and effectiveness.
引用
收藏
页码:773 / 785
页数:13
相关论文
共 50 条
  • [21] MODEL-Based Performance Quality Assessment for IoT Applications
    Kh, Teeba Ismail
    Hamarash, Ibrahim I.
    [J]. International Journal of Interactive Mobile Technologies, 2021, 15 (12) : 4 - 20
  • [22] Model for Cloud Computing Security Assessment Based on AHP and FCE
    Zhu Ruo-Xin
    Cui Xiao-jie
    Gong Shi-jun
    Ren Hong-kang
    Chen Ke
    [J]. 2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 197 - 202
  • [23] Software Architecture for the Cloud A Roadmap Towards Control-Theoretic, Model-Based Cloud Architecture
    Pahl, Claus
    Jamshidi, Pooyan
    [J]. SOFTWARE ARCHITECTURE (ECSA 2015), 2015, 9278 : 212 - 220
  • [24] Model-based security engineering
    Juerjens, Jan
    [J]. SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : IS23 - IS29
  • [25] Model-based security engineering
    Juerjens, Jan
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS23 - IS29
  • [26] Model-Based Security Testing
    Schieferdecker, Ina
    Grossmann, Juergen
    Schneider, Martin
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (80): : 1 - 12
  • [27] Model-based cyber security
    Rasche, Galen
    Allwein, Erin
    Moore, Michael
    Abbott, Ben
    [J]. ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS: RAISING EXPECTATIONS OF COMPUTER-BASES SYSTEMS, 2007, : 405 - 412
  • [28] Model-based security engineering
    Juerjens, Jan
    [J]. ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS23 - IS29
  • [29] Towards model-based functional hazard assessment at aircraft level
    Maitrehenry, S.
    Metge, S.
    Ait-Ameur, Y.
    Bieber, P.
    [J]. ADVANCES IN SAFETY, RELIABILITY AND RISK MANAGEMENT, 2012, : 2402 - 2409
  • [30] Model-based security engineering
    Juerjens, Jan
    [J]. WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS23 - IS29