Security-Aware Elasticity for NoSQL Databases

被引:1
|
作者
Naskos, Athanasios [1 ]
Gounaris, Anastasios [1 ]
Mouratidis, Haralambos [2 ]
Katsaros, Panagiotis [1 ]
机构
[1] Aristotle Univ Thessaloniki, Dept Informat, Thessaloniki, Greece
[2] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
来源
MODEL AND DATA ENGINEERING, MEDI 2015 | 2015年 / 9344卷
关键词
D O I
10.1007/978-3-319-23781-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on horizontally scaling NoSQL databases in a cloud environment, in order to meet performance requirements while respecting security constraints. The performance requirements refer to strict latency limits on the query response time. The security requirements are derived from the need to address two specific kinds of threats that exist in cloud databases, namely data leakage, mainly due to malicious activities of actors hosted on the same physical machine, and data loss after one or more node failures. We explain that usually there is a trade-off between performance and security requirements and we derive a model checking approach to drive runtime decisions that strike a user-defined balance between them. We evaluate our proposal using real traces to prove the effectiveness in configuring the trade-offs.
引用
收藏
页码:181 / 197
页数:17
相关论文
共 50 条
  • [21] Security of Sharded NoSQL Databases: A Comparative Analysis
    Zahid, Anam
    Masood, Rahat
    Shibli, Muhammad Awais
    2014 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2014, : 1 - 8
  • [22] Security policies by design in NoSQL document databases
    Blanco, Carlos
    Garcia-Saiz, Diego
    Rosado, David G.
    Santos-Olmo, Antonio
    Peral, Jesus
    Mate, Alejandro
    Trujillo, Juan
    Fernandez-Medina, Eduardo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [23] DATABASES SECURITY ISSUES - A SHORT ANALYSIS ON THE EMERGENT SECURITY PROBLEMS GENERATED BY NoSQL DATABASES
    Nica, Elvira
    Tudorica, Bogdan George
    Dusmanescu, Dorel-Mihail
    Popescu, Gheorghe
    Breaz, Alina Maria
    ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH, 2019, 53 (03): : 113 - 129
  • [24] Security-Aware Beacon Based Network Monitoring
    Sasaki, Masahiro
    Zhao, Liang
    Nagamochi, Hiroshi
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 527 - 531
  • [25] Reusable components for developing security-aware applications
    Probst, S
    Essmayr, W
    Weippl, E
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 239 - 248
  • [26] Towards security-aware virtual network embedding
    Liu, Shuhao
    Cai, Zhiping
    Xu, Hong
    Xu, Ming
    COMPUTER NETWORKS, 2015, 91 : 151 - 163
  • [27] Security-Aware Approximate Spiking Neural Networks
    Ahmad, Syed Tihaam
    Siddique, Ayesha
    Hoque, Khaza Anuarul
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [28] Composable mediation for security-aware mobile services
    Tarkoma, Sasu
    Prehofer, Christian
    Sovio, Sampo
    Laitinen, Pekka
    IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (07) : 58 - 65
  • [29] Security-aware scheduling model for computational grid
    Kashyap, Rekha
    Vidyarthi, Deo Prakash
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (12): : 1377 - 1391
  • [30] Security-Aware Data Allocation in Multicloud Scenarios
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Piuri, Vincenzo
    Samarati, Pierangela
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2456 - 2468