Improving Tenants' Trust In SaaS Applications Using Dynamic Security Monitors

被引:1
|
作者
Abdelrazek, Mohamed Almorsy [1 ]
Grundy, John [2 ]
Ibrahim, Amani S. [2 ]
机构
[1] Deakin Univ, Fac Sci Engn & Built Environm, Sch Informat Technol, Geelong, Vic, Australia
[2] Swinburne Univ Technol, Fac Sci Engn & Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
关键词
Security monitoring; security metrics; run-time verification; Cloud computing monitoring;
D O I
10.1109/ICECCS.2015.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is almost impossible to prove that a given software system achieves an absolute security level. This becomes more complicated when addressing multi-tenant cloud-based SaaS applications. Developing practical security properties and metrics to monitor, verify, and assess the behavior of such software systems is a feasible alternative to such problem. However, existing efforts focus either on verifying security properties or security metrics but not both. Moreover, they are either hard to adopt, in terms of usability, or require design-time preparation to support monitoring of such security metrics and properties which is not feasible for SaaS applications. In this paper, we introduce, to the best of our knowledge, the first unified monitoring platform that enables SaaS application tenants to specify, at run-time, security metrics and properties without design-time preparation and hence increases tenants' trust of their cloud-assets security. The platform automatically converts security metrics and properties specifications into security probes and integrates them with the target SaaS application at run-time. Probes-generated measurements are fed into an analysis component that verifies the specified properties and calculates security metrics' values using aggregation functions. This is then reported to SaaS tenants and cloud platform security engineers. We evaluated our platform expressiveness and usability, soundness, and performance overhead.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 50 条
  • [1] Security as a Service for Public Cloud Tenants(SaaS)
    Hawedi, Mohamed
    Talhi, Chamseddine
    Boucheneb, Hanifa
    [J]. 9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 1025 - 1030
  • [2] SoC Trust Validation Using Assertion-Based Security Monitors
    Alatoun, Khitam
    Shankaranarayanan, Bharath
    Achyutha, Shanmukha Murali
    Vemuri, Ranga
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 496 - 503
  • [3] Multi-tenant Quality Attributes to Manage Tenants in SaaS Applications
    Kalra, Sumit
    Prabhakar, T., V
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2020), 2020, : 83 - 88
  • [4] Resource Calculations with Constraints, and Placement of Tenants and Instances for Multi-tenant SaaS Applications
    Kwok, Thomas
    Mohindra, Ajay
    [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2008, PROCEEDINGS, 2008, 5364 : 633 - 648
  • [5] Improving Healthcare Applications Security Using Blockchain
    Farahat, Ibrahim Shawky
    Aladrousy, Waleed
    Elhoseny, Mohamed
    Elmougy, Samir
    Tolba, Ahmed Elsaid
    [J]. ELECTRONICS, 2022, 11 (22)
  • [6] On-the-fly inlining of dynamic security monitors
    Magazinius, Jonas
    Russo, Alejandro
    Sabelfeld, Andrei
    [J]. COMPUTERS & SECURITY, 2012, 31 (07) : 827 - 843
  • [7] On-the-fly Inlining of Dynamic Security Monitors
    Magazinius, Jonas
    Russo, Alejandro
    Sabelfeld, Andrei
    [J]. SECURITY AND PRIVACY - SILVER LININGS IN THE CLOUD, 2010, 330 : 173 - 186
  • [8] Offering security diagnosis as a service for cloud SaaS applications
    Elsayed, Marwa
    Zulkernine, Mohammad
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 (32-48) : 32 - 48
  • [9] Trust and Security in Dynamic Systems
    Lagesse, Brent
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 413 - 414
  • [10] Improving Security In Wireless Sensor Network Using Trust And Metaheuristic Algorithms
    Anbuchelian, S.
    Lokesh, S.
    Baskaran, Madhusudhanan
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2016, : 233 - 241