Improving Tenants' Trust In SaaS Applications Using Dynamic Security Monitors

被引:1
|
作者
Abdelrazek, Mohamed Almorsy [1 ]
Grundy, John [2 ]
Ibrahim, Amani S. [2 ]
机构
[1] Deakin Univ, Fac Sci Engn & Built Environm, Sch Informat Technol, Geelong, Vic, Australia
[2] Swinburne Univ Technol, Fac Sci Engn & Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
关键词
Security monitoring; security metrics; run-time verification; Cloud computing monitoring;
D O I
10.1109/ICECCS.2015.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is almost impossible to prove that a given software system achieves an absolute security level. This becomes more complicated when addressing multi-tenant cloud-based SaaS applications. Developing practical security properties and metrics to monitor, verify, and assess the behavior of such software systems is a feasible alternative to such problem. However, existing efforts focus either on verifying security properties or security metrics but not both. Moreover, they are either hard to adopt, in terms of usability, or require design-time preparation to support monitoring of such security metrics and properties which is not feasible for SaaS applications. In this paper, we introduce, to the best of our knowledge, the first unified monitoring platform that enables SaaS application tenants to specify, at run-time, security metrics and properties without design-time preparation and hence increases tenants' trust of their cloud-assets security. The platform automatically converts security metrics and properties specifications into security probes and integrates them with the target SaaS application at run-time. Probes-generated measurements are fed into an analysis component that verifies the specified properties and calculates security metrics' values using aggregation functions. This is then reported to SaaS tenants and cloud platform security engineers. We evaluated our platform expressiveness and usability, soundness, and performance overhead.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 50 条
  • [31] IMPROVING E-HEALTH SECURITY THROUGH TRUST NEGOTIATION
    Elkhodr, Mahmoud
    Shahrestani, Seyed
    Cheung, Hon
    [J]. ICSOFT 2011: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATABASE TECHNOLOGIES, VOL 1, 2011, : 172 - 177
  • [32] Towards a Framework for Building SaaS Applications Operating in Diverse and Dynamic Environments
    Agrawal, Ashish
    Prabhakar, T. V.
    [J]. SOFTWARE ARCHITECTURE, ECSA 2016, 2016, 9839 : 291 - 306
  • [33] Security applications of trust in multi-agent systems
    DeAngelis, David
    Barber, K. Suzanne
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (01) : 57 - 99
  • [34] Special section on trust, security and privacy for pervasive applications
    Central South University, China
    不详
    不详
    [J]. IEICE Trans Inf Syst, 3 (409-410):
  • [35] On-chip static and dynamic monitors for low power applications
    Bishnu Prasad Das
    [J]. CSI Transactions on ICT, 2020, 8 (2) : 123 - 127
  • [36] Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table
    Hameedi, Saleem S.
    Bayat, Oguz
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (18):
  • [37] Multi-source dynamic integration security for SaaS collaborative platform of industrial chain
    Center of CAD Engineering, Southwest Jiaotong University, Chengdu
    610031, China
    [J]. Jisuanji Jicheng Zhizao Xitong, 3 (813-821):
  • [38] Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study
    Akinrolabu, Olusola
    New, Steve
    Martin, Andrew
    [J]. 2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 81 - 88
  • [39] Static versus Dynamic Data Information Fusion analysis using DDDAS for Cyber Security Trust
    Blasch, Erik
    Al-Nashif, Youssif
    Hariri, Salim
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, 2014, 29 : 1299 - 1313
  • [40] Adaptable, model-driven security engineering for SaaS cloud-based applications
    Mohamed Almorsy
    John Grundy
    Amani S. Ibrahim
    [J]. Automated Software Engineering, 2014, 21 : 187 - 224