Improving Tenants' Trust In SaaS Applications Using Dynamic Security Monitors

被引:1
|
作者
Abdelrazek, Mohamed Almorsy [1 ]
Grundy, John [2 ]
Ibrahim, Amani S. [2 ]
机构
[1] Deakin Univ, Fac Sci Engn & Built Environm, Sch Informat Technol, Geelong, Vic, Australia
[2] Swinburne Univ Technol, Fac Sci Engn & Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
关键词
Security monitoring; security metrics; run-time verification; Cloud computing monitoring;
D O I
10.1109/ICECCS.2015.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is almost impossible to prove that a given software system achieves an absolute security level. This becomes more complicated when addressing multi-tenant cloud-based SaaS applications. Developing practical security properties and metrics to monitor, verify, and assess the behavior of such software systems is a feasible alternative to such problem. However, existing efforts focus either on verifying security properties or security metrics but not both. Moreover, they are either hard to adopt, in terms of usability, or require design-time preparation to support monitoring of such security metrics and properties which is not feasible for SaaS applications. In this paper, we introduce, to the best of our knowledge, the first unified monitoring platform that enables SaaS application tenants to specify, at run-time, security metrics and properties without design-time preparation and hence increases tenants' trust of their cloud-assets security. The platform automatically converts security metrics and properties specifications into security probes and integrates them with the target SaaS application at run-time. Probes-generated measurements are fed into an analysis component that verifies the specified properties and calculates security metrics' values using aggregation functions. This is then reported to SaaS tenants and cloud platform security engineers. We evaluated our platform expressiveness and usability, soundness, and performance overhead.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 50 条
  • [41] Adaptable, model-driven security engineering for SaaS cloud-based applications
    Almorsy, Mohamed
    Grundy, John
    Ibrahim, Amani S.
    [J]. AUTOMATED SOFTWARE ENGINEERING, 2014, 21 (02) : 187 - 224
  • [42] A Multidimensional Trust Evaluation Mechanism for Improving Network Security in Fog Computing
    Liu, Xiao
    Tan, Zhencai
    Liang, Li
    Li, Gaoxiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024,
  • [43] A path forward: Improving Internet routing security by enabling zones of trust
    Clark, David
    Testart, Cecilia
    Luckie, Matthew
    Claffy, Kc
    [J]. Journal of Cybersecurity, 2024, 10 (01):
  • [44] Trust extended dynamic security model and its application in network
    Zhang, Xiaofei
    Xu, Fang
    Liu, Yi
    Zhang, Xing
    Shen, Changxiang
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 404 - +
  • [45] Study on security routing algorithm based on dynamic adjacent trust
    Han, Ting
    Luo, Shou-Shan
    Xin, Yang
    Yang, Yi-Xian
    Cheng, Gong
    Wu, Xiao
    [J]. Tongxin Xuebao/Journal on Communications, 2013, 34 (06): : 191 - 200
  • [46] Trust Evolution Policies for Security in Collaborative Ad Hoc Applications
    Gray, Elizabeth
    Jensen, Christian
    O'Connell, Paul
    Weber, Stefan
    Seigneur, Jean-Marc
    Chen, Yong
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (03) : 95 - 111
  • [47] Special Section on Trust, Security and Privacy for Pervasive Applications FOREWORD
    Wang, Guojun
    Yang, Laurence T.
    Sakurai, Kouichi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03) : 409 - 410
  • [48] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    [J]. COMPUTER, 2018, 51 (04) : 20 - 27
  • [49] Emotions of scepticism, trust, and security within the acceptance of telemedical applications
    Offermann, Julia
    Rohowsky, Anna
    Ziefle, Martina
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2023, 177
  • [50] Using workflow for dynamic security context management in grid-based applications
    Demchenko, Yuri
    Gommans, Leon
    de Laat, Cees
    Taal, Arie
    Wan, Alfred
    Mulmo, Olle
    [J]. 2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2006, : 72 - +