A certification technique for cloud security adaptation

  • Claudio A. Ardagna
  • , Rasool Asal
  • , Ernesto Damiani
  • , Nabil El Ioini
  • , Claus Pahl
  • , Theo Dimitrakos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Unpredictability of cloud computing due to segregation of visibility and control between applications, data owners, and cloud providers increases tenants' uncertainty when using cloud services. Adaptation techniques become fundamental to provide a reliable cloud-based infrastructure with definite behavior, which preserves a stable quality of service for tenants. Existing adaptation techniques mostly focus on performance properties and are based on unverifiable evidence, which is collected in an untrusted way. In this paper, we propose a security-oriented adaptation technique for the cloud, based on evidence collected by means of a reliable certification process. Our approach adapts the cloud to maintain stable security properties over time, by continuously verifying certificate validity. It uses the output of verification activities to index a feature model, where equivalent configurations are used as the basis for adaptation. We also provide an analysis of the approach on British Telecommunications (BT) premises.

Original languageBritish English
Title of host publicationProceedings - 2016 IEEE International Conference on Services Computing, SCC 2016
EditorsJia Zhang, John A. Miller, Xiaofei Xu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages324-331
Number of pages8
ISBN (Electronic)9781509026289
DOIs
StatePublished - 31 Aug 2016
Event2016 IEEE International Conference on Services Computing, SCC 2016 - San Francisco, United States
Duration: 27 Jun 20162 Jul 2016

Publication series

NameProceedings - 2016 IEEE International Conference on Services Computing, SCC 2016

Conference

Conference2016 IEEE International Conference on Services Computing, SCC 2016
Country/TerritoryUnited States
CitySan Francisco
Period27/06/162/07/16

Keywords

  • Adaptive cloud
  • Certification
  • Feature models

Fingerprint

Dive into the research topics of 'A certification technique for cloud security adaptation'. Together they form a unique fingerprint.

Cite this