loading
Documents

Research.Publish.Connect.

Paper

Authors: Samuel Olaiya Afolaranmi 1 ; Luis E. Gonzalez Moctezuma 1 ; Massimiliano Rak 2 ; Valentina Casola 3 ; Erkuden Rios 4 and Jose L. Martinez Lastra 1

Affiliations: 1 Tampere University of Technology, Finland ; 2 Second University of Naples, Italy ; 3 Università Federico II of Naples, Italy ; 4 ICT-European Software Institute. Parque Tecnológico de Bizkaia, Spain

ISBN: 978-989-758-182-3

Keyword(s): Multi-cloud, Security-by-design, Cyber-security Methodologies, Threat Modelling.

Related Ontology Subjects/Areas/Topics: Cloud Application Architectures ; Cloud Computing ; Cloud Computing Architecture ; Cloud Computing Enabling Technology ; Fundamentals ; Platforms and Applications ; Security, Privacy, and Compliance Management ; Services Science ; Services Security and Reliability

Abstract: What controls should be used to ensure adequate security level during operation is a non-trivial subject in complex software systems and applications. The problem becomes even more challenging when the application uses multiple cloud services which security measures are beyond the control of the application provider. In this paper, a methodology that enables the identification of the best security controls for multi-cloud applications whose components are deployed in heterogeneous clouds is presented. The methodology is based on application decomposition and modelling of threats over the components, followed by the analysis of the risks together with the capture of cloud business and security requirements. The methodology has been applied in the MUSA EU H2020 project use cases as the first step for building up the multi-cloud applications’ security-aware Service Level Agreements (SLA). The identified security controls will be included in the applications’ SLAs for their monitoring and fulfilment assurance at operation. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.227.31.145

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Afolaranmi S., Moctezuma L., Rak M., Casola V., Rios E. and Lastra J. (2016). Methodology to Obtain the Security Controls in Multi-cloud Applications.In Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-758-182-3, pages 327-332. DOI: 10.5220/0005912603270332

@conference{closer16,
author={Samuel Olaiya Afolaranmi and Luis E. Gonzalez Moctezuma and Massimiliano Rak and Valentina Casola and Erkuden Rios and Jose L. Martinez Lastra},
title={Methodology to Obtain the Security Controls in Multi-cloud Applications},
booktitle={Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2016},
pages={327-332},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005912603270332},
isbn={978-989-758-182-3},
}

TY - CONF

JO - Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - Methodology to Obtain the Security Controls in Multi-cloud Applications
SN - 978-989-758-182-3
AU - Afolaranmi S.
AU - Moctezuma L.
AU - Rak M.
AU - Casola V.
AU - Rios E.
AU - Lastra J.
PY - 2016
SP - 327
EP - 332
DO - 10.5220/0005912603270332

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.