Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

A Formal Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds

verfasst von : Elio Goettelmann, Karim Dahman, Benjamin Gateau, Claude Godart

Erschienen in: Information Systems Engineering in Complex Environments

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security risk management on information systems provides security guarantees while controlling costs. But security risk assessments can be very complex, especially in a cloud context where data is distributed over multiple environments. To prevent costs from becoming the only cloud selection factor, while disregarding security, we propose a method for performing multiple cloud security risk assessments. In this paper we present a broker framework for balancing costs against security risks. Our framework selects cloud offers and generates deployment-ready business processes in a multi-cloud environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat ISO/IEC 27017, Information tech., Security techniques, Code of practice for information security controls for cloud computing services based on ISO/IEC 27002 ISO/IEC 27017, Information tech., Security techniques, Code of practice for information security controls for cloud computing services based on ISO/IEC 27002
2.
Zurück zum Zitat AS/NZS 4360 SET Risk Management, Australian/New Zealand Standards (2004) AS/NZS 4360 SET Risk Management, Australian/New Zealand Standards (2004)
3.
Zurück zum Zitat Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards definition of secure business processes. In: Bajec, M., Eder, J. (eds.) CAiSE 2012. LNBIP, vol. 112, pp. 1–15. Springer, Heidelberg (2012) CrossRef Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards definition of secure business processes. In: Bajec, M., Eder, J. (eds.) CAiSE 2012. LNBIP, vol. 112, pp. 1–15. Springer, Heidelberg (2012) CrossRef
4.
Zurück zum Zitat AlZain, M., Pardede, E., Soh, B., Thom, J.: Cloud computing security: from single to multi-clouds. In: HICSS 2012, pp. 5490–5499 (2012) AlZain, M., Pardede, E., Soh, B., Thom, J.: Cloud computing security: from single to multi-clouds. In: HICSS 2012, pp. 5490–5499 (2012)
5.
Zurück zum Zitat Carminati, B., Ferrari, E., Hung, P.C.K.: Security conscious web service composition. In: ICWS (2006) Carminati, B., Ferrari, E., Hung, P.C.K.: Security conscious web service composition. In: ICWS (2006)
6.
Zurück zum Zitat Cloud Security Alliance. Cloud Control Matrix/Security, Trust & Assurance Registry/Consensus Assessments Initiative Questionnaire. Technical report Cloud Security Alliance. Cloud Control Matrix/Security, Trust & Assurance Registry/Consensus Assessments Initiative Questionnaire. Technical report
7.
Zurück zum Zitat Cloud Security Alliance. The Notorious Nine - Cloud Computing Top Threats in 2013. Technical report (2013) Cloud Security Alliance. The Notorious Nine - Cloud Computing Top Threats in 2013. Technical report (2013)
8.
Zurück zum Zitat Conforti, R., de Leoni, M., La Rosa, M., van der Aalst, W.M.P.: Supporting risk-informed decisions during business process execution. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 116–132. Springer, Heidelberg (2013) CrossRef Conforti, R., de Leoni, M., La Rosa, M., van der Aalst, W.M.P.: Supporting risk-informed decisions during business process execution. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 116–132. Springer, Heidelberg (2013) CrossRef
9.
Zurück zum Zitat European Network and Information Security Agency. Benefits, risks and recommendations for information security. Technical report (2009) European Network and Information Security Agency. Benefits, risks and recommendations for information security. Technical report (2009)
10.
Zurück zum Zitat Fdhila, W., Dumas, M., Godart, C.: Optimized decentralization of composite web services. In: CollaborateCom 2010, pp. 1–10 (2010) Fdhila, W., Dumas, M., Godart, C.: Optimized decentralization of composite web services. In: CollaborateCom 2010, pp. 1–10 (2010)
11.
Zurück zum Zitat Fdhila, W., Yildiz, U., Godart, C.: A flexible approach for automatic process decentralization using dependency tables. In: ICWS 2009, pp. 847–855. IEEE Computer Society, Washington, DC (2009) Fdhila, W., Yildiz, U., Godart, C.: A flexible approach for automatic process decentralization using dependency tables. In: ICWS 2009, pp. 847–855. IEEE Computer Society, Washington, DC (2009)
12.
Zurück zum Zitat Goettelmann, E., Fdhila, W., Godart, C.: Partitioning and cloud deployment of composite web services under security constraints. In: IC2E 2013 (2013) Goettelmann, E., Fdhila, W., Godart, C.: Partitioning and cloud deployment of composite web services under security constraints. In: IC2E 2013 (2013)
13.
Zurück zum Zitat Goettelmann, E., Mayer, N., Godart, C.: A general approach for a trusted deployment of a business process in clouds. In: MEDES 2013 (2013) Goettelmann, E., Mayer, N., Godart, C.: A general approach for a trusted deployment of a business process in clouds. In: MEDES 2013 (2013)
14.
Zurück zum Zitat Jensen, M., Schwenk, J., Bohli, J., Gruschka, N., Iacono, L.: Security prospects through cloud computing by adopting multiple clouds. In: CLOUD 2011, pp. 565–572 (2011) Jensen, M., Schwenk, J., Bohli, J., Gruschka, N., Iacono, L.: Security prospects through cloud computing by adopting multiple clouds. In: CLOUD 2011, pp. 565–572 (2011)
15.
Zurück zum Zitat Leymann, F., Fehling, C., Mietzner, R., Nowak, A., Dustdar, S.: Moving applications to the cloud: an approach based on application model enrichment. IJCIS 20(3), 307–356 (2011) Leymann, F., Fehling, C., Mietzner, R., Nowak, A., Dustdar, S.: Moving applications to the cloud: an approach based on application model enrichment. IJCIS 20(3), 307–356 (2011)
16.
Zurück zum Zitat Martens, B., Walterbusch, M., Teuteberg, F.: Costing of cloud computing services: a total cost of ownership approach. In: ICSS 2012, pp. 1563–1572 (2012) Martens, B., Walterbusch, M., Teuteberg, F.: Costing of cloud computing services: a total cost of ownership approach. In: ICSS 2012, pp. 1563–1572 (2012)
17.
Zurück zum Zitat National Institute of Standards and Technology. Information Security - Guide for Conducting Risk Assessments (2002) National Institute of Standards and Technology. Information Security - Guide for Conducting Risk Assessments (2002)
18.
Zurück zum Zitat National Institute of Standards and Technology. Cloud Computing Reference Architecture (2011) National Institute of Standards and Technology. Cloud Computing Reference Architecture (2011)
19.
Zurück zum Zitat Rodríguez, A., Caro, A., Cappiello, C., Caballero, I.: A BPMN extension for including data quality requirements in business process modeling. In: Mendling, J., Weidlich, M. (eds.) BPMN 2012. LNBIP, vol. 125, pp. 116–125. Springer, Heidelberg (2012) CrossRef Rodríguez, A., Caro, A., Cappiello, C., Caballero, I.: A BPMN extension for including data quality requirements in business process modeling. In: Mendling, J., Weidlich, M. (eds.) BPMN 2012. LNBIP, vol. 125, pp. 116–125. Springer, Heidelberg (2012) CrossRef
20.
Zurück zum Zitat Sackmann, S., Lowis, L., Kittel, K.: A risk based approach for selecting services in business process execution. Wirtschaftsinformatik 1, 357–366 (2009) Sackmann, S., Lowis, L., Kittel, K.: A risk based approach for selecting services in business process execution. Wirtschaftsinformatik 1, 357–366 (2009)
21.
Zurück zum Zitat Turki, S.H., Bellaaj, F., Charfi, A., Bouaziz, R.: Modeling security requirements in service based business processes. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) EMMSAD 2012 and BPMDS 2012. LNBIP, vol. 113, pp. 76–90. Springer, Heidelberg (2012) CrossRef Turki, S.H., Bellaaj, F., Charfi, A., Bouaziz, R.: Modeling security requirements in service based business processes. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) EMMSAD 2012 and BPMDS 2012. LNBIP, vol. 113, pp. 76–90. Springer, Heidelberg (2012) CrossRef
22.
Zurück zum Zitat Watson, P.: A multi-level security model for partitioning workflows over federated clouds. In: CloudCom, pp. 180–188 (2011) Watson, P.: A multi-level security model for partitioning workflows over federated clouds. In: CloudCom, pp. 180–188 (2011)
23.
Zurück zum Zitat Wenzel, S., Wessel, C., Humberg, T., Jürjens, J.: Securing processes for outsourcing into the cloud. In: CLOSER, pp. 675–680 (2012) Wenzel, S., Wessel, C., Humberg, T., Jürjens, J.: Securing processes for outsourcing into the cloud. In: CLOSER, pp. 675–680 (2012)
Metadaten
Titel
A Formal Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds
verfasst von
Elio Goettelmann
Karim Dahman
Benjamin Gateau
Claude Godart
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-19270-3_1

Premium Partner