Skip to main content

2024 | OriginalPaper | Buchkapitel

Enhancing Workflow Security in Multi-cloud Environments Through Monitoring and Adaptation upon Cloud Service and Network Security Violations

verfasst von : Nafiseh Soveizi, Dimka Karastoyanova

Erschienen in: Cooperative Information Systems

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has emerged as a crucial solution for handling data- and compute-intensive workflows, offering scalability to address dynamic demands. However, ensuring the secure execution of workflows in the untrusted multi-cloud environment poses significant challenges, given the sensitive nature of the involved data and tasks. The lack of comprehensive approaches for detecting attacks during workflow execution, coupled with inadequate measures for reacting to security and privacy breaches has been identified in the literature. To close this gap, in this work, we propose an approach that focuses on monitoring cloud services and networks to detect security violations during workflow executions. Upon detection, our approach selects the optimal adaptation action to minimize the impact on the workflow. To mitigate the uncertain cost associated with such adaptations and their potential impact on other tasks in the workflow, we employ adaptive learning to determine the most suitable adaptation action. Our approach is evaluated based on the performance of the detection procedure and the impact of the selected adaptations on the workflows.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Varshney, S., et al.: QoS based resource provisioning in cloud computing environment: a technical survey. In: International Conference on Advances in Computing and Data Sciences, pp. 711–723 (2019) Varshney, S., et al.: QoS based resource provisioning in cloud computing environment: a technical survey. In: International Conference on Advances in Computing and Data Sciences, pp. 711–723 (2019)
2.
Zurück zum Zitat Maguluri, S.T., et al.: Stochastic models of load balancing and scheduling in cloud computing clusters. In: Proceedings IEEE Infocom, pp. 702–710 (2012) Maguluri, S.T., et al.: Stochastic models of load balancing and scheduling in cloud computing clusters. In: Proceedings IEEE Infocom, pp. 702–710 (2012)
3.
Zurück zum Zitat Chen, H., et al.: Towards energy-efficient scheduling for real-time tasks under uncertain cloud computing environment. J. Syst. Softw. 99, 20–35 (2015)CrossRef Chen, H., et al.: Towards energy-efficient scheduling for real-time tasks under uncertain cloud computing environment. J. Syst. Softw. 99, 20–35 (2015)CrossRef
5.
Zurück zum Zitat Chen, H., et al.: Uncertainty-aware real-time workflow scheduling in the cloud. In: 2016 IEEE Cloud Conference, pp. 577–584. IEEE Chen, H., et al.: Uncertainty-aware real-time workflow scheduling in the cloud. In: 2016 IEEE Cloud Conference, pp. 577–584. IEEE
6.
Zurück zum Zitat Soveizi, N., et al.: SecFlow: adaptive security-aware workflow management system in multi-cloud environment. In: International Conference on Enterprise Design, Operations, and Computing. Springer, cham (2023) Soveizi, N., et al.: SecFlow: adaptive security-aware workflow management system in multi-cloud environment. In: International Conference on Enterprise Design, Operations, and Computing. Springer, cham (2023)
7.
Zurück zum Zitat Soveizi, N., Turkmen, F., Karastoyanova, D.: Security and privacy concerns in cloud-based scientific and business workflows: a systematic review. Future Gener. Comput. Syst. (2023) Soveizi, N., Turkmen, F., Karastoyanova, D.: Security and privacy concerns in cloud-based scientific and business workflows: a systematic review. Future Gener. Comput. Syst. (2023)
8.
Zurück zum Zitat Shirvani, M.H.: Bi-objective web service composition problem in multi-cloud environment: a bi-objective time-varying particle swarm optimisation algorithm. J. Exp. Theor. Artif. Intell. 33, 1–24 (2020) Shirvani, M.H.: Bi-objective web service composition problem in multi-cloud environment: a bi-objective time-varying particle swarm optimisation algorithm. J. Exp. Theor. Artif. Intell. 33, 1–24 (2020)
9.
Zurück zum Zitat Wang, Y., et al.: Protecting scientific workflows in clouds with an intrusion tolerant system. IET Inf. Secur. 14(2), 157–165 (2020)CrossRef Wang, Y., et al.: Protecting scientific workflows in clouds with an intrusion tolerant system. IET Inf. Secur. 14(2), 157–165 (2020)CrossRef
10.
Zurück zum Zitat Wang, Y., et al.: INHIBITOR: an intrusion tolerant scheduling algorithm in cloud-based scientific workflow system. Futur. Gener. Comput. Syst. 114, 272–284 (2021)CrossRef Wang, Y., et al.: INHIBITOR: an intrusion tolerant scheduling algorithm in cloud-based scientific workflow system. Futur. Gener. Comput. Syst. 114, 272–284 (2021)CrossRef
11.
Zurück zum Zitat Wen, Z., et al.: Dynamically partitioning workflow over federated clouds for optimising the monetary cost and handling run-time failures. IEEE Trans. Cloud Comput. 8(4), 1093–1107 (2020)CrossRef Wen, Z., et al.: Dynamically partitioning workflow over federated clouds for optimising the monetary cost and handling run-time failures. IEEE Trans. Cloud Comput. 8(4), 1093–1107 (2020)CrossRef
12.
Zurück zum Zitat Abazari, F., et al.: MOWS: multi-objective workflow scheduling in cloud computing based on heuristic algorithm. Simul. Modell. Pract. Theory 93(2018), 119–132 (2019)CrossRef Abazari, F., et al.: MOWS: multi-objective workflow scheduling in cloud computing based on heuristic algorithm. Simul. Modell. Pract. Theory 93(2018), 119–132 (2019)CrossRef
13.
Zurück zum Zitat Ahmad, Z., Nazir, B., Umer, A.: A fault-tolerant workflow management system with quality-of-service-aware scheduling for scientific workflows in cloud computing. Int. J. Commun. Syst. 34(1), e4649 (2021)CrossRef Ahmad, Z., Nazir, B., Umer, A.: A fault-tolerant workflow management system with quality-of-service-aware scheduling for scientific workflows in cloud computing. Int. J. Commun. Syst. 34(1), e4649 (2021)CrossRef
14.
Zurück zum Zitat Alaei, M., et al.: An adaptive fault detector strategy for scientific workflow scheduling based on improved differential evolution algorithm in cloud. Appl. Soft Comput. 99, 106895 (2021)CrossRef Alaei, M., et al.: An adaptive fault detector strategy for scientific workflow scheduling based on improved differential evolution algorithm in cloud. Appl. Soft Comput. 99, 106895 (2021)CrossRef
16.
Zurück zum Zitat Kaelbling, L.P., et al.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237–285 (1996)CrossRef Kaelbling, L.P., et al.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237–285 (1996)CrossRef
17.
20.
Zurück zum Zitat Yang, H., et al.: Network security situation assessment with network attack behavior classification. Int. J. Intell. Syst. 37(10), 6909–6927 (2022)CrossRef Yang, H., et al.: Network security situation assessment with network attack behavior classification. Int. J. Intell. Syst. 37(10), 6909–6927 (2022)CrossRef
Metadaten
Titel
Enhancing Workflow Security in Multi-cloud Environments Through Monitoring and Adaptation upon Cloud Service and Network Security Violations
verfasst von
Nafiseh Soveizi
Dimka Karastoyanova
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-46846-9_9

Premium Partner