Skip to main content

2017 | OriginalPaper | Buchkapitel

ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity

verfasst von : Min Fu, Shiping Chen, Jian Yang, Surya Nepal, Liming Zhu

Erschienen in: Service-Oriented Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud-based systems are prone to be attacked because they share the same cloud infrastructure, where there may exist hackers and malicious users. As a result, cloud system owners need an on-going security risk assessment mechanism to monitor the risk of their systems so that they can be mitigated in a timely manner to ensure the business continuity. Existing methods of cloud system risk assessment usually do not fully consider the dependencies of the system’s cloud resources or the conflictions of the threats on the system. In this paper we propose an application-aware cloud system risk assessment method, called ARA-Assessor, for performing security risk assessment for cloud systems. ARA-Assessor includes a cloud system model used to specify the significance value of each system component and their dependencies. With this application-aware model, the cloud system owners are able to continuously assess the risk of their systems. We evaluate ARA-Assessor with three typical cloud systems on AWS. The experimental results show that our method is capable of continuously assessing the runtime risk for multiple types of cloud systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dahbur, K., et al.: A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (ISWSA 2011), vol. 12, April 2011 Dahbur, K., et al.: A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (ISWSA 2011), vol. 12, April 2011
3.
Zurück zum Zitat Mather, T., et al.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Sebastopol (2009). copyright 2009, ISBN: 0596802765, 9780596802769 Mather, T., et al.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Sebastopol (2009). copyright 2009, ISBN: 0596802765, 9780596802769
6.
Zurück zum Zitat Saripalli, P., Walters, B.: QUIRC: a quantitative impact and risk assessment framework for cloud security. In: 3rd IEEE International Conference on Cloud Computing (CLOUD 2010), July 2010 Saripalli, P., Walters, B.: QUIRC: a quantitative impact and risk assessment framework for cloud security. In: 3rd IEEE International Conference on Cloud Computing (CLOUD 2010), July 2010
7.
Zurück zum Zitat Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Research Report 2008, ID no. G00157782, June 2008 Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Research Report 2008, ID no. G00157782, June 2008
8.
Zurück zum Zitat Djemame, K., et al.: A risk assessment framework for cloud computing. IEEE Trans. Cloud Comput. 4(3), 265–278 (2016). ISSN: 2168-7161CrossRef Djemame, K., et al.: A risk assessment framework for cloud computing. IEEE Trans. Cloud Comput. 4(3), 265–278 (2016). ISSN: 2168-7161CrossRef
9.
Zurück zum Zitat Lippmann, R.P., Riordan, J.F.: Threat-based risk assessment for enterprise networks. Lincoln Lab. J. 22(1), 33–45 (2016) Lippmann, R.P., Riordan, J.F.: Threat-based risk assessment for enterprise networks. Lincoln Lab. J. 22(1), 33–45 (2016)
10.
Zurück zum Zitat Kholidy, H.A., et al.: Online risk assessment and prediction models for autonomic cloud intrusion prevention systems. In: AICCSA 2014, November 2014 Kholidy, H.A., et al.: Online risk assessment and prediction models for autonomic cloud intrusion prevention systems. In: AICCSA 2014, November 2014
11.
Zurück zum Zitat Rahimi, M.R., et al.: MAPCloud: mobile applications on an elastic and scalable 2-tier cloud architecture. In: 5th IEEE International Conference on Utility and Cloud Computing (2012) Rahimi, M.R., et al.: MAPCloud: mobile applications on an elastic and scalable 2-tier cloud architecture. In: 5th IEEE International Conference on Utility and Cloud Computing (2012)
12.
Zurück zum Zitat Alert Logic: The Changing State of Cloud Security. Cloud Security Report 2015 (2015) Alert Logic: The Changing State of Cloud Security. Cloud Security Report 2015 (2015)
13.
Zurück zum Zitat Nenvani, G., Gupta, H.: A survey on attack detection on cloud using supervised learning techniques. In: IEEE Symposium on Colossal Data Analysis and Networking (CDAN 2016), March 2016 Nenvani, G., Gupta, H.: A survey on attack detection on cloud using supervised learning techniques. In: IEEE Symposium on Colossal Data Analysis and Networking (CDAN 2016), March 2016
14.
Zurück zum Zitat Lo, C., Huang, C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 39th International Conference on Parallel Processing Workshops (ICPPW 2010), September 2010 Lo, C., Huang, C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 39th International Conference on Parallel Processing Workshops (ICPPW 2010), September 2010
15.
Zurück zum Zitat Zhang, T., et al.: CloudRadar: A Real-time Side-channel Attack Detection System in Clouds. Princeton University publications, Department of Electrical Engineering (2016) Zhang, T., et al.: CloudRadar: A Real-time Side-channel Attack Detection System in Clouds. Princeton University publications, Department of Electrical Engineering (2016)
16.
Zurück zum Zitat Krutz, R.L., Vines, R.D.: Cloud security: a comprehensive guide to secure cloud computing. In: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing (2010). ISBN: 0470589876, 9780470589878 Krutz, R.L., Vines, R.D.: Cloud security: a comprehensive guide to secure cloud computing. In: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing (2010). ISBN: 0470589876, 9780470589878
18.
Zurück zum Zitat ENISA: Cloud Computing: Benefits, risks and recommendations for information security (2010) ENISA: Cloud Computing: Benefits, risks and recommendations for information security (2010)
19.
Zurück zum Zitat CSA: Top Threats to cloud computing. v1.0 (2010) CSA: Top Threats to cloud computing. v1.0 (2010)
20.
Zurück zum Zitat Chou, T.: Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5, 79–88 (2013) Chou, T.: Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5, 79–88 (2013)
26.
Zurück zum Zitat Fu, M., et al.: Runtime recovery actions selection for sporadic operations on cloud. In: ASWEC 2015, Adelaide, Australia, pp. 185–194, September 2015 Fu, M., et al.: Runtime recovery actions selection for sporadic operations on cloud. In: ASWEC 2015, Adelaide, Australia, pp. 185–194, September 2015
27.
Zurück zum Zitat Sabahi, F.: Cloud computing security threats and responses. In: 3rd IEEE International Conference on Communication Software and Networks (ICCSN 2011), May 2011 Sabahi, F.: Cloud computing security threats and responses. In: 3rd IEEE International Conference on Communication Software and Networks (ICCSN 2011), May 2011
28.
Zurück zum Zitat Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
29.
Zurück zum Zitat Misra, K.: Risk analysis and management: an introduction. In: Misra, K. (ed.) Handbook of Performability Engineering, pp. 667–681. Springer, London (2008)CrossRef Misra, K.: Risk analysis and management: an introduction. In: Misra, K. (ed.) Handbook of Performability Engineering, pp. 667–681. Springer, London (2008)CrossRef
Metadaten
Titel
ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity
verfasst von
Min Fu
Shiping Chen
Jian Yang
Surya Nepal
Liming Zhu
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-69035-3_38

Premium Partner