Home > Research > Publications & Outputs > A multi-layer and multi-tenant cloud assurance ...
View graph of relations

A multi-layer and multi-tenant cloud assurance evaluation methodology

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

A multi-layer and multi-tenant cloud assurance evaluation methodology. / Hudic, Aleksandre; Tauber, Markus; Lorunser, Thomas et al.
Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, 2014. p. 386-393.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Hudic, A, Tauber, M, Lorunser, T, Krotsiani, M, Spanoudakis, G, Mauthe, A & Weippl, ER 2014, A multi-layer and multi-tenant cloud assurance evaluation methodology. in Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. IEEE, Piscataway, N.J., pp. 386-393. https://doi.org/10.1109/CloudCom.2014.85

APA

Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A., & Weippl, E. R. (2014). A multi-layer and multi-tenant cloud assurance evaluation methodology. In Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014, (pp. 386-393). IEEE. https://doi.org/10.1109/CloudCom.2014.85

Vancouver

Hudic A, Tauber M, Lorunser T, Krotsiani M, Spanoudakis G, Mauthe A et al. A multi-layer and multi-tenant cloud assurance evaluation methodology. In Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE. 2014. p. 386-393 doi: 10.1109/CloudCom.2014.85

Author

Hudic, Aleksandre ; Tauber, Markus ; Lorunser, Thomas et al. / A multi-layer and multi-tenant cloud assurance evaluation methodology. Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J. : IEEE, 2014. pp. 386-393

Bibtex

@inproceedings{3c42c9e737f1458e919e2c4e608f8c32,
title = "A multi-layer and multi-tenant cloud assurance evaluation methodology",
abstract = "Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.",
author = "Aleksandre Hudic and Markus Tauber and Thomas Lorunser and Maria Krotsiani and George Spanoudakis and Andreas Mauthe and Weippl, {E. R.}",
year = "2014",
month = dec,
doi = "10.1109/CloudCom.2014.85",
language = "English",
isbn = "9781479940936",
pages = "386--393",
booktitle = "Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - A multi-layer and multi-tenant cloud assurance evaluation methodology

AU - Hudic, Aleksandre

AU - Tauber, Markus

AU - Lorunser, Thomas

AU - Krotsiani, Maria

AU - Spanoudakis, George

AU - Mauthe, Andreas

AU - Weippl, E. R.

PY - 2014/12

Y1 - 2014/12

N2 - Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.

AB - Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.

U2 - 10.1109/CloudCom.2014.85

DO - 10.1109/CloudCom.2014.85

M3 - Conference contribution/Paper

SN - 9781479940936

SP - 386

EP - 393

BT - Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,

PB - IEEE

CY - Piscataway, N.J.

ER -