Home > Research > Publications & Outputs > Identifying and utilizing dependencies across c...

Links

Text available via DOI:

View graph of relations

Identifying and utilizing dependencies across cloud security services

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Identifying and utilizing dependencies across cloud security services. / Taha, A.; Metzler, P.; Trapero, R. et al.
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 2016. p. 329-340.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Taha, A, Metzler, P, Trapero, R, Luna, J & Suri, N 2016, Identifying and utilizing dependencies across cloud security services. in ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, pp. 329-340. https://doi.org/10.1145/2897845.2897911

APA

Taha, A., Metzler, P., Trapero, R., Luna, J., & Suri, N. (2016). Identifying and utilizing dependencies across cloud security services. In ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 329-340). ACM. https://doi.org/10.1145/2897845.2897911

Vancouver

Taha A, Metzler P, Trapero R, Luna J, Suri N. Identifying and utilizing dependencies across cloud security services. In ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM. 2016. p. 329-340 doi: 10.1145/2897845.2897911

Author

Taha, A. ; Metzler, P. ; Trapero, R. et al. / Identifying and utilizing dependencies across cloud security services. ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 2016. pp. 329-340

Bibtex

@inproceedings{c3d286e95e944fb99dbe75679007bc1f,
title = "Identifying and utilizing dependencies across cloud security services",
abstract = "Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud computing. Given that multiple Cloud Service Providers (CSPs) offer similar security services (e.g., \encryption key management{"}) albeit with different capabilities and prices, the customers need to comparatively assess the offered security services in order to select the best CSP matching their security requirements. However, the presence of both explicit and implicit dependencies across security related services add further challenges for Cloud customers to (i) specify their security requirements taking service dependencies into consideration and (ii) to determine which CSP can satisfy these requirements. We present a framework to address these challenges. For challenge (i), our framework automatically detects conicts resulting from inconsistent customer requirements. Moreover, our framework provides an explanation for the detected conicts allowing customers to resolve these conicts. To tackle challenge (ii), our framework assesses the security level provided by various CSPs and ranks the CSPs according to the desired customer requirements. We demonstrate the framework's effectiveness with real-world CSP case studies derived from the Cloud Security Alliance's Security, Trust and Assurance Registry. {\textcopyright} 2016 ACM.",
keywords = "Cloud security, Security quantification, Security service level agreements, Service dependencies, Sales, Cloud securities, Cloud service providers, Customer requirements, Encryption key management, Security requirements, Security services, Service dependency, Customer satisfaction",
author = "A. Taha and P. Metzler and R. Trapero and J. Luna and Neeraj Suri",
year = "2016",
month = may,
day = "30",
doi = "10.1145/2897845.2897911",
language = "English",
isbn = "9781450342339",
pages = "329--340",
booktitle = "ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security",
publisher = "ACM",

}

RIS

TY - GEN

T1 - Identifying and utilizing dependencies across cloud security services

AU - Taha, A.

AU - Metzler, P.

AU - Trapero, R.

AU - Luna, J.

AU - Suri, Neeraj

PY - 2016/5/30

Y1 - 2016/5/30

N2 - Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud computing. Given that multiple Cloud Service Providers (CSPs) offer similar security services (e.g., \encryption key management") albeit with different capabilities and prices, the customers need to comparatively assess the offered security services in order to select the best CSP matching their security requirements. However, the presence of both explicit and implicit dependencies across security related services add further challenges for Cloud customers to (i) specify their security requirements taking service dependencies into consideration and (ii) to determine which CSP can satisfy these requirements. We present a framework to address these challenges. For challenge (i), our framework automatically detects conicts resulting from inconsistent customer requirements. Moreover, our framework provides an explanation for the detected conicts allowing customers to resolve these conicts. To tackle challenge (ii), our framework assesses the security level provided by various CSPs and ranks the CSPs according to the desired customer requirements. We demonstrate the framework's effectiveness with real-world CSP case studies derived from the Cloud Security Alliance's Security, Trust and Assurance Registry. © 2016 ACM.

AB - Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud computing. Given that multiple Cloud Service Providers (CSPs) offer similar security services (e.g., \encryption key management") albeit with different capabilities and prices, the customers need to comparatively assess the offered security services in order to select the best CSP matching their security requirements. However, the presence of both explicit and implicit dependencies across security related services add further challenges for Cloud customers to (i) specify their security requirements taking service dependencies into consideration and (ii) to determine which CSP can satisfy these requirements. We present a framework to address these challenges. For challenge (i), our framework automatically detects conicts resulting from inconsistent customer requirements. Moreover, our framework provides an explanation for the detected conicts allowing customers to resolve these conicts. To tackle challenge (ii), our framework assesses the security level provided by various CSPs and ranks the CSPs according to the desired customer requirements. We demonstrate the framework's effectiveness with real-world CSP case studies derived from the Cloud Security Alliance's Security, Trust and Assurance Registry. © 2016 ACM.

KW - Cloud security

KW - Security quantification

KW - Security service level agreements

KW - Service dependencies

KW - Sales

KW - Cloud securities

KW - Cloud service providers

KW - Customer requirements

KW - Encryption key management

KW - Security requirements

KW - Security services

KW - Service dependency

KW - Customer satisfaction

U2 - 10.1145/2897845.2897911

DO - 10.1145/2897845.2897911

M3 - Conference contribution/Paper

SN - 9781450342339

SP - 329

EP - 340

BT - ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security

PB - ACM

ER -