Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Security as a service using an SLA-based approach via SPECS
AU - Rak, M.
AU - Suri, Neeraj
AU - Luna, J.
AU - Petcu, D.
AU - Casola, V.
AU - Villano, U.
PY - 2013/12/2
Y1 - 2013/12/2
N2 - The cloud offers attractive options to migrate corporate applications, without any implication for the corporate security manager to manage or to secure physical resources. While this ease of migration is appealing, several security issues arise: can the validity of corporate legal compliance regulations still be ensured for remote data storage? How is it possible to assess the Cloud Service Provider (CSP) ability to meet corporate security requirements? Can one monitor and enforce the agreed cloud security levels? Unfortunately, no comprehensive solutions exist for these issues. In this context, we introduce a new approach, named SPECS. It aims to offer mechanisms to specify cloud security requirements and to assess the security features offered by CSPs, and to integrate the desired security services (e.g., credential and access management) into cloud services with a Security-as-a-Service approach. Furthermore, SPECS intends to provide systematic approaches to negotiate, to monitor and to enforce the security parameters specified in Service Level Agreements (SLA), to develop and to deploy security services that are cloud SLA-aware and are implemented as an open-source Platform-as-a-Service (PaaS). This paper introduces the main concepts of SPECS. © 2013 IEEE.
AB - The cloud offers attractive options to migrate corporate applications, without any implication for the corporate security manager to manage or to secure physical resources. While this ease of migration is appealing, several security issues arise: can the validity of corporate legal compliance regulations still be ensured for remote data storage? How is it possible to assess the Cloud Service Provider (CSP) ability to meet corporate security requirements? Can one monitor and enforce the agreed cloud security levels? Unfortunately, no comprehensive solutions exist for these issues. In this context, we introduce a new approach, named SPECS. It aims to offer mechanisms to specify cloud security requirements and to assess the security features offered by CSPs, and to integrate the desired security services (e.g., credential and access management) into cloud services with a Security-as-a-Service approach. Furthermore, SPECS intends to provide systematic approaches to negotiate, to monitor and to enforce the security parameters specified in Service Level Agreements (SLA), to develop and to deploy security services that are cloud SLA-aware and are implemented as an open-source Platform-as-a-Service (PaaS). This paper introduces the main concepts of SPECS. © 2013 IEEE.
KW - Cloud Computing
KW - Cloud Security
KW - Security-as-a-Service
KW - Service Level Agreements
KW - Cloud computing
KW - Distributed database systems
KW - Security systems
KW - Cloud securities
KW - Cloud service providers
KW - Physical resources
KW - Security as a services
KW - Security features
KW - Security parameters
KW - Security requirements
KW - Laws and legislation
U2 - 10.1109/CloudCom.2013.165
DO - 10.1109/CloudCom.2013.165
M3 - Conference contribution/Paper
SP - 1
EP - 6
BT - 2013 IEEE 5th International Conference on Cloud Computing Technology and Science
PB - IEEE
ER -