Abstract
Security assurance is a discipline aiming to demonstrate that a target system holds some non/functional properties and behaves as expected. These techniques have been recently applied to the cloud, facing some critical issues especially when integrated within existing security processes and executed in a programmatic way. Furthermore, they pose significant costs when hybrid systems, mixing public and private infrastructures, are considered. In this paper, we a present an assurance framework that implements an assurance process evaluating the trustworthiness of hybrid systems. The framework builds on a standard API/based interface supporting full and programmatic access to the functionalities of the framework. The process provides a transparent, non-invasive and automatic solution that does not interfere with the working of the target system. It builds on a Virtual Private Network (VPN)/based solution, to provide a smooth integration with target systems, in particular those mixing public and private clouds and corporate networks. A detailed walkthrough of the process along with a performance evaluation of the framework in a simulated scenario are presented.
Research supported, in parts, by EC H2020 Project CONCORDIA GA 830927 and Università degli Studi di Milano under the program “Piano sostegno alla ricerca”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aceto, G., Botta, A., de Donato, W., Pescapè, A.: Cloud monitoring: a survey. Comput. Netw. 57(9), 2093–2115 (2013). https://doi.org/10.1016/j.comnet.2013.04.001
Alcaraz Calero, J.M., Aguado, J.G.: MonPaaS: an adaptive monitoring platform as a service for cloud computing infrastructures and services. IEEE TSC 8(1), 65–78 (2015). https://doi.org/10.1109/TSC.2014.2302810
Alshalan, A., Pisharody, S., Huang, D.: A survey of mobile VPN technologies. IEEE COMST 18(2), 1177–1196 (2016). https://doi.org/10.1109/COMST.2015.2496624
Anisetti, M., Ardagna, C.A., Bena, N., Damiani, E.: Stay thrifty, stay secure: a VPN-based assurance framework for hybrid systems. In: Proceedings of SECRYPT 2020, Paris, France (Virtual), July 2020
Anisetti, M., Ardagna, C.A., Damiani, E., Gaudenzi, F.: A certification framework for cloud-based services. In: Proceedings of ACM SAC 2016, Pisa, Italy, April 2016
Anisetti, M., Ardagna, C.A., Damiani, E., Gaudenzi, F.: A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE TSC 13, 30–43 (2017)
Ardagna, C., Asal, R., Damiani, E., Vu, Q.: From security to assurance in the cloud: a survey. ACM CSUR 48(1), 2:1-2:50 (2015)
Aslam, M., Mohsin, B., Nasir, A., Raza, S.: FoNAC - an automated fog node audit and certification scheme. Comput. Secur. 93, 101759 (2020)
Baldini, G., Skarmeta, A., Fourneret, E., Neisse, R., Legeard, B., Le Gall, F.: Security certification and labelling in Internet of Things. In: Proceedings of IEEE WF-IoT 2016, Reston, VA, USA, December 2016
Cheah, M., Shaikh, S.A., Bryans, J., Wooderson, P.: Building an automotive security assurance case using systematic security evaluations. COSE 77, 360–379 (2018)
Ciuffoletti, A.: Application level interface for a cloud monitoring service. CS&I 46, 15–22 (2016)
De Chaves, S.A., Uriarte, R.B., Westphall, C.B.: Toward an architecture for monitoring private clouds. IEEE Commun. Mag. 49(12), 130–137 (2011). https://doi.org/10.1109/MCOM.2011.6094017
Ed-douibi, H., Cánovas Izquierdo, J.L., Cabot, J.: OpenAPItoUML: a tool to generate UML models from OpenAPI definitions. In: Mikkonen, T., Klamma, R., Hernández, J. (eds.) ICWE 2018. LNCS, vol. 10845, pp. 487–491. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91662-0_41
Elsayed, M., Zulkernine, M.: Towards security monitoring for cloud analytic applications. In: Proceedings of IEEE BigDataSecurity/HPSC/IDS 2018, Omaha, NE, USA, May 2018. https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00028
Greenberg, M.S., Byington, J.C., Harper, D.G.: Mobile agents and security. IEEE Commun. Mag. 36(7), 76–85 (1998). https://doi.org/10.1109/35.689634
Herrmann, D.: Using the Common Criteria for IT Security Evaluation. Auerbach Publications, Boca Raton (2002)
Jahan, S., Pasco, M., Gamble, R., McKinley, P., Cheng, B.: MAPE-SAC: a framework to dynamically manage security assurance cases. In: Proceedings of IEEE FAS*W 2019, Umea, Sweden, June 2019. https://doi.org/10.1109/FAS-W.2019.00045
Karlsson, S., Čaušević, A., Sundmark, D.: QuickREST: property-based test generation of OpenAPI-described RESTful APIs. In: Proceedings of IEEE ICST 2020, Porto, Portugal, March 2020
OpenAPI Initiative: OpenAPI Specification (2018). http://spec.openapis.org/oas/v3.0.2
Ouedraogo, M., Mouratidis, H., Khadraoui, D., Dubois, E.: An agent-based system to support assurance of security requirements. In: Proceedings of SSIRI 2010, Singapore, June 2010. https://doi.org/10.1109/SSIRI.2010.32
Povedano-Molina, J., Lopez-Vega, J.M., Lopez-Soler, J.M., Corradi, A., Foschini, L.: DARGOS: a highly adaptable and scalable monitoring architecture for multi-tenant Clouds. FGCS 29(8), 2041–2056 (2013). https://doi.org/10.1016/j.future.2013.04.022
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278–1308 (1975). https://doi.org/10.1109/PROC.1975.9939
Sferruzza, D.: Top-down model-driven engineering of web services from extended OpenAPI models. In: Proceedings of IEEE/ACM ASE 2018, Montpellier, France, September 2018
Taherizadeh, S., Jones, A.C., Taylor, I., Zhao, Z., Stankovski, V.: Monitoring self-adaptive applications within edge computing frameworks: a state-of-the-art review. JSS 136, 19–38 (2018). https://doi.org/10.1016/j.jss.2017.10.033
Teigeler, H., Lins, S., Sunyaev, A.: Chicken and egg problem: what drives cloud service providers and certification authorities to adopt continuous service certification? In: Proceedings of WISP 2017, Seoul, South Korea, December 2017
de la Vara, J.L., et al.: The AMASS approach for assurance and certification of critical systems. In: Proceedings of Embedded World 2019, Norimberg, Germany, February 2019
West, R.: The psychology of security. Commun. ACM 51(4), 34–40 (2008). https://doi.org/10.1145/1330311.1330320
Wu, C., Marotta, S.: Framework for assessing cloud trustworthiness. In: Proceedings of IEEE CLOUD 2013, Santa Clara, CA, USA, June–July 2013 (2013). https://doi.org/10.1109/CLOUD.2013.76
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Anisetti, M., Ardagna, C.A., Bena, N., Damiani, E. (2021). An Assurance Framework and Process for Hybrid Systems. In: Obaidat, M.S., Ben-Othman, J. (eds) E-Business and Telecommunications. ICETE 2020. Communications in Computer and Information Science, vol 1484. Springer, Cham. https://doi.org/10.1007/978-3-030-90428-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-90428-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90427-2
Online ISBN: 978-3-030-90428-9
eBook Packages: Computer ScienceComputer Science (R0)