scispace - formally typeset
Journal ArticleDOI

Building a security reference architecture for cloud systems

Reads0
Chats0
TLDR
This work proposes here a method to build a SRA for clouds defined using UML models and patterns, which goes beyond existing models in providing a global view and a more precise description, and presents a metamodel as well as security and misuse patterns for this purpose.
Abstract
Reference architectures (RAs) are useful tools to understand and build complex systems, and many cloud providers and software product vendors have developed versions of them. RAs describe at an abstract level (no implementation details) the main features of their cloud systems. Security is a fundamental concern in clouds and several cloud vendors provide security reference architectures (SRAs) to describe the security features of their services. A SRA is an abstract architecture describing a conceptual model of security for a cloud system and provides a way to specify security requirements for a wide range of concrete architectures. We propose here a method to build a SRA for clouds defined using UML models and patterns, which goes beyond existing models in providing a global view and a more precise description. We present a metamodel as well as security and misuse patterns for this purpose. We validate our approach by showing that it can describe more precisely existing models and that it has a variety of uses. We describe in detail one of these uses, a way of evaluating the security level of a SRA.

read more

Citations
More filters
Journal ArticleDOI

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

TL;DR: In this paper, the state of the art of privacy-preserving schemes for ad hoc social networks including mobile social networks (MSNs) and vehicular social network (VSNs) is reviewed.
Posted Content

Privacy-preserving schemes for Ad Hoc Social Networks: A survey

TL;DR: This survey selects and examines in-detail 33 privacy-preserving schemes developed for or applied in the context of ad hoc social networks and surveys privacy preservation models including location privacy, identity privacy, anonymity, traceability, interest privacy, backward privacy, and content oriented privacy.
Proceedings ArticleDOI

A Pattern for Fog Computing

TL;DR: This work presents a pattern for fog computing which describes its architecture, including its computing, storage and networking services, and includes most of the functionality found in current fog architectures.
Journal ArticleDOI

A survey of compliance issues in cloud computing

TL;DR: The lack of reference architectures and relevant patterns makes compliance harder than it should be, and some guidelines are given about what this architecture and its corresponding patterns should contain.
Journal ArticleDOI

A survey of security solutions for distributed publish/subscribe systems

TL;DR: A comprehensive state-of-the-art survey of security solutions for distributed publish/subscribe systems, focusing on solutions taking the form of concrete security architectures, providing a distinct perspective on a rapidly growing area of research.
References
More filters
Proceedings ArticleDOI

Software architecture: many faces, many places, yet a central discipline

TL;DR: This talk will examine a few of the many faces of software architecture, particularly since it emerged as a named field of study in the late 80's and early 90's, and the articulation of fundamental principles of architectural styles and consideration of how they can dominate system design.
Journal ArticleDOI

Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms

TL;DR: This paper provides formal analysis, modeling, and verification of three open source state-of-the-art VM-based cloud platforms: Eucalyptus, Open Nebula, and Nimbus and reveals the practicability of the models in a highly scalable and flexible environment.
Proceedings ArticleDOI

An ontology-based system for Cloud infrastructure services' discovery

TL;DR: The Cloud Computing Ontology (CoCoOn) as discussed by the authors is an OWL-based ontology that defines functional and non-functional concepts, attributes and relations of infrastructure services.
Proceedings ArticleDOI

Intercloud Security Considerations

TL;DR: This paper builds on the technology foundation emerging for the Intercloud and specifically delves into details of Intercloud security considerations such as Trust Model, Identity and Access Management, governance considerations and so on.
Proceedings ArticleDOI

Eliciting Security Requirements through Misuse Activities

TL;DR: This work extends the approach for finding security requirements based on misuse activities (actions) to consider in the analysis the type of misuse that can happen in each activity, the role of the attacker, and the context for the threat.
Related Papers (5)