SLA-based Secure Cloud Application Development

نویسندگان

  • Valentina Casola
  • Alessandra De Benedictis
  • Massimiliano Rak
  • Umberto Villano
چکیده

The perception of lack of control over resources deployed in the cloud may represent one of the critical factors for an organization to decide to cloudify or not its own services. The flat security features offered by commercial cloud providers to every customer, from simple practitioners to managers of huge amounts of sensitive data and services, is an additional problem. In recent years, the concept of Security Service Level Agreements (Security SLAs) is assuming a key role for the secure provisioning of cloud resources and services. This paper illustrates how to develop cloud applications that deliver services covered by Security SLAs by means of the services and tools provided by the SPECS framework, developed in the context of the SPECS (Secure Provisioning of Cloud Services based on SLA Management) European Project. The whole (SPECS) application’s life cycle is dealt with, in order to give a comprehensive view of the different parties involved and of the processes needed to offer security guarantees on top of cloud services. The discussed development process is exemplified by means of a real-world case study consisting in a cloud application offering a secure web container service.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SLA-Based Continuous Security Assurance in Multi-Cloud DevOps

Multi-cloud applications, i.e. those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls applied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This p...

متن کامل

Trusted SLA Monitoring for Billing System in Public Cloud computing Environment

This paper presents about a secure and non-obstructive billing system using the concept THEMIS. The main objective of this system is to provide a full-fledged trusted, billing system tailored from a cloud computing environment. The SLA (Service Level Agreement) sharing is done between user and CSPs (Cloud Service Provider). S-Mon forgery-resistive SLA monitoring mechanism is devised by TPM (Tru...

متن کامل

rSLA: Monitoring SLAs in Dynamic Service Environments

Today’s application environments combine Cloud and onpremise infrastructure, as well as platforms and services from different providers to enable quick development and delivery of solutions to their intended users. The ability to use Cloud platforms to stand up applications in a short time frame, the wide availability of Web services, and the application of a continuous deployment model has led...

متن کامل

M4Cloud - Generic Application Level Monitoring for Resource-shared Cloud Environments

Cloud computing is a promising concept for the implementation of scalable on-demand computing infrastructures, where resources are provided in a self-managing manner based on predefined customers requirements. A Service Level Agreement (SLA), which is established between a Cloud provider and a customer, specifies these requirements. It includes terms like required memory consumption, bandwidth ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Scalable Computing: Practice and Experience

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2016