Systematic support for accountability in the cloud
نویسنده
چکیده
Cloud computing o ers computational resources such as processing, networking, and storage to customers. Infrastructure as a Service (IaaS) consists of a cloud-based infrastructure to o er consumers raw computation resources such as storage and networking. These resources are billed using a pay-per-use cost model. However, IaaS is far from being a secure cloud infrastructure as the seven main security threats de ned by the Cloud Security Alliance (CSA) indicate. Use of logging systems can provide evidence to support accountability for an IaaS cloud. An accountability helps when mitigating known threats. However, previous accountability with logging systems solutions are provided without systematic approaches. These solutions are usually either for the cloud customer side or for the cloud provider side, not for both of them. Moreover, the solutions also lack descriptions of logging systems in the context of a design pattern of the systems' components. This design pattern facilitates analysis of logging systems in terms of their quality. Additionally, there is a number of bene ts of this pattern. They could be: to promote the reusability of design and development of logging systems; that designers can access this pattern more easily; to assist a designer adopts design approaches which make a logging system reusable and not to choose approaches which do not concern reusability concepts; and to enhance the documentation and maintenance of existing logging systems. Thus, the aim of this thesis is to provide support for accountability in the cloud with systematic approaches to assist in mitigating the risks associated with real world CSA threats, to bene t both customers and providers. We research the extent to which such logging systems help us to mitigate risks associated with the threats identi ed by the CSA. The thesis also presents a way of identifying the reference components of logging systems and how they may be arranged to satisfy logging requirements. `Generic logging components' for logging systems are proposed. These components encompass all possible instantiations of logging solutions for IaaS cloud. The generic logging components can be used to map existing logging systems for the purposes of analysis of the systems' security. Based on the generic components, the thesis identi es design patterns in the context of logging in IaaS cloud. We believe that these identi ed patterns facilitate analysis of logging systems in terms of their quality. We also argue that: these identi ed patterns could increase reusability of the design and development of logging systems; designers should access these patterns more easily; the patterns could assist a designer adopts design approaches which make a logging system reusable and not to choose approaches which do not concern reusability concepts; and they can enhance the documentation and maintenance of existing logging systems. We identify a logging solution which is based on the generic logging components to mitigate the risks associated with CSA threat number one. An example of the threat is malicious activities, for example spamming, which are performed in consumers' virtual machines or VMs. We argue that the generic logging components we suggest could be used to perform a systematic analysis of logging systems in terms of security before deploying them in production systems. To assist in mitigating the risks associated with this threat to bene t both customers and providers, we investigate how CSA threat number one can a ect the security of both consumers and providers. Then we propose logging solutions based on the generic logging components and the identi ed patterns. We systematically design and implement a prototype system of the proposed logging solutions in an IaaS to record history of customer's les. This prototype system can be also modi ed in order to record VMs' process behaviour log les. This system can record the log les while having a smaller trusted computing base, compared to previous work. Additionally, the system can be seen as possible solutions that could tackle the di cult problem of logging le and process activities in the IaaS. Thus, the proposed logging solutions can assist in mitigating the risks associated with the CSA threats to bene t both consumers and providers. This could promote systematic support for accountability in the cloud.
منابع مشابه
Required Structures for Family Physician Program to Achieving Service Quality Dimensions in Primary Health Care: a systematic review
Background and Aim: In recent years, the family physician plan has been implemented as a main strategy of health system in Iran. Therefore, the necessity to reform organizational structure based on experiences of other countries is felt more than before. The aim of this study was to explore required structures of Family Physician Program to achieve service quality dimensions in Primary Health c...
متن کاملHealth and Safety Issues in the Cloud Manufacturing Systems: A Systematic Review
Introduction: Health and safety in cloud-based manufacturing systems have become a major issue, especially with the spread of the Corona virus, putting both systems and the workforce at risk. In recent years, many journals and researchers have focused their research in this area. Therefore, the purpose of this study is to systematically review health and safety issues in cloud manufacturing sys...
متن کاملMoving Towards Accountability for Reasonableness – A Systematic Exploration of the Features of Legitimate Healthcare Coverage Decision-Making Processes Using Rare Diseases and Regenerative Therapies as a Case Study
Background The accountability for reasonableness (A4R) framework defines 4 conditions for legitimate healthcare coverage decision processes: Relevance, Publicity, Appeals, and Enforcement. The aim of this study was to reflect on how the diverse features of decision-making processes can be aligned with A4R conditions to guide decisio...
متن کاملNew Realities of the Enterprise Management System Information Support: Economic and Mathematical Models and Cloud Technologies
The paper focuses on the urgency of the implementation of cloud technologies, which are a necessary condition for the development of enterprise management systems, give rise to a complex of insufficiently studied phenomena and processes and determine the need to find new tools in making and implementing reasonable management decisions. In the process of research, the sequence of construction an...
متن کاملCloud Computing; A New Approach to Learning and Learning
Introduction: The cloud computing and services, as a technological solution for developing educational services, can accelerate the provision and expansion of these highly useful services. This study intended to provide an overall picture of practical areas of learning services based on cloud computing teaching and learning equipment. Methods: This was a theoretical hybrid research study in whi...
متن کامل