Methodology to obtain the security controls in multi-cloud applications

Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, Massimiliano Rak, Valentina Casola, Erkuden Rios, Jose L. Martinez Lastra

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    9 Citations (Scopus)

    Abstract

    What controls should be used to ensure adequate security level during operation is a non-trivial subject in complex software systems and applications. The problem becomes even more challenging when the application uses multiple cloud services which security measures are beyond the control of the application provider. In this paper, a methodology that enables the identification of the best security controls for multicloud applications whose components are deployed in heterogeneous clouds is presented. The methodology is based on application decomposition and modelling of threats over the components, followed by the analysis of the risks together with the capture of cloud business and security requirements. The methodology has been applied in the MUSA EU H2020 project use cases as the first step for building up the multi-cloud applications' security-aware Service Level Agreements (SLA). The identified security controls will be included in the applications' SLAs for their monitoring and fulfilment assurance at operation.

    Original languageEnglish
    Title of host publicationCLOSER 2016 - Proceedings of the 6th International Conference on Cloud Computing and Services Science
    PublisherSCITEPRESS
    Pages327-332
    Number of pages6
    Volume1
    ISBN (Electronic)9789897581823
    DOIs
    Publication statusPublished - 2016
    Publication typeA4 Article in conference proceedings
    EventINTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE -
    Duration: 1 Jan 1900 → …

    Conference

    ConferenceINTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE
    Period1/01/00 → …

    Keywords

    • Cyber-security Methodologies
    • Multi-cloud
    • Security-by-design
    • Threat Modelling

    Publication forum classification

    • Publication forum level 1

    ASJC Scopus subject areas

    • Computer Science (miscellaneous)
    • Computer Science Applications
    • Software

    Fingerprint

    Dive into the research topics of 'Methodology to obtain the security controls in multi-cloud applications'. Together they form a unique fingerprint.

    Cite this