INTRUSION TOLERANCE AS A SERVICE - A SLA-based Solution

Massimiliano Rak, Massimo Ficco

2012

Abstract

Among the incredible number of challenges in Cloud Computing two of them are considered of great relevance: Service Level Agreement management and Security management. In this paper we will try to show how it is possible, using a cloud-oriented API derived from the mOSAIC project, to build up an SLA-oriented cloud application which enables the delivery of security solutions as a service. We will focus on intrusion tolerance solutions, i.e., systems which grant that a system maintain a (limited) availability even when a security attack take place.

References

  1. A. K. Caglayan, P. R. L. and Eckhardt, D. E. (1989). A theoretical investigation of generalized voters for redundant system. In The Nineteenth International Symposium on Fault-Tolerant Computing, pages 444-451.
  2. Brandic, I., Music, D., Dustdar, S., Venugopal, S., and Buyya, R. (2008). Advanced qos methods for grid workflows based on meta-negotiations and slamappings. 2008 Third Workshop on Workflows in Support of LargeScale Science.
  3. D. Heimbigner., J. K. and Wolf, A. (2002). The willow architecture: Comprehensive survivability for largescale distributed applications. In The Intrusion Tolerant System Workshop, pages 71-78.
  4. Ficco, M. (2010). Achieving security by intrusion-tolerance based on event correlation. International Journal of Network Protocols and Algorithms, 2, num. 3:70-84.
  5. Ficco, M. and Rak, M. (2011). Intrusion tolerant approach for denial of service attacks to web services. In The 1st International Conference on Data Compression, Communications and Processing (CCP 2011), pages 285-292.
  6. Karjoth, G., Pfitzmann, B., Schunter, M., and Waidner, M. (2006). Service-oriented assurance, comprehensive security by explicit assurances. In Gollmann, D., Massacci, F., and Yautsiukhin, A., editors, Quality of Protection, volume 23 of Advances in Information Security, pages 13-24. Springer US.
  7. Marsh, M. A. and Schneider, F. B. (2004). Codex: A robust and secure secret distribution system. In IEEE Trans. on Dependable and Secure Computing, volume 1, pages 34-47.
  8. Massimiliano Rak, Salvatore Venticinque, R. A. B. D. M. (2011). User centric service level management in mosaic application. In Press, I., editor, Europar 2011 Workshop.
  9. mOSAIC Project (2010). mosaic: Open source api and platform for multiple clouds. http://www.mosaiccloud.eu.
  10. N. F. Neves, P. S. and Verissimo, P. (2006). Proactive resilience through architectural hybridization. In The ACM Symp. on AppliedComputing (SAC'06).
  11. P. Kouznetsov, A. H. and Druschel, P. (2006). The case for byzantine fault detection. In The 2nd Workshop on Hot Topics in System Dependability.
  12. R. Mista, D. Bakken C., D. A. and Medidi, M. (2002). Mrfusion: A programmable data fusion middleware subsystem with a tunable statistical profiling service. In The Int. Conference on Dependable Systems and Network (DSN-2002), pages 273-278.
  13. Rak, M., Liccardo, L., and Aversa, R. (2011). A sla-based interface for security management in cloud and grid integrations. In Abraham, A. et al., editors, Proceedings of the 2011 7th International Conference on Information Assurance and Security (IAS). IEEE Press.
  14. Smith, M., Schmidt, M., Fallenbeck, N., Schridde, C., and Freisleben, B. (2007). Optimising Security Configurations with Service Level Agreements. In Proceedings of the 7th International Conference on Optimization: Techniques and Applications (ICOTA 2007), pages 367-381. IEEE Press.
  15. van Sinderen F. Leymann, I. I. M., - Science, B. S. S., and Publications, T., editors (2011). Towards a cross platform Cloud API. Components for Cloud Federation.
Download


Paper Citation


in Harvard Style

Rak M. and Ficco M. (2012). INTRUSION TOLERANCE AS A SERVICE - A SLA-based Solution . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 375-384. DOI: 10.5220/0003941003750384


in Bibtex Style

@conference{closer12,
author={Massimiliano Rak and Massimo Ficco},
title={INTRUSION TOLERANCE AS A SERVICE - A SLA-based Solution},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={375-384},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003941003750384},
isbn={978-989-8565-05-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - INTRUSION TOLERANCE AS A SERVICE - A SLA-based Solution
SN - 978-989-8565-05-1
AU - Rak M.
AU - Ficco M.
PY - 2012
SP - 375
EP - 384
DO - 10.5220/0003941003750384