9 CONCLUSIONS AND FUTURE
WORKS
In this paper, we have shown how it is possible, us-
ing a Cloud-oriented API derived from the mOSAIC
project, to build up a SLA-oriented Cloud applica-
tion, which enables the management of security fea-
tures related to Intrusion Tolerance against XMl De-
nial of Services attacks to an Infrastructure as a Ser-
vice (IaaS) Cloud Provider. The application that en-
ables SLA management is built in order to receive a
WS-Agreement file containing a description of the se-
curity features. We proposed a simple schema for de-
scription of the guarantees offered by the system to
the users against DoS attacks. Once the user has ob-
tained an agreement with the SLA management sys-
tem, his requests will be fulfilled following the re-
quired SLA and the services will be transparently en-
riched with security features. In our case study, we
enrich a Web Server with an Intrusion Tolerance sys-
tem that grants against a well defined set of attacks.
This work is one of the steps we are doing in the direc-
tion of offering security features in terms of Service
Level Agreement, trough the adoption of the mO-
SAIC SLA architecture. In future steps, we will en-
rich the set of attacks our solutions will be able to face
and try to offer tools to help users to automatically
setup a detailed SLA filled for his own needs.
ACKNOWLEDGEMENTS
This research is partially supported by FP7-ICT-2009-
5-256910 (mOSAIC) and by MIUR funded project
“Cloud@Home: A new enahnced paradigm”
REFERENCES
Ganglia, a scalable distributed monitoring system for high-
performance computing systems.
Squid: an open source fully-featured http/1.0 proxy.
Tpc benchmark w (tpc-w), a transactional web benchmark.
A. K. Caglayan, P. R. L. and Eckhardt, D. E. (1989). A the-
oretical investigation of generalized voters for redun-
dant system. In The Nineteenth International Sympo-
sium on Fault-Tolerant Computing, pages 444–451.
Brandic, I., Music, D., Dustdar, S., Venugopal, S., and
Buyya, R. (2008). Advanced qos methods for
grid workflows based on meta-negotiations and sla-
mappings. 2008 Third Workshop on Workflows in Sup-
port of LargeScale Science.
D. Heimbigner., J. K. and Wolf, A. (2002). The willow
architecture: Comprehensive survivability for large-
scale distributed applications. In The Intrusion Toler-
ant System Workshop, pages 71–78.
Ficco, M. (2010). Achieving security by intrusion-tolerance
based on event correlation. International Journal of
Network Protocols and Algorithms, 2, num. 3:70–84.
Ficco, M. and Rak, M. (2011). Intrusion tolerant approach
for denial of service attacks to web services. In The
1st International Conference on Data Compression,
Communications and Processing (CCP 2011), pages
285–292.
Karjoth, G., Pfitzmann, B., Schunter, M., and Waidner, M.
(2006). Service-oriented assurance, comprehensive
security by explicit assurances. In Gollmann, D., Mas-
sacci, F., and Yautsiukhin, A., editors, Quality of Pro-
tection, volume 23 of Advances in Information Secu-
rity, pages 13–24. Springer US.
Marsh, M. A. and Schneider, F. B. (2004). Codex: A ro-
bust and secure secret distribution system. In IEEE
Trans. on Dependable and Secure Computing, vol-
ume 1, pages 34–47.
Massimiliano Rak, Salvatore Venticinque, R. A. B. D. M.
(2011). User centric service level management in mo-
saic application. In Press, I., editor, Europar 2011
Workshop.
mOSAIC Project (2010). mosaic: Open source api and
platform for multiple clouds. http://www.mosaic-
cloud.eu.
N. F. Neves, P. S. and Verissimo, P. (2006). Proactive re-
silience through architectural hybridization. In The
ACM Symp. on AppliedComputing (SAC’06).
P. Kouznetsov, A. H. and Druschel, P. (2006). The case for
byzantine fault detection. In The 2nd Workshop on
Hot Topics in System Dependability.
R. Mista, D. Bakken C., D. A. and Medidi, M. (2002). Mr-
fusion: A programmable data fusion middleware sub-
system with a tunable statistical profiling service. In
The Int. Conference on Dependable Systems and Net-
work (DSN-2002), pages 273–278.
Rak, M., Liccardo, L., and Aversa, R. (2011). A sla-based
interface for security management in cloud and grid
integrations. In Abraham, A. et al., editors, Proceed-
ings of the 2011 7th International Conference on In-
formation Assurance and Security (IAS). IEEE Press.
Smith, M., Schmidt, M., Fallenbeck, N., Schridde, C., and
Freisleben, B. (2007). Optimising Security Configura-
tions with Service Level Agreements. In Proceedings
of the 7th International Conference on Optimization:
Techniques and Applications (ICOTA 2007), pages
367–381. IEEE Press.
van Sinderen F. Leymann, I. I. M., – Science, B. S. S., and
Publications, T., editors (2011). Towards a cross plat-
form Cloud API. Components for Cloud Federation.
CLOSER2012-2ndInternationalConferenceonCloudComputingandServicesScience
384