CSP QPTs have been populated with the aggregated
values, it is possible to apply a ranking algorithm to
determine how different CSPs under-/over-provision
user’s requirements. In (Luna et al., 2012a) are pro-
posed two different ranking techniques: a quantitative
ranking (e.g., a real number on the interval {0. . . 1})
that due to its nature is more suitable for automated
systems than for humans and, a qualitative ranking
that aims to be more “human-friendly” by using a
set of qualitative labels (e.g., {“Copper”, “Silver”,
“Gold”}) to represent the QPT evaluation’s results.
In the rest of this paper, we will show that the pre-
viously presented notion of quantitative ranks can be
extended to actually negotiate Cloud resources using
a broker-based architecture.
3 CREATING AND SPECIFYING
SecLAs USING
WS-AGREEMENT
As introduced in Section 1, the goal of the proposed
approach is to offer the systematic negotiation of se-
curity using Cloud SecLAs. In order to fulfill this goal
our proposal (i) creates a set of CSP SecLA based on
the security information derived from the the CSA
STAR repository (Cloud Security Alliance, 2011b)
and, (ii) represents both CSP/User SecLA using the
WS-Agreement standard (Andrieux et al., 2007). In
this section we discuss in further detail these two
phases.
Listing 1: SDT element in WS-Agreement.
<ws ag: Ser vic eDe scr iption Te rm wsag:Name
=” CustomerAccessRequirements ”
wsag:ServiceName =” S e c u ri t y A r c hi t e c t u r e
”>
< / wsa g:S erv iceDes cripti onT er m>
First, given CSA STAR’s broad adoption by ma-
jor CSP our research proposes the creation of SecLA
derived from the information stored there. Currently,
STAR contains entries in the form of “Consensus
Assessments Initiative Questionnaire” reports (CAIQ
(Cloud Security Alliance, 2011a)), which provide
industry-accepted ways to document what security
controls exist in Cloud offerings. The current CAIQ
report contains a set of 171 security parameters (all
of these with a qualitative “YES/NO” answer) dis-
tributed in the following controls: Compliance (CO)
– 14, Data Governance (DG) – 15, Facility Security
(FS) – 9, Human Resources Security (HR) – 4, In-
formation Security (IS) – 71, Legal (LG) – 2, Opera-
tions Management (OP) – 5, Risk Management (RI) –
12, Release Management (RM) – 5, Resilience (RS) –
11 and Security Architecture (SA) – 23. Given these
CAIQ’s properties, it is possible to create SecLAs
with the features required by the evaluation and rank-
ing methodology presented in Section 2.
Second, to allow the automated negotiation of
Cloud SecLA (derived from the CAIQ as mentioned
in the previous paragraph), we adopted the SLA-
oriented language proposed by WS-Agreement which
was created with the goal to standardize the termi-
nology/protocol used when two parties are trying to
establish an agreement. It mainly consists of a lan-
guage for specifying the nature of the agreement and,
a SOAP-based protocol for actually establishing the
agreement between two participants. At state of art,
the WS-Agreement language is widely used for SLA
negotiation and has been adopted by projects like EU
FP7 mOSAIC (mOSAIC, 2011).
The main component within the WS-Agreement
standard is the SLA specification core, which consists
of three elements: Service Description Terms (SDT),
Service Properties (SP) and, Guarantee Terms (GT).
A SDT is a fundamental element, providing a full or
partial functional description of a service. One or
more SDTs can be related to a service. A SP ele-
ment defines properties/variables, associated with a
service, and used for expressing guarantees on a ser-
vice. Finally, a GT element defines an assurance on a
service through an assertion (using the content of the
SP element) expressed over the service described by
the SDTs. In the rest of this section we present the
process required to specify a SecLA using the WS-
Agreement standard, however due to space restric-
tions our explanation will only show relevant excerpts
of the resulting XML document.
Based on the CAIQ’s structure (Cloud Security
Alliance, 2011a), first we model each security control
as a SDT. Then, the respective value of the controls
along with the inputs required by the evaluation tech-
nique presented in Section 2 (i.e., the User SecLA’s
AND/OR relationships and weights) are modeled as
GTs on the SDT. CAIQ’s inherent hierarchical struc-
ture (i.e., sub-controls) is represented as security ele-
ments in WS-Agreement (cf., Listing 1).
Once the SDT has been specified, we have to fo-
cus on the SP element. First, we define a SP for each
CAIQ sub-control, as required by its respective SDT
(cf., Listing 2). Second, in the SP element we de-
fine the variables (e.g., weights) and related semantics
used for expressing the security requirements through
assertions in the GT element.
CLOSER2013-3rdInternationalConferenceonCloudComputingandServicesScience
536