challenges arising in cloud environments. More
specifically, it introduced an online anomaly detection
technique based on data density that can be applied
at the cloud infrastructure level. The method
is embodied by a resilience architecture that was
initially defined in (Simpson et al., 2013) and
further explored in (Shirazi et al., 2014) and
(Shirazi et al., 2015). The framework uses
monitoring API Monasca
1
that leverage high speed
message queues and computational engines. It also
supports authentication of all data associated with an
OpenStack tenant to support multi-tenancy. Metrics
and events are received by the API and published
to a message queue (Kafka)
2
. The anomaly engine
consumes metrics from the same message queue,
predict metrics and evaluate likelihood and anomaly
score as probabilities in order to provide overall
resilience to challenges.
7 CONCLUSIONS
In this paper, we have analysed technological trends,
and considered their potential to become future
threats. We did this by means of a systematic
examination of industry reports on existing and
emerging technologies. Using a cloud use case we
have identified potential resilience metrics that can
shed light on the security properties of cloud systems.
The research also gives a basic overview as to what
may be expected in terms of technology futures
with the aid of threat analysis for their adoption in
critical infrastructure environments where there are
stringent security requirements. As cloud computing
is expanding very fast and new threats arising from
security issues are being created, we believe that
our research presents a basis for helping create more
secure cloud systems.
Future work should include other relevant topics,
for example assurance and legal issues, as a next
step towards achieving a high security level in future
cloud applications. Also, the approach should help
to improve network monitoring and management
systems through such a technology evaluation.
ACKNOWLEDGEMENTS
The research presented in this paper has been funded
by the European Union (FP7 Project SECCRIT, grant
agreement no. 312758).
1
Monasca: www.wiki.openstack.org/wiki/Monasca
2
Kafka: http://kafka.apache.org/
REFERENCES
Authorization., N. D. (2006). National defense
authoriazation act for fiscal year 2006.
Ballard, J. R., Rae, I., and Akella, A. (2010). Extensible and
scalable network monitoring using opensafe. Proc.
INM/WREN, pages 8–8.
Dekker, M. (2012). Critical cloud computing: A ciip
perspective on cloud computing services. Technical
report, European Network and Information Security
Agency (ENISA).
Gartner (2014). Gartner symphosium it xpo, executive
summary report.
Grobauer, B., Walloschek, T., and Stocker, E. (2011).
Understanding cloud computing vulnerabilities. IEEE
Security and Privacy, 9(2):50–57.
Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M.,
Spanoudakis, G., Mauthe, A., and Weippl, E.
(2014). A multi-layer and multitenant cloud assurance
evaluation methodology. In Cloud Computing
Technology and Science (CloudCom), 2014 IEEE 6th
International Conference on, pages 386–393.
Ibrahim, A. S., Hamlyn-Harris, J., Grundy, J., and Almorsy,
M. (2011). Cloudsec: a security monitoring appliance
for virtual machines in the iaas cloud model. Network
and System Security (NSS), 2011 5th International
Conference, pages 113–120.
IDC (2014). Idc predictions 2015: Accelerating innovation
and growth on the 3rd platform.
Insider, U. B. (2014). Billions of dollars are set to flow into
these 7 areas of tech in 2015.
IsReport (2014). Information platform for business
solutions, it forecast for 2015.
Jung, C., Schwarz, R., Rudolf, M., Moucha, C., and Eitel,
A. (2015). Seccrit deliverable d4.4 policy decision and
enforcement tools.
Kaspersky (2014). Next 9 security predictions for 2015.
Khajeh, H. A., Greenwood, D., Smith, J. W., and
Sommerville, I. (2012). The cloud adoption toolkit:
Supporting cloud adoption decisions in the enterprise.
Software Practice and Experience, 42:447–465.
Khajeh, H. A., Greenwood, D., and Sommerville, I.
(2010). Cloud migration: A case study of migrating
an enterprise it system to iaas. Cloud Computing
(CLOUD), pages 450–457.
Khajeh, H. A., Sommerville, I., Bogaerts, J., and
Teregowda, P. (2011). Decision support tools for
cloud migration in the enterprise. Cloud Computing
(CLOUD), pages 541 – 548.
Mason, A. (2015). Global telecoms market: trends and
forecasts 20152020.
McAfee (2014). Information platform for business
solutions, it forecast for 2015.
McKinsey and Company (2015). Ten it enabled business
trends for the decade ahead.
Neal, D. (2011). Amazon web services outages raise serious
cloud questions.
Payne, B. D., Carbone, M., Sharif, M., and Lee, W. (2008).
Lares: An architecture for secure active monitoring
CLOSER 2016 - 6th International Conference on Cloud Computing and Services Science
300