recommendation of patterns suitable for cloud archi-
tectures. SecPat provides a DSL and reasoning prin-
ciples to automate the recommendation of patterns.
SecPat only considers one condition to recommend
patterns, namely the cybersecurity property satisfied
by the pattern. SECLOUD extends SecPat’s DSL to
include further pattern’s attributes, namely the threat
mitigated by the pattern, and the attack surface that
the pattern may be deployed. SECLOUD follows the
STRIDE methodology to map threats to cybersecurity
properties. This extension enables a more precise rec-
ommendation of patterns through reasoning principle
rules. Another extension is the specification and evalu-
ation of constraints to reduce the number of solutions
with patterns. This extension deals with scalability
issues and improves the usability of SECLOUD.
ThreatGet
6
is a commercial tool for threat analysis.
ThreatGet identifies threat scenarios and attack paths
in an automated fashion. To deal with such security
artifacts, ThreatGet provides a list of potential security
measures to be selected by the user. ThreatGet does not
instantiate the selected security measures in the system
architecture. As a result, it might be unclear for the
user to identify which components are relevant to the
selected security measures. SECLOUD instantiates the
recommended security measures by making explicit
which components are part of the security measure
(e.g., mTLS for components A and B).
Another commercial tool for STRIDE analysis
of cloud architectures is Microsoft’s Threat Analysis
tool
7
. While SECLOUD is also based on STRIDE, it
is able to automatically compute architecture options.
Its flexible definition using ASP allows the extension
to more fine-grained threat scenario models.
SECLOUD outputs requirements alongside the rec-
ommended security measures. Other tools, such as
Ansible (Spanaki and Sklavos, 2018), may be used
to harden cloud infrastructures by implementing such
requirements. Ansible provides the means of, e.g.,
installing SSL certificates, installing and configuring
monitoring tools, and configuring user accounts.
9 CONCLUSION
This article proposed SECLOUD, a tool to assist secu-
rity engineers with the selection of security measures
for cloud architectures. We validated SECLOUD in a
case study that provides cloud services for unmanned
air vehicles (UAVs). We are currently investigating
several future directions, including (i) specification
6
https://www.threatget.com
7
https://www.microsoft.com/en-us/
securityengineering/sdl/threatmodeling
of security measures to address threat scenarios that
violate the availability of assets, and (ii) integration of
SECLOUD in a model-based system engineering tool
that will serve as a frontend to improve its usability.
ACKNOWLEDGMENTS
We thank the German Ministry for Economic Affairs
and Climate Action of Germany for funding this work
through the LuFo V-3 project RTAPHM.
REFERENCES
Baral, C. (2010). Knowledge Representation, Reasoning and
Declarative Problem Solving. Cambridge University
Press.
Carroll, M., Kotz
´
e, P., and van der Merwe, A. (2011). Se-
cure cloud computing: Benefits, risks and controls. In
Venter, H. S., Coetzee, M., and Loock, M., editors,
Information Security South Africa Conference 2011,
ISSA 2011. ISSA, Pretoria, South Africa.
Cheng, B. H. C., Doherty, B., Polanco, N., and Pasco, M.
(2019). Security Patterns for Automotive Systems. In
MODELS’19.
Dantas, Y. G. and Nigam, V. (2022). Automating Safety
and Security Co-Design through Semantically-Rich
Architectural Patterns. ACM Trans. Cyber Phys. Syst.
Dolev, D. and Yao, A. C. (1983). On the security of public
key protocols. IEEE Trans. Inf. Theory, 29(2):198–207.
Eliseev, V., Miliukova, E., and Kolpinskiy, S. (2021). Neural
Network Cryptographic Obfuscation for Trusted Cloud
Computing. In Integrated Models and Soft Computing
in Artificial Intelligence, pages 201–207.
Gelfond, M. and Lifschitz, V. (1990). Logic programs with
classical negation. In ICLP.
Lifschitz, V. (2019). Answer Set Programming. Springer.
Oleshchuk, V. A. and Køien, G. M. (2011). Security and pri-
vacy in the cloud a long-term view. In 2011 2nd Inter-
national Conference on Wireless Communication, Ve-
hicular Technology, Information Theory and Aerospace
& Electronic Systems Technology (Wireless VITAE).
Potassco (2022). Clingo: A grounder and solver for logic
programs https://github.com/potassco/clingo.
SeCloud (2022). https://github.com/ygdantas/SeCloud.
Shostack, A. (2014). Threat Modeling: Designing for Secu-
rity. Wiley.
Spanaki, P. and Sklavos, N. (2018). Cloud Computing: Secu-
rity Issues and Establishing Virtual Cloud Environment
via Vagrant to Secure Cloud Hosts. In Computer and
Network Security Essentials, pages 539–553. Springer.
Vasudev, H., Deshpande, V., Das, D., and Das, S. K. (2020).
A Lightweight Mutual Authentication Protocol for
V2V Communication in Internet of Vehicles. IEEE
Trans. Veh. Technol., 69(6):6709–6717.
SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures
275