A Simulation Framework to Model Accountability Controls for Cloud Computing

In this paper, we present an implemented system to model and visually represent the functioning of accountability mechanisms for cloud computing (such as policy enforcement, monitoring, intrusion detection, logging, redress and remediation mechanisms) over provider boundaries along the supply chain of service providers. Service providers can use these mechanisms, among others, in a variety of combinations to address data protection problems in the cloud, such as compliance failures, losses of governance, lock-in hazards, isolation failures, and incomplete data deletion. The focus here is on technical mechanisms for the purposes of simulation (the currently implemented tool demonstrates policy enforcement, monitoring and logging); in general, an accountability approach requires a combination of technical measures and legal and regulatory support, of course. We survey existing work on accountability in the cloud and discuss ongoing research in the context of the Cloud Accountability project. We discuss modelling considerations that apply in this context namely, how accountability may be modelled statically and dynamically. Details of the current implementation of the Accountability Simulation Engine (ASE), and the first version of a graphical animation of data flows in the cloud, are described. Keywords–accountability; data protection; modelling language; simulation; visualisation; sticky policies; policy enforcement; logging; redress

[1]  Ulf Jeppsson,et al.  MATLAB™ and Simulink™ , 2002 .

[2]  Siani Pearson,et al.  An interdisciplinary approach to accountability for future internet service provision , 2013, Int. J. Trust. Manag. Comput. Commun..

[3]  Siani Pearson,et al.  Toward Accountability in the Cloud , 2011, IEEE Internet Computing.

[4]  Laurie J. Hendren,et al.  SableCC, an object-oriented compiler framework , 1998, Proceedings. Technology of Object-Oriented Languages. TOOLS 26 (Cat. No.98EX176).

[5]  Bu-Sung Lee,et al.  How to Track Your Data: The Case for Cloud Computing Provenance , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[6]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[7]  Michael Kölling Introduction to Programming with Greenfoot - Object-Oriented Programming in Java with Games and Simulations, Second Edition , 2009 .

[8]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[9]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[10]  Brian J. Huffman,et al.  An Object-Oriented Version of SIMLIB A Simple Simulation Package , 2001 .

[11]  Averill Law,et al.  Simulation Modeling and Analysis (McGraw-Hill Series in Industrial Engineering and Management) , 2006 .