Online Analysis of Security Risks in Elastic Cloud Applications

Security-related concerns in elastic cloud applications call for a risk-based approach due to the inherent trade-offs among security and other nonfunctional requirements, such as performance. To this end, the authors advocate a solution that can be efficiently realized through modeling the application behavior as a Markov decision process, on top of which probabilistic model checking is applied. The article explains the main steps in this approach and illustrates its use in online analysis and decision making regarding elasticity decisions. The runtime analysis is capable of providing evidence for key security-related aspects of the running applications, such as the probability of data leakage in the next hour.

[1]  Zoltán Ádám Mann,et al.  Allocation of Virtual Machines in Cloud Data Centers—A Survey of Problem Models and Optimization Algorithms , 2015, ACM Comput. Surv..

[2]  Ioannis Konstantinou,et al.  Dependable Horizontal Scaling Based on Probabilistic Model Checking , 2015, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[3]  Haralambos Mouratidis,et al.  Security-Aware Elasticity for NoSQL Databases , 2015, MEDI.

[4]  Rami Bahsoon,et al.  A Systematic Review of Service Level Management in the Cloud , 2015, ACM Comput. Surv..

[5]  Marta Z. Kwiatkowska,et al.  Automated Verification Techniques for Probabilistic Systems , 2011, SFM.

[6]  Marta Z. Kwiatkowska,et al.  PRISM: probabilistic model checking for performance and reliability analysis , 2009, PERV.

[7]  Daniel A. Menascé,et al.  Autonomic resource provisioning in cloud systems with availability goals , 2013, CAC.

[8]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[9]  Jan M. Maciejowski,et al.  Predictive control : with constraints , 2002 .

[10]  Valérie Issarny,et al.  Formal Methods for Eternal Networked Software Systems , 2011, Lecture Notes in Computer Science.

[11]  Inderveer Chana,et al.  QoS-Aware Autonomic Resource Management in Cloud Computing , 2015, ACM Comput. Surv..

[12]  Ernesto Damiani,et al.  From Security to Assurance in the Cloud , 2015, ACM Comput. Surv..

[13]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[14]  Haralambos Mouratidis,et al.  A framework to support selection of cloud providers based on security and privacy requirements , 2013, J. Syst. Softw..

[15]  Haralambos Mouratidis,et al.  Migrating into the Cloud: Identifying the Major Security and Privacy Concerns , 2013, I3E.