Towards Continuous Cloud Service Assurance for Critical Infrastructure IT

The momentum behind Cloud Computing has revolutionized how ICT services are provided, adopted and delivered. Features such as high scalability, fast provisioning, on demand resource availability makes it an attractive proposition for deploying complex and demanding systems. Clouds are also very suitable for deploying systems with unpredictable load patterns including Critical infrastructure services. Though, the major obstacle in hosting Critical infrastructures is often a lack of assurance. The transparency and flexibility offered by the Cloud, abstracts per definition over e.g. data placement, hardware, service migration. This makes it very hard to assure security properties. We present an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents our approach.

[1]  George Spanoudakis,et al.  Translation of SLAs into Monitoring Specifications , 2011 .

[2]  George Spanoudakis,et al.  The SERENITY Runtime Monitoring Framework , 2009, Security and Dependability for Ambient Intelligence.

[3]  Khaled Mahbub,et al.  Incremental certification of cloud services , 2013, SECURWARE 2013.

[4]  Frank Pallas,et al.  An Architectural Model for Deploying Critical Infrastructure Services in the Cloud , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[5]  Ramin Yahyapour,et al.  Service Level Agreements for Cloud Computing , 2011 .

[6]  Cynthia E. Irvine,et al.  MYSEA: the monterey security architecture , 2009, STC '09.

[7]  Rajkumar Buyya,et al.  Service Level Agreement (SLA) in Utility Computing Systems , 2010, ArXiv.

[8]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[9]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[10]  Siani Pearson,et al.  Toward Accountability in the Cloud , 2011, IEEE Internet Computing.

[11]  Markus Tauber,et al.  Trustworthy evidence gathering mechanism for multilayer cloud compliance , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[12]  Siani Pearson,et al.  Accountability for Data Governance in Cloud Ecosystems , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[13]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[14]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[15]  R. Smith,et al.  Department of Defense. , 2020, Military medicine.

[16]  Yufang Yang,et al.  The semantic blocking effect in word naming task: Evidence from Chinese classifier-noun phrase production , 2013, 2013 IEEE Third International Conference on Information Science and Technology (ICIST).

[17]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[18]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[19]  George Spanoudakis,et al.  Advanced service monitoring configurations with SLA decomposition and selection , 2011, SAC '11.

[20]  Bartolomeo Sapio Certification infrastrUcture for MUlti-Layer cloUd Services , 2013 .

[21]  Wolfgang Kröger,et al.  Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools , 2008, Reliab. Eng. Syst. Saf..

[22]  Alan Dearle,et al.  Autonomic Management of Maintenance Scheduling in Chord , 2010, ArXiv.

[23]  John D. Moteff,et al.  Critical Infrastructures: What Makes an Infrastructure Critical? , 2003 .