Generating cloud monitors from models to secure clouds

  • Elena Troubitsyna
  • , Irum Rauf

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

Authorization is an important security concern in cloud computing environments. It aims at regulating an access of the users to system resources. A large number of resources associated with REST APIs typical in cloud makes an implementation of security requirements challenging and error-prone. To alleviate this problem, in this paper we propose an implementation of security cloud monitor. We rely on model-driven approach to represent the functional and security requirements. Models are then used to generate cloud monitors. The cloud monitors contain contracts used to automatically verify the implementation. We use Django web framework to implement cloud monitor and OpenStack to validate our implementation.

Original languageEnglish
Title of host publicationProceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages526-533
Number of pages8
ISBN (Electronic)9781538655955
DOIs
Publication statusPublished - 19 Jul 2018
Externally publishedYes
Event48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018 - Luxembourg City, Luxembourg
Duration: 25 Jun 201828 Jun 2018

Publication series

NameProceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018

Conference

Conference48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018
Country/TerritoryLuxembourg
CityLuxembourg City
Period25/06/1828/06/18

Keywords

  • Cinder
  • Cloud Monitors
  • MDSE
  • Models
  • Openstack
  • Private Clouds
  • Security
  • UML

Fingerprint

Dive into the research topics of 'Generating cloud monitors from models to secure clouds'. Together they form a unique fingerprint.

Cite this