Conference PaperPDF Available

Figures

No caption available
… 
No caption available
… 
No caption available
… 
No caption available
… 
No caption available
… 
Content may be subject to copyright.
!"#$%&'()&*+,&$-.$!&*/'-01$23.34&5&.0$
67'$897/:$875)/+.4$
$
$$
230;&/($<7=53..$!-9,3$>?@ABC?BDE$
23/'-*-7$F'3.*7$>?@DBC?GCE$
2-907.$F-H&.*7/'0$>A?A?AD?BE$
$
I&:&'39$J.-,&'(-01$76$!3.03$8303'-.3$
$
$
$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
!"#$%&'()&*+,&$-.$!&*/'-01$
23.34&5&.0$67'$
897/:$875)/+.4$
>F3(&:$7.$0;&$'&6&'&.*&$S$!"#$%&'()&*+,&$-.$!&*/'-01$23.34&5&.0$67'$
897/:$875)/+.4T$#!$8;3,&(U$8F$V&(0);399U$IN$"35-.T$$
D?A?$!-W0;$O.0&'.3+7.39$87.6&'&.*&$7.$P&0X7'Y-.4$3.:$!&',-*&(E$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
!/553'1$
AT#F!LN#8L$
DTOPLNKZJ8LOKP$$
BTNM"#LMZ$VKN[!$$
\TV<#L$O!$#$!&*R!"#$
GTZMIOPOP]$!M8JNOL^$2MLNO8!$
QT!&*R!"#_!$OP$L<M$8"KJZ$
`T2KPOLKNOP]$L<M$!&*R!"#$
CT8KP8"J!OKP$#PZ$IJLJNM$VKN[!$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
AT$#F!LN#8L$
L;-($)'&(&.03+7.$:&(*'-a&(b$$
$
cP&0X7'Y$3.:$(&*/'-01$53.34&5&.0$
c!&',-*&$"&,&9$#4'&&5&.0($67'$!&*/'-01$
c!&*/'-01$5&0'-*($
cL;&$:-d*/9+&($63*&:$:/'-.4$0;&$(&*/'-01$5&0'-*($
:&e.-+7.$)'7*&(($3.:$0;&$!&*R!"#$57.-07'-.4$
c$#.$3.391(-($7.$0;&$!&*R!"#$'79&$-.$.&X$)3'3:-45($
9-Y&$*97/:$*75)/+.4 $$$$$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
DT$OPLNKZJ8LOKP$
$
c!&*/'-01$ !&',-*&$ "&,&9$ #4'&&5&.0($ 7'$ f/(0$ !&*R!"#($ -($ 3$ .&X$
:&(-4.$ 67'$ 0;&$ 0'3:-+7.39$ !&',-*&$ "&,&9$ #4'&&5&.0($ 7'$ !"#(T$
O.(0&3:$ 76$ *7.(-:&'-.4$ 0'3:-+7.39$ (&',-*&$ 9&,&9($ 9-Y&$ .&0X7'Y$
0;'7/4;)/0$7'$:&931U$67'$&W35)9&U$-0$*7.(-:&'($f/(0$(&',-*&$9&,&9($
'&930&:$07$(&*/'-01T$
c$27.-07'-.4$!&*R!"#(b$57.-07'-.4$3.:$*7.0'799-.4$0;&$!&*R!"#$-($
-5)7'03.0$67'$,&'-61-.4$-6$0;&$(&*/'-01$5&0'-*($3'&$)'7)&'91$a&-.4$
6/9e99&:$3.:$ 67'$ '&0'-&,-.4$ '&9-3a9&$:303$ 67'$ 3.391(-(T$ 27.-07'-.4$
3'*;-0&*0/'&($ (/*;$ 3($ !&*R27.$ *3.$ a&$ '&9&,3.0$ 67'$ 57.-07'-.4$
3.:$*7.0'799-.4$0;&$!&*R!"#T$$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
]-,&.$0;-($-.0'7:/*+7.U$0;&$'&53-.-.4$76$0;&$)3)&'$-($7'43.-g&:$3($67997X(b$
$
c$N&930&:$X7'Y$-($3.391g&:T$
c$V;30$-($3$!&*R!"#$-($)'&(&.0&:$-.$57'&$:&03-9(T$$
c#$a'-&6$:-(*/((-7.$7.$:&e.-.4$(&*/'-01$5&0'-*($-($)'&(&.0&:T$$
c!75&$:-'&*+7.($7.$;7X$07$4&.&'30&$!&*R!"#!$67'$(&',-*&($a&-.4$5-4'30&:$
07$0;&$*97/:$3'&$3.391g&:$3.:$:-(*/((&:T$$
cV&$0'1$07$*7.0'-a/0&$07$0;&$:-(*/((-7.U$a1$3.391g-.4$-((/&($'&930&:$07$;7X$
(&*/'&$3.$-.6'3(0'/*0/'&$07$53.34&$0;&(&$*7.0'3*0($(;7/9:$a&T$$
cL;&$*7.*9/(-7.$3.:$6/0/'&$X7'Y$3'&$)'&(&.0&:T$
$
$
DT$OPLNKZJ8LOKP$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
!&*R!"#($3.:$(&*/'-01$5&0'-*($X&'&$(0/:-&:$a1$hAihDihBih\ihGi$
$
hAi$%T$NT$F3'a7(3U$NT$NT$N-4;-$3.:$ZT$"T$['&/0gU$jZ&e.-.4$2&0'-*($07$!&*R$!"#$#4'&&5&.0($-.$
87.67'53.*&$07$O.0&'.3+7.39$!&*/'-01$!03.:3':(Uk$-.b$lllOOO$"3+.$#5&'-*3.$O.67'53+*($
87.6&'&.*&U$!3.$m7(nU$87(03$N-*3U$D??`U$,T$AT$))T$BQR\`T$K'-4-.39$-.$%7'0/4/&(&T$
$
hDi$NT$NT$N-4;-U$ZT$"T$['&/0g$3.:$8T$FT$V&(0);399U$j!&*R27.b$#.$#'*;-0&*0/'&$67'$27.-07'-.4$3.:$
87.0'799-.4$!&*/'-01$!&',-*&$"&,&9$#4'&&5&.0(kU$-.b$lO$V7'Y(;7)$7.$23.34-.4$3.:$K)&'3+.4$
P&0X7'Y($3.:$!&',-*&(U$))T$`BRC\T$!F8$%'&((U$%7'07$#9&4'&$>D??QET$K'-4-.39$-.$%7'0/4/&(&T$
$
hBi$NT$NT$<&..-.4U$o!&*/'-01$(&',-*&$9&,&9$34'&&5&.0(b$p/3.+e3a9&$(&*/'-01$67'$0;&$&.0&')'-(&qo$-.$
P!%V$r@@b$%'7*&&:-.4($76$0;&$A@@@$X7'Y(;7)$7.$P&X$(&*/'-01$)3'3:-45(T$P&X$^7'YU$P^U$J!#b$
#82U$D???U$))T$G\R$Q?T$hK.9-.&iT$#,3-93a9&$;H)bss:WT:7-T7'4sA?TAA\GsBBGAQ@TBBGA@\$
$
h\i$8T$O',-.&$3.:$LT$"&,-.U$ot/39-01$76$(&*/'-01$(&',-*&Uo$-.$P!%V$r??b$%'7*&&:-.4($76$0;&$D???$
X7'Y(;7)$7.$P&X$(&*/'-01$)3'3:-45(T$P&X$^7'YU$P^U$J!#b$#82U$D???U$))T$@AR@@T$hK.9-.&iT$
#,3-93a9&b$;H)bss:WT:7-T7'4sA?TAA\GsBQQA`BTBQQA@G$
$
hGi$NT$NT$N-4;-U$ITNT$%&9-((3'-$3.:$8TFT$V&(0);399U$j!&*R!"#b$!)&*-e*3+7.$3.:$u39-:3+7.$76$2&0'-*($07$
!&*/'-01$!&',-*&$"&,&9$#4'&&5&.0(kU$-.b$Ou$V7'Y(;7)$7.$875)/0&'$!1(0&5$!&*/'-01U$))T$A@@SDA?T$
!F8$%'&((U$%7'07$#9&4'&$U$D??\T$K'-4-.39$-.$%7'0/4/&(&T$$
BT$NM"#LMZ$VKN[!$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
c$ O.$ hAiU$ 0;&$ 5&0'-*($ 3'&$ &(0'/*0/'&:$ -.$ 7':&'$ 07$ a&$ 39-4.&:$ X-0;$
O.0&'.3+7.39$!&*/'-01$!03.:3':(T$<7X&,&'U$&(03a9-(;-.4$3$!&*R!"#$-($
.70$ (/d*-&.0T$ 27.-07'-.4$ 0;&$ !&*R!"#$ -($ 6/.:35&.03991$ -5)7'03.0$
077T$$
c$O.$hDiU$0;&$57.-07'-.4$)'7a9&5$-($67*/(&:$0;'7/4;$3$:&e.-+7.$76$3$
(&*/'-01$ (&',-*&$ 9&,&9$ 34'&&5&.0$ 57.-07'-.4$ 3.:$ *7.0'799-.4$
3'*;-0&*0/'&U$*399&:$!&*R27.T$
cO.$hBiU$0;&$0&'5$!&*R!"#$-($3.391g&:$*7.(-:&'-.4$0;&$p/&(+7.b$j;7X$
07$ 3**/'30&91$ :&9-.&30&$ (&*/'-01$ -.$ 3$ !"#$ *7.0&W0qk$ #($ 3$ '&(/90U$ hBi$
a/-9:($0;'&&$(0&)($07$a&$67997X&:$X;-9&$:&,&97)-.4$!&*R!"#$5&0'-*(b $
$
BT$NM"#LMZ$VKN[!$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
3E$%79-*1$ #.391(-(b$ 3.1$ :303$3,3-93a9&$ -.$ 0;&$ &.0&')'-(&$0;30$ *7/9:$
4-,&$(/))7'0$07$*'&30&$!&*R!"#($*3.$a&$&,39/30&:$-.$0;-($(0&)T$O0$
*7/9:$a&$:303$'&930&:$07$4/-:3.*&_($3.:$)79-*-&(U$67'$&W35)9&T$$
aE$#'*;-0&*0/'&$#.391(-(b$L;&$7af&*+,&$-($07$3.391g&$0;&$*/(075&'_($
-.6'3(0'/*0/'&$ 3.:$ 07$ e.:$ 0;&$ '&p/-'&5&.0($ 0;30$ *7/9:$ a&$ 5&0$
:-'&*091$ -.07$ &9&5&.0($ 9-Y&$ X&a$ (&',&'($ 3.:$ e'&X399(T$ L;-($
3.391(-($39(7$;&9)($07$67'5/930&$0;&$p/&(+7.($07$a&$/(&:$-.$0;&$
.&W0$(0&)T$
*E$O.0&',-&X(b$07$*799&*0$7.$X;30$3'&$ 0;&$ (&*/'-01$ *7.*&'.($ -.$ 0;&$
/(&'_($)7-.0$76$,-&XT$$
$$$$$$
$$$$$
$
BT$NM"#LMZ$VKN[!$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
c#v&'$ 0;&(&$ (0&)(U$ 0;&$ '&(/90($ *3.$ a&$ )'7*&((&:U$ -.$ 7':&'$ 07$
*;&*Y$ -6$ 0;&$ *30&47'-&($ 7a03-.&:$ *3.$ a&$ /(&:$ 3($ e.39$
*30&47'-&($7'$-6$(75&$76$0;&.$*3.$a&$4'7/)&:T$L;&$'&e.&:$9-(0$
76$*30&47'-&($*3.$a&$/(&:$-.$0;&$!&*R!"#T$
$
cO.$ hGi$ $ 0;&'&$ -($ 3$ *7.0'-a/+7.$ 07$ 0;&$ X'-+.4$ 76$ !&*R!"#(U$ a1$
:&e.-.4$3.:$,39-:3+.4$5&0'-*($07$a&$/(&:$-.$(/*;$*7.0'3*0(T$O.$
7':&'$ 07$ 7a03-.$ 0;&$ (&*/'-01$ 5&0'-*(U$ hGi$ 3))9-&:$ 0;&$ (0&)($
)'7)7(&:$-.$hBiU$/(-.4$3($X7'Y-.4$(*&.3'-7$0;&$.&0X7'Y$76$0;&$
Z&)3'05&.0$ 76$ O.67'53+*($ 3.:$ !03+(+*(U$ 30$ 0;&$ I&:&'39$
J.-,&'(-01$76$!3.03$8303'-.3$>OPMRJI!8ET$
BT$NM"#LMZ$VKN[!$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
$
cL;&$!"#$3($-0$-($*7557.91$Y.7X.U$-($/(/3991$:&e.&:$3(b$j>wE$3$
67'539$ .&47+30&:$ 34'&&5&.0$ a&0X&&.$ 0X7$ )3'+&(T$ O0$ -($ 3$
*7.0'3*0$0;30$&W-(0($a&0X&&.$0;&$!&',-*&$%'7,-:&'$>!%E$3.:$0;&$
8/(075&'T$ O0$ -($ :&(-4.&:$ 07$ *'&30&$ 3$ *7557.$ /.:&'(03.:-.4$
3a7/0$(&',-*&$p/39-01U$)'-7'-+&(U$'&()7.(-a-9-+&(U$&0*Tk$
$
c!&*R!"#$ -($ 3$ ()&*-e*$ !"#$ 0;30$ :&39($ X-0;$ 5&0'-*($ '&930&:$ 07$
(&*/'-01$-.(0&3:$76$0;&$0'3:-+7.39$0&9&*755/.-*3+7.$5&0'-*($
(/*;$ 3($ 0;'7/4;)/0U$ :&931U$ )3*Y&0$ 97(($ 3.:$ 70;&'$ (-5-93'$
5&0'-*(T$
$
cL;&$(&',-*&$9&,&9$(&*/'-01$'&p/-'&5&.0($7'$:&53.:(U$$3'&$930&'$
*7.,&'0&:$ -.$ 3$ (&0$ 76$ 5&*;3.-(5(U$ -.*9/:-.4$ *'1)074'3);1U$
:303$ )3*Y&0$ e90&'-.4U$ '&:/.:3.*1$ 76$ ;3':X3'&$ 3.:$ (7vX3'&U$
&0*T$$
\T$V<#L$O!$#$!&*R!"#$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
$
$
$
$
$
$
$
$
$
O.$I-4/'&$AU$0;&$:-=&'&.*&($a&0X&&.$3$!&*R!"#$3.:$3$*7.,&.+7.39$!"#$3'&$(/553'-g&:T$$
\T$V<#L$O!$#$!&*R!"#$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
$
cL;&$ :&e.-+7.$ 76$ 0;&$ 0&'5$ 5&0'-*$ -($ 3$ 9-H9&$ ,34/&U$
&()&*-3991$X;&.$'&6&''-.4$07$OL$3'&3T$
$
cF&-.4$ p/3.+e3a9&$ 3.:$ 5&3(/'3a9&$ 3'&$ &((&.+39$
5&0'-*$3H'-a/0&(T$
$
cV;&.$ :&(-4.-.4$ (&*/'-01$ 5&0'-*(U$ 0;-($ *;399&.4&$ -($ 3$
53-.$*7.*&'.T$
$
cL;-($ *7.*&'.$ X3($ 7.&$ 76$ 0;&$ 53-.$ p/&(+7.($ 76$ 0;&$
)'&(&.0$)3)&'T$
GT$ZMIOPOP]$!M8JNOL^$2MLNO8!$
K8LKFMN$@L<$ OPMGQA@R?QDBC$ $$
$
#$(0&)$6/'0;&'$-($4-,&.U$39-4.-.4$0;&$(&*/'-01$5&0'-*($07$5&&0$-.0&'.3+7.39$
(&*/'-01$-.67'53+7.$(03.:3':(U$9-Y&$O!KsOM8$A``@@bD??G$
$
$
$
GT$ZMIOPOP]$!M8JNOL^$2MLNO8!b$L3a9&$
K8LKFMN$@L<$ OPMGQA@R?QDBC$
c8;3.4&($ -.$ 0;&$ 0'3:-+7.39$ :-(0'-a/0&:$ *75)/+.4$
)3'3:-45$ 9&3:$ 07$ 0;&$ .&&:$ 76$ &.67'*&5&.0($ -.$ 0;&$
0'3:-+7.39$!"#(T$
$
cL;&$57(0$'&*&.0$-($0;&$.7+7.$76$j*75)/+.4$-.$0;&$
*97/:kT$
$
c[&1X7':(b$jK.$Z&53.:k$
$
cL;&$ .&47+3+7.$ 76$ 0;&$ !"#$ X-99$ ;3,&$ 07$a&$34-9&U$-.$
7':&'$07$.70$3=&*0$0;&$;-'-.4$76$(&',-*&($
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
cL;&$(&*/'-01$)'7a9&5$-.$*97/:$*75)/+.4$'3-(&($53.1$
p/&(+7.(U$&()&*-3991$6'75$*/(075&'($
$
cN-(Y($ 3((7*-30&:U$ X31($ 3,3-93a9&$ 07$ &.(/'&$ 0;&$
(&*/'-01$76$(/*;$:303$
$
c897/:$ *75)/+.4$ -.6'3(0'/*0/'&($ .&&:$ 07$ )'7,-:&$
(03a9&$(&',-*&$9&,&9$67'$a/(-.&(($)'7*&(($07$a&*75&$3$
,-3a9&$390&'.3+,&$07$0;&$&.0&')'-(&$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
cO.$ *97/:$ *75)/+.4$ &.,-'7.5&.0($ !"#($ 3'&$ 01)-*3991$
)'7,-:&:$ 67'$ a3(-*$ )93x7'5$ (&',-*&($ >&T4TU$ (1(0&5$
/)+5&U$.&0X7'Y$0;'7/4;)/0E$
$
c!&*/'-01$ (&',-*&$ 9&,&9($ 0'&30&:$ -.$ 3$ (&)3'30&:$ !"#b$$
!&*R!"#T$
$
cZ/&$07$-0($.30/'&U$*97/:$*75)/+.4$;3($(&,&'39$01)&($
76$/(&(b$]7749&$Z7*(U$<-'-.4$3$(&',&'$-.$3$Z303$8&.0&'$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
897/:$875)/+.4$!&',-*&($
!
cInfrastructure!as!a!Service!(IaaS)$
$$$$%'7:/*0($-.$0;-($*3(&$j:&9-,&'$3$6/99$*75)/0&'$-.6'3(0'/*0/'&$,-3$0;&$O.0&'.&0!
!
cPla3orm!as!a!Service!(PaaS)$
$$$#$ 6/99$ 7'$)3'+39$3))9-*3+7.$ :&,&97)5&.0$ &.,-'7.5&.0$ $ $ $ 0;30$/(&'($*3.$
3**&(($3.:$/+9-g&$7.9-.&U$&,&.$-.$*7993a7'3+7.$X-0;$70;&'(!
!
cSo6ware!as!a!Service!(SaaS)$
$$$#$*75)9&0&U$0/'.Y&1$3))9-*3+7.$-.*9/:-.4$*75)9&W$)'74'35($(/*;$3($0;7(&$
67'$8N2$7'$&.0&')'-(&R'&(7/'*&$53.34&5&.0$,-3$0;&$O.0&'.&0$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
2-4'3+7.$!0&)( $
!
cPolicy!Analysis!
$$$ $$#.391(-($76$0;&$3,3-93a9&$:7*/5&.03+7.$-.$0;&$7'43.-g3+7.$3.:$531a&$-.$
0;&$e&9:$X;&'&$0;&$7'43.-g3+7.$;3($-0($3*+,-+&(U$9-Y&$*/(075&'_($*7.0'3*0(U$
.3+7.39$'&4/93+7.(U$-.0&'.39$)79-*-&($3.:$(7$7.T$
$
$
!!!!Intended!results:!
$$$$#.$-.-+39$9-(0$76$(&*/'-01$(&',-*&$*30&47'-&($67'$0;&$!&*$!"#T$L;-($(0&)$5/(0$
a&$:7.&$a1$0;&$7'43.-g3+7.U$a&*3/(&$-0$-($3$)3'+*/93'$(/',&1T
2-4'3+7.$!0&)( $
!
cArchitecture!Analysis!
$$$$$87.(-:&'-.4$0;30$ *97/:$ *75)/+.4$;3($ 53.1$ *30&47'-&($76$ /(&$3.:$&3*;$
*30&47'1$ ;3($ -0($ 7X.$ )3'+*/93'-+&(U$ 0;&$ 7'43.-g3+7.$ 5/(0$ Y.7X$ X;-*;$
01)&$-($-.0&.:&:$
$
$ $ $ $ $ V-0;$ 0;&$ )'&9-5-.3'1$ (&*/'-01$ (&',-*&$ *30&47'-&($ *799&*0&:$ -.$ 0;&$ )79-*1$
3.391(-($(0&)U$ -.$0;&$ 3'*;-0&*0/'&$3.391(-($);3(&$ X-99$a&$ 3.391g&:$X;-*;$ 76$
0;&(&$ *30&47'-&($ *7/9:$ a&$ :-'&*091$ $ 53))&:$ 07$ 0;&$ *30&47'1$ 76$ *97/:$
*75)/+.4$-.0&.:&:T$
$
$
!!!!Intended!results:!
$$$$$#$'&e.&:$9-(0$76$(&*/'-01$*30&47'-&($67'$0;&$!&*R!"#U$3($X&99$3($p/&(+7.($07$
a&$53:&$-.$0;&$-.0&',-&X$);3(&T
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
2-4'3+7.$!0&)($
!
cInterviews$
$ $ $ $ $O.$0;-($);3(&U$ -.0&',-&X($X-0;$)&7)9&$'&930&:$07$0;&$(&',-*&($0;30$X-99$a&$
5-4'30&:$07$0;&$*97/:$X-99$a&$53:&T$
$$$$$23.1$76$0;&$p/&(+7.($X&'&$39'&3:1$67'5/930&:$-.$0;&$)'&,-7/($(0&)T$
$
cNego?a?on$
$$$O6$0;&'&$-($3$ .&47+3+7.$-.$)93*&$X-0;$(75&$ *97/:$*75)/+.4$)'7,-:&'U$-.$
0;-($);3(&$0;&$ (&*/'-01$ (&',-*&$ 9&,&9($ X-99$ a&$.&47+30&:T$O6$ 0;&'&$ -($ .70U$ -0$
X-99$a&$.&*&((3'1$07$*;&*Y$X-0;$0;&$)7((-a9&$)'7,-:&'($X;-*;$76$0;&5$7=&'($
(/))7'0$67'$.&47+3+.4$(&*/'-01$(&',-*&$9&,&9(T$$
$
$ $ $ $ 23.1$ *97/:$ )'7,-:&'($ -.*9/:&$ (&',-*&$ 9&,&9$ 34'&&5&.0($ -.$ 0;&-'$ 7.9-.&$
*7.0'3*0(U$39'&3:1$:&e.-.4$;7X$0;&$(&',-*&($X-99$a&$:&9-,&'&:U$X;30$53Y&($
-0$)70&.+3991$.7.R.&47+3a9&T$
$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
TTT$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
TTT$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
O($ X7'0;$ 07$ '&5&5a&'$ 0;30$ !"#($ 53-.$ 67*/($ -($ *;3'3*0&'-(+*($ '&930&:$ 07$ 0;&$
p/39-01$ 76$ (&',-*&$ a&-.4$ :&9-,&'&:T$ <7X&,&'U$ 4-,-.4$ (75&$ 3()&*0($ 39'&3:1$
)7-.0&:U$ 9-Y&$ 0;&$ 97*3+7.$ 76$ '&(7/'*&($ >0;30$ *7/9:$ a&$ -.$ 3.1$ *7/.0'1EU$ (75&$
9&439$3()&*0($(;7/9:$a&$3::'&((&:$-.$0;&$!&*R!"#T$
QT$!&*R!"#_!$OP$L<M$8"KJZ$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
`T$2KPOLKNOP]$L<M$!&*R!"#$$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
27.-07'-.4$(&*/'-01$5&0'-*(T$
$
c<3,-.4$ 0;&$ */(075&'$ '&3*;&:$ 3.$ 34'&&5&.0$
X-0;$ 0;&$ *97/:$ )'7,-:&'U$ 0;'7/4;$ 3$ !&*R!"#U$
0;&'&$-($3.70;&'$-5)7'03.0$(0&)b$07$57.-07'$-6$
0;&$(&*/'-01$5&0'-*($3'&$a&-.4$5&0T$
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert
it again.
`T$2KPOLKNOP]$L<M$!&*R!"#$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ I-4/'3$D$
`T$2KPOLKNOP]$L<M$!&*R!"#$
!&*R27.$3'*;-0&*0/'&$(&*/'-01$3()&*0(T$
$
#'*;-0&*0/'&($9-Y&$!&*R27.$ '&)'&(&.0$3$*7.0'-a/+7.$-.$
0;&$(&3'*;$67'$X31($07$57.-07'$3.:$*7.0'79$3$!&*R!"#T$$
$
<7X&,&'U$ -0$ -($ .&*&((3'1$ 07$ (&*/'&$ 0;&$ 3'*;-0&*0/'&$
-0(&96U$ a&*3/(&$ &,&.$ X;&.$ /(&:$ -.$ 3.$ -.0'3*75)3.1$
&.,-'7.5&.0U$ -0$ *3.$ a&$ 3$ X&3Y$ )7-.0$ -.$ 0;&$ !&*R!"#$
57.-07'-.4$)'7*&((T
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
OPMGQA@R?QDBC$
`T$2KPOLKNOP]$L<M$!&*R!"#$
K8LKFMN$DCL<$
`T$2KPOLKNOP]$L<M$!&*R!"#$
K8LKFMN$DCL<$
R$V;7$X-99$a&$'&()7.(-a9&$67'$0;-($57.-07'-.4q$L;&$
*/(075&'q$L;&$*97/:$)'7,-:&'q$#$0;-':$)3'01q$
`T$2KPOLKNOP]$L<M$!&*R!"#$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
CT$8KP8"J!OKP$#PZ$$IJLJNM$VKN[$$
$
cL;&$ !&*R!"#$ -($ 3$ 67'539$ .&47+30&:$ :7*/5&.0$ 0;30$
:&e.&($-.U$()&*-3991U$3$p/3.+03+,&$X31$ X;30$(&',-*&$
9&,&9($X-99$a&$:&9-,&'&:$07$0;&$*/(075&'T$
$
cK.&$76$0;&$53-.$3:,3.034&($76$3$!&*R!"#U$a&17.:$0;&$
9&439$7.&U$-($0;&$)7((-a-9-01$76$3$a&H&'$/.:&'(03.:-.4$
76$;7X$(&*/'-01$-($a&-.4$3**75)9-(;&:T$
c%'7)7(&:$ 3'*;-0&*0/'&($ 9-Y&$ !&*R27.$ '&)'&(&.0$ 3.$
-5)7'03.0$ (/a(-:1$ -.$ 0;&$ (&3'*;$ 67'$ X31($ 07$
57.-07'-.4$3.:$*7.0'799-.4$0;&$!&*R!"#T$
$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
$
$
I-.39-g-.4U$3$'&(&3'*;$07$)'&R:&(-4.$(&*/'-01$5&0'-*($
3**7':-.4$ 07$ 0;&$ *97/:$ *75)/+.4$ *30&47'1U$ 3-5-.4$ 07$
;&9)$ 0;&$ .&&:$ 67'$ :1.35-*$ .&47+3+7.$ 76$ !&*R!"#($ -.$
0;&$*97/:$-($-.$)93*&T$
CT$8KP8"J!OKP$#PZ$$IJLJNM$VKN[$$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$
NMIMNMP8M!$
K8LKFMN$DCL<$ OPMGQA@R?QDBC$ $$
$
$$$$!"#$ %&'()&*+,&$ -.$ !&*/'-01$ 23.34&5&.0$ 67'$ 897/:$
875)/+.4T$#!$8;3,&(U$8F$V&(0);399U$IN$"35-.T$$
$ $ $ $ $ D?A?$ !-W0;$ O.0&'.3+7.39$ 87.6&'&.*&$ 7.$ P&0X7'Y-.4$ 3.:$
!&',-*&($
... This section discusses previous relevant publications about obtaining trust in the cloud. These writings [30,40,41] are studies on the operationalization, negotiation and definition of SLAs. The work in [42,43] measures trust using simulations from performance tools or a user feedback repository for some specific models, such as Infrastructure as a service (IaaS) or Software as a Service (SaaS). ...
... The work on [40] proposes an architecture for creating, controlling and monitoring Sec-SLA, defining the construction of Sec-SLA in phases which extract the parameters of customers' security policies. However, the research mentioned above points to the difficulty in measuring security rather than making it clear that the proposed models do not depend on any specific technology or paradigm (such as cloud computing) and can be adapted in future works. ...
... Authentication, authorization, data splitting, encryption, data backup, data access control rights by verification needs to ensure for providing more security for the data. In [19], the authors proposed architecture for examining whether security metrics in a security SLA has met. Moreover, these structures need to be secured. ...
Article
Full-text available
span>The cloud computing had its impact far and wide, and Enterprise solutions are getting migrated to different types of clouds. The services are delivered from the data centers which are located all over the world. As the data is roaming with less control in any data centers, data security issues in cloud are very challenging. Therefore we need multi-level authentication, data integrity, privacy and above all encryption to safeguard our data which is stored on to the cloud. The data and applications cannot be relocated to a virtual server without much degree of security concern as there can be much confidential data or mission-critical applications. In this paper, we propose Data Storage Lock Algorithm (DSLA) to store confidential data thereby provides secure data storage in cloud computing based on cryptographic standards.</span
... Despite these substantial benefits, there are some remarkable information policy concerns such as security, privacy and access management that have affected the reliability of cloud computing environment. Applying an appropriate level(s) of security to data stored in cloud-based storages is one of the most challenging issues in this area, based on the details defined in SLA [4] and sensitivity of data [5]. The establishment of a multi-level security architecture based on the data sensitivity and requirements of cloud customers is the most appropriate solution to avoid considerable and unnecessary processing power consumption for manipulating both sensitive and non-sensitive data in the same level of security [6]. ...
Conference Paper
Security challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. In this paper, a structural policy management engine has been introduced to enhance the reliability of managing different policies in clouds and to provide standard as well as dedicated security levels (rings) based on the capabilities of the cloud provider and the requirements of cloud customers. Cloud security ontology (CSON) is an object-oriented framework defined to manage and enable appropriate communication between the potential security terms of cloud service providers. CSON uses two super classes to establish appropriate mapping between the requirements of cloud customers and the capabilities of the service provider.
... The main aim of all security-as-a-service models is to provide appropriate level of security for data and resources in cloud servers according to these classified security issues. Indeed, each individual customer needs to be granted reliable security level/levels based on defined agreement of SLA [7]. These security levels are typically independent based on the sensitivity of data to decrease the consumption of processing power for manipulating all data with common security mechanisms (e.g. ...
Conference Paper
Cloud Computing and its' security and privacy concerns as well as countermeasures are one of the highly debated topics in today's IT industry. One of the most challenging security issues in clouds is to define and manage different levels according to isolation, service delivery and scalability concepts in clouds. These security levels need to be protected from disclosing to unauthorized users. Policy-Management models are the most appropriate solutions to create and manage security levels in clouds. However, these models increase the process of matching access requests to defined policies considerably. In this paper, we proposed a reliable access management framework based on multi-level policies and sequences. The suggested model introduces each level of security as s sequence according to the inheritance concepts to classify security levels efficiently and to enhance the process of access control by elimination of unnecessary re-matching. our results showed the suggested model is able to decrease the access response time without affecting the security of the environments.
... [20] Summarizes the security management concerns, in order to build a private cloud security management architecture [21] Using access control architecture to achieve the management of VM Applicatio n types grade of service [22] The influencing factors of Sec-SLAs were analyzed. ...
... A SLA is agreed upon agreement between two parties, namely cloud environment providers and customers, which provide the guarantees of a service [12]. This guarantee includes the list of transactions need to be executed with the best procedure of execution. ...
Chapter
Cloud computing, the growing technology which most of the small as well as large organizations adopt to maintain IT as it is a very cost effective organization should consider the business risk associated with cloud computing all of which are still not resolved. The risk can be categorized in several issues like privacy, security, legal risks. To solve these types of severe risks, organization might make and develop SLA for the establishment of an agreement between the customer and the cloud providers. This chapter provides a survey on the various frameworks to develop SLA based security metrics. Various security attributes and possible threats are having also been discussed in this chapter.
... Typically, resources in cloud-based data centers are classified to several security levels [6] based on sensitivity and defined details in SLA [7] for the enhancement of QoS in clouds as well as avoiding considerable processing power consumption to manipulate both sensitive and non-sensitive data with same security mechanisms. The most popular solution is to define security policies regarding to the capabilities of service provider and requirements of customers. ...
Conference Paper
The long awaited Cloud computing concept is a reality now due to the advancement and transformation of computer generations. However, security challenges are most important obstacles for the advancement of this emerging technology. Managing security policies based on capabilities of service provider and requirements of cloud customers is one of the potential issues due to the scalability and isolation concepts in clouds. In this paper, a multi-layered policy engine is presented to manage policies securely with the minimum consumption of processing power for enhancement of QoS in virtualized environments. Thus, a Policy Layer Constructor and Reasoning Engine are introduced to divide polices into several layers for enhancing quality and reliability of mapping access requests to cloud nodes. The suggested model has been evaluated with performance, security and competitive analysis, and the reliability and efficiency of multi-layered policy engine have been assured for defining, generating and applying security polices in clouds.
... In [13], the authors state that there is no deployed sec-SLA and point out the related issues. That is, the definition of a security quantifiable metric is challenging due to the fact that security is a collection of properties, varying from service performances to process maturity [14]. Several research activities focus on the quantification of security, measuring it and providing security levels. ...
Thesis
Full-text available
Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but due to lack of resources, experience, expertise and nonfinancial structure scenario CC can be most helpful. CC faces a major issue in term of cloud security, an organization doesn’t understand the cloud security factors in the organization and data owner doubts about their data. In the research paper, an investigation on the cloud security objectives to find out the influential factors for cloud adoption in SMEs by proposing an enhancement of Technology-Organization-Environment (TOE) model with some positive influential factor like cloud security, relative advantages, cost saving, availability, SLA, capability, top management, organizational readiness, IS knowledge, malicious insiders, government regulatory support, competitive pressure, size and type. Some negative influencing factors like technological readiness, cloud trust and lack of standards in cloud security. Data were collected by questionnaires from a selected IT company based on SaaS and public cloud. Case study method has been used for validating the enhance TOE model. The IBM Statistics SPSS v22 tool was used for data analysis. The results of data analysis support the enhancement as well as all the proposed hypotheses. In summary, the results of the analysis show that all the enhancement factors were found to have a significant cloud security influence on adoption of cloud computing for SMEs.
Conference Paper
Full-text available
Security have become an issue ever since the birth of cloud computing. Cloud computing like every computer network has security vulnerabilities. A network intrusion is any unauthorized activity on a computer network by an attacker. Intrusion detection system proffers a layer of defence, monitoring network traffic for suspicious predefined activities / pattern and alerting network administrators when suspicious traffic is detected. This paper seeks to address these vulnerabilities and reviews some open source tools that can be implemented to help secure the cloud computing environment. Open source tools that are reviewed include Snort, Bro, Suricata, Open WIPS and Security Onion.
Article
Full-text available
We examine the concept of security as a dimension of Quality of Service in distributed systems. Implicit to the concept of Quality of Service is the notion of choice or variation. Security services also offer a range of choice both from the user perspective and among the underlying resources. We provide a discus- sion and examples of user-specified security variables and show how the range of service levels associated with these variables can support the provision of Quality of Security Service, whereby security is a constructive net- work management tool rather than a performance obstacle. We also discuss various design implications regarding security ranges provided in a QoS-aware dis- tributed system.
Sec-­-SLA: Specifica+on and Valida+on of Metrics to Security Service Level Agreements
  • R R Righi
  • F R Pelissari
  • C B Westphall
R. R. Righi, F.R. Pelissari and C.B. Westphall, "Sec-­-SLA: Specifica+on and Valida+on of Metrics to Security Service Level Agreements", in: IV Workshop on Computer System Security, pp. 199-210. SBC Press, Porto Alegre, 2004. Original in Portuguese.
Defining Metrics to Sec-­-SLA Agreements in Conformance to Interna+onal Security Standards
  • P R Barbosa
  • R R Righi
  • D L Kreutz
P. R. Barbosa, R. R. Righi and D. L. Kreutz, "Defining Metrics to Sec-­-SLA Agreements in Conformance to Interna+onal Security Standards," in: XXXIII La+n American Informa+cs Conference, San José, Costa Rica, 2007, v. 1. pp. 36-­-47. Original in Portuguese.
Security service level agreements: quan+fiable security for the enterprise?" in NSPW '99: Proceedings of the 1999 workshop on New security paradigms
  • R R Henning
R. R. Henning, "Security service level agreements: quan+fiable security for the enterprise?" in NSPW '99: Proceedings of the 1999 workshop on New security paradigms. New York, NY, USA: ACM, 2000, pp. 54-­‐ 60. [Online]. Available hHp://dx.doi.org/10.1145/335169.335194
Sec-­-Mon: An Architecture for Monitoring and Controlling Security Service Level Agreements
  • R R Righi
  • D L Kreutz
  • C B Westphall
R. R. Righi, D. L. Kreutz and C. B. Westphall, "Sec-­-Mon: An Architecture for Monitoring and Controlling Security Service Level Agreements", in: XI Workshop on Managing and Opera+ng Networks and Services, pp. 73-­-84. SBC Press, Porto Alegre (2006). Original in Portuguese.
Original in Portuguese. REFERENCES OCTOBER 28TH INE5619-­‐06238 SLA Perspec+ve in Security Management for Cloud Compu+ng
  • Sbc Press
  • Porto Alegre
  • Cb Westphall
  • Fr Lamin
SBC Press, Porto Alegre, 2004. Original in Portuguese. REFERENCES OCTOBER 28TH INE5619-­‐06238 SLA Perspec+ve in Security Management for Cloud Compu+ng. AS Chaves, CB Westphall, FR Lamin. 2010 Sixth Interna+onal Conference on Networking and Services