Abstract
The fast development of Cloud-based services and applications have a significant impact on Service Oriented Computing as it provides an efficient support to share data and processes. The de-perimeterised vision involved by these Intelligent Service Clouds lead to new security challenges: providing a consistent protection depending on the business environment conditions and on the deployment platform specific threats and vulnerabilities. To fit this context aware protection deployment challenge, we propose a MDS@run.time architecture, coupling Model Driven Security (MDS) and Models@run.time approaches. By this way, security policies (that can be generated via a MDS process) are interpreted at runtime by a security mediator depending on the context. This proposition is illustrated thanks to a proof of concept prototype plugged on top of the FraSCAti middleware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
An SCA composite is an SCA component containing a set of SCA components.
- 7.
References
Acher, M., Cleve, A., Collet, P., Merle, P., Duchien, L., Lahire, P.: Reverse engineering architectural feature models. In: Crnkovic, I., Gruhn, V., Book, M. (eds.) ECSA 2011. LNCS, vol. 6903, pp. 220–235. Springer, Heidelberg (2011). http://hal.inria.fr/inria-00614984
Alam, M., Hafner, M., Breu, R.: Constraint based role based access control in the SECTET-framework a model-driven approach. J. Comput. Secur. 16(2), 223–260 (2008)
Avgerinos, T., Cha, S.K., Rebert, A., Schwartz, E.J., Woo, M., Brumley, D.: Automatic exploit generation. Commun. ACM 57(2), 74–84 (2014). http://doi.acm.org/10.1145/2560217.2560219
Lang, U.: OpenPMF SCaaS: authorization as a service for cloud SOA applications. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 634–643, November 2010
Lucio, L., Zhang, Q., Nguyen, P.H., Amrani, M., Klein, J., Vangheluwe, H., Traon, Y.L.: Chapter 3 - advances in model-driven security. In: Memon, A. (ed.) Advances in Computers, vol. 93, pp. 103–152. Elsevier, Newyork (2014). http://www.sciencedirect.com/science/article/pii/B9780128001622000038
Modi, C., Patel, D., Borisanya, B., Patel, A., Rajarajan, M.: A novel framework for intrusion detection in cloud. In: Proceedings of the Fifth International Conference on Security of Information and Networks (SIN 2012), pp. 67–74. ACM, New York (2012). http://doi.acm.org/10.1145/2388576.2388585
Ouedraogo, W.F., Biennier, F., Ghodous, P.: Adaptive security policy model to deploy business process in cloud infrastructure. In: 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012), pp. 287–290 (2012)
Paraiso, F., Haderer, N., Merle, P., Rouvoy, R., Seinturier, L.: A federated multi-cloud paas infrastructure. In: 5th International Conference on Cloud Computing (CLOUD 2012), pp. 392–399. IEEE (2012)
Paraiso, F., Merle, P., Seinturier, L.: soCloud: A service-oriented component-based PaaS for managing portability, provisioning, elasticity and high availability across multiple clouds. Special Issue on Cloud Computing, Computing Journal, Springer (To appear) (2015)
Seinturier, L., Merle, P., Fournier, D., Dolet, N., Schiavoni, V., Stefani, J.B.: Reconfigurable SCA applications with the FraSCAti platform. In: IEEE International Conference on Services Computing (SCC 2009), pp. 268–275. IEEE (2009)
Seinturier, L., Merle, P., Rouvoy, R., Romero, D., Schiavoni, V., Stefani, J.B.: A component-based middleware platform for reconfigurable service-oriented architectures. Softw. Pract. Exp. 42(5), 559–583 (2012)
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Sys. Archit. (JSA) 55(4), 211–223 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ouedraogo, W.F., Biennier, F., Merle, P. (2015). Contextualised Security Operation Deployment Through MDS@run.time Architecture. In: Toumani, F., et al. Service-Oriented Computing - ICSOC 2014 Workshops. Lecture Notes in Computer Science(), vol 8954. Springer, Cham. https://doi.org/10.1007/978-3-319-22885-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-22885-3_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22884-6
Online ISBN: 978-3-319-22885-3
eBook Packages: Computer ScienceComputer Science (R0)