You are not logged in.

Improving tenants' trust in SaaS applications using dynamic security monitors

Abdelrazek, Mohamed Almorsy, Grundy, John and Ibrahim, Amani S. 2015, Improving tenants' trust in SaaS applications using dynamic security monitors, in ICECCS 2015 : Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, IEEE, Piscataway, N.J., pp. 70-79, doi: 10.1109/ICECCS.2015.18.

Attached Files
Name Description MIMEType Size Downloads

Title Improving tenants' trust in SaaS applications using dynamic security monitors
Author(s) Abdelrazek, Mohamed Almorsy
Grundy, John
Ibrahim, Amani S.
Conference name Engineering of Complex Computer Systems. International Conference (20th : 2015 : Gold Coast, Queensland)
Conference location Gold Coast, Queensland
Conference dates 9-12 Dec. 2015
Title of proceedings ICECCS 2015 : Proceedings of the 20th International Conference on Engineering of Complex Computer Systems
Publication date 2015
Start page 70
End page 79
Total pages 10
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) security monitoring
security metrics
run-time verification
cloud computing monitoring
Summary It is almost impossible to prove that a given software system achieves an absolute security level. This becomes more complicated when addressing multi-tenant cloud-based SaaS applications. Developing practical security properties and metrics to monitor, verify, and assess the behavior of such software systems is a feasible alternative to such problem. However, existing efforts focus either on verifying security properties or security metrics but not both. Moreover, they are either hard to adopt, in terms of usability, or require design-time preparation to support monitoring of such security metrics and properties which is not feasible for SaaS applications. In this paper, we introduce, to the best of our knowledge, the first unified monitoring platform that enables SaaS application tenants to specify, at run-time, security metrics and properties without design-time preparation and hence increases tenants’ trust of their cloud-assets security. The platform automatically converts security metrics and properties specifications into security probes and integrates them with the target SaaS application at run-time. Probes-generated measurements are fed into an analysis component that verifies the specified properties and calculates security metrics’ values using aggregation functions. This is then reported to SaaS tenants and cloud platform security engineers. We evaluated our platform expressiveness and usability, soundness, and performance overhead.
ISBN 9781467385817
Language eng
DOI 10.1109/ICECCS.2015.18
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30082724

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 64 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Fri, 01 Jul 2016, 20:01:04 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.