Security SLA Based Monitoring in Clouds

Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due to their criticality for their customers. In order to speed up their adoption by service providers and consumers and to make them more actionable, security SLAs monitoring should be described in a machine-processable, agile and extensible way. Several tools for SLA management are available on the market but most deal with performance metrics and do not refer to security properties. There are other tools for monitoring cloud security, in a non-SLA way. However, they are not associated with SLA management systems. We propose an extension to an SLA language (i.e., rSLA) to enable the description of security requirements in an SLA document. We also extend the rSLA framework by a security methodology that makes use of known tools and that enables continuously checking that the security requirements are respected during runtime according to the SLA document.

Original languageEnglish
Title of host publicationProceedings - 2017 IEEE 1st International Conference on Edge Computing, EDGE 2017
EditorsAndrzej M Goscinski, Min Luo
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages90-97
Number of pages8
ISBN (Electronic)9781538620175
DOIs
Publication statusPublished - 7 Sept 2017
Externally publishedYes
Event1st IEEE International Conference on Edge Computing, EDGE 2017 - Honolulu, United States
Duration: 25 Jun 201730 Jun 2017

Publication series

NameProceedings - 2017 IEEE 1st International Conference on Edge Computing, EDGE 2017

Conference

Conference1st IEEE International Conference on Edge Computing, EDGE 2017
Country/TerritoryUnited States
CityHonolulu
Period25/06/1730/06/17

Keywords

  • Cloud Security Monitoring
  • SLA
  • Security Level Agreement
  • Security Monitoring

Fingerprint

Dive into the research topics of 'Security SLA Based Monitoring in Clouds'. Together they form a unique fingerprint.

Cite this