The Community for Technology Leaders
2016 IEEE International Conference on Services Computing (SCC) (2016)
San Francisco, CA, USA
June 27, 2016 to July 2, 2016
ISBN: 978-1-5090-2629-6
pp: 324-331
Unpredictability of cloud computing due to segregation of visibility and control between applications, data owners, and cloud providers increases tenants' uncertainty when using cloud services. Adaptation techniques become fundamental to provide a reliable cloud-based infrastructure with definite behavior, which preserves a stable quality of service for tenants. Existing adaptation techniques mostly focus on performance properties and are based on unverifiable evidence, which is collected in an untrusted way. In this paper, we propose a security-oriented adaptation technique for the cloud, based on evidence collected by means of a reliable certification process. Our approach adapts the cloud to maintain stable security properties over time, by continuously verifying certificate validity. It uses the output of verification activities to index a feature model, where equivalent configurations are used as the basis for adaptation. We also provide an analysis of the approach on British Telecommunications (BT) premises.
Cloud computing, Adaptation models, Encryption, Mechanical factors, Data models, Memory

C. A. Ardagna, R. Asal, E. Damiani, N. El Ioini, C. Pahl and T. Dimitrakos, "A Certification Technique for Cloud Security Adaptation," 2016 IEEE International Conference on Services Computing (SCC), San Francisco, CA, USA, 2016, pp. 324-331.
285 ms
(Ver 3.3 (11022016))