Risk Propagation of Security SLAs in the Cloud (M. Hale & R. Gamble) was presented by Matt Hale at the IEEE Globecom workshop for Management and Security technologies for Cloud Computing. This work represents an initial step towards embedding risk into SLAs for the purpose of organizational awareness and acceptance. More specifically the paper establishes an algorithmic process for handling dynamic risk evaluations in the cloud. This novel risk evaluation and renegotiation algorithm handles cases where service providers alter their terms of service or can no longer meet their SLA-bound security parameters. In such events, the algorithm searches for alternative services, selects the lowest risk, most compatible replacement and calculates and informs previous services, all the way back to the original requester, of the updated risk valuations.

It sparked a series of discussions with other researches in the field and was a great experience overall.

A Tiered Strategy for Auditing in the Cloud (R. Xie & R. Gamble) was part of the work-in-progress presentations at IEEE CLOUD 2012. This work documented initial scoping rules for audit assets formed within the cloud. An example compilation process showed how the audit assets can be filtered and combined within and across scopes to provide specific perspectives of audit trails to detect temporal behaviors related to attack patterns.  The work initiated discussion on the accumulation and use of audit asset from foreign clouds as part of a federation, tying into the SecAgreement work to establish expectations of cloud responses as part of an SLA. Work to combine these two areas has begun.

Architecting Web Service Attack Detection Handlers (A. Andrekanic & R. Gamble) was presented in the research track at ICWS 2012 and described the  design, implementation, and evaluation of two attack handler architectures. The handlers reside locally at the web service to intercept messages and detect the potential for specific forms of attacks. The detection generates a detailed SOAP fault that can be logged locally at the service for later determination of problems within a web service composition. XML rewriting and DoS attacks are addressed. After the talk, Dr. Gamble met with Christian Mainka (Hst Gortz Institute for IT-Security (HGI) at Ruhr-University Bochum, Germany) whose work on WS penetration testing can be applied to the the services with attack handlers to see if the detection mechanism responds appropriately. This testing will begin in the fall as an extension to the WS attack detection research.

© SEAT 2012 Software Engineering Architecture Team Suffusion theme by Sayontan Sinha