Cloud-based architectures, services and resources are growing up in complexity day by day. Composition and Orchestration deal with the problem of creating complex services promoting reuse and optimal allocation of resources but many security issues arise complicating the work of designers. Even if any composing elements in a composition meets security requirements, the composite service may not. In order to reduce design and developing complexity, Big Vendors and scientific literature promote Composition by Patterns. In this work we present a Model Driven Engineering methodology that addresses validation and verification of security requirements by using formal methods and model transformation algorithms. We show how our model driven approach enables the specification of requirements at design phase and how it allows for verification of security requirements.

Model driven design and evaluation of security level in orchestrated cloud services

Moscato, Francesco
2018-01-01

Abstract

Cloud-based architectures, services and resources are growing up in complexity day by day. Composition and Orchestration deal with the problem of creating complex services promoting reuse and optimal allocation of resources but many security issues arise complicating the work of designers. Even if any composing elements in a composition meets security requirements, the composite service may not. In order to reduce design and developing complexity, Big Vendors and scientific literature promote Composition by Patterns. In this work we present a Model Driven Engineering methodology that addresses validation and verification of security requirements by using formal methods and model transformation algorithms. We show how our model driven approach enables the specification of requirements at design phase and how it allows for verification of security requirements.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4782507
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 22
  • ???jsp.display-item.citation.isi??? 15
social impact