{"title":"利用安全度量实现云服务中的远程安全监控","authors":"R. Savola, Jukka Ahola","doi":"10.1109/ICAICT.2012.6398469","DOIUrl":null,"url":null,"abstract":"Large amounts of business-critical data are transferred, processed and stored in cloud services, raising concerns about their security level. Adequate security management of cloud services is vital to their success. Systematically developed and maintained security metrics can be used to offer evidence of the security effectiveness of cloud services. We propose a metrics based approach for remote security correctness monitoring in the Cloud. The approach was investigated by building a monitoring system within an experimental cloud system set-up. Moreover, we discuss how risk-driven security metrics modeling based on the decomposition of security objectives is used to manage monitoring activities.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Towards remote security monitoring in cloud services utilizing security metrics\",\"authors\":\"R. Savola, Jukka Ahola\",\"doi\":\"10.1109/ICAICT.2012.6398469\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Large amounts of business-critical data are transferred, processed and stored in cloud services, raising concerns about their security level. Adequate security management of cloud services is vital to their success. Systematically developed and maintained security metrics can be used to offer evidence of the security effectiveness of cloud services. We propose a metrics based approach for remote security correctness monitoring in the Cloud. The approach was investigated by building a monitoring system within an experimental cloud system set-up. Moreover, we discuss how risk-driven security metrics modeling based on the decomposition of security objectives is used to manage monitoring activities.\",\"PeriodicalId\":221511,\"journal\":{\"name\":\"2012 6th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 6th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2012.6398469\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2012.6398469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards remote security monitoring in cloud services utilizing security metrics
Large amounts of business-critical data are transferred, processed and stored in cloud services, raising concerns about their security level. Adequate security management of cloud services is vital to their success. Systematically developed and maintained security metrics can be used to offer evidence of the security effectiveness of cloud services. We propose a metrics based approach for remote security correctness monitoring in the Cloud. The approach was investigated by building a monitoring system within an experimental cloud system set-up. Moreover, we discuss how risk-driven security metrics modeling based on the decomposition of security objectives is used to manage monitoring activities.