SlideShare a Scribd company logo
1 of 1
Download to read offline
Optimized Off-line Risk Assessment Framework for Cloud Service Providers
REU Students: Ashley Painter*, Joshua Haupt˜, Matthew Hall ° PhD Student: Amartya Sen*
Faculty Advisor: Dr. Sanjay Madria*
To determine whether or not an application
should be migrated on to a cloud service
provider (CSP) there are three things that are
needed
• An analysis of an application
• An analysis of the various aspects of
services provided by a CSP
• A cost benefit tradeoff analysis to evaluate
the efficiency of migration in terms of
security and monetary benefits
INTRODUCTION
REFERENCES
• To develop security rating framework to
rate each entities of an application along
the lines of Confidentiality(C), Integrity(I),
& Availability(A), along with the
introduction of a new attribute,
“criticality”(Cr).
• To break down an SLA based on certain
categories like, security & privacy,
availability, and to grade them on a point
based scale as per the information
presented in an SLA.
• To perform a cost-benefit tradeoff analysis
considering the different available CSPs
with regards to the cost and security
benefits gained from hosting different
entities of an application on them.
OBJECTIVES
Application Analysis Framework SLA Grading Framework Cost benefit tradeoff Analysis
Framework
FUTURE WORK
BACKGROUND
The proposed methodology relies
on a framework consisting of eight
categories [2] which are listed
below,
•Availability
•Compensation
•Scalability
•Security and Privacy
•Performance
•Understanding of Costs
•Ease of configuration
•Compatibility
Each category is scored on a point
based system from 0 to 5 based on
how it is presented in the SLA.
[1] S Madria and A Sen "Offline Risk Assessment of Cloud Service Providers." Cloud
Computing, IEEE 2.3 (2015): 50-57.
[2] Alhamad, Mohammed, Tharam Dillon, and Elizabeth Chang. "Conceptual SLA
framework for cloud computing." Digital Ecosystems and Technologies (DEST), 2010 4th
IEEE International Conference on. IEEE, 2010.
[3] D Dhillon"Developer-driven threat modeling: Lessons learned in the trenches." IEEE
Security & Privacy 4 (2011): 41-47
[4] Ajeh, D Edache, J Ellman, and S Keogh. "A Cost Modelling System for Cloud
Computing." Computational Science and Its Applications (ICCSA), 2014 14th International
Conference on. IEEE, 2014.
This work stems from the previous work
of offline risk assessment of Cloud
Service Provider [1]. The previous work
however did not recommend a final
migration strategy for an application or a
way to evaluate entities in a DFD with their
relationships to other entities and the type
of information they handle. It also did not
recommend a way to rate CSP’s by their
SLA’s.
* Computer Science, MS&T °Computer Science, Humboldt State University ˜Computer Science, Southern Illinois University Edwardsville
•First Record the cost difference for Total
Cost of Ownership (TCO) and Cost of
Cloud Storage (CCS) for all components
of an application on all the perspective
CSPs [4].
•A cost matrix A is mXn
•m is the number of storage option for a
component (Cloud A, Cloud B, etc..)
and the last row ( 𝑨 𝒎) has TCO for each
component.
•n is the number of different entities in
the application.
• 𝑨𝒊𝒋 is the price of storing entity 𝒊 on cloud
𝒋
•Difference matrix D comes from 𝑻: 𝑨 → 𝑫
where 𝑫𝒊𝒋 = 𝑨𝒊𝒎 − 𝑨𝒊𝒋
𝒇𝒐𝒓 𝟎 ≤ 𝒊 ≤ 𝒎; 𝟎 ≤ 𝒋 ≤ 𝒏
•Now consider security coverage
differences of each component on a cloud
versus stored on private hardware in:
technical impact, required privilege,
business impact.
•With these attributes scored for each
weakness on each CSP, a similar matrix to
the difference matrix above is computed.
The values of the two matrixes are scaled
independently by column and added
together.
•The max. value in each column
determines the destination for an entity to
migrate if it’s values of cost and security
difference were both positive.
•The framework evaluates each
entity in a DFD of an application
for C,I,A,Cr in two directions data
flowing into and out of the entity
[3].
•It does this by translating the
DFD into a weighted directed
graph with several specialized
types of nodes based off what the
entity is doing with the data.
•It evaluates the individual nodes
with respect to the type of data
they’re handling, the type of node,
and its relationship with other
nodes.
•Develop a generalized equation for the Cost benefit tradeoff Analysis so that it can be automated
•Develop additional categories and expand the SLA Grading Framework
•Test the equation for local area for the effect of changing the log base
•Implement the three frameworks and integrate it with current off-line risk assessment tool
Figure. 1: Depicts the different aspects of the Optimized Offline Risk Assessment Framework

More Related Content

Similar to REU-Poster

A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...IJAAS Team
 
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
 
Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYEditor Jacotech
 
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...Maha Kadadha
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Niggasudhanshu345mishra
 
NIST CCRA.pptx for cloud computing and virtualization
NIST CCRA.pptx for cloud computing and virtualizationNIST CCRA.pptx for cloud computing and virtualization
NIST CCRA.pptx for cloud computing and virtualizationgmgkigaocwmxvbipfw
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixJohn Yeoh
 
Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3ijccsa
 
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...IJERA Editor
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 

Similar to REU-Poster (20)

A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
 
Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Nigga
 
NIST CCRA.pptx for cloud computing and virtualization
NIST CCRA.pptx for cloud computing and virtualizationNIST CCRA.pptx for cloud computing and virtualization
NIST CCRA.pptx for cloud computing and virtualization
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 
Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3
 
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 

REU-Poster

  • 1. Optimized Off-line Risk Assessment Framework for Cloud Service Providers REU Students: Ashley Painter*, Joshua Haupt˜, Matthew Hall ° PhD Student: Amartya Sen* Faculty Advisor: Dr. Sanjay Madria* To determine whether or not an application should be migrated on to a cloud service provider (CSP) there are three things that are needed • An analysis of an application • An analysis of the various aspects of services provided by a CSP • A cost benefit tradeoff analysis to evaluate the efficiency of migration in terms of security and monetary benefits INTRODUCTION REFERENCES • To develop security rating framework to rate each entities of an application along the lines of Confidentiality(C), Integrity(I), & Availability(A), along with the introduction of a new attribute, “criticality”(Cr). • To break down an SLA based on certain categories like, security & privacy, availability, and to grade them on a point based scale as per the information presented in an SLA. • To perform a cost-benefit tradeoff analysis considering the different available CSPs with regards to the cost and security benefits gained from hosting different entities of an application on them. OBJECTIVES Application Analysis Framework SLA Grading Framework Cost benefit tradeoff Analysis Framework FUTURE WORK BACKGROUND The proposed methodology relies on a framework consisting of eight categories [2] which are listed below, •Availability •Compensation •Scalability •Security and Privacy •Performance •Understanding of Costs •Ease of configuration •Compatibility Each category is scored on a point based system from 0 to 5 based on how it is presented in the SLA. [1] S Madria and A Sen "Offline Risk Assessment of Cloud Service Providers." Cloud Computing, IEEE 2.3 (2015): 50-57. [2] Alhamad, Mohammed, Tharam Dillon, and Elizabeth Chang. "Conceptual SLA framework for cloud computing." Digital Ecosystems and Technologies (DEST), 2010 4th IEEE International Conference on. IEEE, 2010. [3] D Dhillon"Developer-driven threat modeling: Lessons learned in the trenches." IEEE Security & Privacy 4 (2011): 41-47 [4] Ajeh, D Edache, J Ellman, and S Keogh. "A Cost Modelling System for Cloud Computing." Computational Science and Its Applications (ICCSA), 2014 14th International Conference on. IEEE, 2014. This work stems from the previous work of offline risk assessment of Cloud Service Provider [1]. The previous work however did not recommend a final migration strategy for an application or a way to evaluate entities in a DFD with their relationships to other entities and the type of information they handle. It also did not recommend a way to rate CSP’s by their SLA’s. * Computer Science, MS&T °Computer Science, Humboldt State University ˜Computer Science, Southern Illinois University Edwardsville •First Record the cost difference for Total Cost of Ownership (TCO) and Cost of Cloud Storage (CCS) for all components of an application on all the perspective CSPs [4]. •A cost matrix A is mXn •m is the number of storage option for a component (Cloud A, Cloud B, etc..) and the last row ( 𝑨 𝒎) has TCO for each component. •n is the number of different entities in the application. • 𝑨𝒊𝒋 is the price of storing entity 𝒊 on cloud 𝒋 •Difference matrix D comes from 𝑻: 𝑨 → 𝑫 where 𝑫𝒊𝒋 = 𝑨𝒊𝒎 − 𝑨𝒊𝒋 𝒇𝒐𝒓 𝟎 ≤ 𝒊 ≤ 𝒎; 𝟎 ≤ 𝒋 ≤ 𝒏 •Now consider security coverage differences of each component on a cloud versus stored on private hardware in: technical impact, required privilege, business impact. •With these attributes scored for each weakness on each CSP, a similar matrix to the difference matrix above is computed. The values of the two matrixes are scaled independently by column and added together. •The max. value in each column determines the destination for an entity to migrate if it’s values of cost and security difference were both positive. •The framework evaluates each entity in a DFD of an application for C,I,A,Cr in two directions data flowing into and out of the entity [3]. •It does this by translating the DFD into a weighted directed graph with several specialized types of nodes based off what the entity is doing with the data. •It evaluates the individual nodes with respect to the type of data they’re handling, the type of node, and its relationship with other nodes. •Develop a generalized equation for the Cost benefit tradeoff Analysis so that it can be automated •Develop additional categories and expand the SLA Grading Framework •Test the equation for local area for the effect of changing the log base •Implement the three frameworks and integrate it with current off-line risk assessment tool Figure. 1: Depicts the different aspects of the Optimized Offline Risk Assessment Framework