Proceedings of the 17th International Joint Conference on E-Business and Telecommunications 2020
DOI: 10.5220/0009822600980109
|View full text |Cite
|
Sign up to set email alerts
|

Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems

Abstract: Security assurance provides a wealth of techniques to demonstrate that a target system holds some nonfunctional properties and behaves as expected. These techniques have been recently applied to the cloud ecosystem, while encountering some critical issues that reduced their benefit when hybrid systems, mixing public and private infrastructures, are considered. In this paper, we present a new assurance framework that evaluates the trustworthiness of hybrid systems, from traditional private networks to public cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

4
1

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Assurance frameworks have recently received increasing attention as the means to gain justifiable confidence that IT systems will consistently demonstrate one or more security (non-functional in a broader sense) properties, and behave as expected [20], [23]. Anisetti et al [20] presented an assurance framework for test-based cloud certification, which has then been extended for hybrid systems mixing cloud and private infrastructures [24]. Aslam et al [25] presented FoNAC, an audit and certification framework targeting fog computing and based on Trusted Platform Modules.…”
Section: Related Workmentioning
confidence: 99%
“…Assurance frameworks have recently received increasing attention as the means to gain justifiable confidence that IT systems will consistently demonstrate one or more security (non-functional in a broader sense) properties, and behave as expected [20], [23]. Anisetti et al [20] presented an assurance framework for test-based cloud certification, which has then been extended for hybrid systems mixing cloud and private infrastructures [24]. Aslam et al [25] presented FoNAC, an audit and certification framework targeting fog computing and based on Trusted Platform Modules.…”
Section: Related Workmentioning
confidence: 99%
“…Security assurance is defined as the mean to obtain justifiable confidence that an IT system behaves as expected demonstrating some non-functional properties (e.g., confidentiality) [3]. In the last decade, assurance has become a well-established practice, increasing the trustworthiness of service and cloud systems [3], with some methodologies addressing hybrid clouds [6] and edge systems [5]. However, hybrid cloud/edge and IoT systems raise some significant challenges, impairing the effectiveness of state of art solutions.…”
Section: Challenges and Requirements A Challengesmentioning
confidence: 99%
“…We present a framework that provides a lightweight assurance solution addressing the peculiarities of modern distributed systems, mixing public endpoints on the cloud, microservices, and private deployments not directly reachable from the outside (e.g., traditional private corporate networks and private clouds). The framework has been first defined in [4] and here extended to address requirements complementarity and automation. The original framework in [4], offering only a graphical dashboard, constrained the ability to integrate framework's functionalities with existing security processes, and to trigger such functionalities in a automated way.…”
Section: Assurance Frameworkmentioning
confidence: 99%
“…The framework has been first defined in [4] and here extended to address requirements complementarity and automation. The original framework in [4], offering only a graphical dashboard, constrained the ability to integrate framework's functionalities with existing security processes, and to trigger such functionalities in a automated way. To address all requirements in Section 2, it adopts a layer-3 VPN that connects the framework with the private deployments under verification (i.e., the target networks), and offers a REST API providing full and programmatic access to framework's functionalities.…”
Section: Assurance Frameworkmentioning
confidence: 99%
See 1 more Smart Citation