Self-adaptive Authorisation in OpenStack Cloud Platform

da Silva, Carlos Eduardo and Diniz, Thomas and Cacho, Nelio and de Lemos, Rogerio (2018) Self-adaptive Authorisation in OpenStack Cloud Platform. Journal of Internet Services and Applications, 9 (19). ISSN 1867-4828. E-ISSN 1869-0238. (In press) (doi:https://doi.org/10.1186/s13174-018-0090-7) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)

PDF - Publisher pdf

Creative Commons Licence
This work is licensed under a Creative Commons Attribution 4.0 International License.
Download (1MB) Preview
[img]
Preview
PDF - Author's Accepted Manuscript
Restricted to Repository staff only
Contact us about this Publication Download (566kB)
[img]
Official URL
http://dx.doi.org/10.1186/s13174-018-0090-7

Abstract

Although major advances have been made in protection of cloud platforms against malicious attacks, little has been done regarding the protection of these platforms against insider threats. This paper looks into this challenge by introducing self-adaptation as a mechanism to handle insider threats in cloud platforms, and this will be demonstrated in the context of OpenStack. OpenStack is a popular cloud platform that relies on Keystone, its identity management component, for controlling access to its resources. The use of self-adaptation for handling insider threats has been motivated by the fact that self-adaptation has been shown to be quite effective in dealing with uncertainty in a wide range of applications. Insider threats have become a major cause for concern since legitimate, though malicious, users might have access, in case of theft, to a large amount of information. The key contribution of this paper is the definition of an architectural solution that incorporates self-adaptation into OpenStack Keystone in order to handle insider threats. For that, we have identified and analysed several insider threats scenarios in the context of the OpenStack cloud platform, and have developed a prototype that was used for experimenting and evaluating the impact of these scenarios upon the self-adaptive authorisation system for the cloud platforms.

Item Type: Article
Uncontrolled keywords: Access Control, Cloud Computing, Insider Threats, OpenStack, Self-adaptive Systems
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming, > QA76.76 Computer software
Divisions: Faculties > Sciences > School of Computing
Faculties > Sciences > School of Computing > Security Group
Depositing User: Rogerio de Lemos
Date Deposited: 29 Jun 2018 10:23 UTC
Last Modified: 08 Oct 2018 10:05 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/67437 (The current URI for this page, for reference purposes)
de Lemos, Rogerio: https://orcid.org/0000-0002-0281-6308
  • Depositors only (login required):

Downloads

Downloads per month over past year