Home // International Journal On Advances in Security, volume 12, numbers 1 and 2, 2019 // View article
Protecting Deployment Models in Collaborative Cloud Application Development
Authors:
Vladimir Yussupov
Ghareeb Falazi
Michael Falkenthal
Frank Leymann
Keywords: Collaboration; Security Policy; Confidentiality; Integrity; Deployment Model; Deployment Automation; TOSCA
Abstract:
Profitability of industrial processes today depends on well-timed utilization of new technologies. Development of cloud applications combining cross-domain knowledge from multiple collaborating parties is one common way to enhance manufacturing. Often, such collaborations are not centralized due to outsourcing or rearrangements in organizational structures. Moreover, manual deployment inefficiency and intellectual property issues further tangle the development process of such applications. While the development of deployment models obviates the necessity to manually deploy applications, a way to protect sensitive data in exchanged deployment models is still needed. In this work, we describe the specifics of modeling and enforcement of security requirements for deployment models in the context of decentralized collaborative cloud application development. We provide a stepwise demonstration of how security requirements can be specified and enforced in a collaborative development scenario based on the TOSCA cloud standard. Furthermore, we conceptualize the system architecture, provide details about the implementation of certain approach-specific operations, and discuss the limitations of the approach. Finally, we show the feasibility of the presented concepts via an open-source prototype.
Pages: 79 to 94
Copyright: Copyright (c) to authors, 2019. Used with permission.
Publication date: June 30, 2019
Published in: journal
ISSN: 1942-2636