Skip to main content

MUlti-cloud Secure Applications

Deliverables

Communication Plan

[The specific plan for communication will define the way in which the different communities (scientific, commercial, general public) will be targeted, as well as the social media will be used.]

Final dissemination, communication, and networking report

[Towards project end, the deliverable D6.6 will be updated on a constant basis to be concluded in the final report for the dissemination, communication and networking activities.]

Results of final evaluation of MUSA framework.

[This report includes specification of the evaluation criteria and the result of the second evaluation of the technical work packages. This evaluation will be based on a arger set of functional prototypes, and therefore give advice on the more practical issues related to these compared to the evaluation in phase 1. It will also contain recommendations to WP1-4, and material for WP6 and WP7. This report also contains recommendations for post project deployment of MUSA and continued development of MUSA methods and tools.]

Results of first evaluation of MUSA framework.

[This report includes specification of the evaluation criteria and the result of the first evaluation of the technical work packages. This evaluation will mainly focus on the initial specifications and modules prototypes. It will also contain recommendations to WP1-4, and material for WP6 and WP7.]

Dissemination Strategy

[This deliverable will detail the plan for the project dissemination strategy to be adopted throughout the project lifetime. The release of the respective report is considered one of the key milestones of the project.]

Initial market study, trends, segmentation and requirements

[This document presents the initial findings from the market analysis task. It will identify important trends and requirements from the market which will need to be reflected in the technical development and will feed into the business scenarios document]

Networking Plan

[This plan will detail the specific plan for networking activities with external entities, including the specific working group this project will participate. The activities for the reporting period will be part of the Dissemination and collaboration report.]

Initial MUSA framework specification.

[Provides the initial overall architecture of MUSA framework, and the base scenarios and requirements for methods and tools.]

Final data management report

[Towards project end, the deliverable D6.7 will be updated in the final report for data management activities in the project, as per the H2020 reporting guidelines.]

Standards analysis and strategy plan

[This deliverable will present the most relevant standards for a solution like MUSA and a strategy of how they can be adopted and included in MUSA]

Final MUSA framework specification and guide.

[Provides the final version of the architecture of MUSA framework, scenarios and requirements addressing the results of the evaluation. The document includes the final version of the guideline of recommended SbD practices, security mechanisms and tools.]

MUSA case studies work plan.

[This report includes a detailed description of the two business case studies, the specific requirements for the business implementations, the specification of the evaluation criteria and the work plan for carrying out the evaluation of MUSA framework in business settings.]

Dissemination, communication and networking report

[This deliverable will explain the dissemination and communication activities followed during the reporting period as well as the results from these activities and will update project’s dissemination and communication plan respectively. This report will also contain the relevant activities executed to foster a close collaboration with projects related to MUSA, as well as future networking plans.]

Standards adoption report

[This report will rely on the decisions taken to adopt or not the different standards. Depending on the relevancy of the obtained results, the consortium will evaluate the necessity of performing liaison activities with standardisation bodies for proposing a potential extension]

Revised standards strategy plan

[This report will document on the progress of the adoption of the different standards within MUSA tools and methods and will also analyse which other standards have appeared in the context of the project so as to analyse how they could be included in MUSA.]

Business scenarios analysis

[This document will explore the potential implementation routes for the MUSA results, describing the value chain, delivery options, and above all, potential business models for the exploitation of results.]

Guide security management in multi-cloud applications lifecycle

[This report includes a detailed description of the recommended SbD practices and security mechanisms that MUSA offers to support security in multi-cloud applications.]

Initial MUSA framework implementation

[Provides the initial version of the MUSA software framework including the result of the continuous integration of the tools developed in WP2-WP4.]

Initial security based discovery and composition mechanisms and tools.

[Initial version of the security based cloud resources discovery and composition mechanisms and tools.]

Initial secure multi-cloud deployment mechanisms and tools.

[Initial version of the security based multi-cloud deployment mechanisms and tools.]

Initial security assurance mechanisms and tools.

[Initial version of the security assurance techniques and tools including data security assessment and enforcement libraries.].

Initial SbD methods for multi-cloud applications.

[This report includes the initial description of the mechanisms and tools that MUSA offers to define the security constraints in multi-cloud application components and in the composed SLA in order they can be monitored at runtime for a self-protective modus operandi.]

Initial MUSA IDE for security-aware design of multi-cloud applications.

[Provides the initial software version of the MUSA IDE that includes tools and plug-ins for the support of (a) SLA specification and composition of security requirements together with functional needs, (b) multi-cloud secure application components design, and (c) embedding the security needs inside the application software following a non-intrusive approach]

Initial MUSA security Assurance Platform.

[Initial design of the MUSA Security Assurance Platform integrating different assurance methods and tools and an accompanying status report listing the development status of the different features.].

Final MUSA Security Assurance Platform and user manual.

[Revised version of the MUSA Security Assurance Platform design and implementation integrating different assurance methods and tools and an accompanying user manual.].

Final MUSA framework implementation.

[Provides the final version of the MUSA software framework addressing the feedback of the evaluation. The final version includes the user manuals of the tools and services embedded in the framework.]

Final security based discovery and composition mechanisms and tools.

[Final version of the security based cloud resources discovery and composition mechanisms and tools and also includes the corresponding user manual.]

Final MUSA IDE for security-aware design of multi-cloud applications.

[Provides the final software version of the MUSA IDE that includes tools and plugins for the support of (a) SLA specification and composition of security requirements together with functional needs, (b) multi-cloud secure application components design, and (c) embedding the security needs inside the application software following a non-intrusive approach]

Final SbD methods for multi-cloud applications.

[This report includes a final version of the description of the mechanisms and tools that MUSA offers to define the security constraints in multi-cloud application components and in the composed SLA in order they can be monitored at runtime for a self-protective modus operandi.]

Final security assurance mechanisms and tools.

[Final version of the security assurance techniques and tools including data security assessment and enforcement libraries.].

Final secure multi-cloud deployment mechanisms and tools.

[Final version of the security based multi-cloud deployment mechanisms and tools and also includes the corresponding user manual.]

MUSA brochure and public website

[The initial version of the brochure and project website will include at least project objectives and contact details. MUSA website will be continuously enhanced by all partners to include public downloadable results and links to related news and initiatives]

Data Management Plan

[Plan detailing what data the project will generate, whether and how it will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.]

Data management report

[This deliverable will include the report on data management activities in the period and will update project’s data management plan if needed.]

Publications

Research and innovation challenges in data protection, security and privacy in the cloud: Map of synergies of the clustered projects - version 2.0

Author(s): Gallego-Nicasio Crespo, Beatriz; Prieto, Elsa; Rios, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas
Published in: DPSP Cluster website, Issue 4, 2016
DOI: 10.13140/RG.2.2.22406.37444

Providing an access control layer to web-based applications for the industrial domain

Author(s): Samuel Olaiya Afolaranmi, Borja Ramis Ferrer, Wael M. Mohammed, Jose L. Martinez Lastra, Mussawar Ahmad, Robert Harrison
Published in: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN), 2017, Page(s) 1096-1102
DOI: 10.1109/INDIN.2017.8104926

Self-healing Multi-Cloud Application Modelling

Author(s): Erkuden Rios, Eider Iturbe, Maria Carmen Palacios
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-9
DOI: 10.1145/3098954.3104059

Dynamic security assurance in multi-cloud DevOps

Author(s): Erkuden Rios, Eider Iturbe, Wissam Mallouli and Massimiliano Rak
Published in: IEEE Conference on Communications and Network Security (CNS), 2018

Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection

Author(s): Pamela Carvalllo, Ana R. Cavalli, Natalia Kushik
Published in: Proceedings of the 12th International Conference on Software Technologies, 2017, Page(s) 480-487
DOI: 10.5220/0006480904800487

SLA-Based Continuous Security Assurance in Multi-Cloud DevOps

Author(s): Rios, Erkuden; Rak, Massimiliano; Iturbe, Eider; Mallouli, Wissam
Published in: Issue 2, 2017

Principles and risk assessment of managing distributed ontologies hosted by embedded devices for controlling industrial systems

Author(s): Borja Ramis Ferrer, Samuel Olaiya Afolaranmi and Jose L. Martinez Lastra
Published in: Conference of The IEEE Industrial and Electronics Society, 2017

A Security Metric Catalogue for Cloud Applications

Author(s): Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano
Published in: 2017, Page(s) 854-863
DOI: 10.1007/978-3-319-61566-0_81

Processing mobility traces for activity recognition in smart cities

Author(s): Syed Arsalan Shah, Petr Belyaev, Borja Ramis Ferrer, Wael M. Mohammed and Jose L. Martinez Lastra.
Published in: International Workshop on Service-Oriented Cyber-Physical Systems in Converging Networked Environments, 2017

A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services

Author(s): Valentina Casola, Alessandra de Benedictis, Madalina Erascu, Massimiliano Rak, Umberto Villano
Published in: 2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), 2016, Page(s) 549-554
DOI: 10.1109/CISIS.2016.116

Scoring cloud services through digital ecosystem community analysis

Author(s): Jaume Ferrarons, Smrati Gupta, Victor Muntés-Mulero, Josep-Lluis Larriba-Pey, Peter Matthews
Published in: Conference of E-Commerce and Web Technologies -, EC-Web 2016. Lecture Notes in Business Information Processing Series., 2017, Page(s) 142-153
DOI: 10.1007/978-3-319-53676-7_11

Cloud Security: From Per-Provider to Per-Service Security SLAs

Author(s): Alessandra De Benedictis, Valentina Casola, Massimiliano Rak, Umberto Villano
Published in: 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2016, Page(s) 469-474
DOI: 10.1109/INCoS.2016.61

An Automatic Tool for Benchmark Testing of Cloud Applications

Author(s): Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano
Published in: Proceedings of the 7th International Conference on Cloud Computing and Services Science, 2017, Page(s) 729-736
DOI: 10.5220/0006379507290736

Secure microGRID in cloud: The CoSSMic Case Study

Author(s): Massimiliano Rak, Salvatore Venticinque
Published in: 12th International Conference on Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science, vol 10232., 2017, Page(s) 759-772
DOI: 10.1007/978-3-319-57186-7_55

Towards Model-Based Security Assessment of Cloud Applications

Author(s): Valentina Casola, Alessandra De Benedictis, Roberto Nardone
Published in: 12th International Conference on Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science, vol 10232., 2017, Page(s) 773-785
DOI: 10.1007/978-3-319-57186-7_56

Security Assurance of (Multi-)Cloud Application with Security SLA Composition

Author(s): Massimiliano Rak
Published in: 12th International Conference on Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science, vol 10232., 2017, Page(s) 786-799
DOI: 10.1007/978-3-319-57186-7_57

Multi-cloud Applications Security Monitoring

Author(s): Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios
Published in: 12th International Conference on Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science, vol 10232., 2017, Page(s) 748-758
DOI: 10.1007/978-3-319-57186-7_54

Security-Centric Evaluation Framework for IT Services

Author(s): Smrati Gupta, Jaume Ferrarons-Llagostera, Jacek Dominiak, Victor Muntés-Mulero, Peter Matthews, Erkuden Rios
Published in: 12th International Conference on Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science, vol 10232., 2017, Page(s) 736-747
DOI: 10.1007/978-3-319-57186-7_53

A platform for security monitoring of multi-cloud applications

Author(s): Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli
Published in: The A.P. Ershov Informatics Conference, the 11th edition of PSI Conference Series., 2017

MUSA Deployer: Deployment of Multi-cloud Applications

Author(s): Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, Giancarlo Capone
Published in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Page(s) 107-112
DOI: 10.1109/WETICE.2017.46

Methodology to Obtain the Security Controls in Multi-cloud Applications

Author(s): Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, Massimiliano Rak, Valentina Casola, Erkuden Rios, Jose L. Martinez Lastra
Published in: Proceedings of the 6th International Conference on Cloud Computing and Services Science, 2016, Page(s) 327-332
DOI: 10.5220/0005912603270332

Towards Self-Protective Multi-Cloud Applications - MUSA – a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications

Author(s): Erkuden Rios, Eider Iturbe, Leire Orue-Echevarria, Massimiliano Rak, Valentina Casola
Published in: Proceedings of the 5th International Conference on Cloud Computing and Services Science, 2015, Page(s) 551-558
DOI: 10.5220/0005492905510558

Self-protecting multi-cloud applications

Author(s): Antonio M. Ortiz, Erkuden Rios, Wissam Mallouli, Eider Iturbe, Edgardo Montes de Oca
Published in: 2015 IEEE Conference on Communications and Network Security (CNS), 2015, Page(s) 643-647
DOI: 10.1109/CNS.2015.7346880

Security in Cloud-Based Cyber-Physical Systems

Author(s): Juha Puttonen, Samuel Olaiya Afolaranmi, Luis Gonzalez Moctezuma, Andrei Lobov, Jose L. Martinez Lastra
Published in: 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015, Page(s) 671-676
DOI: 10.1109/3PGCIC.2015.30

Per-Service Security SLa: A New Model for Security Management in Clouds

Author(s): Valentina Casola, Alessandra De Benedictis, Jolanda Modic, Massimiliano Rak, Umberto Villano
Published in: 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2016, Page(s) 83-88
DOI: 10.1109/WETICE.2016.27

Cloud Challenges towards Free Flow of Data

Author(s): Erkuden Rios, Massimiliano Rak
Published in: Procedia Computer Science, Issue 97, 2016, Page(s) 135-139, ISSN 1877-0509
DOI: 10.1016/j.procs.2016.08.291

Per-service Security SLAs for Cloud Security Management: Model and Implementation

Author(s): Valentina Casola, Alessandra De Benedictis, Jolanda Modic, Massimiliano Rak, Umberto Villano
Published in: International Journal of Grid and Utility Computing (IJGUC), 2018, ISSN 1741-847X

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications

Author(s): Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Erkuden Rios
Published in: Procedia Computer Science, Issue 97, 2016, Page(s) 53-62, ISSN 1877-0509
DOI: 10.1016/j.procs.2016.08.280