=Paper=
{{Paper
|id=Vol-1164/PaperVision07
|storemode=property
|title=A Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds
|pdfUrl=https://ceur-ws.org/Vol-1164/PaperVision07.pdf
|volume=Vol-1164
|dblpUrl=https://dblp.org/rec/conf/caise/GoettelmannDGG14
}}
==A Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds==
A Broker Framework for Secure and
Cost-Effective Business Process Deployment on
Multiple Clouds
Elio Goettelmann1,2 , Karim Dahman3 , Benjamin Gateau2 and Claude Godart1
1
LORIA - INRIA Grand Est, Université de Lorraine, Nancy, France.
2
CRP Henri Tudor, Kirchberg, Luxembourg.
3
Blu Age - Netfective Technology, Pessac, France.
elio.goettelmann@tudor.lu, k.dahman@bluage.com, benjamin.gateau@tudor.lu,
claude.godart@loria.fr
Abstract. Security risk management on information systems provides
security guarantees while controlling costs. But security risk assessments
can be very complex, especially in a cloud context where data is dis-
tributed over multiple environments. To prevent costs from becoming
the only cloud selection factor, while disregarding security, we propose a
method for performing multiple cloud security risk assessments. In this
paper we present a broker framework for balancing costs against security
risks. Our framework selects cloud offers and generates deployment-ready
business processes in a multi-cloud environment.
Keywords: Business Process, Security Risk Management, Cloud
1 Introduction
The Cloud business model proposes a multitude of different services, at different
prices, and with various quality levels. While the use of cloud computing can
reduce costs, the selection of a solution is time consuming. For this purpose,
cloud brokers have emerged; they can help cloud consumers to select adequate
solutions, by comparing existing offers, essentially against their prices.
But security is still an important factor for a cloud selection process. As cloud
computing presents new kinds of security risks ([3], [5]), they need to be treated
before wider adoption. Novel methods have to be defined in order to prevent
these potential losses on companies.
In turn, distributing software over multiple locations increases the complexity
of gathering sensitive business information. In this paper, we propose a frame-
work for cloud brokers which helps them analyze the security levels of different
cloud offers, following standard risk assessment methodologies, with respect to
cloud offers.
The paper is organized as follows. Section 2 presents a motivating example
used to demonstrate the purpose and the scope of our framework. Section 3 de-
scribes our tool, its implementation on the motivating example and experimental
results. Section 4 and Section 5 discuss respectively related and future work.
50 Pre-proceedings of CAISE’14 Forum
2 Motivating Example and Overview
In this section, we introduce a motivating example to illustrate our framework.
Then we give an overview of our approach for selecting clouds when deploying
business processes.
Send
Initiate Obtain Medical Report Reimbursement
Claim Claim Hospital Report
Decision
Insurance
Obtain Obtain Expert Report
Incident Details Hospital Details Hospital Report Expert Report
Amount
Obtain Police Report Validate
Incident Details
Police Report Reimbursement
Account
Fig. 1. Business Process Motivation Example: Insurance Claim Recovery Chain.
Consider an insurance claim recovery chain [7] as a BPMN business process
model depicted in Fig. 1. This process is initiated when an insurance company
receives a claim recovery declaration from a beneficiary. To obtain details about
the incident, the emergency service is invoked. The hospital and police reports
are required by the expert to decide if the reimbursement will be accepted or
not. If so, the bank is requested and a notification is sent to the beneficiary.
Now suppose that the insurance company wants to outsource the software
supporting this process to the cloud to reduce costs. It has not necessarily the
knowledge of moving it effectively on its own. A cloud broker could support the
company by evaluating the security risks of a cloud outsourcing, selecting
the adequate offers and decomposing the process to deploy it on multiple
clouds. These three tasks are detailed below.
Our tool consists in a design-time framework for producing secure and cost-
effective business processes on multiple cloud. It is illustrated in Fig.2.
Cloud Consumer Business
Security Needs
processes
Risk Cloud
Cloud Broker Decomposition
Assessment Selection
Cloud Offers Configuration
Cloud Provider
Fig. 2. Our design-time framework for multi-cloud business process deployment.
First, a cloud broker requests the security needs as non-functional require-
ments from the cloud consumer and analyzes the cloud offers from the cloud
provider to realize a risk assessment.
Second, the broker uses the business processes from the cloud consumer to
select the adapted cloud offers based on the functional requirements, the costs
and the previously calculated risk.
Third, the broker decomposes the business process into smaller parts, as
each task can be enacted on a different cloud offer. The generated configuration
is the assignment of these process fragments to cloud offers. The decomposition
itself has already been addressed in [8].
Secure and Cost-Effective BP Deployment on Multiple Clouds 51
3 Implementation, experimentation and evaluation
To demonstrate the feasibility of the approach, we illustrate on our motivating
example the three previously defined steps of the broker tool.
3.1 Risk Assessment
The risk assessment is threefold: security needs definition, risk evaluation and
cloud provider exclusion.
Security needs definition Our framework uses the five CIANA objectives
(Confidentiality, Integrity, Availability, Non-Repudiation, Authenticity) to define
the security need of each data object of the process (Fig. 1). If the data object
needs the objective, the value is equal to 1, otherwise to 0 (see Table 1). Typically,
these security needs are negotiated by a risk manager with the cloud consumer.
Table 1. Annotations of the security objectives on the motivation example.
Data Associations Conf. Integ. Avail. N.-rep. Auth.
Claim 0 0 1 1 0
Hospital details 0 1 1 0 1
Incident details 0 1 1 0 1
Hospital report 1 1 0 1 1
Police report 1 1 0 1 1
Medical report 1 1 0 1 1
Expert report 1 1 0 1 1
Account 1 1 0 0 1
Amount 1 1 0 1 1
As business process deployment is task-centric, these values need to be trans-
lated into security needs on tasks. We use the maximum values of the input and
output objects of a task. For example, Obtain Incident Details is associated to
the data objects Claim, Incident Details and Hospital Details. So, by taking the
maximum of each data object’s need we get the need of Obtain Incident De-
tails: {0, 1, 1, 1, 1} for respectively {Conf identiality, Integrity, Availability,
N on-Repudiation, Authenticity}.
Risk evaluation for each provider In this paper we take into account five
cloud security threats given by the CSA [3] to evaluate the risk. These threats
are each related to the 5 CIANA objectives:
– Data Breaches = {Confidentiality}
– Data Loss = {Availability, Non-Repudiation}
– Account Hijacking = {Confidentiality, Integrity, Availability, Non-Repudiation,
Authenticity}
– Insecure Interfaces = {Confidentiality, Integrity, Authenticity}
– Denial of Service = {Availability}
Harm - We combine these relations with the security needs of each data object
to obtain a so-called harm. The harm is defined on each data object, for each
threat through the sum of the affected security needs. For example, the Insecure
Interfaces threat (t) has the following harm on Obtain Incident Details (ta):
Harm(t, ta) = (1 × 0) + (1 × 1) + (0 × 1) + (0 × 1) + (1 × 1) = 3
52 Pre-proceedings of CAISE’14 Forum
The first value of each bracket is equal to 1 if the threat is related to the objective,
0 otherwise, and the second value is the need calculated previously. Notice that
the harm value is in this case always between 0 and 5. The result for all tasks
of the process can be seen in Table 2.
Coverage - Now that we have the harm of a threat on each task of the process, we
need to determine the response to these threats for each cloud provider. For this
information we use the STAR Registry and the matrix defined by the CSA [3].
The CSA matrix defines a list of security controls a cloud provider should
implement to reduce security risks. Each of these controls can be related to
one or multiple threats. For example, the control ”IS-19.4 - Do you maintain
key management procedures ?” mitigates the Data Breaches threat. This matrix
defines a total of 197 controls to implement in order to respond to all threats in
the best possible way.
The STAR Registry publishes the list of implemented controls for providers
willing to follow these recommendations. These lists are freely accessible and can
help to check if a control has been put in place by a specific provider or not.
In our case, we use these two information as binary values (a control mitigates
a threat or not / a control is implemented by a provider or not) to calculate
a so-called coverage score, which indicates the response of a provider to a
given threat. This value is a percentage, if the provider implements all controls
mitigating a threat, it gets a coverage for this threat of 100%. In our case, this
percentage is brought to a score on a scale of 0 to 5 (with 5 equivalent to 100%).
We took 5 providers from the registry and calculated their coverage score, it is
available in Table 2.
Table 2. Harms on the process tasks and coverage of the providers for 5 cloud threats
Obt. incident det.
Obt hospital rep.
Send reimb. dec.
Obt. expert rep.
Obt. police rep.
Process reimb.
Initiate claim
CloudSigma
SHI Intern.
Terremark
Softlayer
FireHost
Harm Coverage
Data breaches 1 0 1 1 1 1 1 2 5 2 4 4
Data loss 2 2 2 2 1 1 1 3 4 2 4 5
Account Hijacking 5 4 5 5 4 4 4 4 5 3 5 3
Insecure interfaces 3 2 3 3 3 3 3 4 5 3 4 4
Denial of service 1 1 1 1 0 0 0 4 5 4 5 5
Too risky provider exclusion Usually, the vulnerability is assessed and used to
calculate a risk value of an information system. But in a cloud context, providers
may be tempted to conceal their vulnerabilities for security reasons. This is why
we use the coverage based on the security controls. By using the maximum pos-
sible coverage value Covgmax (in our case 5), it is possible to get an equivalent
to the vulnerabilities. Therefore, by combining this value with the harm we can
define the following risk formula for a threat t, a task ta and a provider p:
Risk(t, ta, p) = Harm(t, ta) + (Covgmax − Covg(p, t))
Secure and Cost-Effective BP Deployment on Multiple Clouds 53
Table 3 shows the maximum risk value for the five CSA threats, for the tasks
of our motivating example, on five different providers (Softlayer4 , CloudSigma5 ,
FireHost6 , SHI Int.7 and Terremark8 ).
Table 3. Maximum risk value of the tasks for each provider
Softlayer CloudSigma FireHost SHI Int. Terremark
Initiate claim 6 5 7 5 7
Obt. incident det. 5 4 6 4 6
Obt. hospital rep. 6 5 7 5 7
Obt. police rep. 6 5 7 5 7
Obt. expert rep. 5 4 6 4 6
Send reimb. dec. 5 4 6 4 6
Process reimb. 5 4 6 4 6
In accordance with the consumer, the broker defines the level of acceptable
risk (referred to as threshold). For a given task, this threshold defines the
providers with a too high risk value and excludes these deployment options. In
our example, we set the threshold to 5, the cells of eliminated providers are
grayed out in Table 3. Respectively a white cell means that the task can be
deployed on the provider.
3.2 Cloud Selection
We select the target cloud environments in two stages: different configurations
evaluation and final clouds selection.
Configurations evaluation We need to evaluate the different possible deploy-
ment configurations. To do this, we introduce a cost model which will allow us
to balance the risks against the costs.
Cost model - Our cost model takes into account three types of costs:
– Usage costs, the CPU power needed to execute the process ($/GHz/month).
The need is annotated on the tasks of the process.
– Storage costs, the space needed by the data of the process ($/GB/month).
The size is annotated on the data objects of the process.
– Transfer costs, the amount of incoming/outgoing messages ($/GB). This
size is calculated with the data exchanged between the process fragments.
Table 4 gives costs for the selected cloud offers of our motivating example.
4
http://www.softlayer.com
5
http://www.cloudsigma.com
6
http://www.firehost.com
7
http://www.shi.com
8
http://www.terremark.com
54 Pre-proceedings of CAISE’14 Forum
Table 4. Costs of 5 Cloud offers
Usage ($/GHz/mo) Storage ($/GB/mo) Transfer ($/GB)
Softlayer 20.00 0.10 0.10
CloudSigma AG 13.86 0.18 0.06
FireHost 25.70 2.78 0.50
SHI International, Corp. 11.56 0.29 0.01
Terremark 3.60 0.25 0.17
To find a deployment configuration (which task will be enacted on which
cloud) we use an heuristic approach described in [6].
For our motivating example we tested our algorithm in three different ways.
The results are shown in Table 5.
First run has no restrictions regarding the risk value, only the costs are taken
into account. This gives us a “cheap” solution while leaving out security.
Second run includes a global risk threshold of 6. The majority of the tasks are
now located on a more expensive but also less “risky” offer.
Third run has a global risk threshold set to 6. Once again, the solution becomes
more expensive, but could be considered more “secure” than the second run.
We can notice that the transfer costs conduct to a regrouping of the tasks
on one main offer to restrain the global costs.
Table 5. Output for different runs
First run Second run Third run
CloudSigma
CloudSigma
CloudSigma
Terremark
Terremark
Terremark
Softlayer
Softlayer
Softlayer
FireHost
FireHost
FireHost
SHI Int.
SHI Int.
SHI Int.
Initiate claim x x x
Obt. incident det. x x x
Obt. hospital rep. x x x
Obt. police rep. x x x
Obt. expert rep. x x x
Send reimb. dec. x x x
Process reimb. x x x
Risk 7 6 5
Cost ($/mo) 84.58 206.68 259.24
For those tests we optimized the costs while constraining the risk, but the
algorithms can be extended to optimize the risk and constrain the cost, or even
take into account other criteria.
Final configuration selection These resulting deployment configurations are
analyzed by the cloud broker in conjunction with the cloud consumer to select
the most adequate one. For our motivating example, we select the Third run.
3.3 Process deployment in the cloud
The process is deployed on the target environments in two steps: process decom-
position and fragments deployment.
Secure and Cost-Effective BP Deployment on Multiple Clouds 55
Process decomposition According to the selected configuration, the process
is decomposed in multiple process fragments. A fragment is an autonomic busi-
ness process enacted on one cloud and includes additional synchronization tasks.
These additional tasks support the collaboration with the remote fragments to
guarantee the control flow of the initial process. More details can be accessed
in [7] and in [8].
The decomposed motivating example according to the selected configuration
is depicted in Fig.3 (grey activities are synchronization tasks).
Obtain Validate
CloudSigma
Hospital Report Reimbursement
Send
Initiate Obtain
Receive
Claim Expert Report
Sync Send
Obtain Reimbursement
Police Report Decision
SHI Int.
Receive Obtain Send
Sync Incident Details Sync
Fig. 3. A partitioned orchestration process.
Deployment in clouds The last step of our approach consists in deploying this
configuration on the selected cloud offers. In [8] we presented how we deploy such
service composition as BPEL programs on remote service orchestration engines
(e.g., Apache ODE9 ).
4 Related Work
In [9] the authors present methods to distribute applications on different cloud
environments. However security aspects are not considered. The authors of [2]
are adapting processes through risk-reduction patterns, and in [13] processes are
analyzed to decide if they are ready for a cloud deployment or not. But these
two methods do not show the calculation of the risk value and do not consider
process fragmentation.
In opposition to our proposal, [4] provides a risk-prediction algorithm to
help users to take decisions during the execution of the process. We focus on
design-time rather than on runtime, which changes slightly the kind of treated
risks.
The model presented in [11] allows to evaluate security vulnerabilities in a
Service Oriented Architecture, but does not take into account the cloud context.
Our coverage approach based on security controls given in different standards
([1], [3]) seems to be more adapted to such a context.
Watson [12] decomposes workflows and deploys them on multiple clouds ac-
cording to a cost model, but he defines arbitrary security levels for each provider.
A more complete cost model is presented in [10], but it is not easily adaptable
in the business process context for an automated treatment as it is done in our
approach.
9
http://ode.apache.org/
56 Pre-proceedings of CAISE’14 Forum
5 Conclusion and Future Work
In this paper we have presented a cloud broker framework for assessing security
risks in a multiple-cloud context. We assess security risks of cloud providers us-
ing standard-based and industry accepted security controls and risk listings. We
focus on one business process to illustrate how these risk values, in combination
with costs, can help a cloud broker to take decisions for the cloud provider selec-
tion. The paper demonstrates the feasibility of our approach with a motivating
example and real cloud providers.
Some limitations are not addressed in this paper. First, the shortage of em-
pirical evaluation on real use cases, which will be realized in future works with
domain experts and industrial partners. Another point is that our approach takes
place at design-time, but as the Cloud is a very dynamic context, extending our
framework to configuration at run-time would be an interesting improvement.
Finally, the binary values for the security needs, mitigations and control imple-
mentation could be replaced with more complete scales, as some security controls
“better” mitigate threats than others.
References
1. ISO/IEC 27017, Information tech., Security techniques, Code of practice for infor-
mation security controls for cloud computing services based on ISO/IEC 27002.
2. O. Altuhhova, R. Matulevicius, and N. Ahmed. Towards definition of secure busi-
ness processes. In CAiSE Workshops, pages 1–15, 2012.
3. Cloud Security Alliance. Cloud Control Matrix / Security, Trust & Assurance
Registry / Consensus Assessments Initiative Questionnaire. Technical report.
4. R. Conforti, M. de Leoni, M. L. Rosa, and W. M. van der Aalst. Supporting risk-
informed decisions during business process execution. In CAiSE’13, pages 116–132,
Valencia, Spain, 2013.
5. European Network and Information Security Agency. Benefits, risks and recom-
mendations for information security. Technical report, 2009.
6. W. Fdhila, M. Dumas, and C. Godart. Optimized decentralization of composite
web services. In CollaborateCom’10, pages 1–10, 2010.
7. W. Fdhila, U. Yildiz, and C. Godart. A flexible approach for automatic process de-
centralization using dependency tables. In ICWS ’09, pages 847–855, Washington,
DC, USA, 09. IEEE Computer Society.
8. E. Goettelmann, W. Fdhila, and C. Godart. Partitioning and cloud deployment
of composite web services under security constraints. In IC2E’13, 2013.
9. F. Leymann, C. Fehling, R. Mietzner, A. Nowak, and S. Dustdar. Moving appli-
cations to the cloud: an approach based on application model enrichment. IJCIS,
20(3):307–356, 2011.
10. B. Martens, M. Walterbusch, and F. Teuteberg. Costing of cloud computing ser-
vices: A total cost of ownership approach. In ICSS’12, pages 1563–1572, 2012.
11. S. Sackmann, L. Lowis, and K. Kittel. A risk based approach for selecting services
in business process execution. In Wirtschaftsinformatik (1), pages 357–366, 2009.
12. P. Watson. A multi-level security model for partitioning workflows over federated
clouds. In CloudCom, pages 180–188, 2011.
13. S. Wenzel, C. Wessel, T. Humberg, and J. Jürjens. Securing processes for out-
sourcing into the cloud. In CLOSER, pages 675–680, 2012.