=Paper=
{{Paper
|id=Vol-1580/5
|storemode=property
|title=A Novel Framework for Ranking Cloud Service Providers Using Security Risk Approach
|pdfUrl=https://ceur-ws.org/Vol-1580/id5.pdf
|volume=Vol-1580
|authors=Jamal Talbi,Abdelkrim Haqiq
|dblpUrl=https://dblp.org/rec/conf/bdca/TalbiH15
}}
==A Novel Framework for Ranking Cloud Service Providers Using Security Risk Approach==
Proceedings of the International Conference on Big Data Cloud and Applications Tetuan, Morocco, May 25 - 26, 2015 A Novel Framework for Ranking Cloud Service Providers Using Security Risk Approach Jamal TALBI1, Abdelkrim HAQIQ1,2 1 Computer, Networks, Mobility and Modeling laboratory, Department of Mathematics and Computer, FST, Hassan 1st University, Settat, Morocco Emails: {talbi85@gmail.com, ahaqiq@gmail.com} 2 e-NGN Research group, Africa and Middle East Abstract—Cloud computing is becoming a key factor in A secure computer system provides guarantees regarding computer science. It represents a new paradigm of utility the confidentiality, integrity and availability of its objects (such computing and enormously growing phenomenon in the present as data, processes or services). Security is related to IT industry and economy hype. The cloud users (CUs) increase vulnerabilities in software, and these are hard to foresee or and require secure, reliable and trustworthy cloud service detect before an actual attack; security involves personal providers (CSPs) from the market. It’s a challenge for a new customer to choose the highly secure provider. In this paper, we aspects (e.g., user or operator issues) and aspects of the propose a cloud broker that analyze and rank the cloud service operational environment that are often beyond the control of providers based on measuring the risks of confidentiality, the development teams. Thus, it is necessary to assess and integrity and availability. This model uses a CSP Rank contain risk using precautionary measures that are Framework for the group of cloud providers by assessing commensurate. Accordingly, we have to dispose a system that security metrics which make decision of the more secure provider measure and rank the secured cloud service providers and then, among all providers and justify the business needs in terms of the cloud services can make a major impact and will craft a security and reliability. healthy competition among cloud providers to satisfy their Keywords—Cloud broker, Security Risk, Confidentiality, Service Level Agreement (SLA) and improve their QoS and Integrity, Availability. trustworthiness [3]. In this work, our aim is to help the new customer to find the I. INTRODUCTION most reliable and secured CP in terms of security and trust Cloud computing [1] is an active research subject as the through a cloud broker that can define, analyze, measure and information industry sees it as the new model. Many rank the cloud service providers based on a risk analysis companies, enterprises and organizations outsource some of approach that calculate some metrics. Thus, the obtained their information systems to benefit from the cloud services results make decision of the best option of CP and justify the which are Platform as a Service (PaaS), Infrastructure as a business needs in terms of security and reliability. Service (IaaS) and Software as a Service (SaaS). The main interesting features of a cloud are the cost decrease and a faster The paper is organized as follows: the next section time to market. Based on sharing resources, the cloud discusses related work, Section III introduces the proposed computing changes the user concerns from managing an model. Section IV describes the CSP Rank Framework. infrastructure to only focusing on their core business. Currently Section V presents an implementation of the model. Section VI there are many numbers of providers, but finding the best cloud gives a conclusion. service provider among the available cloud service providers is difficult. Thus, it is a challenge for the users to choose the best II. RELATED WORK secured cloud provider for fulfilling their requirements. Security metrics are one of criteria that play a major role in Presently, there is a lack of frameworks that can permit ranking service providers. A cloud user may require an customers to evaluate cloud offerings and rank them based on efficient, cost effective and basically more secure provider for their ability to meet the user’s Quality of Service (QoS) and his application. Since there are many providers who will security requirements. This is a major problem for every user, provide same type of services with different level of security, especially those who are more concerned about data security so it will be a challenge for the user to select. Our motivation in and privacy from CSP. 34 this paper is to promote a novel approach for ranking providers III. THE CONCEPTUAL MODEL OF THE CSP RANK based on measuring security metrics of cloud services. FRAMEWORK We propose a broker which can act as a middleware In the same context, many researchers have proposed different between customer and cloud service provider. It can get the approaches to help customer in this mission to select the needed requirements from customer and help the customer by appropriate cloud service. A collaborative filtering approach listing out suitable cloud providers. So our cloud broker has an [2] rank the items based on similar users preferences. This important role to find out the secure cloud service providers algorithm aggregates all the items purchased by the users and existing in the database of our cloud broker. The proposed eliminate those items and ask users to rate the remaining model is described in the following, in terms of its architecture. services. In [3], cloud rank approach proposed greedy algorithm. It gives a method to rank cloud providers based on existing customer’s feedback. It ranks component rather than service of providers. But there is no guarantee that all explicitly rated items by customers are ranked properly. But similar users will experience the same with same cloud providers so for them this approach will be helpful. QoS-aware web by collaborative filtering [4] proposed a collaborative approach to rank providers on the basis of its web services. This method is useful for the customers who want to get an appropriate cloud provider which provides suitable web services. Thus, this method includes experience of users who used the services already and a hybrid collaborative filtering approach for evaluating web service QoS parameters. Parveen Dhillon [5] proposed an effective and efficient method to select best cloud service. In order to select the best provider, Fig. 1. The structure of the proposed CSP Rank Framework Model three parameters are considered. Instead of taking all three parameters together applied. They made a ranking in where the best provider obtained is selected. This system develops a model to find out the secured cloud service providers based on a security risk assessment approach Zibin Zheng [6] proposed an approach for ranking equivalent by determining the vulnerabilities and computing the risks cloud service providers by providing the similar kind of related to cloud service providers list. services which will help users to select suitable providers without spending much time for it. This method uses some A. Requirements requested QoS parameters for predicting best provider. The broker collects requirements from user. It may be Deepak Kapgate [7] proposed a predictive broker algorithm infrastructure requirements, platform requirements or software based on Weighted Moving Average Forecasting Model requirements. (WMAFM). It proposes a new method to balance load on data centers and also minimizes response time. So for end users, B. Vulnerability identification and risks assessment they can get their requested service within few seconds. All the registered cloud service providers give all the services which they are providing. Cloud broker contains the level of Subha [8] had done a survey on quality of service ranking security of cloud providers. So the client gives requirements to cloud computing. Here the author considered few quality of broker, it checks the provider’s performance based on criteria service parameters and ranked providers based on that. that are risks computed. Cloud Rank [9] approach measures and ranks cloud services for the users. It takes the feedback or rating of users who had C. Ranking secured cloud systems used the services already. The CSP Rank Framework using a broker provides optimal cloud service provider selection from the more numbers of An efficient approach [10] find the best cloud provider by CSPs based on security metrics, especially risks which using a system for ranking cloud services based on QoS provides better selection of providers among many. Thus, we parameters such as service response time, cost, interoperability proposed an architecture based on the evaluation of risks and suitability. It uses a broker algorithm that classify the related to systems caused by vulnerabilities and threats for existing providers and find out the more effective and efficient making a decision to rank and select the right provider in terms provider. of reliability and security. 35 IV. DESCRIPTION OF THE CSP RANK FRAMEWORK loss or harm [12]. The identification of these vulnerabilities has Probably all cloud service providers have a Service Level been used by several approaches and researchers to estimate Agreements (SLA), but most of these SLAs were written to risks of the systems. protect the vendors as opposed to being customer-centric. That has to change, and customers have to demand more with regard The Common Vulnerability Scoring System (CVSS) [13] to service and the assurance of it. In the same time, cloud [14] framework allows to assess the severity level of IT providers should protect their data or services from risk and vulnerabilities. It associates a severity score (CVSS score) to harm. For this aim, the CSP Rank Framework will conduct each IT vulnerabilities, which ranges from 0.0 to 10.0. CVSS vulnerability scans and security risk assessment. The obtained [15] is composed of three major metric groups: Base, Temporal results were fed into the security ranking system that offer a list and Environmental. ranked of the secure providers. The Base metric represents the intrinsic characteristics of Fig. 2 shows our approach for model construction of the cloud vulnerability, and is the only mandatory metric. The optional broker for ranking secured CSPs taking into account some Environmental and Temporal metrics are used to augment the conditions that should be considered [11]: Base metrics, and depend on the target system and changing circumstances. The Base metrics include two sub-scores The CSP Rank Framework must maintain the trust and termed exploitability and impact. In the last sub-group, we find reliability. three metrics, representing the impact of the attack on the three classical security properties: Confidentiality Impact, Integrity The CSP Rank Framework has enough resources to Impact and Availability Impact which we are interested in the provide for processing and executing their own work. next sub-section. The broker must be maintained and regulated by strict laws and transparent policies. Risk is the potential that something will go wrong [16]. In Both the broker and CSPs mutually agree before other words, risk is the possibility of the occurrence of a executing the software penetration test. harmful event. Risk can be formally defined [17] in (1) as: We consider that a CSP provide IaaS, PaaS and SaaS of its own. Risk= Likelihood of an adverse event × Impact of the The CSP Rank Framework is only the responsible of adverse event (1) computing security metrics from sources and processes these measures for ranking results. The likelihood of the exploitation of vulnerability depends A new cloud user looking for security and reliability not only on the nature of the vulnerability but also how easy it should pay to the cloud broker to see the ranked is to access the vulnerability. Researchers have developed a results. stochastic model describing the life cycle of a single vulnerability and containing state transitions [15] as shown is Data Collection Fig. 3. Vulnerability Analysis Transition Probability Matrix Security Risks Assessment of CSPs Total Risks of CSPs List Ranked of Secured CSPs Fig. 2. Conceptual model of CSP Rank Framework Fig. 3. Stochastic model representing the life cycle of a single vulnerability A. Vulnerability analysis in CSPs Vulnerability is a software defect or weakness in the security The vulnerability life cycle begins with State 0 in which the system which might be exploited by a malicious user causing vulnerability is not yet discovered. State 1 represents the next 36 state when the vulnerability is discovered but it is yet to be disclosed. When the vulnerability is disclosed with the release and application of the patch, it is said to be in State 2. State 4 represents scenario wherein the vulnerability is disclosed without a patch. At State 5, the vulnerability is disclosed with the patch, but the patch is not applied. In State 3, the (4) vulnerability is being exploited. Thus, each vulnerability found after the penetration test by using a scan process [15] on all The CRVu represents the Confidentiality risk of the providers, follows this model that contains 11 possible vulnerability, IRVu is the Integrity risk of the Vulnerability and transitions between the states. ARVu refers to the Availability risk of the vulnerability. Finally, the broker calculates the total risk for each cloud B. Measuring security risk assessment service provider by summing the risks of the individual The security risk can be measured using the risk definition in vulnerabilities detected in this provider. Thereby, the risks (1), the model in Fig. 3 and based on the CVSS exploit and related to a cloud service provider j from n providers with m impact scores taking into account that the vulnerability must be vulnerabilities are expressed in (5). exploited. Hence, the cumulative risk [18] of a vulnerability being exploited is the likelihood of vulnerability being in State 3. We consider that Lh_3 as the likelihood of the vulnerability to be in State 3. In this context, we based on Markov chain to compute the Lh_3 for the vulnerability. The process starts at State 0 for each vulnerability, thereby the vector giving the initial probabilities is V1= [1 0 0 0 0 0]. We define also for a single vulnerability, the state transition matrix (5) M as shown below: Where CR_CSPj is the Confidentiality risk of a selected provider j, IR_CSPj is the Integrity risk of a selected provider j and AR_CSPj is the Availability risk of a selected provider j. C. Final ranking of CSPs Based on the calculation of the total risks CR_CSP, IR_CSP Using the initial probabilities V1 and the state transition matrix and AR_CSP of each cloud service provider from all providers, M, we obtained the state probabilities V3 after two steps as our framework provides a list ranked of the secure CSPs calculated in (2). starting with the providers having the minimum security risks in terms of confidentiality, integrity and availability. 2 V3 = V1 × M (2) Thus, Lh_3 is the third element of the matrix V3 and represents V. IMPLEMENTATION OF THE CSP RANK the cumulative risk of a vulnerability being exploited. FRAMEWORK According to (1), we can assess the risk for a possible vulnerability i as: We illustrate the use of our CSP Rank Framework ins a practical application; we consider three cloud providers X, Y and Z under a number of vulnerabilities. (3) After the data collection step, a vulnerability analysis Next we compute Confidentiality risk, Integrity risk and quantified the vulnerabilities of our clouds by using the CVSS Availability risk. According to the National Vulnerability framework and the NVD website as shown in TABLE I. These Database (NVD) database, we used Confidentiality Impact, vulnerabilities are categorized into in four groups: High exploit Integrity Impact and Availability Impact values of the and High impact, High exploit and Low impact, Low exploit vulnerability as the impact of exploitation for the three types of and High impact, Low exploit and Low impact based on CVSS risk. Based on (3), the risk expressions for a single exploit score and CVSS impact score that are qualified as Low vulnerability are given in (4). 37 if their score is less than or equal to 5.0 and High if this score is greater than 5.0. TABLE I. CLASSIFICATION OF VULNERABILITIES Fig. 5. Comparison of Confidentiality Risk between the Clouds X, Y and Z Hence, the obtained risks values as shown in TABLE II can be grouped into three classes: High Risk (≥ 0.5), Medium Risk (≥ 0.3 and < 0.5) and Low Risk (< 0.3). TABLE II. THE LH_3 VALUES Fig. 6. Comparison of Integrity Risk between the Clouds X, Y and Z Fig.4 illustrates the comparison of the Availability risk for the three clouds. We conclude that the high risk and medium VI. CONCLUSION risk groups are dominated by the clouds X and Y whereas the low risk group is dominated by the cloud Z. Cloud Computing became an important technology for many organizations to deliver different types of services. So, the Fig. 5 and Fig. 6 show the Confidentiality risk and Integrity multiple cloud service providers make a dilemma for a cloud risk comparison respectively between the providers X, Y and user to choose each provider which is more secured and has the Z. minimum security risk. Hence, in this paper, we propose an Thus, we see that the providers X and Y dominate the High effective and efficient cloud broker based on CSP Rank risk and Medium risk categories where the cloud Z dominates Framework that identifies vulnerabilities and measures the the Low risk category. security risks. This model represents a raking system helping users to find out the best providers in terms of security and trust, and also satisfy their requirements. REFERENCES [1] E. Caron, A. Duang Le, A. Lefray, and C. Toinard, "Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement Algorithms", International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013 IEEE. [2] G. Linden, B. Smith and J. York, "Amazon.com Recommendations: Item-to-Item Collaborative Filtering", IEEE Internet Computing, vol. 7, no. 1, pp. 76-80, Jan. /Feb. 2003. [3] Z. Zibin, Z. Yilei, and M. R. Lyu, "Cloud Rank: A QoS-Driven Fig. 4. Comparison of Availability Risk between the Clouds X, Y and Z Component Ranking Framework for Cloud Computing" in Reliable Distributed Systems, 29th IEEE Symposium on 2010, pp. 184-193. 38 [4] Z. Zheng, H. Ma, M. R. Lyu and I. King, "QoS- Aware Web Service [12] C. P. Pfleeger, S. L. Pfleeger, "Security in Computing, 3rd edition", Recommendation by Collaborative Filtering", IEEE Trans. Service Prentice Hall PTR, 2003. Computing, vol. 4, no. 2, pp. 140-152, Apr.-June 2011 [13] P. Mell, , K. Scarfne, and S. Romanosky, "A Complete Guide to the [5] P. Dhillon, V. Arora, "A Compositional Approach of Reliable and Common Vulnerability Scoring System (CVSS) Version 2.0", Forum Efficient Cloud Service Selection", Volume 2, Issue 8, August 2012 of Incident Response and Security Teams ISSN: 2277 128X, International Journal of Advanced Research in (http://www.first.org/cvss/cvss-guide.html), June 2007. Computer Science and Software Engineering. [14] L. Gallon, J-J. Bascou, "Using CVSS in attack graphs", Sixth [6] Z. Zheng, X. Wu, Y. Zhang, M. R. Lyu, J. Wang, "QoS Ranking International Conference on Availability, Reliability and Security, 2011 Prediction for Cloud Services", Parallel and Distributed Systems, IEEE IEEE. Transactions on, vol.24, no. 6,pp. 1213-1222,June 2013. [15] H. Joh, Y. K. Malaiya, "Defining and Assessing Quantitative Security [7] D. Kapgate, "Weighted Moving Average Forecast Model based Risk Measures Using Vulnerability Lifecycle and CVSS Metrics", Prediction for Service Broker Algorithm for Cloud Computing", International Conference n Security and Management (SAM’11), Las International Journal of Computer Science and Mobile Computing, vol. Vegas, 2011. 3, Issue. 2, February 2014. [16] B. S. Blanchard, W. J. Fabrycky, "Systems Engineering and Analysis", [8] M. Subha, M. U. Banu, "A Survey on QoS Ranking in Cloud Pearson Prentice Hall, 2006. Computing", International Journal of Emerging Technology and [17] G. Stoneburner, A. Gorguen and A. Fertinga, "Risk Management Guide Advanced Engineering, Volume 4, Issue 2, February 2014. for Information Technology Systems", in National Institute of [9] R. Yuvarani, M. Sivalakshmi, "Achieve Ranking Accuracy Using Cloud Standards and Technology Special Publication, 2002. Rank Framework for Cloud Services", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Special Issue 1, March 2014. [10] K. Amrutha, B. Madhu, "An Efficient Approach to Find Best Cloud Provider Using Broker", International Journal of Advanced Research in Computer Science and Software Engineering 4(7), pp. 943-946, July 2014. [11] M. Whaiduzzaman, A. Gani, "Measuring Security for Cloud Service Provider: A Third Party Approach", International Conference on Electrical Information and Communication Technology (EICT), pp. 1- 6, 2013 IEEE. 39