• search hit 3 of 3
Back to Result List

Leveraging cloud native design patterns for security-as-a-service applications

  • This paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while consideringThis paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while considering appropriate, layered security counter-measures i.e. at the application and cloud networking layer. Our prototype implementation out-performs traditional, monolithic applications with an average Scanner Time of 6 minutes, without compromising security. Our approach can be employed for designing secure, scalable and performant SecaaS applications that effectively handle unexpected increase in security assessment requests.show moreshow less

Export metadata

Additional Services

Search Google Scholar Statistics
Metadaten
Author details:Kennedy A. TorkuraORCiD, Muhammad Ihsan Haikal SukmanaORCiDGND, Feng ChengGND, Christoph MeinelORCiDGND
DOI:https://doi.org/10.1109/SmartCloud.2017.21
ISBN:978-1-5386-3684-8
Title of parent work (English):IEEE International Conference on Smart Cloud (SmartCloud)
Publisher:Institute of Electrical and Electronics Engineers
Place of publishing:New York
Publication type:Other
Language:English
Date of first publication:2017/11/23
Publication year:2017
Release date:2022/09/08
Tag:Cloud Native Applications; Cloud-Security; Security-as-a-Service; Vulnerability Assessment
Number of pages:8
First page:90
Last Page:97
Organizational units:An-Institute / Hasso-Plattner-Institut für Digital Engineering gGmbH
DDC classification:0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme
Peer review:Referiert
Accept ✔
This website uses technically necessary session cookies. By continuing to use the website, you agree to this. You can find our privacy policy here.