Formal security framework for agent based cloud systems

Fatma Masmoudi, Monia Loulou, Ahmed Hadj Kacem

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The adoption of cloud computing becomes hampered by the emergence of security problems. We aim in this paper to define a framework which clarifies the concepts of security in a cloud environment and can afterwards check a number of security properties. To achieve this objective, we propose a three-level approach: Modeling, Specification and Verification. In the first step, we propose an agent based modeling of cloud architecture in order to leverage the capabilities of software agents and consequently to reduce complexity. In specification step, we formally specify the concepts evoked in the modeling step and enrich them by others related to security. In the last step, we proceed to verify the security level in cloud environments in order to better control their entities behaviour.

Original languageEnglish
Title of host publicationProceedings - 2014 International Workshop on Advanced Information Systems for Enterprises, IWAISE 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages15-21
Number of pages7
ISBN (Electronic)9781479943005
DOIs
StatePublished - 5 Dec 2014
Externally publishedYes
Event3rd International Workshop on Advanced Information Systems for Enterprises, IWAISE 2014 - Tunis, Tunisia
Duration: 10 Nov 201412 Nov 2014

Publication series

NameProceedings - 2014 International Workshop on Advanced Information Systems for Enterprises, IWAISE 2014

Conference

Conference3rd International Workshop on Advanced Information Systems for Enterprises, IWAISE 2014
Country/TerritoryTunisia
CityTunis
Period10/11/1412/11/14

Keywords

  • agent technology
  • Cloud computing
  • formal methods
  • modeling
  • security
  • specification
  • verification

Fingerprint

Dive into the research topics of 'Formal security framework for agent based cloud systems'. Together they form a unique fingerprint.

Cite this