Page 748 - Cloud computing: From paradigm to operation
P. 748

XaaS                                                     3


            8.1.3.3    Data integrity

            Data including system data and user data, such as logs and configuration data, require the SaaS application
            environment  to  support  integrity  mechanisms  to  prevent  them  from  unauthorized  tampering  in
            transmission, during processing or out of occupation.

            System log and application log are required not to be modified. In this case, when either fault or misuse
            occurs, CSP and malicious software are prevented from concealing trace by modifying logs.

            SaaS application may require CSCs to configure it on demand. The configuration data, such as configuration
            file, is also required to not be modified without authorization.

            In the SaaS application environment, users' data is stored in the cloud which is managed by CSP. In this case,
            the verification of data integrity becomes a remarkable security requirement. Moreover, it is required to
            verify the integrity of massive data.

            8.1.3.4    Data reliability
            To  support  data  reliability,  the  SaaS  application  environment  is  required  to  support  data  backup  or
            redundancy mechanisms to ensure that tenants can access the data even if part of the cloud storage nodes
            lose efficacy.
            Hosted  data  are  required  to  implement  a  multiple-site  backup;  otherwise,  the  data  will  be  completely
            ineffective. The SaaS application environment is required to have the ability to fully recover data and restore
            the data in time as well as keep data synchronism to ensure the consistency of multiple copies.

            8.1.3.5    Data traceability and control
            The  SaaS  application  environment  is  required  to  ensure  that  physical  location  of  data  comply  with  the
            applicable law and local regulations, and with any restrictions in the legal agreements. The SaaS application
            environment is required to provide methods for CSCs to specify their data storage locations and verify that
            their data are appropriately placed.
            Major concerns in a shared and virtualized infrastructure include not only loss of control by users over their
            data,  but  also  locating  data  and  controlling  its whole  life  cycle.  At  any  given time,  the  SaaS  application
            environment is required to know exactly where both system data and user data are stored and processed,
            and provide verification of data location for CSCs. Both during and after usage, it shall not be possible for
            unauthorized third parties (including other CSPs) to trace the movement of the data.
            8.1.4   Security assessment and audit

            When underlying resources are changed, cracked or worked improperly, the SaaS application environment
            is required to be triggered to initiate security assessment procedure to evaluate whether or not specified
            security services or their applied security policies are affected, and indications or instructions are suggested
            to provide if they cannot satisfy predetermined conditions. An authorized party should be delegated to verify
            that  the  SaaS  application  environment  complies  with  the  applicable  security  requirements.  Security
            assessment or security audit could be performed by CSC, CSP or a third party (CSN), and security certification
            could be performed by an authorized third party (CSN).
            Independent  trusted  third  parties  should  be  used  to  provide  reliable,  independent  and  neutral  security
            assessments or security audit.

            8.1.5   Security hardening
            The SaaS application environment aims mainly at offering secure service oriented multi-tenant development,
            deployment and an execution environment for SaaS applications. Security features of SaaS applications are
            in some cases insufficient or not well developed. The SaaS application environment is required to retrieve
            and  verify those  deficient security  features  of  the  SaaS  applications,  and  provide  differentiated  security
            hardening mechanisms to enhance SaaS applications according to those deficient security features in order
            to  meet  the  security  requirements  of  different  tenants  in  different  contexts.  The  security  features  of




            740
   743   744   745   746   747   748   749   750   751   752   753