Security is a major concern for developers and operators of applications in the Cloud-Edge continuum. This thesis aims at leveraging security-by-design approaches to improve applications security by proposing and prototyping suitable declarative methodologies to support the deployment of applications. On one hand, we propose a methodology for the placement of Function-as-a-Service (FaaS) orchestrations onto heterogeneous infrastructures of the Cloud-Edge continuum, considering hardware and software requirements, latency constraints on function-function and function-service interactions, and exploiting information-flow techniques to prevent information leaks through side channels. On the other hand, we present a methodology to determine safe partitionings of Cloud multi-component applications to allow their placement on Separation Kernel (SK) technologies so as to safely isolate software components in different domains. Through a probabilistic cost model, we enable application operators to select the best trade-off partitioning in terms of future re-partitioning costs and the number of domains. Our methodologies exploit information-flow security techniques to protect the data confidentiality of applications, by relying on declarative methods to model applications and their data flow. All proposed solutions are implemented into prototypes and experimentally assessed to estimate the performances.

Declarative security-aware computation placement

BOCCI, ALESSANDRO
2023

Abstract

Security is a major concern for developers and operators of applications in the Cloud-Edge continuum. This thesis aims at leveraging security-by-design approaches to improve applications security by proposing and prototyping suitable declarative methodologies to support the deployment of applications. On one hand, we propose a methodology for the placement of Function-as-a-Service (FaaS) orchestrations onto heterogeneous infrastructures of the Cloud-Edge continuum, considering hardware and software requirements, latency constraints on function-function and function-service interactions, and exploiting information-flow techniques to prevent information leaks through side channels. On the other hand, we present a methodology to determine safe partitionings of Cloud multi-component applications to allow their placement on Separation Kernel (SK) technologies so as to safely isolate software components in different domains. Through a probabilistic cost model, we enable application operators to select the best trade-off partitioning in terms of future re-partitioning costs and the number of domains. Our methodologies exploit information-flow security techniques to protect the data confidentiality of applications, by relying on declarative methods to model applications and their data flow. All proposed solutions are implemented into prototypes and experimentally assessed to estimate the performances.
3-mag-2023
Italiano
Cloud-Edge continuum
declarative methodologies
Function-as-a-Service
Separation Kernels
Brogi, Antonio
Ferrari, Gian Luigi
Forti, Stefano
File in questo prodotto:
File Dimensione Formato  
activity_list.pdf

non disponibili

Dimensione 137.46 kB
Formato Adobe PDF
137.46 kB Adobe PDF
Bocci_PhD_Thesis.pdf

accesso aperto

Dimensione 5.38 MB
Formato Adobe PDF
5.38 MB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14242/216512
Il codice NBN di questa tesi è URN:NBN:IT:UNIPI-216512