Secure Cloud-Edge Deployments, with Trust

16 Jan 2019  ·  Antonio Brogi, Gian-Luigi Ferrari, Stefano Forti ·

Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we propose a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically get a probabilistic and explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology.

PDF Abstract


Networking and Internet Architecture Cryptography and Security


  Add Datasets introduced or used in this paper