Abstract
As Cloud Computing provides agile and scalable IT infrastructure, QoS-assured services and customizable computing environment, it increases the call for agile and dynamic deployment and governance environments over multi-cloud infrastructure. By now, governance and Non Functional Properties (such as security, QoS…) are managed in a static way, limiting the global benefits of deploying service-based information system over multi-cloud environments. To overcome this limit, we propose a contextualised policy generation process to allow both an agile management NFP in a multi-cloud context and a secured deployment of the service-based information system. The last step of this Model Driven Policy Engineering approach uses policies as Model@runtime to select, compose, deploy and orchestrate NFP management functions depending on the exact execution context. Moreover, a dynamic governance loop including autonomic KPI management is used to control continuously the governance results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gartner, Inc. analysts: Gartner Report. Top 10 Strategic Technologies for 2012 (2012)
DMTF Informational: Interoperable Clouds – A White Paper from the Open Cloud Standards Incubator (2009)
Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800–145 (2011)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: State-of-the-art and research challenges. J: Internet Serv. Appl. 1(1), 7–18 (2010)
Rodero-Merino, L., Vaquero, L.M., Gil, V., Galán, F., Fontán, J.J., Montero, R.S., Llorente, I.M.: From infrastructure delivery to service management in clouds. Future Gener. Comput. Syst. 26(8), 1226–1240 (2010)
Papazoglou, M., Van Den Heuvel, W.: Service-oriented design and development methodology. Int. J. Web Eng. Technol. 2(4), 412–442 (2006)
Freitas, A.L., Parlavantzas, N., Pazat, J.: An integrated approach for specifying and enforcing SLAs for cloud services. In: Proceedings of IEEE CLOUD, pp. 376–383 (2012)
Vaquero, L.M., Morán, D., Galán, F., Alcaraz-Calero, J.M.: Towards runtime reconfiguration of application control policies in the cloud. J. Netw. Syst. Manag. 20(4), 489–512 (2012)
Zhu, Q., Tung, T.: A performance interference model for managing consolidated workloads in QoS-aware clouds, cloud computing (CLOUD). In: 2012 IEEE 5th International Conference, pp. 170–179 (2012)
Jayasinghe, D., Swint, G., Malkowski, S., Li, J., Wang, Q, Park, J., Pu, C.: Expertus: a generator approach to automate performance testing in IaaS clouds. In: IEEE Fifth International Conference on Cloud Computing, pp. 115–122 (2012)
Moran, D., Vaquero, L.M., Galan, F.: Elastically ruling the cloud: specifying application’s behavior in federated clouds. In: IEEE International Conference on Cloud Computing - CLOUD, pp. 89–96 (2011)
Clayman, S., Galis, A., Chapman, C., Toffetti, G., Rodero-Merino, L., Vaquero, L.M., Nagin, K., Rochwerger, B.: Monitoring service clouds in the future internet. In: Tselentis, G., Galis, A., Gavras, A., Krco, S., Lotz, V., Simperl, E., Stiller, B., Zahariadis, T. (eds.) Towards the Future Internet - Emerging Trends from European Research, pp. 115–126. IOS Press, Amsterdam (2010)
Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55(9), 62–68 (2012)
Alhamad, M., Dillon, T., Chang, E.: A survey on SLA and performance measurement in cloud computing. In: Meersman, R., Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing, L., Ooi, B.-C., Damiani, E., Schmidt, D.C., White, J., Hauswirth, M., Hitzler, P., Mohania, M. (eds.) OTM 2011, Part II. LNCS, vol. 7045, pp. 469–477. Springer, Heidelberg (2011)
Katsaros, G., Kousiouris, G., Gogouvitis, S.V., Kyriazis, D., Menychtas, A., Varvarigou, T.: A Self-adaptive hierarchical monitoring mechanism for Clouds. J. Syst. Softw. 85(5), 1029–1041 (2012)
Jureta, J.I., Herssens, C., Faulkner, S.: A comprehensive quality model for service-oriented systems. Softw. Q. Control 17(1), 65–98 (2009)
Heward, G.: Assessing the performance impact of service monitoring. In: Proceedings of the 2010 21st Australian Software Engineering Conference (ASWEC ‘10). IEEE Computer Society, Washington, DC, USA (2010)
Gogouvitis, S., Konstanteli, K., Waldschmidt, S., Kousiouris, G., Katsaros, G., Menychtas, A., Kyriazis, D., Varvarigou, T.: Workflow management for soft real-time interactive applications in virtualized environments. Future Gener. Comput. Syst. 28(1), 193–209 (2012)
Ouedraogo, W.F., Biennier, F., Ghodous, P.: Adaptive security policy model to deploy business process in cloud infrastructure. In: The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012. Porto, Portugal, pp. 287–290 (2012)
Cloud security alliance: Security Guidance for Critical Areas of Focus in Cloud Computing V3, (2012). https://cloudsecurityalliance.org/wp-content/themes/csa/guidance-download-box.php
Jericho Forum, Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration, Jericho Forum, Version 1.0 (2009). http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf
Marcos, E., Acuña, C.J., Cuesta, C.E.: Integrating Software Architecture into a MDA Framework. In: Gruhn, V., Oquendo, F. (eds.) EWSA 2006. LNCS, vol. 4344, pp. 127–143. Springer, Heidelberg (2006)
Van Der Straeten, R., Mens, T., Van Baelen, S.: Challenges in Model-Driven Software Engineering. In: Chaudron, M.R. (ed.) MODELS 2008. LNCS, vol. 5421, pp. 35–47. Springer, Heidelberg (2009)
Torres, V., Giner, P., Pelechano, V.: Developing BP-driven web applications through the use of MDE techniques. Softw. Syst. Model. 11(4), 609–631 (2012)
Basin, D., Doser J., Lodderstedt, T.: Model driven security for process oriented systems. In: SACMAT ’03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (2003)
Clavel, M., Silva, V., Braga, C., Egea, M.: Model-driven security in practice: an industrial experience. In: ECMDA-FA ‘08 Proceedings of the 4th European Conference on Model Driven Architecture: Foundations and Applications, pp. 326–337 (2008)
Souza, A.R., Silva, B.L., Lins, F.A., Damasceno, J.C., Rosa, N.S., Maciel, P.R., Medeiros, R.W., Stephenson, B., Motahari-Nezhad, H.R., Li, J., Northfleet, C.: Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol. 5900, pp. 649–650. Springer, Heidelberg (2009)
Wolter, C., Menzel, M., Schaad, A., Miseldine, P.: Model-driven business process security requirement specification. J. Syst. Archit. JSA 55(4), 211–223 (2009)
Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42–77. Springer, Heidelberg (2005)
Mülle, J., von Stackelberg, S., Böhm, K.: Security Language for BPMN Process Models. Karlsruhe institute of technology, Germany (2011)
Loganayagi, B., Sjuatha, S.: Enhance cloud security by combining virtualization and policy monitoring techniques. Procedia Eng. 30, 654–661 (2012)
Li, J., Biennier, F., Amghar, Y.: Business as a Service governance in a Cloud organization. In: Proceedings of the I-ESA Conferences 6, Enterprise Interoperability V, pp. 355–365 (2012)
Yoshioka, N., Washizaki, H.: A survey on security patterns. Prog. Inform. 5(5), 35–47 (2008)
Uzunov, A.V., Fernandez, E.B., Falkner, K.: Securing distributed systems using patterns: A survey. Comput. Secur. 31(5), 681–703 (2012)
Acknowledgements
This work has been partly supported by the French Economy Ministry DGCIS under the Web Innovant Process 2.0 project grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, J., Ouedraogo, W.F., Biennier, F. (2014). Multi-dimensional Model Driven Policy Generation. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F. (eds) Cloud Computing and Services Science. CLOSER 2013. Communications in Computer and Information Science, vol 453. Springer, Cham. https://doi.org/10.1007/978-3-319-11561-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-11561-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11560-3
Online ISBN: 978-3-319-11561-0
eBook Packages: Computer ScienceComputer Science (R0)