Towards a Federated Cloud Ecosystem: Enabling Managed Cloud Service Consumption

  • Dirk Thatmann
  • Mathias Slawik
  • Sebastian Zickau
  • Axel Küpper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7714)


While cloud computing has seen widespread usage, there exist domains where the diminishing of management capabilities associated with cloud computing prevent adoption. One such domain is the health sector, which is the focus of the TRESOR project. Enabling cloud computing usage under strict compliance constraints such as enterprise policies and legal regulations is the goal of TRESOR. The main approach consists of a distributed cloud proxy, acting as a trusted mediator between cloud consumers and service providers. In this paper we analyze issues which arise within the TRESOR context and show how an architecture for a proposed ecosystem bypasses these issues. The practicability of our solution is shown by a proof of concept proxy implementation. As all components of the architecture will be part of our proposed cloud ecosystem, we provide a holistic and generic proposal to regain management capabilities in cloud computing.


Cloud Computing Cloud Proxy REST SLA Regulatory Compliance Cloud Broker Marketplace 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications 1, 7–18 (2010)CrossRefGoogle Scholar
  2. 2.
    Sengupta, S., Kaulgud, V., Sharma, V.: Cloud Computing Security–Trends and Research Directions. In: 2011 IEEE World Congress on Services (SERVICES), pp. 524–531 (July 2011)Google Scholar
  3. 3.
    Gonzalez, R., Gasco, J., Llopis, J.: Information Systems Outsourcing Reasons and Risks: An Empirical Study. Industrial Management and Data Systems 110(2), 284–303 (2009)CrossRefGoogle Scholar
  4. 4.
    Chen, L., Hoang, D.: Novel Data Protection Model in Healthcare Cloud. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 550–555 (September 2011)Google Scholar
  5. 5.
    Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp. 244–251 (July 2010)Google Scholar
  6. 6.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  7. 7.
    Kashef, M.M., Altmann, J.: A Cost Model for Hybrid Clouds. In: Vanmechelen, K., Altmann, J., Rana, O.F. (eds.) GECON 2011. LNCS, vol. 7150, pp. 46–60. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  8. 8.
    Gmach, D., Rolia, J., Cherkasova, L.: Comparing efficiency and costs of cloud computing models. In: 2012 IEEE Network Operations and Management Symposium (NOMS), pp. 647–650 (April 2012)Google Scholar
  9. 9.
    Koller, B., Schubert, L.: Towards autonomous SLA management using a proxy-like approach. Multiagent Grid Syst. 3(3), 313–325 (2007)zbMATHGoogle Scholar
  10. 10.
    Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). RFC 4120 (Proposed Standard), Updated by RFCs 4537, 5021, 5896, 6111, 6112, 6113, 6649 (July 2005)Google Scholar
  11. 11.
    Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: Access Control in Location-Based Services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 106–126. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  12. 12.
    Fielding, R.T.: Architectural Styles and the Design of Network-based Software Architectures. Doctoral dissertation, University of California, Irvine (2000)Google Scholar
  13. 13.
    Programmable Web: Protocol usage by APIs (2012),
  14. 14.
    Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol – HTTP/1.1. RFC 2616 (Draft Standard), Updated by RFCs 2817, 5785, 6266, 6585 (June 1999)Google Scholar
  15. 15.
    Amazon Web Services LLC: Amazon EC2 SLA (2008),
  16. 16.
    Dobson, G., Sanchez-Macian, A.: Towards unified QoS/SLA ontologies. In: Proceedings of Third International Workshop on Semantic and Dynamic Web Processes, SDWP 2006 (2006)Google Scholar
  17. 17.
    Emeakaroha, V.C., Brandic, I., Maurer, M., Dustdar, S.: Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments. In: 2010 International Conference on High Performance Computing and Simulation (HPCS), June 28-July 2, pp. 48–54 (2010)Google Scholar
  18. 18.
    Christensen, E., Curbera, F., Meredith, G., Weerawarana, S.: Web Services Description Language (2001),
  19. 19.
    Oberle, D., Barros, A., Kylau, U., Heinzl, S.: A unified description language for human to automated services (in press, 2012)Google Scholar
  20. 20.
    Carlos Pedrinaci, T.L.: Linked USDL (2012),
  21. 21.
    Menychtas, A., Gomez, S.G., Giessmann, A., Gatzioura, A., Stanoevska, K., Vogel, J., Moulos, V.: A Marketplace Framework for Trading Cloud-Based Services. In: Vanmechelen, K., Altmann, J., Rana, O.F. (eds.) GECON 2011. LNCS, vol. 7150, pp. 76–89. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  22. 22.
    Reinhold, M.: New I/O APIs for the JavaTM Platform (2002),
  23. 23. index.html - (2012),
  24. 24.
    Mkrtchyan, T.: dCache: implementing a high-end NFSv4.1 service using a Java NIO framework. Computing in High Energy and Nuclear Physics, CHEP (2012)Google Scholar
  25. 25.
    OSGi Alliance: OSGi Alliance — Main / OSGi Alliance (2012),
  26. 26.
    The Eclipse Foundation: Virgo - Home (2012),
  27. 27.
    Apache Software Foundation: Apache JMeter (2012),
  28. 28.
    Weissman, J., Ramakrishnan, S.: Using Proxies to Accelerate Cloud Applications. In: Proceedings of HotCloud 2009 - Workshop on Hot Topics in Cloud Computing (2009)Google Scholar
  29. 29.
    Dobson, G., Lock, R., Sommerville, I.: QoSOnt: a QoS ontology for service-centric systems. In: 31st EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 80–87 (September 2005)Google Scholar
  30. 30.
    Brandic, I., Music, D., Leitner, P., Dustdar, S.: VieSLAF Framework: Enabling Adaptive and Versatile SLA-Management. In: Altmann, J., Buyya, R., Rana, O.F. (eds.) GECON 2009. LNCS, vol. 5745, pp. 60–73. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  31. 31.
    Emeakaroha, V.C., Ferreto, T.C., Netto, M.A.S., Brandic, I., Rose, C.A.D.: CASViD: Application Level Monitoring for SLA Violation Detection in Clouds. In: Proceedings of the 36th Annual IEEE Computer and Application International Conference (COMPSAC 2012), Izmir, Turkey (2012)Google Scholar
  32. 32.
    Chaudhary, T.C.S., Kumar, V., Bhise, M.: Service Level Agreement parameter matching in Cloud Computing. In: Proceedings of the World Congress on Information and Communication Technologies 2011. IEEE (2011)Google Scholar
  33. 33.
    Leidig, T., Momm, C.: USDL Service Level Agreements (April 2012),
  34. 34.
    Zhu, W., Luo, C., Wang, J., Li, S.: Multimedia Cloud Computing. IEEE Signal Processing Magazine 28(3), 59–69 (2011)CrossRefGoogle Scholar
  35. 35.
    Wu, X., Xu, L., Zhang, X.: Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 869–872. ACM, New York (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Dirk Thatmann
    • 1
  • Mathias Slawik
    • 1
  • Sebastian Zickau
    • 1
  • Axel Küpper
    • 1
  1. 1.Service-centric NetworkingTechnische Universität BerlinGermany

Personalised recommendations