Skip to main content

Multi-dimensional Model Driven Policy Generation

  • Conference paper
  • First Online:
Cloud Computing and Services Science (CLOSER 2013)

Abstract

As Cloud Computing provides agile and scalable IT infrastructure, QoS-assured services and customizable computing environment, it increases the call for agile and dynamic deployment and governance environments over multi-cloud infrastructure. By now, governance and Non Functional Properties (such as security, QoS…) are managed in a static way, limiting the global benefits of deploying service-based information system over multi-cloud environments. To overcome this limit, we propose a contextualised policy generation process to allow both an agile management NFP in a multi-cloud context and a secured deployment of the service-based information system. The last step of this Model Driven Policy Engineering approach uses policies as Model@runtime to select, compose, deploy and orchestrate NFP management functions depending on the exact execution context. Moreover, a dynamic governance loop including autonomic KPI management is used to control continuously the governance results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gartner, Inc. analysts: Gartner Report. Top 10 Strategic Technologies for 2012 (2012)

    Google Scholar 

  2. DMTF Informational: Interoperable Clouds – A White Paper from the Open Cloud Standards Incubator (2009)

    Google Scholar 

  3. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800–145 (2011)

    Google Scholar 

  4. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: State-of-the-art and research challenges. J: Internet Serv. Appl. 1(1), 7–18 (2010)

    Google Scholar 

  5. Rodero-Merino, L., Vaquero, L.M., Gil, V., Galán, F., Fontán, J.J., Montero, R.S., Llorente, I.M.: From infrastructure delivery to service management in clouds. Future Gener. Comput. Syst. 26(8), 1226–1240 (2010)

    Article  Google Scholar 

  6. Papazoglou, M., Van Den Heuvel, W.: Service-oriented design and development methodology. Int. J. Web Eng. Technol. 2(4), 412–442 (2006)

    Article  Google Scholar 

  7. Freitas, A.L., Parlavantzas, N., Pazat, J.: An integrated approach for specifying and enforcing SLAs for cloud services. In: Proceedings of IEEE CLOUD, pp. 376–383 (2012)

    Google Scholar 

  8. Vaquero, L.M., Morán, D., Galán, F., Alcaraz-Calero, J.M.: Towards runtime reconfiguration of application control policies in the cloud. J. Netw. Syst. Manag. 20(4), 489–512 (2012)

    Article  Google Scholar 

  9. Zhu, Q., Tung, T.: A performance interference model for managing consolidated workloads in QoS-aware clouds, cloud computing (CLOUD). In: 2012 IEEE 5th International Conference, pp. 170–179 (2012)

    Google Scholar 

  10. Jayasinghe, D., Swint, G., Malkowski, S., Li, J., Wang, Q, Park, J., Pu, C.: Expertus: a generator approach to automate performance testing in IaaS clouds. In: IEEE Fifth International Conference on Cloud Computing, pp. 115–122 (2012)

    Google Scholar 

  11. Moran, D., Vaquero, L.M., Galan, F.: Elastically ruling the cloud: specifying application’s behavior in federated clouds. In: IEEE International Conference on Cloud Computing - CLOUD, pp. 89–96 (2011)

    Google Scholar 

  12. Clayman, S., Galis, A., Chapman, C., Toffetti, G., Rodero-Merino, L., Vaquero, L.M., Nagin, K., Rochwerger, B.: Monitoring service clouds in the future internet. In: Tselentis, G., Galis, A., Gavras, A., Krco, S., Lotz, V., Simperl, E., Stiller, B., Zahariadis, T. (eds.) Towards the Future Internet - Emerging Trends from European Research, pp. 115–126. IOS Press, Amsterdam (2010)

    Google Scholar 

  13. Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55(9), 62–68 (2012)

    Article  Google Scholar 

  14. Alhamad, M., Dillon, T., Chang, E.: A survey on SLA and performance measurement in cloud computing. In: Meersman, R., Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing, L., Ooi, B.-C., Damiani, E., Schmidt, D.C., White, J., Hauswirth, M., Hitzler, P., Mohania, M. (eds.) OTM 2011, Part II. LNCS, vol. 7045, pp. 469–477. Springer, Heidelberg (2011)

    Google Scholar 

  15. Katsaros, G., Kousiouris, G., Gogouvitis, S.V., Kyriazis, D., Menychtas, A., Varvarigou, T.: A Self-adaptive hierarchical monitoring mechanism for Clouds. J. Syst. Softw. 85(5), 1029–1041 (2012)

    Article  Google Scholar 

  16. Jureta, J.I., Herssens, C., Faulkner, S.: A comprehensive quality model for service-oriented systems. Softw. Q. Control 17(1), 65–98 (2009)

    Article  Google Scholar 

  17. Heward, G.: Assessing the performance impact of service monitoring. In: Proceedings of the 2010 21st Australian Software Engineering Conference (ASWEC ‘10). IEEE Computer Society, Washington, DC, USA (2010)

    Google Scholar 

  18. Gogouvitis, S., Konstanteli, K., Waldschmidt, S., Kousiouris, G., Katsaros, G., Menychtas, A., Kyriazis, D., Varvarigou, T.: Workflow management for soft real-time interactive applications in virtualized environments. Future Gener. Comput. Syst. 28(1), 193–209 (2012)

    Article  Google Scholar 

  19. Ouedraogo, W.F., Biennier, F., Ghodous, P.: Adaptive security policy model to deploy business process in cloud infrastructure. In: The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012. Porto, Portugal, pp. 287–290 (2012)

    Google Scholar 

  20. Cloud security alliance: Security Guidance for Critical Areas of Focus in Cloud Computing V3, (2012). https://cloudsecurityalliance.org/wp-content/themes/csa/guidance-download-box.php

  21. Jericho Forum, Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration, Jericho Forum, Version 1.0 (2009). http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf

  22. Marcos, E., Acuña, C.J., Cuesta, C.E.: Integrating Software Architecture into a MDA Framework. In: Gruhn, V., Oquendo, F. (eds.) EWSA 2006. LNCS, vol. 4344, pp. 127–143. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  23. Van Der Straeten, R., Mens, T., Van Baelen, S.: Challenges in Model-Driven Software Engineering. In: Chaudron, M.R. (ed.) MODELS 2008. LNCS, vol. 5421, pp. 35–47. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  24. Torres, V., Giner, P., Pelechano, V.: Developing BP-driven web applications through the use of MDE techniques. Softw. Syst. Model. 11(4), 609–631 (2012)

    Article  Google Scholar 

  25. Basin, D., Doser J., Lodderstedt, T.: Model driven security for process oriented systems. In: SACMAT ’03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (2003)

    Google Scholar 

  26. Clavel, M., Silva, V., Braga, C., Egea, M.: Model-driven security in practice: an industrial experience. In: ECMDA-FA ‘08 Proceedings of the 4th European Conference on Model Driven Architecture: Foundations and Applications, pp. 326–337 (2008)

    Google Scholar 

  27. Souza, A.R., Silva, B.L., Lins, F.A., Damasceno, J.C., Rosa, N.S., Maciel, P.R., Medeiros, R.W., Stephenson, B., Motahari-Nezhad, H.R., Li, J., Northfleet, C.: Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol. 5900, pp. 649–650. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  28. Wolter, C., Menzel, M., Schaad, A., Miseldine, P.: Model-driven business process security requirement specification. J. Syst. Archit. JSA 55(4), 211–223 (2009)

    Article  Google Scholar 

  29. Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42–77. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  30. Mülle, J., von Stackelberg, S., Böhm, K.: Security Language for BPMN Process Models. Karlsruhe institute of technology, Germany (2011)

    Google Scholar 

  31. Loganayagi, B., Sjuatha, S.: Enhance cloud security by combining virtualization and policy monitoring techniques. Procedia Eng. 30, 654–661 (2012)

    Article  Google Scholar 

  32. Li, J., Biennier, F., Amghar, Y.: Business as a Service governance in a Cloud organization. In: Proceedings of the I-ESA Conferences 6, Enterprise Interoperability V, pp. 355–365 (2012)

    Google Scholar 

  33. Yoshioka, N., Washizaki, H.: A survey on security patterns. Prog. Inform. 5(5), 35–47 (2008)

    Article  Google Scholar 

  34. Uzunov, A.V., Fernandez, E.B., Falkner, K.: Securing distributed systems using patterns: A survey. Comput. Secur. 31(5), 681–703 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

This work has been partly supported by the French Economy Ministry DGCIS under the Web Innovant Process 2.0 project grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, J., Ouedraogo, W.F., Biennier, F. (2014). Multi-dimensional Model Driven Policy Generation. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F. (eds) Cloud Computing and Services Science. CLOSER 2013. Communications in Computer and Information Science, vol 453. Springer, Cham. https://doi.org/10.1007/978-3-319-11561-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11561-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11560-3

  • Online ISBN: 978-3-319-11561-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics