Cloud Resources Placement based on Functional and Non-functional Requirements

Asma Guesmi, Patrice Clemente, Frederic Loulergue, Pascal Berthomé

Abstract

It is difficult for customers to select the adequate cloud providers which fit their needs, as the number of cloud offerings increases rapidly. Many works thus focus on the design of cloud brokers. Unfortunately, most of them do not consider precise security requirements of customers. In this paper, we propose a methodology defined to place services in a multi-provider cloud environment, based on functional and non-functional requirements, including security requirements. To eliminate inner conflicts within customers requirements, and to match the cloud providers offers with these customers requirements, we use a formal analysis tool: Alloy. The broker uses a matching algorithm to place the required services in the adequate cloud providers, in a way that fulfills all customer requirements. We finally present a prototype implementation of the proposed broker.

References

  1. Almorsy, M., Grundy, J., and Ibrahim, A. S. (2011). Collaboration-based cloud computing security management framework. In Cloud Computing (CLOUD), 2011 IEEE International Conference on, pages 364- 371. IEEE.
  2. Bleikertz, S. and Groß, T. (2011). A virtualization assurance language for isolation and deployment. In Policies for Distributed Systems and Networks (POLICY), 2011 IEEE International Symposium on, pages 33-40. IEEE.
  3. Bleikertz, S., Groß, T., and Mö dersheim, S. (2011). Automated verification of virtualized infrastructures. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 47-58. ACM.
  4. Garcia, J. L., Vateva-Gurova, T., Suri, N., Rak, M., and Liccardo, L. (2013). Negotiating and brokering cloud Guesmi, A. and Clemente, P. (2013). Access control and security properties requirements specification for clouds' SecLAs. In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on, volume 1, pages 723-729. IEEE.
  5. Habib, S. M., Ries, S., Mü hlhäuser, M., and Varikkattu, P. (2014). Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source. Security and Communication Networks, 7(11):2185-2200.
  6. Jhawar, R. and Piuri, V. (2013). Adaptive resource management for balancing availability and performance in cloud computing. In SECRYPT, pages 254-264.
  7. Jhawar, R., Piuri, V., and Samarati, P. (2012). Supporting security requirements for resource management in cloud computing. In CSE, pages 170-177.
  8. Luna Garcia, J., Langenberg, R., and Suri, N. (2012). Benchmarking cloud security level agreements using quantitative policy trees. In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, pages 103-112. ACM.
  9. MIT (2004). Alloy: a language and tool for relational models.
  10. Rajendran, T., Balasubramanie, P., and Cherian, R. (2010). An efficient WS-QoS broker based architecture for web services selection. International Journal of Computer Applications, 1(9):79-84.
  11. Schaad, A. (2003). A framework for organisational control principles. In PhD thesis, The University of York, York, England.
  12. Schaad, A. and Moffett, J. D. (2002). A lightweight approach to specification and analysis of role-based access control extensions. In Proceedings of the seventh ACM symposium on Access control models and technologies, pages 13-22. ACM.
  13. Toahchoodee, M. and Ray, I. (2008). On the formal analysis of a spatio-temporal role-based access control model. In Data and Applications Security XXII, pages 17-32. Springer.
  14. Toahchoodee, M. and Ray, I. (2009). Using alloy to analyse a spatio-temporal access control model supporting delegation. IET Information Security, 3(3):75-113.
  15. Yangui, S., Marshall, I.-J., Laisne, J.-P., and Tata, S. (2014). Compatibleone: The open source cloud broker. Journal of Grid Computing, 12(1):93-109.
Download


Paper Citation


in Harvard Style

Guesmi A., Clemente P., Loulergue F. and Berthomé P. (2015). Cloud Resources Placement based on Functional and Non-functional Requirements . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 335-342. DOI: 10.5220/0005552503350342


in Bibtex Style

@conference{secrypt15,
author={Asma Guesmi and Patrice Clemente and Frederic Loulergue and Pascal Berthomé},
title={Cloud Resources Placement based on Functional and Non-functional Requirements},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={335-342},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005552503350342},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Cloud Resources Placement based on Functional and Non-functional Requirements
SN - 978-989-758-117-5
AU - Guesmi A.
AU - Clemente P.
AU - Loulergue F.
AU - Berthomé P.
PY - 2015
SP - 335
EP - 342
DO - 10.5220/0005552503350342