Figure 9 shows a graph with execution time when the BPMN process raised a se-
curity alarm. The execution time rose from 0 to three peaks (51, 36 and 30
hours)between July 27 and right before July 30, before falling to 10 hours of execu-
tion time right after July 30, 2013. The increment in execution time was necessary
since BPMN alarm checked every single file and instance in 2 PB of data in the
Cloud. This explained why such a long execution time was required. We plan to de-
velop algorithms or methods that can optimize the security performance. The execu-
tion time to run each BPMN process only takes 2 seconds all the times, which has a
very low execution time. This ensures that fast and efficient BPMB process can meet
the requirement of business agility.
5 Conclusion
We present our Cloud software engineering in security (CSES) proposal from its
system design to implementation phase. We review a few selected literatures and
assert that none of them has the solution from design to implementation of Cloud
security as yet. We then propose a unique approach to combine the recommended
software engineering process with an emphasis on security. We use Business Process
Modeling Notation (BPMN) to illustrate design to implementation of a good Cloud
service. We use BPMN to demonstrate implementation for CSES with its supporting
results. BPMN can be used to simulate the case of raising alarm for protecting Cloud
security in real-time. BPMN simulation results demonstrate long execution time of 60
hours of protecting Cloud security of 2 PB. When data is not in use, BPMN can take
less than 2 hours of their execution time. We are in the process of developing meth-
ods or algorithms to optimize the performance and hope to disseminate our research
outcome in the next twelve months.
References
1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G.,
Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. (2010), Above the Clouds: A Berkeley
View of Cloud computing. Communications of the ACM, 53(4), 50-58.
2. Binz, T., Breiter, G., Leyman, F., & Spatzier, T. (2012). Portable Cloud Services Using
TOSCA. IEEE Internet Computing, 16(3).
3. Bonita Soft (2012) BOS 5.8, Open source BPMN simulation software,
http://www.bonitasoft.com/resources/documentation/top-tutorials
4. Chang, V., Walters, R. J., & Wills, G., Cloud Storage and Bioinformatics in a private cloud
deployment: Lessons for Data Intensive research, Springer: CLOSER 2012, CCIS 367, pp.
245–264, (2013).
5. Chang, V., Business Intelligence as Service in the Cloud, Future Generation Computer
Systems, DOI: http://dx.doi.org/10.1016/j.future.2013.12.028, (2014).
6 Chang, V., Walters, R. J., & Wills, G., The development that leads to the Cloud Computing
Business Framework. International Journal of Information Management, 33(3), pp 524-538,
June, (2013).
7 González-Castillo, O. Y., Selected Quality Metrics for Digital Passport Photographs, Logos
78