
Figure 9 shows a graph with execution time when the BPMN process raised a se-
curity alarm. The execution time rose from 0 to three peaks (51, 36 and 30 
hours)between July 27 and right before July 30, before falling to 10 hours of execu-
tion time right after July 30, 2013. The increment in execution time was necessary 
since BPMN alarm checked every single file and instance in 2 PB of data in the 
Cloud. This explained why such a long execution time was required. We plan to de-
velop algorithms or methods that can optimize the security performance. The execu-
tion time to run each BPMN process only takes 2 seconds all the times, which has a 
very low execution time. This ensures that fast and efficient BPMB process can meet 
the requirement of business agility. 
5  Conclusion 
We present our Cloud software engineering in security (CSES) proposal from its 
system design to implementation phase. We review a few selected literatures and 
assert that none of them has the solution from design to implementation of Cloud 
security as yet. We then propose a unique approach to combine the recommended 
software engineering process with an emphasis on security. We use Business Process 
Modeling Notation (BPMN) to illustrate design to implementation of a good Cloud 
service. We use BPMN to demonstrate implementation for CSES with its supporting 
results. BPMN can be used to simulate the case of raising alarm for protecting Cloud 
security in real-time. BPMN simulation results demonstrate long execution time of 60 
hours of protecting Cloud security of 2 PB. When data is not in use, BPMN can take 
less than 2 hours of their execution time. We are in the process of developing meth-
ods or algorithms to optimize the performance and hope to disseminate our research 
outcome in the next twelve months. 
References 
1.  Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., 
Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. (2010), Above the Clouds: A Berkeley 
View of Cloud computing. Communications of the ACM, 53(4), 50-58. 
2.  Binz, T., Breiter, G., Leyman, F., & Spatzier, T. (2012). Portable Cloud Services Using 
TOSCA. IEEE Internet Computing, 16(3). 
3. Bonita Soft (2012) BOS 5.8, Open source BPMN simulation software, 
http://www.bonitasoft.com/resources/documentation/top-tutorials 
4.  Chang, V., Walters, R. J., & Wills, G., Cloud Storage and Bioinformatics in a private cloud 
deployment: Lessons for Data Intensive research, Springer: CLOSER 2012, CCIS 367, pp. 
245–264, (2013). 
5.  Chang, V., Business Intelligence as Service in the Cloud, Future Generation Computer 
Systems, DOI: http://dx.doi.org/10.1016/j.future.2013.12.028, (2014). 
6  Chang, V., Walters, R. J., & Wills, G., The development that leads to the Cloud Computing 
Business Framework. International Journal of Information Management, 33(3), pp 524-538, 
June, (2013). 
7  González-Castillo, O. Y., Selected Quality Metrics for Digital Passport Photographs, Logos 
78