characteristics addressed and the three layers of the
architecture (hardware, software, virtualization). A
short description of the application of the cloud
solution to the logistics project is then provided.
Finally conclusions are drawn.
2 CLOUD SOLUTION FOR
LOGISTICS
As first step, we analysed the deployment models
among the available ones: private, public,
community, and hybrid cloud (Armbrust et al. 2011,
Baiardi et al.2010, Grossman et al.2009), and
decided upon a community cloud. This was the most
appropriate since the LOGIN project involved
several industrial partners and research organizations
having in common a set of software systems to share
in the infrastructure. The choice of a community
cloud turned out to be the most cost effective and
able to assure security and privacy at the same time
as the services are available to the all members of
the community. The service model chosen was SaaS
as it consisted of offering the services to users on a
pay-per-use basis, according to a specific
econometric model shared by all the partners
involved. Second, we identified the components of
the cloud infrastructure:
hardware components (Hardware Layer);
technologies for virtualization based on the
hardware layer (Virtualization Layer);
platforms and tools for managing the cloud
environment (Software Layer).
The cloud computing solution had to enable
access to hardware and software resources remotely
accessible via web. Furthermore, the service was to
assure provision of virtual machines (VM) suitable
to host the software components required for the
realization of the LOGIN platform. Users were to
access to a:
Portal: access point to the cloud infrastructure
from where it is possible to access and
manage VM (create, delete, power-on, reset,
power-off, …) functionalities.
Services Catalogue: a catalogue of services
(virtual machines/ software) preconfigured
with an operating system and applications (db
server, web server, etc.). From this catalogue
users are able to choose resources and services
based on their needs in real time.
2.2 Quality Characteristics
The cloud computing infrastructure was developed
pursuing the following quality characteristics:
high usage percentages of resources:
implemented with technical workloads
designed to reallocate resources automatically
and dynamically in accordance with the
priorities set;
support to virtualization;
scalability of resources both upwards (adding
resources) and downwards (reducing the
resources assigned to a service);
dynamic allocation: on-demand for resources
based on a self-service concept. The user can
autonomously access the portal and create or
eliminate a VM or change its characteristics in
terms of resource allocation;
reliability of the systems that should be able to
support a failover;
security. A network firewall is assigned to
every VM. Protection policies can be
personalized;
reduction of management costs for what
concerns energy consumption, network and
physical space occupied.
As of today, to the best of our knowledge, there
is no common adopted standard for securing the
information of a cloud infrastructure (Mell and
Grance 2009, Srinvasanm and Rodrigues 2012).
Moreover, literature provides various reference
models for cloud, each proposed by different
organizations and related to different perspectives
(Farzad 2011). Solutions can be based on the service
model used (IaaS, PaaS, SaaS) or the deployment
model adopted (Public, Private, Community,
Hybrid) as well as on the technology adopted or take
into account other criteria such as physical location
of the data, ownership of the resources, architecture
of the IT solution, management of the services
provided, just to name a few. Consequently,
depending on the characteristics one refers to,
different security needs should be considered
(Humberg et al. 2013, Grobauer et al. 2010). In
Humberg (2013) for example, authors propose a
methodology that supports users in examining
models of their systems and processes for potential
risks.
In defining the cloud infrastructure of the
LOGIN project we have taken into account the
requirements of the ISO 27000 series standards (ISO
27001:2005, ISO27002:2007) with focus on IT-
security risks (ISO27005:2008). The ISO27001
standard details the requirements for defining and
information security management system taking into
account the best practices listed in the ISO27002
document, whereas the risk management process
BuildingaCommunityCloudInfrastructureforaLogisticsProject
421