such as the isolation management in cloud environ-
ment. They introduce in (Bleikertz et al., 2011) an
approach for analyzing static virtualized cloud infras-
tructures. They verify the correctness of the deploy-
ment in the cloud given by a configuration snapshot.
5 CONCLUSION
In this paper, we propose a cloud brokering process
based on functional and non-functional requirements.
We propose a matching algorithm which matches the
customers requirements with the providers offers and
propose a corresponding placement configuration to
the customer. We use the Alloy language and ana-
lyzer to specify the provider offers, the customer re-
quirements (and their analysis) and the matching al-
gorithm. Alloy generates a placement configuration
which is analyzed and validated in a way to fulfill the
customer requirements.
However, some elements of our global brokering pro-
cess remain to be done. In particular, the numerical
part of the non-functional matching phase is currently
under development, using a finite domain solver, be-
cause Alloy is not suited for this kind of task. This
part concerns the matching of quantities of resources
(e.g. RAM or disk size, CPU frequency, number of
VMs).
REFERENCES
Almorsy, M., Grundy, J., and Ibrahim, A. S. (2011).
Collaboration-based cloud computing security man-
agement framework. In Cloud Computing (CLOUD),
2011 IEEE International Conference on, pages 364–
371. IEEE.
Bleikertz, S. and Groß, T. (2011). A virtualization assur-
ance language for isolation and deployment. In Poli-
cies for Distributed Systems and Networks (POLICY),
2011 IEEE International Symposium on, pages 33–40.
IEEE.
Bleikertz, S., Groß, T., and M
¨
odersheim, S. (2011). Au-
tomated verification of virtualized infrastructures. In
Proceedings of the 3rd ACM workshop on Cloud com-
puting security workshop, pages 47–58. ACM.
Cloud Security Alliance (2011a). Consen-
sus Assessments Initiative Questionnaire.
https://cloudsecurityalliance.org/research/cai/, ac-
cessed on March 15, 2013.
Cloud Security Alliance (2011b). STAR Certification.
https://cloudsecurityalliance.org/star/certification/,
accessed on January 2015.
Garcia, J. L., Vateva-Gurova, T., Suri, N., Rak, M., and Lic-
cardo, L. (2013). Negotiating and brokering cloud
resources based on security level agreements. In
CLOSER, pages 533–541.
Guesmi, A. and Clemente, P. (2013). Access control
and security properties requirements specification for
clouds’ SecLAs. In Cloud Computing Technology and
Science (CloudCom), 2013 IEEE 5th International
Conference on, volume 1, pages 723–729. IEEE.
Habib, S. M., Ries, S., M
¨
uhlh
¨
auser, M., and Varikkattu, P.
(2014). Towards a trust management system for cloud
computing marketplaces: using CAIQ as a trust in-
formation source. Security and Communication Net-
works, 7(11):2185–2200.
Jhawar, R. and Piuri, V. (2013). Adaptive resource man-
agement for balancing availability and performance in
cloud computing. In SECRYPT, pages 254–264.
Jhawar, R., Piuri, V., and Samarati, P. (2012). Support-
ing security requirements for resource management in
cloud computing. In CSE, pages 170–177.
Luna Garcia, J., Langenberg, R., and Suri, N. (2012).
Benchmarking cloud security level agreements using
quantitative policy trees. In Proceedings of the 2012
ACM Workshop on Cloud computing security work-
shop, pages 103–112. ACM.
MIT (2004). Alloy: a language and tool for relational mod-
els.
Rajendran, T., Balasubramanie, P., and Cherian, R. (2010).
An efficient WS-QoS broker based architecture for
web services selection. International Journal of Com-
puter Applications, 1(9):79–84.
Schaad, A. (2003). A framework for organisational con-
trol principles. In PhD thesis, The University of York,
York, England.
Schaad, A. and Moffett, J. D. (2002). A lightweight ap-
proach to specification and analysis of role-based ac-
cess control extensions. In Proceedings of the seventh
ACM symposium on Access control models and tech-
nologies, pages 13–22. ACM.
Toahchoodee, M. and Ray, I. (2008). On the formal analysis
of a spatio-temporal role-based access control model.
In Data and Applications Security XXII, pages 17–32.
Springer.
Toahchoodee, M. and Ray, I. (2009). Using alloy to anal-
yse a spatio-temporal access control model supporting
delegation. IET Information Security, 3(3):75–113.
Yangui, S., Marshall, I.-J., Laisne, J.-P., and Tata, S. (2014).
Compatibleone: The open source cloud broker. Jour-
nal of Grid Computing, 12(1):93–109.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
342