23 research outputs found

    Enabling IoT stream management in multi-cloud environment by orchestration

    Get PDF
    (c) 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.Every-Day lives are becoming increasingly instrumented by electronic devices and any kind of computer-based (distributed) service. As a result, organizations need to analyse an enormous amounts of data in order to increase their incomings or to improve their services. Anyway, setting-up a private infrastructure to execute analytics over Big Data is still expensive. The exploitation of Cloud infrastructure in IoT Stream management is appealing because of costs reductions and potentiality of storage, network and computing resources. The Cloud can consistently reduce the cost of analysis of data from different sources, opening analytics to big storages in a multi-cloud environment. Anyway, creating and executing this kind of service is very complex since different resources have to be provisioned and coordinated depending on users' needs. Orchestration is a solution to this problem, but it requires proper languages and methodologies for automatic composition and execution. In this work we propose a methodology for composition of services used for analyses of different IoT Stream and, in general, Big Data sources: in particular an Orchestration language is reported able to describe composite services and resources in a multi-cloud environment.Peer ReviewedPostprint (author's final draft

    Security and Compliance Ontology for Cloud Service Agreements

    Get PDF
    Cloud computing is a business paradigm where two important roles must be defined: provider and consumer. Providers offer services (e.g. web application, web services, and databases) and consumers pay for using them. The goal of this research is to focus on security and compliance aspects of cloud service. An ontology is introduced, which is the conceptualization of cloud domain, for analyzing different compliance aspects of cloud agreements. The terms, properties and relations are shown in a diagram. The proposed ontology can help service consumers to extract relevant data from service level agreements, to interpret compliance regulations, and to compare different contractual terms. Finally, some recommendations are presented for cloud consumers to adopt services and evaluate security risks

    Towards a Model of Heterogeneity in IT Service Value Networks: Results from a Literature Review

    Get PDF
    At the dawn of the Digital Economy, companies are facing with dematerialization and digitization of products and the trend towards service delivery. By supporting specialization and modularization of service providers, cloud computing involves the trend towards distributed service generation. Hence, multi-vendor networks arise and IT departments have to handle heterogeneous IT Service Value Networks (ITSVN). This research paper analyzes the concept of heterogeneity in ITSVN. Based on a literature review, this paper introduces a model of heterogeneity in ITSVN. Elements of this model are applications, platforms, infrastructures, actors, technologies, interfaces, and tools. Heterogeneity is caused by the diversity and alterity of the attributes of these elements. This article offers a fundamental understanding of the effects of heterogeneity in ITSVN, a definition of heterogeneity in ITSVN, and a model of influencing factors on heterogeneity in ITSVN

    An Overview of Cloud Interoperability

    Full text link

    Smart Cloud Engine and Solution Based on Knowledge Base

    Get PDF
    AbstractComplexity of cloud infrastructures needs models and tools for process management, configuration, scaling, elastic computing and healthiness control. This paper presents a Smart Cloud solution based on a Knowledge Base, KB, with the aim of modeling cloud resources, Service Level Agreements and their evolution, and enabling the reasoning on structures by implementing strategies of efficient smart cloud management and intelligence. The solution proposed provides formal verification tools and intelligence for cloud control. It can be easily integrated with any cloud configuration manager, cloud orchestrator, and monitoring tool, since the connections with these tools are performed by using REST calls and XML files. It has been validated in the large ICARO Cloud project with a national cloud service provider

    Context Verification and Adaptation in Web Service Composition

    Get PDF
    Automatic web-service composition aims at automating the design of an appropriate combination of existing web services to achieve a global goal. Most proposed AWSC approaches only consider input/output parameters and quality features of services. However, most real-world web services have applicable conditions and require constraints to be considered according to the execution context of composite services. Constraint verification has a significant impact on the composition and execution of composite services. In particular, runtime verification of service constraints can result in the failure of the execution of composite services and eventually waste computational resources and may incur monetary costs. In addition, traditional adaptation approaches for web service composition consider recovery in case of failure when a service becomes unavailable. They do not take into account changes and limitations in service execution environment which potentially can affect the execution of a wide range of services. Externally-defined constraints are likely to be defined and become or cease to be applicable after the composite service has been deployed. In this thesis, we propose a novel approach to model and verify different types of constraints inside composite services. We not only consider input/output parameters but also the values that can be assigned to parameters during design and execution of composite services. In addition, we provide novel failure recovery and adaptation approaches for different types of constraints according to the execution context of composite services. In our solution, we develop a new structure including alternative composite services to recover broken composite services and adapt to external constraints. We finally propose a brokerage architecture including all proposed approaches for constraint-aware service composition and adaptation

    Automation of The SLA Life Cycle in Cloud Computing

    Get PDF
    Cloud computing has become a prominent paradigm to offer on-demand services for softwares, infrastructures and platforms. Cloud services are contracted by a service level agreement (SLA) between a cloud service provider (CSP) and a cloud service user (CSU) which contains service definitions, quality of service (QoS) parameters, guarantees and obligations. Cloud service providers mostly offer SLAs in descriptive format which is not directly consumable by a machine or a system. The SLA written in natural language may impede the utility of rapid elasticity in a cloud service. Manual management of SLAs with growing usage of cloud services can be a challenging, erroneous and tedious task especially for the CSUs acquiring multiple cloud services. The necessity of automating the complete SLA life cycle (which includes SLA description in machine readable format, negotiation, monitoring and management) becomes imminent due to complex requirements for the precise measurement of QoS parameters. Current approaches toward automating the complete SLA life cycle, lack in standardization, completeness and applicability to cloud services. Automation of different phases of the SLA life cycle (e.g. negotiation, monitoring and management) is dependent on the availability of a machine readable SLA. In this work, a structural specification for the SLAs in cloud computing (S3LACC in short) is presented which is designed specifically for cloud services, covers complete SLA life cycle and conforms with the available standards. A time efficient SLA negotiation technique is accomplished (based on the S3LACC) for concurrently negotiating with multiple CSPs. After successful negotiation process, next leading task in the SLA life cycle is to monitor the cloud services for ensuring the quality of service according to the agreed SLA. A distributed monitoring approach for the cloud SLAs is presented, in this work, which is suitable for services being used at single or multiple locations. The proposed approach reduces the number of communications of SLA violations to a monitoring coordinator by eliminating the unnecessary communications. The presented work on the complete SLA life cycle automation is evaluated and validated with the help of use cases, experiments and simulations
    corecore