755 research outputs found

    A service broker for Intercloud computing

    Get PDF
    This thesis aims at assisting users in finding the most suitable Cloud resources taking into account their functional and non-functional SLA requirements. A key feature of the work is a Cloud service broker acting as mediator between consumers and Clouds. The research involves the implementation and evaluation of two SLA-aware match-making algorithms by use of a simulation environment. The work investigates also the optimal deployment of Multi-Cloud workflows on Intercloud environments

    Anti-Pattern Specification and Correction Recommendations for Semantic Cloud Services

    Get PDF
    Given the economic and technological advantages \ they offer, cloud services are increasing being offered by \ several cloud providers. However, the lack of standardized \ descriptions of cloud services hinders their discovery. \ In an effort to standardize cloud service descriptions, \ several works propose to use ontologies. Nevertheless, \ the adoption of any of the proposed ontologies \ calls for an evaluation to show its efficiency in cloud \ service discovery. Indeed, the existing cloud providers \ describe, their similar offered services in different ways. \ Thus, various existing works aim at standardizing the \ representation of cloud computing services by proposing \ ontologies. However, since the existing proposals \ were not evaluated, they might be less adopted and considered. \ Indeed, the ontology evaluation has a direct impact \ on its understandability and reusability. In this paper, \ we propose an evaluation approach to validate our \ proposed Cloud Service Ontology (CSO), to guarantee \ an adequate cloud service discovery. To this end, this \ paper has a three-fold contribution. First, we specify a \ set of patterns and anti-patterns in order to evaluate our \ CSO. Second, we define an anti-pattern detection algorithm \ based on SPARQL queries which provides a set of \ correction recommendations to help ontologists revise \ their ontology. Finally, tests were conducted in relation \ to: (i) the algorithm efficiency and (ii) anti-pattern detection \ of design anomalies as well as taxonomic and \ domain errors within CSO

    Security Challenges from Abuse of Cloud Service Threat

    Get PDF
    Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and risks. The paper provides a useful introduction to the rising security issues of Abuse of cloud service threat, which has no standard security measures to mitigate its risks and vulnerabilities. The threat can result an unbearable system gridlock and can make cloud services unavailable or even complete shutdown. The study has identified the potential challenges, as BotNet, BotCloud, Shared Technology Vulnerability and Malicious Insiders, from Abuse of cloud service threat. It has further described the attacking methods, impacts and the reasons due to the identified challenges. The study has evaluated the current available solutions and proposed mitigating security controls for the security risks and challenges from Abuse of cloud services threat

    Smart Cloud Engine and Solution Based on Knowledge Base

    Get PDF
    AbstractComplexity of cloud infrastructures needs models and tools for process management, configuration, scaling, elastic computing and healthiness control. This paper presents a Smart Cloud solution based on a Knowledge Base, KB, with the aim of modeling cloud resources, Service Level Agreements and their evolution, and enabling the reasoning on structures by implementing strategies of efficient smart cloud management and intelligence. The solution proposed provides formal verification tools and intelligence for cloud control. It can be easily integrated with any cloud configuration manager, cloud orchestrator, and monitoring tool, since the connections with these tools are performed by using REST calls and XML files. It has been validated in the large ICARO Cloud project with a national cloud service provider
    corecore