Deriving a Distributed Cloud Proxy Architecture for Managed Cloud Service Consumption

Businesses adopting Cloud Computing often have to comply with strict constraints, such as enterprise policies and legal regulations. From these compliance issues arise the need to enable managed cloud service consumption as a prerequisite for adoption. As we have shown before, the proposed TRusted Ecosystem for Standardized and Open cloud-based Resources (TRESOR) cloud ecosystem can achieve management of cloud service consumption [1]. In this paper we motivate and derive the architecture of the distributed TRESOR cloud proxy from technical, business and legal requirements within the context of the TRESOR project. We apply a derivation method where we evaluate the impact of each incremental architecture decision separately. This process enables researchers with supplementary requirements to adapt the intermediate derivations within other contexts in flexible ways.

[1]  Sanjay P. Ahuja,et al.  Comparing Performance of Web Service Interaction Styles: SOAP vs. REST , 2012 .

[2]  Roy T. Fielding,et al.  Principled design of the modern Web architecture , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[3]  Alfonso Sánchez-Macián,et al.  Towards Unified QoS/SLA Ontologies , 2006, 2006 IEEE Services Computing Workshops.

[4]  Schahram Dustdar,et al.  Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments , 2010, 2010 International Conference on High Performance Computing & Simulation.

[5]  Axel Küpper,et al.  Towards a Federated Cloud Ecosystem: Enabling Managed Cloud Service Consumption , 2012, GECON.

[6]  Schahram Dustdar,et al.  Application-level performance monitoring of cloud services based on the complex event processing paradigm , 2012, 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA).

[7]  Larry Zhu,et al.  SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows , 2006, RFC.

[8]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[9]  Cesare Pautasso,et al.  Restful web services vs. "big"' web services: making the right architectural decision , 2008, WWW.

[10]  César A. F. De Rose,et al.  CASViD: Application Level Monitoring for SLA Violation Detection in Clouds , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[11]  Shicong Meng,et al.  Enhanced Monitoring-as-a-Service for Effective Cloud Management , 2013, IEEE Transactions on Computers.

[12]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[13]  Cesare Pautasso,et al.  RESTful web services: principles, patterns, emerging technologies , 2010, WWW '10.