A SLA evaluation Methodology in Service Oriented Architectures V.Casola, A.Mazzeo, N.Mazzocca, M.Rak University of Naples “Federico II”, Italy Second University.

Slides:



Advertisements
Similar presentations
ISDSI 2009 Francesco Guerra– Università di Modena e Reggio Emilia 1 DB unimo Searching for data and services F. Guerra 1, A. Maurino 2, M. Palmonari.
Advertisements

Andrea Maurino Web Service Design Methodology Batini, De Paoli, Maurino, Grega, Comerio WP2-WP3 Roma 24/11/2005.
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
1 Service Oriented Architectures (SOA): What Users Need to Know. OGF 19: January 31, 2007 Charlotte, NC John Salasin, Ph.D, Visiting Researcher National.
Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
1 An innovative Policy-based Cross Certification methodology for Public Key Infrastructures V.Casola, A.Mazzeo, N.Mazzocca, M. Rak University of Naples.
Multi-level SLA Management for Service-Oriented Infrastructures Wolfgang Theilmann, Ramin Yahyapour, Joe Butler, Patrik Spiess consortium / SAP.
XML Flattened The lessons to be learned from XBRL.
Management of IT Environment (5) LS 2012/ Martin Sarnovský Department of Cybernetics and AI, FEI TU Košice ITIL:Service Design IT Services Management.
SPECIFYING AND MONITORING GUARANTEES IN COMMERCIAL GRIDS THROUGH SLA Sven Graupner Vijay MachirajuAad van Moorsel IEEE/ACM International Symposium on Clustering.
Infrastructure layer Massonet Philippe, CETIC RESERVOIR Dissemination Activity Leader John Kennedy, INTEL Infrastructure Leader.
Overview of OASIS SOA Reference Architecture Foundation (SOA-RAF)
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
OASIS Reference Model for Service Oriented Architecture 1.0
A. Bucchiarone / Pisa/ 30 Jan 2007 Dynamic Software Architectures for Global Computing Antonio Bucchiarone PhD Student – IMT Graduate School Piazza S.
An Architecture-Based Approach to Self-Adaptive Software Presenters Douglas Yu-cheng Su Ajit G. Sonawane.
Planning a measurement program What is a metrics plan? A metrics plan must describe the who, what, where, when, how, and why of metrics. It begins with.
Web Services Andrea Miller Ryan Armstrong Alex. Web services are an emerging technology that offer a solution for providing a common collaborative architecture.
Kmi.open.ac.uk Semantic Execution Environments Service Engineering and Execution Barry Norton and Mick Kerrigan.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Contracts for defining QOS levels in a Multichannel Adaptive Information System Moreno Callea, Luca Campagna Mariagrazia Fugini, Pierluigi Plebani Dip.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
This chapter is extracted from Sommerville’s slides. Text book chapter
Identity Federation in Cloud Computing
THE NEXT STEP IN WEB SERVICES By Francisco Curbera,… Memtimin MAHMUT 2012.
Slide 1 Wolfram Höpken RMSIG Reference Model Special Interest Group Second RMSIG Workshop Methodology and Process Wolfram Höpken.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE II - Network Service Level Agreement (SLA) Establishment EGEE’07 Mary Grammatikou.
An Integration Framework for Sensor Networks and Data Stream Management Systems.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
The Grid Component Model: an Overview “Proposal for a Grid Component Model” DPM02 “Basic Features of the Grid Component Model (assessed)” -- DPM04 CoreGrid.
Architecting Web Services Unit – II – PART - III.
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
Web Service Middleware – An Infrastructure For Near Future Real Life Web Service Ecosystems Jan Schulz-Hofen SAP Research Center Palo Alto SAP Labs, LLC,
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
SDMX Standards Relationships to ISO/IEC 11179/CMR Arofan Gregory Chris Nelson Joint UNECE/Eurostat/OECD workshop on statistical metadata (METIS): Geneva.
February 20, AgentCities - Agents and Grids Prof Mark Baker ACET, University of Reading Tel:
Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy.
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
Scenarios for a Learning GRID Online Educa Nov 30 – Dec 2, 2005, Berlin, Germany Nicola Capuano, Agathe Merceron, PierLuigi Ritrovato
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Secure Systems Research Group - FAU A Trust Model for Web Services Ph.D Dissertation Progress Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
EbXML (Electronic Business XML) Kanda Runapongsa Dept of Computer Engineering Khon Kaen University.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
The FDES revision process: progress so far, state of the art, the way forward United Nations Statistics Division.
WG2 Roadmap Discussion Denise Warzel May 25, 2010 WG2 Convenor SC32 WG2N1424SC32 WG2N1424.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
Models of the OASIS SOA Reference Architecture Foundation Ken Laskey Chair, SOA Reference Model Technical Committee 20 March 2013.
European Monitoring Platform for Mapping of QoS and QoE
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Grid Resource Allocation Agreement Protocol Working Group
Gestione di Service Level Agreements (SLA) in sistemi Grid
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Model-Driven Engineering for Mission-Critical IoT Systems
2. An overview of SDMX (What is SDMX? Part I)
ESciDoc Introduction M. Dreyer.
Service Oriented Architectures (SOA): What Users Need to Know.
Market-based Dynamic Task Allocation in Mobile Surveillance Systems
Silvia Losco, ISTAT, Strategies and approaches for managing risks in the official statistics production: ISTAT experience in the.
Presentation transcript:

A SLA evaluation Methodology in Service Oriented Architectures V.Casola, A.Mazzeo, N.Mazzocca, M.Rak University of Naples “Federico II”, Italy Second University of Naples, Italy

Outline  Context  Objectives  Methodology Policy Formalization Evaluation technique Applicability  Conclusions  Future Works

Context: service cooperation, a trust point of view  Service Oriented Architectures are capable of intelligent interaction and are able to discover and compose themselves into more complex services;  The emerging technologies and standards allow a dynamic service composition to offer advanced services;  The open issue is: how to guarantee the “quality” of a service built at run-time in a potential un-trusted domain?

Context: Service Level Agreement  Actually, these problems are faced by an explicit agreement among services: Each service defines its own Service Level Agreement and publishes them in a public document; People from the various organization that want to cooperate, manually evaluate the different SLAs and decide to agree or not.  SLA are expressed by means of a free text document; it contains “quality of services” and “security” parameters, it can be used to decide to extend trust to other services, too (cfr. “qualified” services);

Objectives  To introduce a methodology to formalize SLA and evaluate the associated quality/security level through the definition of a metric function;  The automatic adoption of the methodology helps in: The initial agreement among cooperative services (when a service must be “qualified” to adhere to an existing, qualified, Cooperative Connection System); The run-time agreement among services (when the aggregation of services is made in an open network and when services are located through a public registry).

Methodology – target and applicability context  We have defined a Methodology to: Express security through a semi-formal and not ambiguous policy; the chosen formalization must be “easy to adopt” for technical and organizational people; Evaluate the security level that a security infrastructure is able to guarantee by aggregating the security associated to all policy provisions. Compare different services according to the measured security level.

The Reference Evaluation Model (REM) components  [Formalization] represents the semi-formal representation of the policy. The chosen formalization will affect final evaluation, and it takes into account technical and organizational aspects;  [Technique] represents the evaluation technique that can be applied to compare policies; the evaluation technique strictly depends on the policy formal representation.  [Reference Levels] are instances of policies, which represent different security levels. The methodology core is the REM definition: REM =

Policy Formalization (1) Policy formalization needs to be: Not ambiguous, (this is a problem for high level languages – semantically reach), Correct respect to the described system, Complete !!!  Textual provisions have been structured and refined in a fine- grain and a grammar of enumerative data-types has been proposed, so reducing semantical complexity;  The defined data-structures are new atomic or enumerative types and a total order relation among their values has been defined;

Policy Formalization (2)  We have associated a Local Security Level to each provision instance (applying different security metrics to each one);  Example: Data-type: Private_Key_Protection_mechanism Enumerative and Ordered values : No Protection < Protection on Floppy < Protection on Smart Card < Protection on Smart Card with Biometric Sensor

Policy Formalization (3)  The proposed structure is a hierarchical tree represented by an XML document;  Tree nodes identify complex security provisions, leaves identify simple security provisions.

The Evaluation Technique  How to quantify the system security? The introduced technique is based on the definition of a metric policy space and a distance criterium by which we could represent policies and compare different policies.  After the policy formalization, each provision is represented by an enumerative-ordered data-type with its Local Security Level.  After the evaluation the whole policy is represented by an aggregated value (Global Security Level)

The metrical space Technique The policy space is made homogeneous thanks to threshold functions (F-functions) which allow to associate a Local Security Level to each provision; The policy space is represented by a n x 4 matrix; The distance criterium for the definition of the metric space is the Euclidean distance among matrices, defined as: d(A,B) = √( σ (A-B,A-B)) where σ (A,B) = Tr (AB T )

The metrical space Technique: the policy matrix  The policy space is represented by a n x 4 matrix (total number of provisions for the number of Local Security Levels) Revocation request grace period 1110 CRL issuance frequency 1110 CRL checking requirements 1110 Site location, construction and physical access 1100 CA trusted roles 1110 LRA trusted roles 1100

Reference Levels  The last component of the REM is the set of reference security levels that could be used as a reference scale for the numerical evaluation of security.  Example of evaluation of 4 security levels with the metrical technique: d 10 = d(REFL1,  ) = 7,07 d 20 = d(REFL2,  ) = 11,18 d 30 = d(REFL3,  ) = 12 d 40 = d(REFL4,  ) = 12,65

The reference levels and the metric function if d X0 ≤ d 10 ==> L PX = L 0, if d 10 L PX = L 1, if d 20 L PX = L 2, if d 30 L PX = L 3, if d 40 ≤ d X0 ==> L PX = L 4, The metric function for the evaluation of the Global Security Level of Px: L P X =

Application of the metrical technique Scenario 1- pre-defined cross qualification  There is a master who sets the REM components;  The target services (TS) which wishes to be part of the cooperative system is evaluated against the master REM so its policy is formatted according to it, too.  The result of the evaluation is the service level that TS could guarantee and, the subset of services which could cooperate with it without degrading their quality. Scenario 2- Run-time cross qualification  There is NOT a master who can set the REM components;  It is a peer-to-peer agreement, i.e. the requestor service and the provider service have the same role;  Both services build their own REM;  The result could be different for the two services (different REMs), in this case, the quality level is determined in function of who is the requestor in the specific transaction.

Conclusions  SLA definition in SOA is a technical, organizational and standards problem;  The proposed methodology aims at addressing all these aspects in a unifying way and proposing an evaluation model;  The applicability is the building of trust services, able to automatically evaluate the SLAs associated to other cooperative services (at run-time).

Future Works  Definition of a framework for SLA management (and monitoring);  Definition of a set of trusted cooperative- services based on the methodology;  Performance-trustability trade-off evaluation.