A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.

Slides:



Advertisements
Similar presentations
Authentication Authorization Accounting and Auditing
Advertisements

Testing Relational Database
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Grid-Enabling Data: Sticking Plaster, Sellotape, & Chewing Gum? Colin C. Venters National Centre for e-Social Science University.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Autonomic Systems Justin Moles, Winter 2006 Security in an Autonomic Computing Environment Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
02/12/00 E-Business Architecture
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Cloud Computing for Chemical Property Prediction Paul Watson School of Computing Science Newcastle University, UK Microsoft Cloud.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Plenary Panel: Challenges towards the Global Adoption of Cloud Computing Chair: Vladimir Getov, University of Westminster Panelists: Stephen S. Yau, Arizona.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Autonomic Computing An Introduction Guenter Kickinger.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Atif Iqbal, R. K. Bagga.  Appropriate mechanism for good governance with the involvement of Information Technology in the system of the government and.
1 Dr. Markus Hillenbrand, ICSY Lab, University of Kaiserslautern, Germany A Generic Database Web Service for the Venice Service Grid Michael Koch, Markus.
Network Security Essentials Chapter 1
4-th International Conference for Confidence and Security in the Information Society Mikhail Senatorov Andrey Shcherbakov Trusted information and telecommunication.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
ASG - Towards the Adaptive Semantic Services Enterprise Harald Meyer WWW Service Composition with Semantic Web Services
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Copyright © 2012 Axceleon Intellectual Property All rights reserved HPC User Forum, Dearborn MI. Our Focus: Enable HPC solutions in the Cloud for our Customer.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Interface to the network and Devices Chapter.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Geo-distributed Messaging with RabbitMQ
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Michał Jankowski, Paweł Wolniewicz, Jiří Denemark, Norbert Meyer,
June 13-15, 2007Policy 2007 Infrastructure-aware Autonomic Manager for Change Management H. Abdel SalamK. Maly R. MukkamalaM. Zubair Department of Computer.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
An approach to Web services Management in OGSA environment By Shobhana Kirtane.
Enabling Grids for E-sciencE Agreement-based Workload and Resource Management Tiziana Ferrari, Elisabetta Ronchieri Mar 30-31, 2006.
A Semi-Automated Digital Preservation System based on Semantic Web Services Jane Hunter Sharmin Choudhury DSTC PTY LTD, Brisbane, Australia Slides by Ananta.
Real-Time Systems Laboratory Seolyoung, Jeong The CASCADAS Framework for Autonomic Communications Autonomic Communication Springer.
Service Oriented Architecture (SOA) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Federated IdM Across Heterogeneous Clouding Environment
Security for Open Science
Gestione di Service Level Agreements (SLA) in sistemi Grid
Chapter 2 Database Environment Pearson Education © 2009.
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
Introduction to Databases Transparencies
Autonomous Aggregate Data Analytics in Untrusted Cloud
IS4680 Security Auditing for Compliance
Database Environment Transparencies
How to Mitigate the Consequences What are the Countermeasures?
PLANNING A SECURE BASELINE INSTALLATION
Introduction to SOA Part II: SOA in the enterprise
Cryptography and Network Security
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science AHM September 10 th Edinburgh

© British Telecommunications plc Content Introduction Our vision Objectives Results Adaptive security Future research

© British Telecommunications plc Introduction R*S*C = enormous amount of work in development and maintenance (Resource, Settings, Clients)‏

© British Telecommunications plc What is Cloud? Resources comes from "the cloud", a public network (e.g. the Internet), rather than from a specific identifiable system “Computing systems that can manage themselves given high-level objectives from administrators” –Automation of management tasks (e.g. Amazon Simple Storage Service S3)‏ Paradox: add a level of complexity to allow easier tasks for the end user‏ –Computing resource is a wider concept (e.g. O.S.)‏ Take advantage of the Non Functional Property (NFP) providers in the Cloud

© British Telecommunications plc Prospect - Objectives Manage a resource’s non-functional properties effectively –Allow for rapid change and possibly adaptation Allow for an easy integration of potential non- functional properties “handlers” Control the quality and security of the non-functional properties management Propose an architecture which will enable seamless integration Guarantee an able management of the messages

© British Telecommunications plc Results – Resource Profile Uric acid Glucose Iron Phosphorus Potassium Sodium Total protein … Authentication Authorisation Audit Logging Billing Encryption Transport …

© British Telecommunications plc Results – Resource Profile Set of non functional properties required Adaptation level Adapt: the broker should find a possible profile as close as possible from the user’s requirements. Strictly enforce: the broker should not try to modify the element required and provide it or nothing. Request user’s validation: any attempt to change this element should go through the user’s validation before being put in place. These properties can concern the profile as a whole or an single element Resource owner's policies

© British Telecommunications plc Results – Broker Architecture Managed Profile Architecture Infrastructure services

© British Telecommunications plc Sources of adaptation External factors: –Static/negotiable contract or resource profile (e.g. RosettaNet Partner Interface Processes (PIPS))‏ –Modification of existing requirements (e.g. security threat is discovered, user modifications)‏ Internal factors: –Unavailability of components

© British Telecommunications plc Potential output - Adaptive Security Managed Security Profile

© British Telecommunications plc Results Profile Manager –The enactment engine retrieves the relevant CCM from the Client Registry at run time and implements the appropriate SP.

© British Telecommunications plc Results

Evaluation strategy Qualitative evaluation: –Relevance of the adaptation towards: user's request targeted resource safety of the resource –Relevance of the profile relevance of the safe profile usage adequacy of selected services suitability of profile implemented correctness of profile called Quantitative evaluation: –rapidity –scalability limit

© British Telecommunications plc Future research Experimentation / Evaluation Trust / Security brokering Performance

© British Telecommunications plc Summary Context: ever increasing level of complexity –standards and protocols –distributed systems themselves Goal: improve the adaptability of resources Solution: a broker based architecture that allows for a more dynamic management of the non functional properties

© British Telecommunications plc Thank you Pierre de Leusse Room 2.19, Devonshire Building School of Computing Sciences Newcastle University United Kingdom (0044)