- A. Celesti et al University of Messina, Italy Enhanced Cloud Architectures to Enable Cross-Federation Presented by Sanketh Beerabbi University of Central.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Crucial Patterns in Service- Oriented Architecture Jaroslav Král, Michal Žemlička Charles University, Prague.
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
UDDI, Discovery and Web Services Registries. Introduction To facilitate e-commerce, companies needed a way to locate one another and exchange information.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
EUROPEAN UNION Polish Infrastructure for Supporting Computational Science in the European Research Space User Oriented Provisioning of Secure Virtualized.
A Tour of Federated Clouds Robert Bohn, PhD Advanced Network Technologies Division GEOSS 25 March 2015 Norfolk, VA.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
A Survey of Risk: Federated ID Management in Cloud and Grid Computing Presentation by Andy Wood (P )
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Single Sign-On -Mayuresh Pardeshi M.Tech CSE - I.
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández.
Cloud Computing Why is it called the cloud?.
Cloud Computing Cloud Security– an overview Keke Chen.
3 Cloud Computing.
A Virtual Cloud Computing Provider for Mobile Devices Gonzalo Huerta-Canepa Dongman Lee.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Distributed FutureGrid Clouds for Scalable Collaborative Sensor-Centric Grid Applications For AMSA TO 4 Sensor Grid Technical Interchange Meeting By Anabas,
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 2.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Through the development of advanced middleware, Grid computing has evolved to a mature technology in which scientists and researchers can leverage to gain.
Fares Zekri Account Technology Strategist Microsoft Tunisia ITU Workshop on “Cloud Computing” (Tunis, Tunisia, June 2012) Microsoft Clouds.
Large Scale Sky Computing Applications with Nimbus Pierre Riteau Université de Rennes 1, IRISA INRIA Rennes – Bretagne Atlantique Rennes, France
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
SBIR Final Meeting Collaboration Sensor Grid and Grids of Grids Information Management Anabas July 8, 2008.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Shibboleth: An Introduction
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
The Globus Toolkit The Globus project was started by Ian Foster and Carl Kesselman from Argonne National Labs and USC respectively. The Globus toolkit.
The EUBrazilOpenBio-BioVeL Use Case in EGI Daniele Lezzi, Barcelona Supercomputing Center EGI-TF September 2013.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
General Overview of Various SSO Systems: Active Directory, Google & Facebook Antti Pyykkö Mikko Malinen Oskari Miettinen.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
ETRIKS Platform for bioinformatics ISGC 17/03/15 Pengfei Liu, CC-IN2P3/CNRS.
Access Policy - Federation March 23, 2016
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Presented by Edith Ngai MPhil Term 3 Presentation
Literature Survey Venn Diagram
Accessing the VI-SEEM infrastructure
Secure Single Sign-On Across Security Domains
Resource subscription using DDS in oneM2M
Introduction to Windows Azure AppFabric
Analyn Policarpio Andrew Jazon Gupaal
Cloud Security– an overview Keke Chen
Institute for Cyber Security
Data and Applications Security Developments and Directions
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Practical Machine Learning for Cloud Intrusion Detection
Cloud Computing Dr. Sharad Saxena.
ESA Single Sign On (SSO) and Federated Identity Management
3 Cloud Computing.
Citrix in the Cloud Today
Presentation transcript:

- A. Celesti et al University of Messina, Italy Enhanced Cloud Architectures to Enable Cross-Federation Presented by Sanketh Beerabbi University of Central Florida

Cloud federation is the process of interconnecting the cloud computing environments of two or more service providers to create a uniform environment spanning public and private clouds. Cloud federation enables consistency and access controls when different clouds share authentication, computing resources, command and control, or access to storage resources. Introduction

Stage1: Monolithic clouds Eg. Amazon, Google, Microsoft Stage2: Vertical Federation Cloud providers will leverage cloud services from other providers. Eg. Cloud federation using middleware such as Eucalyptus, Nimbus etc Stage3: Horizontal Federation Cloud providers will federate themselves to gain economies of scale and an enlargement of their capabilities. Eg. services such as FutureGrid & EGI Federated Cloud? Current Scenario

Cross Cloud Federation

Home cloud –Already provides services to other clouds (stage 2) –Can’t instantiate more VMs due to lack of resources. –Forwards federation requests to other foreign clouds to host its VM on their infrastructure (stage 3) Foreign cloud –leases part of storage and computing capabilities of its virtualization infrastructure to home clouds A cloud provider can be both home cloud and/or foreign cloud at the same time. Cross Cloud Federation

Adds an additional communication layer on the top of the existing architecture Cross-Cloud Federation Manager

Discovery The home cloud looks for other available clouds using p2p approach based on presence detection. Follows publish and subscribe software pattern (using centralized repository) Implemented using the concept of IM service using XMPP(Extensible Messaging and Presence Protocol) 3 phase cross-cloud federation model

Match making Home cloud selects other clouds which best meets its requirements based on CPU, RAM, QoS etc Carries out a numerical analysis on the quantifiable parameters to select the best foreign cloud Implemented using XACML (Extensible Access Control Markup Language) 3 phase cross-cloud federation model

Authentication Home cloud establishes mutual trust with selected foreign clouds. Home cloud logs into foreign cloud using SSO login service provided by a third party ID provider(IdP). Implemented using SAML (Security Assertion Markup Language) 3 phase cross-cloud federation model

Overall Architecture

Can be added to existing systems with minor modifications Centralized repository can be a single point of failure. Paper could have simulated the architecture for performance evaluation. Overall, good solution to start cloud federation. Conclusion