loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Asma Guesmi 1 ; Patrice Clemente 2 ; Frederic Loulergue 1 and Pascal Berthomé 2

Affiliations: 1 LIFO EA 4022 and Université d'Orléans, France ; 2 LIFO EA 4022 and INSA Centre-Val de Loire, France

ISBN: 978-989-758-117-5

Keyword(s): Broker, Cloud computing, Security, Requirements.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Formal Methods for Security ; Information and Systems Security ; Security and Privacy in IT Outsourcing ; Security and Privacy in the Cloud ; Security in Information Systems ; Security Requirements ; Security Verification and Validation

Abstract: It is difficult for customers to select the adequate cloud providers which fit their needs, as the number of cloud offerings increases rapidly. Many works thus focus on the design of cloud brokers. Unfortunately, most of them do not consider precise security requirements of customers. In this paper, we propose a methodology defined to place services in a multi-provider cloud environment, based on functional and non-functional requirements, including security requirements. To eliminate inner conflicts within customers requirements, and to match the cloud providers offers with these customers requirements, we use a formal analysis tool: Alloy. The broker uses a matching algorithm to place the required services in the adequate cloud providers, in a way that fulfills all customer requirements. We finally present a prototype implementation of the proposed broker.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.234.214.113

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Guesmi, A.; Clemente, P.; Loulergue, F. and Berthomé, P. (2015). Cloud Resources Placement based on Functional and Non-functional Requirements.In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 335-342. DOI: 10.5220/0005552503350342

@conference{secrypt15,
author={Asma Guesmi. and Patrice Clemente. and Frederic Loulergue. and Pascal Berthomé.},
title={Cloud Resources Placement based on Functional and Non-functional Requirements},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={335-342},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005552503350342},
isbn={978-989-758-117-5},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Cloud Resources Placement based on Functional and Non-functional Requirements
SN - 978-989-758-117-5
AU - Guesmi, A.
AU - Clemente, P.
AU - Loulergue, F.
AU - Berthomé, P.
PY - 2015
SP - 335
EP - 342
DO - 10.5220/0005552503350342

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.