An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment

Total Page:16

File Type:pdf, Size:1020Kb

An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment Primož Cigoj1,2, Borka Jerman Blažič2 and Tomaž Klobučar2 1Jožef Stefan International Postgraduate School, Jamova cesta 39, 1000 Ljubljana, Slovenia 2Jozef Stefan Institute, Laboratory for Open Systems and Networks, Jamova cesta 39, 1000 Ljubljana, Slovenia Keywords: Single Sign-on, Identity Management, Identity Federation, Cloud Computing, Security, Cloud Management, Cloud Provisioning, Infrastructure-as-a-Service, IaaS, Multi-platform Cloud, Access Control, Authentication, Authorization, Cloud Service Provider, Privacy, Software Platform, Centralized Systems, OpenStack, VMware. Abstract: The security provision within multi-platform cloud computing environment is still considered not to be properly solved due to different problems with technical and human-based origin. This paper presents an attempt to provide an authentication and authorization solution based on the single sign-on (SSO) approach for cloud service users and administrators in a multi-platform environment. The problem of authentication in cloud services is briefly introduced and the approach implemented for cloud environment with two different proprietary (VMware) and open source (OpenStack) platforms is described. 1 INTRODUCTION the user level (Tripathi and Mishra, 2011), it is also complex to manage and create authentication Cloud computing has revolutionized the provision of mechanisms for several services and several computing services, transferring them from local to platforms (Fernandes, Soares, Gomes, Freire and locally unspecified remote environments, which are Inácio, 2014). Identity federation and single sign-on controlled by third party service providers. The main (SSO) techniques address these issues by allowing cloud computing challenge for vendors, providers and exchange of authentication and authorization users of clouds remains protection of the cloud information between two parties, such as an Identity technology, services and users with adequate security Provider (IdP) and a Service Provider (SP). measures. According to the survey conducted by While the identity federation and single sign-on Microsoft and the National Institute of Standards and concepts have been well covered in the literature in Technology (NIST), security in the cloud computing the past years, in general as well as in the cloud model was the ICT executives’ main concern (Jansen context e.g. (Pérez-Méndez, Pereniguez-Garcia, and Grance, 2011; Microsoft, 2010). Consequently, Marin-Lopez, López-Millán and Howlett, 2014), many business entities are still not very keen on (Cruz Zapata, Fernández-Alemán and Toval, 2014), adopting cloud computing. there are still practical issues that prevent their In the cloud users alone have no control over their straightforward and simple application in the multi- data and their cloud identity. Installation procedures platform cloud environments. Our attempt described are often complex and there is no adequate and in this paper was to design and develop a solution that complete security solution that ensures the safe would provide trustworthy and secure authentication deployment of the underlying infrastructure and safe and authorization service in such environment. The use of the services. Especially in the multi-platform proposed solution is based on the SSO principle and clouds and inter-clouds, where multiple cloud was implemented on two different platforms systems can be accessed, users and administrators are (OpenStack and VMware). It was tested and faced with different authentication and authorisation evaluated within a large National Competence Centre systems, different login dialogs, and each login dialog project on cloud-assisted services for different fields is matched with different credentials. In addition to of application. being difficult implementing strong authentication at The paper discusses the problem and related work first. Then it introduces the selected SSO- based Cigoj P., Jerman Blažicˇ B. and Klobucarˇ T.. 365 An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment. DOI: 10.5220/0005351103650372 In Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER-2015), pages 365-372 ISBN: 978-989-758-104-5 Copyright c 2015 SCITEPRESS (Science and Technology Publications, Lda.) CLOSER2015-5thInternationalConferenceonCloudComputingandServicesScience solution, and describes the development approach and attributes are securely shared across multiple the implementation course. The presentation ends IdM systems. Federation of identities can be with discussion and plans for future work. achieved in several ways; e.g., based on SAML (Cantor, Kemp, Philpott and Maler, 2005) or the OpenID solution (Ferg, Fitzpatrick and 2 AUTHENTICATION AND Howells, 2007). One of the important properties is the required compatibility of cloud IDENTITY MANAGEMENT providers’ IdM systems. SERVICES IN . Authorization: Authorization specifies the MULTI-PLATFORM CLOUD rights of individual user accounts. It is important for the cloud the account INFRASTRUCTURE management procedures to be set up and for the rights verification from the highest system According to the Cloud Security Alliance (CSA) authority. Furthermore, the granted right (Simmonds, Rezek and Reed, 2011), the leader in the should be consistent with the policy. field of cloud security, the largest identified cloud . Access control: Access control requirements security problem is related to the shared technology vary widely according to the type of the end- issues. Infrastructure resource sharing can potentially user (an individual or an organization). In order allow one consumer to peek into another consumer’s to implement an access control system, an data if the system does not provide strong system for access control policy must be set, and its authorization and authentication. Here, the problems implementation should allow the performed of account hijacking or user credential theft are also actions to be traceable. relevant. The traditional identity management (IdM) Apart from these recommendations it becomes approach is more centralized compared to the current obvious that an optimal system for ensuring solution used in cloud computing, and usually is authentication and authorization in a multi-platform based on user personal data, such as real name, user cloud system would also benefit from the single sign- name, e-mail address, identification number, access on approach principles. The Open Group defines SSO permissions, etc. The use of a separate IdM system as “a mechanism whereby a single action of user within an organisation, and its connection with the authentication and authorization can permit a user to cloud is quite complicated, and there is no simple way access all computers and systems where that user has to extend its use to the cloud (Lonea, Tianfield and access permission, without the need to enter multiple Popescu, 2013). In order this to become part of the passwords” (Group TO, 2014). The most important cloud system the following actions and the security property that the SSO principle brings is the corresponding implementations are required (Cantor, common secure infrastructure, which can be carefully Kemp, Philpott and Maler, 2005): managed and protected (Andronache and Nisipasiu, . Registration of identities: Verification of a user 2011). At the same time, when using the SSO account is needed before proceeding with the approach, the cloud services do not have to manage registration in accordance with the relevant each user account. Account management can be security standards. Organizations that transfer carried out by a central authentication system. their user accounts to the cloud must make sure Although the concepts of identity federation and their user account management system is up-to- single sign-on are well known in the cloud research date and safe. literature there are still some practical design and . Authentication: Management and implementation issues worth discussing, especially in implementation of the user authentication must the multi-platform cloud environments, cloud be performed in a trustworthy way. The IdM federations, and inter clouds. General proposed systems should allow configuration of the solutions for a multi-platform environment often do authentication systems. Another important not take into account the current implementation property of the system should be the cloud- status, functionalities and openness of the available providers’ identification disclosure to third cloud platforms, as well as not take advantage of their party providers and the use of authentication by existing services. The papers also do not give enough both parties. details of the proposed solutions and their integration . Federation of identities: Federation of into existing platforms. identities allows users to use the same set of Panarello et al., for example, analyse credentials to obtain access to different requirements for IaaS cloud federation (Panarello, resources. User`s electronic identity and 366 AnApproachintheDesignofCommonAuthenticationSolutionforaMulti-PlatformCloudEnvironment Celesti, Fazio, Villari and Puliafito, 2014). While VMware vCloud Director is a cloud platform they envisage SAML, OpenID and Shibboleth as an software solution that enables enterprises to build authentication solution, only a standard and general secure, multi-tenant private clouds by pooling identity
Recommended publications
  • Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions
    00 Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions MUTAZ BARIKA, University of Tasmania SAURABH GARG, University of Tasmania ALBERT Y. ZOMAYA, University of Sydney LIZHE WANG, China University of Geoscience (Wuhan) AAD VAN MOORSEL, Newcastle University RAJIV RANJAN, Chinese University of Geoscienes and Newcastle University Interest in processing big data has increased rapidly to gain insights that can transform businesses, government policies and research outcomes. This has led to advancement in communication, programming and processing technologies, including Cloud computing services and technologies such as Hadoop, Spark and Storm. This trend also affects the needs of analytical applications, which are no longer monolithic but composed of several individual analytical steps running in the form of a workflow. These Big Data Workflows are vastly different in nature from traditional workflows. Researchers arecurrently facing the challenge of how to orchestrate and manage the execution of such workflows. In this paper, we discuss in detail orchestration requirements of these workflows as well as the challenges in achieving these requirements. We alsosurvey current trends and research that supports orchestration of big data workflows and identify open research challenges to guide future developments in this area. CCS Concepts: • General and reference → Surveys and overviews; • Information systems → Data analytics; • Computer systems organization → Cloud computing; Additional Key Words and Phrases: Big Data, Cloud Computing, Workflow Orchestration, Requirements, Approaches ACM Reference format: Mutaz Barika, Saurabh Garg, Albert Y. Zomaya, Lizhe Wang, Aad van Moorsel, and Rajiv Ranjan. 2018. Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions.
    [Show full text]
  • Polycom Realpresence Cloudaxis Open Source Software OFFER
    Polycom® RealPresence® CloudAXIS™ Suite OFFER of Source for GPL and LGPL Software You may have received from Polycom®, certain products that contain—in part—some free software (software licensed in a way that allows you the freedom to run, copy, distribute, change, and improve the software). As a part of this product, Polycom may have distributed to you software, or made electronic downloads, that contain a version of several software packages, which are free software programs developed by the Free Software Foundation. With your purchase of the Polycom RealPresence® CloudAXIS™ Suite, Polycom has granted you a license to the above-mentioned software under the terms of the GNU General Public License (GPL), GNU Library General Public License (LGPLv2), GNU Lesser General Public License (LGPL), or BSD License. The text of these Licenses can be found at the internet address provided in Table A. For at least three years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the contact information provided below, for a charge of no more than our cost of physically distributing, the following items: • A copy of the complete corresponding machine-readable source code for programs listed below that are distributed under the GNU GPL • A copy of the corresponding machine-readable source code for the libraries listed below that are distributed under the GNU LGPL, as well as the executable object code of the Polycom work that the library links with The software included or distributed for the product, including any software that may be downloaded electronically via the internet or otherwise (the "Software") is licensed, not sold.
    [Show full text]
  • In Cloud Computing 1 1 0
    PRIVATE CLOUD e-zine Strategies for building a private cloud In this issue: q TRENDS IN CLOUD COMPUTING 1 1 0 2 By SearchCloudComputing.com Staff R E B M E V q OPEN SOURCE IN THE CLOUD: BOON OR BUST? O N | By Bill Claybrook 4 . 0 N | NO DEMOCRACY FOR APPS IN THE CLOUD? 1 q . L O V By Mike Laverick 1E EDITOR’S LETTER OPEN SOURCE MEETS CLOUD COMPUTING HOME AS CLOUD COMPUTING continues to for evaluating your data center’s mature, IT managers want more. application portfolio and associated They are clamoring for better inte - concerns, including poor application EDITOR’S LETTER gration of cloud platforms with performance and latency, data leak - existing tools, greater control and age, and issues with compliance or TRENDS management, improved self-service, other regulations. and greater portability among cloud But first, in our Cloud One on One environments . interview, we catch up with Altaf OPEN SOURCE Enter open source software, Rupani, the VP of global strategic IN THE CLOUD: which has become the architectural planning and architecture at Dow BOON OR BUST? foundation for many cloud projects . Jones, to explore the company’s Open source software is often lower private cloud rollout and some of cost than proprietary alternatives, its challenges in working with public NO DEMOCRACY FOR APPS IN and its open code base can prevent cloud providers to get the project THE CLOUD? the vendor lock-in common with up and running. The company’s proprietary technologies. Open ongoing efforts may provide a source comes with its challenges, guide for your own initiative.
    [Show full text]
  • Second Year Cloud-Like Management of Grid Sites Research Report
    Second Year Cloud-like Management of Grid Sites Research Report Henar Muñoz Frutos, Ignacio Blasco Lopez, Juan Carlos Cuesta Cuesta, Eduardo Huedo, Rubén Montero, Rafael Moreno, Ignacio Llorente To cite this version: Henar Muñoz Frutos, Ignacio Blasco Lopez, Juan Carlos Cuesta Cuesta, Eduardo Huedo, Rubén Montero, et al.. Second Year Cloud-like Management of Grid Sites Research Report. 2012. hal- 00705635 HAL Id: hal-00705635 https://hal.archives-ouvertes.fr/hal-00705635 Submitted on 8 Jun 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Enhancing Grid Infrastructures with Virtualization and Cloud Technologies Second Year Cloud-like Management of Grid Sites Research Report Deliverable D6.6 (V1.0) 4 June 2012 Abstract This report presents the results of the research and technological development ac- tivities undertaken during the second phase of the project by the three tasks in which WP6 is divided. Mainly, this work has been focused on management of complex multi-tier applications, scaling, monitoring and balancing them to face peaks in demand. In addition, advanced networking (network isolation and fire- walling) and storage capabilities (datastore abstraction and new transfer drivers) have been developed.
    [Show full text]
  • A Generic Development and Deployment Framework for Cloud Computing and Distributed Applications
    Computing and Informatics, Vol. 32, 2013, 461{485 A GENERIC DEVELOPMENT AND DEPLOYMENT FRAMEWORK FOR CLOUD COMPUTING AND DISTRIBUTED APPLICATIONS Binh Minh Nguyen, Viet Tran, Ladislav Hluchy´ Institute of Informatics Slovak Academy of Sciences D´ubravsk´acesta 9 845 07 Bratislava, Slovakia e-mail: fminh.ui, viet.ui, [email protected] Communicated by Jacek Kitowski Abstract. Cloud computing has paved the way for advance of IT-based on demand services. This technology helps decrease capital expenditure and operation costs, solve scalability issue and many more user and provider constraints. However, devel- opment and deployment of distributed applications on cloud environment becomes a more and more complex task. Cloud users must spend a lot of time to prepare, in- stall and configure their applications on clouds. In addition, after development and deployment, the applications almost cannot move from one cloud to another due to the lack of interoperability between them. To address these problems, in this paper we present a novel development and deployment framework for cloud distributed applications/services. Our approach is based on abstraction and object-oriented programming technique, allowing users to easily and rapidly develop and deploy their services into cloud environment. The approach also enables service migration and interoperability among the clouds. Keywords: Cloud computing, distributed application, abstraction, object-oriented programming, interoperability Mathematics Subject Classification 2010: 68-M14 462 B. M. Nguyen, V. Tran, L. Hluch´y 1 INTRODUCTION Cloud computing is described as a business model for on-demand delivery of com- putation power, in which consumers pay providers what they used (\pay-as-you- go").
    [Show full text]
  • Entitlement Control Message Generator
    Open Source Used In ECMG 4.5.3 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-156819513 Open Source Used In ECMG 4.5.3 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-156819513 Contents 1.1 ACE+TAO 5.5.10 + 1.5.10 1.1.1 Available under license 1.2 Apache Commons Codec 1.3. 1.2.1 Available under license 1.3 Apache Commons Lib Apache 2.0 1.3.1 Available under license 1.4 Apache Jakarta Commons Configuration 1.9 1.4.1 Available under license 1.5 Apache Jakarta Commons DBCP 1.4 1.5.1 Available under license 1.6 Apache Jakarta Commons Lang 3.1 1.6.1 Available under license 1.7 Apache Log4j 1.2.16 1.7.1 Available under license 1.8 apache-ant_within-cglib 1.6.5 1.8.1 Available under license 1.9 apache-log4j 1.2.15 1.9.1 Available under license 1.10 apache-log4j 1.2.15 :DUPLICATE 1.10.1 Available under license 1.11 args4j 2.0.12 1.11.1 Available under license 1.12 asm-all-3.3.1_within-cglib 3.3.1 1.12.1 Available under license 1.13 bcprov-jdk16
    [Show full text]
  • Capability Analysis of Cloud Resource Orchestration Frameworks
    Capability Analysis of Cloud Resource Orchestration Frameworks Alireza Khoshkbarforoushha, Australian National University, Australia Meisong Wang, Australian National University, Australia Rajiv Ranjan, CSIRO, Australia Lizhe Wang, Chinese Academy of Sciences, China Leila Alem, CSIRO Computational Informatics, Australia Samee U. Khan, North Dakota State University, USA Boualem Benatallah, University of New South Wales, Australia Abstract Since the inception of cloud computing in mid 2000, academic groups and industry vendors have developed a number of Cloud Re- source Orchestration Frameworks (CROFs) for simplifying the application management. The CROF aids software engineers, scien- tists, and infrastructure administrators to migrate and manage their in-house applications to cloud environments. Despite the higher level of technical maturity of such CROFs, there is clear lack of study that can help cloud application administrators in understand- ing and analyzing the features of CROFs against a common set of concepts and dimensions. Therefore, this study presents a set of generic technical dimensions for clearly analyzing the capabilities of the overriding CROFs. A concise survey and classification of most prominent research work is also presented. Keywords: Cloud Computing, Cloud service management, Cloud resource orchestration. 1. Introduction Cloud computing assembles a large network of virtualized services, namely: hardware resources (compute, storage, network, etc.) and software resources (databases, message queuing systems, monitoring systems, load-balancers, etc.). The new cloud computing ecosystem enables instant access to virtually unlimited software and hardware resources. It offers a number of considerable advantages including no-upfront investment, lower operating cost, and infinite scalabil- ity. However, orchestrating the right set of cloud resources for creating a Quality of Service (QoS) optimized applica- tion architecture remains a challenging technical problem.
    [Show full text]
  • Fairplay License Server
    Open Source Used In Fairplay DRM License 1.0.4 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-142022930 Open Source Used In Fairplay DRM License 1.0.4 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-142022930 Contents 1.1 Apache Commons Codec 1.3. 1.1.1 Available under license 1.2 Apache Commons Lib Apache 2.0 1.2.1 Available under license 1.3 Apache Commons Lib Apache 2.0 1.3.1 Available under license 1.4 Apache Derby 10.10.1.1 1.4.1 Available under license 1.5 Apache HTTP Server 2.2.9 1.5.1 Available under license 1.6 Apache Jakarta Commons Configuration 1.9 1.6.1 Available under license 1.7 Apache Jakarta Commons HttpClient 3.1 1.7.1 Available under license 1.8 Apache Jakarta Commons Lang 3.1 1.8.1 Available under license 1.9 Apache Log4j 1.2.16 1.9.1 Available under license 1.10 apache-log4j 1.2.15 1.10.1 Available under license 1.11 apache-log4j 1.2.15 :DUPLICATE 1.11.1 Available under license 1.12 args4j 2.0.12 1.12.1 Available under
    [Show full text]
  • Cloud-Like Management of Grid Sites 2.0 Software Henar Muñoz Frutos, Eduardo Huedo, Rubén Montero, Charles Loomis
    Cloud-like Management of Grid Sites 2.0 Software Henar Muñoz Frutos, Eduardo Huedo, Rubén Montero, Charles Loomis To cite this version: Henar Muñoz Frutos, Eduardo Huedo, Rubén Montero, Charles Loomis. Cloud-like Management of Grid Sites 2.0 Software. 2012. hal-00696646v2 HAL Id: hal-00696646 https://hal.archives-ouvertes.fr/hal-00696646v2 Submitted on 15 May 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Enhancing Grid Infrastructures with Virtualization and Cloud Technologies Cloud-like Management of Grid Sites 2.0 Software Deliverable D6.5 (V1.0) 11 May 2012 Abstract This document presents the features implemented for the automatic deployment and dynamic provision of grid services, and for the scalable cloud-like management of grid site resources in the second year of the project. These features, developed largely in Work Package 6 (WP6), are integrated into the StratusLab Toolkit by Work Package 4 (WP4). StratusLab is co-funded by the European Community’s Seventh Framework Programme (Capacities) Grant Agreement INFSO-RI-261552. The information contained in this document represents the views of the copyright holders as of the date such views are published.
    [Show full text]
  • Integrated Management of Iaas Resources
    Integrated Management of IaaS Resources Fernando Meireles1;2 and Benedita Malheiro1;2 1 School of Engineering, Polytechnic Institute of Porto, Porto, Portugal, 2 INESC TEC, Porto, Portugal {1050758,mbm}@isep.ipp.pt Abstract. This paper proposes and reports the development of an open source solution for the integrated management of Infrastructure as a Ser- vice (IaaS) cloud computing resources, through the use of a common API taxonomy, to incorporate open source and proprietary platforms. This research included two surveys on open source IaaS platforms (OpenNeb- ula, OpenStack and CloudStack) and a proprietary platform (Parallels Automation for Cloud Infrastructure - PACI) as well as on IaaS abstrac- tion solutions (jClouds, Libcloud and Deltacloud), followed by a thorough comparison to determine the best approach. The adopted implementa- tion reuses the Apache Deltacloud open source abstraction framework, which relies on the development of software driver modules to interface with different IaaS platforms, and involved the development of a new Deltacloud driver for PACI. The resulting interoperable solution success- fully incorporates OpenNebula, OpenStack (reuses pre-existing drivers) and PACI (includes the developed Deltacloud PACI driver) nodes and provides a Web dashboard and a Representational State Transfer (REST) interface library. The results of the exchanged data payload and time response tests performed are presented and discussed. The conclusions show that open source abstraction tools like Deltacloud allow the modu- lar and integrated management of IaaS platforms (open source and pro- prietary), introduce relevant time and negligible data overheads and, as a result, can be adopted by Small and Medium-sized Enterprise (SME) cloud providers to circumvent the vendor lock-in problem whenever ser- vice response time is not critical.
    [Show full text]
  • D4.1 Provider Agnostic Interface Definition & Mapping Cycle
    Ref. Ares(2018)3067143 - 11/06/2018 Title: Provider agnostic interface definition & mapping cycle Executive summary: Multi-cloud Execution-ware for Large-scale Optimised Data- Intensive Computing This deliverable presents the Executionware component of H2020-ICT-2016-2017 the Melodic project. The tasks of the Executionware are: (a) Leadership in Enabling and the allocation of resources from a heterogeneous multi-cloud Industrial Technologies; environment, (b) the usage of those resources to deploy and Information and Communication Technologies run (data processing) tasks and (c) monitoring the runtime context of the running tasks. Grant Agreement No.: 731664 This document focuses on the provider agnostic interface Duration: used to abstract syntactic and semantic differences in the 1 December 2016 - cloud providers’ APIs and the required mapping to translate 30 November 2019 the agnostic interface to concrete implementations on the www.melodic.cloud providers’ side. In addition, it presents a first draft of the Deliverable reference: resource management layer, focusing on resource D4.1 advertisement to Melodic’s Upperware. Finally, the Date: deliverable gives an outlook for a refined resource 09 April 2019 management layer and the data processing layer that will Responsible partner: span on top of it. UULM Editor(s): Daniel Baur Author(s): Daniel Baur, Daniel Seybold Approved by: Ernst Gunnar Gran ISBN number: N/A Document URL: http://www.melodic.cloud/deli verables/D4.1 Provider agnostic interface definition & mapping cycle This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 731664 www.melodic.cloud Deliverable reference: Editor(s): 4.1 Daniel Baur Document Period Covered M1-16 Deliverable No.
    [Show full text]
  • The Building Blocks of a Paas
    J Netw Syst Manage DOI 10.1007/s10922-012-9260-2 The Building Blocks of a PaaS Cla´udio Teixeira • Joaquim Sousa Pinto • Ricardo Azevedo • Tiago Batista • Andre´ Monteiro Received: 15 June 2011 / Revised: 8 December 2012 / Accepted: 26 December 2012 Ó The Author(s) 2013. This article is published with open access at Springerlink.com Abstract Traditional cloud computing providers enable developers to program and deploy applications in the cloud by using platform as a service (PaaS) providers. Despite the benefits of such an approach, this service model usually comes with a high level of the lock in effect into the service provider. The lock in effect occurs when a software developer needs to change its cloud provider. When this happens, it usually means a major application rewrite, specific for the new PaaS. This paper details the initial results of a project whose goal is to build a PaaS where vendor lock in does not occur. With this PaaS, developers wishing to deploy their applications into the cloud may continue to program using their usual development environments. There are no necessary changes required to make the application PaaS compatible. As a proof of concept, we developed an open source PaaS management application as a regular web application and then deployed it on the cloud. This is an original, unpublished work. Neither the entire paper nor any part of its contents has been published or has been accepted for publication elsewhere. This work has not been submitted to any other journal. C. Teixeira (&) Á J. S. Pinto Á T. Batista Á A.
    [Show full text]