Abstract

Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been developed to coexist and evolve together. The stakeholders of such a system need a variety of models to give them a perspective of the possibilities of the system, to evaluate specific quality attributes, and to extend the system. A powerful representation when building or using software ecosystems is the use of architectural models, which describe the structural aspects of such a system. These models have value for security and compliance, are useful to build new systems, can be used to define service contracts, find where quality factors can be monitored, and to plan further expansion. We have described a cloud ecosystem in the form of a pattern diagram where its components are patterns and reference architectures. A pattern is an encapsulated solution to a recurrent problem. We have recently expanded these models to cover fog systems and containers. Fog Computing is a highly-virtualized platform that provides compute, storage, and networking services between end devices and Cloud Computing Data Centers; a Software Container provides an execution environment for applications sharing a host operating system, binaries, and libraries with other containers. We intend to use this architecture to answer a variety of questions about the security of this system as well as a reference to design interacting combinations of heterogeneous components. We defined a metamodel to relate security concepts which is being expanded.

Highlights

  • Due to their convenience and relative low cost, cloud computing systems have become very successful in attracting small and medium businesses and academic institutions

  • The application interacts with the Client Proxy, which represents the acnlidenlPti.brrToavhrieideCes owanirttahuinnotetihmreperrcoeonvnvidtiareiosnneamrsse.entCtootfnhStaaetirnvceaircnsespsutroopvptihoderetaitpshopellaiitcseaodtliaoetnxeesd.cuCetxoieoncntuaatiinnoednreoIxmfteangpsepisblilacearestieosrtnvosirceeodsntioan tsihmheaaragepedprlheicpoasottsioiotnop.reireast.ing system (OS); this is a Software Container (Figure 5)

  • Pattern models are especially useful for handling security and privacy, a unified approach reduces complexity, one of the most important weaknesses used by attackers and can enable analysis of the propagation of threats and data leaks

Read more

Summary

Introduction

Due to their convenience and relative low cost, cloud computing systems have become very successful in attracting small and medium businesses and academic institutions. Software ecosystems include economic and socio-technical aspects [5]; but those aspects are not considered here In cloud ecosystems their complementary systems may not be produced by the same vendor and may use different protocols, able to interact with other products in the ecosystem. E.g., [5,6,7] have indicated that the lack of reference architectures or other abstract models inhibit the wider adoption of software ecosystems and deny the possibility of exploiting their full potential This need motivates our work: Architectural models based on patterns are a powerful representation when building or using cloud ecosystems and similar complex systems [8].

Background
Related Work
A Model for a Cloud Ecosystem
Pattern Diagram of the Ecosystem
Fog Computing
Validation of the Models
Security Issues of Ecosystems
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call