Modeling and Security in Cloud Ecosystems

Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been develo...

Full description

Bibliographic Details
Main Authors: Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Madiha H. Syed
Format: Article
Language:English
Published: MDPI AG 2016-04-01
Series:Future Internet
Subjects:
Online Access:http://www.mdpi.com/1999-5903/8/2/13
_version_ 1818139123855130624
author Eduardo B. Fernandez
Nobukazu Yoshioka
Hironori Washizaki
Madiha H. Syed
author_facet Eduardo B. Fernandez
Nobukazu Yoshioka
Hironori Washizaki
Madiha H. Syed
author_sort Eduardo B. Fernandez
collection DOAJ
description Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been developed to coexist and evolve together. The stakeholders of such a system need a variety of models to give them a perspective of the possibilities of the system, to evaluate specific quality attributes, and to extend the system. A powerful representation when building or using software ecosystems is the use of architectural models, which describe the structural aspects of such a system. These models have value for security and compliance, are useful to build new systems, can be used to define service contracts, find where quality factors can be monitored, and to plan further expansion. We have described a cloud ecosystem in the form of a pattern diagram where its components are patterns and reference architectures. A pattern is an encapsulated solution to a recurrent problem. We have recently expanded these models to cover fog systems and containers. Fog Computing is a highly-virtualized platform that provides compute, storage, and networking services between end devices and Cloud Computing Data Centers; a Software Container provides an execution environment for applications sharing a host operating system, binaries, and libraries with other containers. We intend to use this architecture to answer a variety of questions about the security of this system as well as a reference to design interacting combinations of heterogeneous components. We defined a metamodel to relate security concepts which is being expanded.
first_indexed 2024-12-11T10:23:06Z
format Article
id doaj.art-4b75090d16c44b77ae8821b403a0a622
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-12-11T10:23:06Z
publishDate 2016-04-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-4b75090d16c44b77ae8821b403a0a6222022-12-22T01:11:17ZengMDPI AGFuture Internet1999-59032016-04-01821310.3390/fi8020013fi8020013Modeling and Security in Cloud EcosystemsEduardo B. Fernandez0Nobukazu Yoshioka1Hironori Washizaki2Madiha H. Syed3Department of Computer and Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL 33431, USACenter for Global Research in Advanced Software Science and Engineering (GRACE), National Institute of Informatics, Tokyo 101-8430, JapanDepartment of Computer Science and Engineering, Waseda University, Tokyo 169-8555, JapanDepartment of Computer and Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL 33431, USAClouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been developed to coexist and evolve together. The stakeholders of such a system need a variety of models to give them a perspective of the possibilities of the system, to evaluate specific quality attributes, and to extend the system. A powerful representation when building or using software ecosystems is the use of architectural models, which describe the structural aspects of such a system. These models have value for security and compliance, are useful to build new systems, can be used to define service contracts, find where quality factors can be monitored, and to plan further expansion. We have described a cloud ecosystem in the form of a pattern diagram where its components are patterns and reference architectures. A pattern is an encapsulated solution to a recurrent problem. We have recently expanded these models to cover fog systems and containers. Fog Computing is a highly-virtualized platform that provides compute, storage, and networking services between end devices and Cloud Computing Data Centers; a Software Container provides an execution environment for applications sharing a host operating system, binaries, and libraries with other containers. We intend to use this architecture to answer a variety of questions about the security of this system as well as a reference to design interacting combinations of heterogeneous components. We defined a metamodel to relate security concepts which is being expanded.http://www.mdpi.com/1999-5903/8/2/13software ecosystemsarchitecture patternscloud computingreference architecturessecurity patternssystems security
spellingShingle Eduardo B. Fernandez
Nobukazu Yoshioka
Hironori Washizaki
Madiha H. Syed
Modeling and Security in Cloud Ecosystems
Future Internet
software ecosystems
architecture patterns
cloud computing
reference architectures
security patterns
systems security
title Modeling and Security in Cloud Ecosystems
title_full Modeling and Security in Cloud Ecosystems
title_fullStr Modeling and Security in Cloud Ecosystems
title_full_unstemmed Modeling and Security in Cloud Ecosystems
title_short Modeling and Security in Cloud Ecosystems
title_sort modeling and security in cloud ecosystems
topic software ecosystems
architecture patterns
cloud computing
reference architectures
security patterns
systems security
url http://www.mdpi.com/1999-5903/8/2/13
work_keys_str_mv AT eduardobfernandez modelingandsecurityincloudecosystems
AT nobukazuyoshioka modelingandsecurityincloudecosystems
AT hironoriwashizaki modelingandsecurityincloudecosystems
AT madihahsyed modelingandsecurityincloudecosystems