Entity

Time filter

Source Type

Charleroi, Belgium

Massonet P.,CETIC | Sheridan C.,Flexiant
Communications in Computer and Information Science | Year: 2016

Cloud federation enables cloud providers to collaborate and share their resources to create a large virtual pool of resources at multiple network locations. Different types of federation architectures for clouds and datacenters have been proposed and implemented. An effective, agile and secure federation of cloud networking resources is key to impact the deployment of federated applications. The main goal of this project is two-fold: research and develop techniques to federate cloud network resources, and to derive the integrated management cloud layer that enables an efficient and secure deployment of federated cloud applications. © Springer International Publishing Switzerland 2016. Source


Massonet P.,CETIC | Arenas A.,IE Business School
Proceedings - 2012 8th International Conference on the Quality of Information and Communications Technology, QUATIC 2012 | Year: 2012

With the growing popularity of cloud computing, it is important to have guarantees on the quality of the protection. This is particularly true for infrastructure as a service (IaaS) and the need for protecting applications that are deployed in a cloud. Applications come with different levels of required protection and thus require different levels of protection at the infrastructure level. Quality of protection should be commensurate with the risks. In the cloud responsibility for protecting the application is split between the cloud user (the one who deploys the application) and the cloud provider that manages the infrastructure. The responsibility for securing the application is still in the hands of the cloud user. However the responsibility for securing the infrastructure on which the application runs is in the hands of the cloud provider. For the cloud user to be able to guarantee a given level of protection he must obtain some guarantees in quality of protection from the cloud infrastructure in which the application runs. This article describes and compares a client side (transparent) and a provider side (less transparent) model for specifying and monitoring quality of protection in IaaS, and discusses the benefits and pitfalls of the two models. The paper concludes by comparing these models to assess which one is the most adequate for IaaS. The contribution of this paper is to suggest the need for more transparent quality of protection management in clouds and to provide a method for moving from non-transparent quality of protection models to more transparent quality of protection models based on risk analysis of threats and the identification of the security controls to be monitored. The approach is illustrated with an example for monitoring VM/data location in a cloud. © 2012 IEEE. Source


Kritikos K.,ICS FORTH | Massonet P.,CETIC
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

Multi-cloud application management can optimize the provisioning of cloud-based applications by exploiting whole variety of services offered by cloud providers and avoiding vendor lock-in. To enable such management, model-driven approaches promise to partially automate the provisioning process. However, such approaches tend to neglect security aspects and focus only on low-level infrastructure details or quality of service aspects. As such, our previous work proposed a security meta-model, bridging the gap between high- and low-level security requirements and capabilities, able to express security models exploited by a planning algorithm to derive an optimal application deployment plan by considering both types of security requirements. This work goes one step further by focusing on runtime adaptation of multi-cloud applications based on security aspects. It advocates using adaptation rules, expressed in the event-condition-action form, which drive application adaptation behaviour and enable assuring a more-or-less stable security level. Firing such rules relies on deploying security metrics and adaptation code in the cloud to continuously monitor rule event conditions and fire adaptation actions for applications when the need arises. © Springer International Publishing Switzerland 2016. Source


Rochwerger B.,IBM | Breitgand D.,IBM | Epstein A.,IBM | Hadas D.,IBM | And 11 more authors.
Computer | Year: 2011

As demand for cloud services grows, the increases in cost and complexity for the cloud provider could become a major obstacle. Technologies developed under the Reservoir research project help cloud providers deal with complexity and scalability issues. © 2011 IEEE. Source


Quinten C.,Lille University of Science and Technology | Duchien L.,Lille University of Science and Technology | Heymans P.,University of Namur | Mouton S.,CETIC | Charlier E.,CETIC
2012 3rd International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2012 - Proceedings | Year: 2012

Cloud computing is a major trend in distributed computing environments. Resources are accessed on demand by customers and are delivered as services by cloud providers in a pay-per-use model. Companies provide their applications as services and rely on cloud providers to provision, host and manage such applications on top of their infrastructure. However, the wide range of cloud solutions and the lack of knowledge in this domain is a real problem for companies when facing the cloud solution choice. In this paper, we propose to use Software Product Line Engineering (SPLE) and Feature Model (FM) configuration to develop a decision-supporting tool. Using such modelling techniques and automations, this tool takes into consideration the application technical requirements as well as the user quality requirements to provide an accurate result among cloud solutions that best fits both requirements. © 2012 IEEE. Source

Discover hidden collaborations