Abstract
Nowadays, considerable attention has been given by the researchers in the field of Cloud Computing to the emerging Inter-Cloud computing paradigm, where different cloud service providers collaborate or federate to achieve better QoS and cost efficiency. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. In this paper, we propose the conceptual model of the agent-based approach for the identity and access management in the dynamic inter-cloud environments where the Cloud Service Providers or the partners of the inter-cloud federation join and leave the federation dynamically. We further discuss the architectural model for the agent-based approach for solving the policy conflicts in the inter-cloud scenario while dealing with the access requests of cloud consumers in the inter-cloud environments. A few open issues in the area of identity and access management in the inter-cloud environment are also discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Global inter-cloud technology forum, use cases and functional requirements for inter-cloud computing. Technical report (2010)
Wooldridge, M.: An Introduction to Multiagent Systems. Wiley, Hoboken (2002)
Stihler, M., Santin, A.O., Marcon, A.L., da Silva Fraga, J.: Integral federated identity management for cloud computing. In: Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5 (2012)
Celesti, A., Tusa, F., Villari, M., Puliafito, A.: How to enhance cloud architectures to enable cross-federation. In: Proceedings of the 3rd International Conference on Cloud Computing (CLOUD), pp. 337–345 (2010)
Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Security and cloud computing: intercloud identity management infrastructure. In: Proceedings of the 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), pp. 263–265 (2010)
Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Three-phase cross-cloud federation model: the cloud SSO authentication. In: Proceedings of the Second International Conference on Advances in Future Internet (AFIN), pp. 94–101 (2010)
Tusa, F., Celesti, A., Paone, M., Villari, M., Puliafito, A.: How CLEVER-based clouds conceive horizontal and vertical federations. In: Proceedings of the IEEE Symposium on Computers and Communications (ISCC), pp. 167–172 (2011)
Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., Morrow, M.: Blueprint for the intercloud - protocols and formats for cloud computing interoperability. In: Proceedings of the Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, pp. 328–336 (2009)
Bernstein, D., Vij, D., Diamond, S.: An intercloud cloud computing economy-technology, governance, and market blueprints. In: Proceedings of the SRII Global Conference (SRII), pp. 293–299 (2011)
Bernstein, D., Vij, D.: Intercloud exchanges and roots topology and trust blueprint. In: Proceedings of the 2011 World Congress in Computer Science, Computer Engineering and Applied Computing (2010)
Bernstein, D., Vij, D.: Intercloud security considerations. In: Proceedings of the Second IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 537–544 (2010)
Bernstein, D., Vij, D.: Intercloud directory and exchange protocol detail using XMPP and RDF. In: Proceedings of the 6th IEEE World Congress on Services (SERVICES-1), pp. 431–438 (2010)
Buyya, R., Pandey, S., Vecchiola, C.: Cloudbus toolkit for market-oriented cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 24–44. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10665-1_4
Buyya, R., Ranjan, R., Calheiros, R.N.: InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010. LNCS, vol. 6081, pp. 13–31. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13119-6_2
Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 167–177. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10665-1_15
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_34
Goiri, I., Guitart, J., Torres, J.: Characterizing cloud federation for enhancing providers’ profit. In: Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD), pp. 123–130 (2010)
Armstrong, P., Agarwal, A., Bishop, A., Charbonneau, A., Desmarais, R., Fransham, K., Hill, N., Gable, I., Gaudet, S., Goliath, S., Impey, R., Leavett-Brown, C., Ouellete, J., Paterson, M., Pritchet, C., Penfold-Brown, D., Podaima, W., Schade, D., Sobie, J.: Cloud scheduler: a resource manager for distributed compute clouds. CoRR, abs/1007.0050 (2010)
Calheiros, R.N., Ranjan, R., Beloglazov, A., De Rose, C.A., Buyya, R.: CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exp. 41(1), 23–50 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Thomas, M.V., Chandrasekaran, K., Mugeraya, G. (2018). Agent-Based Approach for the Management of Dynamic QoS Violations in the Inter-Cloud Environments. In: Uden, L., Hadzima, B., Ting, IH. (eds) Knowledge Management in Organizations. KMO 2018. Communications in Computer and Information Science, vol 877. Springer, Cham. https://doi.org/10.1007/978-3-319-95204-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-95204-8_40
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-95203-1
Online ISBN: 978-3-319-95204-8
eBook Packages: Computer ScienceComputer Science (R0)