Are Cloud Modelling Languages Ready for Multi-Cloud?

Author(s):  
Kyriakos Kritikos ◽  
Paweł Skrzypek
Author(s):  
Achilleas P. Achilleos ◽  
Kyriakos Kritikos ◽  
Alessandro Rossini ◽  
Georgia M. Kapitsaki ◽  
Jörg Domaschka ◽  
...  

AbstractCloud computing offers a flexible pay-as-you-go model for provisioning application resources, which enables applications to scale on-demand based on the current workload. In many cases, though, users face the single vendor lock-in effect, missing opportunities for optimal and adaptive application deployment across multiple clouds. Several cloud modelling languages have been developed to support multi-cloud resource management, but still they lack holistic cloud management of all aspects and phases. This work defines the Cloud Application Modelling and Execution Language (CAMEL), which (i) allows users to specify the full set of design time aspects for multi-cloud applications, and (ii) supports the models@runtime paradigm that enables capturing an application’s current state facilitating its adaptive provisioning. CAMEL has been already used in many projects, domains and use cases due to its wide coverage of cloud management features. Finally, CAMEL has been positively evaluated in this work in terms of its usability and applicability in several domains (e.g., data farming, flight scheduling, financial services) based on the technology acceptance model (TAM).


2019 ◽  
Vol 7 (1) ◽  
pp. 30-38
Author(s):  
P. Sen ◽  
D.Sarddar . ◽  
S.K. Sinha ◽  
R. Pandit

2020 ◽  
Vol 10 (2) ◽  
pp. 1-4
Author(s):  
Ashok Kumar

The Business continuity plan and strategy provide effective solutions to Multi-cloud and Microservice approach. The business continuity plan helps to maintain backup and disaster recovery. It ensures continuous business processes during disasters and emergencies. The business continuity planning methods that include risk assessment, analyze impacts, and entire business continuity strategies.


2019 ◽  
Vol 23 (2) ◽  
pp. 797-836 ◽  
Author(s):  
Seyedeh Yasaman Rashida ◽  
Masoud Sabaei ◽  
Mohammad Mehdi Ebadzadeh ◽  
Amir Masoud Rahmani

Author(s):  
Juan de Lara ◽  
Esther Guerra

AbstractModelling is an essential activity in software engineering. It typically involves two meta-levels: one includes meta-models that describe modelling languages, and the other contains models built by instantiating those meta-models. Multi-level modelling generalizes this approach by allowing models to span an arbitrary number of meta-levels. A scenario that profits from multi-level modelling is the definition of language families that can be specialized (e.g., for different domains) by successive refinements at subsequent meta-levels, hence promoting language reuse. This enables an open set of variability options given by all possible specializations of the language family. However, multi-level modelling lacks the ability to express closed variability regarding the availability of language primitives or the possibility to opt between alternative primitive realizations. This limits the reuse opportunities of a language family. To improve this situation, we propose a novel combination of product lines with multi-level modelling to cover both open and closed variability. Our proposal is backed by a formal theory that guarantees correctness, enables top-down and bottom-up language variability design, and is implemented atop the MetaDepth multi-level modelling tool.


Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Sign in / Sign up

Export Citation Format

Share Document