Sie sind auf Seite 1von 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/329645064

Overview of Cloud Computing Standards

Conference Paper · November 2018


DOI: 10.1109/ICETA.2018.8572237

CITATIONS READS

0 149

3 authors:

Marek Moravcik Pavel Segeč


University of Žilina University of Žilina
19 PUBLICATIONS   20 CITATIONS    49 PUBLICATIONS   93 CITATIONS   

SEE PROFILE SEE PROFILE

Martin Kontsek
University of Žilina
8 PUBLICATIONS   2 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

M-REP IPFRR View project

Virtual network education tool View project

All content following this page was uploaded by Marek Moravcik on 28 December 2018.

The user has requested enhancement of the downloaded file.


ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

Overview of Cloud Computing standards


Marek Moravcik, Pavel Segec, Martin Kontsek
Faculty of Management Science and Informatics, University of Zilina, Univerzitna 8215/1, 010 26 Zilina,
e-mail: {marek.moravcik, pavel.segec, jozef.papan, jakub.hrabovsky}@fri.uniza.sk

Abstract—This paper deals with standardization in Cloud working subgroups. The first is called the Cloud Select Indus-
Computing (CC). Cloud is being widely used, but is not standard- try Group on Service Level Agreements (C-SIG SLA) and
ized yet. There are several organizations that try to standardize deals with the standardization of SLAs between providers and
basic functions of Cloud Computing, such as NIST or ITU-T.
In the first part, we made overview of standards dealing witch users. It also creates recommendations for proper formulation
basic definition of CC and deployment models. Next, there is list and creation of SLAs. The second subgroup is named Cloud
of cloud services and types of roles in CC. In the last section, Select Industry Group on Code of Conduct. It collaborates
there are reference architectures of CC. with other organizations and creates and suggests behavior
Index Terms—Cloud computing, standards, IaaS policies for CC environments to offer unified services and keep
user data in privacy [2] [3] [15].
I. I NTRODUCTION
Next, it is the European Telecommunications Standards
Cloud Computing (CC) is an information and communica- Institute (ETSI), which created a working group called the
tion system that offers a variety of on-demand services. The Cloud Standard Coordination Group. The task of this group
term CC does not have a clear definition. Different organiza- is to map the current state of the CC standards, especially in
tions create their own specifications. Here are some examples: the area of security, data interoperability and portability [4].
according to [1] ”Cloud Computing offers IT resources and on- The Expert Group on Cloud Computing Contracts deals
demand applications available over the Internet using a pay- with suppliers and users of CC environments. It’s task is
as-you-go model.” The author states: ”No matter what you to explore existing contracts between users and providers, to
choose, the environment has the following characteristics: it acquire best practices and to propose measures to protect CC
is virtual, flexible and scalable, open (or closed), accessible, users [5]. The second group is the organizations dealing mainly
safe, and available.” CC is specified by standardization orga- with the CC aspects of technology. We will highlight two
nizations whose recommendations are the basis for study and best-known standardization organizations, ITU-T and NIST.
understanding CC system. Both of these organizations have issued standards dealing
A. Standardization of CC with various aspects of CC systems. The ITU-T series of
recommendations Y is dedicated to NGN (Next Generation
Cloud Computing is a relatively new IT industry and has Networks), Internet of Things (IoT) and smart cities. In the
not yet been fully unified and standardized. Currently, there ITU-T, CC is addressed with the Y.3500-Y.3999 Cloud Com-
are several standardization groups that try to unify the use of puting recommendations, NIST SP 500 and SP 800. These CC
CC environments from users and providers. By harmonizing, specifications are further elaborated.
we mean providing a unified approach to CC services across
different providers. A unified environment and access to it is
beneficial to both parties – both the user and the provider. B. What is CC
The user may not modify their applications when switching
between different CC providers, while the provider may find ITU-T in Y.3500 Recommendation [6] defines CC as a
it easier to get users who have chosen to leave the provider paradigm that allows the network to access a set of shared
for some reason. If a user has customized applications for physical or virtual resources. These resources are scalable
running in a CC environment, they do not have to change and user-friendly. This paradigm is composed of key features,
them in any way, they simply move them to another provider user roles, deployment models, and cross-cutting aspects. In
or use the services of the new provider alongside the services NIST SP-500-291 [7], CC is defined as “Cloud Comput-
of the current provider. ing is a model that enables ubiquitous, practical, network-
Standardization organizations can be divided into two accessible and on-demand computing resources (such as net-
groups. The first group is organizations that deal with business works, servers, storage, applications and services) created with
relationships between individual participants. As an example minimal effort and without interaction with the provider of
of an organization that addresses business CC standardization, these resources. This model is composed of five basic features,
we can mention the European Commission, which created two three service models and four deployment models.” According
clusters – the Cloud Select Industry Group (C-SIG) and the to the ITU-T and NIST definitions, the following are also
European Commission Expert Group on Cloud Computing included under the Key Features, Service Models, Deployment
Contracts. The European Commission’s C-SIG Group has two Models and CC Roles and Activities.

395
ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

C. Key characteristics according to NIST • Security. While public CC environments offer a certain
• On-demand self-service. The user can use the computing level of security, within a private CC, an organization
power provided by the CC as needed without the required can limit access not only to services but also to physical
service from the CC service provider. resources of the service. Such a limitation can be secured
• Broad network access. Services are available over the net-
by the firewall, leased lines, or internal hosting.
work using standardized access mechanisms across mul- • Absolute control. As the whole environment is in the
tiple clients (personal computer, mobile phone, tablet). “hands” of one organization, it has a perfect overview
• Resource pooling. Provider resources are aggregated to
of the activities that are taking place within its CC
serve multiple users and are dynamically allocated where environment. In the event of a new requirement for a CC
they are currently needed. This feature also combines environment, an organization can very quickly respond to
some data independence when the user does not know accomplish such a requirement.
where his data is physically present. • Savings and effectiveness. Using virtualization and CC,
• Scalability (Rapid elasticity). Sources can be dynamically
it is possible to cover the IT needs of one organization
added and downloaded by users as needed, in some cases with several physical devices. We are not talking about
automated. For the user, the sources appear to be infinite, servers and storage sites, but also about backup resources
so the user can ask for others or release existing ones at or active network elements. So the organization does not
any time. need so many administrators and trained staff. However,
• Measured service. The CC environment and all its sources
the greatest effectiveness can be seen in providing envi-
should be measurable. The provider charges the service ronment and services to users on demand, as each depart-
to a user based on resource usage measurements. ment of the organization may have different performance
requirements.
From the above definitions it can be stated that CC systems
• Cloud bursting Cloud bursting is deploying an application
are distributed technology platforms that provide various ser-
in a private CC environment that is specific to other
vices on demand. Therefore, the successful implementation of
deployments in that if the application needs suddenly
the CC system requires not only understanding of technology,
greater computing power it is moved to the public CC
architectural layers and models, but also an understanding of
environment. Subsequently, the need for higher computa-
the economic and business factors that are within the CC
tional power is then moved back to the private environ-
environment. In the following section, the work provides an
ment. The benefit to the user is that the computing power
overview of CC models, basic types of services and entities
is paid to the service provider only when the applications
that are in most of the current CC environments.
need it [10].
II. D EPLOYMENT MODELS ACCORDING TO NIST An organization planning to deploy private CCs currently
has a choice of multiple solutions available. OpenStack [11]
Depending on who can use the services of one CC environ-
is the best-known open source solution, but many others are
ment, we divide CC systems to the private, public, community,
available, such as Apache CloudStack, OpenNebula, Euca-
and hybrid CC systems. Both ITU-T (recommendation Y.3500
lyptus and Joyent Triton, OwnCloud. Proprietary private CC
[6]) and NIST (recommendation SP 500-291 [8]) have the
solutions dominate Microsoft Azure and VMware vSpere,
same division.
XEN.
A. Private cloud
B. Community cloud
According to the ITU-T Y. 3500, a private cloud is a
model that is used exclusively by one CC customer, who also NIST, in SP 500-291, defines a community cloud as an
manages all of its resources. It can be managed either by the infrastructure that is used by a particular community (commu-
customer itself or by a third party that the customer orders by nity) with common interests. Like a private cloud, community
management. The customer can also grant access to their CC ownership can also be managed by a community or third party.
environment to other users. According to ITU-T Recommendation Y.3500, a community
According to NIST SP 500-291, a private cloud is de- cloud is defined as a deployment model where services are
fined as an infrastructure for use by one organization. This shared among a community (community) community with
infrastructure may be managed by the organization or a third common requirements where the service is managed by at
party. Such a model is suited to an organization with dynamic least one member of that group. A community cloud can be
and changing demands on computational resources. It is also managed by a community, a third party, or a combination
suitable for an organization that wants to benefit from CC but of them. Unlike the public cloud, the community is reserved
also needs to have its data under control. This means own exclusively for the community, while the public is available to
storage within an organization that is under constant control anyone.
and monitoring, who and where it connects to the repository. Like a private cloud used by an organization or an individ-
Private CC systems according to [9] provide the following ual, a community cloud uses a group or community to reach
features and benefits: a common goal. Under the community, we can understand

396
ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

several companies working on a joint project, or a group of •Resource saving. The CC environment uses the “Pay-as-
scientists addressing the same problem. you-go” model, which means that the user pays only for
In community CC environments, it is important for users the service he actually uses. For example, if they stop
to agree among themselves in advance who will manage the using the mail service, they will immediately lose the
whole environment, or who can do it when and how to use cost of running it in the CC environment. However, the
it. According to NIST’s definition, in community CC environ- survey is most likely not to buy, operate and maintain its
ments, it is important who can access the environment, it is own infrastructure and the staff needed to operate it.
not important where or how the entire CC system is deployed. • Reliability. Providers of CC environments take care of
For example, community CC environments are referred to by backup and data security of their users. Typically, such
AWS GovCloud. This is a special, publicly-conceived space an environment is located in a data center where most
in the Amazon CC environment that can only be used by the nodes are redundantly connected to a data network, as
government and governmental US institutions [1] [12]. well as to electrical energy, which are in the event of an
A community CC system can be called a special type outage replaces the generators.
of private CC system because more organizations use one When using public CC services, it is necessary to take
common CC system. For this reason, we do not mention the fact, that the user relies on the CC environment provider
the specificities of community CC systems because they are and guarantees the functionality of the entire system. If
identical to private systems. the provider for any reason stops to provide a public CC
C. Public cloud service, the user would have to seek another solution for his
infrastructure. Another feature of public CC solutions is that
According to NIST SP 500-291, a public cloud is defined as the user does not have his data under control. There may
an infrastructure whose use is available to the general public. also be important and sensitive data in CC storage where
It can be managed by a private organization, an academic inaccessibility or leakage may cause problems for the user.
institution, a government institution, or a combination of them.
This infrastructure is located in the provider’s environment. D. Hybrid cloud
According to ITU-T Recommendation Y.3500, a public cloud In its recommendation Y.3500, ITU-T defines a hybrid cloud
is defined as a deployment model whose services are available as a service model, consisting of at least two other models
to any customer. It can be managed by a private organization, a (private, community, public). The deployment of these models
government organization, an academic institution, or a combi- is unique, but they make up a single logical whole. A hybrid
nation of them. The entire public cloud environment is located cloud can be managed by an organization or a third party.
in the service provider’ environment. Access restrictions for Hybrid CC systems represent a situation, where interaction
users are very free, sometimes they do not exist at all. between different CC service deployments is needed, but these
According to [13], the most widespread type of CC de- services have different types of deployment. According to
ployment is public cloud. Users of the public CC can be NIST SP 500-291, a hybrid cloud is called an infrastructure
anyone with access to the Internet. Providers of public CC that consists of multiple CC infrastructures (private, com-
environments for organizations are many, one of the largest munity, and public CC). These infrastructures are deployed
providers are Amazon Web Services (AWS), Google Cloud independently but are also interconnected by technology that
Platform (GCP), Microsoft Azure, and smaller providers like enables data and application portability.
RackSpace, 1 & 1, DigitalOcean, Verizon, and so on. In The hybrid cloud is a combination of some of the above
Slovakia, such a provider is, WebSupport. The public cloud is CC environments. It may be an organization using private CC
suitable for individuals requiring different types of repositories for its own purposes, with the excess of performance that it is
for their data. It is also appropriate if they require some kind not able to leverage itself for the other entities. It can also be
of dedicated server, such as a personal web server that is a combination of different CC environments. For example, we
constantly available. Organizations typically use public cloud can mention an organization that uses private CC as its primary
for IT outsourcing. It is not necessary to own any hardware infrastructure, and public CC for backup or testing of its own
after the IT migration to the public CC system, thus avoiding products. According to the NIST definition, hybrid CC is any
the need to finance its operation, maintenance and the trained combination of two or more CC environments (private, public,
hardware administrators. The public cloud is also suitable for and community) interconnected by technology that provides
the organization, that needs a higher performance in the short application portability [1]. Since the hybrid CC system is a
term, for example to solve a project. It does not need to combination of previous deployment models, it is not possible
buy additional own hardware that would later be superfluous. to determine its specificity [16].
Similarly to private CC systems, the specificities of public CC
systems could be summarized in several points [14]: III. M ODELS OF CC SERVICES
• Scalability. The user can dynamically change the size of The user can only use one particular application, or it can
his infrastructure. If needed, it can add or remove active be a set of applications that make up a specific platform, or
elements to respond flexibly to their own requirements or he can use the provider’s network infrastructure to operate
to their users’ requirements. on his own environment. Based on what services and what

397
ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

the user can use, CC can be divided into several service the user, or the transfer path prevents the user from accessing
models. According to NIST SP 500-291 [8] we know three his data and applications.
basic models - software as a service (SaaS), platform as
service (PaaS) and infrastructure as a service (IaaS). In the B. Platform as a Service
recommendation Y.3500 [6], the ITU-T has defined up to seven
In recommendation Y.3500, ITU-T defines PaaS as a service
categories. To three, like NIST, added communication, net-
category where the user has a platform from the provider.
working, computing performance and data storage as a service.
NIST, in SP 500-291 states, that PaaS is the ability to run
In the following section, we only discuss NIST categories,
a custom application on the CC infrastructure, allowing cus-
which are also common with the ITU-T recommendation.
tomers to use the programming languages, libraries, services,
and utilities provided by the provider. The customer does
A. Software as a Service not manage the infrastructure on which the application is
In its recommendation Y.3500, ITU-T defines SaaS as a deployed, but at the same time it has full administrative access
service category where the user has an application available to its application. Platform as a Service (PaaS) offers the user
from the provider. NIST has a more comprehensive definition a platform in CC environments where the user can run their
in SP 500-291 where SaaS is an application provided to a user, own suite of applications or use it as a support platform for
which is available from different clients. An application user existing solutions. According to NIST’s recommendation, the
does not manage CC infrastructure. The term Software as a user can develop and run their own applications on this CC
Service (SaaS) is often associated with business applications platform.
and outsourcing. SaaS applications are typically charged in the In the role of a support platform, we most often encounter
form of a user fee. databases that are running in CC. Whether it is a relational
SaaS is the most visible part of the CC environment from SQL (Structured Query Language) or a noSQL database,
the end user’s perspective. To control such an application, the the PaaS service provides a user with the benefit of simply
user can use dedicated application, but more popular is using replicating and backing up the entire database or its parts [17].
the web interface. Benefit of the user interface is that he does Because the provider leaves users free of applications, they
not have to install a client application for a user, but just a usually protect them in some way. Such cases include an
web browser that is already standard on almost every device, event, when a user application requires an increasing number
whether in business environments, homes, or personal devices. of resources (CPU, RAM, HDD, . . . ), thereby disabling the
The use of such a CC application is platform-independent, functionality of not only other virtual user applications, but
available through every device connected to the Internet. For also the functionality of the physical device on which the
example, we can mention Office 365 from Microsoft that offers virtual applications are launched. Providers often restrict their
office-friendly services. Storage services such as Google Drive users by using the quotas. Quotas are upper limitations of the
from Google, Microsoft’s OneDrive, and Dropbox are also computing resources (CPU, RAM, HDD) that can be used by
very popular. individual users and agreed by the provider with the user when
Another benefit to the user is that the entire application is establishing a CC contract.
run by the provider. This means, that the user does not have
to worry about updating, backing up important data, and so C. Infrastructure as a Service
on. This is done by the application provider. Similarly, for In recommendation SP 500-291, NIST defines IaaS as
developers to apply an update or software repair, they just an option for the user to create basic computing resources
apply it in a data center environment. Also, when testing an (computing power, storage, networking, . . . ). The user does
application, it does not need to be tested on multiple platforms. not manage the physical infrastructure on which the computing
Some applications or computations can be challenging on resources are running but has control of everything, that runs
your computer hardware. Since the application is running on it. The ITU-T in Y.3500 recommends defining IaaS as a
in a data center, it is not necessary for application users to service category where the user has the infrastructure available
have powerful local hardware. The user uses simple hardware from the provider.
needed just to connect to the SaaS data center, which will Infrastructure as a Service (IaaS) is designed for more
bring significant savings to organizations. experienced users because it requires knowledge of operating
Two main problems of running the application in CC system administration. With this type of service, the user com-
environments are security and availability. Some users may pletely manages the entire IT infrastructure itself, starting with
have difficulty placing an application in the CC environment servers with their OS, through databases to network elements
if their company policy will not allow their data to be placed or networking of components. The NIST recommendation
outside the organization. Availability of data and applications defines IaaS as an option for a user to create and operate
can be a problem if the user requires constant access to their their own infrastructure on which their own applications can
data. This can be a problem not only in the SaaS data center run. The user has basic computational resources (computing
itself, but also on the access road, as this center may be located power, storage, and network) over which he has administrative
in a geographically remote area. Any error with the provider, control. The ITU-T Recommendation Y.3500 is more stream-

398
ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

lined in the definition, but only says that the infrastructure is - Java Virtual Machine), .NET or Python, the user gets user
available from the Infrastructure provider. access to the language interpreter in which they can run their
SaaS, PaaS and IaaS are the three basic distributions of own code. It is up to the provider to ensure that the interpreter
the CC service model. At present, however, new and new CC or compiler of the language is up to date and ready. The user is
service models are being created by providers to users. For fully responsible for the applications running on the provided
example, domain name translations - DNSaaS (Domain Name platform.
System as a Service), firewall - FWaaS (Firewall as a Service)
C. Roles in IaaS
or LBaaS (Load Balancer as a Service). In general, we can
summarize all these services with the unified ”Anything as a The environment provider has no control over the user’s
Service” – XaaS, or EaaS (Everything as a Service). devices. Provider can create, run, disable, scale, or delete
user’s devices. But he has no access to them. The provider is
IV. ROLES IN CC responsible for the functionality of the hardware and hypervi-
The ITU-T, in its recommendation Y.3500 [6] defined three sors that are virtualized. The provider is usually responsible for
roles in which the participants take part - the provider, the the high availability of IaaS service and good access to its data
user and the partner. The provider provides the user with center where the service is provided. The user is responsible
the service he manages. In addition to offering a service, for the running of applications and the overall security of their
he also deploys, updates, monitors, and so on. The user is systems.
in a business relationship with the provider from whom he V. R EFERENCE ARCHITECTURES OF CC
withdraws the service. Cloud partner is a complementary role
whose activities vary depending on the relationship with the Reference architectures of CC can be divided into two
provider or the customer. groups. The first group defines role-based CC architectures.
NIST in SP 500-292 [7] defines up to five different roles. As The architectures are:
well as ITU-T, a cloud provider and user that are also defined. • DMTF Cloud Service Reference Architecture

However, NIST adds three more roles. It is a cloud auditor • IBM Cloud Computing Reference Architecture

who performs independent control over the services provided. • NIST Cloud Computnig Reference Architecture

Furthermore, it is a service broker who negotiates the terms The second group consists of layer-based architectures. In
of the contract between the provider and the user. The last these architectures, activities are mapped into layers that work
entity is a transmission provider that provides connectivity and together. Among these architectures we can include:
transport services from provider to user. In the next part we • CISCO Cloud Reference Architecture Framework
will present the competences of two basic roles – the provider • IEFT Cloud Reference Framework
and the user in the three basic deployment models according • ITU-T Reference Architecture
to [18] and [19]. In the following section, we describe two architectures of CC
A. Roles in SaaS systems, a role-based (NIST) and a layer-based (ITU-T).

The SaaS user only has an application interface that he has A. Reference architecture according to NIST
ordered from the provider. As a result, the user does not have Figure 1 shows the CC reference architecture according to
the ability to manage the platform or operating system on NIST [7], which defines the main roles, their activities and
which the application is running. The user has access to the functions in the CC. The figure expresses general architecture
application only, with user rights only. He can only use appli- on a high level of abstraction. The meaning of the reference
cation - upload data, modify data, and save it. He has no access architecture is that it facilitates understanding of the require-
to updates or modify an application. The CC environment ments, uses, characteristics and standards of CC systems.
provider has full control over the hardware, operating system, The roles represent the logical position of the various
and middleware over which the application runs. Above the stakeholders within the CC environment, describe their roles
application, the administrator has an administrator control, for and responsibilities towards other actors. Brief definitions of
example, it can update or add expansion modules to it. roles in CC according to NIST are in table I.
Not all roles are mandatory when using CC services, some
B. Roles in PaaS
may also be merged or omitted [20] [7] [21] [22] [23].
Unlike SaaS, the user is gained access to a middleware,
where he runs his own application and has full access to it. B. Reference architecture according to ITU-T Y.3500
The provider continues to have full access to hardware and The ITU-T has created the Reference architecture of CC,
operating systems and administrator access to middleware. which was published in recommendations Y.3500 and Y.3502.
Has can update, expand, and maintain it.The provider has no This architecture is composed of layers and cross-cutting
control of the application, it is under full management of the aspects that can not be assigned to one layer, but have a direct
user. From a user’s viewpoint, the platform can be a part of impact on multiple layers. A layer is defined as a set of features
its application. Examples include compilers and interpreters that provide similar functions or serve a similar purpose. The
of different programming languages. Whether it is Java (JVM recommendation defines four basic layers:

399
ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

• Availability. CC environment services should always be


available to authorized entities. These entities are usually
users of CC environments.
• Interoperability. In the CC context, it is the user’s ability
to interact and exchange information with the CC service.
Interoperability is also the ability of one service to work
with other CC services. The CC user should have a
standardized interface to communicate with multiple CC
providers.
• Maintenance and versioning. Maintenance is important
for the proper functioning of the service. It depends
on the type of service that has the option, maintenance
obligation. For SaaS, maintenance is performed by the
Fig. 1. Reference architecture according to NIST provider, at IaaS usually by a user. For CC services, the
user should know exactly which version he uses. Whether
TABLE I it’s an office environment (SaaS) or a version of the
ROLE DEFINITIONS IN CC operating system (IaaS), different versions can have a
Role Definition functional impact on the overall stability of the service.
Provider Entity that cares about the operation of the entire CC • Performance. The performance aspect is defined as a
environment that it offers to its users. They manage the group of non-functional features of the CC service.
entire infrastructure and are responsible for the functionality
and flawlessness of the whole environment. This includes, for example, a number of computational
Consumer A person or organization using CC services. It agrees with resources, the response time and the overall delay for the
the provider in some form of use of its environment, which requirements, or the data throughput through the active
is usually confirmed by the SLA document.
Auditor An auditor is an independent entity that can perform control
network elements.
of CC environment. • Portability. The portability aspect is often required in
Broker An intermediary is the entity that controls the use, delivery the CC because users are interested in the possibility of
of services, and the relationship between the consumer and migrating their data and applications between different
the service provider.
Carrier The Carrier entity is an interface that provides interconnec- providers at the lowest cost and downtime. For a SaaS
tion between other CC environments. service, the user should be able to move all his data,
while in the IaaS service, there are also images of virtual
machines that should perform an equivalent service with
• The user layer contains components that support the use another provider. In both cases, portability should also
and interaction of CC environments for CC users. provide the possibility of metadata that provide infor-
• The access layer provides access to the individual fea- mation of the relationship between the components of
tures and components of the CC environment with its the application and the necessary infrastructure topology
components. (such as load balancer, firewall, etc.).
• The service layer contains components that offer CC • Protection of personally identifiable information.
services; the components of this layer also provide the Providers should take care of the protection of personal
management and automation of the accessories needed data. In CC, this task is more challenging because CC
to implement the services. systems often work as shared environments. In many
• The resource layer contains components and resources countries, such protection is regulated by laws.
needed to implement and operate CC systems. • Resiliency. Resilience is the ability of the system to
Cross-cutting aspects can not be easily mapped into individual provide at least part of the service even during certain
layers because they interact with multiple layers. system failures.
• Reversibility. By this term, we could designate a process
C. Cross-cutting aspects of CC in which the user takes back all his data, and at the same
time the provider removes all information, that has a
The ITU-T Recommendation Y.3502 [24] defines cross- connection with the user either at the request from the
cutting aspects in CC systems, which are the features of these user or after a certain period of time. This principle is
systems that should be implemented and coordinated at the sometimes called “the right to be forgotten”.
level of architectural views of the CC system. These aspects • Security. Security covers areas ranging from physical se-
affect CC systems in such a way that they can not be attributed curity to data security. Techniques such as authentication,
to specific roles. Key aspects include: authorization, confidentiality, monitoring, or management
• Auditability. Ability to collect data and statistics on the of security policies are used.
operation of the CC system that can be used to perform • Service level agreement. SLA is an agreement between
independent controls. the provider and the user of the CC service. SLA char-

400
ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

acterizes the quality of CC services usually in technical [15] P. Fecilak et al. “Dynamic Reconfigurable Network Modeled by Network
parameters, such as time of service outage, and so on. Calculus” in: Journal of information, control and management systems,
vol. 8, issue 4, ISSN 1336-1716, pp. 285-292, 2010.
[16] “What is a Hybrid Cloud?,” http://www.interoute.com/cloud-
VI. C ONCLUSION article/what-hybrid-cloud. 2018.
[17] M. Boniface a et.al, “Platform-as-a-Service Architecture for Real-time
From the overview in this paper, we can say, that basic func- Quality of Service Management in Clouds,” rev. Fifth International
tions of Cloud computing, such as development models and Conference on Internet and Web Applications and Services, 2010.
basic services are well documented. Mainly ITU-T and NIST [18] L. Youseff, M. Butrico a D. Da Silva, “Toward a unified ontology of
cloud computing,” Grid Computing Environments (GCE) Workshop, pp.
released several documents, that are describing basic functions 1-10, 2008.
and setups of Cloud in either private and public usage, that [19] A. Benlian a T. Hess, “Opportunities and risks of software-as-a-service:
are in other papers used as base standards for next work. Findings from a survey of IT executives,” Decision Support Systems,
vol. 52, pp. 232-246, 2011.
More advanced features of clouds, such as interoperability, [20] S. Hopko, Problematika Cloud computing a jeho vyuitia v rieen pre
portability, protection of personally identifiable information or potreby KIS, ilina, 2015.
security in general are not standardized yet. Most of these [21] R. L. Krutz and R. D. Vines, Cloud Security: A Comprehensive Guide
to Secure Cloud Computing, Wiley Publishing, Inc., 2010.
features are summarized as cross-cutting aspects in ITU-T [22] R. Dimpi and R. R. K., “A Comparative Study of SaaS, PaaS and IaaS
Y.3502 recommendation. in Cloud Computing,” International Journal of Advanced Research in
On the other hand, there are attempts to standardize these Computer Science and Software Engineering, vol. 4, pp. 458-461, 2014.
[23] Roadmap Working Group, “NIST Cloud Computing Standards
aspects, such as standard ISO/IEC 19941:2017 [25], that deals Roadmap,”, http://www.cloudwatchhub.eu/sites/default/files/NIST Cloud-
with interoperability and portability of CC systems. In our Standards-Roadmap v2.pdf. 2013.
opinion, this is necessary next work to standardize these as- [24] ITU-T, “Y.3502 Reference architecture,”, https://www.itu.int/rec/T-REC-
Y.3502-201408-I/en. August 2014.
pects for massive expansion of cloud services and development [25] ISO, “ISO/IEC 19941,”, https://www.iso.org/standard/66639.html. 2017.
of applications, that tends to run in cloud environments.

ACKNOWLEDGMENT
This paper is supported by Faculty of management and
information science of University of Zilina, funded by research
grant numbers FVG/6/2018, FVG/37/2018 and project KEGA
011STU-4/2017.

R EFERENCES
[1] G. A. A. Santana, CCNA Cloud, Cisco Press, 2016, p. 609.
[2] European Commission, “Cloud Select Industry Group on Service Level
Agreements,” https://ec.europa.eu/digital-single-market/en/cloud-select-
industry-group-service-level-agreements, 2018.
[3] European Commission, “Cloud Select Industry Group on Code
of Conduct,” https://ec.europa.eu/digital-single-market/en/cloud-select-
industry-group-code-conduct, September 2018.
[4] European Telecommunications Standards Institute, “Cloud Standards
Coordination,” http://csc.etsi.org/, September 2018.
[5] European Commission, “Expert Group on Cloud Computing
Contracts,” http://ec.europa.eu/justice/contract/cloud-computing/expert-
group/index en.htm, September 2018.
[6] ITU-T, “Y.3500 Overview and vocabulary,” August 2014.
https://www.itu.int/rec/T-REC-Y.3500-201408-I, September 2018.
[7] F. Liu et.al., “NIST Cloud Computing Reference Architecture,
SP-500-292,”, https://www.nist.gov/publications/nist-cloud-computing-
reference-architecture, September 2011.
[8] Roadmap Working Group, “NIST Cloud Comput-
ing Standards Roadmap, SP 500-291 version 2,”,
http://www.cloudwatchhub.eu/sites/default/files/NIST Cloud-Standards-
Roadmap v2.pdf, 2013.
[9] “What is a Private Cloud?,” http://www.interoute.com/cloud-
article/what-private-cloud, September 2018.
[10] TechTarget, “Cloud Bursting,” Aprl 2017.
http://searchcloudcomputing.techtarget.com/definition/cloud-bursting,
September 2018.
[11] “OpenStack Project,” https://www.openstack.org/, 2018.
[12] Amazon AWS, “What Is AWS GovCloud (US)?,”
http://docs.aws.amazon.com/govcloud-us/latest/UserGuide/whatis.html
2018.
[13] RightScale, “State of the cloud report,”,
http://assets.rightscale.com/uploads/pdfs/RightScale-2017-State-of-
the-Cloud-Report.pdf 2017
[14] “What is a Public Cloud?,” http://www.interoute.com/cloud-article/what-
public-cloud. 2018.

401
ICETA 2018 • 16th IEEE International Conference on Emerging eLearning Technologies and Applications • November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia

402

View publication stats

Das könnte Ihnen auch gefallen