Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)



Similar documents
The NIST Cloud Computing Program

Highlights & Next Steps

NIST Cloud Computing Program

NIST Cloud Computing Program Activities

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

The Road to Cloud Standards via a Reference Architecture

Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

Cloud Computing Actionable Standards An Overview of Cloud Specifications

How To Understand And Understand Cloud Computing In Germany

Cloud Computing A NIST Perspective and Beyond. Robert Bohn, PhD Advanced Network Technologies Division

US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft)

NIST Cloud Computing Reference Architecture

Agenda. Background and cloud portability and interoperability concepts Distributed computing reference model. development Conclusions

National Institute of Standards and Technology

Document: NIST CCSRWG 092. First Edition

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Interoperability & Portability for Cloud Computing: A Guide.

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Cloud up to business processes

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

NIST Strategy to build a USG Cloud Computing Technology Roadmap

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

NIST Cloud Computing Security Reference Architecture (SP draft)

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Interoperability and Portability for Cloud Computing: A Guide

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY

A Survey on Cloud Security Issues and Techniques

Introduction to SAML

US Government Cloud Computing Technology Roadmap Volume I

IP Address Management: Smoothing the Way to Cloud-Based Services

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Cloud Data Management Interface Extension: CIMI

ISO/IEC JTC 1 SC 38 Cloud Works & Issues

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1

ONE Cloud Services Secure Cloud Applications for E-Health

OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Preparation Guide. EXIN Cloud Computing Foundation

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

The NIST Definition of Cloud Computing (Draft)

Customer Cloud Architecture for Mobile.

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Lecture 02b Cloud Computing II

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation

Attacking the roadblocks preventing aggressive adoption of Cloud Standards:

EMI views on Cloud Computing

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Hybrid Cloud Computing

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

APIs The Next Hacker Target Or a Business and Security Opportunity?

CIO SUMMIT l LAS VEGAS

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

Federated Service Oriented Architecture for Effects-Based Operations

CompatibleOne Open Source Cloud Broker Architecture Overview

Geoff Raines Cloud Engineer

Identity in the Cloud Use Cases Version 1.0

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

Windows Azure and private cloud

Day 1 - Technology Introduction & Digital Asset Management

Document NIST XXX-0XX. First Working Draft. October 31, Draft October 31, Draft

Horizontal IoT Application Development using Semantic Web Technologies

Public Cloud Workshop Offerings

Cloud Panel Service Evaluation Scenarios

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

It s All About Cloud Key Concepts, Players, Platforms And Technologies

Designing and Implementing Cloud Governance: Cloud, and Cloud Governance, are Emerging Capabilities

Applying Business Architecture to the Cloud

DEMYSTIFYING THE CLOUD

Challenges in Hybrid and Federated Cloud Computing

The NIST Definition of Cloud Computing

Web Application Hosting Cloud Solution Architecture.

Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS

Key Management Issues in the Cloud Infrastructure

Interoperable Clouds

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES

Qt and Cloud Services. Sami Makkonen Qt R&D Digia

Flexible Identity Federation

Inter-cloud Introduction. Yisheng Wang

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Changing Shape of the Cloud ISACA North Texas Chapter. Michael Lee Managing Principle-Cloud

Survey on important Cloud Service Provider attributes using the SMI Framework

A Cloud Computing Handbook for Business

Transcription:

Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC) Lee Badger Dawn Leaf Dec. 7, 2010

: Mission To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life Robert Rathe

At A Glance Major Assets ~ 2,900 employees ~ 2600 associates and facilities users ~ 1,600 field staff in partner organizations ~ 400 staff serving on 1,000 national and international standards committees Major Programs Geoffrey Wheeler Laboratories Baldridge National Quality Program Manufacturing Extension Partnership Technology Innovation Program Robert Rathe

has two main campuses Gaithersburg, MD Boulder, CO ourtesy HDR Architecture, Inc./Steve Hall Hedrich Blessing Geoffrey Wheeler

Representative Customers and Collaborators

Strategy to Develop a USG Cloud Computing Roadmap 1. Define Target USG Cloud Computing Business Use Cases priorities risks obstacles

Strategy to Develop a USG Cloud Computing Roadmap 1. Define Target USG Cloud Computing Business Use Cases priorities risks obstacles 2. Define Neutral Cloud Computing Reference Architecture & Taxonomy Expanded CC Definition ref. architecture Reference implementations

Strategy to Develop a USG Cloud Computing Roadmap 1. Define Target USG Cloud Computing Business Use Cases 2. Define Neutral Cloud Computing Reference Architecture & Taxonomy priorities risks obstacles 3. Generate Cloud Computing Roadmap -- iteratively Translate, Define & Track Cloud Computing Priorities Expand CC Definition ref. architecture Reference implementations

Strategy to Develop a USG Cloud Computing Roadmap 1. Define Target USG Cloud Computing Business Use Cases 2. Define Neutral Cloud Computing Reference Architecture & Taxonomy priorities risks obstacles 3. Generate Cloud Computing Roadmap -- iteratively Translate, Define & Track Cloud Computing Priorities Expand CC Definition ref. architecture Reference implementations Prioritized Tactical Requirements & Deliverables Performance based interoperability, security, portability standards requirements (SAJACC) Guidance Prototypes Pilots R&D priorities Policies

SAJACC Team Dawn Leaf Tim Grance Lee Badger Tom Karygiannis Robert Bohn Ramaswamy Chandramouli Robert Patt-Corner Jeff Voas Jin Tong Note: Any mention of a vendor or product is NOT an endorsement or recommendation.

Important Cloud Computing Requirements interoperability: clouds work together portability: workloads can move around security: customer workloads protected (to the extent possible) Well-formulated standards could help, but 11

Shorter Term Standards Effort Until standards mature: What is needed is a process to test important cloud system requirements --- is providing that. SAJACC Portable Interoperable Secure (as possible) Standards Acceleration to Jumpstart Adoption of Cloud Computing 12

SAJACC Communication Strategy will deploy and populate Cloud Standards Portal Community Outreach Use Cases Validated Specifications Reference Implementations test results Standards Development Organizations standards Populate a web portal that distributes cloud specifications and reference implementations that are: Known to work for critical use cases (e.g., interoperability, portability, bulk data transfer). Can be easily used by cloud service providers and consumers. Provide a basis for innovation i.e. are extensible. Enables future innovation. 13

(1) Inserts Existing Standards and De-facto Interfaces Cloud Standards Portal 1 Initial Use Cases Provided by Gov. 4 Success? Government-run Validation Exercises yes Use Cases Validated Specifications Reference Implementations 2 Legacy specifications Identified by Gov. Spec 1 Spec 2 Spec n Test 1 Test 2 Test n Proposed Specifications Reference Implementations 3 Generate Test cases specifications, use cases: provide insight on how clouds can work reference implementations: enable validation exercises continuously growing portal: new content added over time publically available: anyone can access 14

(2) Organizations Contribute Public Specifications Cloud Standards Portal 1 Initial Use Cases Provided by Gov. 4 Success? Government-run Validation Exercises yes Use Cases Validated Specifications Reference Implementations 2 Legacy specifications Identified by Gov. Spec 1 Spec 2 Spec n Test 1 Test 2 Test n Proposed Specifications Reference Implementations 3 Organization-submitted specifications continuously growing portal: new content added over time publically available: anyone can access or submit 15

(1) Inserts Existing Standards and De-facto Interfaces Cloud Standards Portal 1 Initial Use Cases Provided by Gov. 4 Success? Government-run Validation Exercises yes Use Cases Validated Specifications Reference Implementations 2 Legacy specifications Identified by Gov. Spec 1 Spec 2 Spec n Test 1 Test 2 Test n Proposed Specifications Reference Implementations 3 Generate Test cases specifications, use cases: provide insight on how clouds can work Future Oriented, Not Comprehensive. reference implementations: enable feasibility exercises Not conformance testing. show how some clouds work currently 16

Current Status 24 use cases described http:///use-cases.cfm many questions how to express use cases how to test use cases how to choose which ones what to conclude how to choose legacy systems role of standards missing use cases

A Use Case Use Case: a description of how groups of users and their resources may interact with one or more systems to achieve specific goals. Actors: the active entities Goals: what the use case tries to achieve Assumptions: conditions assumed true Success Scenario 1 (name, IaaS, PaaS, SaaS) A stepby-step narrative of what happens to achieve the use case goal Failure Conditions: what might go wrong Failure Handling: how to deal with known failures Success Scenario 2 (name, IaaS, PaaS, SaaS) Another narrative Failure Conditions: what might go wrong Failure Handling: how to deal with known failures... Credit: any source that inspired us We are using the approach of A. Cockburn, slightly customized, Writing Effective Use Cases. scope of application

Actors currently, no taxonomy for actors unidentified-user An entity in the Internet (human or script) that interacts with a cloud over the network and that has not been authenticated. cloud-subscriber A person or organization that has been authenticated to a cloud and maintains a business relationship with a cloud. payment-broker A financial institution that can charge a cloud-subscriber for cloud services, either by checking or credit card. cloud-provider An organization providing network services and charging cloudsubscribers. A (public) cloud-provider provides services over the Internet. a use case Open An Account unidentified-user 1 payment-broker 2 3 4 cloud-provider cloud-subscriber 4

Actors (2) transport-agent A business organization that provides physical transport of storage media such as high-capacity hard drives. legal-representative A court, government investigator, or police. identity-provider An entity that is responsible for establishing and maintaining the digital identity associated with a person, organization, or (in some cases) a software program. [NSTIC] attribute-authority An entity that is responsible for creating and managing attributes (e.g., age, height) about digital identities, and for asserting facts about attribute values regarding an identity in response to requests. [NSTIC] cloud-subscriber-user A user of a cloud-subscriber organization who will be consuming the cloud service provided by the cloud-provider as an end user. For example, an organization's email user who is using a SaaS email service the organization subscribes to would be a cloud-subscriber's user. cloud-subscriber-administrator An administrator type of user of a cloud-subscriber organization that performs (cloud) system related administration tasks for the cloudsubscriber organization. cloud-user A person who is authenticated to a cloud-provider but does not have a financial relationship with the cloud-provider.

Current Use Cases preliminary taxonomy Future Management 3.1 Open An Account 3.2 Close An Account 3.3 Terminate An Account 3.4 Copy Data Objects Into A Cloud 3.5 Copy Data Objects Out of a Cloud 3.6 Erase Data Objects In a Cloud 3.7 VM Control: Allocate VM Instance 3.8 VM Control: Manage Virtual Machine Instance State Interoperability 4.1 Copy Data Objects between Cloud- Providers 4.2 Dynamic Operation Dispatch to IaaS Clouds 4.3 Cloud Burst From Data Center to Cloud 4.4 Migrate a Queuing-Based Application 4.5 Migrate (fully-stopped) VMs from one cloud-provider to another Security 3.9 Query Cloud-Provider Capabilities and Capacities

Current Use Cases Management preliminary taxonomy Interoperability Security 5.1 Identity Management - User Account Provisioning 5.2 Identity Management - User Authentication in the Cloud 5.3 Identity Management - Data Access Authorization Policy Management in the Cloud Future 6.1 Cloud Management Broker 6.2 Transfer of ownership of data within a cloud 6.3 Fault-Tolerant Cloud Group 5.4 Identity Management - User Credential Synchronization Between Enterprises and the Cloud 5.5 ediscovery 5.6 Security Monitoring 5.7 Sharing of access to data in a cloud

A (simple) use case Open An Account Actors: unidentified-user, cloud-subscriber, payment-broker, cloud-provider. Goals: Cloud-provider opens a new account for an unidentified-user who then becomes a cloud-subscriber. Assumptions: A cloud-provider s account creation web page describes the service offered and the payment mechanisms. An unidentified-user can access the cloudprovider s account creation web page. Success Scenario: (open, IaaS, PaaS, SaaS): An unidentified-user accesses a cloudprovider s account creation web page. The unidentified-user provides: (1) a unique name for the new account; (2) information about the unidentified-user s financial; and (3) when the unidentified-user wants the account opened. The cloud-provider verifies the unidentified-user s financial information; if the information is deemed valid by cloud-provider, the unidentified-user becomes a cloud-subscriber and the cloud-provider returns authentication information that the cloud-subscriber can subsequently use to access the service. Open An Account Failure Conditions: (1) the unidentified-user does not provide a suitable name; payment-broker (2) the financial information is not valid; (3) cloud-provider fails to notify the cloudsubscriber the account is open. unidentified-user 2 3 Failure Handling:For (1) and (2), new account is not created; For (3) See Use Case 3.2 4 cloud-provider below on failure handling related to notifications from cloud-provider to cloudsubscriber. Requirements File: None. cloud-subscriber 4 Credit: TBD 1

A (simple) use case Open An Account Actors: unidentified-user, cloud-subscriber, payment-broker, cloud-provider. Goals: Cloud-provider opens a new account for an unidentified-user who then becomes a cloud-subscriber. Assumptions: A cloud-provider s account creation web page describes the service offered and the payment mechanisms. An unidentified-user can access the cloudprovider s account creation web page. Success Scenario: (open, IaaS, PaaS, SaaS): An unidentified-user accesses a cloudprovider s account creation web page. The unidentified-user provides: (1) a unique name for the new account; (2) information about the unidentified-user s financial; and (3) when the unidentified-user wants the account opened. The cloud-provider verifies the unidentified-user s financial information; if the information is deemed valid by cloud-provider, the unidentified-user becomes a cloud-subscriber and the cloud-provider returns authentication information that the cloud-subscriber can subsequently use to access the service. Failure Conditions: (1) the unidentified-user does not provide a suitable name; (2) the financial information is not valid; (3) cloud-provider fails to notify the cloudsubscriber the account is open. Failure Handling:For (1) and (2), new account is not created; For (3) See Use Case 3.2 below on failure handling related to notifications from cloud-provider to cloudsubscriber. Requirements File: None. Credit: TBD

Some Relevant Standards XACML (access control) SPML (account provisioning) SRM OpenID OAuth PCI Application/ Domain Specific SSL/TLS Public-Key Crypto XML DSIG/Encrypt WSDL OCCI SOAP REST Web Service Symmetric/Asymmetric Crypto Algorithms Security /Crypto HTML XML CDMI JSON Data Comm. Format HTTP FTP SMTP OVF Virtualization TCP/IP DNS Transport /Network Credit: yellow standards suggested by Mark Carlson and others at the Nov. 5, 2010 Forum.

Questions? 8 26