SlideShare a Scribd company logo
1 of 10
Download to read offline
SECuRE and Trustworthy
Computing Lab
Jugo: A Generic Architecture for
Composite Cloud as a Service
Authors
Mahmud Hossain, Rasib Khan, Shahid A Noor, and Ragib Hasan
SECuRE and Trustworthy computing Lab (SECRETLab)
University of Alabama at Birmingham
Presenter: Mahmud Hossain
PhD Student, Dept. of CIS, UAB
http://secret.cis.uab.edu
CLOUD
COMPUTING
SECuRE and Trustworthy
Computing Lab
Problem Statement
 Cloud service providers offer pre-configured services
 No provision for granular specification
 Inflexibility in defining …
 Application platforms, software services, and infrastructure services
 Security policies and SLA parameters
 Cloud users are coerced towards full-priced services
 Absence of demand-supply equilibrium
 Segregated market for cloud users
 Difficult for new cloud providers to enter the market
 Resource fragmentation for cloud providers
2
SECuRE and Trustworthy
Computing Lab
Motivation
 A generic architecture for delivering
composite cloud services
 A service negotiation approach for cloud
users based on their individual resource
requirements
 A model that aggregates the asset availability
from multiple cloud service providers to
allocate the requested resources for the users
3
SECuRE and Trustworthy
Computing Lab
Proposed Solution | JUGO
 An opaque service model operating
with multiple CSPs
 JUGO enables opaque access, instead
of direct access, to resource offered by
multiple CSPs
 JUGO acts as a negotiator between
users and service providers in terms of
prices and services. (e.g. Priceline,
Airbnb, and Uber)
4
SECuRE and Trustworthy
Computing Lab
Architecture | Overview
5
Fragmented/Reusable
Resources
Announcement Engine for
reusable assets
SECuRE and Trustworthy
Computing Lab
Architecture | Overview
6
Compile assets from
multiple Providers
Enables Seamless access
to heterogeneous
platforms/services
SECuRE and Trustworthy
Computing Lab
Architecture | Overview
7
Maintain SLA, scales resources
across multiple providers
Aggregate bills for
inbound and outbound
resource usages
Outbound
Inbound
Audit Trail, Cloud
Forensics
SECuRE and Trustworthy
Computing Lab
Jugo | Operational Models
 Service Selection
 Select best-matching cloud service provider
 Enabled via service catalog in Jugo
 Resource Provisioning
 Obtain cloud-based resources via Jugo
 Service monitoring, SLA, and notification
management
 Protected Service Access
 Capability based access control using service access
tickets
 Privilege-mapping to cloud resources across
multiple providers
8
SECuRE and Trustworthy
Computing Lab
9
 Jugo leverages the opaque marketing approach for cloud market
(E.g. Priceline, Uber, and Airbnb)
 Jugo provides cloud resources to users via service negotiation and
price matching assurance
 Jugo enables cloud providers to rent out under utilized and
fragmented resources
 Increasing the number of Jugo-contracted cloud providers can
eventually benefit:
 Cloud users - by creating better service deals
 Jugo providers - by receiving increased service review
 Cloud service providers - by improving quality of services.
SECuRE and Trustworthy
Computing Lab
Thank You
10
Contact Author: Mahmud Hossain
 Email: mahmud@uab.edu
PI: Ragib Hasan
 Email: ragib@cis.uab.edu
 Web:
http://www.ragibhasan.com/
Research Group: SECRETLab@UAB
 Phone: 205.934.8643
 Fax: 205.934.5473
 Web: http://secret.cis.uab.edu/

More Related Content

What's hot

Cloud interoperability and portability
Cloud interoperability and portabilityCloud interoperability and portability
Cloud interoperability and portability
Omar Sulca Correa
 
Failure aware resource provisioning for hybrid cloud infrastructure
Failure aware resource provisioning for hybrid cloud infrastructureFailure aware resource provisioning for hybrid cloud infrastructure
Failure aware resource provisioning for hybrid cloud infrastructure
Freddie Zhang
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
IndicThreads
 
Architecture and Practices on Cloud Interoperability and Portability
Architecture and Practices on Cloud Interoperability and PortabilityArchitecture and Practices on Cloud Interoperability and Portability
Architecture and Practices on Cloud Interoperability and Portability
Thomas Lee
 
Research Challenges In Cloud Infrastructures
Research Challenges In Cloud InfrastructuresResearch Challenges In Cloud Infrastructures
Research Challenges In Cloud Infrastructures
Ignacio M. Llorente
 

What's hot (14)

UMF Cloud Pilot: architecturing an IaaS offer for higher education
UMF Cloud Pilot: architecturing an IaaS offer for higher educationUMF Cloud Pilot: architecturing an IaaS offer for higher education
UMF Cloud Pilot: architecturing an IaaS offer for higher education
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Cloud interoperability and portability
Cloud interoperability and portabilityCloud interoperability and portability
Cloud interoperability and portability
 
Failure aware resource provisioning for hybrid cloud infrastructure
Failure aware resource provisioning for hybrid cloud infrastructureFailure aware resource provisioning for hybrid cloud infrastructure
Failure aware resource provisioning for hybrid cloud infrastructure
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
 
Cloud Computing Interoperability in Education
Cloud Computing Interoperability in EducationCloud Computing Interoperability in Education
Cloud Computing Interoperability in Education
 
CloudLightning: Self-Organising, Self-Managing Heterogeneous Cloud
CloudLightning: Self-Organising, Self-Managing Heterogeneous CloudCloudLightning: Self-Organising, Self-Managing Heterogeneous Cloud
CloudLightning: Self-Organising, Self-Managing Heterogeneous Cloud
 
CloudLightning - Project Overview
CloudLightning - Project OverviewCloudLightning - Project Overview
CloudLightning - Project Overview
 
Worldwide LHC Computing Grid - Ian Bird -HNSciCloud Prototype Phase kickoff M...
Worldwide LHC Computing Grid - Ian Bird -HNSciCloud Prototype Phase kickoff M...Worldwide LHC Computing Grid - Ian Bird -HNSciCloud Prototype Phase kickoff M...
Worldwide LHC Computing Grid - Ian Bird -HNSciCloud Prototype Phase kickoff M...
 
CloudLightning - Multiclouds: Challenges and Current Solutions
CloudLightning - Multiclouds: Challenges and Current SolutionsCloudLightning - Multiclouds: Challenges and Current Solutions
CloudLightning - Multiclouds: Challenges and Current Solutions
 
Architecture and Practices on Cloud Interoperability and Portability
Architecture and Practices on Cloud Interoperability and PortabilityArchitecture and Practices on Cloud Interoperability and Portability
Architecture and Practices on Cloud Interoperability and Portability
 
Cloud Interoperability
Cloud InteroperabilityCloud Interoperability
Cloud Interoperability
 
Research Challenges In Cloud Infrastructures
Research Challenges In Cloud InfrastructuresResearch Challenges In Cloud Infrastructures
Research Challenges In Cloud Infrastructures
 
Early adopter group and closing of webinar - João Fernandes (CERN)
Early adopter group and closing of webinar - João Fernandes (CERN)Early adopter group and closing of webinar - João Fernandes (CERN)
Early adopter group and closing of webinar - João Fernandes (CERN)
 

Similar to Jugo: A Generic Architecture for Composite Cloud as a Service Auth

Similar to Jugo: A Generic Architecture for Composite Cloud as a Service Auth (20)

A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment Services
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud Computing
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
 
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
 
T04503113118
T04503113118T04503113118
T04503113118
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
file_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptxfile_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptx
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
Introduction to Cloud Computing in Computer.ppt
Introduction to Cloud Computing in Computer.pptIntroduction to Cloud Computing in Computer.ppt
Introduction to Cloud Computing in Computer.ppt
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
CLOUD COMPUTING INTRODUCTION WITH DIAGRAM.ppt
CLOUD COMPUTING INTRODUCTION WITH DIAGRAM.pptCLOUD COMPUTING INTRODUCTION WITH DIAGRAM.ppt
CLOUD COMPUTING INTRODUCTION WITH DIAGRAM.ppt
 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnet
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 

More from Mahmud Hossain

More from Mahmud Hossain (12)

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming Service
 
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
 
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the CloudSecprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Jugo: A Generic Architecture for Composite Cloud as a Service Auth

  • 1. SECuRE and Trustworthy Computing Lab Jugo: A Generic Architecture for Composite Cloud as a Service Authors Mahmud Hossain, Rasib Khan, Shahid A Noor, and Ragib Hasan SECuRE and Trustworthy computing Lab (SECRETLab) University of Alabama at Birmingham Presenter: Mahmud Hossain PhD Student, Dept. of CIS, UAB http://secret.cis.uab.edu CLOUD COMPUTING
  • 2. SECuRE and Trustworthy Computing Lab Problem Statement  Cloud service providers offer pre-configured services  No provision for granular specification  Inflexibility in defining …  Application platforms, software services, and infrastructure services  Security policies and SLA parameters  Cloud users are coerced towards full-priced services  Absence of demand-supply equilibrium  Segregated market for cloud users  Difficult for new cloud providers to enter the market  Resource fragmentation for cloud providers 2
  • 3. SECuRE and Trustworthy Computing Lab Motivation  A generic architecture for delivering composite cloud services  A service negotiation approach for cloud users based on their individual resource requirements  A model that aggregates the asset availability from multiple cloud service providers to allocate the requested resources for the users 3
  • 4. SECuRE and Trustworthy Computing Lab Proposed Solution | JUGO  An opaque service model operating with multiple CSPs  JUGO enables opaque access, instead of direct access, to resource offered by multiple CSPs  JUGO acts as a negotiator between users and service providers in terms of prices and services. (e.g. Priceline, Airbnb, and Uber) 4
  • 5. SECuRE and Trustworthy Computing Lab Architecture | Overview 5 Fragmented/Reusable Resources Announcement Engine for reusable assets
  • 6. SECuRE and Trustworthy Computing Lab Architecture | Overview 6 Compile assets from multiple Providers Enables Seamless access to heterogeneous platforms/services
  • 7. SECuRE and Trustworthy Computing Lab Architecture | Overview 7 Maintain SLA, scales resources across multiple providers Aggregate bills for inbound and outbound resource usages Outbound Inbound Audit Trail, Cloud Forensics
  • 8. SECuRE and Trustworthy Computing Lab Jugo | Operational Models  Service Selection  Select best-matching cloud service provider  Enabled via service catalog in Jugo  Resource Provisioning  Obtain cloud-based resources via Jugo  Service monitoring, SLA, and notification management  Protected Service Access  Capability based access control using service access tickets  Privilege-mapping to cloud resources across multiple providers 8
  • 9. SECuRE and Trustworthy Computing Lab 9  Jugo leverages the opaque marketing approach for cloud market (E.g. Priceline, Uber, and Airbnb)  Jugo provides cloud resources to users via service negotiation and price matching assurance  Jugo enables cloud providers to rent out under utilized and fragmented resources  Increasing the number of Jugo-contracted cloud providers can eventually benefit:  Cloud users - by creating better service deals  Jugo providers - by receiving increased service review  Cloud service providers - by improving quality of services.
  • 10. SECuRE and Trustworthy Computing Lab Thank You 10 Contact Author: Mahmud Hossain  Email: mahmud@uab.edu PI: Ragib Hasan  Email: ragib@cis.uab.edu  Web: http://www.ragibhasan.com/ Research Group: SECRETLab@UAB  Phone: 205.934.8643  Fax: 205.934.5473  Web: http://secret.cis.uab.edu/