Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
1. SECuRE and Trustworthy
Computing Lab
Jugo: A Generic Architecture for
Composite Cloud as a Service
Authors
Mahmud Hossain, Rasib Khan, Shahid A Noor, and Ragib Hasan
SECuRE and Trustworthy computing Lab (SECRETLab)
University of Alabama at Birmingham
Presenter: Mahmud Hossain
PhD Student, Dept. of CIS, UAB
http://secret.cis.uab.edu
CLOUD
COMPUTING
2. SECuRE and Trustworthy
Computing Lab
Problem Statement
Cloud service providers offer pre-configured services
No provision for granular specification
Inflexibility in defining …
Application platforms, software services, and infrastructure services
Security policies and SLA parameters
Cloud users are coerced towards full-priced services
Absence of demand-supply equilibrium
Segregated market for cloud users
Difficult for new cloud providers to enter the market
Resource fragmentation for cloud providers
2
3. SECuRE and Trustworthy
Computing Lab
Motivation
A generic architecture for delivering
composite cloud services
A service negotiation approach for cloud
users based on their individual resource
requirements
A model that aggregates the asset availability
from multiple cloud service providers to
allocate the requested resources for the users
3
4. SECuRE and Trustworthy
Computing Lab
Proposed Solution | JUGO
An opaque service model operating
with multiple CSPs
JUGO enables opaque access, instead
of direct access, to resource offered by
multiple CSPs
JUGO acts as a negotiator between
users and service providers in terms of
prices and services. (e.g. Priceline,
Airbnb, and Uber)
4
5. SECuRE and Trustworthy
Computing Lab
Architecture | Overview
5
Fragmented/Reusable
Resources
Announcement Engine for
reusable assets
6. SECuRE and Trustworthy
Computing Lab
Architecture | Overview
6
Compile assets from
multiple Providers
Enables Seamless access
to heterogeneous
platforms/services
7. SECuRE and Trustworthy
Computing Lab
Architecture | Overview
7
Maintain SLA, scales resources
across multiple providers
Aggregate bills for
inbound and outbound
resource usages
Outbound
Inbound
Audit Trail, Cloud
Forensics
8. SECuRE and Trustworthy
Computing Lab
Jugo | Operational Models
Service Selection
Select best-matching cloud service provider
Enabled via service catalog in Jugo
Resource Provisioning
Obtain cloud-based resources via Jugo
Service monitoring, SLA, and notification
management
Protected Service Access
Capability based access control using service access
tickets
Privilege-mapping to cloud resources across
multiple providers
8
9. SECuRE and Trustworthy
Computing Lab
9
Jugo leverages the opaque marketing approach for cloud market
(E.g. Priceline, Uber, and Airbnb)
Jugo provides cloud resources to users via service negotiation and
price matching assurance
Jugo enables cloud providers to rent out under utilized and
fragmented resources
Increasing the number of Jugo-contracted cloud providers can
eventually benefit:
Cloud users - by creating better service deals
Jugo providers - by receiving increased service review
Cloud service providers - by improving quality of services.
10. SECuRE and Trustworthy
Computing Lab
Thank You
10
Contact Author: Mahmud Hossain
Email: mahmud@uab.edu
PI: Ragib Hasan
Email: ragib@cis.uab.edu
Web:
http://www.ragibhasan.com/
Research Group: SECRETLab@UAB
Phone: 205.934.8643
Fax: 205.934.5473
Web: http://secret.cis.uab.edu/