Paas Environment

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 87 Experts worldwide ranked by ideXlab platform

K. M. Annervaz - One of the best experts on this subject based on the ideXlab platform.

  • IEEE CLOUD - ReLoC: A Resilient Loosely Coupled Application Architecture for State Management in the Cloud
    2012 IEEE Fifth International Conference on Cloud Computing, 2012
    Co-Authors: Vibhu Saujanya Sharma, Shubhashis Sengupta, K. M. Annervaz
    Abstract:

    Maintaining the state of applications and user sessions is difficult in large scale web-based software systems. This problem is particularly accentuated in the context of Cloud computing as Cloud providers, especially Platform as a Service (Paas) vendors, do not explicitly support state management infrastructure - such as clustering. In a Paas Environment, a user has little or no access and control over the server platform and session management layer. Additionally, the platform tiers are generally loosely coupled and service-oriented. These make traditional session-state management techniques non-usable. In this work, we present ReLoC - a session-state management architecture for Cloud that uses loosely-coupled services and platform agnostic scalable messaging technology to propagate and save session states. Preliminary experiments show a very high level of tolerance to failures of the platform tiers without corresponding disruptions in user sessions. We argue that, in the context of Paas Clouds, ReLoC architecture will be more scalable compared to traditional clustering Environments.

  • ReLoC: A resilient loosely coupled application architecture for state management in the cloud
    Proceedings - 2012 IEEE 5th International Conference on Cloud Computing CLOUD 2012, 2012
    Co-Authors: Vibhu Saujanya Sharma, Shubhashis Sengupta, K. M. Annervaz
    Abstract:

    Maintaining the state of applications and user sessions is difficult in large scale web-based software systems. This problem is particularly accentuated in the context of Cloud computing as Cloud providers, especially Platform as a Service (Paas) vendors, do not explicitly support state management infrastructure - such as clustering. In a Paas Environment, a user has little or no access and control over the server platform and session management layer. Additionally, the platform tiers are generally loosely coupled and service-oriented. These make traditional session-state management techniques non-usable. In this work, we present ReLoC - a session-state management architecture for Cloud that uses loosely-coupled services and platform agnostic scalable messaging technology to propagate and save session states. Preliminary experiments show a very high level of tolerance to failures of the platform tiers without corresponding disruptions in user sessions. We argue that, in the context of Paas Clouds, ReLoC architecture will be more scalable compared to traditional clustering Environments.

Ella Pereira - One of the best experts on this subject based on the ideXlab platform.

  • CIT/IUCC/DASC/PICom - Mapping Security Requirements to Identify Critical Security Areas of Focus in Paas Cloud Models
    2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable Autonomic and Secure Co, 2015
    Co-Authors: Alex Akinbi, Ella Pereira
    Abstract:

    Information Technology experts cite security and privacy concerns as the major challenges in the adoption of cloud computing. On Platform-as-a-Service (Paas) clouds, customers are faced with challenges of selecting service providers and evaluating security implementations based on their security needs and requirements. This study aims to enable cloud customers the ability to quantify their security requirements in order to identify critical areas in Paas cloud architectures were security provisions offered by CSPs could be assessed. With the use of an adaptive security mapping matrix, the study uses a quantitative approach to presents findings of numeric data that shows critical architectures within the Paas Environment where security can be evaluated and security controls assessed to meet these security requirements. The matrix can be adapted across different types of Paas cloud models based on individual security requirements and service level objectives identified by Paas cloud customers.

  • Mapping Security Requirements to Identify Critical Security Areas of Focus in Paas Cloud Models
    2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable Autonomic and Secure Co, 2015
    Co-Authors: Alex Akinbi, Ella Pereira
    Abstract:

    Information Technology experts cite security and privacy concerns as the major challenges in the adoption of cloud computing. On Platform-as-a-Service (Paas) clouds, customers are faced with challenges of selecting service providers and evaluating security implementations based on their security needs and requirements. This study aims to enable cloud customers the ability to quantify their security requirements in order to identify critical areas in Paas cloud architectures were security provisions offered by CSPs could be assessed. With the use of an adaptive security mapping matrix, the study uses a quantitative approach to presents findings of numeric data that shows critical architectures within the Paas Environment where security can be evaluated and security controls assessed to meet these security requirements. The matrix can be adapted across different types of Paas cloud models based on individual security requirements and service level objectives identified by Paas cloud customers.

Vibhu Saujanya Sharma - One of the best experts on this subject based on the ideXlab platform.

  • IEEE CLOUD - ReLoC: A Resilient Loosely Coupled Application Architecture for State Management in the Cloud
    2012 IEEE Fifth International Conference on Cloud Computing, 2012
    Co-Authors: Vibhu Saujanya Sharma, Shubhashis Sengupta, K. M. Annervaz
    Abstract:

    Maintaining the state of applications and user sessions is difficult in large scale web-based software systems. This problem is particularly accentuated in the context of Cloud computing as Cloud providers, especially Platform as a Service (Paas) vendors, do not explicitly support state management infrastructure - such as clustering. In a Paas Environment, a user has little or no access and control over the server platform and session management layer. Additionally, the platform tiers are generally loosely coupled and service-oriented. These make traditional session-state management techniques non-usable. In this work, we present ReLoC - a session-state management architecture for Cloud that uses loosely-coupled services and platform agnostic scalable messaging technology to propagate and save session states. Preliminary experiments show a very high level of tolerance to failures of the platform tiers without corresponding disruptions in user sessions. We argue that, in the context of Paas Clouds, ReLoC architecture will be more scalable compared to traditional clustering Environments.

  • ReLoC: A resilient loosely coupled application architecture for state management in the cloud
    Proceedings - 2012 IEEE 5th International Conference on Cloud Computing CLOUD 2012, 2012
    Co-Authors: Vibhu Saujanya Sharma, Shubhashis Sengupta, K. M. Annervaz
    Abstract:

    Maintaining the state of applications and user sessions is difficult in large scale web-based software systems. This problem is particularly accentuated in the context of Cloud computing as Cloud providers, especially Platform as a Service (Paas) vendors, do not explicitly support state management infrastructure - such as clustering. In a Paas Environment, a user has little or no access and control over the server platform and session management layer. Additionally, the platform tiers are generally loosely coupled and service-oriented. These make traditional session-state management techniques non-usable. In this work, we present ReLoC - a session-state management architecture for Cloud that uses loosely-coupled services and platform agnostic scalable messaging technology to propagate and save session states. Preliminary experiments show a very high level of tolerance to failures of the platform tiers without corresponding disruptions in user sessions. We argue that, in the context of Paas Clouds, ReLoC architecture will be more scalable compared to traditional clustering Environments.

D. Remon - One of the best experts on this subject based on the ideXlab platform.

  • WF-IoT - A cloud-IoT model for reconfigurable radio sensing: The Radio.Sense platform
    2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 2018
    Co-Authors: S. Savazzi, S. Sigg, M. Nicoli, S. Kianoush, H. Baqa, F. Le Gall, D. Remon
    Abstract:

    In this paper we elaborate on the challenges that emerge when designing open IoT models and methods to enable passive “radio vision” functions within a cloud Platform-as-a-Service (Paas) Environment. Radio vision allows to passively detect and track any moving/fixed object or people, by using radio waves as probe signals that encode a 2D/3D view of the Environment they propagate through. View reconstruction from the received radio signals is based on data analytic tools, that combine multiple radio measurements from possibly heterogeneous IoT networks. The goal of the study is to define the baseline specifications that are necessary to integrate this new technology into a cloud-IoT architecture. Following emerging semantic interoperability concepts, we propose an expressive ontology model to represent the radio vision concept and allow for interoperability with other systems. For accelerated integration of radio vision functions the open Radio.Sense platform is designed as compliant with existing models (oneM2M based ontologies).

  • A cloud-IoT model for reconfigurable radio sensing: The Radio.Sense platform
    2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 2018
    Co-Authors: S. Savazzi, S. Sigg, M. Nicoli, S. Kianoush, Le F. Gall, H. Baqa, D. Remon
    Abstract:

    In this paper we elaborate on the challenges that emerge when designing open IoT models and methods to enable passive “radio vision” functions within a cloud Platform-as-a-Service (Paas) Environment. Radio vision allows to passively detect and track any moving/fixed object or people, by using radio waves as probe signals that encode a 2D/3D view of the Environment they propagate through. View reconstruction from the received radio signals is based on data analytic tools, that combine multiple radio measurements from possibly heterogeneous IoT networks. The goal of the study is to define the baseline specifications that are necessary to integrate this new technology into a cloud-IoT architecture. Following emerging semantic interoperability concepts, we propose an expressive ontology model to represent the radio vision concept and allow for interoperability with other systems. For accelerated integration of radio vision functions the open Radio.Sense platform is designed as compliant with existing models (oneM2M based ontologies).

Wilhelm Hasselbring - One of the best experts on this subject based on the ideXlab platform.

  • Automatic Conformance Checking for Migrating Software Systems to Cloud Infrastructures and Platforms
    Journal of Software: Evolution and Process, 2012
    Co-Authors: Sören Frey, Wilhelm Hasselbring, Benjamin Schnoor
    Abstract:

    The migration of software systems to IaaS (infrastructure as a service)- or Paas (platform as a service)-based cloud Environments enables SaaS providers to benefit from the cloud’s merits, such as smoothly scaling up and down existing applications. Our approach, CloudMIG, aims at supporting SaaS providers to perform those migrations. Here, validating the specific constraints that are imposed by a cloud Environment constitutes an important early-phase activity. For example, the access to the file system, number of files, or calls to specific methods may be restricted by cloud providers. Those constraints have to be considered when evaluating the suitability of competing cloud Environment candidates. In this paper, we describe CloudMIG’s corresponding parts: a generic cloud Environment model that incorporates these constraints and appropriate violation detection mechanisms. A software system’s conformance can be examined with the assistance of constraint validators. They operate on extracted Knowledge Discovery Meta-Model-based system models and can, among others, apply metrics formulated with the Software Metrics Meta-Model through our metrics execution engine. Additional constraint validators can be plugged into the validation process as needed. In this context, we implemented a prototype and modeled the Paas Environment Google App Engine for Java. We report on a quantitative evaluation regarding the detected constraint violations of five open-source systems.

  • CSMR - An Extensible Architecture for Detecting Violations of a Cloud Environment's Constraints during Legacy Software System Migration
    2011 15th European Conference on Software Maintenance and Reengineering, 2011
    Co-Authors: Sören Frey, Wilhelm Hasselbring
    Abstract:

    By utilizing cloud infrastructures or platforms as services, SaaS providers can counter fluctuating loads through smoothly scaling up and down and therefore improve resource- and cost-efficiency, or transfer responsibility for the maintenance of complete underlying software stacks to a cloud provider, for instance. Our model-based approach CloudMIG aims at supporting SaaS providers to semi-automatically migrate legacy software systems to the cloud. Thereby, the analysis of conformance with the specific constraints imposed by a cloud Environment candidate along with the detection of constraint violations constitutes an important early phase activity. We present an extensible architecture for describing cloud Environments, their corresponding constraints, and appropriate violation detection mechanisms. There exist predefined constraint types with specified domain semantics as well as generic variants for modeling arbitrary constraints. A software system's compliance can be examined with the assistance of so called constraint validators. They operate on discovered KDM-based models of a legacy system. Additional constraint validators can be plugged into the validation process as needed. In this context, we implemented a prototype and modeled the Paas Environment Google App Engine for Java. We report on a quantitative evaluation regarding the detected constraint violations of five open source systems.

  • An extensible architecture for detecting violations of a cloud Environment's constraints during legacy software system migration
    Proceedings of the European Conference on Software Maintenance and Reengineering CSMR, 2011
    Co-Authors: S??ren Frey, Wilhelm Hasselbring
    Abstract:

    By utilizing cloud infrastructures or platforms as services, SaaS providers can counter fluctuating loads through smoothly scaling up and down and therefore improve resource- and cost-efficiency, or transfer responsibility for the maintenance of complete underlying software stacks to a cloud provider, for instance. Our model-based approach CloudMIG aims at supporting SaaS providers to semi-automatically migrate legacy software systems to the cloud. Thereby, the analysis of conformance with the specific constraints imposed by a cloud Environment candidate along with the detection of constraint violations constitutes an important early phase activity. We present an extensible architecture for describing cloud Environments, their corresponding constraints, and appropriate violation detection mechanisms. There exist predefined constraint types with specified domain semantics as well as generic variants for modeling arbitrary constraints. A software system's compliance can be examined with the assistance of so called constraint validators. They operate on discovered KDM-based models of a legacy system. Additional constraint validators can be plugged into the validation process as needed. In this context, we implemented a prototype and modeled the Paas Environment Google App Engine for Java. We report on a quantitative evaluation regarding the detected constraint violations of five open source systems.