Page 814 - Cloud computing: From paradigm to operation
P. 814

5                                            Intercloud and interoperability


                                                      Appendix I


                                    Use case of trusted inter-cloud computing
                            (This appendix does not form an integral part of this Recommendation.)


            I.1     Use case template
            The use cases developed in Appendix I should adopt the following unified format for better readability and
            convenient material organization.
             Title                                            Note: The title of the use case

             Description                                      Note: Scenario description of the use case
             Roles                                            Note: Roles involved in the use case
             Figure (optional)                                Note: Figure to explain the use case, but not mandatory
             Pre-conditions (optional)                        Note: The necessary pre-conditions that should be
                                                              achieved before starting the use case
             Post-conditions (optional)                       Note: The post-condition that will be carried out after
                                                              the termination of current use case
             Derived requirements                             Note: Requirements derived from the use cases, whose
                                                              detailed description is presented in the dedicated
                                                              chapter

            I.2     Trusted inter-cloud related use cases

            I.2.1   Use case of access security in trusted inter-cloud

            This use case illustrates the security aspects of trusted inter-cloud between the primary CSP and secondary
            CSPs. The intermediary pattern of inter-cloud used to illustrate the use case is an example only.


                                      Table I.2.1 – Access security in trusted inter-cloud

             Title                       Access security in trusted inter-cloud
             Description                 –  The CSC requests secure and malware free software as a service (SaaS).
                                         –  The primary CSP in an inter-cloud intermediary pattern (acts as
                                            CSP(Intermediary)) is the contact point for CSC.
                                         –  The CSP(Intermediary) integrates and validates services from multiple SaaS
                                            CSPs (secondary CSPs).
                                         –  For the CSP(Intermediary), in order to guarantee secure and malware free
                                            SaaS software for CSC, it is necessary to validate SaaS from secondary
                                            CSP1(SaaS), CSP2(SaaS) and CSP3(SaaS). In case of negative SaaS validation the
                                            CSP offer of this SaaS is not presented to CSC.
                                         –  In case of connectivity problem between CSP(Intermediary) and CSP1(SaaS),
                                            the service is automate established between CSP(Intermediary) and
                                            CSP3(SaaS).
             Roles                       CSC, CSP, CSP(SaaS)
















            806
   809   810   811   812   813   814   815   816   817   818   819