Page 860 - Cloud computing: From paradigm to operation
P. 860

5                                            Intercloud and interoperability


                                                      Appendix I


                                    Use case of inter-cloud trust management
                            (This appendix does not form an integral part of this Recommendation.)


            I.1     Use case template
            The use cases developed in this appendix should adopt the following unified format for better readability and
            convenient material organization.


                                               Table I.1 – Use case template
             Title                                The title of the use case
             Description                          Scenario description of the use case

             Roles                                Roles involved in the use case
             Figure (optional)                    Figure to explain the use case, optional not mandatory
             Pre-conditions (optional)            The necessary pre-conditions that should be achieved before starting
                                                  the use case
             Post-conditions (optional)           The post-conditions that will be carried out after the termination of
                                                  current use case
             Derived requirements                 Requirements derived from the use cases, whose detailed description
                                                  is presented in the dedicated chapter

            I.2     Use case of trusted network function virtualization
            This use case illustrates trust management aspect in inter-cloud. The federation pattern of inter-cloud used
            to illustrate the use case is an example only.


                                      Table I.2 – Trusted network function virtualization

             Title               Trusted network function virtualization
             Description         A CSC requests ''premium aoftware'' as a service (software as a service (SaaS)), respecting
                                 network quality of service (QoS). The CSP (SaaS) forms inter-cloud federation pattern
                                 among CSP(PaaS) and CSPs (network as a service (NaaS)). The CSP(SaaS) becomes contact
                                 point for CSC. The CSP-A(NaaS) and CSP-B(NaaS) uses network function virtualization (NFV)
                                 and SDN technologies to serve NaaS service. The CSP(SaaS) uses a trust management
                                 system to keep track of CSP(NaaS) service. In case CSP-A(NaaS) performed out of schemes
                                 used to compute trust, the SaaS service is automatically established between the CSP(SaaS)
                                 and CSP-B(NaaS). Additionally, the CSP(SaaS) updates information on reputation of
                                 CSPs(NaaS).
             Roles               CSC, CSP(SaaS), CSP(PaaS), CSP(NaaS).






















            852
   855   856   857   858   859   860   861   862   863   864   865