- Topic
- Floating Topic
- Abstract
-
Description
-
Problem Statement & Context
- Problem Statement
-
Context
-
Definition
- What is cloud computing?
- Definition
- Three Delivery models
- Software-as-a-Service
- Example
- Salesforce.com
- Platform-as-a-Service
- Example
- Google AppEngine
- Force.com
- Infrastructure-as-a-Service
- Example
- Amazon Web Service
- Unisys
- EMC Atmos
- Loudcloud
- Services
- Compute
- Physical Machines
- Virtual Machines
- OS-level virtualization
- Network
- Storage
- Other as-a-service
- Rational for adopting NIST definition
- Consideration for other delivery models
- DEsktop-as-a-service
- Data-as-a-Service
- Grid-as-a-service
- Utility COmputing
- Four Deployment Models
- Public Cloud
- Private Cloud
- Community Cloud
- Hybrid Cloud
- Five essential characteristics
- Rapid Elasticity
- Measured Service
- On-Demand Self-Service
- Ubiquitous Network Access
- Resource Pooling
- Two Domains
- Enterprise
- Tactical/DEployable/Adhoc (Need new name)
- Cloud computing is not.
- Grid Computing
- Utility Computing
- Autonomic Computing
-
Government Cloud Computing Examples
- United States
- European Union
- Canada
- United Kingdom
- Japan
- Architectural TEnants
- Pre-Conditions
-
Participants
-
Taxonomy
- Service Consumer
- Service Provider
- Service Developer
-
Structure
-
Critical Elements
- HCC On-Premise Environment
- HCC Public and Private Clouds
- HCC Mobile and Hand Held Devices
-
Use Case Scnarios
-
Enterprise
-
End User to Cloud
- Cloud-based collaborative environment
- Enterprise to CLoud to End User
-
Enterprise to Cloud
- Cloud Bursting
-
Enterprise to Cloud to Enterprise
- Virtually binding shipboard & Land vehicle IT infrastrcutures
- Private Cloud
- Community Cloud
- Changing Cloud Vendors
- Hybrid Cloud
-
Tactical/Deployable (Additional Requirements)
- Limited/Intermittent Connectivity
- Network Connection Authentication
- Redundant Compute/Storage Processes
- Autonomic Capabilities
- Post Conditions
-
Implementation Guidance
-
Requirements
-
Security Requirements
- Regulations
-
Security Controls
- Asset Management
- Cryptography: Key and Certificate Managemnt
- Data/Storage Security
- Endpoint Security
- Event Auditing and Reporting
- Identity, Roles, Access Control and Attributes
- Network Security
- Security Policies
- Service Automation
- Workload and Service Management
-
Security Federation Patterns
- Trust
- Identity Management
- Access Management
- Single Sign-on / Sign-Off
- Audit and Compliance
- Configuration Management
-
Developer Requirements
- Caching
- Centralized Logging
- Database
- Identity Management
- Messaging-Point-to-Point
- Messaging-Pub-Sub
- Raw Compute / Job Processing
- Session Management
- Service Discovery
- SLAs
- Storage
-
Operational Requirements
-
End User to Cloud
- Identity
- Open Client
- Security
- SLA
-
Enterprise to Cloud to End User
- Indentity
- Open CLient
- Federated Identity
- Location Awareness
- Metering and Monitoring
- Management and Governance
- Security
- Common File Format for VMs
- Common APIs for Cloud Storage and Middleware
- Data and Application Federation
- SLAs and Benchmarks
- Lifecycle Management
-
Enterprise to Cloud
- Federated Identity
- Open CLient
- Location Awareness
- Indentity
- Metering and Monitoring
- Management and Governance
- Security
- Common File Format for VMs
- Common APIs for Cloud Storage and Middleware
- Data and Application Federation
- SLAs and Benchmarks
- Lifecycle Management
- Deployment
- Industry-specific standards and protocols
-
Enterprise to Cloud to Enterprise
- Federated Identity
- Open CLient
- Location Awareness
- Indentity
- Metering and Monitoring
- Management and Governance
- Security
- Common File Format for VMs
- Common APIs for Cloud Storage and Middleware
- Data and Application Federation
- SLAs and Benchmarks
- Lifecycle Management
- Deployment
- Industry-specific standards and protocols
- Transaction Concurrency
- Interoperability
-
Private Cloud
- Open Client
- Metering & Monitoring
- Management & Governance
- Security
- Deployment
- Interoperability
- Common Vm Format
- SLAs
-
Changing Cloud Vendors
- Open Client
- Location Awareness
- Security
- SLAs
- Common VM file format
- Common CLoud Storage API
- Common Cloud Middleware API
- SaaS Vendor
- Industry-specific standards
- Changing Middleware VEndors
- Industry-specific standards
- Common Cloud Middleware APIs
- Changing Cloud Storage VEndors
- Common CLoud Storage API
- Changing VM host
- Common VM Format
-
Hybrid Cloud
- Federated Identity
- Open CLient
- Location Awareness
- Indentity
- Metering and Monitoring
- Management and Governance
- Security
- Common File Format for VMs
- Common APIs for Cloud Storage and Middleware
- Data and Application Federation
- SLAs and Benchmarks
- Lifecycle Management
- Deployment
- Industry-specific standards and protocols
- Interoperability
-
Standards
-
Taxonomy
- Across Cloud Services
- Within Cloud Services
- Between the Cloud and Enterprise
- Within an Enterprise
- SOA
- Cloud Computing
- Enterprise Security
- Mobile handheld application development
- Virtualization
-
API
-
Levels
- The Wire
- Language-specific Toolkits
- Service-specific Toolkit
- Service-neutral Toolkit
-
Categories
- Ordinary PRogramming
- Deployment
- Cloud Services
- Image and Infrastructure Management
- Internal Interfaces
-
Security Controls
- Cryptography: Key and Certificate Managemnt
- Data/Storage Security
- Identity, Roles, Access Control and Attributes
- Security Policies
- Workload and Service Management
-
Interoperability
-
Storage
- ThriftStore
- PySector
- SectorJNI
-
Compute
- Sector File System for Hadoop
- PySphere
-
Additional Guidance
- NIF Guidance
-
Specialized Frameworks Guidance
- Application capability
- Community of Interest capability
- Integration capability
- Communications capability
- Information capability
- Information assurance capability
- System and network control capability
-
Expert advice
-
Lessons Learned
- SOA is foundational
- Match cloud deployment & delivery model
- Standards are nacent & evolving
- Mobile devices are critical application entry point
- Appropriate cloud service identification required for sucessful business model
- Cloud Computing not appropriate for all applications
- Pay attention to business and culture in security model
- Standard enterprise architecture, security and implementation still required
-
Constraints
- Real-time access to data and cloud services
- Real-time dynamic brokers
- Certification and accreditqation
- Federated cloud architectures
- Legal & Cultural issures
-
Related Patterns
-
Published
- Legacy Services Capability Pattern
- Disconnected, Intermittent, Limited (DIL) Communications Management Pattern
- Design Phase Service Integration
- All Hazards Alert and Warning
- Secure Formatted Information Exchange Gateway
- Core Network Access
- Space, Air, Ground, Maritime Mobile Networks
- Information Dissemination and Shared Database
- Proposed/Required/Under Discussion
- Known Uses
- Potential Capability
- References
-
Verification
- Terms
- Approaches
- Meeting Requirements
- Building Block Conformance Requirements