Title: A SLA evaluation Methodology in Service Oriented Architectures
1A SLA evaluation Methodology in Service Oriented
Architectures
- V.Casola, A.Mazzeo, N.Mazzocca, M.Rak
- University of Naples Federico II, Italy
- Second University of Naples, Italy
2Outline
- Context
- Objectives
- Methodology
- Policy Formalization
- Evaluation technique
- Applicability
- Conclusions
- Future Works
3Context service cooperation, a trust point of
view
- Service Oriented Architectures are capable of
intelligent interaction and are able to discover
and compose themselves into more complex
services - The emerging technologies and standards allow a
dynamic service composition to offer advanced
services - The open issue is how to guarantee the quality
of a service built at run-time in a potential
un-trusted domain?
4Context Service Level Agreement
- Actually, these problems are faced by an explicit
agreement among services - Each service defines its own Service Level
Agreement and publishes them in a public
document - People from the various organization that want to
cooperate, manually evaluate the different SLAs
and decide to agree or not. - SLA are expressed by means of a free text
document it contains quality of services and
security parameters, it can be used to decide
to extend trust to other services, too (cfr.
qualified services)
5Objectives
- To introduce a methodology to formalize SLA and
evaluate the associated quality/security level
through the definition of a metric function - The automatic adoption of the methodology helps
in - The initial agreement among cooperative services
(when a service must be qualified to adhere to
an existing, qualified, Cooperative Connection
System) - The run-time agreement among services (when the
aggregation of services is made in an open
network and when services are located through a
public registry).
6Methodology target and applicability context
- We have defined a Methodology to
- Express security through a semi-formal and not
ambiguous policy the chosen formalization must
be easy to adopt for technical and
organizational people - Evaluate the security level that a security
infrastructure is able to guarantee by
aggregating the security associated to all policy
provisions. - Compare different services according to the
measured security level.
7The Reference Evaluation Model (REM) components
The methodology core is the REM definition REM
ltFormalization, Technique, Reference Levelsgt
- Formalization represents the semi-formal
representation of the policy. The chosen
formalization will affect final evaluation, and
it takes into account technical and
organizational aspects - Technique represents the evaluation technique
that can be applied to compare policies the
evaluation technique strictly depends on the
policy formal representation. - Reference Levels are instances of policies,
which represent different security levels.
8Policy Formalization (1)
- Policy formalization needs to be
- Not ambiguous, (this is a problem for high level
languages semantically reach), - Correct respect to the described system,
- Complete !!!
-
- Textual provisions have been structured and
refined in a fine-grain and a grammar of
enumerative data-types has been proposed, so
reducing semantical complexity - The defined data-structures are new atomic or
enumerative types and a total order relation
among their values has been defined
9Policy Formalization (2)
- We have associated a Local Security Level to each
provision instance (applying different security
metrics to each one) - Example
- Data-type Private_Key_Protection_mechanism
- Enumerative and Ordered values
- No Protection lt Protection on Floppy lt
Protection on Smart Card lt Protection on Smart
Card with Biometric Sensor
10Policy Formalization (3)
- The proposed structure is a hierarchical tree
represented by an XML document - Tree nodes identify complex security provisions,
leaves identify simple security provisions.
11The Evaluation Technique
- How to quantify the system security?
- The introduced technique is based on the
definition of a metric policy space and a
distance criterium by which we could represent
policies and compare different policies. - After the policy formalization, each provision is
represented by an enumerative-ordered data-type
with its Local Security Level. - After the evaluation the whole policy is
represented by an aggregated value (Global
Security Level)
12The metrical space Technique
- The policy space is made homogeneous thanks to
threshold functions (F-functions) which allow to
associate a Local Security Level to each
provision - The policy space is represented by a n x 4
matrix - The distance criterium for the definition of
the metric space is the Euclidean distance among
matrices, defined as - d(A,B) v( s (A-B,A-B))
- where s (A,B) Tr (ABT)
13The metrical space Technique the policy matrix
- The policy space is represented by a n x 4 matrix
(total number of provisions for the number of
Local Security Levels)
14Reference Levels
- The last component of the REM is the set of
reference security levels that could be used as a
reference scale for the numerical evaluation of
security. - Example of evaluation of 4 security levels with
the metrical technique
d10 d(REFL1, ? ) 7,07 d20 d(REFL2, ?
) 11,18 d30 d(REFL3, ? ) 12 d40
d(REFL4, ? ) 12,65
15The reference levels and the metric function
The metric function for the evaluation of the
Global Security Level of Px
if dX0 d10 gt LPX L0, if d10 lt
dX0 lt d20 gt LPX L1, if d20 lt dX0 lt
d30 gt LPX L2, if d30 lt dX0 lt d40
gt LPX L3, if d40 dX0 gt LPX
L4,
LPX
16Application of the metrical technique
- Scenario 1- pre-defined cross qualification
- There is a master who sets the REM components
- The target services (TS) which wishes to be part
of the cooperative system is evaluated against
the master REM so its policy is formatted
according to it, too. - The result of the evaluation is the service level
that TS could guarantee and, the subset of
services which could cooperate with it without
degrading their quality.
- Scenario 2- Run-time cross qualification
- There is NOT a master who can set the REM
components - It is a peer-to-peer agreement, i.e. the
requestor service and the provider service have
the same role - Both services build their own REM
- The result could be different for the two
services (different REMs), in this case, the
quality level is determined in function of who is
the requestor in the specific transaction.
17Conclusions
- SLA definition in SOA is a technical,
organizational and standards problem - The proposed methodology aims at addressing all
these aspects in a unifying way and proposing an
evaluation model - The applicability is the building of trust
services, able to automatically evaluate the SLAs
associated to other cooperative services (at
run-time).
18Future Works
- Definition of a framework for SLA management (and
monitoring) - Definition of a set of trusted cooperative-service
s based on the methodology - Performance-trustability trade-off evaluation.