Method and apparatus for security-aware elasticity of application and services
First Claim
1. A method, comprising:
- determining, for each non-security component of an application, (a) types of interactions the non-security component has with security components of the application for a plurality of requests and a total number for each interaction type;
determining, based on (a) and an expected number of incoming requests to the application;
(b) types of requests to the security components from the non-security components and types of interactions with the security components involving the non-security components; and
(c) for each type of request to the security components from the non-security components, a total number of requests to the security components involving the non-security components and a total number of interactions with the security components involving the non-security components;
determining, for each security component, a capacity required to process each type of request involving the non-security components and a capacity required to perform each type of interaction involving the non-security components; and
changing the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
1 Assignment
0 Petitions
Accused Products
Abstract
In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
44 Citations
20 Claims
-
1. A method, comprising:
-
determining, for each non-security component of an application, (a) types of interactions the non-security component has with security components of the application for a plurality of requests and a total number for each interaction type; determining, based on (a) and an expected number of incoming requests to the application;
(b) types of requests to the security components from the non-security components and types of interactions with the security components involving the non-security components; and
(c) for each type of request to the security components from the non-security components, a total number of requests to the security components involving the non-security components and a total number of interactions with the security components involving the non-security components;determining, for each security component, a capacity required to process each type of request involving the non-security components and a capacity required to perform each type of interaction involving the non-security components; and changing the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising; computer readable program code configured to determine, for each non-security component of an application, (a) types of interactions the non-security component has with security components of the application for a plurality of requests and a total number for each interaction type; computer readable program code configured to determine, based on (a) and an expected number of incoming requests to the application;
(b) types of requests to the security components from the non-security components and types of interactions with the security components involving the non-security components; and
(c) for each type of request to the security components from the non-security components, a total number of requests to the security components involving the non-security components and a total number of interactions with the security components involving the non-security components;computer readable program code configured to determine, for each security component, a capacity required to process each type of request involving the non-security components and a capacity required to perform each type of interaction involving the non-security components; and computer readable program code configured to change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a memory device for storing a program; and a processor in communication with the memory device, the processor operative with the program to; determine, for each non-security component of an application, (a) types of interactions the non-security component has with security components of the application for a plurality of requests and a total number for each interaction type; determine, based on (a) and an expected number of incoming requests to the application;
(b) types of requests to the security components from the non-security components and types of interactions with the security components involving the non-security components; and
(c) for each type of request to the security components from the non-security components, a total number of requests to the security components involving the non-security components and a total number of interactions with the security components involving the non-security components;determine, for each security component, a capacity required to process each type of request involving the non-security components and a capacity required to perform each type of interaction involving the non-security components; and change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
determining, for each functional component of an application, (a) types of interactions the functional component has with non-functional components of the application for a plurality of requests and a total number for each interaction type; determining, based on (a) and an expected number of incoming requests to the application;
(b) types of requests to the non-functional components from the functional components and types of interactions with the non-functional components involving the functional components; and
(c) for each type of request to the non-functional components from the functional components, a total number of requests to the non-functional components involving the functional components and a total number of interactions with the non-functional components involving the functional components;determining, for each non-functional component, a capacity required to process each type of request involving the functional components and a capacity required to perform each type of interaction involving the functional components; and changing the capacities of the non-functional components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities. - View Dependent Claims (20)
-
Specification