Policy implementation in a networked computing environment
First Claim
1. A computer-implemented method for implementing policies in a networked cloud computing environment, comprising:
- providing a set of layers of a cloud computing network stack in the networked computing environment, the set of cloud layers comprising;
a business processes as a service cloud layer providing business application services and industry solutions,a platform as a service cloud layer comprising;
an applications services sub-layer providing collaboration, analytics, and/or process management,an application lifecycle sub-layer providing developer and tester collaboration, development automation, and lifecycle traceability,an integration sub-layer providing process integration, application and data integration, identity integration, management integration, and/or spillover/failover services, anda workload services sub-layer providing elastic application runtimes, elastic application resources, workload and topology patterns, dynamic workload management, fine-grained service level agreement enforcement, application health management and self-healing, continuously available applications, multi-tenant applications, and workload and data mobility, and an infrastructure as a service cloud layer comprising;
an operations support system sub-layer providing service quality management, image management, service asset management, service operations management, and service automation management,an optimization sub-layer providing heterogeneous platform management, workload acceleration, optimized workload placement, virtualized computation, network and storage, and power management, anda security sub-layer providing security management, tenant isolation, identity management, intrusion detection, and data protection;
evaluating an applicability of a policy to the set of layers of the cloud computing network stack in the networked computing environment, the policy being drawn from a set of policies stored in at least one computer storage device;
determining an effectiveness of the policy as applied to the set of cloud layers; and
determining, based on a best-fit with regard to the effectiveness, a protocol for how and where to implement the policy for at least one cloud layer of the set of cloud layers.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention relate to an approach for resolving and/or implementing policies based on layers of a network stack (e.g., cloud computing stack). Specifically, for a given policy that is being resolved, the system first evaluates the applicability of the policy to each layer in the network stack. For a given policy, the system then evaluates the relative effectiveness of applying the policy to achieve the overall goal of the policy. Based on the best fit evaluation of the relative comparison, the system then decides how and where the policy is enacted (e.g., determines a protocol for implementing the policy).
-
Citations
22 Claims
-
1. A computer-implemented method for implementing policies in a networked cloud computing environment, comprising:
-
providing a set of layers of a cloud computing network stack in the networked computing environment, the set of cloud layers comprising; a business processes as a service cloud layer providing business application services and industry solutions, a platform as a service cloud layer comprising; an applications services sub-layer providing collaboration, analytics, and/or process management, an application lifecycle sub-layer providing developer and tester collaboration, development automation, and lifecycle traceability, an integration sub-layer providing process integration, application and data integration, identity integration, management integration, and/or spillover/failover services, and a workload services sub-layer providing elastic application runtimes, elastic application resources, workload and topology patterns, dynamic workload management, fine-grained service level agreement enforcement, application health management and self-healing, continuously available applications, multi-tenant applications, and workload and data mobility, and an infrastructure as a service cloud layer comprising; an operations support system sub-layer providing service quality management, image management, service asset management, service operations management, and service automation management, an optimization sub-layer providing heterogeneous platform management, workload acceleration, optimized workload placement, virtualized computation, network and storage, and power management, and a security sub-layer providing security management, tenant isolation, identity management, intrusion detection, and data protection; evaluating an applicability of a policy to the set of layers of the cloud computing network stack in the networked computing environment, the policy being drawn from a set of policies stored in at least one computer storage device; determining an effectiveness of the policy as applied to the set of cloud layers; and determining, based on a best-fit with regard to the effectiveness, a protocol for how and where to implement the policy for at least one cloud layer of the set of cloud layers. - View Dependent Claims (2, 3, 4, 5, 6, 19)
-
-
7. A system for implementing policies in a networked computing environment, comprising:
-
a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to the bus that when executing the instructions causes the system to; provide a set of layers of a cloud computing network stack in the networked computing environment, the set of cloud layers comprising; a business processes as a service cloud layer providing business application services and industry solutions, a platform as a service cloud layer comprising; an applications services sub-layer providing collaboration, analytics, and/or process management, an application lifecycle sub-layer providing developer and tester collaboration, development automation, and lifecycle traceability, an integration sub-layer providing process integration, application and data integration, identity integration, management integration, and/or spillover/failover services, and a workload services sub-layer providing elastic application runtimes, elastic application resources, workload and topology patterns, dynamic workload management, fine-grained service level agreement enforcement, application health management and self-healing, continuously available applications, multi-tenant applications, and workload and data mobility, and an infrastructure as a service cloud layer comprising; an operations support system sub-layer providing service quality management, image management, service asset management, service operations management, and service automation management, an optimization sub-layer providing heterogeneous platform management, workload acceleration, optimized workload placement, virtualized computation, network and storage, and power management, and a security sub-layer providing security management, tenant isolation, identity management, intrusion detection, and data protection; evaluate an applicability of a policy to the set of layers of the cloud computing network stack in the networked computing environment, the policy being drawn from a set of policies stored in at least one computer storage device; determine an effectiveness of the policy as applied to the set of cloud layers; and determine, based on a best-fit with regard to the effectiveness, a protocol for how and where to implement the policy for at least one cloud layer of the set of cloud layers. - View Dependent Claims (8, 9, 10, 11, 12, 20)
-
-
13. A computer program product for implementing policies in a networked computing environment, the computer program product comprising a computer readable storage device, and program instructions stored on the computer readable storage device, to:
-
provide a set of layers of a cloud computing network stack in the networked computing environment, the set of cloud layers comprising; a business processes as a service cloud layer providing business application services and industry solutions, a platform as a service cloud layer comprising; an applications services sub-layer providing collaboration, analytics, and/or process management, an application lifecycle sub-layer providing developer and tester collaboration, development automation, and lifecycle traceability, an integration sub-layer providing process integration, application and data integration, identity integration, management integration, and/or spillover/failover services, and a workload services sub-layer providing elastic application runtimes, elastic application resources, workload and topology patterns, dynamic workload management, fine-grained service level agreement enforcement, application health management and self-healing, continuously available applications, multi-tenant applications, and workload and data mobility, and an infrastructure as a service cloud layer comprising; an operations support system sub-layer providing service quality management, image management, service asset management, service operations management, and service automation management, an optimization sub-layer providing heterogeneous platform management, workload acceleration, optimized workload placement, virtualized computation, network and storage, and power management, and a security sub-layer providing security management, tenant isolation, identity management, intrusion detection, and data protection; evaluate an applicability of a policy to the set of layers of the cloud computing network stack in the networked computing environment, the policy being drawn from a set of policies stored in at least one computer storage device; determine an effectiveness of the policy as applied to the set of cloud layers; and determine, based on a best-fit with regard to the effectiveness, a protocol for how and where to implement the policy for at least one cloud layer of the set of cloud layers. - View Dependent Claims (14, 15, 16, 17, 21)
-
-
18. A method for deploying a system for implementing policies in a networked computing environment, comprising:
-
providing computer infrastructure being operable to; providing a set of layers of a cloud computing network stack in the networked computing environment, the set of cloud layers comprising; a business processes as a service cloud layer providing business application services and industry solutions, a platform as a service cloud layer comprising; an applications services sub-layer providing collaboration, analytics, and/or process management, an application lifecycle sub-layer providing developer and tester collaboration, development automation, and lifecycle traceability, an integration sub-layer providing process integration, application and data integration, identity integration, management integration, and/or spillover/failover services, and a workload services sub-layer providing elastic application runtimes, elastic application resources, workload and topology patterns, dynamic workload management, fine-grained service level agreement enforcement, application health management and self-healing, continuously available applications, multi-tenant applications, and workload and data mobility, and an infrastructure as a service cloud layer comprising; an operations support system sub-layer providing service quality management, image management, service asset management, service operations management, and service automation management, an optimization sub-layer providing heterogeneous platform management, workload acceleration, optimized workload placement, virtualized computation, network and storage, and power management, and a security sub-layer providing security management, tenant isolation, identity management, intrusion detection, and data protection; evaluating an applicability of a policy to the set of layers of the cloud computing network stack in the networked computing environment, the policy being drawn from a set of policies stored in at least one computer storage device; determining an effectiveness of the policy as applied to the set of cloud layers; and determining, based on a best-fit with regard to the effectiveness, a protocol for how and where to implement the policy for at least one cloud layer of the set of cloud layers. - View Dependent Claims (22)
-
Specification