Ontologies in Cloud Computing—Review and Future Directions
Abstract
:1. Introduction
- i.
- An extensive review has been carried out to investigate cloud ontology techniques for viable cloud computing.
- ii.
- Legacy ontology computing techniques have been matched with the ontology of cloud computing based on shared properties.
- iii.
- The current study on cloud computing ontologies is organized into four categories: Cloud security, Cloud resources and services description, Cloud interoperability, and Cloud services discovery and selection.
2. Background and Related Work
2.1. Deployment Models
- i.
- Enhanced control: the proprietor controls access in and out of the network, sets the security policies and regulates user behavior.
- ii.
- Security and Privacy: improved access and security is possible when resources are segmented within the same infrastructure.
- iii.
- Tailored: solutions are modified to meet the company’s specific need.
- i.
- Controlled scalability: this cloud model has limitations on scalability because it is a function of underlying hardware. It is scaled within the resource capability of the owners.
- ii.
- Hugh budget: the overhead is higher compared to public cloud since the owner would be expected to pay for every resource at his disposal.
- i.
- Marginal Investment: it is a good option for users in need of instant cloud service, it has little or no advance payment as it is a pay-as-you-go service model.
- ii.
- Initial capital outlay: the client is not bordered about the hardware infrastructural setup as this is borne by the vendor.
- iii.
- Management is not an option: the client does not concern itself with managing the public cloud infrastructure.
- iv.
- Scalability: the system has the capacity to respond to clients’ resource needs at any time.
- i.
- Security and Privacy: due to public access, its protective capacities against criminals are weak.
- ii.
- Reliability: The system is vulnerable to failures mainly due to increased traffic from several clients.
- i.
- Robust and control: with flexibility, it is possible to create a solution to meet your business need on-demand.
- ii.
- Budget: there is a reduction in cost due to the merger between private and public clouds; this is because public cloud offers free scalability. Therefore, depending on the task at hand, there may or may not be any cost attached.
- iii.
- Security: data integrity is guaranteed to a very large extent due to proper data segregation.
- i.
- Maintenance: they may need for extra cost on maintenance when using the hybrid cloud model.
- ii.
- Difficult Integration: the process of integration may become complex when attempting to integrate two dissimilar models.
- i.
- Effective budget: overhead is light since numerous groups take responsibility for sharing the cloud.
- ii.
- Shared resources: it provides the platform to share cloud resources and infrastructure, which in turn reduces cost of running and maintenance.
- i.
- Restriction on bandwidth: there is a fixed bandwidth and data storage within the organization or individual within the community.
- i.
- Reduced dormancy: it offers vendors the opportunity to choose regions and zones closest to their clients by reducing or eliminating inactive time.
- ii.
- Service availability: the chance of lack of service is very minimal in multi-cloud configuration.
- i.
- Inability to manage the system effectively could lead to an increase in cost, which will in turn affect system flexibility.
2.2. Related Surveys of Ontology Usage in Conventional Computing
3. Methodology
3.1. Methods and Materials
- Survey with 400 articles related to cloud computing, ontology, and business process compliance, and eventually settling for 35 articles that meet the study objective.
- Present commendations and best practice procedures based on the knowledge acquired from far-reaching evaluation and assessment of existing literatures.
3.2. Research Questions and Formalization
- (a)
- Current cloud ontologies are not specific [12].
- (b)
- The vendor lock-in challenges resulting from customers’ lack of awareness of proprietary standards that do not support interoperability and portability when entering a cloud service contract [9].
- (c)
- The quest for supremacy among major players enhances their unwillingness to settle for a universal standard and thus upholding their incompatible cloud standards and design configuration [49].
- (d)
- Cloud computing is borderless in approach and application; this also means that data within the cloud would be governed by different and sometimes conflicting legislation, thereby creating more security and compliance issues.
3.3. Source Selection
3.4. Selection Execution
4. Information Extraction
4.1. Cloud Services Discovery and Selection
4.2. Cloud Service Description and Selection
4.3. Cloud Interoperability
4.4. Ontology-Based Approach in Cloud Security and Compliance
4.5. Ontology in Business Process Compliance
5. Results and Discussion
5.1. Discussion
5.2. Business Process Compliance
5.3. Cloud Computing: A Projection
6. Conclusion and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing. Available online: http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf (accessed on 29 October 2021).
- Zhang, Q.; Cheng, L.; Boutaba, R. Cloud computing: State-of-the-art and research challenges. J. Internet. Serv. Appl. 2010, 1, 7–18. [Google Scholar] [CrossRef] [Green Version]
- Schmidt, E. Conversation with Eric Schmidt Hosted by Danny Sullivan. Search Engine Strategies Conference (2006). Available online: https://www.google.com/press/podium/ses2006.html (accessed on 29 October 2021).
- Buzys, R.; Maskeliunas, R.; Damaševičius, R.; Sidekerskiene, T.; Woźniak, M.; Wei, W. Cloudification of virtual reality gliding simulation game. Information 2018, 9, 293. [Google Scholar] [CrossRef] [Green Version]
- Danevičius, E.; Maskeliunas, R.; Damaševičius, R.; Połap, D.; Wožniak, M. A soft body physics simulator with computational offloading to the cloud. Information 2018, 9, 318. [Google Scholar] [CrossRef] [Green Version]
- Qian, L.; Luo, Z.; Du, Y.; Guo, L. Cloud Computing: An Overview. Available online: https://link.springer.com/chapter/10.1007/978-3-642-10665-1_63#citeas (accessed on 29 October 2021).
- Odun-Ayo, I.; Misra, S.; Omoregbe, N.; Onibere, E.; Bulama, Y.; Damasevičius, R. Cloud-based security driven human resource management system. In Proceedings of the 20th International Conference of the Catalan Association for Artificial Intelligence, Deltebre, Terres de l’Ebre, Spain, 25–27 October 2017. [Google Scholar] [CrossRef]
- El-Gazzar, R.; Hustad, E.; Olsen, D.H. Understanding cloud computing adoption issues: A Delphi study approach. J. Syst. Softw. 2016, 118, 64–84. [Google Scholar] [CrossRef]
- Opara-Martins, J.; Sahandi, R.; Tian, F. Critical analysis of vendor lock-in and its impact on cloud computing migration: A business perspective. J. Cloud Comput. Adv. Syst. Appl. 2016, 5, 1–18. [Google Scholar] [CrossRef] [Green Version]
- Odun-Ayo, I.; Geteloma, V.; Misra, S.; Ahuja, R.; Damasevicius, R. Systematic mapping study of utility-driven platforms for clouds. Proc. Int. Conf. Emerg. Trends Inf. Technol. 2020, 762–774. [Google Scholar] [CrossRef]
- Androcec, D.; Vrcek, N.; Seva, J. Cloud computing ontologies: A systematic review. In Proceedings of the Third International Conference on Models and Ontology-based Design of Protocols, Architectures and Services Cloud, Chamonix/Mont Blanc, France, 29 April–4 May 2012; pp. 9–14. [Google Scholar]
- Al-Sayed, M.M.; Hassan, H.A.; Omara, F.A. Towards evaluation of cloud ontologies. J. Parallel Distrib. Comput. 2019, 126, 82–106. [Google Scholar] [CrossRef]
- Reimerink, A.A.; Helver, M. Security and compliance ontology for cloud service agreements. Int. J. Cloud Comput. Database Manag. 2020, 1, 18–23. [Google Scholar]
- Da Silva, F.S.; Nascimento, M.H.R. Major Challenges Facing Cloud Migration. J. Eng. Technol. Ind. Appl. 2020, 6, 59–65. [Google Scholar] [CrossRef]
- Zhu, J. Cloud Computing Technologies and Applications. Available online: https://link.springer.com/chapter/10.1007/978-1-4419-6524-0_2 (accessed on 29 October 2021).
- Watts, S. SaaS vs PaaS vs IaaS: What’s the Difference and How to Choose. 2017. Available online: https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose (accessed on 29 October 2021).
- Dillon, T.; Wu, C.; Chang, E. Cloud Computing: Issues and Challenges. In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications, Perth, Australia, 20–23 April 2010. [Google Scholar] [CrossRef]
- Gruber, T. “What is Ontology?” Encyclopedia of Database Systems 1. Available online: https://link.springer.com/referenceworkentry/10.1007%2F978-0-387-39940-9_1318 (accessed on 29 October 2021).
- Flahive, A.; Taniar, D.; Rahayu, W. Ontology as a Service (OaaS): A case for sub-ontology merging on the cloud. J. Supercomput. 2011, 65, 1–32. [Google Scholar] [CrossRef]
- Alfazi, A.; Sheng, Q.Z.; Qin, Y.; Noor, T.H. Ontology-Based Automatic Cloud Service Categorization for Enhancing Cloud Service Discovery. In Proceedings of the 2015 IEEE 19th International Enterprise Distributed Object Computing Conference, Adelaide, Australia, 21–25 September 2015. [Google Scholar]
- Tankelevičiene, L.; Damaševičius, R. Towards the development of genuine intelligent ontology-based e-learning systems. In Proceedings of the IEEE International Conference on Intelligent Systems, Xiamen, China, 29–31 October 2010; pp. 79–84. [Google Scholar] [CrossRef]
- Kang, J.; Sim, K.M. Ontology and search engine for cloud computing. In Proceedings of the International Conference on System Science and Engineering, Yichang, Hubei, China, 12–14 November 2010; pp. 276–281. [Google Scholar]
- Hinkelmann, K.; Laurenzi, E.; Martin, A.; Thönssen, B. Ontology-Based Metamodeling. Stud. Syst. Decis. Control 2018, 141, 177–194. [Google Scholar]
- Sowunmi, O.Y.; Misra, S.; Omoregbe, N.; Damasevicius, R.; Maskeliūnas, R. A semantic web-based framework for information retrieval in E-learning systems. In International Conference on Recent Developments in Science, Engineering and Technology; Springer: Cham, Switzerland, 2018; pp. 96–106. [Google Scholar] [CrossRef]
- Baliyan, N.; Verma, A. Recent Advances in the Evaluation of Ontology Quality. Available online: https://www.igi-global.com/chapter/recent-advances-in-the-evaluation-of-ontology-quality/215071 (accessed on 29 October 2021).
- Deng, Q.; Gönül, S.; Kabak, Y.; Gessa, N.; Glachs, D.; Gigante-Valencia, F.; Thoben, K.D. An ontology framework for multisided platform interoperability. In Enterprise Interoperability VIII; Springer: Cham, Switzerland, 2019; pp. 433–443. [Google Scholar]
- Gábor, A.; Kő, A.; Szabó, Z.; Fehér, P. Corporate Knowledge Discovery and Organizational Learning: The Role, Importance, and Application of Semantic Business Process Management—The ProKEX Case. In Knowledge Management and Organizational Learning; Springer: Cham, Switzerland, 2016; pp. 1–31. [Google Scholar]
- Bartolini, C.; Calabró, A.; Marchetti, E. GDPR and business processes. In Proceedings of the 2nd International Conference on Applications of Intelligent Systems, New York, NY, USA, 7–9 January 2019. [Google Scholar]
- Di Martino, B.; Marino, A.; Rak, M.; Pariso, P. Optimization and Validation of e-Government Business Processes with Support of Semantic Techniques. Available online: https://link.springer.com/chapter/10.1007/978-3-030-22354-0_76#citeas (accessed on 29 October 2021).
- Fan, S.; Hua, Z.; Storey, V.C.; Zhao, J.L. A process ontology based approach to easing semantic ambiguity in business process modeling. Data Knowl. Eng. 2016, 102, 57–77. [Google Scholar] [CrossRef]
- Hashmi, M.; Governatori, G.; Wynn, M.T. Normative requirements for regulatory compliance: An abstract formal framework. Inf. Syst. Front. 2015, 18, 429–455. [Google Scholar] [CrossRef] [Green Version]
- Suri, K.; Gaaloul, W.; Cuccuru, A.; Gerard, S. Semantic Framework for Internet of Things-Aware Business Process Development. In Proceedings of the 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Poznan, Poland, 21–23 June 2017. [Google Scholar]
- Manzoor, S.; Vateva-Gurova, T.; Trapero, R.; Suri, N. Threat Modeling the Cloud: An Ontology Based Approach. Curr. Top. Behav. Neurosci. 2019, 11398, 61–72. [Google Scholar]
- Arogundade, O.T.; Jin, Z.; Yang, X. Towards ontological approach to eliciting risk-based security requirements. Int. J. Inf. Comput. Secur. 2014, 6, 143. [Google Scholar]
- Adesemowo, A.K.; von Solms, R.; Botha, R.A. ITAOFIR: IT asset ontology for information risk in knowledge economy and beyond. In Communications in Computer and Information Science (Global Security, Safety and Sustainability-The Security Challenges of the Connected World); Jahankhani, H., Carlile, A., Emm, D., Hosseinian-Far, A., Brown, G., Sexton, G., Jamal, A., Eds.; Springer International Publishing: London, UK, 2017; Volume 630, pp. 173–187. [Google Scholar]
- Sunkle, S.; Kholkar, D.; Kulkarni, V. Toward Better Mapping between Regulations and Operational Details of Enterprises Using Vocabularies and Semantic Similarity. Complex Syst. Inform. Modeling Q. CSIMQ 2016, 5, 39–60. [Google Scholar]
- Mustapha, A.M.; Arogundade, O.T.; Misra, S.; Damasevicius, R.; Maskeliunas, R. A systematic literature review on compliance requirements management of business processes. Int. J. Syst. Assur. Eng. Manag. 2020, 11, 561–576. [Google Scholar] [CrossRef]
- Parhi, M.; Pattanayak, B.K.; Patra, M.R. A Multi-Agent-Based Framework for Cloud Service Description and Discovery Using Ontology. Intell. Comput. Commun. Devices 2014, 308, 337–348. [Google Scholar]
- Subhani, N.; Kent, R.D. Continuous process auditing (CPA): An audit rule ontology based approach to audit-as-a-service. In Proceedings of the 2015 Annual IEEE Systems Conference (SysCon) Proceedings, Vancouver, BC, Canada, 13–16 April 2015. [Google Scholar]
- Parhi, M.; Pattanayak, B.K.; Patra, M.R. A multi-agent-based framework for cloud service discovery and selection using ontology. Serv. Oriented Comput. Appl. 2017, 12, 137–154. [Google Scholar] [CrossRef]
- Ageed, Z.S.; Ibrahim, R.K.; Sadeeq, M.A.M. Unified Ontology Implementation of Cloud Computing for Distributed Systems. Curr. J. Appl. Sci. Technol. 2020, 39, 82–97. [Google Scholar] [CrossRef]
- Fenz, S.; Neubauer, T. Ontology-based information security compliance determination and control selection on the example of ISO 27002. Inf. Comput. Secur. 2018, 26, 551–567. [Google Scholar] [CrossRef] [Green Version]
- Parhi, M.; Pattanayak, B.K.; Patra, M.R. An ontology-based cloud infrastructure service discovery and selection system. Int. J. Grid Util. Comput. 2018, 9, 108. [Google Scholar] [CrossRef]
- Cheng, D.C.; Lim-Cheng, N.R. An ontology based framework to support multi-standard compliance for an enterprise. In Proceedings of the International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, Malaysia, 16–17 July 2017. [Google Scholar]
- Karthikeyan, N.K.; RS, R.K. Fuzzy service conceptual ontology system for cloud service recommendation. Comput. Electr. Eng. 2018, 69, 435–446. [Google Scholar]
- Cheng, D.C.; Villamarin, J.B.; Cu, G.; Lim-Cheng, N.R. Towards Compliance Management Automation thru Ontology mapping of Requirements to Activities and Controls. In Proceedings of the 2018 Cyber Resilience Conference (CRC), Putrajaya, Malaysia, 13–15 November 2018. [Google Scholar]
- Abdullah, N.S.; Indulska, M.; Sadiq, S. Compliance management ontology–a shared conceptualization for research and practice in compliance management. Inf. Syst. Front. 2016, 18, 995–1020. [Google Scholar] [CrossRef]
- Kitchenham, B. Procedures for performing systematic reviews. Keele UK Keele Univ. 2004, 33, 1–26. [Google Scholar]
- Androcec, D.; Vrcek, N. Ontologies for Platform as Service APIs Interoperability. Cybern. Inf. Technol. 2016, 16, 29–44. [Google Scholar] [CrossRef] [Green Version]
- Bassiliades, N.; Symeonidis, M.; Gouvas, P.; Kontopoulos, E.; Meditskos, G.; Vlahavas, I. PaaSport semantic model: An ontology for a platform-as-a-service semantically interoperable marketplace. Data Knowl. Eng. 2018, 113, 81–115. [Google Scholar] [CrossRef]
- Joshi, K.P.; Elluri, L.; Nagar, A. An Integrated Knowledge Graph to Automate Cloud Data Compliance. IEEE Access 2020, 8, 148541–148555. [Google Scholar] [CrossRef]
- Afgan, E.; Lonie, A.; Taylor, J.; Goonasekera, N. CloudLaunch: Discover and deploy cloud applications. Future Gener. Comput. Syst. 2018, 94, 802–810. [Google Scholar] [CrossRef] [Green Version]
- Ali, A.; Shamsuddin, S.M.; Eassa, F.E.; Mohammed, F. Cloud Service Discovery and Extraction: A Critical Review and Direction for Future Research. Available online: https://link.springer.com/chapter/10.1007/978-3-319-99007-1_28#citeas (accessed on 29 October 2021).
- Modi, K.J.; Garg, S. A QoS-based approach for cloud-service matchmaking, selection and composition using the Semantic Web. J. Syst. Inf. Technol. 2019, 21, 63–89. [Google Scholar] [CrossRef]
- Nawaz, F.; Asadabadi, M.R.; Janjua, N.K.; Hussain, O.K.; Chang, E.; Saberi, M. An MCDM method for cloud service selection using a Markov chain and the best-worst method. Knowl. Based Syst. 2018, 159, 120–131. [Google Scholar] [CrossRef]
- Sbodio, M.L.; Martin, D.; Moulin, C. Discovering Semantic Web services using SPARQL and intelligent agents. J. Web Semant. 2010, 8, 310–328. [Google Scholar] [CrossRef]
- Di Martino, B.; Cretella, G.; Esposito, A. Cloud services composition through cloud patterns: A semantic-based approach. Soft Comput. 2016, 21, 4557–4570. [Google Scholar] [CrossRef]
- Nawaz, F.; Mohsin, A.; Janjua, N.K. Service description languages in cloud computing: State-of-the-art and research issues. Serv. Oriented Comput. Appl. 2019, 13, 109–125. [Google Scholar] [CrossRef]
- Talhi, A.; Fortineau, V.; Huet, J.C.; Lamouri, S. Ontology for cloud manufacturing based Product Lifecycle Management. J. Intell. Manuf. 2017, 30, 2171–2192. [Google Scholar] [CrossRef]
- Yang, S.C.S. A Web Services, Ontology and Big Data Analysis Technology-Based Cloud Case-Based Reasoning Agent for Energy Conservation of Sustainability Science. Appl. Sci. 2020, 10, 1387. [Google Scholar] [CrossRef] [Green Version]
- Lu, Y.; Wang, H.; Xu, X. ManuService ontology: A product data model for service-oriented business interactions in a cloud manufacturing environment. J. Intell. Manuf. 2016, 30, 317–334. [Google Scholar] [CrossRef]
- Greenwell, R.; Liu, X.; Chalmers, K.; Pahl, C. Task Orientated Requirements Ontology for Cloud Computing Services. Available online: https://www.scitepress.org/papers/2016/57523/57523.pdf (accessed on 29 October 2021).
- Brogi, A.; Ferrari, G.L.; Forti, S. Secure Cloud-Edge deployments, with trust. Future Gener. Comput. Syst. 2019, 102, 775–788. [Google Scholar]
- Choi, C.; Choi, J. Ontology-based Security Context Reasoning for Power IoT-Cloud Security Service. IEEE Access 2019, 7, 110510–110517. [Google Scholar] [CrossRef]
- Choi, C.; Choi, J.; Kim, P. Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 2013, 67, 711–722. [Google Scholar] [CrossRef]
- Rosa, F.D.F.; Jino, M. A Survey of security assessment ontologies. In Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2017. [Google Scholar]
- Di, M. Design of the Network Security Intrusion Detection System Based on the Cloud Computing. 2020. Available online: https://doi.org/10.1007/978-3-030-15235-2_11 (accessed on 29 October 2021).
- Janulevicius, J.; Marozas, L.; Cenys, A.; Goranin, N.; Ramanauskaite, S. Enterprise architecture modeling based on cloud computing security ontology as a reference model. In Proceedings of the 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream), Vilnius, Lithuania, 27 April 2017. [Google Scholar]
- Kalaiprasath, R.; Elankavi, R.; Udayakumar, R. Cloud security and compliance -a semantic approach in end to end security. Available online: https://www.exeley.com/in_jour_smart_sensing_and_intelligent_systems/doi/10.21307/ijssis-2017-265 (accessed on 29 October 2021).
- Klimenko, A.; SafronenkovaI, I. An Ontology-Based Approach to the Workload Distribution Problem Solving in Fog-Computing Environment. Available online: https://link.springer.com/chapter/10.1007/978-3-030-19810-7_7#citeas (accessed on 29 October 2021).
- Singh, V.; Pandey, S.K. Cloud security ontology (CSO). In Cloud Computing for Geospatial Big Data Analytics; Springer: Cham, Switzerland, 2018; pp. 81–109. [Google Scholar]
- Singh, V.; Pandey, S.K. A comparative study of Cloud Security Ontologies. In Proceedings of the 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, 8–10 October 2014. [Google Scholar]
- Tao, M.; Zuo, J.; Liu, Z.; Castiglione, A.; Palmieri, F. Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes. Future Gener. Comput. Syst. 2018, 78, 1040–1051. [Google Scholar] [CrossRef]
- Amato, F.; Mazzeo, A.; Moscato, V.; Picariello, A. A Framework for Semantic Interoperability over the Cloud. In Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 25–28 March 2013. [Google Scholar]
- Castañé, G.C.; Xiong, H.; Dong, D.; Morrison, J.P. An ontology for heterogeneous resources management interoperability and HPC in the cloud. Future Gener. Comput. Syst. 2018, 88, 373–384. [Google Scholar] [CrossRef]
- Corea, C.; Delfmann, P. Detecting Compliance with Business Rules in Ontology- Based Process Modeling. In Proceedings of the 13th International Conference on Wirtschaftsinformatik, St. Gallen, Switzerland, 12–15 February 2017; pp. 226–240. [Google Scholar]
- Elgammal, A.; Turetken, O. Lifecycle Business Process Compliance Management: A Semantically-Enabled Framework. In Proceedings of the 2015 International Conference on Cloud Computing (ICCC), Riyadh, Saudi Arabia, 26–29 April 2015. [Google Scholar]
- Griffo, C.; Almeida, J.P.A.; Guizzardi, G. Conceptual Modeling of Legal Relations. Lect. Notes Comput. Sci. 2018, 11157, 169–183. [Google Scholar]
- Griffo, C.; Almeida, J.P.A.; Guizzardi, G.; Nardi, J.C. From an Ontology of Service Contracts to Contract Modeling in Enterprise Architecture. In Proceedings of the 2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC), Quebec City, QC, Canada, 10–13 October 2017. [Google Scholar]
- Palmirani, M.; Governatori, G. Modelling Legal Knowledge for GDPR Compliance Checking. Available online: https://ebooks.iospress.nl/volumearticle/50839 (accessed on 29 October 2021).
- Zhong, B.; Wu, H.; Sepasgozar, H.L.S.; Luo, H.; He, L. A scientometric analysis and critical review of construction related ontology research. Autom. Constr. 2019, 101, 17–31. [Google Scholar] [CrossRef]
- Damaševičius, R. Ontology of domain analysis concepts in software system design domain. In Information Systems Development: Towards a Service Provision Society. Springer: Boston, MA, USA, 2009; pp. 319–327. [Google Scholar] [CrossRef]
- Youseff, L.; Butrico, M.; da Silva, D. Toward a Unified Ontology of Cloud Computing. In Proceedings of the Grid Computing Environments Workshop, Austin, TX, USA, 12–16 November 2008. [Google Scholar]
- Bhatia, M.P.S.; Kumar, A.; Beniwal, R. Ontologies for Software Engineering: Past, Present and Future. Indian J. Sci. Technol. 2016, 9. [Google Scholar] [CrossRef] [Green Version]
- Osborne, F.; Motta, E. Pragmatic Ontology Evolution: Reconciling User Requirements and Application Performance. Semant. Web–ISWC 2018, 11136, 495–512. [Google Scholar]
- Bukhsh, F.A.; Silva, P.d.; Bukhsh, B.A.; Syed, S. From Traditional to Technologically Influenced Audit: A Compliance Perspective. In Proceedings of the 2018 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 17–19 December 2018. [Google Scholar]
- D’Ambrogio, A.; Paglia, E.; Bocciarelli, P.; Giglio, A. To-wards performance-oriented perfective evolution of BPMN models. In Proceedings of the Symposium on Theory of Modeling and Simulation (TMS-DEVS), Pasadena, CA, USA, 3–6 April 2016; pp. 1–8. [Google Scholar]
- Casalicchio, E.; Cardellini, V.; Interino, G.; Palmirani, M. Research challenges in legal-rule and QoS-aware cloud service brokerage. Future Gener. Comput. Syst. 2018, 78, 211–223. [Google Scholar] [CrossRef]
- Puliafito, C.; Mingozzi, E.; Longo, F.; Puliafito, A.; Rana, O. Fog Computing for the Internet of Things. ACM Trans. Internet Technol. 2019, 19, 1–41. [Google Scholar] [CrossRef]
- OpenFog Consortium. OpenFog Reference Architecture for Fog Computing. 2017. Available online: https://www.openfogconsortium.org/wp-content/uploads/OpenFog_Reference_Architecture_2_09_17-FINAL.pdf (accessed on 8 April 2019).
- Rubio-Drosdov, E.; Sanchez, D.D.; Almenarez, F.; Marin, A. A Framework for Efficient and Scalable Service Offloading in the Mist. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019. [Google Scholar]
- Venčkauskas, A.; Morkevicius, N.; Jukavičius, V.; Damaševičius, R.; Toldinas, J.; Grigaliūnas, Š. An edge-fog secure self-authenticable data transfer protocol. Sensors 2019, 19, 3612. [Google Scholar] [CrossRef] [Green Version]
- Preden, S.; Tammemae, K.; Jantsch, A.; Leier, M.; Riid, A.; Calis, E. The Benefits of Self-Awareness and Attention in Fog and Mist Computing. Computer 2015, 48, 37–45. [Google Scholar] [CrossRef]
- Orsini, G.; Bade, D.; Lamersdorf, W. Computing at the mobile edge: Designing elastic android applications for computation offloading. In Proceedings of the 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC), Munich, Germany; 2015; pp. 112–119. [Google Scholar]
- Kumar, V.; Laghari, A.A.; Karim, S.; Shakir, M.; Brohi, A.A. Comparison of Fog Computing Cloud Computing. Int. J. Math. Sci. Comput. (IJMSC) 2019, 5, 31–41. [Google Scholar] [CrossRef]
Keywords. | Search String |
---|---|
Ontology, Security, Compliance | (Ontology <AND> Cloud Security) OR (Ontology AND Cloud Compliance) OR (Ontology <AND> Business Process Compliance <AND> Cloud Computing) |
Source | Count |
---|---|
Elsevier | 28 |
IEEE | 31 |
ACM | 28 |
Springer | 26 |
Taylor & Francis | 21 |
Wiley | 16 |
Google Scholar | 100 |
Cloud Services Discovery and Selection | |
[51] Joshi et al. (2020) | “Cloud Security comparator system” |
[52] Afgan et al. (2018) | "CloudLaunch: Discover and deploy cloud applications" |
[20] Alfazi et al. (2015) | "Ontology-Based Automatic Cloud Service Categorization for Enhancing Cloud Service Discovery" |
[53] Ali et al. (2018) | "Cloud Service Discovery and Extraction: A Critical Review and Direction for Future Research" |
[11] Andročec et al. (2012) | "Cloud Computing Ontologies: A systematic review" |
[54] Mordi & Garg (2019) | "A QoS-based approach for cloud-service matchmaking, selection and composition using the Semantic Web" |
[55] Nawaz et al. (2018) | "An MCDM method for cloud service selection using a Markov chain and the best-worst method. Knowledge Based System" |
[56] Sbodio et al. (2010) | "Discovering Semantic Web services using SPARQL and intelligent agents. Web Semantics" |
[57] Di Martino et al. (2016) | "Cloud services composition through cloud patterns: a semantic-based approach" |
Cloud Services Description and Selection | |
[58] Nawaz et al. (2019) | "Service description languages in cloud computing: state-of-the-art and research issues" |
[59] Talhi et al. (2017) | "Ontology for cloud manufacturing based Product Lifecycle Management" |
[60] Chen and Yang, 2020 | “Cloud energy saving case-based reasoning agent” |
[61] Lu et al. (2016) | "ManuService ontology: a product data model for service-oriented business interactions in a cloud manufacturing environment" |
[62] Greenwell et al. (2016) | "A Task Orientated Requirements Ontology for Cloud Computing Services" |
Cloud Security and Compliance Ontology | |
[63] Brogi et al. (2019) | "Secure Cloud-Edge deployments, with trust" |
[64] Choi & Choi, (2019) | "Ontology-based Security Context Reasoning for Power IoT-Cloud Security Service" |
[65] Choi et al. (2013) | "Ontology-based access control model for security policy reasoning in cloud computing" |
[66] De Franco Rosa & Jino, (2017) | "A Survey of Security Assessment Ontologies" |
[67] Di M, (2019) | "Design of the Network Security Intrusion Detection System Based on the Cloud Computing" |
[68] Janulevicius et al (2017) | "Enterprise architecture modeling based on cloud computing security ontology as a reference model" |
[69] Kalaiprasath et al. (2017) | "Cloud security and compliance -a semantic approach in end to end security" |
[70] Klimenko &Safronenkova, (2019) | "An Ontology-Based Approach to the Workload Distribution Problem Solving in Fog-Computing Environment" |
[71] Singh & Pandey, (2018) | "Cloud Security Ontology (CSO). Cloud Computing for Geospatial Big Data Analytics" |
[72] Singh & Pandey, (2014) | "A comparative study of Cloud Security Ontologies" |
[73] Tao et al. (2018) | "Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes." |
Cloud Interoperability | |
[74] Amato et al. (2013) | "Improving security in cloud by formal modeling of IaaS resources" |
[49] Andročec & Vrček (2016) | "Ontologies for Platform as Service APIs Interoperability" |
[50] Bassiliades et al (2018) | "An ontology for a platform-as-a-service semantically interoperable marketplace" |
[75] Castañé et al (2018) | "An ontology for heterogeneous resources management interoperability and HPC in the cloud" |
Business Process Compliant Ontology | |
[76] Corea, and Delfmann, (2017) | "Detecting Compliance with Business Rules in Ontology-Based Process Modeling" |
[77] Elgammal & Turetken, (2015) | "Lifecycle Business Process Compliance Management: A Semantically-Enabled Framework" |
[78] Griffo et al. (2018) | "Conceptual Modeling of Legal Relations" |
[79] Griffo et al. (2017) | "From an Ontology of Service Contracts to Contract Modeling in Enterprise Architecture" |
[80] Palmirani & Governatori, (2018) | "Modelling Legal Knowledge for GDPR Compliance Checking" |
[81] Zhong et al. (2019) | "A scientometric analysis and critical review of construction related ontology research" |
Author | Practice Environment | Strength | Weakness |
---|---|---|---|
Afgan et al. (2018) [52] | Cloud | The system minimizes the effort required to integrate a new application. | It is still slightly difficult to integrate clouds and plugins into the new technique. |
Alfazi et al. (2015) [20] | Cloud | Cloud services were categorized to enhance discovery. | Cannot extract the attributes of vendors. |
Ali et al. (2018) [53] | cloud | Their study extends through recent methodologies, procedures and representations applied to cloud service discovery. | The limitations range from time consumption to low performance in discovering Cloud services. |
Amato et al. (2013) [74] | Cloud | Their architecture permits the bottom-up strategy to automatically build domain ontologies. | The scalability of the system has not been evaluated. |
Andročec & Vrček, (2016) [49] | Cloud | Use Case, ontology-driven service data, and AI techniques are perfect for resolving service-level interoperability challenges. | APIs variations have not been considered. |
Andročec et al. (2012) [11] | Cloud | The study analysis offered real evidence to the challenges of cloud computing with respect to those of cloud ontology. | The studies did not offer a real solution to the security challenges in cloud computing ontology. |
Bassiliades et al. (2018) [50] | Cloud | Their ontology supports model creation and classification procedure aimed at a reasonable-match reference. | It currently lacks the extension and demonstration of complex Platform as a Service rating prototypes with policies. |
Brogi et al. (2019) [63] | Cloud | Their system can be used with other systems to identify trade-offs. | It is not capable of analyzing the security of information flowing through the various constituent services. |
Castañé et al. (2018) [75] | Cloud | Created a central knowledge repository aimed at appreciating the information content as it enhances shareability. | Currently, the system cannot evaluate performance and resource utilization, among other metrics. |
Choi & Choi, (2019) [64] | Cloud | The weakness of many systems that offer solutions was scrutinized to ascertain the power requirements needed by a power IoT cloud domain. Attention was paid to security ontology design. | It requires a process for defining context attack inference rules. |
Choi et al. (2013) [65] | Cloud | Protect the system against malicious information leakage | Inference processing is specific to only the Jena inference machine. |
De Franco Rosa & Jino, (2017) [66] | Cloud | The findings show research areas with challenges for future studies. | The study did not take into consideration taxonomies; methods approach up until this time. |
Di, M. (2019) [67] | Cloud | It tracks the activities that violate system security and other actions. | It requires extensive verification time to ensure that attack has been successfully eliminated. |
Di Martino et al. (2016) [57] | Cloud | According to the authors, semantic cataloging can enhance interoperability. | Automation of the entire composition process is required to resolve ambiguity. |
Greenwell et al. (2016) [62] | Cloud | With UPML ontology architecture, cloud requirements can be accessed by distinct levels in cloud requirement. | The architecture lacks a security mechanism. |
Janulevicius et al. (2017) [68] | Cloud | The new system comes with a risk management idea for cloud computing security evaluation. | From their conclusion, the study is a work in progress. |
Kalaiprasath et al. (2017) [69] | Cloud | Easy-to-use cloud security policy recommendation. | The laws to create a fair vendor matchmaking are not robust yet. |
Klimenko and Safronenkova (2019) [70] | Cloud | The system reduced optimization problem. | |
Lu et al. (2016) [61] | Cloud | It allows extensible and reusable upgrade of the underlying knowledge architecture. | There is still the issue of integration with other ontologies. |
Mordi & Garg (2019) [54] | Cloud | The supervisory structure permits a client consumer to get analysis outcome from the system. | The system does not support mobile users. |
Nawaz et al. (2019) [58] | Cloud | They created common criteria for identifying common features of cloud Service Description Languages (SDLs). | Current Cloud service descriptions lack the support to update published service offers. |
Nawaz et al. (2018) [55] | Cloud | It uses lower number to determine the weights of service criteria. | The issue of uncertainty was not addressed in the current system. |
Sbodio et al. (2010) [56] | Cloud | They designed a conceptual framework for discovering web service operations. | Their work did not reconcile ontologies relationship between various vendors. |
Singh & Pandey (2014) [72] | Cloud | Offered better knowledge to ensure better protection of data in the cloud. | Based on collection of all the drawbacks from the survey. |
Singh & Pandey (2018) [71] | Cloud | It offers security ethics as a guide to service providers. | Additional efforts are required to align the new concept with the associated counter measures. |
Talhi et al. (2017) [59] | Cloud | They used the holonic concept, a current way to virtualize any manufacturing resource(s). | The approach has not been tested using a real case situation. |
Corea and Delfmann (2017) [76] | Traditional | Applied semantics in the compliance management. | Dependent on a business ontology linked to a process model. |
Elgammal and Turetken (2015) [77] | Cloud | Improved communication between legal and compliance experts. | Not fully implemented yet. |
Griffo et al. (2017) [79] | Traditional | The system can represent relevant legal relations. | Their study did not examine the legal implications within the organization based on internal regulations and compliance requirements. |
Griffo et al. (2018 [78]) | Traditional | All correlative legal positions are made simple. | Provider burden positions sometimes deliberately hidden. |
Palmirani and Governatori (2018) [80] | Traditional | Offers an integrated user interface. | Imports constraints on the metadata. |
Zhong et al. (2019) [81] | Traditional | The new system enhances domain knowledge reuse. | Developing the ontology consumes time. |
Area of Application | No. of Studies | Specific Studies |
---|---|---|
* Business process compliance | 6 | 4.30, 4.31, 4.32, 4.33, 4.34, 4.35 |
* Cloud security and compliance ontology | 11 | 4.19, 4.20, 4.21, 4.22, 4.23, 4.24, 4.25, 4.26, 4.27, 4.28, 4.29 |
* Cloud interoperability | 4 | ,4.15, 4.16, 4.17, 4.18 |
* Cloud service discovery and selection | 9 | 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7, 4.8, 4.9 |
* Cloud service description and selection | 5 | 4.10, 4.11, 4.12, 4.13, 4.14 |
Total | 35 |
Considerations | Fog | Cloud |
---|---|---|
Objective | Improve aptitude and implementation of process that should be conveyed to the cloud for conduct, analysis, and storage | Offer a demand of huge variation in the real, dominant provisioning of IT managements |
Computational emphases | Fog operations occur at the network edge | Operations and applications take place in the cloud |
Perception Level | Great | Great |
scalability Level | Great | Great |
Provision for Multitask | Absolute | Absolute |
Transparency | Great | Great |
Run time | Online services | Online services |
Nature of Requirements | High allocation | Small allocation |
Distribution unit | All forms and dimensions | All forms and dimensions |
Degree of Virtualization | Dynamic | Dynamic |
Communication | Device to device | Device to Cloud |
Security | Defined | Vague |
Infrastructure | Versatile | Uses the (IaaS, PaaS, SaaS) model |
Provision of Operating System | Uses hypervisor virtualization | Uses a hypervisor (VM) for running several OSs at a time |
Proprietorship | Several | Distinct |
Service arbitration | Based on SLA | Based on SLA |
Provision of Client administration | Central | Central or can be surrogate to third party |
Resource administration | Central | Central/Dispersed |
Disaster management | Deferment of unsuccessful responsibilities | VMs are easily transferred from one node to another |
Service price | Utility pricing and pay per use | Utility pricing, and discounting for superior clients |
Category of service | Network, CPU, memory, bandwidth, device, storage | IaaS, PaaS, SaaS, XaaS |
Reaction Time | Low | High |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Agbaegbu, J.; Arogundade, O.T.; Misra, S.; Damaševičius, R. Ontologies in Cloud Computing—Review and Future Directions. Future Internet 2021, 13, 302. https://doi.org/10.3390/fi13120302
Agbaegbu J, Arogundade OT, Misra S, Damaševičius R. Ontologies in Cloud Computing—Review and Future Directions. Future Internet. 2021; 13(12):302. https://doi.org/10.3390/fi13120302
Chicago/Turabian StyleAgbaegbu, JohnBosco, Oluwasefunmi Tale Arogundade, Sanjay Misra, and Robertas Damaševičius. 2021. "Ontologies in Cloud Computing—Review and Future Directions" Future Internet 13, no. 12: 302. https://doi.org/10.3390/fi13120302
APA StyleAgbaegbu, J., Arogundade, O. T., Misra, S., & Damaševičius, R. (2021). Ontologies in Cloud Computing—Review and Future Directions. Future Internet, 13(12), 302. https://doi.org/10.3390/fi13120302