Abstract
The automation of application deployment is vital today as the manual alternative is too slow and error-prone. For this reason, many technologies for deploying applications automatically based on deployment models have been developed. However, in many scenarios, these models have to be created in collaborative processes involving multiple participants that belong to independent organizations. However, the potential competing interests of these organizations hinder the degree of trust they have in each other. Thus, without a guarantee of accountability, iterative collaborative deployment modeling is not possible in such domains. In this paper, we propose a decentralized deployment modeling approach that achieves accountability by utilizing public blockchains and decentralized storage systems to store intermediate states of the collaborative deployment model. The approach guarantees integrity of deployment models and allows obtaining the history of changes they went through while ensuring participants’ authenticity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Topology and orchestration specification for cloud applications, November 2012. http://docs.oasis-open.org/tosca/TOSCA/v1.0/os/TOSCA-v1.0-os.html
Chef, May 2018. https://www.chef.io/
Kubernetes, May 2018. https://kubernetes.io
Membership service providers (MSP), July 2018. http://hyperledger-fabric.readthedocs.io/en/release-1.1/msp.html
Rewriting history – Git commit -amend and other methods of rewriting history (2018). https://www.atlassian.com/git/tutorials/rewriting-history
Swarm, July 2018. https://github.com/ethersphere/swarm
Ball, C.: Announcing GitTorrent: a decentralized GitHub, May 2015. https://blog.printf.net/articles/2015/05/29/announcing-gittorrent-a-decentralized-github/
Baumann, F.W., Breitenbücher, U., Falkenthal, M., Grünert, G., Hudert, S.: Industrial data sharing with data access policy. In: Luo, Y. (ed.) CDVE 2017. LNCS, vol. 10451, pp. 215–219. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66805-5_27
Benet, J.: IPFS-content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561 (2014)
Beregszaszi, A.: Mango, July 2016. https://medium.com/@alexberegszaszi/mango-git-completely-decentralised-7aef8bcbcfe6
Bergmayr, A.: A systematic review of cloud modeling languages. ACM Comput. Surv. (CSUR) 51(1), 22 (2018)
Cachin, C.: Architecture of the hyperledger blockchain fabric. Technical report, IBM Research - Zurich (2016)
Cecere, L.: Seven use cases for hyperledger in supply chain, January 2017. http://www.supplychainshaman.com/big-data-supply-chains-2/10-use-cases-in-supply-chain-for-hyperledger/
Cera, C.D.: Role-based viewing envelopes for information protection in collaborative modeling. Comput.-Aided Des. 36(9), 873–886 (2004)
Chacon, S., Straub, B.: Pro Git. Apress, Berkeley (2014)
Endres, C., Breitenbücher, U., Falkenthal, M., Kopp, O., Leymann, F., Wettinger, J.: Declarative vs. imperative: two modeling patterns for the automated deployment of applications. In: Proceedings of the 9th International Conference on Pervasive Patterns and Applications, pp. 22–27. Xpert Publishing Services (XPS) (2017)
Ethereum Foundation: Web3 base layer services, August 2018. http://ethdocs.org/en/latest/contracts-and-transactions/web3-base-layer-services.html
Falkenthal, M., et al.: Towards function and data shipping in manufacturing environments: how cloud technologies leverage the 4th industrial revolution. In: Proceedings of the 10th Advanced Summer School on Service Oriented Computing, pp. 16–25. IBM Research Division (2016)
Fowler, M.: Patterns of Enterprise Application Architecture. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)
Goodin, D.: Massive denial-of-service attack on GitHub tied to Chinese government, March 2015. https://arstechnica.com/information-technology/2015/03/massive-denial-of-service-attack-on-github-tied-to-chinese-government/
King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake, August 2012. https://peercoin.net/assets/paper/peercoin-paper.pdf
Kopp, O., Binz, T., Breitenbücher, U., Leymann, F.: Winery – a modeling tool for TOSCA-based cloud applications. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 700–704. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45005-1_64
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)
Mohtashami, M., Marlowe, T., Kirova, V., Deek, F.P.: Risk management for collaborative software development. Inf. Syst. Manag. 23(4), 20–30 (2006). https://doi.org/10.1201/1078.10580530/46352.23.4.20060901/95109.3
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Philip, Z.: PGP user’s guide, volume I: essential topics. Phil’s Pretty Good Software, version 2.6.2, October 1994. https://web.pa.msu.edu/reference/pgpdoc1.html
Rashkovskii, Y.: Gitchain, September 2014. https://www.kickstarter.com/projects/612530753/gitchain/description
Schwartz, D., Youngs, N., Britto, A., et al.: The Ripple protocol consensus algorithm (2014). https://ripple.com/files/ripple_consensus_whitepaper.pdf
Steinbeis, G.: Change author of SVN commit, June 2011. https://blog.tinned-software.net/change-author-of-last-svn-commit/
TrĂłn, V.: Announcing Swarm proof-of-concept release 3, June 2018. https://blog.ethereum.org/2018/06/21/announcing-swarm-proof-of-concept-release-3/
Trón, V., Fischer, A., Nagy, D.A., Felföldi, Z., Johnson, N.: Swap, swear and swindle: incentive system for swarm, May 2016. https://swarm-gateways.net/bzz:/theswarm.eth/ethersphere/orange-papers/1/sw
Viriyasitavat, W., Martin, A.: In the relation of workflow and trust characteristics, and requirements in service workflows. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds.) ICIEIS 2011. CCIS, vol. 251, pp. 492–506. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25327-0_42
Wang, Y.: Intellectual property protection in collaborative design through lean information modeling and sharing. J. Comput. Inf. Sci. Eng. 6(2), 149–159 (2006)
Wood, G.: Ethereum: a secure decentralised generalised transaction ledger - Byzantium version (2018). https://ethereum.github.io/yellowpaper/paper.pdf
Yussupov, V., Falkenthal, M., Kopp, O., Leymann, F., Zimmermann, M.: Secure collaborative development of cloud application deployment models. In: Proceedings of the 12th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) (2018)
Acknowledgments
This research was funded by the Ministry of Science of Baden-Württemberg for the doctoral program “Services Computing”, and by the project SePiA.Pro (01MD16013F) of the BMWi program Smart Service World.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Falazi, G., BreitenbĂĽcher, U., Falkenthal, M., Harzenetter, L., Leymann, F., Yussupov, V. (2018). Blockchain-Based Collaborative Development of Application Deployment Models. In: Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., Meersman, R. (eds) On the Move to Meaningful Internet Systems. OTM 2018 Conferences. OTM 2018. Lecture Notes in Computer Science(), vol 11229. Springer, Cham. https://doi.org/10.1007/978-3-030-02610-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-02610-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02609-7
Online ISBN: 978-3-030-02610-3
eBook Packages: Computer ScienceComputer Science (R0)