poster jsoe research expo 2009

1
PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak [email protected] and Ingolf Krüger California Institute for Telecommunications and Information Technology, San Diego Division Requirements Functional (FRs) Support research workflow Allow multiple investigators & studies Support community contribution of device profiles, calculations, visualizers Share raw data & processed results while maintaining provenance Quality (QRs) Dynamic access control Confidentiality and privacy (HIPAA/IRB) High availability and reliability Scalability (bandwidth/storage/users) Auditability Challenges Early Identification and modelling Stakeholders Quality requirements (QRs) Crosscutting concerns Policy Definition and Execution Agile development process Responsive to changing requirements Future-proof architecture Ease of maintainability and evolution while minimizing risk to operations Rich Services 3 Service Oriented Architecture (SOA) Based on composite pattern (i.e., system-of-systems), messaging pattern, routing pattern, and role-based interactions, choreography Crosscutting concerns (including policy evaluation) as interceptors Agile Development Framework End-to-end model-driven approach Early & continuous identification and prioritization of crosscutting concerns Results Models Use cases, domain models, services Implementation Java-based Enterprise Service Bus Standards-based messaging Storage virtualization based on OSS Inversion of Control creates worker threads on demand Features Rapid incorporation of emergent data sources at low risk to existing users Seamless incorporation of novel intermediary services (e.g., policy) Easy integration w/new clients & CIs Scales easily to high usage while maintaining high performance Future improvements Policy-driven crosscutting concerns (e.g., IA & HIPAA, scaling, failure mitigation, self-configuration) Migration to cloud Functional Requirements (FRs) This material is based upon work supported by the National Institutes of Health under Grant No 1U01CA130771-01 (Project PALMS: Kevin Patrick, PI) and the National Science Foundation under Grant No CCF- 0702791 f Cyberinfrastructures (CI) 2 f f PALMS f Science encompassing reliable information delivery to intended parties under appropriate circumstances. Defined by National Security Agency (NSA) as information availability, integrity, confidentiality, non-repudiation, and access control. Demanded by all or most CI stakeholders as a condition of participating in the CI. Information Assurance (IA) 1 References Store/organize Collect data Analyz e Visuali ze P hysical A ctivity L ocation M easurement S ystem to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health. An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades. 1. W. McNight. What is Information Assurance? Crosstalk: The Journal of Defense Software Engineering. July 2002. 2. Revolutionizing Science and Engineering Through Cyberinfrastructure: Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure. Washington, DC: National Science Foundation, January 2003. http://www.nsf.gov/cise/sci/reports/atkins.pdf 3.M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini, Rich Services: The Integration Piece of the SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp. 176-183. SPSS ESRI G P S D evice Accelerometer O thers PALM S Study Study Study Study Filtering Filtering Filtering Scoring Analyzing Scoring Scoring Analyzing Analyzing External Data Subject Data R aw D ata O thers ... ... G oogle M aps View er O therLocal View er Quality Requirements (QRs) Controlled Access S ecure Reliable Reusable Manageable Maintainable Scalable Performant Highly Available High Data Integrity Confidential HIPAA-compliant Auditable Robust R ich Services Virtual N etw ork R ich Services R AS 4 Services Service S 1 Roles U1 U2 U3 U4 U5 U se C ase G raph C oncerns C1 C2 C3 C4 C C1 CC2 CC3 D om ain M odel R1 R2 R3 R4 R5 R6 R1 R2 m sg R3 C C1 C C2 R ole D om ain M odel R1 R2 R3 R4 R5 R6 CC1 CC2 C C3 R outer/Interceptor Messenger/C om m unicator R AS 1 R AS 2 CC1 C C4 CC5 Router/Interceptor M essenger/Com municator R AS 5 R AS 6 R AS 3 S / D S / D RIS : RIS : Service Elicitation R ich S ervice Architecture R AS 7 System ofSystem s Topology H1 H2 H3 H5 H6 H7 H8 H9 H4 R AS1 R AS 2 R AS 3 R AS 5 R AS 6 R AS 7 Infrastructure M apping H 1:R AS1 H2:RAS2 H 3:C C1 H 5:R AS2 H6:RAS5 H7:RAS7 H 8:RAS 7 H9:RAS6 H 4:R AS3 O ptim ization Im plementation R AS 1 RAS 2 R AS 3 RAS 4 R AS 5 RAS 6 R AS 7 C C1 CC2 C C3 CC4 C C5 A nalysis Synthesis A nalysis Identification Definition C onsolidation Refinement H ierarchic com position Refinement Logical M odel System A rchitecture Definition Logical Architecture Loop D eploym ent Loop Rich Service Development Process EventLogger Access Policies PALM S Integration System Integration Adapter Data R epository H IPAA Policies Service/ Data C onnector View er View er Adapter C onsum erSystem s Service/ Data C onnector Sensor Adapter Sensor ProducerSystem s Subject R epository Service/ Data C onnector Authoring Calculation R epository C alculation System s Execution Prototyping Failure D etection/ M itigation Rich Service Architecture PALMS Browser

Upload: bdemchak

Post on 11-Feb-2017

65 views

Category:

Software


1 download

TRANSCRIPT

Page 1: Poster   jsoe research expo 2009

PALMS-CI: A Policy-driven CyberinfrastructureFor the Exposure Biology Community

Barry Demchak [email protected] and Ingolf KrügerCalifornia Institute for Telecommunications and Information Technology, San Diego Division

Requirements

Functional (FRs)• Support research workflow

• Allow multiple investigators & studies• Support community contribution of

device profiles, calculations, visualizers

• Share raw data & processed results while maintaining provenance

Quality (QRs)• Dynamic access control• Confidentiality and privacy

(HIPAA/IRB)• High availability and reliability• Scalability (bandwidth/storage/users)• Auditability

Challenges

Early Identification and modelling• Stakeholders• Quality requirements (QRs)• Crosscutting concerns

Policy Definition and ExecutionAgile development process

• Responsive to changing requirementsFuture-proof architecture

• Ease of maintainability and evolution while minimizing risk to operations

Rich Services3

Service Oriented Architecture (SOA)• Based on composite pattern (i.e.,

system-of-systems), messaging pattern, routing pattern, and role-based interactions, choreography

• Crosscutting concerns (including policy evaluation) as interceptors

Agile Development Framework• End-to-end model-driven approach• Early & continuous identification and

prioritization of crosscutting concerns

Results

Models• Use cases, domain models, services

Implementation• Java-based Enterprise Service Bus• Standards-based messaging• Storage virtualization based on OSS• Inversion of Control creates worker

threads on demandFeatures

• Rapid incorporation of emergent data sources at low risk to existing users

• Seamless incorporation of novel intermediary services (e.g., policy)

• Easy integration w/new clients & CIs• Scales easily to high usage while

maintaining high performanceFuture improvements

• Policy-driven crosscutting concerns (e.g., IA & HIPAA, scaling, failure mitigation, self-configuration)

• Migration to cloud

Functional Requirements (FRs)

This material is based upon work supported by the National Institutes of Health under Grant No 1U01CA130771-01 (Project PALMS: Kevin Patrick,

PI) and the National Science Foundation under Grant No CCF-0702791

f

Cyberinfrastructures (CI)2

f

f

PALMS

f

Science encompassing reliable information delivery to intended parties under appropriate circumstances. Defined by National Security Agency (NSA) as information availability, integrity, confidentiality, non-repudiation, and access control. Demanded by all or most CI stakeholders as a condition of participating in the CI.

Information Assurance (IA)1

References

Store/organize

Collect data

Analyze

Visualize

Physical Activity Location Measurement System to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health.

An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades.

1. W. McNight. What is Information Assurance? Crosstalk: The Journal of Defense Software Engineering. July 2002.2. Revolutionizing Science and Engineering Through Cyberinfrastructure: Report of the National Science Foundation Blue-Ribbon Advisory Panel on

Cyberinfrastructure. Washington, DC: National Science Foundation, January 2003. http://www.nsf.gov/cise/sci/reports/atkins.pdf3. M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini, Rich Services: The Integration Piece of the SOA Puzzle. In

Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp. 176-183.

SPSS

ESRI

GPS Device

Accelerometer

Others

PALMS

Study StudyStudy

Study

Filtering Filtering Filtering

Scoring

Analyzing

Scoring Scoring

Analyzing Analyzing

External Data

Subject Data Raw Data

Others

...

...

Google Maps Viewer Other Local Viewer

Quality Requirements (QRs)

Controlled AccessSecureReliableReusableManageable

Maintainable

Scalable

Performant

Highly Available

High Data Integrity

ConfidentialHIPAA-compliant

Auditable

Robust

Rich Services Virtual Network

Rich Services

RAS4

Services

Service S 1

Roles

U1

U2

U3

U4

U5

Use Case Graph

ConcernsC1 C2 C3

C4CC1

CC2CC3

Domain Model

R1 R2

R3 R4

R5 R6

R1 R2

msg

R3

CC1CC2

Role Domain Model

R1 R2

R3 R4

R5 R6

CC1 CC2 CC3

Router/ Interceptor

Messenger /Communicator

RAS 1 RAS2

CC1 CC4 CC5

Router /Interceptor

Messenger / Communicator

RAS5 RAS6RAS 3

S/D

S/D

RIS :

RIS:

Serv

ice

Elic

itat

ion

Ric

h S

ervi

ce A

rchi

tect

ure

RAS7

System of Systems Topology

H1 H2

H3

H5

H6

H7

H8

H9H4

RAS1 RAS2 RAS 3

RAS5 RAS6 RAS7

Infrastructure Mapping

H1:RAS1 H2:RAS 2

H3:CC1

H5:RAS2

H6:RAS 5

H7:RAS 7H8:RAS7

H9:RAS 6

H4:RAS3

Opt

imiz

atio

n

ImplementationRAS1 RAS 2

RAS3 RAS 4

RAS5 RAS 6

RAS7 CC1

CC2 CC3

CC4 CC5

Ana

lysis

Syn

thes

is

Ana

lysis

Iden

tific

atio

n

Def

initi

on

Con

solid

atio

n

Refinement

Hierarchic composition

Refinement

Logical Model

Syst

em A

rchi

tect

ure

Defin

ition

Logical Architecture Loop

Deployment Loop

Rich Service Development Process

Event Logger Access Policies

PALMS Integration System

Integration Adapter

Data Repository

HIPAA Policies

Service/ Data

ConnectorViewerViewer

Adapter

Consumer Systems

Service/ Data

ConnectorSensor AdapterSensor

Producer Systems

Subject Repository

Service/ Data

ConnectorAuthoringCalculation

Repository

Calculation Systems

ExecutionPrototyping

Failure Detection/Mitigation

Rich Service ArchitecturePALMS Browser