Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Use Cases

Lee Badger
Robert Bohn
Ramaswamy Chandramouli
Tim Grance
Tom Karygiannis
Robert Patt-Corner
Jeffrey Voas

Acknowledgments: The May 11, 2010 Gaithersburg Use Case workshop participants, Babak Johromi, Hemma Prafullchandra, and Gregg Brown

Initial Cloud Computing Use Case TBD, 2010

A set of twenty five use cases that seek to express selected portability, interoperability and security concerns that cloud users may have.

****WORKING DOCUMENT****

  1. Introduction
  2. Important Actors for Public Clouds
  3. Cloud Management Use Cases
    3.1 Open An Account
    3.2 Close An Account
    3.3 Terminate An Account
    3.4 Copy Data Objects Into a Cloud
    3.5 Copy Data Objects Out of a Cloud
    3.6 Erase Data Objects In a Cloud
    3.7 VM Control: Allocate VM Instrance
    3.8 VM Control: Manage Virtual Machine Instance State
    3.9 Query Cloud-Provider Capabilities and Capacities
  4. Cloud Interoperability Use Cases
    4.1 Copy Data Objects between Cloud-Providers
    4.2 Dynamic Operation Dispatch to laaS Clouds
    4.3 Cloud Burst From Data Center to Cloud
    4.4 Migrate a Queuing-Based Application
    4.5 Migrate (fully-stopped) VMs from one cloud-provider to another
  5. Cloud Security Use Cases
    5.1 Identity Management - User Account Provisioning
    5.2 Identity Management - User Authentication in the Cloud
    5.3 Identity Management - Data Access Authorization Policy Management in the Cloud
    5.4 Identity Management - User Credential Synchronizaton Between Enterprises and the Cloud
    5.5 eDiscovery
    5.6 Security Monitoring
    5.7 Sharing of Access to Data in a Cloud
  6. Future Use cases Candidates
    6.1 Cloud Management Broker
    6.2 Transfer of ownership of data within a cloud
    6.3 Fault-Tolerant Cloud Group

Appendix A
Appendix B
Appendix C
Appendix D
 

Created October 1, 2010, Updated June 2, 2021
Was this page helpful?