Cooperative Virtual Data Center: Sharing Data and Resources among Multiple Computing Entities

Size: px
Start display at page:

Download "Cooperative Virtual Data Center: Sharing Data and Resources among Multiple Computing Entities"

Transcription

1 , pp Cooperative Virtual Data Center: Sharing Data and Resources among Multiple Computing Entities Eun-Kyu Lee Dept. of Information and Telecommunication Engineering Incheon National University Abstract Existing data centers are each individually owned and operated by a single entity. This situation creates an excessive financial burden upon each entity through the need to overprovision for hardware. While this state of affairs enables a secure and an efficient maintenance scheme for the data center, the financial drawbacks are perhaps excessive. To address the concern, we propose the idea of a cooperative virtual data center among multiple entities that is founded on the principal of fair resource sharing amongst the entities. Keywords: Data center, Cloud computing, Secure communication, Storage, Network 1. Introduction Data centers represent massive financial undertakings by corporations to construct, operate, and maintain. Yet, the operational cost of data centers is greatly exaggerated. The primary reason of the over inflation of data center costs results from the over-provisioning of resources required for operation during rare occasions of abnormally high workloads. The average utilization of a data center is typically around 20%, with the other 80% overprovisioned for periods of peak loads [33]. The result of this over-provisioning has multiple effects on the fixed and variable operational costs of running a data center. First, there is a significant increase in the capital costs. A corporation must invest five times more than necessary into hardware than typically needed. With this additional hardware expenditure comes increased server storage costs. Second, there is an additional operational overhead that comes with increased hardware. The additional servers require a larger support staff to operate, to upkeep, and to maintain. Finally, there is an elevated cost associated with powering and cooling the redundant servers. While the energy requirement for powering a quiescent server is far less than an active one, it is an extra cost that cannot be avoided [32]. We see that the concept of virtual data centers (VDC) [20] is able to circumvent the additional costs incurred by over-provisioning. However, virtual data centers in the conventional sense cannot reduce data center costs alone. Instead, we notice an opportunity to exploit resource sharing amongst data centers similarly to [11]. Existing data centers are each individually owned and operated by a single entity. This situation creates an excessive financial burden upon each entity through the need to over-provision for hardware. While this state of affairs enables a secure and an efficient maintenance scheme for the data center, the financial drawbacks are perhaps excessive. Instead, we propose the idea of a cooperative virtual data center between multiple entities that is founded on the principal of fair resource sharing amongst the entities. Conceptually, each data center can reduce the amount of over-provisioning of resources by cooperatively sharing computing power with other data centers. Since data centers generally have transient and predictable periods of peak load, it is conceivable that a data center can borrow computing resources, in the form of virtual machines [31], from ISSN: IJSEIA Copyright c 2015 SERSC

2 other data centers that have spare resources for short-lived periods. Moreover, this form of cooperative sharing of computing resources provides a level of topographically distributed fault tolerance as the cooperating data centers may be geographically separated from one another. The reduced provisioning of servers has the added benefit of diminishing operating costs through abating energy requirements and minimizing required support personnel. Furthermore, cooperative VDC enable the active use of idle resources thereby creating a green computing solution [25]. According to [12], cooperative VDC have the potential to tackle 85% of the current costs associated with running a data center in terms of servers, infrastructure, and power draw. Cooperative VDC, nonetheless, suffer from the same privacy issues as cloud computing. The cooperative VDC scheme may require confidential data to be stored within another entity's private cloud, thereby exposing the discreet data. Currently there is no good way to ensure confidentiality in such situations [25]. The main goal of this paper is to promote the feasibility of a cooperative virtual data center amongst several independent entities that can still maintain private data confidentiality under minimal trust assumptions. We note that this paper extends previous research [22]. The paper is organized as follows. Section 2 provides the motivation and background behind our work and Section 3 deals with our proposed architecture. The challenges to our proposed solution are described in Section 4. Section 5 talks about some assumptions made about underlying technologies involved in this solution. Section 6 discusses the main approach of our solution. Finally, Section 7 presents our conclusions. 2. Motivations and Background Truly large-scale data centers are rare. Only a handful of companies in the world have the resources to maintain and to operate one. These data centers are comprised of tens to hundreds of thousands of servers [4, 26]. Most data centers are much smaller, on the order of hundreds to thousands of servers instead, run by mid-sized to small companies. Even with a few hundred servers, the financial commitment becomes a large burden for these more constrained companies. Realistically, data centers, on average, use far less resources than which they are equipped for. This is in large part due to the over-provisioning by data centers in situations of peak workloads, which are transient and often predictable. The redundancy which is provided for by data centers is unnecessary in most situations, but the operators of the data center must pay the cost of supporting this redundancy year-long (24/7/52). Energy costs for powering and cooling idle servers cannot be avoided in such cases. The following subsections discuss the predictable and transient natures of these workloads as well as the green impact of over-provisioning Predictable and Transient Peak Loads Periods of high workload can generally be predicted either based off of historical data or common sense in some cases. For example, an e-commerce web site can generally expect an increase of traffic starting on Black Friday [2]. In this case, the times of peak load generally last from a day to a week. Alternatively, online tax service providers may see an increased amount of web traffic when the tax deadline approaches, and will dwindle down after the deadline passes. A multitude of data mining approaches can be taken into ac- count to analyze traffic history to determine patterns of elevated workload. Knowing these patterns can help a data center plan for periods of increased utilization or vice versa in determining when resources are idle. Moreover, periods of peak loads will dissipate over time. These spans can range from a few minutes to a few hours to a few days, however the average utilization of a data center will eventually average out, with the redundant servers quiescent more often than not. 138 Copyright c 2015 SERSC

3 2.2. The Green Effect Over-provisioning creates a large cadre of idle servers, each consuming power and requiring additional cooling expenditures to maintain. The superfluous power requirements go to waste as the servers remain passive. The increased power consumption potentially implies the increased burning of fossil fuels or worse. It is estimated by Gartner that nearly a quarter of total information and communications technology (ICT) global CO2 emissions are the result of operating data centers [9]. Additionally, the lack of facilities to house current and future high density servers in most existing data centers worsen the power requirements and makes energy management a priority. 3. Cooperative Virtual Data Center The conceptualization of the cooperative virtual data center seeks to reduce both capital and operational expenditures in running a data center while providing a greener solution. The perception of the cooperative virtual data center operates around the notion that a data center is capable of utilizing heterogeneous idle resources form other private data centers when needed in periods of peak work- load in order reduce overprovisioning. This allows for a reduction in capital, thereby propagating to reductions in operational expenditures. Match applica ons to available resources Applica on Virtualiza on Access data at any loca on, in any format Data Virtualiza on Infrastructure Virtualiza on Pool and share aggregated resources En Virtualiza on among DCs es share their resources. Figure 1. The Eventual Goal of the Cooperated Virtual Data Centers This form of cooperative resource sharing provides for better data center cost effectiveness. Figure 1 shows the high level goal of cooperative resource sharing. It is currently envisioned that there would be an alliance of a group of small to mid-sized companies which each have non-conflicting periods of known peak load. The alliance membership size is perceived as being no more than 10 to 20 participants, perhaps even less. Moreover, an added benefit of this scheme enables fault tolerance if the members of the alliance happen to have their data centers geographically segregated. This reconstruction the virtual data center breaks sharply from one proposed by [11, 25] in the sense that the physical data centers which form a virtual data center are each individually operated by a separate entity which originates as part of a corporation s private cloud. This differentiation, while minor changes the fundamental dynamics of data center cost structures, financial risks, and utilization. Independently operated data centers will eventually move to a model of the cooperative virtual data centers where multiple data centers together build a single virtual computing platform by sharing their resources. Figure 2 and Figure 3 illustrate the transition. Copyright c 2015 SERSC 139

4 Company A Company C Internet Company B Figure 2. Independent, Separately Operated Data Centers A Full connec on? B Figure 3. A Model of Cooperative Virtual Data Center As commonly accepted, most data centers operate at approximately 20% utilization on average, with the rest of the servers placed in a quiescent mode for redundancy and peaks in workload. The amount of over-provisioning in such cases is unnecessary and wasteful. Instead of having 80% over-provisioning of hard- ware, it is possible in the cooperative VDC scheme to simply over-provision by as little as an extra 20%, a 75% savings in over-provisioning requirements assuming economies of scale do not hold. This major compaction of over-provisioning leads to a munificent decrease in costs across the board as well as other benefits. This will hopefully make operating data centers much more affordable and thereby feasible for companies. 4. Challenges Cooperation amongst individual data centers while far more efficient than operating separate data centers does have a number of drawbacks. The most common issues with such distributed solutions range into the categories of reliability and security. However, the most prevalent issues with resource sharing amongst data centers are the same as those which have prevented mass adoption of cloud computing storage. Namely, any data placed into a cloud computing storage environment becomes public. Privacy or the lack thereof is one of the main hindrances to the adoption of storage of all data in the cloud. This, likewise, carries over to the cooperative virtual data center concept. Confidential data may be stored on a disk in a foreign data center, open to reading for anyone in the other data center. This situation is unacceptable for most private companies and is considered one of the major drawbacks to cloud storage in general. While there have been proposed solutions to segregate the data from the applications to secure cloud C 140 Copyright c 2015 SERSC

5 computing, the latency and performance requirements may make this approach unacceptable [25]. Yet, unless this issue of privacy is resolved, it is unlikely that any company would support or adopt the cooperative virtual data center model. Furthermore, security mechanisms must be taken into account on securing the communications between the individual data centers when communicating and transferring data. Not only must network security be taken into account when starting a virtual machine in foreign data center, but it must also be considered inside the foreign data center itself. Within the foreign data center there are threats beyond just internal network security, but to the virtual machine monitor (VMM) itself [19, 27]. In the worst case, there could be malicious employees in the foreign data center who intentionally packet sniffs secret data. Finally, reliability issues must be taken into account for the cooperative virtual data center. If a company needs to borrow resources from the collective pool and there are no resources available, then this can become a critical situation of under-provisioning. In such situations, the lack of reliability can have disastrous economic consequences. There must be a recovery mechanism in place when situations arise where communal resources are not available. Furthermore, synchronization issues between the data centers can also result in unreliable or unanticipated situations. 5. Assumptions This section begins by describing our assumption for the realization of the pro- posed cooperative VDC. At first, a paravirtualization scheme is taken as our virtualization platform because of its outstanding properties of high performance and secure isolation between virtual machines (VMs). Researches on VMs indicate that paravirtualization vulnerabilities primarily stem from a compromised VMM [19]. While VM security is an interesting and significant research topic, it is out of our scope. Instead, the proposed architecture assumes that a VMM is not compromised, i.e., a tamper-proof VMM. This implies that virtualized resources in a VM such as CPU and memory are secure. Henceforth, resources provided by the VM and VMM can be considered secure, enabling a trust amongst co-operating entities. We argue that this assumption is reasonable. Each entity is unwilling to cheat on purpose, i.e., attacking other entity s data in its server, since its own private data is also processed in the others servers. In the cloud computing sense, people are using cloud computing services, e.g., Azure and EC2, based on the same level of trust with the service providers such as Microsoft and Google. There is an implicit assumption that such providers will not misuse a user s private data. Trust of an individual entity, however, does not guarantee that the data within a data center is fully protected. When considering data privacy as the dominant reason why enterprises hesitate to move toward cloud computing, a privacy mechanism must be found to fill this hole. In this sense, we determine two areas that can possibly be attacked by internals. Despite trust on a reliable entity or company providing services, this does not indicate that we can also trust all the employees of the company. A malicious employee can easily break the security of systems within a data center. The first threat model is network sniffing. Since the malicious employee sits inside your firewall, he can hear every data packet going through the protected local network. Network analysis tools enable him to access sensitive data of customers with less effort. The other threat comes from his ability to directly access file storage or disk. He is definitely prohibited from accessing data in storage through the VMM. However, the storage is physically out of control from the VMM, indicating another vulnerability. He can access the storage or a Storage Area Network (SAN) from his personal computer without intervention of an administrator. The worst scenario involves the theft of the physical storage device. Then, secured information can be extracted from the storage disk. One interesting observation is that this is not a problem specific to the proposed architecture. All the existing data centers also Copyright c 2015 SERSC 141

6 face to the same challenge, but do not provide any answer yet. We believe that the proposed cooperative VDC architecture can provide a better solution to overcome this obstacle. Company A VM A VM B VM C Company C Tamper-proof VM Monitor Private storages Company B Figure 4. Realization of the cooperative virtual data center 6. Proposed Approach The primary architecture underlying the cooperative virtual data center is shown in Figure 4. Here we see three companies, A, B, and C, where company A and C are shown to be borrowing resources from company B through a leasing of virtual machines. Company A and C both store their private data on their own dedicated hard disks located within the storage area network (SAN) of company B. It is expected that these disks would likely be placed into a more cost-effective iscsi SAN connected to the physical servers using fibre channel host bus adapters, where each company is expected to provide their own hard disks. The choice here of using an iscsi approach over that of fibre channel primarily involves the cost factor of deployment with commodity resources and the expected access patterns for the storage. Adoption of fibre channel can also be justified depending upon the expected needs of the system. Nonetheless, the actual underlying implementation of the SAN technology is up to the company hosting each private storage disk. The virtual machine monitor (VMM) is responsible for ensuring that a running virtual machine (VM) can only accesses disks that the VM owns. In this case, VM A, run by company A can only access the disk drives which company A has placed in company B, henceforth, VM C would not be able to access the disk of company A. In our proposed implementation, Xen 1 is assumed to be the hypervisor used to perform these domain security validations and access checks to disk since it enables high performance buffered I/O transfers using asynchronous buffer-descriptor rings [3]. Furthermore, all communications between company A and VM A running within company B s data center is expected to be secured. The virtual firewall- router (VFR) running within Xen will be capable of filtering results from each virtual interface (VIF) to ensure that communication from company C cannot affect VM A. In the following subsections we focus on discussing our solutions to enhancing storage security and privacy under a cooperative virtual data center as well as the reliability and synchronization issues with the solution. Namely, we aim to briefly tackle the following issues: How to make secure communication and thus keep malicious employees of a foreign data center from sniffing the internal network traffic for confidential information. How to secure information stored on a hard drive to keep unauthorized users from reading the data Copyright c 2015 SERSC

7 How to synchronize data between data centers. How to ensure reliability of resource pooling Securing Network Traffic Figure 5. DMZ with Reverse Firewall For secured network communication, this paper proposes to create a demilitarized zone (DMZ) subnetwork for the VDC. As shown in Figure 5, an additional firewall is installed between the local network of the host company, i.e., company B, and its VDC network. This executes a reverse firewall. In addition, a dedicated network interface handles the entire traffic to/from guest VMs. The initial design issue of DMZ was defense in depth with flexible provisioning of services [24], i.e., some servers like a web server is likely to be exposed to anonymous Internet users. This denotes a vulnerability of the local network if the server is within the same network as the other server systems. In the proposed architecture, on the other hand, the DMZ subnetwork for VDC is created as a safe zone as its name represents. Two firewalls keep dangerous network traffic out of the DMZ and the dedicated network interface would enable the network administrator to give exceptional attention to guest VMs packets. The new DMZ is implemented through a rule of defense in depth. A traditional firewall protects a local network from outside attacks. In contrast, the concept of a reverse firewall [1] is to protect the outside from packet flooding attacks, e.g., Distributed Denial of Service (DDoS), that emanate from within a local network. In coordinated DDoS attacks, it is much more likely that some hosts inside a local network will be taken over by remote attackers for use as zombies. The reverse firewall filters such illegitimate traffic out. One of functions in the reverse firewall to achieve this goal is a fair service to visible sources. The reverse firewall focuses on additional path information that has been added to the packet, such as the packet s source data. In the proposed scheme, its modification is taken into account to limit access attempts to the protected VDC systems. The reverse firewall also provides a secure isolation of the VDC network from the host company s local network, which enhances the level of data protection. Dedicated network interfaces is another underlying scheme to support secure transmission of VDC data packets. All the data traffic associated with guest VMs, i.e., VM A and VM C in this figure, go through the specified network interface that is separated from the other network interface that the host VM, i.e. VM B, would use exclusively. One benefit is that this can guarantee secure isolation of network resources. Since a guest VM s data uses a different interface from a host s for networking, it does not allow any connection to the local net- work s systems, which avoids internal attacks. The dedicated network interface can also enhance the degree of security against network threats since firewalls can give precise protection to the communication point. Data encryption has been always the starting point in network security. In the architecture, Internet Protocol Copyright c 2015 SERSC 143

8 Security (IPSec) or Secure Socket Layer (SSL) can be used for secure communication between end systems in the network. The new DMZ for the proposed VDC comprising of firewalls and dedicated network interfaces can provide protection against network threats and provide secure isolation of network resources. With authentication schemes using lever- aging data encryption, the DMZ also guarantees that the plain data is only revealed only within the tamper-proof VMM, supporting data privacy Securing the Storage Device To ensure data privacy, we propose the usage of hardware-based full disk encryption (FDE). In such a scheme, there are two general approaches to ensuring hardware-based FDE; the first is a chipset based approach and a second is a hard disk drive (HDD) solution. A chipset encryption method is relatively new and was most prominently introduced with the Intel Danbury software architecture originally slated for the Eaglelake chipset [13]. However, as it turns out, the chipset FDE solution seems inappropriate for our architecture solution. Chipset based encryption suggests that the decryption keys work in parallel with a trusted platform module (TPM) which essentially locks a disk to a particular chip co-located with the disk. While this may be acceptable if both the disk and TPM were located in a company s own private data center, however this is not the case as both the disk and TPM would be located in a foreign data center. Additionally, this approach may be difficult to implement in the SAN environment. Instead, we look into HDD FDE as a solution. In this case, key management is handled within the HDD itself, leaving key protection the duty of the drive firmware. This solution is much easier to adapt to our architecture and was chosen for another security reason discussed in Section 6.2. However, there must still be some form of authentication to take place within the CPU to en- able the decryption of the disk through the firmware. The solution to this is to use a software-based Pre-Boot Authentication (PBA) Environment. The PBA Environment will not decrypt the keys stored in the HDD that has been used to encrypt the rest of the disk until an external authentication key has been inputed into the system. The proposed PBA mechanism is to use a Preboot Execution Environment (PXE). Intel Corporation and Systemsoft introduced the PXE during the late 90s in [18]. Today the technology is supported by a variety of vendors on a number of different platforms. Originally, PXE was designed to allow for the remote booting of a system using the network interface independent of hard disks and operating systems. PXE is specifically chosen as the technology for introducing an external key to the HDD for two reasons. First, the components that the protocol relies on are currently supported by most vendors. Moreover, there is strong indication that it will continually be supported in the future [17, 23]. Second, the PXE protocol is a fairly robust protocol capable of being adopted in chunks and modified slightly for our purposes. Company B PXE Client (VMM) Extended DHCPDISCOVER : Look for loca on of boot server DHCPOFFER : Informa on on boot server loca on Extended DHCPREQUEST : Request bootstrap image Extended DHCPACK : Informa on on NBP file loca on Network Bootstrap Program (NBP) download via TFTP Execute boot image downloaded on RAM Figure 6. PXE Client-Server protocol DHCP Server Boot Server Boot Service + TFTP Service B A 144 Copyright c 2015 SERSC

9 Figure 6 shows the high-level operational client-server protocol specified by [18] and [15]. In this figure, two companies, A and B are shown. When company A attempts to start a VM image in company B s data center, the VMM within company B s data center takes the role of the PXE client. It is the job of the PXE client to retrieve an outside key to enable decryption of the HDD. To do this, the PXE client will issue a DHCPDISCOVER message to port 67 of the local DHCP server. The discovery message will request a list of boot servers that contains the network bootstrap program (NBP) that can be used to decrypt the hard disk. The DHCP server will then reply with an Extended DHCPOFFER to port 68 of the PXE client with the list of boot servers that it has requested. After the PXE client has obtained a list of the boot servers, the PXE client will send a DHCPREQUEST to either port 67 or port 4011, depending on the boot server capabilities, to the boot service. Upon receiving the DHCPREQUEST, the boot service of the boot server returns a DHCPACK to the source port of the request with the boot file name, options required to successfully run the NBP, and potentially the configuration parameters of the MTFTP (Multicast Trivial File Transfer Protocol) if it is used. After receiving the DHCPACK, the PXE client can then contact the TFTP service on port 69 or MTFTP service based on the DHCPACK s MTFTP configuration parameters to download the NBP. Once the NBP has been downloaded, the PXE client can run the NBP to provide an authentication module to decrypt the HDD Modifications to the PXE Protocol: Referring to Figure 6, the description of the above PXE protocol requires some small modification in the cooperative VDC context. Most notably is the DHCPREQUEST message sent to the boot service on the boot server. In our architecture of a cooperative virtual data center, the boot server is located in company A s secure network. Clearly in such a situation, DHCP messages from a PXE client in company B will not be appropriate. However, this does not mean that a similar protocol cannot be applied to achieve the same results. Additionally, the PXE protocol was designed to boot a system from scratch. In the cooperative VDC situation, the hypervisor is already running and takes the place of a running operating system. Instead, the VMM needs to decrypt a hard disk to load the VM image in order to boot up the guest OS. The downloaded NBP should essentially contain either the external key to decrypt HDD or a software program that can decrypt the disk, no authentication method need be necessary Implementation of the PXE Protocol: The implementation of the above modifications to the PXE can be easily accomplished in Xen. There is only one logical place within the hypervisor to implement the PXE client protocol base. Since Domain0 is started by the VMM at boot time with the ability to run a guest OS with privileged access to the control interface, it is able to host application-level management software [3]. This makes the control plane the likeliest candidate as source to implement the PXE client functions. Seeing that the control plane running under Domain0 is also responsible for the creation of other domains within Xen, it is capable of making a call to either a library or another application to perform the PXE client operations. This enables a natural integration for the functions of the PXE client within the Xen hypervisor architecture. Modern DHCP servers already support the PXE protocols. It is mostly a matter of configuring the servers to properly return the appropriate list of boot server addresses. However, as mentioned previously, there needs to be an implementation of a different protocol mechanism to replace the DHCPREQUEST message to the boot service of the boot server. The specific details of this protocol are beyond the scope of this paper, however it is conceivable that it is relatively trivial to implement. Likewise, the file transfer protocol (FTP) mentioned previously is considered as a given. Copyright c 2015 SERSC 145

10 Alternatives to Hardware-based FDE: There are of course alternatives to hardware-based disk encryption. Disk encryption can just as easily be implemented in software. However the drawback to using software instead of hard- ware lies in the performance impact. It is generally accepted that hardware-based FDE is considerably faster than software-based solutions. The improved performance of hardware-based FDE lies in the fact that there is no added extra overhead for the CPU or the hard disk itself. Only on initial boot of a VM is there any extra processing which needs to be performed to execute the operations of a PXE client in the cooperative virtual data center architecture. Furthermore, softwarebased encryption suffers from the need that there must generally be a small segment or partition of the hard disk that must be left un-encrypted. This segment is used to typically store the master boot record (MBR) that is necessary to be left un-encrypted to enable the initial booting of an operating system Weaknesses of Hardware-based FDE: While hardware-based FDE provides a greater sense of data privacy, it is not flawless. Specifically, hardware-based FDE solutions are largely vulnerable to cold boot attacks citehalderman08. This primarily stems from the remanence effects of DRAM where computer memory retains the stored data for a brief amount of time even after the system is turned off. Experiments by Chan et al. have shown that such remanence effects of memory can easily compromise system security [5]. Moreover, there have even recently been open source tools released specifically to perform such cold boot attacks [28]. While Halderman, et al., indicate that hardware-based FDE is vulnerable to cold boot attacks in general, they mention that encrypting the data in the hard disk controller can be used to help prevent cold boot attacks. Their perspective suggests that as long as the write-only key register of the disk firmware is cleared before each boot, then HDD FDE can be protected from cold boot attacks [14]. Furthermore, this technique is currently implemented in certain HDD FDE systems such as Seagate s DriveTrust [30] technology; therefore HDD FDE is highly appropriate for the cooperative virtual data center architecture. 6.3 Synchronization of Replicated Data Two primary reasons for replicating data amongst data centers are for reliability and performance. In the aspect of reliability, data centers can continue operating after one of their replicas crashes by simply switch to one of the other replicas; also, it becomes possible to provide better protection against corrupted data. In the aspect of performance, when the number of processes attempting to access data managed by a server increases, performance can be improved by replicating the server and subsequently dividing the work; additionally, a copy of data can be placed in the proximity of the process accessing the information to reduce the time of data access. However, main concern is keeping all replicas up-to-date. Intuitively, a collection of copies is consistent when the copies are always the same, that is, a read operation performed at any copy will always return the same results. Consequently, when an update operation is performed on one copy, the update should be propagated to all copies before a subsequent operation takes place. Achieving such a tight consistency incurs high cost because updates need to be executed as atomic operations, and global synchronization is required. The synchronization scheme used in GFS [10] works this way with acceptable delay only because the replicas are stored within a local area of the primary copy which does not necessarily translate to the cooperative VDC case. The only real solution is to loosen the consistency constraints. Various consistency models have already been proposed and used for replication in distributed systems [29]. 146 Copyright c 2015 SERSC

11 Figure 7. Three Rounds can Synchronize Eight Nodes A Simple Synchronization Scheme: Synchronization is done in two steps, the first for detecting files that have been modified since the last run, and the second for propagating the updated data. In the worst case, i.e., when all nodes have updated files, an all-to-all communication is needed. In a naive approach, each node would send its updates to all partners, resulting in O(n(n 1)/2) updates. Each single connection would trigger an independent local disk access, provoking many updates concurrently and therefore resulting in a slow data transfer rate. To avoid this, [29] proposed an efficient synchronization scheme that uses only node-to-node (N2N) syncs. In this scheme, each node participates in at most one N2N sync at a time. Therefore, at most n/2 N2N syncs are run concurrently. Based on the fact that in each N2N sync a node propagates not only the modifications made to its own data, but also the modifications it received from other nodes in earlier rounds of the same sync. In [29], each node needs a maximum of log(n) N2N syncs in a complete graph. The sync process is given by a list of rounds of parallel N2N syncs. No barrier operation is executed between the rounds and therefore rounds may overlap. Figure 7 depicts the synchronization of eight nodes. The process is split into three rounds. Each of them contains four parallel N2N syncs: (A B, C D, E F, G H), (A C, B D, E G, F H), (A E, B F, C G, D H) Gossip in Complete Graphs: For optimal synchronization based on N2N synchronization gossip algorithms [29] can be also used. The constant model takes only the startup cost of a connection into account. In the linear model the communication cost c is proportional to the size l of the data volume: c = β + lτ, where β is the startup cost and τ is the transfer time of a unit-length message. τ is assumed to be constant for all links. Determining a cost-optimal gossip plan for arbitrary graphs is an NP-hard problem [21]. We therefore simplify this problem by not supporting arbitrary graphs but only hierarchies of regular graph classes. Additionally, we treat network hubs like switches amongst data centers, thereby neglecting possible hub congestion. With these two restrictions, we can generate optimal plans for some classes of graphs, which are hierarchically composed by heuristics to allow for arbitrary networks. Complete homogeneous graphs can be used to model switched networks. For this purpose, we use the optimal algorithm described in [16]. It needs at most logn rounds in graphs with an even (resp. odd) number of nodes. Depending on the amount of updated repositories, the synchronization time varies between O(n log n) for a one-to-all broadcast and O(n) for an all-to-all broadcast. Similar algorithms for other graphs like rings and busses are also known [16], but they are only optimal in the constant model where the link bandwidth is ignored. Copyright c 2015 SERSC 147

12 100Mbps switched net 1 A B 56 Kbps 2 2 D C 1 100Mbps switched net A B 56 Kbps 1, 4 2, 5 D C 3 30MB new data Plain gossip 30MB new data Topology op mized Figure 8. Gossip Considering Bandwidth Gossip in Practical Scenarios: Figure 8 illustrates the importance of considering the network characteristics in the synchronization process. The left-hand side in Figure 9 shows a straightforward but inferior gossip plan where the slow link between the left subnetwork and node D is used twice. If we treat this graph as a hierarchy of subgraphs, we can achieve better performance. Let us regard nodes A, B, C as a combined node and synchronizes it to D. More precisely, we first collect all updates of the subnetworks on their respective proxy nodes C and D (rounds 1 and 2), then synchronizes the proxy nodes via the slow link (round 3), and finally propagate the new data in each subnetwork (rounds 4 and 5). This composition of gossips in the subnetworks can be done with algorithms that are specialized for rings, chains, grids, switches, etc. In the synchronization process, the optimal broadcast plan of gossips can be generated by combinatorial optimization with proper constraints based on topological information and data dependency in polynomial time. It remains as part of our future work Providing Reliability of Resources Discussing reliability in a cooperative virtual data center (CVDC), we assume that each entity already has sufficient resources when sharing amongst data centers based on their usage expectation. Unless there are some unexpected problems in a data center or between data centers, there will be sufficient resources so that no data center within the CVDC faces an under-provisioning situation. The CVDC can be a fragile architecture. Faults can occur as a result of minor errors or catastrophic meltdowns. A CVDC system must be designed to be as fault tolerant as possible. Faults can occur in any of the components of a data center (DC) or connections between DCs. In these following subsections, we discuss a major fault which can occur in a CVDC causing a temporary under- provisioning and a possible solution to this situation Network Failures: Network failures keep DCs from communicating with each other. We will look at the failures resulting in total loss of communication amongst DCs. A major problem arises from this: one-way links and network partitions. One-way links cause problems similar to DC slowdown in a cooperative VDC. For example, DC A can send messages to DC B but cannot receive messages from DC B. DC C can talk to both DC A and DC B. So each DC has a different view of the other states of the other DCs. DC A might think that DC B has failed since it does not receive any signals from it. DC C thinks both DC A and DC B are working properly since it can send and receive messages from both. Network partitions occur in a network failure that connects two DCs. So DC A and DC B can communicate with each other in one DC but cannot communicate with DC C and DC D in another DC and visa versa Agreement: In order for a CVDC to function properly, each DC within the cooperative must share the same view of the overall CVDC. This requires a form of mutual agreement between the DCs for conflict resolution that requires extra overhead in 148 Copyright c 2015 SERSC

13 terms of either storage, computation or messaging. This area of distributed agreement has been studied in depth and has had many practical applications. For instance, Amazon s Bigtable [7] storage system uses the Paxos [6] algorithm as a form of conflict resolution, however, this algorithm requires multiple replicas and extra messaging and processing to resolve conflicts. Amazon s Dynamo [8] key-value store on the other hand, may temporarily provide inaccurate data but has an off-line conflict resolution scheme that requires versioning and extra computation to merge the separate versions of data. Either of these schemes may be appropriate for conflict resolution between the cooperating data centers depending on circumstances Solutions to System Failures: It is envisioned that each participating DC in the CVDC will notify other DCs in the cooperative of its current status that includes the amount of resources shared in the communal pool. Additionally, it s expected that each DC within the CVDC will share the same view of this information based on an agreement mechanism discussed above. In the event of a catastrophic event or temporary component failure amongst any of the participating DCs in the CVDC, and it is determined that the amount of resources in the communal pool is not enough to satisfy the needs of any single DC in the cooperative, then a fallback mechanism must occur; in this situation to prevent a potential temporary under-provisioning. The solution proposed under this CVDC condition is described as follows. Each DC is assumed to be able to monitor the utilization of resources for each VMM within its own network. Additionally, each DC is considered to be able to specify a threshold value, θ, where θ < 1 for each physical server. Moreover, each VMM is able to keep its utilization under the threshold. The threshold is reported to the other DCs in the CVDC as the 100% capacity. When it is determined that the community resource pool falls below the minimum provisioning requirement of any cooperative member s expected needs, then each DC can increase the θ threshold value to increase the provided resources. This has the net effect announcing additional resources available to the communal resource pool. This threshold value can be lowered after it is determined that the emergency situation has subsided. 7. Conclusion Existing data centers create an excessive financial burden upon each entity through the need to over-provision for hardware. In order to solve this, we pro- pose the idea of a cooperative virtual data center (CVDC) between multiple entities, which is founded on the principal of fair resource sharing amongst the entities. This new architecture also enables a secure and an efficient maintenance scheme for the data center. To realize this novel architecture, we propose to create a safe zone, the DMZ, in which CVDC systems are placed. The DMZ, consisting of two firewalls and dedicated network interfaces, protects the systems from network threats, originating from both the Internet and the local network. It also supports secured isolation of network resources, which increases the level of security. Furthermore, our proposal for FDE ensures an enhanced level of data privacy. In terms of data synchronization, we discussed a protocol that can be used to perform data synchronization by avoiding performance bottlenecks through reduced message exchanges during synchronization. For the reliability, we give an overview of the main reliability fault of a CVDC and corresponding agreement issues between the DCs. From this, we propose a new research direction to provide a certain level of resource availability and reliability. Therefore, based on our realization discussion, we believe that our architecture is feasible and will reduce capital and operational costs and enhance data protection. Copyright c 2015 SERSC 149

14 References [1] The Reverse Firewall: Defeating DDoS Attacks Emerging from Local Area Networks, [2] Cyber Monday Traffic Increases 26 Percent, Amazon Again Top Retail Site, (2007), amazon-again-topretail-site /. [3] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield Xen and the art of virtualization, In ACM symposium on Operating systems principles, (2003). [4] R. Bose, S. Sahana and D. Sarddar, An Energy Efficient Dynamic Schedule based Server Load Balancing Approach for Cloud Data Center, Int l Journal of Future Generation Communication and Networking, vol. 8, no. 3, (2015) June, pp [5] E. M. Chan, J. C. Carlyle, F. M. David, R. Farivar and R. H. Campbell, Boot-jacker: compromising computers using forced restarts, In ACM Conference on Computer and communications security, (2008). [6] T. Chandra, R. Griesemer and J. Redstone, Paxos Made Live - An Engineering Perspective, In ACM PODC, (2007). [7] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes and R. E. Gruber, Bigtable: A Distributed Storage System for Structured Data, In ACM OSDI, (2006). [8] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall and W. Vogels, Dynamo: Amazon s Highly Available Key-value Store, In ACM SOSP, (2007). [9] Gartner, Inc. Gartner: Data Centres Account for 23% of Global ICT CO2 Emissions, (2007) November, [10] S. Ghemawat, H. Gobioff and S.-T. Leung, The google file system, In ACM SOSP, (2003). [11] S. Graupner, V. Kotov and H. Trinks, Resource-Sharing and Service Deployment in Virtual Data Centers, In International Conference on Distributed Computing Systems, (2002), pp [12] A. Greenberg, J. Hamilton, D. A. Maltz and P. Patel, The Cost of a Cloud: Research Problems in Data Center Networks, ACM SIGCOMM Computer Communication Review, vol. 39, no, 1, (2009) January, pp [13] S. Grobman, N. Smith and P. Parke, Making Security Practical in the Enterprise with Client Technologies, (2007). [14] J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum and E. W. Felten, LestWe Remember: Cold Boot Attacks on Encryption Keys, In USENIX Security Symposium, (2008) July. [15] M. Henry, D. Koeppen, E. Dittert and V. Viswanathan, Intel Preboot Execution Environment, Internet draft, IETF, (1999) June. [16] J. Hromkovic, C. Klasing, B. Monien and R. Peine. Dissemination of information in interconnection networks. In Combinatorial Network Theory, (1995), pp [17] T. Huth, J. Freimann, V. Zimmer and D. Thaler, DHCPv6 option for network boot, Internet draft, IETF, (2009) April. [18] Intel Corporation, Preboot Execution Environment (PXE) Specification, Specification Version 2.1, Intel Corporation, (1999) September. [19] J. Kirch, Virtual Machine Security Guidelines Version 1.0. The Center for Internet Security, The Center for Internet Security, (2007) September. [20] V. Kotov, On Virtual Data Centers and Their Operating Environments, Technical Report HPL , HP Labs Technical Report, (2001) March. [21] D. W. Krumme, G. Cybenko and K. N. Venkataraman, Gossiping in minimal time, In SIAM J. Comput., (1992), pp [22] E.-K. Lee, Synchronization of Data and Resources in Distributed, Cooperative Virtual Data Centers, In Int l Conf. on Information Science and Industrial Applications, (2015) September. [23] J. M. and V. S. Dynamic Host Configuration Protocol (DHCP) Options for the Intel Preboot Execution Environment (PXE), RFC 4578, IETF, (2006) November. [24] E. Maiwald, Network Security: A Beginner s Guide, McGraw-Hill/Osborne, second edition, (2003). [25] E. M. Maximilien, Green Computing, University of California, Los Angeles, (2009) June. [26] R. Miller, Who Has the Most Web Servers?, (2009) May, com/archives/2009/05/14/whos-got-the-most-web-servers/. [27] T. Ormandy, An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments, Technical report, Google, Inc., (2007). [28] K. Rankin, Cold boot attack tools for linux, Linux J., (2009), pp Copyright c 2015 SERSC

15 [29] T. Schutt, F. Schintke and A. Reinefeld, Efficient synchronization of replicated data in distributed systems, In Prentice-Hall Inc., (1995). [30] Seagate Corporation, DriveTrust Technology: A Technical Overview. Technology Paper TP564, Seagate Corporation, (2006) October. [31] B. Sotomayor, K. Keahey and I. Foster, Combining batch execution and leasing using virtual machines, In ACM International Symposium on High Performance Distributed Computing, (2008). [32] U.S. Department of Energy, Five Ways to Reduce Data Center Server Power Consumption, (2008), energymatters/articles.cfm/article_i d=289. [33] R. White and T. Abels, Energy Resource Management in the Virtual Data Center, In IEEE International Symposium on Electronics and the Environment, (2004) May, pp Author Eun-Kyu Lee, he is an assistant professor in the Department of Information and Telecommunication Engineering of Incheon National University, Korea. He has been involved in many research projects in the fields of smart grid, vehicular network, location-based services, and Telematics. He received Ph.D. in Computer Science from UCLA in His recent research interest includes the Internet of Things - wireless networking, cyber-physical security, middleware systems, and mobile edge computing. Copyright c 2015 SERSC 151

Synchronization of Data and Resources in Distributed, Cooperative Virtual Data Centers

Synchronization of Data and Resources in Distributed, Cooperative Virtual Data Centers Vol.110 (ISI 2015), pp.13-18 http://dx.doi.org/10.14257/astl.2015.110.04 Synchronization of Data and Resources in Distributed, Cooperative Virtual Data Centers Eun-Kyu Lee Dept. of Information and Telecommunication

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

Xen Live Migration. Networks and Distributed Systems Seminar, 24 April 2006. Matúš Harvan Xen Live Migration 1

Xen Live Migration. Networks and Distributed Systems Seminar, 24 April 2006. Matúš Harvan Xen Live Migration 1 Xen Live Migration Matúš Harvan Networks and Distributed Systems Seminar, 24 April 2006 Matúš Harvan Xen Live Migration 1 Outline 1 Xen Overview 2 Live migration General Memory, Network, Storage Migration

More information

Efficient Synchronization of Replicated Data in Distributed Systems

Efficient Synchronization of Replicated Data in Distributed Systems Efficient Synchronization of Replicated Data in Distributed Systems Thorsten Schütt, Florian Schintke, Alexander Reinefeld Zuse Institute Berlin (ZIB) Abstract. We present nsync, a tool for synchronizing

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction There are tectonic changes to storage technology that the IT industry hasn t seen for many years. Storage has been

More information

Efficient Data Replication Scheme based on Hadoop Distributed File System

Efficient Data Replication Scheme based on Hadoop Distributed File System , pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD

INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD M.Rajeswari 1, M.Savuri Raja 2, M.Suganthy 3 1 Master of Technology, Department of Computer Science & Engineering, Dr. S.J.S Paul Memorial

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

ALTIRIS Deployment Solution 6.8 PXE Overview

ALTIRIS Deployment Solution 6.8 PXE Overview ALTIRIS Deployment Solution 6.8 PXE Overview Notice Altiris AAA Document 2006 Altiris, Inc. All rights reserved. Document Date: October 3, 2006 Altiris, Inc. is a pioneer of IT lifecycle management software

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Implementing Security on virtualized network storage environment

Implementing Security on virtualized network storage environment International Journal of Education and Research Vol. 2 No. 4 April 2014 Implementing Security on virtualized network storage environment Benard O. Osero, David G. Mwathi Chuka University bosero@chuka.ac.ke

More information

Relational Databases in the Cloud

Relational Databases in the Cloud Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating

More information

Cloud Computing Trends

Cloud Computing Trends UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

Migration of Virtual Machines for Better Performance in Cloud Computing Environment Migration of Virtual Machines for Better Performance in Cloud Computing Environment J.Sreekanth 1, B.Santhosh Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Scalable Multiple NameNodes Hadoop Cloud Storage System

Scalable Multiple NameNodes Hadoop Cloud Storage System Vol.8, No.1 (2015), pp.105-110 http://dx.doi.org/10.14257/ijdta.2015.8.1.12 Scalable Multiple NameNodes Hadoop Cloud Storage System Kun Bi 1 and Dezhi Han 1,2 1 College of Information Engineering, Shanghai

More information

An Oracle White Paper August 2011. Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability

An Oracle White Paper August 2011. Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability An Oracle White Paper August 2011 Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability Note This whitepaper discusses a number of considerations to be made when

More information

Efficient and Enhanced Load Balancing Algorithms in Cloud Computing

Efficient and Enhanced Load Balancing Algorithms in Cloud Computing , pp.9-14 http://dx.doi.org/10.14257/ijgdc.2015.8.2.02 Efficient and Enhanced Load Balancing Algorithms in Cloud Computing Prabhjot Kaur and Dr. Pankaj Deep Kaur M. Tech, CSE P.H.D prabhjotbhullar22@gmail.com,

More information

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT

Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT S. Gobinath, S. Saravanan PG Scholar, CSE Dept, M.Kumarasamy College of Engineering, Karur, India 1 Assistant Professor,

More information

Ch. 4 - Topics of Discussion

Ch. 4 - Topics of Discussion CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 6 Cloud Platform Architecture over Virtualized Data Centers Part -4 Cloud Security and Trust Management Text Book: Distributed

More information

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup

More information

Analysis on Virtualization Technologies in Cloud

Analysis on Virtualization Technologies in Cloud Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Learn the Essentials of Virtualization Security

Learn the Essentials of Virtualization Security Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 poojadhawan786@gmail.com ABSTRACT Cloud Computing

More information

Distributed File Systems

Distributed File Systems Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.

More information

DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study

DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

Companies are moving more and more IT services and

Companies are moving more and more IT services and Adding High Availability to the Cloud Paul J. Holenstein Executive Vice President Gravic, Inc. Companies are moving more and more IT services and utility applications to public clouds to take advantage

More information

Getting More Performance and Efficiency in the Application Delivery Network

Getting More Performance and Efficiency in the Application Delivery Network SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one

More information

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first

More information

How To Create A Network Access Control (Nac) Solution

How To Create A Network Access Control (Nac) Solution Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security

More information

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department

More information

Course Outline. ttttttt

Course Outline. ttttttt 10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This

More information

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-3, JUNE 2014, 54-58 IIST SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE

More information

Securing the Intelligent Network

Securing the Intelligent Network WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.

More information

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: info@cs3-inc.com The Reverse Firewall: Defeating

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Greener Virtualization www.parallels.com Version 1.0 Greener Virtualization Operating system virtualization by Parallels Virtuozzo Containers from Parallels is

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Analysis and Research of Cloud Computing System to Comparison of

More information

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of

More information

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved. Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

Distribution transparency. Degree of transparency. Openness of distributed systems

Distribution transparency. Degree of transparency. Openness of distributed systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Rackspace Cloud Databases and Container-based Virtualization

Rackspace Cloud Databases and Container-based Virtualization Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Models For Modeling and Measuring the Performance of a Xen Virtual Server

Models For Modeling and Measuring the Performance of a Xen Virtual Server Measuring and Modeling the Performance of the Xen VMM Jie Lu, Lev Makhlis, Jianjiun Chen BMC Software Inc. Waltham, MA 2451 Server virtualization technology provides an alternative for server consolidation

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

WHITE PAPER Guide to 50% Faster VMs No Hardware Required

WHITE PAPER Guide to 50% Faster VMs No Hardware Required WHITE PAPER Guide to 50% Faster VMs No Hardware Required Think Faster. Visit us at Condusiv.com GUIDE TO 50% FASTER VMS NO HARDWARE REQUIRED 2 Executive Summary As much as everyone has bought into the

More information

Expert Reference Series of White Papers. Visions of My Datacenter Virtualized

Expert Reference Series of White Papers. Visions of My Datacenter Virtualized Expert Reference Series of White Papers Visions of My Datacenter Virtualized 1-800-COURSES www.globalknowledge.com Visions of My Datacenter Virtualized John A. Davis, VMware Certified Instructor (VCI),

More information

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET 1 R. BALA KRISHNAN, 2 Dr. N. K. SAKTHIVEL 1 School of Computing, SASTRA University,

More information

MS Exchange Server Acceleration

MS Exchange Server Acceleration White Paper MS Exchange Server Acceleration Using virtualization to dramatically maximize user experience for Microsoft Exchange Server Allon Cohen, PhD Scott Harlin OCZ Storage Solutions, Inc. A Toshiba

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

Multi-Datacenter Replication

Multi-Datacenter Replication www.basho.com Multi-Datacenter Replication A Technical Overview & Use Cases Table of Contents Table of Contents... 1 Introduction... 1 How It Works... 1 Default Mode...1 Advanced Mode...2 Architectural

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

WHITE PAPER Optimizing Virtual Platform Disk Performance

WHITE PAPER Optimizing Virtual Platform Disk Performance WHITE PAPER Optimizing Virtual Platform Disk Performance Think Faster. Visit us at Condusiv.com Optimizing Virtual Platform Disk Performance 1 The intensified demand for IT network efficiency and lower

More information

Fundamentals of a Windows Server Infrastructure MOC 10967

Fundamentals of a Windows Server Infrastructure MOC 10967 Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

ITU-T Future Networks and Its Framework of Virtualization

ITU-T Future Networks and Its Framework of Virtualization ITU-T Future Networks and Its Framework of Virtualization Ziaul Ain Usmani 1, Dr. Gulabchand K. Gupta 2 1 Research Scholar, JJT University, Jhunjhunu, Rajasthan, India 2 Western College of Commerce and

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj abhishek.bajaj@iiitb.net 2. Anargha Biswas anargha.biswas@iiitb.net 3. Ambarish Kumar ambarish.kumar@iiitb.net 4.

More information