CLOUD COMPRUTING AND SOFTWARE-AS-A-SERVICE WEAKNESSES STRENGTHS AND PROPOSED ARCHITECTURES MARIA VASILEIADI

Size: px
Start display at page:

Download "CLOUD COMPRUTING AND SOFTWARE-AS-A-SERVICE WEAKNESSES STRENGTHS AND PROPOSED ARCHITECTURES MARIA VASILEIADI"

Transcription

1 CLOUD COMPRUTING AND SOFTWARE-AS-A-SERVICE WEAKNESSES STRENGTHS AND PROPOSED ARCHITECTURES MARIA VASILEIADI Master of Science in Networking and Data Communications THESIS

2 Thesis Title CLOUD COMPUTING AND SOFTWARE-AS-A-SERVICE WEAKNESSES STRENGTHS AND PROPOSED ARCHITECTURES Dissertation submitted for the Degree of Master of Science in Networking and Data Communications By MARIA VASILEIADI SUPERVISOR DIONISIOS ADAMOPOULOS KINGSTON UNIVERSITY, FACULTY OF COMPUTING, INFORMATION SYSTEMS & MATHEMATICS ΤEI OF PIRAEUS, DEPARTMENTS OF ELECTRONICS AND AUTOMATION JULY 2010

3 1. Introduction Cloud Computing Why Now? Cloud Computing Providers Cloud Computing Categories and Providers A Few Words on Grid Computing Cloud computing vs. Grid Security Considerations Eucalyptus an Open Cloud Computing Architecture Node Controller Cluster Controller Virtual Network Overlay Storage Controller (Walrus) Cloud Controller Software as a Services (SaaS) Web Services SaaS Definition Advantages of SaaS Service-Oriented Architecture (SOA) SOA Roles SOA Operations SOA Stack Comparing SaaS and SOA SaaS vs SOA A Financial Perspective Conclusions References Figure 1 NIST Cloud computing definition... 7 Figure 2 (Marinos 2009) Cloud computing architectures... 9 Figure 3 Eucalyptus Hierarchical Structure Figure 4 Walrus Service Figure 5 Cloud Controller Figure 6 Web Services Architecture Figure 7 SaaS adoption by Enterprise Figure 8 SOA Roles and Operations Figure 9 SOA Stack Figure 10 Similarities and differences of SOA and SaaS... 42

4 Abstract This projects initial intent is to go in depth on the current state of the art of Cloud computing and provide a clear view and definitions of what Cloud Computing is as well as other concepts related to it. Explain how architectures like Grid and Clusters can be used in order to implement Cloud computing as well as what Cloud computing contributes on top of those in order to implement integrated solutions. Further more discusses Eucalyptus an open source Cloud computing implementation, which is currently available on the market. Later on, will identify what the pros and cons of Cloud computing, SOA and SaaS are, and continues by discussing how Web Services can be used in order to facilitate SOA and SaaS. Finally special emphasis is given on spotting the differences and similarities between SaaS and SOA from a couple of different perspectives. 4

5 1. Introduction Cloud computing, even until now that began to evolve and spread in a wider way and researches take place on whether it will constitute the next killer application, does not have a definition jointly accepted by the IT community. An attempt to provide a definition though is made by (Wang 2008), but it is indeed based on writer s experience: A computing Cloud is a set of network enabled services, providing scalable, QoS guaranteed, normally personalized, inexpensive computing platforms on demand, which could be accessed in a simple and pervasive way. (Wang 2008). Prior to cloud computing grid was a pretty well known architecture that would be able to deliver distributed services. (Mc Evoy 2008) Grids are systems which fulfil the following checkpoints: Coordinate resources that are not subject to centralized control; use standard, open, general-purpose protocols and interfaces; deliver non-trivial qualities of service. They often present additional features like single sign-on, information service for discovery and monitoring of resources and smart job scheduling. It is obvious from the above that cloud computing is service oriented whereas grids give an emphasis on building transparent to the end user distributed systems. Hence one can say that those two technologies come hand in hand. Close related to cloud computing is the term Software as a Service (SaaS). By it should be clear that we are talking about applications hosted as services and delivered to the end user across the Internet on demand. SaaS allows users to run applications that are not installed locally on their computers and hence makes software maintenance less complicated and time consuming. Furthermore since end users are charged on a per-use basis of for those services, this reduces the cost of purchasing software and licenses. Application Service Provider (ASP) (Wang 2008) can be seen as an early attempt to implement SaaS. On that model users subscribe for software hosted on third party 5

6 servers and finally those are delivered over the Internet. Microsoft has also made a first attempt to adopt SaaS with Software + Service driven by the idea of a combining local software and Internet services that interact with each other in order to deliver the required results. Chrome a web browser provided by Google is a software implementation of SaaS in which outside the traditional web browsing experience that a user can have, allows the usage of a new desktop, that delivers applications no matter where those reside (locally or remotely). It is worth mentioning at this point that SaaS sometimes is confused with SOA, though in reality those are two completely different concepts. By SOA (Laplante 2008) we define a set of components (interfaces, protocols) that allow various services to interact with each other. Finally the Chrome web browser provided by Google goes a step forward introducing on top of the web browsing a desktop though which applications can be contacted either locally or remotely. Chapter 2 goes in depth in the theory of Cloud computing, unfolds the reasons Cloud computing became popular nowadays and the parties that take place in this process. Presents Cloud computing ancestor (Grid) in a few words and compares those to technologies and summarises by presenting various security considerations that arise with the use of Cloud computing. Chapter 3 presents the main components of Eucalyptus an open source Cloud computing architecture. Chapter 4 discusses in detail SaaS. Chapter 5 gives the definition of SOA and discusses its architecture and finally Chapter 6 presents the similarities and differences of SOA and SaaS. 6

7 2 Cloud Computing Moving a step ahead of the definition (Wang 2008) gave on cloud computing NIST (Mell 2009) also tries to provide a definition on the topic of cloud computing. In general Cloud computing is defined as a pool of shared computing resources, which a user can provision and release without the need to communicate those needs to the service provider. From that point of view a Cloud is composed of five essential characteristics, three service models and four deployment models. Figure 1 NIST Cloud computing definition The five essential characteristics are the following: On-demand self-service. A user is capable to plan and the computing resources, such as storage needs, network capabilities, server time, that are needed in order to perform a task successfully. Those resources are assigned automatically and no human interaction is required with the service provider. Broad network access. All the computing resources are available over the network and can be accessed with the use of standardised mechanisms, which are capable to server 7

8 request by heterogeneous devices thin or thick client platforms, such as PDAs, laptops and so on. Resource pooling. Each CP has a pool of available resources that can be used in order to serve multiple users with the aid of a multi-tenancy scheme. Those physical and/or virtual resources are dynamically allocated and released upon users demand. There is a sense of location independence in that the user in general does not control or know at any time the location of the provided resources. User should be capable though to explicitly specify that at a higher level of abstraction by providing information lets say for the country, province or datacenter. The range of the available resources varies from storage, processing, memory, network bandwidth, to virtual machines. Rapid elasticity. It is essential for the Cloud computing mechanism to have the capability to scale in and out its resources automatically and rapidly. In that way the Cloud users get the impression that the Cloud has unlimited capabilities and hence the impression that they can purchase any amount of computing resources at any time. Measured Service. A cloud is capable to perform automatic control and optimization of the amount of resources that are currently used by services with the use of a mechanism that allows it to estimate the needs of a service according to each type (storage, processing, network bandwidth, number of active user accounts). In that way Cloud resources can be monitored, controlled, and reported providing transparency both for the CP and the user of each of the services. There are three service models on cloud computing: Software as a service (SaaS): application provided to users by third party providers, over the Internet. Is available to the final user on demand with the use of thin clients. The most popular implementations at this time are Salesforce CRM, Google Docs. We should note here that the user has no control on the 8

9 Cloud infrastructure. It is just offered the option to manipulate just a few application specific settings. More on SaaS can be found in chapter 4. Platform as a service (PaaS): developers are being enabled to develop applications with the use of APIs. The platforms that are available provide to the user development tools, configuration management, and deployment platforms. Again the implementations of this of category of Cloud computing are Microsoft Azure, Force and Google App engine. Users have control on the deployed applications as well as the environment that hosts those applications. Infrastructure as service (IaaS): provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service API. Well known implementations include Amazon EC2 and S3 and Rackspace Cloud. In this service model the user can have control over the OS, network and storage. Figure 2 (Marinos 2009) Cloud computing architectures Figure 2 above gives an overview of Cloud computing architecture, and where each of the vendors, developers and end users, reside in it. Finally the four deployment models are described below: Private cloud When an organization makes use of a Cloud computing infrastructure that is operated exclusively by it. This infrastructure can be managed either by the 9

10 organization itself or by a third party. The Cloud computing resources can be located on premise or off premise. Community cloud Is the case where the Cloud computing infrastructure is shared among numerous parties. It is structured in such a way that serves communities with similar concerns, such as security requirements, policies and so on. This model can be managed either by the organizations that share it or again by a third party. As in private clouds the Cloud resources might exist on or off premise. Public cloud The resources of a Cloud infrastructure are available to public in general or to large industry groups and are administered by organizations that hold the role of the Cloud provider that sell cloud services. Hybrid cloud In this deployment model the cloud infrastructure is a composition of two or more model private, community, or public. They are still considered separate entities but they are tied with each other using standard technologies or proprietary protocols that will allow the to transfer data and applications among them. The following features, when looking from a hardware perspective, are new in Cloud Computing: Provide the impression that unlimited computing resources exist and for that reason, the need of system provisioning is limited. The elimination of an up-front commitment by Cloud users, thereby allowing companies to start small and increase hardware resources only when there is an increase in their needs. Pay-as-you-go for all the computing resources (e.g., software licences, processors, storage and so on). 10

11 2.1 Why Now? Although the creation and operation of a wide range datacenter contributes a lot in the development of Cloud computing, the reasons that in reality helped Cloud computing to dominate the market nowadays are today s technological evolution and the synchronous business models. With the use of Cloud computing it is believed that new applications will arise were simultaneously some of the applications that are used nowadays will take advantage of the Cloud computing contributing in that way to its further spread. Such applications are: Mobile interactive applications it is believed that the future of computing belongs to applications that respond in real time. Such services served better by Cloud computing infrastructures not only because those have to be available for as long as possible but also because such services use huge amounts of data which are easy to store on large datacenters. Parallel data processing Cloud computing provides a unique opportunity for data processing application that use TeraBytes of data and require several hours to complete. If it is possible to run an application in parallel, users can take advantage of the provider s charges, since using hundreds of computers for a short period costs the same as the usage of just a few computers for large periods. Handoop and Google MapReduce allow users to implement such applications without knowing the details behind the task distribution to the hundreds of processors of the Cloud. Commercial applications The latest versions of commercial applications such as Matlab and Mathematica allow the use of Cloud computing to perform calculations that usually would require large computational cost. In this case though we should take under consideration the cost of transferring the data and also the cost of using the Cloud nodes in comparison with the time profit. 11

12 Applications the require short response time Applications that would be able to take advantage of the parallelism that Cloud computing offers are not able to do so due to the data transfer cost and the high response time. Such applications are not expected to make use of Cloud computing at least not until the response time and the cost of transferring data decrease. 2.2 Cloud Computing Providers It seems easy to find Cloud computing customer, but on the other hand who can become cloud computing provider and why? It is costly to create and maintain such facilities and that is the reason that only companies such as Google and Microsoft have their own Cloud computing facilities. At the same time they also have to develop the appropriate software that would allow the hardware management and help to protect their investment from attacks. Hence this is the main reason for which a company that likes to become a Cloud computing provider needs to invest not only on datacenters but also to the right software and at the same time needs to have the know how to maintain those facilities. Under those conditions the reasons that can lead a company to make the decision to become Cloud computing provider are: Profit Though $0.10 dollars per hour seems as a small price it is estimated that large datacenters can buy hardware, internet connections and power supply at the 1/5 of the price those are offered to medium size datacenters. Moreover the cost of the development, installation and maintenance of the necessary software pays off due to the large number of computers. Current investment amplification Adding Cloud computing services on the top of the existing infrastructure can become a new source of income at a low cost, which helps to redeem earlier investments on datacenters. For example many of the technologies that Amazon Web Services use had initially created in order to cover internal functions. 12

13 Going against the flow There are times that companies would like to provide to their clients alternative solutions. For example Google with GoogleApps provides to their clients dynamic scalability and load balancing. Customer loyalty IT firms that want to keep their customer loyalty high on top of the services they already provide to them, they also offer Cloud computing services. 2.3 Cloud Computing Categories and Providers Each application requires a specific computational model for storing the data and furthermore in the case of distributed applications a communication model is also needed to be defined. In the case of Cloud computing the use of Virtual Machines (VM) is necessary since the processes of the computational resource management that take place in the cloud must be transparent to the final user. A way to separate among the utility computing that is offered today is by taking into account the amount of control that allow to the user on the computational resources. In the case that we would want to rate the utility computing services that are available today according to the above criteria EC2 would lead this list. EC2 is really close to the hardware and for that reason allows users to control even the kernel of the operating system (OS) that they use. There is no limit on the number of applications a user can run but on the other hand auto-scaling and rollback capabilities are not offered. Google AppEngine (Google 2010) on the contrary, does not have as main target general purpose applications, but focuses on web applications. In this case auto-scaling is offered by Google. Microsoft Azure (Microsoft 2010), stands somewhere in the middle. Like EC2 (Amazon 2010) can serve general purpose applications, allows users to choose the programming 13

14 language they will use but this is not the case with the OS as well. Libraries can be autoscaled up to a point and network adjustment is also possible. Focusing on the three utility computing platforms that we discussed above, Table 1 below summarises the main characteristics of them. Amazon Web Services Virtual Machine x86 architecture on top of Xen VM Scalability on computational resources Storage Model Varies from Block store (EBS) to key/blob store Network Model Supports security groups Can isolate network outages Flexible with IP addresses Google AppEngine Predefined framework and application structure Scaling of computational resources and storage resources Megastore/Big Table Fixed network topology capable to support web applications Scaling is dynamic and transparent to the developer Microsoft Azure Microsoft Common Language Runtime (CRL) VM Load balancing SQL data services Azure Storage Service Dynamic depending on the application components description Table 1 Summary of the three most popular utility computing platforms 14

15 2.4 A Few Words on Grid Computing Grids (Wang 2008) started off in the mid-90s. Grid has its origins on high performance distributed systems, which purpose were to share distributed resource in order to execute tasks remotely. That would result on being able to solve large scale computational problems. The following features characterise the Grid infrastructure: Is a decentralized and spans across geographically distributed, while at the same time lacks of central control. It is composed by heterogeneous resources (hardware/software configurations, access interfaces and management policies) The development of new middleware was necessary as Grid computing were evolving. Some known examples are, Unicore, Globus Toolkit, WSRF and glite. Those are able to provide all the needed functionalities, such as resource management, security control and monitoring & discovery. The main idea behind Grid computing is to provide its users with dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. However developers that lack the experience of implementing applications for Grid computing can find it pretty difficult to adjust on its logic. Moreover, with Grid computing is not easy to achieve guaranteed performance at any time. 2.5 Cloud computing vs. Grid In contrast with the characteristics of Grid computing, as those described above, Cloud computing, from its definition, provides user-centric functionalities and services to users in order to build customized computing environments. Cloud Computing, operates like a central compute server with single access point. Cloud infrastructures could span several 15

16 computing centres, like Google and Amazon, in general contain homogeneous resources, operated under central control (Wang 2008). The middleware or the operating system that Cloud computing uses, is not yet fully developed and acceptable standards have not been developed yet. Moreover there are several topics open for the researchers on distributed virtual machine management, Cloud service orchestration, and distributed storage management. In Addition to the above Cloud computing can provide QoS to the users allowing them in that way to have easy, pervasive and uninterrupted access to their resources at any time with guarantied quality. Table 2Grid vs. Cloud characteristics (Vaquero 2009) 16

17 To conclude with, Grid computing placed strong funds with the development of middleware and infrastructures that will allow a pleasant application experience, but Cloud computing on the other hand overtook Grid computing due to its capability to provide QoS and customisable computing environment upon user request. It is well understood from the above that building Cloud computing on top of the stability that Grid computing offers via its infrastructure and middleware is a wise option that will provide users satisfying services. 2.6 Security Considerations Among others (ENISA 2009) created a report in which identifies and lists the most important categories of Cloud-computing security considerations. Loss of governance: as the user makes use of Cloud infrastructure, allows the Cloud Provider (CP) to hold the control on numerous resources (sensitive information). If that is combined with an SLA that will not provide any commitment towards information confidentiality major security threats arise. Lock-in: at this stage of cloud computing portability is not assured, Hence there is no guarantee that upon users will, she can move data and applications from one CP to another or move back to in-house environments. For that reason the users depends on this specific CP. Isolation Failure: As resources (e.g. storage, memory) on Cloud computing are shared among many users there is always the risk for the resource allocation mechanism to fail to separate those resources. This is called guest-hopping attack. Though for now this kind of attacks are not widely spread and more difficult to achieve, as is the case with traditional OSs, we can relay on that fact for the future. 17

18 Compliance risks: when migrating on Cloud computing there is the possibility to rut at risk investments made in order to comply with industry standards and regulations when: the CP cannot provide evidence of their own compliance with the relevant requirements the CP does not permit audit by the cloud customer (CC). Finally notice that not all public Cloud computing infrastructures are able to support certain level of compliance (e.g., PCI DSS) Management interface compromise: since remote access is allowed to various customer management interfaces, an increased risk of exposing larger portions of users resources via those interfaces becomes higher. A contribution to this security risk is added by web browsers vulnerabilities. Data protection: data protection is as important to the users as is to CPs. From the users perspective, that posses the role of data controller, it is not always easy to check what are the data handling practises that CP uses, in order to assure that those are being used in a lawful manner. Upon lacking this assurance CPs might face complains or even legal accusations. For that reason many CPs are open to provide details on how data are handled by them and also publish certificates such as SAS70 certification. Incomplete data deletion: when deleting data from a storage device, the complete deletion of those is not guaranteed. Furthermore in the case of Cloud computing deletion of data might not be able to execute in a timely manner due to resource sharing. Another issue is that multiple copies of the data might exist for backup reasons; this adds a higher risk to the customer than dedicated hardware does. Malicious Insider: another thing that is likely to happen is damage to be caused by a malicious insider. For that reason setting roles is a necessity when implementing Cloud 18

19 computing architectures. Such roles may include CP system administrators and managed security service providers. 19

20 3 Eucalyptus an Open Cloud Computing Architecture Eucalyptus (Eucalyptus 2009) is an open source application with main purpose to offer cloud computing services over computer clusters. Eucalyptus interface is compatible with that of Amazon s EC2 and S3. Started as a project within the University of California, Santa Barbara, but today is supported by Eucalyptus Systems, a company funded by Eucalyptus creators. The architecture of Eucalyptus is simple, flexible and follows a hierarchical design. Eucalyptus allows users to control a VM using a simulation of the EC2 interface. So far supports VMs that run on Xen and KVM hypervisors but it is expected that soon will support VMware and more. Each Eucalyptus subsystem (four in total) is designed as a distinguished web service. Figure 3 provides a graphical representation of the 4 subsystems. Figure 3 Eucalyptus Hierarchical Structure 20

21 3.1 Node Controller The Node Controller (NC) runs on each node which is destined to run a VM instance. The NC controls and uses the software of the nodes according to the commands that accepts from the Cluster Controller (CC). The NC collects information for the resources of the node on which resides and also controls the VM instances on the node. Finally send the information collected to the CC when requested. 3.2 Cluster Controller The Cluster Controller (CC) runs oat front end computers of a cluster or on any computer that has a network connection both with the nodes that run the NC and the computers that run the Cloud Controller CLC. Mary of the functions that the CC performs are similar to those of NC. The responsibilities of CC are first to route the incoming requests to the appropriate NC in order to start an instance and begin to control the layer of the virtual network and secondly to collect and report information to a group of NCs. When the CC receives a sequence of instances that have to run, communicates with each of the NCs in order to find the availability of their resources. Then, the CC sends the command to the NC that has available the appropriate resources to host the instance. In addition to this and knowing the NC resource availability the CC estimates the number of the simultaneous instances that a NC can run and reports this number to the Cloud Controller (CLC) 21

22 3.3 Virtual Network Overlay Each VM within the Eucalyptus architecture is connected with each other while at the same time at least one VM also has internet connection so that the owner can connect and interact with it. In Eucalyptus the CC decides when a network interface instance starts and stops in four different ways, which are defined by the system administrator. The first case is when the interfaces of the VM are bridged to the real network node allowing the administrator to control the DHCP traffic of the virtual network the same way as if this traffic were not originated from the Eucalyptus. The second choice allows the administrator to define pairs of IP addresses and MAC addresses. When this is the case each new instance makes use of such a pair and then releases it when the instance terminates. Those two option as described above maximize the network performance when all the VMs run within the same cluster but their is no isolation among the networks of then VMs. The third choice manages and controls the VM network at its fullest extend, by isolating the traffic among the VMs and also introducing firewalls among the VM groups. At the same time allows dynamic allocation of IP addresses to each VM when those start their operation. Each VM group network is a different VLAN. This way each VM group that belongs to a subnet is isolated from the rest. In this case the CC operates as a packet filtering router as well among the different VM subnets. 3.4 Storage Controller (Walrus) Walrus is a data storage service used by Eucalyptus. Walrus makes use of web service technologies such as Axis and Mule and that makes it compatible with Amazon s S3. Walrus uses HTTP in order to implement the REST and SOAP interfaces. Walrus provides two functions: 22

23 Data transfer to and from the Cloud and the instances that have started on the nodes. Operates as a storage service of the VM instances. Similarly to S3, Walrus supports both parallel and serial data transfer. Walrus does not warranty the integrity of the transferred data in order to strengthen the parallelisation of tasks; hence the user is responsible to perform this task. Figure 4 Walrus Service In addition to the above Walrus also operates as a service for storing and administer the VM images. The file system of each VM as well as the kernel of the OS and the memory are encapsulated in packets and transferred with the use of EC2 tool that Amazon provides. This tool compress the image, encrypts is and fragment it into pieces described by the image descriptor or manifest. Walrus has to verify the integrity of the images. When a NC asks for an image, before Walrus instantiate it sends a request for transmission that is verified with the use of the appropriate certificates. Then the image integrity is also verified, afterwards decrypted and finally sent to the node. In order to improve its performance Walrus keeps the decrypted images in a cache for an amount of time or till the manifest of the image is rewritten. 23

24 3.5 Cloud Controller The components of Eucalyptus for which we talked earlier are administered by the Cloud Controller (CLC). The CLC is a collection of web services which can be categorised as follows: Resource Services - Are those services responsible for allocating the resources of the system to various functions and allow users to control the settings of the VMs. They also keep track of the components and the virtual resources of the system. Data Services Control the data of the system and the user and furthermore provide a configurable environment to the user in order to execute requests for resource allocation. Interface Services Handles the conversion of the protocols, the authentication of the users using the appropriate interfaces and provide the tools for system administration. Figure 5 Cloud Controller The resource services, process the user requests that require control over the VM and communicate with the CC in order to allocate and release the physical resources. A status of the System Resources State (SRS) is useful in order to contact the CC and verify whether a request can be fulfilled or not based on a Service Level Agreement 24

25 (SLA). The SRS control has two steps. When the user requests arrive the SRS information is used to decide whether the request will be accepted or not. The creation of the VM afterwards includes the resource reservation on SRS and the request transport for the creation of the VM which is followed by the confirmation of the state of the resources in SRS in the case of the successful request, or the cancelation of it in the case of error. Later on the SRS monitors the resources state and is responsible to implement changes on the running VMs. The SRS information changes because of events that happen to a system and are based on the current SLA. Eucalyptus allows users to choose the cluster which they desire to use in order to start running their VMs defining the availability zone of the Cloud they want to use but it is also possible to leave this choice on Eucalyptus. The Data services have the control of the creation, modification and data store of the system and users information. Users connect on those services in order to reveal information for the available resources and to configure parameters that have to deal with the VMs and the network distribution. The resource services interact with the data services to decrypt the parameters that users enter. The data services are of dynamic nature. For example a user is able to change the firewall settings while a VM is in use or not. As a result the services that control the network and the integrity of the data should change the state of a VM group after a user request. To finish with, Interface services, offer a web interface to the user and the administrators of the cloud. With the use of a web browser the users can apply for access on a cloud in order to download the encryption certificates and to interact with the system that will allow seeing resources availability. The administrator can additionally administer the user accounts and to supervise the availability and the functionality of the system components. 25

26 4 Software as a Services (SaaS) A small introduction of the main idea behind SaaS has been given in chapter 2. At this point it is useful before going into detail both with SaaS and SOA, to describe briefly what is meant by the term Web Services. 4.1 Web Services Features that are currently provided by both SOA and SaaS, in order to add functionality on applications, are still on conceptual level model. To enable the functionality that those models promise nowadays, the most popular enabler are Web services technologies (Ferris 2003). Web services are programmable web applications with standard interface descriptions that provide universal accessibility through standard communication protocols. Web services provide an integrated set of XML-based, ad hoc, industry-standard languages and protocols to support Web services descriptions using Web Services Description Language (WSDL), publication and discovery and transportation. Figure 6 Web Services Architecture 26

27 To make that simple, Web services are able to provide a set of standards that allow us to implement SaaS and SOA. 4.2 SaaS Definition When we talk about Cloud Computing we refer to both the applications that are being delivered as services as well as the hardware that delivers them. Services are referred as Software as a Service (SaaS) (Armbrus 2009). On top of that it is worth mentioning that SaaS delivery model (Turner 2003) distinguishes software ownership from the user. In this case the owner of the software is the CP who hosts the software and allows the usage of it on-demand via the Internet (e.g. Public Clouds) or via intranet (e.g. Private Clouds). That allows the delivery of the software on a per-use basis. Currently the most popular SaaS product is the Salesforce.com tool for customer relationship management. Note at this point that not all applications can benefit from SaaS. Figure 7, show what are the applications that can take advantage of SaaS architecture, also which applications are expected to move towards SaaS within the next three years and finally which applications can not benefit at all from it. SaaS characteristics include (Traudt 2005): Network-based access to, and management of, commercially available software. Activities managed from central locations rather than at each customer's site, enabling customers to access applications remotely via the Web. Application delivery typically closer to a one-to-many model (single instance, multi-tenant architecture) than to a one-to-one model, including architecture, pricing, partnering, and management characteristics. Centralized feature updating, which obviates the need for end-users to download patches and upgrades. 27

28 Frequent integration into a larger network of communicating software either as part of a mash up or a plug-in to a platform as a service. Figure 7 SaaS adoption by Enterprise 4.3 Advantages of SaaS SaaS platform is used to eliminate problems that occur due to the constant need for software licences. SaaS tries to take the current industry standards a step ahead by offering significant advantages to both users and software developers. Moreover SaaS encourages growth and innovation and also creates opportunities for selling and using software. Bellow are listed the primary benefits that arise as a result of the use of SaaS both from the user and provider perspectives. 28

29 User Benefits Lower Cost of Ownership Due to the fact that the use of software/applications is paid only for the time it is used, the users do not have to pay large amount of money on software licences in advance. There is also no need for hardware infrastructure and for that reason the user spends a lot less on hardware, maintenance, and administration. That gives the chance to the final user to access resource that would never be able to use otherwise. In addition to this and cause of the way that pricing is implemented on SaaS the user is able to know at any time cost oh the software purchase. Focus on Core Competency The SaaS platform liberates the users from the numerous administrative (installation and maintenance of software). That only means that the user is no longer obliged to have IT resources dedicated for specific use in order to ensure the proper functionality of applications. Looking over the cost saving, SaaS approach allows users to remain focused on their goals and make use of those resources in more strategic areas. Access Anywhere A core user advantage when using SaaS is the availability of the resources from everywhere. With SaaS users can have access to the applications they would want to use at any time by just having access on a PC and an Internet connection. It is not necessary that they are in their office or even connected on the corporate network through a VPN or any other method. This strengthens the user experience and makes it easier for the user to get the work done. Additionally, users can take immediate advantage of the features and functionality of an application simply by launching a browser. Freedom of Choice SaaS has multitenant and pay-as-you-go nature. That enables SaaS to be more flexible when it comes to technological choices that are allowed. Users are allowed to, at any time, select from variety of applications to use and they are also able to stop using those applications that are no longer interested in. Enterprises are able to avoid in that way to pay for applications that are used by just a few or in some cases 29

30 one user. All the above, results in the development of better software applications. Finally in order for the vendors to hold their customers they should be capable to easily adopt the customer needs and wants. New Application Types SaaS shortens the obstacles of the first time use of software. That makes it easier to start developing applications with incidental use model. Such an implementation will allow the development collaborative environment where some users rarely access some application but on the other hand those are important to the overall experience. Faster Product Cycles With SaaS the development and testing processes is by far more frequent that those of the typical releases. But the new features that each release introduces are fewer in that way. The advantage thought that such an approach has is that bug fixes are released faster and in addition to it users have the time to adjust the new features something that results on having increased productivity from the user s side. As it is obvious this was not the case when the previous model was used. Another advantage is that users will not have to continuously upgrade their software to the latest version. This process is transparent to the users and the users are able to benefit of the new features and fixes of an application are available each time they access the software. Provider Benefits Increased Total Available Market Someone can name this as the number one reason why a software vendor would want to embrace the SaaS model. All the products that are provided to users in that way attract by far larger audience than those provided in the classical way. This is happening because the user experiences lower cost of ownership both for hardware and software and furthermore users who lack the IT skills to support the necessary infrastructure are attracted by the intergraded solutions that are being offered to them. Another benefit derives from the fact that the decision for software purchase (SaaS application) is usually taken at a department level rather than the enterprise level. That contributes on having shorter sales cycles. 30

31 Enhanced Competitive Differentiation For a provider to be able to deliver software to its customers via the SaaS platform amplifies provider s competitive differentiation with its competitors. Moreover creates opportunities for companies that are new to the market and not that established, to compete effectively with larger provider. The cost of the use of an application that the users are able to realise when using SaaS in comparison to the traditional license model is an attractive selling point. Having a look in the future, software companies that persist to use the old traditional distribution model will accept increasing pressure from their competitors in order to move towards the SaaS platform. Those providers that will remain behind will eventually find it difficult to catch up since the software industry will continue to rapidly evolve. Lower Development Costs & Quicker Time-to-Market The SaaS platform allows reduces development cost of the applications. This come as a result of the testing time an application needs compared to the testing time traditional applications need. This is the result of a combination of things that take place at this process when SaaS is used. Such factors are the agile software development, development of small and frequent releases, and the finally the applications are developed in order to be deployed on specific hardware infrastructures. That has as a result that testing is performed for smaller releases and those release are also tested on the actual hardware that they are going to be used when they will become available to the customers. In traditional schemes that was not possible since each client has different hardware platforms on which the application was installed. For that reason the complexity of the testing, the time that the testing face takes place and the cost are reduced. Hence the overall software development cost is lower and the time-to-market quicker. Predictable MRR Revenue Software providers that rely on the traditional methods of software delivery produce major releases every 12 to 18 months in order to initiate a new revenue stream from the sale or upgrades of it. That means that the software provider is under a lot pressure in order to catch a milestone (both from a financial point of you and development) that they have set at a specific date. In the SaaS architecture 31

32 this financial target is typically in the form of Monthly Recurring Revenue (MRR). MRR. This short term target makes it easier to predict the expected revenue and less tied to the development schedule of the next release of the software. The MRR measurement also reduces the tension of end-of-quarter discounting for the software provider. Improved Customer Relationships SaaS has the ability to improve the relationships between the software providers and users. With the traditional software delivery model, the providers were less liable for installation, performance maintenance and correct operation their software to the client s side. Once the software was sold, it is exclusively user s responsibility to make it work. The SaaS platform makes this relationship stronger between providers and users and in addition gives the chance to providers the opportunity to have more satisfied customers. 32

33 5 Service-Oriented Architecture (SOA) In a SOA model (Laplante 2008), the constituent components of the software system are reusable services. Those services interact one with another, via well defined interfaces and communication protocols. This architectural strategy goes hand in glove with software applications that are close to business objects and help to create an abstraction layer. Companies that invest on SOA and have implement applications that will enable it include Oracle Web Services Manager, HP Systinet Registry 6.0, Microsoft.NET, Sun Java Composite Application Platform Suite, and IBM WebSphere. The technologies applications listed above result to a list of technology architecture, process architecture, and application architecture. What SOA guaranty is to combine all those elements together in order to achieve the desired result. This task can be daunting when that many heterogeneous applications are involved. Focus is given on designing the interface of the service, in a similar way to other component-based architectures, this time though the major difference is that with SOA services are designed in such a way that those can be used over a network. Hence the developer is will not design a function which will have a single purpose but a service with well defined interfaces, capable to use them for several business purposes. 5.1 SOA Roles SOA includes three different roles, the service requestor, the service provider and finally the service registry. The service provider is responsible to describe a service, so that this service can be developed in an environment that will allow its execution and furthermore will allow access on that service to whoever requests it. Finally the service provider should 33

34 administer the service delivery requests that derive from the users. The role of the service provider can hold a company that hosts a web service. On a client-server architecture the service provider is positioned at the server side. The service requestor is whoever is trying to find the description of a service which is published in some registry in order to use it. Again, using as a paradigm the client-server architecture, a service requestor possesses the client side. The service registry is responsible to publish a service description which is given by the service provider and also allows service requestors to search among the entries for the description that will cover their needs. Figure 8 SOA Roles and Operations None of the above roles is applies exclusively on one entity. It is possible and also pretty common a service to be simultaneously provider as well as requestor when has the need from other services to provide their output in order to proceed its operation. 34

35 5.2 SOA Operations Earlier we discussed the three basic SOA roles of the SOA architecture. It is now the time to talk of the way in which those roles interact with each other, making use of a set of operations. The first operation is this of publishing a service. This is something covered by the service registry, by declaring and advertising a service. It is similar to an agreement between the service provider and the registry. When the service provider, publishes the description of its service, this becomes immediately available to a number of requestors. Details of the publish interface depend exclusively on the implementation of the registry. In some simple cases of publishing a service the role of the registry can hold the same server which the service runs on, making each service description available in one of its folders. There are of course available more sophisticated publish methods, such as the UDDI registry. The second operation is this of finding a service. In reality this is the binary equivalent of the publish operation; an arrangement between the service requester and the registry. With this operation the requestor sets a set of search criteria such as the category of the service, the quality of it and more, and later on the registry processes this information and returns all the service descriptions that match the set of criteria. The complexity of this operation depends on the implementation that the service registry chose to use. For example this can vary from a simple HTTP GET request to a UDDI system. Finally the third operation is this of bind. This operation embodies the clients server relationship between the provider and the requestor, which we mentioned earlier. This relationship can be really dynamic, as in the case of the creation of a client proxy based on the service description which is used to activate a web service or on the other hand, can follow a static model. At the latter the developer defines the way in which the web service will activate. 35

36 From the above is clear that the service description is the key element of this architecture. The description published from the provider to a registry and it is the description that the requestor receives as a result of its search. Finally the service description is what will let the developer know what actions should take in order to connect or activate a web service. 5.3 SOA Stack As we already know SOA architecture presents a way to build systems in which applications and functions are implemented as services to the final user of to some other application. SOA is consisted of elements that can be classified into two categories, functional and Qualiy of Service (QoS). Figure 9 SOA Stack Functional category includes the following: 36

37 Transport is the mechanism that performs the transportation of a service from the requestor to the provider and of course the response of the service towards the opposite direction. Service communication protocol is the agreed mechanism that both sides (requestor and provider) use in order to communicate the requests and replies. Such protocol is SOAP. Service description is a graphical representation that describes each service, how is is activated and what are the data needed in order to achieve its activation correctly. WSDL is a well known example of a description language. Service describes the service which is created and is ready to be used. Business Process is a sett of services that someone can activate in a particular order and by following rules in order to perform complex business specifications. It is worth mentioning that a service can be thought as a business process in its own, hence we can assume that business processes can be created by heterogeneous services. Service Registry is storage of data descriptions that can be used by requestors on by providers in order to activate or publish services respectively. The QoS category is comprised of Policy a set of rules and treaties under which a provider delivers is services to the requestors. There are policy matters thigh o the functionality and the QoS of the services and for that reason policy sits in the between of the two categories, functional and QoS. Security describes the rules that have to do with the authentication, authorization of those who desire to have access on a service. 37

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

2) Xen Hypervisor 3) UEC

2) Xen Hypervisor 3) UEC 5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Cloud Models and Platforms

Cloud Models and Platforms Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

CLOUD COMPUTING. When It's smarter to rent than to buy

CLOUD COMPUTING. When It's smarter to rent than to buy CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit

More information

Cloud Computing: Making the right choices

Cloud Computing: Making the right choices Cloud Computing: Making the right choices Kalpak Shah Clogeny Technologies Pvt Ltd 1 About Me Kalpak Shah Founder & CEO, Clogeny Technologies Passionate about economics and technology evolving through

More information

A Gentle Introduction to Cloud Computing

A Gentle Introduction to Cloud Computing A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Mobile Cloud Computing T-110.5121 Open Source IaaS

Mobile Cloud Computing T-110.5121 Open Source IaaS Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

Private Cloud in Educational Institutions: An Implementation using UEC

Private Cloud in Educational Institutions: An Implementation using UEC Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,

More information

Certified Cloud Computing Professional Sample Material

Certified Cloud Computing Professional Sample Material Certified Cloud Computing Professional Sample Material 1. INTRODUCTION Let us get flashback of few years back. Suppose you have some important files in a system at home but, you are away from your home.

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service

More information

Sistemi Operativi e Reti. Cloud Computing

Sistemi Operativi e Reti. Cloud Computing 1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi ogervasi@computer.org 2 Introduction Technologies

More information

LSKA 2010 Survey Report I Device Drivers & Cloud Computing

LSKA 2010 Survey Report I Device Drivers & Cloud Computing LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

Cluster, Grid, Cloud Concepts

Cluster, Grid, Cloud Concepts Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD

THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD By Yohan Wadia ucalyptus is a Linux-based opensource software architecture that implements efficiencyenhancing private and hybrid clouds within an enterprise s

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Oracle Applications and Cloud Computing - Future Direction

Oracle Applications and Cloud Computing - Future Direction Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy skrishna@astcorporation.com Vijay Tirumalai vtirumalai@astcorporation.com

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers

More information

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Analysis and Research of Cloud Computing System to Comparison of

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information

A Study of Infrastructure Clouds

A Study of Infrastructure Clouds A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,

More information

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014 An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology bipasm@gmail.com Abstract. Cloud computing promises to increase the velocity

More information

Cloud 101. Mike Gangl, Caltech/JPL, michael.e.gangl@jpl.nasa.gov 2015 California Institute of Technology. Government sponsorship acknowledged

Cloud 101. Mike Gangl, Caltech/JPL, michael.e.gangl@jpl.nasa.gov 2015 California Institute of Technology. Government sponsorship acknowledged Cloud 101 Mike Gangl, Caltech/JPL, michael.e.gangl@jpl.nasa.gov 2015 California Institute of Technology. Government sponsorship acknowledged Outline What is cloud computing? Cloud service models Deployment

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts

Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts Part V Applications Cloud Computing: General concepts Copyright K.Goseva 2010 CS 736 Software Performance Engineering Slide 1 What is cloud computing? SaaS: Software as a Service Cloud: Datacenters hardware

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Cloud Computing: What IT Professionals Need to Know

Cloud Computing: What IT Professionals Need to Know Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing International Journal of Information Science and Intelligent System, Vol. 2, No.4, 2013 Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing Achin Mishra 1 1 Department

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing. Karan Saxena * & Kritika Agarwal** Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic

More information

Cloud Computing and Big Data What Technical Writers Need to Know

Cloud Computing and Big Data What Technical Writers Need to Know Cloud Computing and Big Data What Technical Writers Need to Know Greg Olson, Senior Director Black Duck Software For the Society of Technical Writers Berkeley Chapter Black Duck 2014 Agenda Introduction

More information

PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION

PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION White Paper May 2012 Abstract Whether enterprises choose to use private, public or hybrid clouds, the availability of a broad range

More information

IS PRIVATE CLOUD A UNICORN?

IS PRIVATE CLOUD A UNICORN? IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there

More information

Enhancing Operational Capacities and Capabilities through Cloud Technologies

Enhancing Operational Capacities and Capabilities through Cloud Technologies Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All

More information

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more 36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng lsheng1@uci.edu Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs

More information

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market Cloud Computing Contents What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market What is Cloud Computing? Definitions: Cloud computing

More information

Elastic Cloud Computing in the Open Cirrus Testbed implemented via Eucalyptus

Elastic Cloud Computing in the Open Cirrus Testbed implemented via Eucalyptus Elastic Cloud Computing in the Open Cirrus Testbed implemented via Eucalyptus International Symposium on Grid Computing 2009 (Taipei) Christian Baun The cooperation of and Universität Karlsruhe (TH) Agenda

More information

CHAPTER 2 THEORETICAL FOUNDATION

CHAPTER 2 THEORETICAL FOUNDATION CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model

More information

Cloud Computing & Service Oriented Architecture An Overview

Cloud Computing & Service Oriented Architecture An Overview Cloud Computing & Service Oriented Architecture An Overview Sumantra Sarkar Georgia State University Robinson College of Business November 29 & 30, 2010 MBA 8125 Fall 2010 Agenda Cloud Computing Definition

More information

Introduction to grid technologies, parallel and cloud computing. Alaa Osama Allam Saida Saad Mohamed Mohamed Ibrahim Gaber

Introduction to grid technologies, parallel and cloud computing. Alaa Osama Allam Saida Saad Mohamed Mohamed Ibrahim Gaber Introduction to grid technologies, parallel and cloud computing Alaa Osama Allam Saida Saad Mohamed Mohamed Ibrahim Gaber OUTLINES Grid Computing Parallel programming technologies (MPI- Open MP-Cuda )

More information

Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com

Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Eucalyptus: An Open-source Infrastructure for Cloud Computing Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Exciting Weather Forecasts Commercial Cloud Formation Eucalyptus - Confidential What

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

A Web Base Information System Using Cloud Computing

A Web Base Information System Using Cloud Computing A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.

More information

Private Clouds with Open Source

Private Clouds with Open Source Private Clouds with Open Source GridKa School 2010 KIT September 7 th 2010 Christian Baun baun@kit.edu http://www.kit.edu Cloud-Computing? Building on compute and storage virtualization, and leveraging

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information

Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public

Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public Announcements TIM 50 Teaching Evaluations Open March 3 through 16 Final Exam Thursday, March 19, 4-7PM Lecture 19 20 March 12, 2015 Cloud Computing Cloud Computing: refers to both applications delivered

More information

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini 1 2 3 ABSTRACT The global economic recession and the shrinking budget

More information

Cloud Computing An Elephant In The Dark

Cloud Computing An Elephant In The Dark Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir

More information

Capturing the New Frontier:

Capturing the New Frontier: Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings

More information

High Performance Computing Cloud Computing. Dr. Rami YARED

High Performance Computing Cloud Computing. Dr. Rami YARED High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

SCADA Cloud Computing

SCADA Cloud Computing SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

Fundamentals of Web Programming a

Fundamentals of Web Programming a Fundamentals of Web Programming a Software As A Service Teodor Rus rus@cs.uiowa.edu The University of Iowa, Department of Computer Science a Copyright 2009 Teodor Rus. These slides have been developed

More information

Cloud Infrastructure Pattern

Cloud Infrastructure Pattern 1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), July 23-27, 2012, Panama City, Panama. Cloud Infrastructure Pattern Keiko Hashizume Florida Atlantic

More information

Cloud computing: benefits, risks and recommendations for information security

Cloud computing: benefits, risks and recommendations for information security Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing: a Perspective Study Lizhe WANG, Gregor von LASZEWSKI, Younge ANDREW, Xi HE Service Oriented Cyberinfrastruture Lab, Rochester Inst. of Tech. Abstract The Cloud computing emerges as a new

More information

Aneka: A Software Platform for.net-based Cloud Computing

Aneka: A Software Platform for.net-based Cloud Computing Aneka: A Software Platform for.net-based Cloud Computing Christian VECCHIOLA a, Xingchen CHU a,b, and Rajkumar BUYYA a,b,1 a Grid Computing and Distributed Systems (GRIDS) Laboratory Department of Computer

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

Kent State University s Cloud Strategy

Kent State University s Cloud Strategy Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology

More information

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981! Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era

More information

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches

More information

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;

More information

From Grid Computing to Cloud Computing & Security Issues in Cloud Computing

From Grid Computing to Cloud Computing & Security Issues in Cloud Computing From Grid Computing to Cloud Computing & Security Issues in Cloud Computing Rajendra Kumar Dwivedi Assistant Professor (Department of CSE), M.M.M. Engineering College, Gorakhpur (UP), India E-mail: rajendra_bhilai@yahoo.com

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

Cloud Design and Implementation. Cheng Li MPI-SWS Nov 9 th, 2010

Cloud Design and Implementation. Cheng Li MPI-SWS Nov 9 th, 2010 Cloud Design and Implementation Cheng Li MPI-SWS Nov 9 th, 2010 1 Modern Computing CPU, Mem, Disk Academic computation Chemistry, Biology Large Data Set Analysis Online service Shopping Website Collaborative

More information

DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study

DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource

More information

An Introduction to Cloud Computing Concepts

An Introduction to Cloud Computing Concepts Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment

CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment CloudCenter Full Lifecycle Management An application-defined approach to deploying and managing applications in any datacenter or cloud environment CloudCenter Full Lifecycle Management Page 2 Table of

More information

Cloud computing - Architecting in the cloud

Cloud computing - Architecting in the cloud Cloud computing - Architecting in the cloud anna.ruokonen@tut.fi 1 Outline Cloud computing What is? Levels of cloud computing: IaaS, PaaS, SaaS Moving to the cloud? Architecting in the cloud Best practices

More information