Data On-boarding in Federated Storage Clouds
|
|
|
- Tracey Flynn
- 10 years ago
- Views:
Transcription
1 Data On-boarding in Federated Storage Clouds Gil Vernik, Alexandra Shulman-Peleg, Sebastian Dippl, Ciro Formisano, Michael C. Jaeger, Elliot K. Kolodner, A, Massimo Villari IBM Haifa Research Lab Siemens Corporate Research and Technologies Engineering Ingegneria Informatica SPA University of Messina Abstract One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system can not be migrated to another vendor, e.g., due to time and cost considerations. To prevent this situation we present an advanced on-boarding federation mechanism, enabling a cloud to add a special federation layer to efficiently import data from other storage clouds. This is achieved without being dependent on any special function from the other clouds. We design a generic, modular on-boarding architecture and demonstrate its implementation as part of a VISION Cloud, which is a large scale storage cloud designed for content-centric data. Our system is capable of integrating storage data from various clouds, providing a common global view of storage data. The users can access the data through the new cloud provider immediately after the setup, maintaining the normal operation of applications, so that they do not need to wait for the completion of the data migration process. Finally, we analyze the payment models of existing storage clouds, showing that transferring the data via on-boarding federation with a direct link between clouds can lead to significant time and cost savings. 1 INTRODUCTION Cloud platforms should fulfill the requirements for scalability and flexibility, allowing rapidly redeploying and moving resources. This is achievable for compute resources, but it is not common practice for storage. Existing storage clouds still do not allow true data mobility and cannot easily migrate their data across providers. The work Above the Clouds of Armbrust et al. [1], named the problem of vendor lock-in of the stored data to be the second among top ten obstacles for growth in Cloud Computing. The authors named the lack of standardized storage access APIs as one reason. Today, the Cloud Data Management Interface standard from the SNIA (CDMI [2]) exists. However, it lacks adoption by the larger cloud storage providers. In addition, applications generate so much data today that the resulting transfer time could require longer interruptions to services. There are companies and products that have specialized in moving data (e.g., Nasuni, Racemi, Gladinet) or providing a common view of data (e.g., IBM CastIron). The main business case for such products is either the migration from a classic IT infrastructure to a cloud offering, or the prevention of vendor lock-in. However, third party tools cannot fully leverage the underlying storage cloud platforms for faster and more transparent migration. Corresponding author Elliot K. Kolodner: [email protected] Our goal is to prevent vendor lock-in by introducing a special federation layer as part of the storage cloud infrastructure. Our approach covers three areas: (1) standard API and interoperability; (2) efficient and transparent data migration; and (3) system security and access control. To cover the first issue, we adhere to the CDMI standard, allowing for interoperability between CDMI-compliant storage providers. Second, we introduce the concept of on-boarding federation, allowing an enterprise to move its data from one storage cloud provider to another (e.g., due to economical, legal or functional considerations) while providing continuous access and a unified view over the data in the old cloud and the new cloud, and over data in transit. Our approach forms a federation between the clouds. The data is migrated by a background process without interrupting services. The third area is the access control architecture, which targets the federation of two autonomous access control systems protecting the data in the two clouds. It is important to note that we ensure data consistency and completeness without introducing any centralized components or requiring any modifications to the old cloud. This preserves the benefits of distribution and scalability, and also makes our architecture suitable for future deployments with other storage cloud systems. Here, we present an implementation over a VISION Cloud [3] system, which is an EU-funded project for a scalable and federated storage system for content-centric data. In contrast to public cloud offerings such as Amazon S3, Microsoft Blob Service or specific hardware appliances, VISION Cloud stresses support for rich metadata as an integral part of the storage. As part of this project, partners also develop use case applications for telecommunications services, media production systems, healthcare services and enterprise applications. The work is organized as follows. In Section 2, we describe our federation architecture and its implementation over the VISION Cloud. Section 3 discusses the security issues, comparing several access control models; Section 4 describes their implementation. Section 5 presents the overhead of federation as well as the access control models. Section 6 covers economic issues, payment models and their benefits, while in Sections 7 and 8 we present related work and conclude. 2 FEDERATION ARCHITECTURE AND IMPLEMENTATION We start by presenting the general architecture of the VISION Cloud project which builds a storage cloud comprised
2 of tens of geographically dispersed data centers (DCs), where each DC may contain thousands of compute and storage nodes across multiple clusters. The cloud can serve millions of clients with billions of objects. These objects may contain data of arbitrary type and size, as well as rich metadata that may optionally conform to metadata schemas. Data objects are grouped in containers, which provide context and are used for the purposes of data management, isolation, and placement (i.e., a container is the minimal unit of placement and a container replica cannot be split across clusters). Containers may also have rich metadata associated with them, which effects how they and their objects are managed. The VISION Cloud account model consists of tenants and users, where a tenant may represent an enterprise or an organization that subscribes to cloud storage services. Tenant administrators are able to create unique user accounts, allowing their users to authenticate with the VISION Cloud system. Here, we present the on-boarding federation system, which is implemented as part of VISION Cloud but can be easily added to other cloud systems wishing to make available to their customers a service for migration (on-boarding) from other providers. The new provider (New Cloud) is responsible for moving the customer data to itself from the old cloud provider (Old Cloud). Furthermore, following the federation set up, applications and users begin accessing their data through the New Cloud, which provides access to customer data remaining in the Old Cloud. Thus, the applications that access the migrated data should not be influenced by on-boarding and should work transparently. The Old Cloud is assumed to be unaware of the on-boarding and is not required to introduce any modifications. Federation of storage clouds requires selecting the appropriate level of data granularity and abstraction. Our approach adopts the concept of a cloud storage container as the basic unit of federation. Establishing containers as the units of management for federation has many advantages. Containers are a well established concept in cloud storage environments, even across providers. In VISION Cloud each container belongs to a well defined tenant, hence the existing authentication and authorization infrastructure can be reused. In addition, using the container as a federation unit, allows applications to manipulate objects in federated storage containers as they would in containers in the normal unfederated case. To activate an on-boarding federation, there is a need to link containers in the New Cloud to containers in the Old Cloud. To persist the linkage information, it is stored as part of the system metadata of the container in the New Cloud. This allows the New Cloud to always know which local containers are linked to other containers in the Old Cloud and which data objects should be on-boarded. We call such a pair of linked containers (one in the New Cloud to one in the Old Cloud) a federated container. Upon completion of the container linkage process, clients may start working with the container from the New Cloud immediately and there is no need to wait until all objects are on-boarded to the New Cloud. The New Cloud is responsible to provide users access Fig. 1. High Level Federation Components to storage that has not yet been on-boarded from the Old Cloud, thereby providing the customer a unified view of the storage/data that resides in the New and in the Old Cloud. Our federation model also assumes that after the on-boarding setup the users work with the New Cloud only. All the onboarding software components run on the New Cloud, and the Old Cloud does not need to provide any special supporting function. To foster scalability, all of the federation components are implemented in a stateless way and all the information is persistently stored as part of container metadata in the underlying distributed object store. Having no central instance controlling the federation allows preserving the cloud s robustness and durability. For example, the cloud can continue operating as usual, moving and relocating the containers for its internal purposes. Since all containers, including their metadata are replicated across the clouds s clusters, a federation will neither be corrupted by these management operations nor by disk or communication failures. Furthermore, an application using federation management is not dependent on a specific instance of the management service, and the configuration can be continued from a different instance of it. 2.1 On-boarding federation components Below we describe the functions that are required for onboarding and present the modular components implementing them (see Figure 1). They expose clear interfaces that allow their implementation and integration above additional, non VISION Cloud systems in the future. Federation Administration: The Federation Management and Monitoring Administrator (FMM) module, provides federation services to other VISION Cloud components (e.g., for internal backup) as well as to external clients. FMM implements a RESTful API to manage federation with CRUD (create/read/update/delete) operations over standard HTTP commands. As detailed in Table I, each federation is assigned a unique id that is used for its management. In addition, FMM offers a monitoring and statistics service providing an overview of the on-boarding federation process. FMM calculates several performance and time indicators for
3 Service HTTP Method URL Create PUT /{tenant}/federations/federation Read GET /{tenant}/federations/{id}/ Update POST /{tenant}/federations/{id}/federation Delete DELETE /{tenant}/federations/{id}/federation List GET /{tenant}/federations/ TABLE I RESTFUL API FOR FEDERATION MANAGEMENT an ongoing federation including: estimated on-boarding complete time, average transfer speeds, transfer progress and onboarding history. Federation triggering, direct execution and unified view: The FederatorDirect component is responsible for providing a unified view of a container distributed over the New and the Old clouds. It is interposed before the underlying object store, acting as an in/out filter for client requests, examining all external requests before passing them on to the object store for execution. When a request arrives, FederatorDirect inspects the container s system metadata to determine if the container participates in an active on-boarding federation; this is indicated by special reserved metadata keys. If so, FederatorDirect takes action based on the request type and the object s status. For example, if the request is to read an object that is not yet on-boarded (i.e., still located in the Old Cloud), FederatorDirect will immediately on-board it into the New Cloud and will return its data to the client. If the request is to list a container s objects, FederatorDirect will return the details of all the objects regardless of their physical location, i.e., by merging the lists from the Old and New Clouds. Federation background execution: The Federator- JobExecuter generates FederatorJobs, which move data from the Old Cloud to the New Cloud in the background in a fast, efficient and decoupled way requiring no direct user or application interaction. The FederatorJobExecutor generates multiple jobs for each on-boarding relationship, assigning each job a list of objects that it needs to on-board from the old cloud. When a job becomes active, it processes this list and on-boards the objects. Each successfully on-boarded object is removed from the list. In case of a failure, a job resubmits itself back to the FederatorJobExecuter. In addition, the FederatorJobExecuter is responsible to generate, manage, execute, schedule and equally distribute FederatorJobs across the cluster. An important consideration is how to execute onboarding without interfering with the normal operation of the clouds. For example, the FederatorJobExecuter can be configured to execute FederatorJobs only when the network load is low. Interoperability with other Clouds: Various cloud providers expose differing APIs, so that the Old Cloud may have a different API than the New Cloud. To achieve interoperability with various Old Clouds, the Multi-Cloud Adapter contains implementations of multiple existing cloud APIs, e.g., S3, Swift, etc. Furthermore, we provide a framework allowing to easily implement and plug-in a new access driver for a new storage cloud API. The adapter is used by both the FederatorDirect and the FederatorJob components to access the New and the Old Clouds, thereby providing flexibility in the federation configuration. 2.2 On-boarding federation flow On-boarding federation consists of two stages: the setup and the execution. To initiate a new federation, a container owner uses the API of the FMM to provide the details of the containers in the two clouds that should be federated. FMM uses the underlying object storage infrastructure to persist the federation configuration as part of container metadata in the New Cloud by sending a container metadata update request to the New Cloud (this metadata is carefully protected with dedicated ACLs set on these fields). Following the initiation of the federation by the FMM, execution passes to FederatorDirect, which inspects the container metadata to identify whether it contains special reserved keys that indicate an activation of on-boarding federation. When FederatorDirect identifies that a new federation setup request has arrived, it performs the following tasks: (1) verifies that it can access the relevant containers in both clouds; (2) sends a GET request to the container in the Old Cloud and obtains a list of objects to be on-boarded; and (3) requests the FederatorJobExecuter to generate FederatorJobs and distribute them across the cluster, assigning each job a subset of objects to transfer from the Old Cloud. As soon as the federation is correctly set up and active, the FederatorJobs start copying the contents of the remote container into the local container and write status information to the metadata of the local container, so that the on-boarding process can be tracked by the Federation Management component. FederatorDirect listens to all requests coming to the New Cloud, trying to resolve them. If the data object is already on-boarded, it just forwards the request back to the normal get-object-flow and the object is returned to the requesting instance. If not, FederatorDirect initiates an immediate copy of the requested object from the remote container to the local container and then transfers the object to the client. In case of a list request for the objects of a container, FederatorDirect also provides a unified list of the local and remote containers. To illustrate the flows, we detail examples of user operations on a federated container: container new in the New Cloud and conatiner old in the Old Cloud. Assume that container old contains three objects: {obj1, obj2, obj3}, where only obj1 was on-boarded to container new so far. Container list operation: A client sends a list operation for container new. FederatorDirect intercepts this request, and sends the request both to the object storage layer on the New Cloud and also to Old Cloud to obtain a list of objects in container old. Having both results, FederatorDirect merges them into a single response comprised of the objects {obj1, obj2, obj3}, even though obj2 and obj3 are not yet on-boarded. Object read operation: A client sends a GET request for container new/obj2. Since obj2 is not yet on-boarded, the
4 object storage layer of the New Cloud responds with a objectnot-found message. Based on this response, FederatorDirect reads the container new metadata. Since the metadata shows an active on-boarding federation, FederatorDirect sends a GET container new/obj2 operation to the Old Cloud. Upon receiving obj2, FederatorDirect stores it in the New Cloud then returns it to the client. Object metadata update: A client sends a request to update the metadata of container new/obj3. Since obj3 is not yet on-boarded, FederatorDirect will try to on-board it, as in the object read example above. After the object is on-boarded, its metadata will be updated in the New Cloud, which will always contain the most updated object version. 3 ACCESS CONTROL ARCHITECTURES To enable on-boarding the federation components of the New Cloud need the permissions necessary to read the data from the Old Cloud and write the data to the New Cloud. Below we discuss the relevant access control architectures. Shared IAMs: In this set up the two clouds use the same internal Identity and Access Management systems (IAM), e.g., two object storage clouds deployed on the same public infrastructure, such as OpenStack. External IAM: In this case each cloud customer (tenant) has its own IAM, defining its identity and access domain, that establishes a trust relationship with both clouds. This allows a user to authenticate with a single set of credentials for applications running in various cloud and non-cloud systems. Commonly this is supported via Single Sign-On (SSO) mechanisms, such as SAML or OpenID, depicted in Figure 2. Two IAMs: Each cloud may have its own, internal or external IAM. Existing SSO mechanisms are insufficient to support this architecture and there is a need to introduce additional components as discussed below. When implementing an on-boarding scheme there is a need to specify the identities used to retrieve the data. Here, we describe the identities that can be used to gain access to the Old Cloud, but the same approaches are applicable to authenticate with the New Cloud as well. Setting up a special on-boarding user: While setting up the on-boarding process, a special, artificial on-boarding account (user onboard) is created on the Old Cloud. The credentials of this account are passed to the New Cloud and are used in the authentication process. Furthermore, user onboard is granted temporary read access to the container in the Old Cloud. This is achieved by updating the ACLs or the relevant access control policies of the Old Cloud, which may be time consuming and also requires revocation when onboarding is complete. Since reusing the same user onboard for multiple on-boarding requests may violate the principle of least privilege, it is recommended to generate a special onboarding account for each federation setup, deleting it right after the corresponding on-boarding completes. On-boarding on the behalf of the end user: This approach uses the identity of the end user (e.g., resource owner) and delegates his access rights to the New Cloud. If properly implemented, this may allow confining the access rights of the New Cloud, thereby preserving the security of the system. However, it burdens the end user by requiring his involvement in the delegation process. Access Control Flow Credential passing Bearer tokens Full delegation On-boarding identity On-boarding user On-boarding or end user End user Advantages Protocol simplicity Token simplicity Confinement of access rights Disadvantages TABLE II COMPARISON OF ACCESS CONTROL APPROACHES Credential exposure Tokens may be stolen; requires end user involvement Protocol complexity; requires end user involvement Regardless of the identity scheme chosen, there is a need to specify the authentication protocol and its flow. For example, user onboard may authenticate via protocols like HTTP Basic/Digest or a token based scheme. Below we present three relevant flows that are compared in Table II. Credential passing: To allow authentication of onboarding requests, the credentials of an account in the Old Cloud are passed to the New Cloud. Since passing the end user credentials is highly insecure, it is recommended to use the credentials of the temporary user onboard created for this purpose. The main advantage of this scheme is its simplicity both from the user and cloud provider perspective. Its drawbacks are the security of the credentials which may be stolen and misused. Bearer Tokens: In this setup the user approaches the IAM of the Old Cloud, authenticates, and asks for a long term token, which he passes to the New Cloud to perform the on-boarding. Since anyone possessing a bearer token can use it to gain access, it should be carefully protected (e.g., via encryption). It is recommended to scope the token reducing its access rights as much as possible. If the underlying protocol does not support this, it may be better to authenticate as user onboard obtaining a token with limited access rights. Full Delegation Technique: In this scenario, the end user is in charge of activating the on-boarding procedure. The user authorizes the system to act on his behalf, potentially with reduced access rights. Figure 3 illustrates that unlike regular SSO protocols, this solution does not require having a shared IAM and established trust relationships with both clouds. Each cloud may work with a different IAM, either external or internal. The end user delegates his access rights to the New Cloud, specifically to the processes doing the on-boarding. This can be achieved by enhancing standard WEB SSO solutions with delegation protocols like OAuth or SAML V2.0 Condition for Delegation (which we refer to as SAML2Delegate). Among these we adopted the latter, due
5 Fig. 2. Web Single Sign On (SSO) for accessing different Web Services with a unified User Identity. Fig. 3. Web User Delegation for accessing user s resources with a Consumer (Cloud Storage B) application. the flexibly and security of the OASIS suit of Web Services Security (WSS) protocols to which SAML belongs. Table II compares the approaches described above. As seen in the table, increasing the security by employing delegation techniques comes at the price of simplicity and usability. 4 ACCESS CONTROL IMPLEMENTATION IN VISION VISION Cloud implements a modular access control infrastructure supporting multiple authentication methods, including the three on-boarding access control flows described above. Below we describe the VISION Cloud access control implementation and its support for a SAML-based flow. Section 5 further compares this solution with additional authentication protocols used by VISION Cloud. The access control architecture of the VISION Cloud is based on the cooperation of two models: Attribute Based Access Control (ABAC), used to check users privileges based on a set of attribute-based policies, and Access Control Lists (ACLs) that are attached to stored resources and protect them. VISION Identity and Policies Services (IPS) provide services for authentication, user management and ABAC-based policy management. VISION Cloud supports Identity Federation by integrating IPS with SAML SSO based on Shibboleth. This allows federating VISION identities with an IAM suppporting SAML, thereby allowing the federation of a VISION Cloud with another VISION Cloud or any external domain that supports SAML. For example, in the scenario described in this paper, the Old and the New Clouds have their own IAM servers, each of which defines an identity domain. To support the architectures described above, termed External IAM and Two IAMs, we employ identity federation together with a forwarding model. In this model the New Cloud takes the identity of the user (through impersonation) and forwards the SAML assertion provided by the user. This assertion is used as a bearer token to acquire the privileges of the user in the Old Cloud. The flow of this model includes the following stages, depicted in Figure 4. (1) The user invokes the GetAssertion service to obtain a SAML authentication assertion. The Service Provider (SP) intercepts this call and discovers the External Domain of the request. (2) The user is redirected to the External Domain IAM to provide it valid credentials and then back to the GetAssertion service. (3) The user invokes the GetAssertion service to obtain an assertion identifier. (4) This identifier is passed to the VISION Federator (FederatorDirect or FederatorJobExecuter). (5) The VISION Federator inserts the assertion identifier in the HTTP headers of the requests to retrieve data. Based on the identifier, the VISION IPS of the Old Cloud gets the actual assertion stored by the SP and validates it by checking its signature, lifetime and attributes. Fig. 4. Forwarding model applied in VISION This model is based on bearer tokens, and a more secure solution is a full delegation in which the end user delegates only a subset of his rights. SAML2Delegate extends the SAML language to support this flow. To obtain a delegation from the user, the New Cloud, obtains a new assertion from the IAM, which contains an identity of the New Cloud listed as a delegate of the end user. As before, this assertion is sent to the Old Cloud with the actual request. This model ensures that there is no privilege elevation and the delegated access rights are less than or equal to the access rights of the end user. 5 PERFORMANCE ANALYSIS In this section we present some performance results. First, we estimate the slowdown during normal operation for accesses to a federated container during on-boarding. The slowdown occurs for object misses, i.e., on an access to an object that was not yet on-boarded to the New Cloud. In this case, there is a delay until FederatorDirect brings this object from the Old Cloud. To measure this overhead we disabled the federation background processes in a New Cloud and created
6 two containers as follows: a container (with 100 objects) in the Old Cloud and a new empty container in the New Cloud. We then linked the container in the New Cloud to the container in the Old Cloud. To measure the costs of an object miss, we sent 100 consecutive requests to the New Cloud, such that each request to the New Cloud causes an object miss. Each such GET request triggered FederatorDirect to on-board the corresponding object from the Old Cloud. These 100 requests to the New Cloud led to the on-boarding of the entire container. After the on-boarding completed, we sent the same 100 GET requests to the New Cloud requesting the same objects, which were now present in the New Cloud. Notably, the average overhead for 100 GET operations with object misses was 24%, while the average overhead for listing the objects of the federated container (when all of the objects were still in the the remote container) was 22%. The overhead for GET was measured for objects of size 1K and 1M, for which the network transfer time is not the bottleneck. Obviously, when the object size increases, the network becomes the dominating factor, but the overhead is always lower than the 200% overhead of the naive currently available solution where a client manually downloads the objects from the Old Cloud and then uploads them to the New Cloud. One of the central advantages of the proposed on-boarding federation solution is that much of the overhead for normal operation (e.g., for object misses) can be made invisible to the user by on-boarding the objects in a background job, executed during hours of low load. Next, we analyze the performance of access control methodologies and their influence on federation. While protocols like SAML enhance system security, they may add performance overhead. Here, we measured this overhead and compared it to less secure protocols, trying to find out whether the price paid for the added security is acceptable in the context of onboarding federation. In addition to the SAML-based solution described in Section 4, we evaluated HTTP Basic and the UUID bearer token model of OpenStack Keystone. Table III summarizes the authentication overhead, which is the extra time consumed by 100 GET operations with authentication compared to those without authentication, as measured by the ApacheBench (ab) tool. Obviously, this overhead becomes less noticeable when the object size is increased from 1K to 100M byte. Furthermore, due to differences in the potential deployments it is difficult to make a fair comparison between the protocols and our goal is only to estimate their general applicability for on-boarding. As can be seen the overhead of all the schemes is reasonable, where in our setup HTTP basic was the fastest and the Keystone UUID was the slowest (due to the fact that when caching is disabled the UUID scheme contacts Keystone for the validation of each token). Notably, the SAML protocol gave a reasonable overhead, showing that it is applicable to the on-boarding federation scenario and can be safely used to increase its security. 6 PAYMENTS MODELS To estimate the benefits of our proposed solution for onboarding, we evaluate the overall cost to transfer storage data Object size (B) HTTP Basic (%) SAML (%) KeyStone UUID (%) 1K M M M TABLE III OVERHEAD OF AUTHENTICATION PROTOCOLS out of an Old Cloud. Notice that storage costs can be an important factor, since a customer continues to pay the Old Cloud for the storage until on-boarding completes and the data is removed from the Old Cloud. We consider the two common approaches for exporting data from a cloud: via network transfer and via media shipment services offered by cloud providers. On-boarding costs via network When on-boarding over the network, the total cost of on-boarding will be sum of the bandwidth cost, the request cost and the storage cost. Bandwidth cost is the cost to transfer a given volume of storage out of the cloud over the network. Request cost is the cost paid for the requests to get (read) the storage. Storage cost is the cost for storing a given capacity of storage. Notice that all of these costs may be tiered, so that a higher cost is paid for the first bytes (or requests) and a lower cost for the last bytes (or requests). On-boarding costs via export on media Storage cloud providers typically also provide the capability to receive data stored on the cloud on physical media mailed to the customer. Here the costs are comprised of the storage media cost, the export time cost, the media delivery costs, and as before the storage cost, since the customer will continue to pay for the data in the Old Cloud until it is on-boarded to the New Cloud and deleted from the Old Cloud. Normalized on-boarding cost We define the normalized on-boarding cost to be the total cost for on-boarding, divided by the storage cost for one month for the amount of storage onboarded. A higher normalized cost points to a lower incentive for transferring the storage to another cloud. To illustrate the costs, we calculate the costs for onboarding out of Amazon S3 for 100TB and for 500TB of data. We base our calculations on S3 s February 2013 pricing for the US Standard Region and where possible use the Amazon S3 Cost Calculator. In our calculations of the costs for network bandwidth, we assume in all cases that the network connection can be fully utilized. This is not realistic, so the data transfers would actually consume more time and the overall costs would be somewhat higher. We also assume that the average object size is 1MB, and we calculate the number of operations for on-boarding accordingly. To calculate the cost for on-boarding via a public network, we assume a 1000Mbps network connection between the New Cloud and S3 (the Old Cloud). Considering 100TB of data to on-board, the time to transfer over this connection would be 233 hours, which is almost 10 days. Calculating the costs for 100 TB based on the assumptions above, the cost for the
7 transfer over the public network is $ , the request cost is $104.86, the storage cost for 10 days is $2482, which yields a nominal cost of $ The storage cost for a month is $ , so that the normalized cost for on-boarding 100TB is A similar calculation for 500TB, shows that the nominal cost is $97864 and normalized cost is A second networking option is Amazon Direct Connect, which is a direct high bandwidth connection. Here, there is a charge for provisioning the port and a charge for the amount of data transferred. In our calculation we assume the port can be provisioned just for the time of the transfer, which may not be realistic. The cost to transfer 100TB of data using a 10Gbps port is approximately $3124. Assuming the port is fully utilized, the data can be on-boarded in a single day. Thus, the nominal on-boarding cost is $3372 and the normalized onboarding cost is Doing a similar calculation for 500TB the nominal cost is $21311 and the normalized cost is Now consider shipping 100TB on media using disks of size 2TB; the estimated cost is $7139. Amazon projects that it can export data with an average rate of 30.13MB/sec, which will consume about 40 days, which yields a storage cost of $ Thus, the on-boarding cost for 100TB is about $17316 and the normalized on-boarding cost is Doing a similar calculation for 500TB, the nominal cost is $ and the normalized cost is An obvious conclusion from the above analysis is that the total time consumed by on-boarding is a major factor in the overall cost. In particular, a longer on-boarding time leads to higher storage costs that the customer must continue to pay to the Old Cloud. Thus, data should be on-boarded at the highest possible bandwidth. Furthermore, the normalized storage cost for 100TB for all three methods is low enough such that if the New Cloud provides a clear advantage over the Old Cloud the cost to switch clouds is not too high (and the New Cloud could even provide an incentive). However, the normalized storage cost for 500TB is high except in the case for Amazon Direct Connect where a very high bandwidth network connection is available. The on-boarding approach presented in this paper, allows transferring the data directly between the clouds, thus significantly reducing the transfer time, and thus reducing the overall cost. If the New Cloud can maintain a direct high bandwidth connection to the Old Cloud, this will additionally reduce the cost. 7 RELATED WORK As Sheth and Larson explain in their work about federated databases [4] the term federation was introduced already in 1979 and in 1985 Heimbigner and McLeod summarized this concept as follows [5]: A federated architecture represents a balance between two conflicting requirements: the autonomy of the entities versus a reasonable degree of coordination. There are four basic capabilities that characterize each entity of the federation, which keeps authority about the information passed to the other entities of the federation and has authority to create a global view of the data that is available among all the entities of the federation. An entity of the federation is not forced to perform tasks of another entity of the federation and can autonomously decide to enter or leave the federation. This basic characterization holds also for the approach presented in this paper. Here, we distinguish between two types of federation: multi-layered and on-boarding. In contrast to on-boarding, which does not assume any special cloud topology, layered federation, is usually managed from an additional component that is not part of the federated clouds. Examples of such systems were presented by Tordsson et al. [6], Kurze et al. [7] as well as the recent Colony system, that federated several Openstack Swift deployments in a Colony by introducing a Swift Dispatcher component, prefixing the container names. Unlike this work, we do not assume any naming conventions or architectural components common to the two clouds. Up to now, little work addresses on-boarding federation, which in addition to data management and migration, also require solving the problems of access control and common APIs, which we review below. 7.1 Multi-cloud APIs Federation at the API level is a prerequisite for on-boarding, in particular, a common interface to transparently use services regardless of their underlying interface and implementation, decoupling implementations and services. The Cloud Data Management Interface (CDMI) lead by SNIA is a recent standardization effort for Web-based APIs for storage clouds [2]. The VISION Cloud project adopts and promotes this effort. However, even in the absence of common APIs, it is still possible to federate between several different clouds, by implementing adapters supporting their corresponding APIs. Examples of such adapters are provided by companies like Deltacloud and RightScale, as well as by open source projects like jclouds and libcloud, among which we adopted the latter in our implementation. 7.2 Cloud access control Cloud has not kept pace with the enormous volumes of user identities that network administrators must manage and secure. An identity fabric, linking multiple applications to a single identity was proposed to address this problem [8]. Recently, Chadwick and Casenove [9] described the security APIs allowing to grant federated access, fine grained access control and delegation, integrating their approach with the Eucalyptus S3 Service. Interoperability in federated heterogeneous cloud environments is addressed in [10], proposing a model to delegate trust between trustworthy parties satisfying certain constrains. Pearson at al. [11] also introduce a privacy manager in order to care for data compliance according to the laws of different jurisdictions. Huang et al. [12] introduced a SAML-based Identity Federation Broker for service clouds. A recent work, FACIUS [13], describes the use of SAML for non Web-based services, presenting an implementation of SAML with SSH.
8 They report important evaluations with respect to requirements, performance, security, and legal aspects. Interestingly, their measurements show an almost 300% overhead of adding SAML (SAML-enabled SSH login takes 1.01 seconds, while regular SSH only 0.24). A recent trend for managing credentials and delegations is based on leveraging the PKI technology with X.509 certificates. For example, combining X.509-based libabac package with attribute-based access control and an authorization policy language called role-based trust Schwab and Faber [14] provided a trust framework suitable for federated community clouds. Another example, is the recent adoption of PKI by the OpenStack Keystone component [15]. These projects use technologies that are comparable with those used in our paper, however, they do not address the specific identity management problems that occur in on-boarding federation. Addressing the issue of delegation, an AAuth system [16] enhanced the OAuth capabilities using the encryption in attribute-based access control system exploiting metadata. Alternatively, we address the issue of delegation by leveraging the well established SAML protocol and its SAML2Delegate extension, which increases system security with a reasonable performance overhead (see Section 5). 7.3 Payment models According to the view of the VISION Cloud project, Cloud federation may represent a compelling business model for SMEs, where many stockholders (i.e., Cloud providers, tenants and customers) interact with each other for creating new opportunities and satisfying even more needs. Relevant work is presented in [17], where the authors are able to estimate what the revenues are when services are outsourced in federated clouds. The authors introduced a formula able to capture Costs and Profits. The federation described in [17] is aimed at computation management (consolidation of VMs among Clouds). It shows similarities to the work done by Celesti et al. [18] and Rochwerger et al. [19], where the federation problems between several IaaSs are addressed. In the latter case the authors described how to elastically enlarge the physical resource of an IaaS in a transparent way. Unlike this work, we address a different pricing model, which takes into account the amount of data and the speed of its transfer. 8 CONCLUSIONS AND FUTURE WORK In this paper we presented the concept of on-boarding federation for storage clouds. We desribed and implemented an on-boarding federation architecture over the VISION Cloud infrastructure, showing that small objects can be on-boarded with only a 24% overhead. Addressing security issues, we discussed several access control architectures, evaluating their suitability for on-boarding. We implemented and compared several access control protocols, analyzing their influence on performance. We observed that even well established protocols like SAML can be safely used to increase system security, while adding a reasonable overhead. When analyzing the existing solutions to transfer data between clouds, we came to a conclusion that the cost for the client to do on-boarding on its own is high, and that there is a need for direct cloud to cloud on-boarding. Since the proposed architecture, does not require any changes in the infrastructure of the Old Cloud, it can be used to on-board data from existing clouds like Amazon S3. We introduced the notion of normalized on-boarding cost and used it to show that large amounts of data with low network bandwidth leads to stickiness of the data at the storage provider. REFERENCES [1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, and M. Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS , Feb [2] Cloud Data Management Interface Version 1.0.2, SNIA Storage Networking Industry Association, Jun [Online]. Available: [3] E. K. Kolodner, et al., A cloud environment for data-intensive storage services, in CloudCom, 2011, pp [4] A. Sheth and J. Larson, Federated database systems for managing distributed, heterogeneous, and autonomous databases, ACM Computing Surveys, vol. 22, no. 3, pp , [5] D. Heimbigner and D. McLeod, A federated architecture for information management. ACM Trans. Inf. Syst., vol. 3, no. 3, pp , [6] J. Tordssona, R. S. Monterob, R. Moreno-Vozmedianob, and I. M. Llorente, Optimized placement of a computational cluster across multiple clouds. [7] T. Kurze, M. Klems, D. Bermbach, A. Lenk, S. Tai, and M. Kunze, Cloud federation, in Proceedings of the 2nd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUT- ING 2011). IARIA, Sep [8] E. Olden, Architecting a cloud-scale identity fabric, Computer, vol. 44, no. 3, pp , Mar [9] D. W. Chadwick and M. Casenove, Security apis for my private cloud - granting access to anyone, from anywhere at any time, in Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science, ser. CLOUDCOM 11. Washington, DC, USA: IEEE Computer Society, 2011, pp [10] W. Li and L. Ping, Trust model to enhance security and interoperability of cloud environment, in Cloud Computing, Nov 2009, pp [11] S. Pearson, Y. Shen, and M. Mowbray, A privacy manager for cloud computing, in Cloud Computing, Nov 2009, pp [12] H. Y. Huang, B. Wang, X. X. Liu, and J. M. Xu, Identity federation broker for service cloud, in Service Sciences (ICSS), 2010 International Conference on, May 2010, pp [13] J. Kohler, S. Labitzke, M. Simon, M. Nussbaumer, and H. Hartenstein, Facius: An easy-to-deploy saml-based approach to federate non webbased services, in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, Jun 2012, pp [14] J. Chase and P. Jaipuria, Managing identity and authorization for community clouds, Department of Computer Science, Duke University, Tech. Rep., 2012, technical Report CS [15] Welcome to keystone, the openstack identity service! September, [Online]. Available: [16] A. Tassanaviboon and G. Gong, Oauth and abe based authorization in semi-trusted cloud computing: aauth, in Proceedings of the second international workshop on Data intensive computing in the clouds, ser. DataCloud-SC 11. New York, NY, USA: ACM, 2011, pp [17] I. Goiri, J. Guitart, and J. Torres, Characterizing cloud federation for enhancing providers profit, in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, Jul 2010, pp [18] A. Celesti, F. Tusa, M. Villari, and A. Puliafito, How to enhance cloud architectures to enable cross-federation, in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, Jul 2010, pp [19] B. Rochwerger, et al., Reservoir - when one cloud is not enough, Computer, vol. 44, pp , 2011.
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
Nessus or Metasploit: Security Assessment of OpenStack Cloud
Nessus or Metasploit: Security Assessment of OpenStack Cloud Aleksandar Donevski, Sasko Ristov and Marjan Gusev Ss. Cyril and Methodius University, Faculty of Information Sciences and Computer Engineering,
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
www.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) [email protected] / @tukkajukka 30.10.2013 1 e arrival
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer
The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE
ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE Hadoop Storage-as-a-Service ABSTRACT This White Paper illustrates how EMC Elastic Cloud Storage (ECS ) can be used to streamline the Hadoop data analytics
PI Cloud Connect Overview
PI Cloud Connect Overview Version 1.0.8 Content Product Overview... 3 Sharing data with other corporations... 3 Sharing data within your company... 4 Architecture Overview... 5 PI Cloud Connect and PI
Deploying a distributed data storage system on the UK National Grid Service using federated SRB
Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
HDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
CiteSeer x in the Cloud
Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
September 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
Dynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
Geoprocessing in Hybrid Clouds
Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;
Page 1. Overview of System Architecture
Page 1 Contents Introduction to the HR.net Enterprise Framework 1 HR.net Enterprise Administrator Console 3 HR.net Enterprise Document Explorer 4 HR.net Enterprise Server Application 4 HR.net Enterprise
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
A Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
Cloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
SWIFT. Page:1. Openstack Swift. Object Store Cloud built from the grounds up. David Hadas Swift ATC. HRL [email protected] 2012 IBM Corporation
Page:1 Openstack Swift Object Store Cloud built from the grounds up David Hadas Swift ATC HRL [email protected] Page:2 Object Store Cloud Services Expectations: PUT/GET/DELETE Huge Capacity (Scale) Always
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Developers Integration Lab (DIL) System Architecture, Version 1.0
Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2
Infrastructure Management of Hybrid Cloud for Enterprise Users
Infrastructure Management of Hybrid Cloud for Enterprise Users Shixing Yan *, Bu Sung Lee *^, Guopeng Zhao *, Ding Ma *, Peer Mohamed * * HP Labs Singapore 1 Fusionopolis Way Singapore 138632 ^School of
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory
WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering
OAuth2lib Based Groups Management Tool for Authorization and Services Aggregation
Thursday 16th June 2011 Poster Session OAuth2lib Based Groups Management Tool for Authorization and Services Aggregation 1. INTRODUCTION Over recent years we have witnessed the emergence and consolidation
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
DATA SECURITY MODEL FOR CLOUD COMPUTING
DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Managing Data Storage in the Public Cloud. October 2009
October 2009 Table of Contents Introduction...1 What is a Public Cloud?...1 Managing Data Storage as a Service...2 Improving Public Cloud Storage CDMI...4 How CDMI Works...4 Metadata in CDMI... 6 CDMI
Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.
Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
From mini-clouds to Cloud Computing
From mini-clouds to Cloud Computing Boris Mejías, Peter Van Roy Université catholique de Louvain Belgium {boris.mejias peter.vanroy}@uclouvain.be Abstract Cloud computing has many definitions with different
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Secure Access Mechanism for Cloud Storage
Secure Access Mechanism for Cloud Storage Danny Harnik, Elliot K. Kolodner, Shahar Ronen, Julian Satran, Alexandra Shulman-Peleg, Sivan Tal IBM Haifa Research Lab Haifa, Israel 31905 email: {dannyh,kolodner,shaharr,julian_satran,shulmana,sivant}@il.ibm.com
Test of cloud federation in CHAIN-REDS project
Test of cloud federation in CHAIN-REDS project Italian National Institute of Nuclear Physics, Division of Catania - Italy E-mail: [email protected] Roberto Barbera Department of Physics and
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
Implementing Software- Defined Security with CloudPassage Halo
WHITE PAPER Implementing Software- Defined Security with CloudPassage Halo Introduction... 2 Implementing Software-Defined Security w/cloudpassage Halo... 3 Abstraction... 3 Automation... 4 Orchestration...
How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas)
Integral Federated Identity Management for Cloud Computing Maicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr. Graduate Program in Computer Science Pontifical Catholic University of Paraná Curitiba,
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
LSKA 2010 Survey Report I Device Drivers & Cloud Computing
LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract
StorReduce Technical White Paper Cloud-based Data Deduplication
StorReduce Technical White Paper Cloud-based Data Deduplication See also at storreduce.com/docs StorReduce Quick Start Guide StorReduce FAQ StorReduce Solution Brief, and StorReduce Blog at storreduce.com/blog
