PERFORMANCE ENRICHMENT IN MULTITENANT S APPLICATIONS FOR CLOUDS
|
|
|
- Dora Jackson
- 10 years ago
- Views:
Transcription
1 PERFORMANCE ENRICHMENT IN MULTITENANT S APPLICATIONS FOR CLOUDS Ravinder Chauhan * Sukhwinder Kaur Assistant professor in CSE(YIET)KU M.Tech scholar in CSE(YIET)KU Yamunanagar Yamunanagar Abstract The ability to range a web application or website is tied directly to understanding where the resource constraints lie and what force the addition of various resources has on the Multi-Tenant applications. Unfortunately, the skeleton and architects more often than not assume that simply adding another server into the mix can fix any performance difficulty and security issues as well as data storage issues. When we start adding new hardware/update existing hardware in a private, public, Hybrid clouds, the complexity starts growing which affects recital and hence security. While priced cloud computing services save pains to maintain the computational environment, there are several drawbacks such as overhead of virtual machines, possibility to share one physical machine with several virtual machines, and indeterminacy of topological allocation of their own virtual machines. Multi-tenancy is one of key characteristics of the service oriented computing especially for Software as a Service (SaaS) to leverage economy of scale to drive down total cost of ownership for both service consumer and provider. This paper aims to study the technologies to build a cost-effective, protected and scalable multi-tenant infrastructure and how to improve the security and enhance its performance. This paper also identifies the potential performance bottlenecks, summarizes corresponding optimization approaches and best implementation practices for different multi-tenant business usage models Keywords Cloud Computing, Cloud Platform, Cloud Security, performance evaluation, multi tenant I. INTRODUCTION Recent progress of engineering has cut down costs of computers and network, and this change gave a huge impact on high performance computing environment. Grid computing and cloud computing, which are computer environments consisted of commodity computers and commodity network devices, are grabbing people s attention rapidly. Grid computing and cloud computing are now recognized as a convenient source that allows users to bring out computational power as much as they need, whenever they want. Cloud computing service such as Amazon EC2 seems to bring a gigantic supercomputer by our side, however, is it really reasonable to utilize the paid service as research environment for everyday activities. In case the priced cloud computing service replaces supercomputers, what could be obstacles for transition? First question would be which is more cost-effective to purchase a supercomputer and use it for a couple of years, or to rent computational nodes as you go. Second question would be how fast and secure their applications run on the commercial computational cloud. Virtualization technology has been developed, and it is quite common to build a cloud computing environment as a flock of virtual machines. This methodology has pros and cons. One of pros for users is that computational environment looks homogeneous; therefore, users will never be bothered with heterogeneous hardware or software environment. Cons for users are, for example, overhead of virtual machines, possibility to share one physical machine with several virtual machines, and indeterminacy of topological allocation of their own virtual machines. Companies of various sizes have outsourced their business applications to third party service providers through Software as a Service (SaaS) [4][8] deals supported by service oriented computing architecture. Such outsourcing deals span a fairly wide range of applications to support business operations. The typical ones include payroll, call center, procurement, finance and accounting, human resource management etc. SaaS providers usually develop or acquire SaaS applications and host them as services to serve specific needs of their clients by leveraging service oriented computing technologies [2][3]. One of the key characteristics of the SaaS application is Multi-tenancy. By leveraging Multitenancy, SaaS providers can significantly ease operations and reduce delivery cost for a big number of tenants. As illustrated in Figure 1, in a multitenant enabled service environment, user requests from different organizations and companies (tenants) are served concurrently by one or more hosted application instances and databases based on a scalable, shared hardware and software infrastructure. Multi-tenant infrastructure should take care the following key aspects: 1. Resource Isolation: Separate the resources allocation and usage among tenants; 2. Security: Prevent invalid resources access and potential malicious attack; 3. Customization: Support tenant-specific features or Service Level conformity (SLA) through configurations; 4. Scalability: Scale the SaaS application s delivery infrastructure to support growing number of tenants with well managed cost increase, performance and availability guarantee; 2014, IRJCS- All Rights Reserved Page -1
2 Figure 1: A Multi Tenant Enabled Service environment To make the service offerings more profitable and more attractive to those clients with very limited IT investment budget, e.g. Small and Medium Business (SMB), the average cost of the service for each tenant should be kept as low as possible. There are mainly three kinds of service cost: 1. Infrastructure cost: It includes the hardware, software and utilization costs. Generally, for a given system, the total throughput can be used to measure the maximal tenant number the system can support with an acceptable SLA. 2. Management cost: The tenant related operational management processes and activities, e.g. Lifecycle management, monitoring, data backup and restore etc. 3. Application development cost: To satisfy each customer, additional development might be involved to address its unique requirements. There is always a tradeoff between customer satisfaction improvement and development cost management. Although a typical SaaS application is composed of application instance (e.g. user interface, business logic, process etc.) and database, this paper mainly focuses on data tier multi-tenancy study. As illustrated in Figure 2, we first explore all kinds of potential implementation patterns of data tier multi-tenancy from the aspects of isolation, security, customization and scalability etc. Generally, the cost of these patterns should be studied from the infrastructure, management and development aspects by using different kinds of measurement metrics. This paper only focuses on the performance evaluation via a set of simulations, and identifies potential performance bottlenecks, corresponding optimization approaches and best implementation practices for different multitenant business usage models. Figure 2: Overview of multi-tenant Data Tier Work II. CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. Networks, Servers, Storage, Applications, and Services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of three service models, and four deployment models. However Cloud computing is a difficult term to explain to most; even to technologists and IT professionals, the concept of computing in the cloud is a wide and generic term for many specific areas within online environment. The cloud is defined as the Internet surrounding every part of our daily lives, similar to the clouds in the sky. However many new enterprise related buzzwords have evolved from the original computing in the cloud concept; Software-as-a-Service, Software + Services which has evolved as a more Microsoft related term, and social-media which is a cornerstone in social networking and development. Whilst a common misconception for cloud computing is merely storage space on the Internet, the cloud offers many services, infrastructure benefits and scalability which may not be possible within ordinary local-area enterprise networks. When cloud storage is used as the primary location of files and documents, a certain trust is left in the hands of the storage provider to ensure certain steps are taken to prevent data loss and maintain the integrity of the file system; enabling maximum uptime, reducing downtime and sustain the highest levels of physical protection and data security. 2014, IRJCS- All Rights Reserved Page -2
3 When something affects cloud storage, things can go disastrously wrong for many end users. Whilst data which is stored in the cloud isn t actually stored in the cloud; rather a Data Center housing hundreds of servers and thousands of networking cables, physical disasters are one of the greater threats to the cloud. As physical disasters go, some will affect the entire cloud, or entire datacenter if you think geologically or physically, and some will affect portions or individual sections. Natural disasters are a great concern to those who run and use cloud computing services. As many natural disasters are unpredictable, from floods to earth tremors, volcanoes and tsunamis, recovering from these disasters are often impossible. Preventing disasters from affecting the cloud itself is the only realistic thing the staff, management and planners can foresee. Nobody would build a datacenter; let alone any Business Venture, Government building, School or Hospital, or any building or structure of importance in a geographic location where an active or dormant volcano lies, e.g. In case of cloud downtime or event which causes the cloud to fail, a backup solution is often used in an alternate location. This ensures a constant stream of data being backed up to an alternate datacenter, away from any potential natural disaster, but keeping data secure and maximizing authorized accessibility. III. DESIGN PATTERNS OF DATA TIER MULTITENANCY A. Resource seclusion Patterns In the data tier, there are varying degrees of data isolation for a multi-tenant application that ranges from an isolated environment to a totally shared environment. Implementation patterns along this spectrum include three models illustrated in Figure3: a) Totally secluded (Dedicate database pattern): each tenant owns a separate database b) Partially shared (Dedicate table/schema pattern): multiple tenants share a database, but each tenant owns a separate tables/schema c) Totally shared (Share table/schema pattern): multiple tenants share same database, and share same tables/schema Figure 3: Isolate vs. Share data Environment To be noted, in the 3rd pattern, records of all tenants are stored in a single shared table sets mixed in any order, in which a tenant ID column is inserted in each table to associate the data records with the corresponding tenants. B. Security Patterns This section focuses on the data security isolation among tenants, which is also described as preventing a user from getting the privileges to access data belonging to other tenants. It aims to safeguard the security of each tenant at comparable security levels as those of the traditional single-tenant system In general, there are two patterns to realize the data security mechanisms as illustrated in Figure4. 1) Filter-based pattern in application level: Through adding the application level filter into each user request of tenant, a tenant s data can be ensured to be accessed only by the tenant its self. For dedicate database or dedicate table/schema isolation patterns, the filter is based on database name or schema name to access associated database or schema associated with the corresponding tenant. While for share table/schema isolation pattern, the filter is based on the tenant ID column in every table to access records associated with the appropriate tenant, e.g. modifying a SQL statement with where clause tenantid=xxx. Although easy to implement, this approach has potential security risks. Since all the tenants share a single platform level DB account and connection, a malicious tenant user may access other tenants data via SQL injection attack. For example, a hacker can modify the above SQL statement s where clause as tenantid=xxx or 1==1 to access data of all tnants. 2) Permission-based pattern in DBMS level: Each tenant is assigned a dedicated DB access account and connection which only has privileges to access its own resources (e.g. the dedicated database or tables/schema in 1st & 2nd isolation patterns). While for 3rd seclusion pattern, 2014, IRJCS- All Rights Reserved Page -3
4 we can leverage the row level access control mechanism provided by DBMS, e.g. the label based access control (LBAC) feature. In this way, we can completely prevent potential SQL injection attack. Add tenant oriented filter Figure 4: Filter vs. Permission based Security Data Access C. Customization Patterns In data customization aspect, there are also various flexibility degrees for a multi-tenant application that ranges from complex schema customization to simple field extension. Obviously, for the dedicated database or table/schema isolation patterns, this is not an issue since the tenants have their separated schemas. The changes of the data model of one tenant can be made directly to its specific database/tables without impact to other tenants. However, for the share table/schema isolation pattern, because of the sharing of schema, it can only support data field extension, which flexibility degree is usually measured by the maximal number of extension fields. The main implementation patterns along this spectrum include as illustrated in Figure 5: Reserved Field Pattern Tenant ID Sales Order ID. ADDITIONAL COLUMN E1 E2 E3 E4 tenant A Null Charlie tenant B Null Null False Null tenant C Null Null null Mary 2014, IRJCS- All Rights Reserved Page -4
5 Main Shared Table Tenant ID Sales Order ID Record ID tenant A tenant B tenant C Extension table Record ID Extension ID Value Ext00001 Charlie Ext Ext00001 Mary Extension Definition Table Extension ID Name Type First Name String Sign Date Date Extension Sub-table Pattern Tenant ID Sales Order ID XML Field tenant A tenant B tenant C XML Extension Pattern Figure 5: Data Extension Patterns in shared table 1) Reservation field pattern: Pre-define a fixed number of additional data columns in each table with a generic column type (e.g. Varchar). This pattern is very easy to implement but has some drawbacks. Since the extended columns exist for all rows in the table no matter if it 2014, IRJCS- All Rights Reserved Page -5
6 needs or not, some storage space will be wasted. Furthermore, this mechanism can t support those tenants requiring more extension fields than the predefined number. 2) Extension sub-table pattern: A sub table, which associates with the main table via the record id column, is built to store all the extended fields of the records in main table. This approach is very flexible. It does not have limitation in the maximal number of the extended fields. However, it may suffer from poor performance resulted by join-search. 3) XML extension field pattern: This approach leverages the new XML features provided by some DBMS. For each record, all of its extended field data are stored in a single XML field. It can provide better programming interfaces than the dynamic extended sub-table approach, but will also produce significant performance overhead. D. Scalability Patterns Cost effective scalability is very important for multitenant system. In an ideal situation, the maximum number of tenants supported by the multi-tenant system should increase in direct proportion to the increase of resources, while still keeping the performance metrics of each tenant in a predefined and acceptable level. Generally, there are two kinds of patterns for scaling: 1) Scale up: (Vertical scaling) through adding more resources (such as CPU, memory, and disks I/O) to the existing machines. This is an easy-to-use and manageable approach. However, it may not provide linear scalability. As you add resources, overhead comes out in resource management that limits the scalability of single systems. 2) Scale out: (Horizontal scaling) through adding additional machines to the existing system. Compared with scale up, this approach provides a more cost-effective and smooth scalability, since it can incrementally extend the system by adding more resources to a low-cost hardware set established initially. Although scale out may inevitably increase the management complexity, it can also improve the reliability and availability of the system, in some cases because of redundancy. In this paper, for scalability aspect, we focus mainly on two scale-out approaches: 3) Application level routing: Each machine of the hardware set has a standalone database server instance. User requests from different tenants are intercepted and dynamically routed to corresponding database through an application level, tenant aware dispatcher. Theoretically, as the number of machines added increase, the total throughput of system can almost lineally scale. 4) DB partitioning: All machines of the hardware set share a single set of database server instance via clustering technology. Tenant users requests are automatically routed to pre-configured DB partitions in an implicit way. Comparing with application level routing, this approach provides a uniform view to maintain machines and decrease the complexity of management. However, to provide a set of complicate common clustering oriented management features, the DB partitioning technology will inevitably introduce more performance overhead, and also face some challenges in scalability and availability etc. IV. SECURITY AND PERFORMANCE IN CLOUD COMPUTING Cloud architecture extends to the client, where web browsers and/or software applications access cloud applications. Cloud storage architecture is loosely coupled, where metadata operations are centralized enabling the data nodes to scale into the hundreds, each independently delivering data to applications or users.security is the #1 challenge seen related to Cloud Computing according to our architecture. The main security concerns include performance, reliability compliance, and privacy in interoperability and visibility under virtualization. The Good News: Since Security is seen as such a major issue, it is getting much attention. This attention is resulting in Security-related benefits such as greater segmentation and better logging and performance is another issue if we change the level of security in the Cloud. With increasing Business complexity, organizations are seeking innovative business models and specialized technologies to cater to customer demands. Cloud computing technologies can provide organizations competitive advantage in the market, cost reductions, higher margins, simplified maintenance and management of applications across the enterprise, greatly extended scalability, agility, high availability, automation, large data storages and reliable backup mechanisms. By using Cloud Computing environments, organizations can focus on their core business as opposed to concerning themselves about infrastructure scalability. Organizations may explore use of cloud computing initially for better performance through peak demand periods but eventually adoption could spread to other areas. 2014, IRJCS- All Rights Reserved Page -6
7 V. SERVICE MODELS A. Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based ). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. B. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. C. Cloud Communications as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud transportation but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). A. Private Cloud: VI. DEPLOYMENT MODELS The Cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. B. Community Cloud: The Cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. C. Public Cloud: The Cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. D. Hybrid Cloud: The Cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by regular or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). VII. EXISTING VIEW Critics argue that Cloud Computing is not secure enough because data leaves companies' local area networks. It is up to the clients to decide the vendors, depending on how willing they are to implement secure policies and be subject to 3rd party verifications. Sales force, Amazon and Google are currently providing such services, charging clients using an on-demand policy. Statistics suggest that one third of breaches are due to laptops falling in the wrong hands and about 16% due to stolen items by employees. Storing the data in the cloud can prevent these issues altogether. Moreover, vendors can update application/os/middleware security patches faster because of higher availability of staff and resources. According to cloud vendors, most thefts occur when users with authorized access do not handle data appropriately. Upon a logout from the cloud session, the browser may be configured to delete data automatically and log files on the vendor side indicate which user accessed what data. This approach may be deemed safer that storing data on the client side. There are some applications for which Cloud Computing is the best option. One example is the New York Times using Amazon's cloud service to generate PDF documents of several-decade old articles. The estimated time for doing the task on the Times' servers was 14 years, whereas the cloud provided the answer in one day for a couple hundred dollars. However, the profile of the companies that currently use the Cloud Technology includes Web 2.0 start-ups that want to curtail material cost, application developers that want to enable their software as a service or enterprises that are exploring the cloud with trivial applications. The fact that Cloud Computing is not used for all of its potential is due to a variety of concerns. The following surveys the market in terms of continuous innovation, academia and industry research efforts and Cloud Computing challenges. 2014, IRJCS- All Rights Reserved Page -7
8 VIII. PERFORMANCE ISSUES Everybody seems to be talking noisy about Cloud Computing nowadays. But the recently reported outages at Sales force, Amazon and Google has made us think otherwise and wonder if the cloud is really ready to meet all the hype and attention its getting. No doubt, there are cost savings related to licensing, upholding and application / server management. But does this ensure that your end users are getting the online experience you want them to have? Many Cloud Computing providers provide custom built management consoles or control panels for managing server resources. These consoles provide customers with availability statistics and status messages in the event of significant outages that impact end users. IX. RELATED WORKS In the hosted applications of the early 90s companies only moved their hardware and applications from their premises to the data centers, and paid a quality to have their applications hosted. This was a typical single-tenancy scenario without any hardware or software sharing across customers of the service provider. To achieve more benefits from improving the sharing efficiency, some hosting service providers gradually started to leverage virtualization technologies on machine, operation system etc levels, but each tenant still owns dedicate application instance and database in these hosting models. In recent years, a native multi-tenant model, as exemplified in SaaS achieves great successes. In this model, a single instance of application or a single database can both serve multiple tenants. For the multi-tenant data tier, Fred & Gianpaolo studied the similar topics. They evaluate patterns on aspect of multi-tenant data customization, and provide a performance report based on SQL Server. Our work differentiates in at least two ways. First, this paper touches more perspectives and corresponding design patterns of multi-tenant data model, such as the isolation, security and scalability patterns. Secondly, this paper conducted a broader scope of performance. X. FUTURE WORK In this paper, we explore many kinds of typical multi-tenant data tier implementation patterns on aspects of isolation, security, customization and scalability and Testing as also. We also evaluate performance of these patterns through a series of experiments, and summarize a set of valuable conclusion and best practices on how to design an effective multi-tenant data model. This work can help the service provider and multi-tenancy application developer. We have already applied parts of the study results into the design and implementation of a real multitenant application. The hands-on experiences will help us to touch more research topics on performance optimization and scalability aspects in data tier, such as tenant behavior awareness load balancing in distributed database cluster environment. Another goal of our research is to explore technologies to transform traditional DBMS to be more suitable for multi-tenant environments. We will start from the open source database server (like mysql, Derby etc), and refine its engine, query optimizer, data model organization structure etc. We believe that a new kind of DBMS with native multi-tenancy design will emerge to support both SaaS applications developers and service providers. For those deploying software out in the Cloud, scalability is a major issue. 1. The need to marshal resources in such a way that a program continues running smoothly even as the number of users grows. 2. it s not just that servers must respond to hundreds or thousands of requests per second. 3. The system must also coordinate information coming from multiple sources fast, not all of which are under the control, of the same organization. With these equations there is a possibility that the security can be breached, but the performance will be increased according to our scenario when the number of users are increased. In future we want to design a protocol which will be more secure and the performance of the cloud will increase. REFERENCES [1]Bhushan Lal Sahu, A Comprehensive Study on Cloud Computing Volume2,Issue9,September2012 Available at: [2] Mohsin Nazir, Cloud Computing: Overview & Current Research Challenges 8Volume 8, Issue 1 (Nov. - Dec. 2012) Available at: [3] [Mills09] Elinor Mills, Cloud Computing Security Forecast: Clear Skies, [4] Foley, M., J., Microsoft 2.0: How Microsoft Plans to Stay Relevant in the Post-Gates Era. Indianapolis: Wiley [5] Whittaker, Z., Egnyte: using and sustaining Enterprise 2.0 Enterprise Alley ZDNet. [Online]. Available at: [Accessed 6th November 2008] [6] Mladen A. Vouk, Cloud Computing Issues, Research and Implementations Available at: Journal of Computing and Information Technology - CIT 16, 2008, 4, [7] IsecT Ltd., Notice Board technical briefing: securing physical access and environmental services for datacenters. [E-book] Available at: [Accessed 9th November 2008] [8] Weiss, A., Computing in the clouds, networker, 11(4), , IRJCS- All Rights Reserved Page -8
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini
Business Intelligence (BI) Cloud Prepared By: Pavan Inabathini Summary Federal Agencies currently maintain Business Intelligence (BI) solutions across numerous departments around the enterprise with individual
Cloud Service Model. Selecting a cloud service model. Different cloud service models within the enterprise
Cloud Service Model Selecting a cloud service model Different cloud service models within the enterprise Single cloud provider AWS for IaaS Azure for PaaS Force fit all solutions into the cloud service
Technology & Business Overview of Cloud Computing
Your Place or Mine? In-House e-discovery Platform vs. Software as a Service Technology & Business Overview of Cloud Computing Janine Anthony Bowen, Esq. Jack Attorneys & Advisors www.jack-law.com Atlanta,
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro
Cloud definitions you've been pretending to understand Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro You keep using that word cloud. I do not think it means what you think it
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework Many corporations and Independent Software Vendors considering cloud computing adoption face a similar challenge: how should
Enterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
How To Understand Cloud Computing
Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Elasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -
TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF
TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF As interest in cloud computing increases, so does the confusion surrounding it. What is cloud computing? Can the technology
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Capability Paper. Today, aerospace and defense (A&D) companies find
Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Enabling Database-as-a-Service (DBaaS) within Enterprises or Cloud Offerings
Solution Brief Enabling Database-as-a-Service (DBaaS) within Enterprises or Cloud Offerings Introduction Accelerating time to market, increasing IT agility to enable business strategies, and improving
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
ORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
A.Prof. Dr. Markus Hagenbuchner [email protected]. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner [email protected] CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
Hadoop in the Hybrid Cloud
Presented by Hortonworks and Microsoft Introduction An increasing number of enterprises are either currently using or are planning to use cloud deployment models to expand their IT infrastructure. Big
Multi-Tenant Engineering Architecture in SaaS
Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing
A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there
A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
Software as a Service (SaaS) Testing Challenges- An Indepth
www.ijcsi.org 506 Software as a Service (SaaS) Testing Challenges- An Indepth Analysis Prakash.V Ravikumar Ramadoss Gopalakrishnan.S Assistant Professor Department of Computer Applications, SASTRA University,
Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.
Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
International Journal of Management (IJM), ISSN 0976 6502(Print), ISSN 0976 6510(Online), Volume 3, Issue 1, January- April (2012)
INTERNATIONAL JOURNAL OF MANAGEMENT (IJM) International Journal of Management (IJM), ISSN 0976 6502(Print), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3, Issue 1, January- April (2012),
CA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: [email protected] Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Analysis and Strategy for the Performance Testing in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 10 Version 1.0 July 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
WhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
Virtualization 101: Technologies, Benefits, and Challenges. A White Paper by Andi Mann, EMA Senior Analyst August 2006
Virtualization 101: Technologies, Benefits, and Challenges A White Paper by Andi Mann, EMA Senior Analyst August 2006 Table of Contents Introduction...1 What is Virtualization?...1 The Different Types
SCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information
The Software-as-a Service (SaaS) Delivery Stack
The Software-as-a Service (SaaS) Delivery Stack A Framework for Delivering Successful SaaS Applications October 2010 2010 Online Tech, Inc. Page 1 of 12 www.onlinetech.com Audience Executives, founders,
Relational Databases in the Cloud
Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management
The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
Cloud Computing: Meet the Players. Performance Analysis of Cloud Providers
BASEL UNIVERSITY COMPUTER SCIENCE DEPARTMENT Cloud Computing: Meet the Players. Performance Analysis of Cloud Providers Distributed Information Systems (CS341/HS2010) Report based on D.Kassman, T.Kraska,
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Fact Sheet Yellowfin & Cloud Computing
Fact Sheet Yellowfin & Cloud Computing 1 Copyright Yellowfin International 2010 Contents Contents...2 What is Cloud Computing...3 Defining types of Cloud Computing...3 Deployment models: Public, Private,
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September What is the The Cloud Some Definitions The NIST Definition of Cloud computing Cloud computing is
Planning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University
Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
On-Demand Virtual System Service
On-Demand System Service Yasutaka Taniuchi Cloud computing, which enables information and communications technology (ICT) capacity to be used over the network, is entering a genuine expansion phase for
Enterprise Cloud Solutions
IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,
Application Performance Management for Enterprise Applications
Application Performance Management for Enterprise Applications White Paper from ManageEngine Web: Email: [email protected] Table of Contents 1. Introduction 2. Types of applications used
Private Vs Public Cloud
Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India [email protected]
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
An Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC [email protected]
Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
Whitepaper. The ABC of Private Clouds. A viable option or another cloud gimmick?
Whitepaper The ABC of Private Clouds A viable option or another cloud gimmick? Although many organizations have adopted the cloud and are reaping the benefits of a cloud computing platform, there are still
Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study
DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource
SaaS, PaaS & TaaS. By: Raza Usmani
SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
CHAPTER 2 THEORETICAL FOUNDATION
CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Processing invoices in the cloud or on premises pros and cons
WHITE PAPER Purchase-to-pay by ReadSoft. Automated account payables processing software Author: Wille Dahl March 2012 Copyright ReadSoft - www.readsoft.com Processing invoices in the cloud or on premises
Cloud-Testing vs. Testing a Cloud
Cloud- vs. a Cloud - 10th Annual International Software Conference 2010 Neha Mehrotra Abstract This white paper introduces Cloud computing business model which has been the natural evolution of the adoption
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Cloud service model provides levels of abstraction and automation for those tasks
Cloud Models/Architecture Three cloud service models 1. Infrastructure as a Service (IaaS) 2. Platform as a Service (PaaS) 3. Software as a Service (SaaS) Provide a level of abstraction to reduce the effort
Guardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
Parametric Analysis of Various Cloud Computing Security Models
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506 International Research Publications House http://www. irphouse.com Parametric Analysis
1 Introduction. 2 What is Cloud Computing?
1 Introduction Table of Contents 1 Introduction 2 What is Cloud Computing? 3 Why is Cloud Computing important? 4 Why Cloud deployments fail? 5 Holistic Approach to cloud computing implementation 6 Conclusion
