Multitenancy in SaaS: A comprehensive Survey Pallavi G B, Dr. P Jayarekha
|
|
|
- Rudolph Warren
- 10 years ago
- Views:
Transcription
1 International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July Multitenancy in SaaS: A comprehensive Survey Pallavi G B, Dr. P Jayarekha Abstract Cloud computing is a technology which provides enterprise-grade computing resources as services to customers through internet. One of the popularly available services is software viz., software as a service (SaaS). Many of the SaaS providers make use of a multitenant model to host their applications. Multitenancy is an architectural approach in which a single instance of a software application serves multiple customers referred as tenants, where one application is run on a single database instance for multiple organizations. However, since sharing of a single instance of software leads to distribution of underlying hardware resources among tenants, a multitenant platform poses challenges with respect to architectural, implementation and security issues. In this paper, we have made an extensive survey to understand the various aspects of these issues. The study results can be used not only to identify advantages and disadvantages of these aspects, but also to identify areas requiring future research. Index Terms Architecture, Implementation, Multitenancy, SaaS, Security, Metadata, Survey 1 INTRODUCTION Cloud Computing has become an important computing technology. Bhaskar Prasad et al., [1] in their survey states that cloud computing has emerged as a popular computing model to support large volumetric data using clusters of commodity computers. According to Peter Mell et al., NIST [16], cloud computing is a model for enabling convenient, on-demand access through internet to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. The users can access these services available, without having any previous know-how on managing the resources involved. Pallavi G B, Assistant Professor, Dept of CSE,BMSCE is currently pursuing Ph.D. in the field of Multitenancy in SaaS in VTU,India. [email protected] Dr. P Jayarekha, Associate Professor,Dept of ISE,BMSCE holds Ph.D. degree in computer science. She has published more than 15 research papers in referred International Journals and also few in national and international conferences. Research Scholars are working on various fields like cloud computing, WSN and related areas under her guidance. [email protected] 2014 Multitenancy invariably occurs at the database layer of the SaaS application[5] i.e., customer share the same hardware resources by using a single shared application and database instance, while at the same time tenants are isolated from one another as if they were running on physically segregated resources One of the main advantages of a multi tenant application is the operational benefits [22]. Since all the application code is in one place, it is much easier to maintain, update and backup the application and its data. Another advantage of multi tenancy is the lower system requirements. Because an application and database are shared by multiple clients, it is not necessary One of the important services available today on cloud to have a dedicated server for every client. Resource utiliza- computing paradigm is software as a service. SaaS is a novel delivery model of software that provides an application for multiple users via internet as a form of on demand service [2].This is an attractive offer for software companies as they can use various IT services without the need to purchase and maintain their own IT infrastructure[15]. Also, service provider achieves full economy of scale by hosting such SaaS application using a multitenant model. The authors Corl-Paul Bezemer and Andy Zaidman in [15] positions multitenancy as one of the key concerns in SaaS. They describe multitenancy as an architectural principle that enables SaaS application to serve multiple client organizations (tenants) using a single service instance.. tion is near optimal and customers can avoid under/over provisioning of resources. However, multitenant application poses several challenges and difficulties as well. Some of these challenge stated by authors of [15] are as follows: Performance: Equal amount of resources assigned to each tenant may lead to very inefficient utilization of resources and is therefore undesirable in a multitenant system. Scalability: Because all the tenants share the same application and data store, scalability has become one of the major issues. Addition to that, tenants from various geographical locations may use an application, which can have an impact on scalability requirement. Security: Security is one of the key challenges of multitenancy, as a security breech can result in exposure to data of other tenants. So data protection is an important issue in multitenancy. In order to meet such challenges multitenant architectural, implementation and security related research are being carried out. This paper describes a comparative study of these different aspects of multitenancy. The paper is organised as follows: Section 2 introduces the architectural issues of multitetancy, Section 3 briefs about various implementation details of multitenancy and Section 4 defines security concerns associated with multitenancy, finally Section 5 concludes the paper.
2 42 2 ARCHITECTURAL ISSUES OF MULTITENANCY As mentioned, multitenancy is an architectural approach that benefits both the multitenant application provider and users. Various architectural approaches have been devised as a result of research on this principle. 2.1 Architectural overview for multitenancy An architectural overview for multitenancy has been presented by the authors of [15] as shown in Fig 1. They argue that multitenancy could become a cross cutting concern in any SaaS application as it affects almost all layers of a typical application. Fig 2 [8] 2. Shared application, shared database, separate table: Each tenant obtains a private set of tables while sharing a single database instance Fig 3 [8] 3. Shared application, shared table: Each tenant shares a single database instance and single set of tables. Fig1. Architecture overview for multitenancy [15] Fig 4 [8] 2.3 Metadata-driven architecture of multitenancy Craig D Weismann et al., in [3] mentions that a multitenant application can fulfil the requirement of multiple customers by using the hardware resources and staff needed to manage just a single software instance [Fig 5]. In Fig 1, a tenant specific authentication mechanism is shown in order to authenticate tenants to access only their own data. Further configuration layer facilitates tenants to make their own application specific customization like changing layout style, creating workflow etc so that user gets a feel as if he were working in a dedicated environment. The database layer is of at most importance in any multitenant environment as all the tenants make use of the same database. Hence data isolation among tenants is a major requirement. But because most of the current off-the shelf DBMSs are not capable of dealing with multitenancy a layer between business logic and applications database pool could handle tasks like creation of new tenants in the database, query adoption and load balancing. 2.2 Types of Architecture As per Frederick Chong et a1, [8] there are mainly three kinds of architecture of multitenancy that are applicable as for as database sharing among tenants are concerned. 1. Shared application, separate database: Each tenant obtains a private database instance while sharing a single machine Fig 5 A multitenant application shares a single stack of resources to satisfy the needs of multiple organization [3] However the authors in [3] describe how Force. Com, one of the leading titans of SaaS, has adopted metadata-driven architecture to achieve multitenancy. As per the authors, in Force.com, everything exposed to developers and application users is internally represented as metadata. When developers write custom application, defines custom table, write some procedural code, Force.com does not create an actual table in a database or compile any code. Instead, Force.com simply stores metadata that the platform s engine can use to generate the virtual application components at runtime. When some-
3 43 one wants to modify or customize something about the application, all that s required is a simple non-blocking update to the corresponding metadata. The authors also stress upon the need of a multitenant application that allow tenants to To create custom extensions To keep data secured in a shared environment To customize the application interface and business logic without affecting functionality and availability To upgrade applications code base without breaking tenant specific customization. In order to attain these characteristics the authors suggests that multitenant application must be dynamic or polymorphic which is achieved by adopting a runtime engine that generates application component from metadata-data about application itself. Hence this kind of architecture is termed as metadata driven architecture [Fig 6]. Fig 6 Metadata driven architecture [3] Steve Bobrowski in [12] stipulates such meta-data driven multitenant database approaches as organic Multitenancy. As per the author, Organic Multitenancy can be described as an appcentric resource sharing model in which multitenancy is Sungjoo Kang et al., in [4] have adopted this approach while designing architecture for a multitenant SaaS application platform as shown in Fig 7. This is a three tier architecture which woven into the fabric of the cloud from ground up. The author also gives example of Database.com, an underlying organic provides an execution environment on which business SaaS multitenant database that powers Force.com and which makes applications can operate on. use of a runtime engine that generates all application components from metadata. The platform is composed of several key components like Configurator, Runtime Engine and Metadata Management System. The configured aspects of SaaS application by the tenant manager are stored as metadata in metadata database. Codebase developed by application developers is stored in application database. Runtime engine generates tenant specific application using codebase and metadata. Metadata management system provides two key features for supporting multitenancy. The first one is an access control for supporting multiple tenants which is accomplished by using metadata API s for Logical Tier. When the web browser sends request to the application server, business logic access to database with metadata API. Then, Metadata management system converts the request to the optimized query to retrieve tenant specific UI pages and data. The other feature is providing extended fields for data object. As each tenant would require additional data to be stored in the database, they might have to add extra fields along with the fields provided in the database. This is achieved by adding the metadata information about the additional fields into the metadata database of custom fields which will be used to extract the specific extended fields of specific tenants at runtime. Fig 7 Conceptual architecture for SaaS platform [4 Fig 7 Conceptual architecture for SaaS platform [4] As per the study of this paper: 3 IMPLEMENTATION OF MULTITENANCY Dean Jacobs and Stefan Aulbach describes and compares the three approaches of implementing multi-tenant databases : shared machine, shared process, and shared table[7] which corresponds to the three architectures described by Frederick Chong et a1 in [8]. Within the scope of the experiments they conducted, they list their observations about each approach as follows 1. Shared Machine It does not require modifications of implementation of database It does not reduce customer isolation Memory pooling does not take place. Each database requires its own connection pool on each application server and sockets are not shared among customers. 2014
4 44 2. Shared Process Pooling of memeory and scalability is achieved in a better way. Customers can share memory and connection pools. However, scalability can be further improved by adopting the third appraoch that is shared table approach. 3. Shared Table Its best at pooling resources Administrative operations can be executed in bulk. Connection pools can be shared by customers. Migration is hard because the files on disk have intermingled data from multiple customers. Performance is an issue since this intermingling may spread out across many pages. Security will be a major concern as connection pools and data are shared. In order for the tenants to store data in a single set of tables, several storage models are prescribed so that all tenants data is stored in one set of tables and when a particular tenanat reqests for a data, only his requested data is provided and all the other tenant s data is hidden. 3.1 Storage Models In [5], Stefan Aulbach and team discussed about various storage models used to implement multitenant databases of shared table. The different models termed as schema mapping techniques and their working as per the authors are: Basic layout Private table layout Extension table layout Generic Structures Universal table layout Pivot table layout Chunk table layout I. The basic technique for implementing multi-tenancy is to add a tenant ID column to each table and share tables among tenants.this technique is used by simple SaaS services like etc. However, this approach is a good way to consolidate various tenants data to be stored on the same database. It s suitable for tenants who do not need extensions on the data fields they operate on as this approach does not provide extensibility. Basic layout Table 1 Account TenId AcctId Name 22 1 Arya 22 2 Girish 37 1 Bipin 45 1 Bhaskar II. The next approach is called private table layout which can be adopted which supports extensibility. In this approach, 2014 each tenant will be given their own private table.the metadata related to these private tables are managed by database, there is no overhead of maintaining the metadata in the private tables of tenants. However, as separate tables are maintained on a per tenant basis, this approach provides only moderate consolidation of these tables. Table2a Private Table layout Table 2b Account22 Account35 Aid Name Hospital Beds Aid Name 1 Arya Apollo Bipin 2 Girish St.John 1255 Table 2c Account 42 Aid Name Dealers 1 Bhaskar 70 Hence, a better approach is to combine the above two mentioned layouts to obtain better consolidation and extensibility. Viz., all the tenant s common data is stored in a single base table while their corresponding extension fields are stored and maintained in separate extension fields in extension tables as shown in Table 3a,3b and 3c. But, because multiple tenants may use the same extension tables, the extension tables and the base tables should be given a tenant ID column.also inorder to reconstruct a logical source table corresponding to a particular tenant a row column needs to be added against which join conditions will be applied. This in turn adds the overhead of adding metadata in the data table itself as shown Extension table layout Table 3a AccountExt TenId Row AcctId Name Arya Girish Bipin Bhaskar Health care Account Table 3b Tenant Row Hospital Beds 22 0 Apollo St.John 1255 Table 3c AutomotiveAccount Tenant Row Dealers
5 45 Apart from these approaches one of the methods widely adopted to implement multitenant data base is to use genericstructures.these generic structures do not place a limitation on consolidation or exensibility.the logical tables could be mapped to fixed generic structures. The various kinds of generic structures are: Universal Table Layout: A Universal Table is a generic structure with a Tenant column, a Table column and a large number of generic data columns. The data type of these generic columns will be VARCHAR into which the other datatypes can be converted. Here the n-th column of each logical source table for each tenant is mapped into the n-th data column of the Universal table so that different tenant can extend the same table in different way. The advantage of this layout is that there is no need to reconstruct the logical source table as all the data are stored in the same physical universal table.hence data needs to be selected from one singletable. The disadvantage is that the rows needs to be very wide as it has to accommodate all possible data fields of all tenants and comprises of more null value for the obvious reason that all tenants need not use all data fields of the table. Universal table layout Table 4 Row 0 Pivotint Account17 Pivot table layout Table 5b Table 5a Aid Name Hospital Beds 22 Arya Apollo Girish St.John 1255 Tenant Table Col Row Int Universal Tenant Table Col1 Col2 Col3 Col4 Col5 Col Arya Apollo 120,---,--- Table 5c Girish St.John 1255,---, Bipin,---,---,---,--- Pivotstr Bhaskar 70,---,---,--- Pivot Table Layout: In this type each field type( int, str etc) of the logical table is stored in a separate pivot table.hence the more the number of data types of tenants the more the pivot tables. Each field of each row in a logical source table is given its own row in the pivot table. Hence each pivot table will have Tenant, Table and Row columns as shown in the Table 5a, 5b and 5c.The Col column in these tables specifies which source field a row represents and a single data bearing coulmn for the value of that field. The advantage of this generic approach is that the number of null values of data fields are minimal unlike universal table. Type safety is also achieved since generic data types like varchar is avoided.t The disadvantage is that more number of joins has to be executed to reconstuct the logical table as a result of a query execution. Also the actual physical table contains most of the meta data stored in it used for reconstruction of thelogical tables Tenant Table Col Row Str Arya Apollo Girish St. John Bipin Bhaskar Chunk Table Layout: A third generic structure called chunk table is specified here. Chunk table is like a pivot table execept that it has a set of of data columns of various tables and Col column of pivot table is replaced by a Chunk column. A logical source table dataset will be partioned into dense subsets. These subsets are placed under a group of columns in the chunk table and assigned a chunk id. The advantage of this method as compared to Pivot table layout is, it reduces the ratio of stored metadata-to actual data and also the overhead for reconstructing the logical source
6 46 table.as compared to Universal table layout, overly-wide columns are broken down and supports typing. Row:0 Account17 Chunk table layout Table 6a Aid Name Hospital Beds 22 Arya Apollo Girish St.John 1255 Table 6b ChunkRow Table 7b Tenant Table Chunk Row Int1 Str Apollo St.John Implementing Multi-tenant database using native support of RDBMS The storage models mentioned above to implement multi tenant Chunkstr/int databases have several advantages like, it reduces cost per tenant, and generic structure poses no limitation on consolidation Tenant Table Col Row Int Str and extensibility of tenant specific attributes. However, Arya Oliver Schiller and et al., in [6], points out that these approaches also have several drawbacks as it implements most Apollo per-tenant operations such as schema extension, backup and Girish recovery in the application itself. The authors also mentions that query re-writer component used in the application conducts a major part of data dictionary management like: St.John Bipin Storing data type of a tenant specific attribute. Maintaining the tenant s logical query structure Bhaskar Enforces isolation of Meta data and application data between tenants ,-- For these reasons, query re-writer is a complex and critical With the above techniques in hand, [5] has proposed a new component that requires a clean design and sophisticated testing. technique called Chunk Folding. In this technique, the logical source tables are vertically partitioned into chunks that are folded together into different physical multi-tenant tables and joined as needed. In this approach, the most heavily utilized parts of logical schemas of the tenants are mapped into the conventional tables and the remaining parts into the chunk tables that match their structure as closely as possible hence the metadata budget is effectively managed between conventional and chunk tables. In order to overcome the above mentioned drawback authors of [6] have suggested a different approach in implementing multitenant database. This approach allows maintaining an application core schema while enabling per tenant schema extension. Also, it is the RDBMS that maintains the data dictionary such as data types of tenant specific attributes instead of application itself maintaining all the metadata information of the database. This approach also facilitates direct access to RDBMS without need of complex query rewriter which relies Chunk Folding table layout on native support of multitenancy in RDBMS. Table 7a AccountRow TenId Row AId Name Arya Girish Bipin Bhaskar 3.3 XML Support to implement multitenant database Franclin S. Foping et al., in [9] has proposed a hybrid schema sharing technique for multitenant applications. They basically maintain two separate tables. One is a tenant table where in all common data are stored [Table 8a]. 2014
7 47 Manager ID INT Table 8a The other is an extension table [Table 8b] which stores tenant specific data in XML form as shown. Table 8b Whenever a tenant throws a query, it is executed by attaching a tenant-id at runtime. The advantages of storing data in XML form are: ACKNOWLEDGMENT Querying of tenant specific data will not be hindered as null values are avoided. Indexes can be applied on tenant fields and hence queries are optimized on a per tenant basis. However the drawback of this approach is that XML document cannot be validated against a schema as this document BMS College of Engineering. will be generated at runtime. 4 SECURITY Username VARCHAR Full Name VARCHAR 1 Ramachan Ramachandra Nayak 2 Ashutosh Ashutosh Agarwal 3 priya123 Priyanka Choudary Manager ID INT Extension XML Contact INT <Parameters><Hospital name= Apollo > <Beds>120</Beds> </Hospitalname> </Parameters> Coun -ty ID INT The risks involved in SaaS applications accessing databases are been divided into three categories in [10]. Managing user identity Managing user access Managing user credentials. The same is applicable for SaaS applications handling multitenant databases as well. Hence there is a need to address these issues in multitenant environment. In an article named Access Control in Multitenant applications with visual guard [13], author Novalys talk about securing multitenant application with access control mechanisms like user authentication and user permissions. According to the author, any multitenant application need to meet two criteria -> protecting data from other tenants -> delegate administrative privileges which can be achieved using access control systems like Visual Guard which works with various application architectures. In [14] author Mr.Ramkumar suggests that in a multitenant environment the older paradigm of roles and page level access control could be replaced by new paradigm of privilege based access controls. i.e., instead of hard coding access control policies of the product into the roles, a user is checked for the privilege for doing any action and user/roles privileges are resolved during runtime but not hard coded at design time. However the author also mentions that not only the roles/privileges could be mapped during runtime but also the data scopes should be configurable by an end customer and mapped with each role/privilege mapping. This control configuration can then be stored tenant wise. During runtime appropriate tenant specific access control setting can be looked up and decide to allow or disallow a particular action in the application. Thus security in multitenancy opens up several issues which could be understood researched and addressed. 5 CONCLUSION Multitenancy is a promising paradigm which enables sharing of a single service instance among multiple tenants and also leverages benefits for service provider. However in this process of sharing, several open issues needs to be addressed related to resource sharing, scalability and security. This pro posed survey provides researchers the idea on current mul titenant systems, hype and challenges. The authors would like to acknowledge and thank Technical Education Quality Improvement Program [TEQIP] Phase 2, REFERENCES [1] Bhaskar Prasad Rimal,Enumi Choi, Ian Lumb, A Taxanomy and Survey of Cloud Computing System, Fifth International Joint Conference on INC, IMS and IDC [2] Software as a Service, Software_as_a_service. [3] Craig D Weissman, Steve Bobrowaki, The Design of the Force.com Multitenant Internet Application Development Platform, SIGMOD 09, June 29 - July 2, 2009, Providence, Rhode Island, USA., ACM /09/06, [4] Sungjoo Kang, Sungwon Kang, Sungjin Hur, A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform, First ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering /11, IEEE [5] Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons Kemper, Jan Rittinger, Multitenant Databases for Software as a Service-Schema Mapping Technique, SIGMOD 08, June 9 12, 2008, ACM /08/ [6] Oliver Schiller, Benjamin Schiller, Andreas Brodt, Bernhard Mitschang, Native Support of Multi-tenancy in RDBMS for Software as a Service, EDBT 2011, March 22 24, 2011, Uppsala, Sweden, ACM /11/0003, [7] Dean Jacobs, Stefan Aulbach, Ruminations on multi-tenant databases, In Datenbanksysteme in Business, Technologie und Web, pp ,2007, ISBN: Digital Object Identifier [8] Frederick Chong, Gianpaolo Carraro, Roger Wolter, Multitenant Data Architec-
8 48 ture Microsoft Corporation, [9] Franclin S. Foping, Ioannis M. Dokas, John Feehan, Syed Imran, A New Hybrid Schema- Sharing Technique for Multitenant Applications [10] Cisco SaaS access control [11] Securing Multitenancy and Cloud Computing,White Paper, Juniper Network, eN Mar 2012 [12] Steve Bobrowski, Optimal Multitenant Designs for Cloud Apps, 4th International Conference on Cloud Computing, /11, ISBN: Digital Object Identifier /CLOUD IEEE [13] Article by Novalys, Access Control in Multi-Tenant Applications with Visual Guard, [14] Article by Rajkumar R.S.,Access Control in Multi-tenant Applications, [15] Cor-Paul Bezemer, Andy Zaidman, Multi-Tenant SaaS Applications: Maintenance Dream or Nightmare?, Report TUD-SERG , Delft University of Technology Software Engineering Research Group Technical Report Series [16] Peter Mell, Timothy Grance, The NIST definition of cloud computing, September [17] Sanjeev Pippal,Vishnu Sharma, Shakti Mishra, D.S.Kushwaha, An Efficient Schema Shared Approach for Cloud based Multitenant Database with Authentication and Authorization Framework, International Conference on P2P,Parallel,Grid,Cloud and Internet Computing, Barcelona, Oct. 2011,pp , Print ISBN: , Digital Object Identifier : /3PGCIC [18] Anthony T.Velte, Toby J.Velte, Robart Eisenpeter, Cloud Computing: A Practical Approach, Tata McGraw-Hill Publishers, 1st Edition, 2009, ISBN: [19] Cor-Paul Bezemer, Andy Zaidman, Challenges of Reengineering into Multitenant SaaS Applications Report TUD-SERG , Delft University of Technology Software Engineering Research Group,Technical Report Series 2010 [20] Secure Multi-Tenancy for Cloud Architecture with NetApp, Cisco, and VMware, [21] Jose M.Alcaraz Calero, Nigel Edwards, Johannes Kirschnick, Lawrence Wilclock, Mike Wray, Towards a Multitenancy Authorization System for Cloud Services, /10, IEEE [22]
Survey on Multi-Tenant Data Architecture for SaaS
www.ijcsi.org 198 Survey on Multi-Tenant Data Architecture for SaaS Li heng 1, Yang dan 2 and Zhang xiaohong 3 1 College of Computer Science, Chongqing University Chongqing, 401331, China 2 School of Software
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
Multi-Tenant Engineering Architecture in SaaS
Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing
Software as a Service (SaaS) for Management information system using multiple tenants
Software as a Service (SaaS) for Management information system using multiple tenants Rachana Desale, Purva Kolhatkar, Anju More, Piyush Katira, Vishal Kokane Prof.S.M.Jaybhaye (Department of Information
Multi-Tenant SaaS Application Platform: A Survey
Multi-Tenant SaaS Application Platform: A Survey Basant Kumar Gupta, Keisam Thoiba Meetei PG Scholar, Computer Science and Engineering, Galgotias University, Greater Noida U.P, India Abstract: Now days
Versioning for Software as a Service in the context of Multi-Tenancy
Versioning for Software as a Service in the context of Multi-Tenancy Maximilian Schneider and Johan Uhle July 2013 University of Potsdam, Hasso-Plattner-Institute Prof.-Dr.-Helmert-Str. 2-3, 14482 Potsdam,
Cloud application services (SaaS) Multi-Tenant Data Architecture Shailesh Paliwal Infosys Technologies Limited
Cloud application services (SaaS) Multi-Tenant Data Architecture Shailesh Paliwal Infosys Technologies Limited The paper starts with a generic discussion on the cloud application services and security
Elasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -
A New Hybrid Schema-Sharing Technique for Multitenant Applications
A New Hybrid Schema-Sharing Technique for Multitenant Applications Franclin S. Foping, Ioannis M. Dokas, John Feehan, Syed Imran Cork Constraint Computation Centre University College Cork Ireland E-mail:
SAAS. Best practices for SAAS implementation using an Open Source Portal (JBoss)
SAAS Best practices for SAAS implementation using an Open Source Portal (JBoss) Introduction JBoss Portal is a very popular open source portal offering from Red Hat. It is JSR-168 compliant and provides
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Multi-Tenancy on Private Cloud. F e b r u a r y 2 0 1 2
Multi-Tenancy on Private Cloud F e b r u a r y 2 0 1 2 TABLE OF CONTENTS Abstract... 3 Abbreviations... 4 Market Trends/Challenges... 5 Traditional Service Delivery Model... 6 Limitations of the Traditional
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Building a SaaS Application. ReddyRaja Annareddy CTO and Founder
Building a SaaS Application ReddyRaja Annareddy CTO and Founder Introduction As cloud becomes more and more prevalent, many ISV s and enterprise are looking forward to move their services and offerings
SaaS Implementation for Technology & Business software companies
SaaS Implementation for Technology & Business software companies Primary Author s Name: Amitoj Singh Designation: Assistant Manager (Product Management), Productized Solutions Group Secondary Author Names:
Building Multi-tenant Applications with Actian PSQL
Building Multi-tenant Applications with Actian PSQL Actian PSQL White Paper May 2013 This white paper is the first in a series of papers designed to show how easily Actian PSQL can provide all the requirements
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Ruminations on Multi-Tenant Databases
To appear in BTW 2007, Aachen Germany Ruminations on Multi-Tenant Databases Dean Jacobs, Stefan Aulbach Technische Universität München Institut für Informatik - Lehrstuhl III (I3) Boltzmannstr. 3 D-85748
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Cloud Computing with Azure PaaS for Educational Institutions
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 139-144 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091
Citation: Alhamad, Mohammed and Dillon, Tharam S. and Wu, Chen and Chang, Elizabeth. 2010. Response time for cloud computing providers, in Kotsis, G. and Taniar, D. and Pardede, E. and Saleh, I. and Khalil,
VMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server
Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD)
Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD) M.Rajesh, Research Scholar, Department of Computer Science & Engg., St.Peter's University Chennai, [email protected]
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework Many corporations and Independent Software Vendors considering cloud computing adoption face a similar challenge: how should
Architectural Concerns in Multi-Tenant SaaS Applications
Architectural Concerns in Multi-Tenant SaaS Applications Rouven Krebs 1, Christof Momm 1 and Samuel Kounev 2 1 SAP AG, Dietmar-Hopp-Allee 16, 69190 Walldorf, Germany 2 Karlsruhe Institute of Technology,
BUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan [email protected] 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Multi Tenancy and Customizations Issues in e-health SaaS Applications
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod
WWT View Point Journey to the Private Cloud: Take the First Steps with FlexPod TABLE OF CONTENTS 1...EXECUTIVE OVERVIEW 2...SECTION 1: THE ROAD TO PRIVATE CLOUDS 3...SECTION 2: START WITH A STABLE INTEGRATED
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
Migrating SaaS Applications to Windows Azure
Migrating SaaS Applications to Windows Azure Lessons Learned 04.04.2012 Speaker Introduction Deepthi Raju Marketing Technology Services Deepthi joined Smartbridge in 2005 and has over twenty years of technology
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
How To Understand Cloud Computing
Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
Geoff Raines Cloud Engineer
Geoff Raines Cloud Engineer Approved for Public Release; Distribution Unlimited. 13-2170 2013 The MITRE Corporation. All rights reserved. Why are P & I important for DoD cloud services? Improves the end-to-end
Zero Downtime In Multi tenant Software as a Service Systems
Zero Downtime In Multi tenant Software as a Service Systems Toine Hurkmans Principal, Research Engineering Exact Software About Exact Software Founded 25 years ago Business Solutions for SMB space 100.000
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture
, March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,
End the Microsoft Access Chaos - Your simplified path to Oracle Application Express
End the Microsoft Access Chaos - Your simplified path to Oracle Application Express Donal Daly Senior Director, Database Tools Agenda Why Migrate from Microsoft Access? What is Oracle
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
TRANSFORMING DATA PROTECTION
TRANSFORMING DATA PROTECTION Moving from Reactive to Proactive Mark Galpin 1 Our Protection Strategy: Best Of Breed Performance LEADER HIGH-END STORAGE VMAX Low Service Level LEADER SCALE-OUT NAS STORAGE
A Framework for Migrating Traditional Web Applications into Multi-Tenant SaaS
A Framework for Migrating Traditional Web Applications into Multi-Tenant SaaS Eyad Saleh, Nuhad Shaabani, and Christoph Meinel Hasso-Plattner-Institut University of Potsdam Potsdam, Germany {eyad.saleh,
Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap.
Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap. 1 Oracle9i Documentation First-Semester 1427-1428 Definitions
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
A Prototype Implementation of Database-as-a-Service for the Cloud
A Prototype Implementation of Database-as-a-Service for the Cloud Kashif Laeeq Asst. Professor and PhD Scholar Dept. of Computer Science National University of Computer & Emerging Sciences, Karachi, Pakistan
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
A.Prof. Dr. Markus Hagenbuchner [email protected]. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner [email protected] CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
The Java EE 7 Platform and Support for the PaaS Model
The Java EE 7 Platform and Support for the PaaS Model 0. Introduction NIST [1] defines cloud computing as follows: Cloud computing is a model for enabling convenient, on-demand network access to a shared
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing
SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
Cloud Service Model. Selecting a cloud service model. Different cloud service models within the enterprise
Cloud Service Model Selecting a cloud service model Different cloud service models within the enterprise Single cloud provider AWS for IaaS Azure for PaaS Force fit all solutions into the cloud service
Cloud storage Security Mechanism with Authentication in Public Cloud
Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India
Private Cloud in Educational Institutions: An Implementation using UEC
Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,
A STUDY ON CLOUD STORAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966
How To Understand Cloud Computing
Cloud Computing: Comparison with Previous Technique and Research Challenges Nimisha Gupta Bharti Chauhan Tanvi Anand Charul Dewan Assistant Professor(IT), ABSTRACT Cloud computing has recently emerged
VIRTUALIZATION IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540
A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL
A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL *Hung-Ming Chen, Chuan-Chien Hou, and Tsung-Hsi Lin Department of Construction Engineering National Taiwan University
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history
Request for contributors Introduction to Cloud Computing https://portal.futuregrid.org/contrib/cloud-computing-class by various contributors (see last slide) Hi and thanks for your contribution! If you
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Secure Cloud Multi-tenant Applications with Cache in PaaS
Secure Cloud Multi-tenant Applications with Cache in PaaS K.R. Remesh Babu, S. Saranya and Philip Samuel Abstract Multi-tenant applications come into existence in clouds, which aims better resource utilization
Oracle Database Cloud
Oracle Database Cloud Shakeeb Rahman Database Cloud Service Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
The Trend and Challenges of Cloud Computing: A Literature Review
The Trend and Challenges of Cloud Computing: A Literature Review Doi:10.5901/ajis.2013.v2n10p9 Abstract Evwiekpaefe, Abraham E. Department of Mathematics, Computer Science Nigerian Defence Academy, Kaduna,
Category: Business Process and Integration Solution for Small Business and the Enterprise
Home About us Contact us Careers Online Resources Site Map Products Demo Center Support Customers Resources News Download Article in PDF Version Download Diagrams in PDF Version Microsoft Partner Conference
Unlocking the Commercial Potential in your Dynamics CRM Applications
Unlocking the Commercial Potential in your Dynamics CRM Applications Licensing, packaging & protecting your software A Software Potential Solution Overview InishTech 2012. All Rights Reserved. Reproduction
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist
Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
5-Layered Architecture of Cloud Database Management System
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Multi-Tenant Architecture Comparison
Multi-Tenant Architecture Comparison Jaap Kabbedijk, Michiel Pors, Slinger Jansen, and Sjaak Brinkkemper Department of Information and Computing Sciences Utrecht University, Netherlands {J.Kabbedijk, M.Pors,
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
