Soft Computing Models for Cloud Service Optimization



Similar documents
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

The NIST Definition of Cloud Computing

The NIST Definition of Cloud Computing (Draft)


See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

IS PRIVATE CLOUD A UNICORN?

Capability Paper. Today, aerospace and defense (A&D) companies find

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era ( ) Workstation Era ( ) Xerox Star 1981!

Kent State University s Cloud Strategy

White Paper on CLOUD COMPUTING

Managing Cloud Computing Risk

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:

PRIVATE CLOUD PLATFORM OPTIONS. Stephen Lee CEO, ArkiTechs Inc.

OVERVIEW Cloud Deployment Services

Cloud Computing: The Next Computing Paradigm

Introduction to Cloud Computing

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Technology & Business Overview of Cloud Computing

Analysis and Strategy for the Performance Testing in Cloud Computing

Enhancing Operational Capacities and Capabilities through Cloud Technologies

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

CLOUD COMPUTING GUIDELINES FOR LAWYERS

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing; What is it, How long has it been here, and Where is it going?

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Security & Trust in the Cloud

CHAPTER 8 CLOUD COMPUTING

Cloud Security Introduction and Overview

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

The HIPAA Security Rule: Cloudy Skies Ahead?

Private Cloud 201 How to Build a Private Cloud

THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Tutorial on Client-Server Architecture

Load Rebalancing for File System in Public Cloud Roopa R.L 1, Jyothi Patil 2

Cloud Computing An Elephant In The Dark

ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

AskAvanade: Answering the Burning Questions around Cloud Computing

Compliant Cloud Computing Managing the Risks

Compliant Cloud Computing Managing the Risks

Cloud Computing An Introduction

Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

/ WHITEPAPER / THE EVOLUTION OF CLOUD ADOPTION IN AUSTRALIA. By Melbourne IT Enterprise Services

Verifying Correctness of Trusted data in Clouds

An Introduction to Cloud Computing Concepts

Cloud Computing Technology

6 Cloud computing overview

Viswanath Nandigam Sriram Krishnan Chaitan Baru

Chapter 2 Cloud Computing

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Cloud Computing: Advantages and Security Challenges

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing Guide & Handbook. SAI USA Madhav Panwar

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

agility made possible Steven Romero Robert E Stroud

Mobile Cloud Computing Security Considerations

1. From the CIO Strategic Direction for Cloud Computing at Kent State Cloud Computing at Kent State University 5

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL

SCADA Cloud Computing

Strategies for Secure Cloud Computing

CSO Cloud Computing Study. January 2012

Radware Cloud Solutions for Enterprises. How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper

Cloud Computing Overview

Security Considerations for Public Mobile Cloud Computing

Cloud Computing Service and Legal Issues

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Future of Cloud Computing in India

CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS

Sriram Krishnan, Ph.D.

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

The Trend and Challenges of Cloud Computing: A Literature Review

Getting Familiar with Cloud Terminology. Cloud Dictionary

CLOUD COMPUTING IN RURAL EDUCATIONAL SECTOR:ENLIGHTENING BENEFITS AND CHALLENGES

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Transcription:

Soft Computing Models for Cloud Service Optimization G. Albeanu, Spiru Haret University & Fl. Popentiu-Vladicescu UNESCO Department, University of Oradea

Abstract The cloud computing paradigm has already proved a new way to do business in Information Technology field. The optimization of services (infrastructure, platform, software) according to different criteria is a necessity nowadays. This paper describes the usage of evolutionary approaches to optimize cloud computing services. CAMAI 2014 Bucharest, June 13-14, 2014 2

Soft Computing Models for Cloud Service Optimization Introduction to Cloud Computing Dynamic Voltage and Frequency Scaling Problem formulation Solving methods Comments Conclusions References CAMAI 2014 Bucharest, June 13-14, 2014 3

Introduction to Cloud Computing The NIST Definition of Cloud Computing: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. CAMAI 2014 Bucharest, June 13-14, 2014 4

Cloud computing essential characteristics (1, 2, 3) 1.On-demand self-service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. 2.Broad network access: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations) 3.Resource pooling: The provider s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. Examples of resources include storage, processing, memory, and network bandwidth. CAMAI 2014 Bucharest, June 13-14, 2014 5

Cloud computing essential characteristics (4, 5) 4. Rapid elasticity: Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. 5. Measured service: Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. CAMAI 2014 Bucharest, June 13-14, 2014 6

Cloud computing service models Software as a Service (SaaS): The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. [Examples: Google Apps, Microsoft Office 365, Innkeypos, Quickbooks Online, Limelight Video Platform etc.] Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumercreated or acquired applications created using programming languages, libraries, services, and tools supported by the provider. [Examples: Amazon Elastic Beanstalk, Cloud Foundry, Heroku, Google App Engine, Windows Azure Compute, Force.com etc.] Infrastructure as a Service (IaaS): The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. [ Examples: Google Compute Engine, Windows Azure Virtual Machines, Amazon Cloud Formation, Rackspace Cloud, Verizon Terremark etc.] CAMAI 2014 Bucharest, June 13-14, 2014 7

Cloud computing Deployment models Private cloud: The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units) - a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department. Public cloud: The cloud infrastructure is provisioned for open use by the general public. It exists on the premises of the cloud provider. http://www.vmware.com/files/pdf/vmware-public-cloud-service-definition.pdf Hybrid cloud: The cloud infrastructure is a Community cloud: The cloud composition of two or more distinct cloud infrastructure is provisioned for exclusive infrastructures (private, community, or public) use by a specific community of that remain unique entities, but are bound consumers (such as banks or heads of together by standardized or proprietary trading firms) from organizations that technology that enables data and application have shared concerns (e.g., mission, portability (e.g., cloud bursting for load security requirements, policy, and balancing between clouds) compliance considerations). CAMAI 2014 Bucharest, June 13-14, 2014 8

Cloud computing SLA/Contract A Service Level Agreement (SLA) is a formal, negotiated document that defines (or attempts to define) in quantitative (and perhaps qualitative) terms the service being offered to a Customer. Any metrics included in a SLA should be capable of being measured on a regular basis and the SLA should record by whom. A Contract is a legally binding agreement between two or more parties. Contracts are subject to specific legal interpretations. EU Commission - SLAs can be viewed as negotiated agreements between different parties /entities. As agreements, SLAs encapsulate a set of different aspects regarding the services provisioning. These refer to the agreed Quality of Service (QoS) captured through different terms, the Service Level Objectives (SLOs), the responsibilities and obligations of the parties, as well as the penalties in cases of non-compliance to the agreed terms. SLA options: Best effort (Bronze) / High availability (Silver) / Fault tolerant (Gold CAMAI 2014 Bucharest, June 13-14, 2014 9

Cloud computing Virtual machines A virtual machine (VM) is a software program or operating system that not only exhibits the behavior of a separate computer, but is also capable of performing tasks such as running applications and programs like a separate computer. A virtual machine, usually known as a guest is created within another computing environment referred as a "host." Multiple virtual machines can exist within a single host at one time. (http://www.techopedia.com/definition/4805/virtu al-machine-vm) CAMAI 2014 Bucharest, June 13-14, 2014 10

Dynamic Energy Minimization using DVFS DVFS (Dynamic Voltage and Frequency Scaling) is an efficient energy saving technique for processors during program execution time. CAMAI 2014 Bucharest, June 13-14, 2014 11

Problem formulation: Notations The Cloud Platform consists of m>0 physical machines, denoted by M[1], M[2],,M[m]. For machine M[j], its capacity c[j] (no. of instances of services) can be adapted by DVFS with energy E[j]. E[j]=Estat(j)+Edyn(j), Edyn(j)=(e[j])(c[j]) α, α in [2, 3]. The objective is to run n services S[1], S[2],, S[n] through a given time period given by SLA. To assure the necessary reliability, a number of instances (identical and independent) of every service S[i] will run concurrently on the same or different physical machine as Virtual Machine. Let A[i,j] the number of instances of S[i] running on M[j], A[j]=sum{A[i,j], i=1, 2,, n}. CAMAI 2014 Bucharest, June 13-14, 2014 12

Problem formulation: Minimum Energy Find the set of machines that are on (denoted by X, X {1, 2,, m}) and the clock frequency (f[j]) assigned to Machine M[j], represented by C[j] and an allocation A of instances (of services) to machines M[1], M[2],..., M[m] such that (i) for any j in X: A[j] leq C[j], (ii) For all services S[i], Probability (ActiveInstances of Service S[i] geq SLA[i]) geq (1 REL[i]), i.e. the probability that at least the number of instances of S mentioned by SLA[i], are running on alive machines after the time period is larger than the reliability requirement (i.e. 1 - REL[i]), (iii) and the overall energy consumption Sum{E[j], j in X} is minimized. CAMAI 2014 Bucharest, June 13-14, 2014 13

Fault Tolerant Service Mapping on Physical Machines CAMAI 2014 Bucharest, June 13-14, 2014 14

Solving Methods Greedy methods: First-FIT, Next-FIT, Best-FIT not necessary optimum solution Backtracking enumeration too many combinations Soft computing methods: a) nature-inspired methods for combinatorial optimization; b) evolutionary optimization by selection/mutation/crossover operators approximate solutions but obtained in acceptable time horizon. CAMAI 2014 Bucharest, June 13-14, 2014 15

Evolutionary searching for X/A Start with an initial configuration see the example. Use a Monte-Carlo strategy to generate an initial Population of mutants of the initial configuration. Generate successively new populations by crossover and/or random mutations. Evaluate the energy required by the configuration members. Select only the members with power consumption below some threshold. Continue to generate populations until a stopping criterion is obtained (a number of iterations, an acceptable energy level). CAMAI 2014 Bucharest, June 13-14, 2014 16

Comments Technical details are related to: encode information to support the problem s data, definition of evolutionary operators like mutation and crossover in genetic algorithms, offline analysis of the final set of configurations and select those with minimum energy. The approach is efficient when contracts describe integer quantities of resources (time, internal memory, cloud storage etc.). CAMAI 2014 Bucharest, June 13-14, 2014 17

Conclusions Energy minimization under SLA contract based in cloud computing business is important to help clients to pay low prices. Smart allocation strategies of services/tasks to physical memories based on replicates running on the same machine or on other machines will increase software/hardware reliability in order to provide services over SLA mentioned by contracts. CAMAI 2014 Bucharest, June 13-14, 2014 18

References Peter Mell, Timothy Grance, The NIST Definition of Cloud Computing, NIST Special Publication 800-145 Dimosthenis Kyriazis, Cloud Computing Service Level Agreements - Exploitation of Research Results, European Commission, July 2013. Matthias Schmidt, Niels Fallenbeck, Matthew Smith, Bernd Freisleben, Efficient Distribution of Virtual Machines for Cloud Computing, http://www.fallenbeck.net/publications/sfsf10.pdf Liang W.-Y., Lai P.-T., Chiou C.W., An Energy Conservation DVFS Algorithm for the Android Operating System, http://www.ftrai.org/joc/vol1no1/paper13- JoC_SectionE_3.pdf CAMAI 2014 Bucharest, June 13-14, 2014 19