A Naïve Approach for Managing Virtualized Resources and Optimistic cost



Similar documents
Implementing XML-based Role and Schema Migration Scheme for Clouds

Public Cloud Offerings and Private Cloud Options. Week 2 Lecture 4. M. Ali Babar

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing Services and its Application

Grid Computing Vs. Cloud Computing

Framework for Intelligent Crawler Engine on IaaS Cloud Service Model

Cloud Computing Technology

White Paper on CLOUD COMPUTING

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

Software as a Service (SaaS) and Platform as a Service (PaaS) (ENCS 691K Chapter 1)


Optimal Service Pricing for a Cloud Cache

CLOUD COMPUTING. When It's smarter to rent than to buy

Users VM A A A. Application. Compute/Storage/Network. VM Virtual Machine. On-Premises Data Center

NCTA Cloud Architecture

CHAPTER 8 CLOUD COMPUTING

ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm

Session 3. the Cloud Stack, SaaS, PaaS, IaaS

Comparison of Open Source Cloud System for Small and Medium Sized Enterprises

Enforcing End-to-end Application Security in the Cloud

Building Out Your Cloud-Ready Solutions. Clark D. Richey, Jr., Principal Technologist, DoD

CLOUD COMPUTING IN HIGHER EDUCATION

Role of Cloud Computing in Education

Cloud Computing Now and the Future Development of the IaaS

International Journal of Engineering Research & Management Technology

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

An Introduction to Private Cloud

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing. Chapter 1 Introducing Cloud Computing

A STUDY ON CLOUD STORAGE

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

Cloud Computing and Attacks

Cloud deployment model and cost analysis in Multicloud

Cloud Computing. Cloud computing:

How To Understand Cloud Computing

Cloud Computing Architecture: A Survey

Cloud Computing An Elephant In The Dark

Oracle Applications and Cloud Computing - Future Direction

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

Cloud Computing Architectures and Design Issues

Cloud computing - Architecting in the cloud

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

VIRTUALIZATION IN CLOUD COMPUTING

CDBMS Physical Layer issue: Load Balancing

Lecture 02a Cloud Computing I

Cloud Computing An Introduction

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series

Scientific and Technical Applications as a Service in the Cloud

Service Component Architecture for Building Cloud Services

Building Blocks of the Private Cloud

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Service allocation in Cloud Environment: A Migration Approach

The Private Cloud Your Controlled Access Infrastructure

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

CPS221 Lecture: Cloud Computing last revised 10/22/14 Objectives

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

How To Understand Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

From Grid Computing to Cloud Computing & Security Issues in Cloud Computing

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Enhancing Operational Capacities and Capabilities through Cloud Technologies

Keywords Cloud computing, virtual machines, migration approach, deployment modeling

What is Cloud Computing? Why call it Cloud Computing?

Infrastructure as a Service (IaaS)

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

1. Introduction. 2. Background Cloud computing in a nutshell

[Sudhagar*, 5(5): May, 2016] ISSN: Impact Factor: 3.785

Cloud Computing in Higher Education: Impact and Challenges

Cloud Computing. Chapter 1 Introducing Cloud Computing

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing

Sistemi Operativi e Reti. Cloud Computing

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

How To Understand Cloud Computing

Introduction to Cloud computing. Viet Tran

INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

Cloud Hosting. QCLUG presentation - Aaron Johnson. Amazon AWS Heroku OpenShift

Windows Azure and private cloud

TOWARDS AN EFFICIENT DISTRIBUTED CLOUD ARCHITECTURE PRAVEEN KHETHAVATH

Transcription:

International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 167-171 International Research Publications House http://www. ripublication.com A Naïve Approach for Managing Virtualized Resources and Optimistic cost T.L. Surekha, Ch. Srividya, P. Ramadevi, D. Madhavi Lecturers, Dept of I.T., V.R. Siddhartha Engineering College, Kanuru,Vijayawada 7, A.P., India Abstract: Cloud computing has drawn much attention in recent years. One of its delivery models, called infrastructure as a service (IaaS), provides users with infrastructure services such as computation and data storage, heavily dependent upon virtualization techniques that offers benefits such as elasticity and cost efficiency. The cloud computing service providers ultimate goal is to provide maximum profits by offering cloud computing resources. We built system cost function for this queueing model. Based on the queuing model and system cost function, considering the goals of both the Cloud Computing service users and providers, we gave the corresponding strategy and algorithm to get the approximate optimistic value of service for each job in the corresponding nopreemptive priority queuing model. Most of current IaaS service providers have adopted a user-based service model, where users are directly mapped to virtualized resources that they want to use and they are charged based on usage. Hence, user and resource management are centralized and easily administered at the IaaS provider. However, this also results in the lack of support for scalable management of users and resources, organization-level security policy, let alone flexible pricing model. Considering the increasing popularity of cloud computing, there is a strong need for a more scalable and flexible IaaS model, along with a more fine grained access control mechanism. In this paper we propose a model for provisioning and managing users and virtualized resources in IaaS to address this issue. Specifically, an additional layer is introduced to the userbased service model, and the additional layer facilitates the de-centralization of user and virtualized resource management in IaaS. The basic idea behind role-based access control (RBAC) is to use the intermediary concept called role to provide an indirection mechanism between users and permissions. This indirection mechanism helps reduce errors in

168 T.L. Surekha et al user/permission management, support advanced features such as constraints and role hierarchy, and allow for convenient user/permission management schemes such as role-based administration and delegation. It has been also used and implemented to support the decentralization of access control management. Background and Related work: The general characteristics of cloud computing include on demand service, ubiquitous access, location independence, rapid elasticity, and measured service. To support these characteristics, cloud computing generally consists of three foundational components and three optional, applied components depending on its deployment models. The three foundational components are essentially those that are needed to build a collection of physical/virtualized, distributed servers for providing cloud services. They are 1) hardware and facilities,2) software kernel, and 3) virtualization, as shown in the lower part of Figure 1. The three applied components characterize and classify the services and applications of cloud computing. They are 1) computation and storage resource, 2) cloud software development platform, and 3) cloud software application. The computation and storage resource component concerns the deployment model called Infrastructure as a Service (IaaS), the cloud software development platform component pertains to another deployment model called Platform as a Service (PaaS), and the cloud software application component is related to the deployment model called Software as a Service (SaaS). Their differences are as follows; first, in the SaaS model, the cloud consumer can use the cloud provider's applications running on a cloud infrastructure which are accessible through a client interface such as a web browser. Typical examples of this type are Google Docs and Salesforce applications; in the PaaS model, the consumer can deploy onto the cloud infrastructure consumer created applications using programming languages and tools supported by the provider. Some of the examples of this type include Google App

A Naïve Approach for Managing Virtualized Resources and Optimistic cost 169 Engine and Windows Azure and,lastly in the IaaS model, the consumer provisions processing, storage, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software. Amazon EC2 & S3 and Eucalyptus are the examples of this type. The successful implementation of cloud infrastructure requires that both foundational and applied components work together seamlessly. Role-based security policy has attracted considerable attention in computer security communities over the last two decades, and it has grown to be a proven solution for managing access control in a simple, flexible, and convenient manner. The basic idea behind role-based access control (RBAC) is to use the intermediary concept called role to provide an indirection mechanism between users and permissions. This indirection mechanism helps reduce errors in user/permission management, support advanced features such as constraints and role hierarchy, and allow for convenient user/permission management schemes such as role-based administration and delegation. RBAC has been successfully implemented in many commercial systems including different flavors of operating systems, database systems, enterprise- based web applications. It has been also used and implemented to support the decentralization of access control management. OUR APPROACH: In order to support a scalable, decentralized, policy-driven scheme for IaaS, we propose a additional layer for managing users and virtualized resource in this section. First, we present the formal definitions of IaaS components along with the introduction to the notion of domain. Then redefinitions of some of role-based policy constructs follow. laas Components: The component of IaaS that we are most interested in for our approach is virtualized resources such as virtual machine (VM) types based on different configurations, operating system images, ramdisk images, and networking capabilities including elastic IP addresses. These kinds of virtualized resources can be found very commonly in existing IaaS platforms, with the slightly varying degree of their abstraction. Definition 1: Let vn = {vrl'..., vrl} denote a set of virtualized resources. A virtualized resource is represented by n-tuple, where n denotes the number of different kinds of virtualized resources serviced in the IaaS platform Definition 2: Let U = {Ul'..., un} denote a set of cloud users that can be uniquely identified. uvn = u x vn represents the relation of cloud user-to-virtualized resource, and the function fuv R: U -+ 2 VR maps a cloud user to a set of virtual resource Definition 3: Let D = {d1,..., di} denote a set of RBAC domains. UD = U x D represents the relation of cloud user to- domain, and the cloud user may or may not be associated with a domain. Similarly, DVR = D x VR represents the relation of domain-to-virtualized resource, and the virtualized resource may or may not be assigned to a domain. Lastly, UVRv represents the ternary relation of cloud user-

170 T.L. Surekha et al domainvirtual resource, and the function fuv RD: U x D --- > 2 VR maps a pair of user and associated domain to a set of virtual resource. We introduce an additional layer which performs domain-based administrative delegation, security, and user & resource management and most importantly scheduling. The jobs come to the server with a Poisson distribution at a certain rate, while the process time to each job by the server is in accord with a general distribution.the algorithm is illustrated below Assign each class in different priority with service µ 0 i =t 2 i /2t i until T i < T i tolerant ; where µ 0 i stands for the minimum Cloud resources that assign to class i. This procedure will guarantee the QoS for the jobs in each class. (2) For a given determined Cloud Computing environment, according to survey from the Cloud Computing service provider, set the value of Ψ i,δ i for each class with different priority; and give a very small convergence value Є 3)calculate the value of ώ s by equation 4.) Increase each µ i (assign more Cloud resources to class i ), and get the value of cost function 5.)Calculate the value of Conclusion: In this paper we have discussed a novel approach to managing virtualized resources in

A Naïve Approach for Managing Virtualized Resources and Optimistic cost 171 cloud computing by introducing the notion of domain and injecting a role-based security policy support into the IaaS service model. Specifically, our approach adds an additional layer of domain to the current user-resource direct mapping mapping, and the cloud service provider delegates its administrative functions to each domain, and the domain administrator further manages users and allocated virtualized resources. References: [1] [1]E. S. Barka and R. S. Sandhu, "Framework for role-based delegation models," in Proceedings of i6th Annual Computer Security Application Conference, New Orleans, LA, December 2000. [2] [2] N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, and K. Moody, [3] "Using trust and risk in role-based access control policies," in Proceedings of 9th ACM Symposium on Access Control Models and Technologies, Yorktown, NY, June 2004. [4] [3] ITU, itu-t Recommendation X 509. information Technology: Open Systems interconnection - T he DirectolY: Public-Key And Attribute Certificate Frameworks, 2000, iso/lec 9594-8. [5] [4] D. Shin, G.-J. Ahn, and S. Cho, "Role-based EAM using x.509 attribute certificate," in Proceedings of Sixteenth Annual iffp WG il.3 Working Conference on Data and Application Security, Cambridge, UK, July 29-31 2002. [6] [5] RBAC support for Nebula, http://nebula.nasa.govlblog/2010/jun/nebulasimplementation-of-role-basedaccess-control.

172 T.L. Surekha et al