Date post: | 09-Dec-2016 |
Category: |
Documents |
Upload: | durgesh-kumar |
View: | 212 times |
Download: | 0 times |
Cloud Computing: Survey of different utilization techniques
Uday Moghe
Computer Science and Engg. Acropolis Technical Campus,
Indore, India.
E-mail: [email protected]
Prashant Lakkadwala
Computer Science and Engg. Acropolis Technical Campus,
Indore, India.
E-mail: [email protected]
Durgesh Kumar Mishra
Sri Aurobindo Institute of
Technology, Indore, MP, India
email- [email protected]
Abstract— The Cloud computing which performs the task of
the computing and storage capacity for a service to provide
the flexibility for users. The providers manage the
infrastructure and platforms on which the applications run
by user. It relies on the sharing of resources to achieve the
coherency and scalability for the utilization. Cloud
computing relies on the network as an elementary service.
The aim of this paper is for the survey of the several
utilization techniques and some security aspects which are
used in cloud computing.
Keywords-cloud computing, coherency and scalability.
I. INTRODUCTION
Cloud computing is defined as a large – scale
distributed computing paradigm. [1] Whereas the cloud
providers or users are having their own private
infrastructure, where the several types of services are
provided to clients using virtual machines which are
hosted by providers. It includes some utilization
techniques which improves the efficiency of the system.
Some are the Network Utility, Network Activity, Disk I/O
utility, CPU utilization of a system and available memory
for perform the operation. Cloud Computing frequently is
taken to be a term that simply renames common
technologies and techniques that we have come to know
in IT. It may be interpreted to mean data center hosting
and then subsequently dismissed without catching the
improvements to hosting called utility computing that
permit near real time, policy based control of computing
resources. Or it may be interpreted to mean only data
center hosing rather than understood to be the significant
shift in Internet application architecture that it is. The
major utilization methods are related to term energy.
Cloud Computing can be visualized into three steps that
are Cloud application, Cloud Platform and Cloud
infrastructure.
In 1969, Leonard Kleinrock [2], one of the chief
scientists of the original Advanced Research Projects
Agency Network (ARPANET) project which seeded the
Internet said: “As of now, computer networks are still in
their infancy, but as they grow up and become
sophisticated, we will probably see the spread of
„computer utilities‟ which, like present electric and
telephone utilities, will service individual homes and
offices across the country.” This vision of computing
utilities based on a service provisioning model anticipated
the massive transformation of the entire computing
industry in the 21st Century whereby computing services
will be readily available on demand, like other utility
services available in today’s society.
Cloud computing based on the several utilization
techniques and the services model which are IaaS, PaaS
and SaaS. Cloud Computing includes IT resource
consolidation Web-based applications, and mobile users
who access browser- based application on mobile PC’s,
PDAs, smart phones, and a potpourri of innovative new
devices. As if this weren’t challenging enough, cloud
computing also highlights Web 2.0 technologies like
voice and video that demand high performance / low
latency connections. The network will also be essential in
cloud migration as large organizations move TBs of
internal information to public cloud providers or between
private clouds for backup and disaster recovery.
II. SECURITY ISSUES IN CLOUD COMPUTING
Cloud based It resources can be consumed for
various reasons in myriad ways. That said, the IT industry
has really railed around three standard cloud computing
services models. The security issues which are
responsible for the cloud computing are also based on the
service models that are SaaS, PaaS, IaaS. The issues are
like
1. Cloud Deployment Models:
1.1 Private Cloud: Private cloud is a new term that some vendors have
recently used to describe offerings that emulate cloud
computing on private networks. It is set up within an
organization’s internal enterprise datacenter. In the
private cloud, scalable resources and virtual applications
provided by the cloud vendor are pooled together and
available for cloud users to share and use. It differs from
the public cloud in that all the cloud resources and
applications are managed by the organization itself,
similar to Intranet functionality. Utilization on the private
cloud can be much more secure than that of the public
cloud because of its specified internal exposure. Only the
organization and designated stakeholders may have access
to operate on a specific Private cloud.[3]
1.2 Public Cloud: Public cloud describes cloud computing in the
traditional mainstream sense, whereby resources are
dynamically provisioned on a fine-grained, self-service
basis over the Internet, via web applications/web services,
from an off-site third-party provider who shares resources
and bills on a fine-grained utility computing basis. It is
typically based on a pay-per-use model, similar to a
prepaid electricity metering system which is flexible
enough to cater for spikes in demand for cloud
optimization.[4] Public clouds are less secure than the
other cloud models because it places an additional burden
of ensuring all applications and data accessed on the
public cloud are not subjected to malicious attacks.
1.3 Hybrid Cloud: Hybrid cloud is a private cloud linked to one or more
external cloud services, centrally managed, provisioned as
a single unit, and circumscribed by a secure network [5].
It provides virtual IT solutions through a mix of both
public and private clouds. Hybrid Cloud provides more
secure control of the data and applications and allows
various parties to access information over the Internet. It
also has an open architecture that allows interfaces with
other management systems. Hybrid cloud can describe
configuration combining a local device, such as a Plug
computer with cloud services.
2. Cloud Computing Service Models:
2.1 Infrastructure – as – a—Service (IaaS): The most basic service model, aligning the on
demand resources of the cloud with tactical IT needs. IaaS
is similar to managed services offering of the Internet era
(i.e., Hosting services, storage service providers, etc.).
2.2 Platform – as – a – Service (PaaS): PaaS provides the capability to build or deploy
applications on top of IaaS. A cloud computing provider
offers multiple application components that align with
specific development models and programming tools.
PaaS offers Microsoft based stack (i.e. Windows, .Net,
IIS, SQLServer, etc.) or an open source based stack (i.e.
the “LAMP” stack containing Linux, Apache, MySQL
and PHP).
2.3 Software – as – a – Service (SaaS): An entire business or set of IT applications runs in
the cloud. Enterprise consumers outsource the entire
underlying technology infrastructure to a SaaS provider
and thus have no responsibility or management oversight
for SaaS – based IT components. Examples include Gmail
from Google, Microsoft “live” offerings, and
salesforce.com. Shown in figure 1.
Figure 1. Cloud Triangle
3. Cloud consumption model: The most fundamental level of cloud computing
provides the flexible, real time access to shared pool of
computing resources (ex., networks, servers, storage, and
applications and services of cloud computing). One of the
main attractions of cloud computing is its capability to
provide on--‐demand IT resources and services offering
rapid provision and de- provisioning as well as “pay by
the drink” pricing.[6]
3.1 On--‐demand self--‐service: A consumer can unilaterally provision computing
capabilities such as server time and network storage as
needed. This can happen automatically, without human
interaction, system administration, or service provider
support.
3.2 Broad network access: Capabilities are available over the network and
accessed through standard mechanisms that promote use
by heterogeneous thin or thick client platforms (e.g.,
mobile phones, laptops, and PDAs).
3.3 Resource pooling: The provider’s computing resources are pooled to
serve multiple consumers using a multi--‐tenant model,
with different physical and virtual resources dynamically
assigned and reassigned according to consumer demand.
(e.g., country, state, or data center). Examples of
resources include storage, processing, memory, network
bandwidth, and virtual machines.
3.4 Rapid elasticity: Capabilities can be rapidly and elastically
provisioned, in some cases automatically, to quickly scale
out and then rapidly released to quickly scale in. To the
consumer, the capabilities available for provisioning often
appear to be unlimited and can be purchased in any
quantity at any time.
3.5 Measured service: Cloud systems automatically control and optimize
resource use by leveraging a metering capability at some
level of abstraction appropriate to the type of service (e.g.,
storage, processing, bandwidth, and active user accounts).
Resource usage can be monitored, controlled, and
reported providing transparency for both the provider and
consumer of the utilized service.
III. CLOUD SECURITY REFERENCE ARCHITECTURE
To ensure the adequate security and optimal
functionality cloud computing models consider this
reference model. The architecture is very useful for
understanding to provide a complete solution by
combining the various recommendations. [7]
1. Security profile per compute profile: Administrators should communicate enterprise
corporate security policy and server tier firewall rules that
are defined within a vApp to the service provider.
2. Security DMZ for vApp: The service provider needs to validate the patch level
and security level prior to bringing a vApp into the
production environment. The VMware vCloud reference
architecture includes a DMZ area for validating the vApp.
3. OS management: It is important to understand the security hardening
performed around the service provider’s library of OSs
and patching policies. Administrators should update
traditional security policies that govern the service
provider’s hosting environment to ensure that virtual
machines are hardened and patched within the standard
enterprise policies.
4. Resource management: The service provider needs to separate and isolate the
resources each customer virtual machine uses from other
customers’ virtual machine resources to prevent DDoS
attacks. These attacks are usually caused by log files not
having limits or CPU or memory utilization increasing on
a single virtual machine through memory leaks or poorly
behaving applications.
Figure 2. Cloud Architecture for Security
5. Security profile per network: In addition to the vApp having a compute security
profile, there should also be a network security profile to
ensure perimeter and Web access security as shown in
figure 2. This includes functionality like switch and router
Access Control Lists (ACLs), perimeter firewall rules, or
Web application security (Application Firewall, URL
Filtering, white list and blacklists).
6. Data security: Enterprises should request service providers provide
access paths to only the physical servers that must have
access to maintain the desired functionality. Service
providers should accomplish this through the SAN N-Port
ID virtualization (NPIV), LUN masking, access lists and
permission configurations.
7. Security authentication, authorization and
auditing: Cloud service provider environments require tight
integration with enterprise policies around individual and
group access, authentication and auditing (AAA). This
involves integrating corporate directories and group
policies with the service provider’s policies.
IV. WORK DONE [UTILIZATION TECHNIQUES]
1. CPU Utilization: One of the major causes of energy in efficiency in
data centers is the idle power wasted when servers runs at
low utilization. Even at a very low load, such as 10%
CPU utilization, the power consumed is over 50% of the
peak power. [8] Similarly, if the disk, network or
resources gives the performance to bottleneck, the
wastage of idle power for other resources goes up. So, this
allows for consolidation of application workloads on a
smaller number of servers that may be performed better
utilized as different workloads and may have different
resource utilization footprints and further differ in their
temporal variations.
2. Network Utilization: The home network has become recognized as the fore
front of the networking revolution, where consumer
technology and internet infrastructure intersect to change
the way we lead our lives. A fast growing increase in the
uses of home networks has been noticed, for example
recent research from Pike Research predicts a strong
growth in the intelligent lighting control market. Global
revenue is expected to increase from $ 1.3 billion to $ 2.6
billion by 2016 in intelligent lights.[9] In fact, home
network would consist of everything a homeowner could
imagine, ranging from large domestic appliances such as
the fridges, microwaves, audio – visual equipment to the
light weight temperature and smoke sensor. The main
goal of interconnecting the home devices together is to
share the network services and resources, and to invoke
them remotely. Many protocols have been proposed to
achieve this purpose which is located and invoke the
services and resources in network known as discovery
protocols. [10] Most of the service discovery protocols
rely on the exchange of messages to locate remote
services and to provide access to them. Sending too many
messages into the network from multiple nodes at the
same time, could cause congestion which will lead to
router queue overflow and the loss of messages.
V. CONCLUSION
Cloud computing has recently emerged as a paradigm
for managing and delivering services over the internet.
The rise of this technology is changing rapidly the way of
IT, and providing the promise for computation of utilities
in a reality.
The benefits offered by this technology, the current
technologies are not matured enough to realize its full
potential. So many challenges are here in this domain,
including power management, security management, are
only starting to receive attention from the research
community.
In this paper, we have surveyed the utilization
techniques of cloud computing, and covering some
essential concepts architectural design, as well as security
reference model. We hope our work will provide a better
understanding the design and techniques of cloud
computing, and used the way for further research in this
area.
REFERENCES
[1] Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud
computing and grid computing 360-degree compared”,
GCE Workshop, pp. 1–10, 2008.
[2] L. Kleinrock. A Vision for the Internet. ST Journal of
Research, 2(1):4-5, Nov. 2005.
[3] S. Arnold (2009, Jul.). “Cloud computing and the
issue of privacy.” KM World, pp14-22. Available:
www.kmworld.com [Aug. 19, 2009].
[4] A Platform Computing Whitepaper. “Enterprise Cloud
Computing: Transforming IT.” Platform Computing,
pp6, 2010.
[5] Global Netoptex Incorporated. “Demystifying the
cloud. Important opportunities, crucial choices.” pp4-
14. Available: http://www.gni.com [Dec. 13, 2009].
[6] Jon Oltsik, What’s Need for Cloud Computing?,
”Focus On Newtorking & WAN Optimization”, June
2010.
[7] Savvis_vmw_whitepaper_0809
[8] CHEN, G., et al. Energy-aware server provisioning
and load dispatching for connection-intensive internet
services. In NSDI (2008).
[9] Jim Edwards and Stephen Murtha, “DLNA Home
Networked Interoperability Guidelines”, Expanded
2006.
[10] Al-Mejibli, I and Colley, M, “Evaluating
transmission Time of Service Discovery Protocols by
using NS2 Simulator”, Wireless Advanced (WiAD),
2010 6th
Conference on London.