+ All Categories
Home > Documents > [IEEE 2012 CSI Sixth International Conference on Software Engineering (CONSEG) - Indore, Madhay...

[IEEE 2012 CSI Sixth International Conference on Software Engineering (CONSEG) - Indore, Madhay...

Date post: 09-Dec-2016
Category:
Upload: durgesh-kumar
View: 212 times
Download: 0 times
Share this document with a friend
4
Cloud Computing: Survey of different utilization techniques Uday Moghe Computer Science and Engg. Acropolis Technical Campus, Indore, India. E-mail: [email protected] Prashant Lakkadwala Computer Science and Engg. Acropolis Technical Campus, Indore, India. E-mail: [email protected] Durgesh Kumar Mishra Sri Aurobindo Institute of Technology, Indore, MP, India email- [email protected] Abstract— The Cloud computing which performs the task of the computing and storage capacity for a service to provide the flexibility for users. The providers manage the infrastructure and platforms on which the applications run by user. It relies on the sharing of resources to achieve the coherency and scalability for the utilization. Cloud computing relies on the network as an elementary service. The aim of this paper is for the survey of the several utilization techniques and some security aspects which are used in cloud computing. Keywords-cloud computing, coherency and scalability. I. INTRODUCTION Cloud computing is defined as a large – scale distributed computing paradigm. [1] Whereas the cloud providers or users are having their own private infrastructure, where the several types of services are provided to clients using virtual machines which are hosted by providers. It includes some utilization techniques which improves the efficiency of the system. Some are the Network Utility, Network Activity, Disk I/O utility, CPU utilization of a system and available memory for perform the operation. Cloud Computing frequently is taken to be a term that simply renames common technologies and techniques that we have come to know in IT. It may be interpreted to mean data center hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that permit near real time, policy based control of computing resources. Or it may be interpreted to mean only data center hosing rather than understood to be the significant shift in Internet application architecture that it is. The major utilization methods are related to term energy. Cloud Computing can be visualized into three steps that are Cloud application, Cloud Platform and Cloud infrastructure. In 1969, Leonard Kleinrock [2], one of the chief scientists of the original Advanced Research Projects Agency Network (ARPANET) project which seeded the Internet said: “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of „computer utilities‟ which, like present electric and telephone utilities, will service individual homes and offices across the country.” This vision of computing utilities based on a service provisioning model anticipated the massive transformation of the entire computing industry in the 21 st Century whereby computing services will be readily available on demand, like other utility services available in today’s society. Cloud computing based on the several utilization techniques and the services model which are IaaS, PaaS and SaaS. Cloud Computing includes IT resource consolidation Web-based applications, and mobile users who access browser- based application on mobile PC’s, PDAs, smart phones, and a potpourri of innovative new devices. As if this weren’t challenging enough, cloud computing also highlights Web 2.0 technologies like voice and video that demand high performance / low latency connections. The network will also be essential in cloud migration as large organizations move TBs of internal information to public cloud providers or between private clouds for backup and disaster recovery. II. SECURITY ISSUES IN CLOUD COMPUTING Cloud based It resources can be consumed for various reasons in myriad ways. That said, the IT industry has really railed around three standard cloud computing services models. The security issues which are responsible for the cloud computing are also based on the service models that are SaaS, PaaS, IaaS. The issues are like 1. Cloud Deployment Models: 1.1 Private Cloud: Private cloud is a new term that some vendors have recently used to describe offerings that emulate cloud computing on private networks. It is set up within an organization’s internal enterprise datacenter. In the private cloud, scalable resources and virtual applications provided by the cloud vendor are pooled together and available for cloud users to share and use. It differs from the public cloud in that all the cloud resources and applications are managed by the organization itself, similar to Intranet functionality. Utilization on the private cloud can be much more secure than that of the public cloud because of its specified internal exposure. Only the
Transcript
Page 1: [IEEE 2012 CSI Sixth International Conference on Software Engineering (CONSEG) - Indore, Madhay Pradesh, India (2012.09.5-2012.09.7)] 2012 CSI Sixth International Conference on Software

Cloud Computing: Survey of different utilization techniques

Uday Moghe

Computer Science and Engg. Acropolis Technical Campus,

Indore, India.

E-mail: [email protected]

Prashant Lakkadwala

Computer Science and Engg. Acropolis Technical Campus,

Indore, India.

E-mail: [email protected]

Durgesh Kumar Mishra

Sri Aurobindo Institute of

Technology, Indore, MP, India

email- [email protected]

Abstract— The Cloud computing which performs the task of

the computing and storage capacity for a service to provide

the flexibility for users. The providers manage the

infrastructure and platforms on which the applications run

by user. It relies on the sharing of resources to achieve the

coherency and scalability for the utilization. Cloud

computing relies on the network as an elementary service.

The aim of this paper is for the survey of the several

utilization techniques and some security aspects which are

used in cloud computing.

Keywords-cloud computing, coherency and scalability.

I. INTRODUCTION

Cloud computing is defined as a large – scale

distributed computing paradigm. [1] Whereas the cloud

providers or users are having their own private

infrastructure, where the several types of services are

provided to clients using virtual machines which are

hosted by providers. It includes some utilization

techniques which improves the efficiency of the system.

Some are the Network Utility, Network Activity, Disk I/O

utility, CPU utilization of a system and available memory

for perform the operation. Cloud Computing frequently is

taken to be a term that simply renames common

technologies and techniques that we have come to know

in IT. It may be interpreted to mean data center hosting

and then subsequently dismissed without catching the

improvements to hosting called utility computing that

permit near real time, policy based control of computing

resources. Or it may be interpreted to mean only data

center hosing rather than understood to be the significant

shift in Internet application architecture that it is. The

major utilization methods are related to term energy.

Cloud Computing can be visualized into three steps that

are Cloud application, Cloud Platform and Cloud

infrastructure.

In 1969, Leonard Kleinrock [2], one of the chief

scientists of the original Advanced Research Projects

Agency Network (ARPANET) project which seeded the

Internet said: “As of now, computer networks are still in

their infancy, but as they grow up and become

sophisticated, we will probably see the spread of

„computer utilities‟ which, like present electric and

telephone utilities, will service individual homes and

offices across the country.” This vision of computing

utilities based on a service provisioning model anticipated

the massive transformation of the entire computing

industry in the 21st Century whereby computing services

will be readily available on demand, like other utility

services available in today’s society.

Cloud computing based on the several utilization

techniques and the services model which are IaaS, PaaS

and SaaS. Cloud Computing includes IT resource

consolidation Web-based applications, and mobile users

who access browser- based application on mobile PC’s,

PDAs, smart phones, and a potpourri of innovative new

devices. As if this weren’t challenging enough, cloud

computing also highlights Web 2.0 technologies like

voice and video that demand high performance / low

latency connections. The network will also be essential in

cloud migration as large organizations move TBs of

internal information to public cloud providers or between

private clouds for backup and disaster recovery.

II. SECURITY ISSUES IN CLOUD COMPUTING

Cloud based It resources can be consumed for

various reasons in myriad ways. That said, the IT industry

has really railed around three standard cloud computing

services models. The security issues which are

responsible for the cloud computing are also based on the

service models that are SaaS, PaaS, IaaS. The issues are

like

1. Cloud Deployment Models:

1.1 Private Cloud: Private cloud is a new term that some vendors have

recently used to describe offerings that emulate cloud

computing on private networks. It is set up within an

organization’s internal enterprise datacenter. In the

private cloud, scalable resources and virtual applications

provided by the cloud vendor are pooled together and

available for cloud users to share and use. It differs from

the public cloud in that all the cloud resources and

applications are managed by the organization itself,

similar to Intranet functionality. Utilization on the private

cloud can be much more secure than that of the public

cloud because of its specified internal exposure. Only the

Page 2: [IEEE 2012 CSI Sixth International Conference on Software Engineering (CONSEG) - Indore, Madhay Pradesh, India (2012.09.5-2012.09.7)] 2012 CSI Sixth International Conference on Software

organization and designated stakeholders may have access

to operate on a specific Private cloud.[3]

1.2 Public Cloud: Public cloud describes cloud computing in the

traditional mainstream sense, whereby resources are

dynamically provisioned on a fine-grained, self-service

basis over the Internet, via web applications/web services,

from an off-site third-party provider who shares resources

and bills on a fine-grained utility computing basis. It is

typically based on a pay-per-use model, similar to a

prepaid electricity metering system which is flexible

enough to cater for spikes in demand for cloud

optimization.[4] Public clouds are less secure than the

other cloud models because it places an additional burden

of ensuring all applications and data accessed on the

public cloud are not subjected to malicious attacks.

1.3 Hybrid Cloud: Hybrid cloud is a private cloud linked to one or more

external cloud services, centrally managed, provisioned as

a single unit, and circumscribed by a secure network [5].

It provides virtual IT solutions through a mix of both

public and private clouds. Hybrid Cloud provides more

secure control of the data and applications and allows

various parties to access information over the Internet. It

also has an open architecture that allows interfaces with

other management systems. Hybrid cloud can describe

configuration combining a local device, such as a Plug

computer with cloud services.

2. Cloud Computing Service Models:

2.1 Infrastructure – as – a—Service (IaaS): The most basic service model, aligning the on

demand resources of the cloud with tactical IT needs. IaaS

is similar to managed services offering of the Internet era

(i.e., Hosting services, storage service providers, etc.).

2.2 Platform – as – a – Service (PaaS): PaaS provides the capability to build or deploy

applications on top of IaaS. A cloud computing provider

offers multiple application components that align with

specific development models and programming tools.

PaaS offers Microsoft based stack (i.e. Windows, .Net,

IIS, SQLServer, etc.) or an open source based stack (i.e.

the “LAMP” stack containing Linux, Apache, MySQL

and PHP).

2.3 Software – as – a – Service (SaaS): An entire business or set of IT applications runs in

the cloud. Enterprise consumers outsource the entire

underlying technology infrastructure to a SaaS provider

and thus have no responsibility or management oversight

for SaaS – based IT components. Examples include Gmail

from Google, Microsoft “live” offerings, and

salesforce.com. Shown in figure 1.

Figure 1. Cloud Triangle

3. Cloud consumption model: The most fundamental level of cloud computing

provides the flexible, real time access to shared pool of

computing resources (ex., networks, servers, storage, and

applications and services of cloud computing). One of the

main attractions of cloud computing is its capability to

provide on--‐demand IT resources and services offering

rapid provision and de- provisioning as well as “pay by

the drink” pricing.[6]

3.1 On--‐demand self--‐service: A consumer can unilaterally provision computing

capabilities such as server time and network storage as

needed. This can happen automatically, without human

interaction, system administration, or service provider

support.

3.2 Broad network access: Capabilities are available over the network and

accessed through standard mechanisms that promote use

by heterogeneous thin or thick client platforms (e.g.,

mobile phones, laptops, and PDAs).

3.3 Resource pooling: The provider’s computing resources are pooled to

serve multiple consumers using a multi--‐tenant model,

with different physical and virtual resources dynamically

assigned and reassigned according to consumer demand.

Page 3: [IEEE 2012 CSI Sixth International Conference on Software Engineering (CONSEG) - Indore, Madhay Pradesh, India (2012.09.5-2012.09.7)] 2012 CSI Sixth International Conference on Software

(e.g., country, state, or data center). Examples of

resources include storage, processing, memory, network

bandwidth, and virtual machines.

3.4 Rapid elasticity: Capabilities can be rapidly and elastically

provisioned, in some cases automatically, to quickly scale

out and then rapidly released to quickly scale in. To the

consumer, the capabilities available for provisioning often

appear to be unlimited and can be purchased in any

quantity at any time.

3.5 Measured service: Cloud systems automatically control and optimize

resource use by leveraging a metering capability at some

level of abstraction appropriate to the type of service (e.g.,

storage, processing, bandwidth, and active user accounts).

Resource usage can be monitored, controlled, and

reported providing transparency for both the provider and

consumer of the utilized service.

III. CLOUD SECURITY REFERENCE ARCHITECTURE

To ensure the adequate security and optimal

functionality cloud computing models consider this

reference model. The architecture is very useful for

understanding to provide a complete solution by

combining the various recommendations. [7]

1. Security profile per compute profile: Administrators should communicate enterprise

corporate security policy and server tier firewall rules that

are defined within a vApp to the service provider.

2. Security DMZ for vApp: The service provider needs to validate the patch level

and security level prior to bringing a vApp into the

production environment. The VMware vCloud reference

architecture includes a DMZ area for validating the vApp.

3. OS management: It is important to understand the security hardening

performed around the service provider’s library of OSs

and patching policies. Administrators should update

traditional security policies that govern the service

provider’s hosting environment to ensure that virtual

machines are hardened and patched within the standard

enterprise policies.

4. Resource management: The service provider needs to separate and isolate the

resources each customer virtual machine uses from other

customers’ virtual machine resources to prevent DDoS

attacks. These attacks are usually caused by log files not

having limits or CPU or memory utilization increasing on

a single virtual machine through memory leaks or poorly

behaving applications.

Figure 2. Cloud Architecture for Security

5. Security profile per network: In addition to the vApp having a compute security

profile, there should also be a network security profile to

ensure perimeter and Web access security as shown in

figure 2. This includes functionality like switch and router

Access Control Lists (ACLs), perimeter firewall rules, or

Web application security (Application Firewall, URL

Filtering, white list and blacklists).

6. Data security: Enterprises should request service providers provide

access paths to only the physical servers that must have

access to maintain the desired functionality. Service

Page 4: [IEEE 2012 CSI Sixth International Conference on Software Engineering (CONSEG) - Indore, Madhay Pradesh, India (2012.09.5-2012.09.7)] 2012 CSI Sixth International Conference on Software

providers should accomplish this through the SAN N-Port

ID virtualization (NPIV), LUN masking, access lists and

permission configurations.

7. Security authentication, authorization and

auditing: Cloud service provider environments require tight

integration with enterprise policies around individual and

group access, authentication and auditing (AAA). This

involves integrating corporate directories and group

policies with the service provider’s policies.

IV. WORK DONE [UTILIZATION TECHNIQUES]

1. CPU Utilization: One of the major causes of energy in efficiency in

data centers is the idle power wasted when servers runs at

low utilization. Even at a very low load, such as 10%

CPU utilization, the power consumed is over 50% of the

peak power. [8] Similarly, if the disk, network or

resources gives the performance to bottleneck, the

wastage of idle power for other resources goes up. So, this

allows for consolidation of application workloads on a

smaller number of servers that may be performed better

utilized as different workloads and may have different

resource utilization footprints and further differ in their

temporal variations.

2. Network Utilization: The home network has become recognized as the fore

front of the networking revolution, where consumer

technology and internet infrastructure intersect to change

the way we lead our lives. A fast growing increase in the

uses of home networks has been noticed, for example

recent research from Pike Research predicts a strong

growth in the intelligent lighting control market. Global

revenue is expected to increase from $ 1.3 billion to $ 2.6

billion by 2016 in intelligent lights.[9] In fact, home

network would consist of everything a homeowner could

imagine, ranging from large domestic appliances such as

the fridges, microwaves, audio – visual equipment to the

light weight temperature and smoke sensor. The main

goal of interconnecting the home devices together is to

share the network services and resources, and to invoke

them remotely. Many protocols have been proposed to

achieve this purpose which is located and invoke the

services and resources in network known as discovery

protocols. [10] Most of the service discovery protocols

rely on the exchange of messages to locate remote

services and to provide access to them. Sending too many

messages into the network from multiple nodes at the

same time, could cause congestion which will lead to

router queue overflow and the loss of messages.

V. CONCLUSION

Cloud computing has recently emerged as a paradigm

for managing and delivering services over the internet.

The rise of this technology is changing rapidly the way of

IT, and providing the promise for computation of utilities

in a reality.

The benefits offered by this technology, the current

technologies are not matured enough to realize its full

potential. So many challenges are here in this domain,

including power management, security management, are

only starting to receive attention from the research

community.

In this paper, we have surveyed the utilization

techniques of cloud computing, and covering some

essential concepts architectural design, as well as security

reference model. We hope our work will provide a better

understanding the design and techniques of cloud

computing, and used the way for further research in this

area.

REFERENCES

[1] Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud

computing and grid computing 360-degree compared”,

GCE Workshop, pp. 1–10, 2008.

[2] L. Kleinrock. A Vision for the Internet. ST Journal of

Research, 2(1):4-5, Nov. 2005.

[3] S. Arnold (2009, Jul.). “Cloud computing and the

issue of privacy.” KM World, pp14-22. Available:

www.kmworld.com [Aug. 19, 2009].

[4] A Platform Computing Whitepaper. “Enterprise Cloud

Computing: Transforming IT.” Platform Computing,

pp6, 2010.

[5] Global Netoptex Incorporated. “Demystifying the

cloud. Important opportunities, crucial choices.” pp4-

14. Available: http://www.gni.com [Dec. 13, 2009].

[6] Jon Oltsik, What’s Need for Cloud Computing?,

”Focus On Newtorking & WAN Optimization”, June

2010.

[7] Savvis_vmw_whitepaper_0809

[8] CHEN, G., et al. Energy-aware server provisioning

and load dispatching for connection-intensive internet

services. In NSDI (2008).

[9] Jim Edwards and Stephen Murtha, “DLNA Home

Networked Interoperability Guidelines”, Expanded

2006.

[10] Al-Mejibli, I and Colley, M, “Evaluating

transmission Time of Service Discovery Protocols by

using NS2 Simulator”, Wireless Advanced (WiAD),

2010 6th

Conference on London.


Recommended