Details



A REVIEW ON CLOUD COMPUTING

Nisha Rani, Abhishek Bhatnagar

12-20

Vol. 3, Jan-Jun, 2016

Date of Submission: 2015-12-02 Date of Acceptance: 2016-01-03 Date of Publication: 2016-01-23

Abstract

There are an increasing number of Cloud Services available in the Internet. Cloud services can be a component of a system and different Cloud Servers that would provide different services. In this present work we have defined a multiple cloud environment. Each cloud server is defined with certain limits in terms of memory and the CPU specifications. Now as the users enter to the system, the user request is performed in terms of processes. To represent the parallel user requests, n number of requests are been generated by the users. All these requests are to be handled by the cloud servers in parallel by using the multiple cloud concept. A middle layer is defined between the cloud servers and the client requests that will perform the allocation of the processes to different clouds in under load and over load conditions. As user requests are performed, some parameters are also defined with each request. These parameters are the process time, deadline, input output specifications etc. In the general case, the allocations of the processes are performed in a sequential order. Each process must be executed within the deadline limit. But if more than one processes occur at same time and not get executed before the deadline, in such case the processes is switched from one cloud server to other called the process migration. In this present work, a parametric analysis is performed to identify the requirement of process migration and based on this analysis the migration will be performed on these processes. The effectiveness of the work is identified in terms of successful execution of the processes within the time limits.

References

  1. T. Hirofuchi, H. Ogawa, H. Nakada, S. Itoh, and S. Sekiguchi, ―A Storage Access Mechanism for Wide-Area Live Migration of Virtual Machines,‖ In Summer United Workshops on Parallel, Distributed and Cooperative Processing,2008, pp. 19–24.
  2. I. Foster, T. Freeman, K. Keahey, D. Scheftner, B. Sotomayor, and X. Zhang, ―Virtual Clusters for Grid Communities,‖ In IEEE Int. Symp. On Cluster Computing and the Grid, 2006, pp 513– 520.
  3. M. Strasser and H. Stamer, ―A Software-Based Trusted Platform Module Emulator,‖ In Trust ’08 Proc. of the 1st Int. Conf. on Trusted Computing and Trust in Information Technologies, 2008, pp. 33–47
  4. Y. Luo, B. Zhang, X. Wang, Z. Wang, Y. Sun, and H. Chen, ―Live and incremental whole-system migration of virtual machine using block-bitmap,‖ In IEEE Int. Conf. on Cluster Computing, 2008.
  5. H. Nishimura, N. Maruyama, and S. Matsuoka, ―Virtual Clusters on the Fly - Fast Scalable and Flexible Installation,‖ In IEEE Int. Symp. On Cluster Computing and the Grid, 2007,pp. 549–556
  6. M. Tatezono, H. Nakada, and S. Matsuoka, ―Mpi environment with load balancing using virtual machine,‖ In Symp. On Advanced Computing Systems and Infrastructures SACSIS, 2006, pp. 525–532.
  7. S. Venugopal, R. Buyya, and K. Ramamohanarao. A taxonomy of Data Grids for distributed data sharing, management, and processing. In ACM Computing Surveys, volume 38,2006
  8. A. Gopalakrishnan. 2009. Cloud Computing Identity Management. SET Labs Briefings. Vol. 7, No. 7. pp. 45-55.
  9. M. K. Srinivasan, P. Rodrigues, ―A roadmap for the comparison of identity management solutions based on state-of-the-art IdM taxonomies,‖ Springer Communications in Computer and Information Science,2010, pp. 349-358. Springer-Verlag Berlin Heidelberg, New York, USA
  10. M. K. Srinivasan, P. Rodrigues, ―Analysis on identity management systems with extended state- of-theart IdM taxonomy factors,‖ International Journal of Ad hoc, Sensor & Ubiquitous Computing. (December 2010), Vol.1, No.4. pp. 62-70. DOI=10.5121/ijasuc.2010.1406.
  11. R. Bradford, E. Kotsovinos, A. Feldmann, and H. Schi¨oberg, ―Live wide-area migration of virtual machines including local persistent state In VEE ’07,‖ Proc. of the 3rd Int. Conf. on Virtual execution environments,2007,pp. 169–179
  12. M. Shiels, ―Malicious insider attacks to rise”. BBC News, Silicon Valley, Tech. Rep. 2009.
  13. W. Baker, A. Hutton ―Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U.S. Secret Service and the Dutch High Tech Crime Unit”. Tech. Rep. Verizon, New Jersey, 2010.
  14. B. Sunderland, A. Chandramouly. ―Overcoming Security Challenges to Virtualize Iternetfacing Applications”. Intel Corporation Tech. Rep. November 2011.
  15. F. Sabahi, ―Virtualization-level security in cloud computing,‖ Proc. of IEEE Int. Conf. Communication Software and Networks, DOI: 10.1109/ICCSN.2011.6014716, 2011, pp. 250-254.
  16. L.M.Vaquero, L. Rodero-Merino, J.Caceres, M. Lindner, 2009. A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review. 39(1).
  17. W.A. Jansen, ―Cloud Hooks: Security and Privacy Issues in Cloud Computing,‖ Proc. of 44th Hawaii Int. Conf.e on System Sciences, DOI: 10.1109/HICSS.2011.103,2011,pp. 1-10.
  18. B. R. Kandukuri, V. R. Paturi, A. Rakshit, 2009. Cloud Security Issues. IEEE Computer Society. pp. 517-520. DOI 10.1109/SCC.2009.84.
  19. R. P. Padhy, M. R. Patra, S. C. Satapathy. March 2012. SLAs in Cloud Systems: The Business Perspective. International Journal of Computer Science and Technology. Vol. 3, Issue 1. pp. 481-488
  20. M. Gregg. ― Security Concerns for Cloud Computing”. Global Knowledge.Tech. Rep. 2010
  21. P. Mell, T. Grance. September 2011. The NIST Definition of Cloud Computing. NIST Special Publication 800-145. National Institute of Science and Technology.
  22. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. December 2009. Cloud Security Alliance.
  23. H. Li, J. Sedayao, J. H.Steichen, E. Jimison, C. Spence, and S. Chahal. ―Developing an Enterprise Cloud Computing Strategy” Intel Corporation,Tech. Rep. January 2009.
  24. T. Garfinkel and M. Rosenblum, ―When virtual is harder than real: security challenges in virtual machine based computing environments,‖ Proceedings of the 10th conference on Hot Topics in Operating Systems, 2005,pp. 20–20
  25. S. Berger, R. C´aceres, K. A. Goldman, R. Perez, R. Sailer, and L.V. Doorn, ― vTPM: Virtualizing the trusted platform module,‖ Proc. of the 15th conf. on USENIX Security Symp.,2006,pp. 305–320.
  26. F. Stumpf and C. Eckert, ―Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques,‖ Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies, 2008, pp.1–9
  27. P. England and J. Loeser, ―Para-Virtualized TPM Sharing,‖ Proc. of the 1st Int. Conf. on Trusted Computing and Trust in Information Technologies,2008, pp. 119–132.
  28. A.R.Sadeghi, C. St¨uble, and M. Winandy, ―Property-Based TPM Virtualization,‖ Proc. of the 11th Int. Conf. on Information Security,2008,pp.1–16.
  29. V. Scarlata, C. Rozas, M. Wiseman, D. Grawrock, and C. Vishik. TPM Virtualization: Building a General Framework. In Trusted Computing, pp. 43–56, 2007
Download PDF
Back