Anda di halaman 1dari 66

Outline

qINTRODUCTION qProblem & Research Questions qObjectives qRESEARCH METHODOLOGY qSearch Strategy qData Source qStudy Selection qClassification Scheme qData Extraction Strategy qRESULTS qFINAL CONSIDERATIONS

1/65

INTRODUCTION

What is the Cloud?

" is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. NIST

3/65

Evolution of core concept

...computing may someday be organized as a public utility just as the telephone system is a public utility... The computer utility could become the basis of a new and important industry John McCarthy 1961-2011

4/65

Evolution of core concept

5/65

Evolution of core concept

6/65

Evolution of core concept

7/65

Evolution of core concept

8/65

Comparing Gartner

9/65

Global attention to the Cloud

q q q q q

Crisis 2008; Global economic crisis (today); The promise of Lower upfront IT costs [1]; Opportunities; New business models;

10/65

The Problems

q q q q q q

It gains are still unsure; conception of contracts of service [2] [3]; software architecture to develop a SaaS [6]; the data privacy [23]; agile process methodology [16]; LAWs [11] [12] [5];

11/65

The Problems
About experiments from UFPE q Jobs; q software engineering; q Business Models; q Sustainability; q Federated Clouds

12/65

The Proposal

q Combining systematic Mapping Studies [34] and Systematic Reviews [39] this study aims to map out the cloud computing area while its mainly problems, solutions and challenges, synthesizing available evidences to suggest important implications for practice, as well as, identifying research trends and open issues.

13/65

The Main Question

q What are the main problems and solutions in cloud computing area?

14/65

The Sub-Question
q RQ1. Which challenges were found regarding to economic problems? q RQ2. What problems and solutions were found regarding to SLA? q RQ3. What are the cloud computing social impact? q RQ4. What are the challenges found regarding to infrastructures of datacenters and development of applications? q RQ5. What are the main challenges regarding to the Elastic property? q RQ6. What are the problems and solutions about data storage? q RQ7. How is performed the monitoring of services? q RQ8. Which are the main security challenges?

15/65

RESEARCH METHODOLOGY

Overview

Fig. 1. The Systematic Mapping Process [34].

17/65

Search Strategy

Fig. 2.Cycle for refine Terms

18/65

STRINGS

19/65

Data Source

q ACM Digital library, ScienceDirect, IEEE Xplore, COMPENDEX, SCOPUS, and DBLP; q All search string were checked by more than one author. q Snowballing q Journals and Events referred by Researchers

20/65

Including and Excluding


INCLUDING Research that explores Cloud computing as mainly focus; Studies that address utility computing linked to Cloud computing; Studies that address comparison among cloud and grid computing; Books with access to chapters. EXCLUDING Studies that dont have Cloud as the main focus; Duplicated Studies; Keynotes and Whitepapers.

21/65

Classification

22/65

Stages of Process

23/65

RESULTS

RQ1 - Which challenges were found regarding to economic problems?


q Investments grossly underutilized[49]; u Industry Servers: 30-40%; Desktops: less than 5%; u Academy maintainability of scientific projects[7][15];

25/65

RQ1 - Which challenges were found regarding to economic problems?

26/65

RQ1 - Which challenges were found regarding to economic problems?

Flexibility of Cloud deployment Models [51].

27/65

RQ1 - Which challenges were found regarding to economic problems?


q Billing; q SMEs flexibility; q Choice of Tecnology (Pandora Planning System )

28/65

RQ2 - What problems and solutions were found regarding to SLA?


PROBLEMS the greatest issue was the penalties as a consequence of contracts broken [2] [3] [4] [31] [53]; Transparency on contracts [4] [53]; SOLUTIONS MONITORING; Algorithms: Weighted Round Robin (WRR) and First In First Out (FIFO)[53] SLA among components of System

29/65

RQ2 - What problems and solutions were found regarding to SLA?


USER In terms of service availability, can you get you vendor to sign a Service-level agreement?; What happens if the SLA is not met?; and How data is handled when the service contract ends, the type of data returned to the company?.

30/65

RQ3 - What are the cloud computing social impact?


E-Government: For [10], cloud computing platform can help the Government on its procedures, reducing the delays.

31/65

RQ3 - What are the cloud computing social impact?

32/65

RQ3 - What are the cloud computing social impact?


LAWS: In [11], the author affirms that due to nature of cloud computing (distributed and flexible), collects evidences about facts is a hard work. This is because a data inserted on cloud environments could be encrypted before entering in cloud platform, for example. Or the stored data could be globally disposing among countries. Then, even though an authority solicits information about a fact, it will be a problem. JOBS: With the growing use of technologies such as Hadoop and Virtualization[14] [55]. GREEN IT [32] the author reported that energy saving dont occur for all cases on his experi- ence. 33/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of applications?

SOFTWARE(choice of a software architecture to develop a SaaS [6]) Liquid Architecture. MULTI-TENANCY[1]

34/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of applications?

35/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of applications?

36/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of applications?

Classic Database Architecture [6]

Distributed Control [6]

37/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of applications?
RESERVOIR: A common referred [9] [57] [58] work to guide stakeholders in the development of architectures in the Cloud was the RESERVOIR framework [59].

38/65

RQ5 - What are the main challenges regarding to the Elastic property?

q Best effort BROKER(cloud Busting)

39/65

RQ5 - What are the main challenges regarding to the Elastic property?

Broker Components[8] 40/65

RQ5 - What are the main challenges regarding to the Elastic property?

Load Balancer and Scalling Point [63]

41/65

RQ5 - What are the main challenges regarding to the Elastic property?

A standard feedback control system [64]

42/65

RQ6 - What are the problems and solutions about data storage?
RQ6 - What are the problems and solutions about data storage? I/O PROBLEM Because concentrating of high quantity of requests to storage system, I/O is an evident problem on Cloud Computing [67] [68]. SOLUTION Some authors [69] [70] proposes P2P model such as alternative to solve that problem. When the user accesses the storage system during the reserved time, the requested performance is guaranteed because the storage system allocates the resources according to the reservation, and prioritizes I/O re- quests for the reserved access. [71]. 43/65

RQ6 - What are the problems and solutions about data storage?
q For guarantee the integrity of data on Cloud, the environment needs to adopt a Proof Of Integrity (POI) protocol [74] [75]. Such protocol prevent the cloud storage archives from misrepresenting or modifying the data stored at it without the consent of the data owner by using frequent checks on the storage archives. However, [74] emphasis the possible overhead generated by POI system. q On-Line Analytical Processing (OLAP) - (MAPREDUCE) [77] q [78] presents a how to about SQL on Cloud.

44/65

RQ7 - How is performed the monitoring of services?

q For [57], two approaches can be used in monitoring context; The first the monitoring system is charged for observes behaviors on infrastructure based on Hard disk, RAM memory and Virtual Machines resource usage. The second is charged for observes point in applications modules such as quantity of users logged or time of life of threads.

45/65

RQ7 - How is performed the monitoring of services?


q Another suggestion is the usage of Grid Monitoring Architecture (GMA) a project developed by Global Grid Forum [80]

46/65

RQ8 - Which are the main security challenges?

q FEDERATED CLOUD RESTFULL:(Paul, Mariah, Read, CloudStorage, /root/) [24] q [82] RSA algorithm q Health Cloud must adopt the security role as a mission and not as a property (information security). That factor gains emphasis when handling with Health care [26] [27] context.

47/65

RQ8 - Which are the main security challenges?

q patching According to [84] a good way to resolves that problem is creating a centralized flow of update. q Multi-Tenancy isolation among tenants on multi-tenant architecture [85] [86];

48/65

Results Analysis

49/65

Results Analysis

50/65

Results Analysis

51/65

Results Analysis

52/65

Results Analysis

53/65

Results Analysis

54/65

Results Analysis

55/65

Results Discussion

q ADOPTION(GRID OR CLOUD); q PROMISSE OF LOW COST(needs more evidence); q HOW MUCH ?(SLA MMORPG) q WARNING: SLA!!! q GREEN IT; q REUSE(APEX-PAAS 70% gain on development); q SCIENCE; q BROKER SYSTEM(QOS!!); q GOVERNEMNTs; q LAWS vs CLOUD; q Where are BILLING, MONITORING, GREEN IT?

56/65

Results Discussion

q SAAS: model-driven [44] Database, mul-titenant maturity levels [1], Service-Oriented Architecture [14] and RESTFull model [24]; q MARKET REQUIREMENTS VS CLOUD; q STANDARDs

57/65

FINAL CONSIDERATIONS

THREATS OF VALIDITY
q Research Questions; q Publication Bias; q Conduct the Search(ACM PROBLEM); q Data Extraction;

59/65

Conclusion
q Investigate State-of-the-art and guide to future researches; q Cloud haves many opportunities; q Some questions of Security (resolving). q Care with Low Cost Promisse; q cloud computing is not entirely adequate to the market q Social machines can help to develop Cloud

60/65

REFERENCES

[1] Cadan, K, Selcuk; ALi, Wen-Syan; Phan, Thomas; Zhou, Minqi(2009). Frontiers in Information and Software as Ser- vices. Conference ICDE 2009. [2] Nae, Vlad; Prodan, Radu; Iosup, Alexandru(2011). A New Business Model for Massively Multiplayer Online Games. Conference ICPE 2011. [3] Luo, Min; Zhang, Liang-Jie; Lei, Fengyun (2010). An Insuan- rance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing. Conference ICWS 2010. [4] Kandukuri, Balachandra Reddy; Ramakrishna Paturi; Rak- shit, Atanu (2009). Cloud Security Issues. SCC 2009. [5] Cho, Brian; Gupta, Indranil (2010). New Algorithms for Planning Bulk Transfer via Internet and Shipping Networks. Conference ICDCS 2010. [6] Kossmann, Donald; Kraska, Tim; Loesing, Simon(2010). An Avaluation of Alternative Architectures for Transaction Processing in the Cloud. In Conference SIGMOD 2010. [7] Kondo, Derrick; Javadi, Bahman;Malecot, Paul; Cappello, Franck; Anderson, David P (2009). Cost-benefit analysis of cloud computing versus desktop grids. In conference IPDPS 2009. [8] Nair, Srijith K.;Porwal, Sakshi; Dimitrakos, Theo; Ferrer, Ana Juan; Tordsson, Johan; Sharif, Tabassum; Sheridan, Craig; Rajarajan, Muttukrishnan; Khan, Afnan Ullah(2010). Towards Secure Cloud Bursting, Brokerage and Aggregation. In ECOWS 2010. [9] Lin, F.T.; Shih, T.S. (2010). Cloud computing: The emerging computing technology. In Journal ICIC International , vol. 1, number 1, 2010. [10] Zissis, Dimitrios; Lekkas, Dimitrios (2011). Securing e- Government and e-Voting with an open cloud computing architecture. In Journal Government Information Quarterly, vol. 28, issue 2, p.239-251, 2011. [11] Taylor, M; Haggerty, J; Gresty, D; Hegarty, R (2010).Digital evidence in cloud computing systems. Computer Law and Security Report Review 26, p. 204-208, 2010. [12] Doelitzscher, Frank; Reich, Christoph; Sulistio, Anthony(2010). Designing Cloud Services Adhering to Government Privacy Laws. In Conference CIT 2010 [14] Hutchinson, Chuck; Ward, Jeff; Castilon, Karen (2009). Nav- igating the Application Architecture. In Journal IT Professional, Volume 11, Issue 2, p. 18-22, 2009. [15] Hou, Zhengxiong; Zhou, Xingshe (2010).ASAAS: Application Software as a Service for High Performance Cloud Computing. In conference HPC 2010. [16] Guha, R; Al-Dabass, D(2010). Impact of Web 2.0 and Cloud Computing Platform on Software Engineering. In Conference ISED 2010. [23] Zhou, Minqi; Zhang, Rong; Xie, Wei; Qian, Weining; Zhou, Aoying (2010). Security and Privacy in Cloud Computing: A Survey. In conference SKG 2010. [24] Calero, J.M.A; Edwards, N; Kirschnick, J; Wilcock, L; Wray, M (2010). Toward a Multi-Tenancy Authorization System for Cloud Services. In Journal Security & Privacy, IEEE, vol 8,issue 6, 48-55, 2010. [25] Popovic, K. ;Hocenski, Z. (2010). Cloud computing security issues and challenges. In conference MIPRO 2010. [26] Lhr, Hans; Sadeghi, A.R.; Winandy, Marcel (2010). Securing the e-health cloud. In Conference IHI 2010. [31] Chaves, S. Aparecida; Westphall, C. Becker; Lamin, F. Ro- drigo (2010). SLA Perspective in Security Management for Cloud Computing. In Conference ICNS 2010.

[32] Baliga, J; Ayre, R.W.A; Hinton, Kerry; Tucker, R.S. (2010). Green Cloud Computing: Balancing Energy in Processing, Storage and Transport. In Journal Proceedings of the IEEE, vol. 99, No. 1, 2010. [34] K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, Systematic mapping studies in software engineering, in EASE 08: Pro- ceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, University of Bari, Italy, 2008. [39] B. Kitchenham and S. Charters, Guidelines for performing Systematic Literature Reviews in Software Engineering. In conference EBSE 2007. [44] Menzel, Michael; Warschofsky, Robert; Thomas, Ivonne; Willems, Christian; Meinel, Christoph (2010). The Service Security Lab: A Model-Driven Platform to Compose and Ex- plore Service Security in the Cloud. In Conference SERVICES- I 2010. [49] Marston, Sean;Li, Zhi; Bandyopadhyay, Subhajyoti; Zhang, Juheng; Ghalsasi, Anand (2010). Cloud computing-The business perspective. Journal Decision Support Systems, Vol 51, Issue 1, p.176-189, 2010. [51] Shi, A; Xia, Y; Zhan, H (2010). Applying cloud computing in financial service industry. In Conference ICICIP 2010. [53] Boloor, Keerthana; Chirkova, Rada; Viniotis, Yannis; Salo, Tiia(2010). Dynamic Request Allocation and Scheduling for Context Aware Applications Subject to a Percentile Response Time SLA in a Distributed Cloud. Conference CLOUDCOM 2010. [55] Babu, Shivnath (2010). Towards Automatic Optimization of MapReduce Programs. In Conference SoCC 2010. [57] Elmroth, Erik; Larsson, Lars(2009). Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds. In Conference GCC 2009 [58] Costa, Rostand; Brasileiro, Francisco; Filho, Guido Lemos; Souza, Dnio Mariz(2009). OddCI: On-Demand Distributed Computing Infrastructure. Conference MTAGS 2009 [59] Chapman, Clovis; Emmerich, Wolfgang; Mrquez, Fermn Galn; Clayman, Stuart;Galis, Alex(2011). Software architec- ture definition for on-demand cloud provisioning. Journal Cluster Computing, vol 14, p. 1-22. [63] Mehta, Hemant Kuma; Kanungo, Priyesh; Chandwani, Manohar (2011). Performance Enhancement of Scheduling Algorithms in Clusters and Grids using Improved Dynamic Load Balancing Techniques. In Conference WWW 2011. [64] Li, Qiang; Hao, Qinfen; Xiao, Limin; Li, Zhoujun (2009). Adaptive Management of Virtualized Resources in Cloud Computing Using Feedback Control. In Conference ICISE 2009. [67] Wang, Jianzong; Varman, Peter(2010). Avoiding Performance Fluctuation in Cloud Storage. In conference HiPC 2010. [68] Sivathanu, Sankaran; Liu, Ling; Yiduo, Mei; Pu, Xing (2010). Storage management in virtualized cloud environment. In conference CLOUD 2010. [69] Ke, Xu; Meina, Song; Xiaoqi, Zhang; Junde, Song (2009) .A cloud computing platform based on P2P. In conference ITIME 2009.

[70] Cheng, Kun-Yi,Wu, Chun-Hsin (2009). Peeraid: A resilient path-aware storage system for open clouds. In conference SOCA 2009. [71] Yusuke, Tanimura; Koie, Hidetaka; Tomohiro,Kudoh; Isao, Kojima; Yoshio ,Tanaka (2010). A Distributed Storage System Allowing Application Users to Reserve I/O Performance in Advance for Achieving SLA. In Conference GRID 2010 [74] Kumar, Sravan R.; Saxena, A.(2011).Data integrity proofs in cloud storage. In conference COMSNETS 201. [75] Zheng, Qingji; Xu, Shouhuai (2010). Fail and Dynamic Proofs of Retrievability. In Conference CODASPY 2010. [77] Hadoop. Welcome to MapReduce. http://hadoop.apache.org/mapreduce/. [78] Johnson, J.L. ; (2009). SQL in the Clouds. In Journal Comput- ing in Science & Engineering, vol. 11, issue 4, 2009. [80] B. Tierney, R. Aydt, D. Gunter, W. Smith, V. Taylor, R. Wolski, and M. Swany(2002). A Grid Monitoring Architecture, GWD-I (Informational), Aug. 2002. [Online]. Available: http://www-didc.lbl.gov/GGF-PERF/GMA- WG/ papers/GWD-GP-16-3.pdf. [82] Jianhong, Z.; Hua, Chen (2010). Secuirty Storage in the Cloud Computing : A RSA-based Assumption Data Integrity Check without Original Data. In Conference ICEIT 2010. [85] Li, X.Y.; Shi, Yong; Guo, Y.; Ma, W. (2010). Multi-Tenancy Based Access Control in Cloud. In Conference CiSE 2010. [86] Bertram, S.; Boniface, M.; Surridge, M.; Briscombe, N.; Hall- May, M. (2010). On-Demand Dynamic Security for Risk- Based Secure Collaboration in Clouds. In conference CLOUD 2010.