SlideShare uma empresa Scribd logo
1 de 28
A Multi-tenant Architecture for Business Process Executions MilindaPathirage, Srinath Perera, Indika Kumara, SanjivaWeerawarana WSO2 Inc.
Cloud Computing ,[object Object]
For more details read “A View of Cloud Computing, Communications of the ACM, 2010”,[object Object]
Cloud Offerings
Why PaaS? IaaS only provides limited saving to someone who needs to outsource their IT functions SaaS is great when they can be used  They are usually very specific (e.g. email, CRM ..) If they match, then great, but if they are not, not much choice for the user.  PaaS stays in the middle ground  Framework to host your apps Hopefully you can move your apps as it is (well not the case with Azure or App Engine, but it is possible).
Supporting SOA in PaaS SOA is a primary technology in the Enterprise Many users already have SOA artifacts  Moving them to the Cloud without need for changing will be a great advantage  We want to see Cloud as yet another deployment model Write and test applications locally Even deploy it locally if needed When you need it, you can deploy the same artifacts in the cloud. Multi-tenancy plays a major role. Which brings us to our Topic. photo by MikkoTarvainenon Flickr, http://www.flickr.com/photos/mtarvainen/5131983246/, Licensed under CC
 What is Multi-tenancy ? ,[object Object],[object Object]
Multi-tenancy vs. Virtual Machines Multi-tenancy provides much fine grained sharing by many applications sharing the same server.  Say there are 100k accounts, but 10k active users at a time. VM based model needs 100k VMs, which means there is a cost incurred per account.  With Multi-tenancy one server can handle many accounts, and by mixing and matching heavy and light users, Multi-tenancy can operate with much less number of servers.  photo by hans s on Flickr, http://www.flickr.com/photos/archeon/2359334908/
Our Earlier Works on Multi-tenancy  We provide a SOA PaaS offering called Stratos. Some of the features Web Service Hosting as a Service  Web Application Hosting as a Service Message Mediation Execution as a Service (ESB) Governance as a Service  Earlier publications on the topic  A. Azeez and S. Perera et al., WSO2 Stratos: An Industrial Stack to Support Cloud Computing, IT: Methods and Applications of Informatics and Information Technology Journal, the special Issue on Cloud Computing, 2011. AfkhamAzeez, Srinath Perera, DimuthuGamage, Ruwan Linton, PrabathSiriwardana, DimuthuLeelaratne, SanjivaWeerawarana, Paul Fremantle, "Multi-Tenant SOA Middleware for Cloud Computing" 3rd International Conference on Cloud Computing, Florida, 2010
Today’s Topic: Workflow Hosting as a Service Key part of the SOA puzzle  Workflows provide interoperable means of composing services together.  Still workflow technology is mostly limited to large scale organizations Goals Enable users to deploy the same workflows that they run on local machines in the Cloud without any changes and supporting the monitoring and other features in the same way.  Supporting Multi-tenancy  Scalability  photo by Michael Coté on Flickr, http://www.flickr.com/photos/cote/460253143/, Licensed under CC
Motivating Usecases
E-Science Gateways Scientific workflows has been identified as enabling technology for E-Science.  Idea is to let scientists visually compose workflows and run them.  There are many gateways that do this.  However, the cost of running gateways for different domains has been high. Workflow hosting service together with Service and Web application hosting service will enable multiple science gateways to share the same infrastructure thus reducing the maintenance cost and resource sharing .  photo by Image Editor on Flickr, http://www.flickr.com/photos/11304375@N07/2769519295/, Licensed under CC
SMBs (Small and Medium size Business)  Most SMBs can not afforded to run their own workflow technologies.  This stops them from goes to the next level.  Workflow, Service and Web hosting services can enable multiple SMBs to share the same infrastructure.  This will lower the bar of workflow use, and enable SMBs to move to the next level.  photo by Olaf on Flickr http://www.flickr.com/photos/okreitz/3073783437/, Licensed under CC
Goals of Multi-tenancy  Sharing – maximize the resource sharing across multiple tenants.  Isolation – hide the fact other other are also in the same server.  Execution – enforce security. Make sure one tenant can’t call other  tenants executable logic.  Data – make sure one tenant can’t see other data  Performance  - make sure performance is not affected by existence of other tenants.  Scale Server is distributed and it can handle larger load by adding more nodes.  photo by John TrainoronFlickr http://www.flickr.com/photos/trainor/2902023575/, Licensed under CC
Related works  Mitezner [5] and Shi et al.[6] introduced application templates where the system lets users customize a template workflow. Mitezneret al. introduced a tenant context to hold execution data and isolate  executions. We also use a similar concept.  Cai, Wang, and Zhou [8] have used tenant context to support multi-tenancy in Web Applications.  Anstett et al. [9] discuss challenges of bring BPEL processes to cloud.  Need changes to BPEL engine Configuration data isolation Avoid giving access to DBs Securing the Data in the communication
BPS Multi-tenancy Architecture
Achieving Service Execution Isolation ,[object Object]
Axis2 have stateless executions and keep all state in a Context.
So if we create different context for each tenant, they are isolated.
See Azeez et al. “Multi-Tenant SOA Middleware for Cloud Computing” for details    ,[object Object]
BPS Multi-tenancy Architecture (Contd.) Extends Apache ODE Has a single tenant Apache ODE Engine as the core and added Multi-tenancy by adding a Multi-tenant process store and adding isolation at the message reception.  Parts of the architecture  A Process store per tenant, which only allows calls from that tenant Parent process store that provides a single process store view across all tenant stores (to Apache ODE).
BPS Multi-tenancy Architecture (Contd.) When a workflow is deployed by T1, it is stored in T1’s process store. Also, a service is created for the workflow and deployed within T1’s space.  When a workflow received a message, the service that receives the message perform access control and then injects it to ODE with tenant ID as a correlation property.  A implicit correlation rule together with other correlation rules routes the messages to a workflow instance.  When workflow instance access the process store, it is routed to the T1’s  tenant process store.
Isolation Data isolation is provided by the process store per tenant, which stores data in the multi-tenant registry.  Execution isolation is provided by Service isolation which enforces security on any external calls before a message is injected in to the workflow engine. After entry, isolation is provided by data isolation and workflow engine.  Workflow engine creates a new version when a process is redeployed, and each version is isolated. So multiple users can have workflows with the same name in the workflow engine.  photo  Kevin Rushton by on Flickr, http://www.geograph.org.uk/photo/643153
Isolation (Contd.)  Performance isolation is a challenging issue.  We currently relay on monitoring and auditing where we can kill CPU hogging processes We are exploring the possibility of changing the priority of CPU hogging processes in the work queue.   photo  Fortes by on Flickr, http://www.fotopedia.com/items/flickr-3193056200
Scaling  Run multiple BPS nodes in a cluster Tenants are partitioned across BPS nodes Fronted by a load-balancer which is aware of tenants and processes
Performance  Setup Multi-tenant and non-multi-tenant versions  Run 200 workflows from each client Overhead is minimal MT supports only add few additional lookups and checks Java Security does not come in to play as we do not run user provided code.
How does it make a difference? Supporting Workflow Hosting as a Service Bringing down the cost of using workflows Increasing the sharing in the cloud   Multi-tenant BPS in private Cloud to support multiple departments for improve resource sharing.  As a test environment and an education medium  Super tenant workflows  Workflow store model (like App Store) to sell workflows.  Photo by Madhan on Flickr, http://www.flickr.com/photos/flickcoolpix/3566848458/
Conclusion We proposed an architecture for supporting Multi-tenant  Business Process Engine  We layered this on top of our earlier works on Service Multi-tenancy and Data Multi-tenancy.  We discussed data and execution isolation.  We have realized the architecture on top of WSO2 BPS, which is an extension of Apache ODE Multi-tenant business process engine enables end-users to deploy their current BPEL workflows running on their machine without any changes.  It only introduced a minimal overhead  It is currently available for free from cloud.wso2.com

Mais conteúdo relacionado

Mais procurados

Eucalyptus: Open Source for Cloud Computing
Eucalyptus: Open Source for Cloud ComputingEucalyptus: Open Source for Cloud Computing
Eucalyptus: Open Source for Cloud Computingclive boulton
 
Building your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeBuilding your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeMicrosoft Singapore
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloudsdevillers
 
9. virtualization virtualization
9. virtualization virtualization9. virtualization virtualization
9. virtualization virtualizationSagarR24
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...
Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...
Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...Symantec
 
Cloud storage slides
Cloud storage slidesCloud storage slides
Cloud storage slidesEvan Powell
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session aleyeldean
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computingnik_053
 
Introduction to Cloud and Eucalyptus
Introduction to Cloud and EucalyptusIntroduction to Cloud and Eucalyptus
Introduction to Cloud and EucalyptusLester Wade
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
V mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kitV mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kitsolarisyougood
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101Otto Mora
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing Priti Banya Mohanty
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using EucalyptusAbhishek Dey
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelDr Neelesh Jain
 

Mais procurados (20)

Eucalyptus: Open Source for Cloud Computing
Eucalyptus: Open Source for Cloud ComputingEucalyptus: Open Source for Cloud Computing
Eucalyptus: Open Source for Cloud Computing
 
Infra project report1
Infra project report1Infra project report1
Infra project report1
 
Building your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeBuilding your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison lee
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
 
9. virtualization virtualization
9. virtualization virtualization9. virtualization virtualization
9. virtualization virtualization
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...
Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...
Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...
 
Cloud storage slides
Cloud storage slidesCloud storage slides
Cloud storage slides
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computing
 
Introduction to Cloud and Eucalyptus
Introduction to Cloud and EucalyptusIntroduction to Cloud and Eucalyptus
Introduction to Cloud and Eucalyptus
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Virtualization 101 for Everyone
Virtualization 101 for EveryoneVirtualization 101 for Everyone
Virtualization 101 for Everyone
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
V mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kitV mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kit
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference Model
 

Semelhante a A Multi-tenant Architecture for Business Process Execution

Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingSrinath Perera
 
Multi tenancy - Wining formula for a PaaS
Multi tenancy - Wining formula for a PaaSMulti tenancy - Wining formula for a PaaS
Multi tenancy - Wining formula for a PaaSWSO2
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesEueung Mulyana
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computingkevnikool
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxssuserddf612
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Introduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalIntroduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalBeantsingh
 

Semelhante a A Multi-tenant Architecture for Business Process Execution (20)

Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud Computing
 
Multi tenancy - Wining formula for a PaaS
Multi tenancy - Wining formula for a PaaSMulti tenancy - Wining formula for a PaaS
Multi tenancy - Wining formula for a PaaS
 
UNIT - I.docx
UNIT - I.docxUNIT - I.docx
UNIT - I.docx
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cad
CadCad
Cad
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Introduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalIntroduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh Duggal
 
Unit 1
Unit 1Unit 1
Unit 1
 

Mais de Srinath Perera

Book: Software Architecture and Decision-Making
Book: Software Architecture and Decision-MakingBook: Software Architecture and Decision-Making
Book: Software Architecture and Decision-MakingSrinath Perera
 
Data science Applications in the Enterprise
Data science Applications in the EnterpriseData science Applications in the Enterprise
Data science Applications in the EnterpriseSrinath Perera
 
An Introduction to APIs
An Introduction to APIs An Introduction to APIs
An Introduction to APIs Srinath Perera
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsSrinath Perera
 
AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?Srinath Perera
 
Healthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & ChallengesHealthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & ChallengesSrinath Perera
 
How would AI shape Future Integrations?
How would AI shape Future Integrations?How would AI shape Future Integrations?
How would AI shape Future Integrations?Srinath Perera
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsSrinath Perera
 
Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going? Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going? Srinath Perera
 
Few thoughts about Future of Blockchain
Few thoughts about Future of BlockchainFew thoughts about Future of Blockchain
Few thoughts about Future of BlockchainSrinath Perera
 
A Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New TechnologiesA Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New TechnologiesSrinath Perera
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata EraSrinath Perera
 
Blockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and RisksBlockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and RisksSrinath Perera
 
Today's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology LandscapeToday's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology LandscapeSrinath Perera
 
An Emerging Technologies Timeline
An Emerging Technologies TimelineAn Emerging Technologies Timeline
An Emerging Technologies TimelineSrinath Perera
 
The Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming ApplicationsThe Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming ApplicationsSrinath Perera
 
Analytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the UglyAnalytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the UglySrinath Perera
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through AnalyticsSrinath Perera
 
SoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySrinath Perera
 

Mais de Srinath Perera (20)

Book: Software Architecture and Decision-Making
Book: Software Architecture and Decision-MakingBook: Software Architecture and Decision-Making
Book: Software Architecture and Decision-Making
 
Data science Applications in the Enterprise
Data science Applications in the EnterpriseData science Applications in the Enterprise
Data science Applications in the Enterprise
 
An Introduction to APIs
An Introduction to APIs An Introduction to APIs
An Introduction to APIs
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance Professionals
 
AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?
 
Healthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & ChallengesHealthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & Challenges
 
How would AI shape Future Integrations?
How would AI shape Future Integrations?How would AI shape Future Integrations?
How would AI shape Future Integrations?
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future Integrations
 
Future of Serverless
Future of ServerlessFuture of Serverless
Future of Serverless
 
Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going? Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going?
 
Few thoughts about Future of Blockchain
Few thoughts about Future of BlockchainFew thoughts about Future of Blockchain
Few thoughts about Future of Blockchain
 
A Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New TechnologiesA Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New Technologies
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
 
Blockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and RisksBlockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and Risks
 
Today's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology LandscapeToday's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology Landscape
 
An Emerging Technologies Timeline
An Emerging Technologies TimelineAn Emerging Technologies Timeline
An Emerging Technologies Timeline
 
The Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming ApplicationsThe Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming Applications
 
Analytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the UglyAnalytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the Ugly
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through Analytics
 
SoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration Technology
 

Último

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Último (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

A Multi-tenant Architecture for Business Process Execution

  • 1. A Multi-tenant Architecture for Business Process Executions MilindaPathirage, Srinath Perera, Indika Kumara, SanjivaWeerawarana WSO2 Inc.
  • 2.
  • 3.
  • 5. Why PaaS? IaaS only provides limited saving to someone who needs to outsource their IT functions SaaS is great when they can be used They are usually very specific (e.g. email, CRM ..) If they match, then great, but if they are not, not much choice for the user. PaaS stays in the middle ground Framework to host your apps Hopefully you can move your apps as it is (well not the case with Azure or App Engine, but it is possible).
  • 6. Supporting SOA in PaaS SOA is a primary technology in the Enterprise Many users already have SOA artifacts Moving them to the Cloud without need for changing will be a great advantage We want to see Cloud as yet another deployment model Write and test applications locally Even deploy it locally if needed When you need it, you can deploy the same artifacts in the cloud. Multi-tenancy plays a major role. Which brings us to our Topic. photo by MikkoTarvainenon Flickr, http://www.flickr.com/photos/mtarvainen/5131983246/, Licensed under CC
  • 7.
  • 8. Multi-tenancy vs. Virtual Machines Multi-tenancy provides much fine grained sharing by many applications sharing the same server. Say there are 100k accounts, but 10k active users at a time. VM based model needs 100k VMs, which means there is a cost incurred per account. With Multi-tenancy one server can handle many accounts, and by mixing and matching heavy and light users, Multi-tenancy can operate with much less number of servers. photo by hans s on Flickr, http://www.flickr.com/photos/archeon/2359334908/
  • 9. Our Earlier Works on Multi-tenancy We provide a SOA PaaS offering called Stratos. Some of the features Web Service Hosting as a Service Web Application Hosting as a Service Message Mediation Execution as a Service (ESB) Governance as a Service Earlier publications on the topic A. Azeez and S. Perera et al., WSO2 Stratos: An Industrial Stack to Support Cloud Computing, IT: Methods and Applications of Informatics and Information Technology Journal, the special Issue on Cloud Computing, 2011. AfkhamAzeez, Srinath Perera, DimuthuGamage, Ruwan Linton, PrabathSiriwardana, DimuthuLeelaratne, SanjivaWeerawarana, Paul Fremantle, "Multi-Tenant SOA Middleware for Cloud Computing" 3rd International Conference on Cloud Computing, Florida, 2010
  • 10. Today’s Topic: Workflow Hosting as a Service Key part of the SOA puzzle Workflows provide interoperable means of composing services together. Still workflow technology is mostly limited to large scale organizations Goals Enable users to deploy the same workflows that they run on local machines in the Cloud without any changes and supporting the monitoring and other features in the same way. Supporting Multi-tenancy Scalability photo by Michael Coté on Flickr, http://www.flickr.com/photos/cote/460253143/, Licensed under CC
  • 12. E-Science Gateways Scientific workflows has been identified as enabling technology for E-Science. Idea is to let scientists visually compose workflows and run them. There are many gateways that do this. However, the cost of running gateways for different domains has been high. Workflow hosting service together with Service and Web application hosting service will enable multiple science gateways to share the same infrastructure thus reducing the maintenance cost and resource sharing . photo by Image Editor on Flickr, http://www.flickr.com/photos/11304375@N07/2769519295/, Licensed under CC
  • 13. SMBs (Small and Medium size Business) Most SMBs can not afforded to run their own workflow technologies. This stops them from goes to the next level. Workflow, Service and Web hosting services can enable multiple SMBs to share the same infrastructure. This will lower the bar of workflow use, and enable SMBs to move to the next level. photo by Olaf on Flickr http://www.flickr.com/photos/okreitz/3073783437/, Licensed under CC
  • 14. Goals of Multi-tenancy Sharing – maximize the resource sharing across multiple tenants. Isolation – hide the fact other other are also in the same server. Execution – enforce security. Make sure one tenant can’t call other tenants executable logic. Data – make sure one tenant can’t see other data Performance - make sure performance is not affected by existence of other tenants. Scale Server is distributed and it can handle larger load by adding more nodes. photo by John TrainoronFlickr http://www.flickr.com/photos/trainor/2902023575/, Licensed under CC
  • 15. Related works Mitezner [5] and Shi et al.[6] introduced application templates where the system lets users customize a template workflow. Mitezneret al. introduced a tenant context to hold execution data and isolate executions. We also use a similar concept. Cai, Wang, and Zhou [8] have used tenant context to support multi-tenancy in Web Applications. Anstett et al. [9] discuss challenges of bring BPEL processes to cloud. Need changes to BPEL engine Configuration data isolation Avoid giving access to DBs Securing the Data in the communication
  • 17.
  • 18. Axis2 have stateless executions and keep all state in a Context.
  • 19. So if we create different context for each tenant, they are isolated.
  • 20.
  • 21. BPS Multi-tenancy Architecture (Contd.) Extends Apache ODE Has a single tenant Apache ODE Engine as the core and added Multi-tenancy by adding a Multi-tenant process store and adding isolation at the message reception. Parts of the architecture A Process store per tenant, which only allows calls from that tenant Parent process store that provides a single process store view across all tenant stores (to Apache ODE).
  • 22. BPS Multi-tenancy Architecture (Contd.) When a workflow is deployed by T1, it is stored in T1’s process store. Also, a service is created for the workflow and deployed within T1’s space. When a workflow received a message, the service that receives the message perform access control and then injects it to ODE with tenant ID as a correlation property. A implicit correlation rule together with other correlation rules routes the messages to a workflow instance. When workflow instance access the process store, it is routed to the T1’s tenant process store.
  • 23. Isolation Data isolation is provided by the process store per tenant, which stores data in the multi-tenant registry. Execution isolation is provided by Service isolation which enforces security on any external calls before a message is injected in to the workflow engine. After entry, isolation is provided by data isolation and workflow engine. Workflow engine creates a new version when a process is redeployed, and each version is isolated. So multiple users can have workflows with the same name in the workflow engine. photo Kevin Rushton by on Flickr, http://www.geograph.org.uk/photo/643153
  • 24. Isolation (Contd.) Performance isolation is a challenging issue. We currently relay on monitoring and auditing where we can kill CPU hogging processes We are exploring the possibility of changing the priority of CPU hogging processes in the work queue. photo Fortes by on Flickr, http://www.fotopedia.com/items/flickr-3193056200
  • 25. Scaling Run multiple BPS nodes in a cluster Tenants are partitioned across BPS nodes Fronted by a load-balancer which is aware of tenants and processes
  • 26. Performance Setup Multi-tenant and non-multi-tenant versions Run 200 workflows from each client Overhead is minimal MT supports only add few additional lookups and checks Java Security does not come in to play as we do not run user provided code.
  • 27. How does it make a difference? Supporting Workflow Hosting as a Service Bringing down the cost of using workflows Increasing the sharing in the cloud Multi-tenant BPS in private Cloud to support multiple departments for improve resource sharing. As a test environment and an education medium Super tenant workflows Workflow store model (like App Store) to sell workflows. Photo by Madhan on Flickr, http://www.flickr.com/photos/flickcoolpix/3566848458/
  • 28. Conclusion We proposed an architecture for supporting Multi-tenant Business Process Engine We layered this on top of our earlier works on Service Multi-tenancy and Data Multi-tenancy. We discussed data and execution isolation. We have realized the architecture on top of WSO2 BPS, which is an extension of Apache ODE Multi-tenant business process engine enables end-users to deploy their current BPEL workflows running on their machine without any changes. It only introduced a minimal overhead It is currently available for free from cloud.wso2.com