SlideShare a Scribd company logo
1 of 4
Download to read offline
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7


                   Key infrastructure elements for cloud computing

                                 S.J.Mohana 1, M.Saroja 2, M.Venkatachalam3
                       1,2,3,
                                of Co mputer Applicat ions, Erode Arts and Science college,Erode, India)


Abstract
         Clouds consist of a collection of virtualized resources, which include both computational and storage facilities
that can be provisioned on demand, depending on the users’ needs. users are charged on a pay -per-use basis. This paper
gives a quick overview of cloud and describes the key infrastructure elements for cloud computing . This paper is a brief
survey based of readings on “cloud” computing and it tries to ad dress, related research topics and challenges ahead.

Keywords – cloud computing, middleware, hypervisor, security,management, virtualization.

1. Introduction
         Cloud computing has been the most prevalent technology in the past few years. Cloud computing is a model for
enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable co mputing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction[1]. Cloud providers should satisfy customers’ various workload
requirements. When cost of operating cloud resource is considered, then the makespan also becomes an important issue.
The Cloud is drawing the attention from the Information and Co mmunicat ion Technology community because of the set
of services with common characteristics, provided by important industry players. However, existing technologies of cloud
computing such as virtualization, ut ility co mputing and distributed computing are not new.

2. Types Of Cloud
         Clouds can be classified as public, private, co mmunity or hybrid depending on the model of deploy ment. A
private cloud is the cloud infrastructure owned or leased by a single organization and is operated solely for that
organization. A public cloud is owned by an organization selling cloud services to the general public or to a large industry
group. A Co mmunity cloud is shared by several organizat ions and supports a specific co mmunity that has shared concerns
(e.g. mission, security requirements, policy, and comp liance considerations). A hybrid cloud is a co mposition of two or
more clouds (private, commun ity, or public) that are bound together by standardized or proprietary technology that
enables data and application portability (e.g. cloud bursting).

3. Key Characteristics
         On-demand self-service: Without human intervention, cloud user should be able to use computing apabilit ies,
such as server time and network storage, as and when needed.
Pay per use: cloud users are charged for what they use. The pricing model depends on the quality and uantity of
services consumed [2] . So me of the factors considered for billing includes measuring storage, andwidth and consumption
of computing resources.

Ubiquitous network access : Ubiquitous network access allows all users to access any kind of information at anytime,
and fro m anywhere.
Location independent resource pooling: The provider's computing resources are pooled to serve all consumers using a
mu lti-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to
consumer demand[3]. Location of the cloud resources are abstracted from the consumers. Some of the cloud resources
include storage, processing, memory, network bandwidth, and virtual machines.
     Rapid elasticity: cloud computing has the ability to scale resources up and down as needed. For the consumers, the
     cloud resources available for rent appear to be infin ite and can be purchased in any quantity at any time.

4. Architectural Blocks
    The key infrastructural elements of cloud are hard ware& networking, hypervisor , middleware, security
&management
Issn 2250-3005(online)                                 November| 2012                                               Page 166
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7




                                                         Figure 1: cloud architectural blocks
4.1 Hardware and Networking
         The lower layer of cloud infrastructure has hardware and networking devices. It includes storage devices, ervers,
cooling units, power units , other hardware and networking components .

4.2 Hypervisor
          A hypervisor can also be termed as virtual machine manager. It is a software that allows mo re than one
operating systems to share a single hardware host. Each operating system appears to have the host machines resources all
to itself.However, the virtual machine manager is actually controlling and allocating the host machine’s resources to each
operating system. Hypervisor also makes sure that virtual mach ines cannot disrupt each other.




                                                  Figure 2 : virtual machines
Basically, there are two kinds of server virtualization techniques: full virtualization and para virtualization. In full
virtualizat ion Virtual machine talks to hypervisor which communicates with the hardware platform. CPU understands
the unmodified instructions generated by Virtualized OS. Advantages of full virtualization are complete decoupling of the
software fro m the hardware and comp lete isolation of d ifferent applications. Disadvantages are VMM should provide
additionally virtual bios, virtual memory space and virtual devices and also hypervisor creates and maintains data
structures like shadow memory page table . VM ware’s virtualization products and Microsoft Virtual Server are examples
of full virtualization. In para virtualization guest OS uses specialized API that talks to the VMM which sends the
virtualizat ion requests to the hardware. VMM does not need a resource intensive translation of instructions .Advantages
of para virtualizat ion are near native performance and migrat ion .Disadvantage is that it is not applicable for Windows OS
.Xen is a virtual machine monitor (hypervisor) for IA -32 (x86, x86-64), IA-64 architectures. It allo ws several guest
operating systems to be executed on the same co mputer hardware concurrently.

4.3 Cloud Mi ddleware
        Software that integrates applications, services and content available on the cloud is called cloud middleware.
Middleware is a software that glues various elements of cloud computing. Middleware is an important component of

Issn 2250-3005(online)                             November| 2012                                                 Page 167
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7


cloud computing as it helps complex applications on a cloud to contact each other constantly to work in unison.
Applications and web components hosted anywhere on the cloud can be re -used with this middleware technology. Some
key characteristics possessed by Cloud Middleware are data management , user interfaces and portals , identity / security
management , billing & metering and management & monitoring .Various Cloud Middleware ’s include Eucalyptus -
University of California ,Nimbus - Globus alliance ,Open Nebula - DSA Research, Reservoir - European Union FP7
(associated with OpenNebula) and UEC - Ubuntu Enterprise Cloud- Ubuntu + Eucalyptus .

4.4 Cloud Services
         Cloud computing provides three different kind of services :Platform as a Service(PaaS), Infrastructure as a
Service (IaaS) and So ftware as a Serv ice (SaaS). In PaaS, p latform for developing and deploying an application is
provided as a service to developers over the Web. Examp les include Google AppEngine, Azure services and Amazon
web services[4].In IaaS, hardware (server, storage and network), and associated software (operating systems virtualization
technology, file system) are delivered as a service to cloud users. Examples include VMware, Amazon EC2.Software as
a Service hosts and manages a given application in their o wn data center and makes it available to mu ltip le tenants and
users over the Web. Some SaaS providers use another cloud provider’s PaaS or IaaS to offer their service s. Some of
SaaS providers include Oracle CRM On Demand, Salesforce.co m, and Netsuite.

4.5 Security And Management
         when cloud services are used security policies should be deployed to protect data, applications, and the
associated infrastructure. Cloud users must trust the cloud providers with their environ ment and data.Identification &
authentication: Prio rit ies and permissions may be granted to specified users to access cloud resources. Every user must be
verified and validated using various security mechanisms. uthorizat ion : Authorization policy in cloud computing will
determine the type of services, resources or activities the user is permitted. The cloud users must be authorized before
performing certain activities. onfidentiality: Confidentiality plays an important role in cloud computing. Organization’s
data is distributed in cloud across multip le remote servers. Protecting data in cloud computing, allo ws for information
security protocols to be enforced at various layers of cloud applicat ions.

         Integrity: lthough outsourcing data into the cloud is economically attractive for the cost and complexity of long-
term large-scale data storage, it’s lacking of offering strong assurance of data integrity and availability may impede its
wide adoption by both enterprise and individual cloud users [5]. Therefore cloud’s data should be robustly imposed with
ACID (atomicity, consistency, isolation and durability) properties .

          Non-repudiation: A sender or receiver of a message cannot deny having sent or received the message . Using the
traditional e-co mmerce security protocols and token provisioning to data transmission, cloud providers can assure non-
repudiation in Cloud computing . Availability: Availability is one of the most crit ical in formation security requirements in
Cloud computing because it is a key decision factor when deciding among private, public or hy brid cloud vendors as well
as in the delivery models. The service level agreement is the most important document which highlights the trepidation of
availability in cloud services and resources between the cloud provider and client.

5. Future of the Cloud
          Industry analysts including Gartner expects 90 percent of organizations surveyed expect to grow with cloud
citing cost-effectiveness and ease/speed of deployment as primary reasons for adoption. Organizat ions will make use of
several trends such as shared, virtualized and automated IT architectures. Businesses of all sizes will adopt cloud due to
the introduction of cloud-enabled application platforms .

6. Conclusion
        Cloud computing model has immense potential as it offers significant performance gains a s regards to response
time and cost saving under dynamic workload scenarios [6]. This art icle d iscusses the concept of cloud computing,
implementation mechanism, arch itecture and several forms and characteristics of cloud computing.There exists lot of
opportunities in cloud computing to explo re further for researchers as well as industrial developers.

        Key open issues that needs further investigation includes Security, Privacy and Trust, Cloud Interoperability,
Dynamic Pricing of Cloud Services, Dynamic Negotiation and SLA Management, Energy Efficient Resource Allocation
and User QOS and Regulatory and Legal Issues.
Issn 2250-3005(online)                              November| 2012                                                 Page 168
I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7


References
[1].    www.n ist.gov › ITL › Co mputer Security Division
[2].    2.Cloud Co mputing PMO .Cloud Co mputing Initiat ive:May 6, 2009 Su mmit Briefing Book
[3].                                                                                                       . Web
        Information Systems and Technologies: 7th International Conference WEBIST 2011, Noordwijkerhout,
[4].                                                                                                       The
        Netherlands, May 6-9, 2011, Revised Selected Papers
[5].    Amazon simple storage service. Web Page
[6].    http://www.amazon.co m/gp/browse.html?node=164272 61
[7].    Cong Wang, Qian Wang, Ku i Ren, Wenjing Lou, "Towards Secure and Dependable Storage Services in
[8].    Cloud Co mputing," IEEE transactions on Services Co mputing, 06 May 2011
[9].    Rajku mar Buyya, Anton Beloglazov, and Jemal Abawajy. “Energy-Efficient Management of Data Center
[10].   Resources for Cloud Co mputing: A Vision, Arch itectural Elements, and Open Challenges ” .Elsevier journal,
[11].   june 2009
[12].   Sankaran Sivathanu, Ling Liu, Mei Yiduo, and Xing Pu.” Storage Management in Virtualized
[13].   Cloud Environment” cloud co mputing, 2010 IEEE international conference.
[14].   http://www.v mware.co m/virtualization/
[15].   Toby Velte , Anthony Velte , Robert Elsenpeter . Cloud Co mputing, A Practical Approach. Ed ition 2010.




Issn 2250-3005(online)                             November| 2012                                               Page 169

More Related Content

What's hot

Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 

What's hot (20)

Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
51 59
51 5951 59
51 59
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Cloud Technology_Concepts
Cloud Technology_ConceptsCloud Technology_Concepts
Cloud Technology_Concepts
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
489 493
489 493489 493
489 493
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
176
176176
176
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
484 488
484 488484 488
484 488
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 

Viewers also liked

极客活动28期 嘉宾分享 - 我查查
极客活动28期   嘉宾分享 - 我查查极客活动28期   嘉宾分享 - 我查查
极客活动28期 嘉宾分享 - 我查查geekparknet
 
Accidental Ecologist
Accidental EcologistAccidental Ecologist
Accidental EcologistLaura James
 
Landing Pages & A/B Testing
Landing Pages & A/B TestingLanding Pages & A/B Testing
Landing Pages & A/B TestingVigLink
 
Phase One Report: Comparative Evaluation and Recommended Organizational Model
Phase One Report: Comparative Evaluation and Recommended Organizational ModelPhase One Report: Comparative Evaluation and Recommended Organizational Model
Phase One Report: Comparative Evaluation and Recommended Organizational Modelnsegura85
 

Viewers also liked (6)

极客活动28期 嘉宾分享 - 我查查
极客活动28期   嘉宾分享 - 我查查极客活动28期   嘉宾分享 - 我查查
极客活动28期 嘉宾分享 - 我查查
 
Accidental Ecologist
Accidental EcologistAccidental Ecologist
Accidental Ecologist
 
Landing Pages & A/B Testing
Landing Pages & A/B TestingLanding Pages & A/B Testing
Landing Pages & A/B Testing
 
Phase One Report: Comparative Evaluation and Recommended Organizational Model
Phase One Report: Comparative Evaluation and Recommended Organizational ModelPhase One Report: Comparative Evaluation and Recommended Organizational Model
Phase One Report: Comparative Evaluation and Recommended Organizational Model
 
China user group keynote
China user group keynoteChina user group keynote
China user group keynote
 
GIVE 'EM HELL HERALD
GIVE 'EM HELL HERALDGIVE 'EM HELL HERALD
GIVE 'EM HELL HERALD
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 
Cloud computing
Cloud computingCloud computing
Cloud computingJawhar Ali
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

G0314043
G0314043G0314043
G0314043
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
Ijetcas14 440
Ijetcas14 440Ijetcas14 440
Ijetcas14 440
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7 Key infrastructure elements for cloud computing S.J.Mohana 1, M.Saroja 2, M.Venkatachalam3 1,2,3, of Co mputer Applicat ions, Erode Arts and Science college,Erode, India) Abstract Clouds consist of a collection of virtualized resources, which include both computational and storage facilities that can be provisioned on demand, depending on the users’ needs. users are charged on a pay -per-use basis. This paper gives a quick overview of cloud and describes the key infrastructure elements for cloud computing . This paper is a brief survey based of readings on “cloud” computing and it tries to ad dress, related research topics and challenges ahead. Keywords – cloud computing, middleware, hypervisor, security,management, virtualization. 1. Introduction Cloud computing has been the most prevalent technology in the past few years. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable co mputing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction[1]. Cloud providers should satisfy customers’ various workload requirements. When cost of operating cloud resource is considered, then the makespan also becomes an important issue. The Cloud is drawing the attention from the Information and Co mmunicat ion Technology community because of the set of services with common characteristics, provided by important industry players. However, existing technologies of cloud computing such as virtualization, ut ility co mputing and distributed computing are not new. 2. Types Of Cloud Clouds can be classified as public, private, co mmunity or hybrid depending on the model of deploy ment. A private cloud is the cloud infrastructure owned or leased by a single organization and is operated solely for that organization. A public cloud is owned by an organization selling cloud services to the general public or to a large industry group. A Co mmunity cloud is shared by several organizat ions and supports a specific co mmunity that has shared concerns (e.g. mission, security requirements, policy, and comp liance considerations). A hybrid cloud is a co mposition of two or more clouds (private, commun ity, or public) that are bound together by standardized or proprietary technology that enables data and application portability (e.g. cloud bursting). 3. Key Characteristics On-demand self-service: Without human intervention, cloud user should be able to use computing apabilit ies, such as server time and network storage, as and when needed. Pay per use: cloud users are charged for what they use. The pricing model depends on the quality and uantity of services consumed [2] . So me of the factors considered for billing includes measuring storage, andwidth and consumption of computing resources. Ubiquitous network access : Ubiquitous network access allows all users to access any kind of information at anytime, and fro m anywhere. Location independent resource pooling: The provider's computing resources are pooled to serve all consumers using a mu lti-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand[3]. Location of the cloud resources are abstracted from the consumers. Some of the cloud resources include storage, processing, memory, network bandwidth, and virtual machines. Rapid elasticity: cloud computing has the ability to scale resources up and down as needed. For the consumers, the cloud resources available for rent appear to be infin ite and can be purchased in any quantity at any time. 4. Architectural Blocks The key infrastructural elements of cloud are hard ware& networking, hypervisor , middleware, security &management Issn 2250-3005(online) November| 2012 Page 166
  • 2. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7 Figure 1: cloud architectural blocks 4.1 Hardware and Networking The lower layer of cloud infrastructure has hardware and networking devices. It includes storage devices, ervers, cooling units, power units , other hardware and networking components . 4.2 Hypervisor A hypervisor can also be termed as virtual machine manager. It is a software that allows mo re than one operating systems to share a single hardware host. Each operating system appears to have the host machines resources all to itself.However, the virtual machine manager is actually controlling and allocating the host machine’s resources to each operating system. Hypervisor also makes sure that virtual mach ines cannot disrupt each other. Figure 2 : virtual machines Basically, there are two kinds of server virtualization techniques: full virtualization and para virtualization. In full virtualizat ion Virtual machine talks to hypervisor which communicates with the hardware platform. CPU understands the unmodified instructions generated by Virtualized OS. Advantages of full virtualization are complete decoupling of the software fro m the hardware and comp lete isolation of d ifferent applications. Disadvantages are VMM should provide additionally virtual bios, virtual memory space and virtual devices and also hypervisor creates and maintains data structures like shadow memory page table . VM ware’s virtualization products and Microsoft Virtual Server are examples of full virtualization. In para virtualization guest OS uses specialized API that talks to the VMM which sends the virtualizat ion requests to the hardware. VMM does not need a resource intensive translation of instructions .Advantages of para virtualizat ion are near native performance and migrat ion .Disadvantage is that it is not applicable for Windows OS .Xen is a virtual machine monitor (hypervisor) for IA -32 (x86, x86-64), IA-64 architectures. It allo ws several guest operating systems to be executed on the same co mputer hardware concurrently. 4.3 Cloud Mi ddleware Software that integrates applications, services and content available on the cloud is called cloud middleware. Middleware is a software that glues various elements of cloud computing. Middleware is an important component of Issn 2250-3005(online) November| 2012 Page 167
  • 3. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7 cloud computing as it helps complex applications on a cloud to contact each other constantly to work in unison. Applications and web components hosted anywhere on the cloud can be re -used with this middleware technology. Some key characteristics possessed by Cloud Middleware are data management , user interfaces and portals , identity / security management , billing & metering and management & monitoring .Various Cloud Middleware ’s include Eucalyptus - University of California ,Nimbus - Globus alliance ,Open Nebula - DSA Research, Reservoir - European Union FP7 (associated with OpenNebula) and UEC - Ubuntu Enterprise Cloud- Ubuntu + Eucalyptus . 4.4 Cloud Services Cloud computing provides three different kind of services :Platform as a Service(PaaS), Infrastructure as a Service (IaaS) and So ftware as a Serv ice (SaaS). In PaaS, p latform for developing and deploying an application is provided as a service to developers over the Web. Examp les include Google AppEngine, Azure services and Amazon web services[4].In IaaS, hardware (server, storage and network), and associated software (operating systems virtualization technology, file system) are delivered as a service to cloud users. Examples include VMware, Amazon EC2.Software as a Service hosts and manages a given application in their o wn data center and makes it available to mu ltip le tenants and users over the Web. Some SaaS providers use another cloud provider’s PaaS or IaaS to offer their service s. Some of SaaS providers include Oracle CRM On Demand, Salesforce.co m, and Netsuite. 4.5 Security And Management when cloud services are used security policies should be deployed to protect data, applications, and the associated infrastructure. Cloud users must trust the cloud providers with their environ ment and data.Identification & authentication: Prio rit ies and permissions may be granted to specified users to access cloud resources. Every user must be verified and validated using various security mechanisms. uthorizat ion : Authorization policy in cloud computing will determine the type of services, resources or activities the user is permitted. The cloud users must be authorized before performing certain activities. onfidentiality: Confidentiality plays an important role in cloud computing. Organization’s data is distributed in cloud across multip le remote servers. Protecting data in cloud computing, allo ws for information security protocols to be enforced at various layers of cloud applicat ions. Integrity: lthough outsourcing data into the cloud is economically attractive for the cost and complexity of long- term large-scale data storage, it’s lacking of offering strong assurance of data integrity and availability may impede its wide adoption by both enterprise and individual cloud users [5]. Therefore cloud’s data should be robustly imposed with ACID (atomicity, consistency, isolation and durability) properties . Non-repudiation: A sender or receiver of a message cannot deny having sent or received the message . Using the traditional e-co mmerce security protocols and token provisioning to data transmission, cloud providers can assure non- repudiation in Cloud computing . Availability: Availability is one of the most crit ical in formation security requirements in Cloud computing because it is a key decision factor when deciding among private, public or hy brid cloud vendors as well as in the delivery models. The service level agreement is the most important document which highlights the trepidation of availability in cloud services and resources between the cloud provider and client. 5. Future of the Cloud Industry analysts including Gartner expects 90 percent of organizations surveyed expect to grow with cloud citing cost-effectiveness and ease/speed of deployment as primary reasons for adoption. Organizat ions will make use of several trends such as shared, virtualized and automated IT architectures. Businesses of all sizes will adopt cloud due to the introduction of cloud-enabled application platforms . 6. Conclusion Cloud computing model has immense potential as it offers significant performance gains a s regards to response time and cost saving under dynamic workload scenarios [6]. This art icle d iscusses the concept of cloud computing, implementation mechanism, arch itecture and several forms and characteristics of cloud computing.There exists lot of opportunities in cloud computing to explo re further for researchers as well as industrial developers. Key open issues that needs further investigation includes Security, Privacy and Trust, Cloud Interoperability, Dynamic Pricing of Cloud Services, Dynamic Negotiation and SLA Management, Energy Efficient Resource Allocation and User QOS and Regulatory and Legal Issues. Issn 2250-3005(online) November| 2012 Page 168
  • 4. I nternational Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 7 References [1]. www.n ist.gov › ITL › Co mputer Security Division [2]. 2.Cloud Co mputing PMO .Cloud Co mputing Initiat ive:May 6, 2009 Su mmit Briefing Book [3]. . Web Information Systems and Technologies: 7th International Conference WEBIST 2011, Noordwijkerhout, [4]. The Netherlands, May 6-9, 2011, Revised Selected Papers [5]. Amazon simple storage service. Web Page [6]. http://www.amazon.co m/gp/browse.html?node=164272 61 [7]. Cong Wang, Qian Wang, Ku i Ren, Wenjing Lou, "Towards Secure and Dependable Storage Services in [8]. Cloud Co mputing," IEEE transactions on Services Co mputing, 06 May 2011 [9]. Rajku mar Buyya, Anton Beloglazov, and Jemal Abawajy. “Energy-Efficient Management of Data Center [10]. Resources for Cloud Co mputing: A Vision, Arch itectural Elements, and Open Challenges ” .Elsevier journal, [11]. june 2009 [12]. Sankaran Sivathanu, Ling Liu, Mei Yiduo, and Xing Pu.” Storage Management in Virtualized [13]. Cloud Environment” cloud co mputing, 2010 IEEE international conference. [14]. http://www.v mware.co m/virtualization/ [15]. Toby Velte , Anthony Velte , Robert Elsenpeter . Cloud Co mputing, A Practical Approach. Ed ition 2010. Issn 2250-3005(online) November| 2012 Page 169