An Approach to Evolving Legacy Software System into Cloud Computing Environment

Author(s):  
Shang Zheng ◽  
Feng Chen ◽  
Hongji Yang ◽  
Jianzhi Li

Cloud computing is a new paradigm for the intent of distributed resources sharing and coordinated problem solution. Affected by the Cloud trend and Service-Oriented need, many existing software systems will become legacy systems. These legacy software systems will need Cloud Oriented reengineering, which can facilitate the legacy systems reusable in Cloud Oriented architecture and allow the integration of legacy resources with Cloud features. This research focuses on establishing a general framework to assist with the evolution of legacy systems into Cloud environments. The methodology includes various phases, which use reverse engineering techniques to comprehend and decompose legacy systems, represent legacy resources by XML as Cloud component and integrate these Cloud components into Cloud environment. In this research, a legacy banking system has been chosen as a case study to prove the feasibility of the proposed approach. The legacy banking system can be transformed to run as a Service-Oriented Cloud application, which illustrates the proposed approach is powerful for utilising reusable legacy resources into Cloud environment.

2017 ◽  
Vol 17 (3) ◽  
pp. 165-185 ◽  
Author(s):  
P. Sanyasi Naidu ◽  
Babita Bhagat

Abstract Cloud computing is emerging as a significant new paradigm in the fields of Service-oriented computing, software engineering, etc. The paper aims to characterize the cloud environment and to study the cloud optimization problems. About 50 papers are collected from the standard journals, and it is first reviewed chronologically to find out the contributions in cloud security. After reviewing, the various challenges addressed in the cloud environment and its performance analysis is discussed. In the next section, the exploration of the meta-heuristic study of cloud optimization is done. The algorithms used in the cloud security challenges are discussed and reviewed. The algorithms such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) are exploited for the finding the cloud security problems. As the research outcome, case studies are taken and reviewed. Cloud computing is a vast field, and a lot of problems in it had to be addressed and solved.


Author(s):  
K. Velmurugan ◽  
M.A. Maluk Mohamed

One of the vital reasons for reverse engineering legacy software systems is to make it inter-operable. Moreover, technological advancements and changes in usability also motivate reverse engineering to exploit new features and incorporate them in legacy software systems. In this context, Web services are emerging and evolving as solutions for software systems for business applications in terms of facilitating interactions between business to business and business to customers. Web services are gaining significance due to inherent features like interoperability, simple implementation, and exploiting the boom in Internet infrastructure. Thus, this work proposes a framework based strategy using .net for effortless migration from legacy software systems to Web services. Further, this work also proposes that software metrics observed during the process of reverse engineering facilitate design of Web services from legacy systems.


Author(s):  
L. Rodríguez-Martínez ◽  
M. Mora ◽  
F. Álvarez ◽  
L. Garza ◽  
H. Durán ◽  
...  

Service-oriented software engineering (SoSE) is a new  paradigm for building software systems, fostered by the availability of a new -but already mature- computing technology based on services.  SoSE advances the current object-oriented and the component-based software engineering paradigms. Under that new paradigm, multiple software-system development life cycle (SDLC) methodologies have been proposed; however, none of them have gained a total acceptance as the dominant SDLC in SoSE.  On this theoretical and practical situation, we believe that a research is required to reach more standardized and stabilized knowledge about SDLCs in SoSE.  Thus, this article reviews nine recent SDLCs proposed for SoSE with the aim to present a descriptive-comparative landscape of a relevant range of SDLCs for SoSE. Such description-comparison is guided by two criteria: (i) the extent of completeness of each SDLC, with respect to the proposed phases, activities and delivered artifacts, and (ii) the extent of the Boehm-Turner’s Rigor-Agility balance. Our results suggest that only three of the nine SDLCs studied already provide the best level of completeness and Rigor-Agility. Finally, we consider that the reported descriptivecomparative framework and their findings from each SDLC can be useful also for comparing and elaborating future SDLCs in SoSE.


A new paradigm to cater to the demand for increasingly complex software systems and to shape the way software applications are developed, has emerged, called Cloud Computing. Evolved from the already prevailing and established technologies such as web services, SOA (Service Oriented architecture), virtualization, grid, and cluster computing, Cloud computing proved it to realize the dream of transforming computing as a utility to the customers. Applications developed at Platform as a Service level (Infrastructure as a Service and Software as a Service being the other two levels) face vendor lock-in issue as the proprietary and non-standard APIs offered by providers results in a lack of interoperability and portability among cloud providers. This paper reports on an experiment done to assess the difficulties encountered while porting an application that uses various SQL and NoSQL data stores, message queue service and blob storage of Microsoft Azure, Amazon Web services and Google Cloud platform among each other. The heterogeneity of the incompatible proprietary interfaces makes the porting a non-trivial task. Various problems faced during the portability of the application are discussed and a middleware solution approach to these problems is proposed in this paper.


Author(s):  
Cameron J. Turner ◽  
John M. MacDonald ◽  
Jane A. Lloyd

Ideally, quality is designed into software, just as quality is designed into hardware. However, when dealing with legacy systems, demonstrating that the software meets required quality standards may be difficult to achieve. Evolving customer needs, expressed by new operational requirements, resulted in the need to develop a legacy software quality assurance program at Los Alamos National Laboratory (LANL). This need led to the development of a reverse engineering approach referred to as software archaeology. This paper documents the software archaeology approaches used at LANL to demonstrate the software quality in legacy software systems. A case study for the Robotic Integrated Packaging System (RIPS) software is included to describe our approach.


2012 ◽  
Vol 482-484 ◽  
pp. 2424-2429 ◽  
Author(s):  
De Yi Tai ◽  
Fu Yuan Xu

As a new service-oriented manufacturing paradigm, cloud manufacturing (CMfg) was proposed to realize the added-value and on-demand use of manufacturing resource and ability. Compared with cloud computing, the complexity of CMfg cooperation was analyzed. Supply and demand network of enterprises with multifunction and opening characteristics (SDN) was introduced as a new paradigm of manufacturing cooperation. Dynamic, diversity, fully open and inclusive cooperation are the key concept of SDN. The CMfg cooperation based on SDN was analyzed, from three-dimension of lever, function and space. A model of cooperation-oriented CMfg was built. Resource-oriented, service-oriented and innovation-oriented cooperation were proposed to prompt the implementation and the platform building of CMfg, from the business cooperation perspective.


Author(s):  
W. ERIC WONG ◽  
JENNY LI

Object-oriented languages support many modern programming concepts such as information hiding, inheritance, polymorphism, and dynamic binding. As a result, software systems implemented in OO languages are in general more reusable and reliable than others. Many legacy software systems, created before OO programming became popular, need to be redesigned and updated to OO programs. The process of abstracting OO designs from the procedural source code has often been done with limited assistance from program structural diagrams. Most reengineering focuses on the functionality of the original program, and the OO redesign often results in a completely new design based on the designers' understanding of the original program. Such an approach is not sufficient because it may take a significant amount of time and effort for designers to comprehend the original program. This paper presents a computer-aided semi-automatic method that abstracts OO designs from the original procedural source code. More specifically, it is a method for OO redesign based on program structural diagrams, visualization, and execution slices. We conducted a case study by applying this method to an inventory management software system. Results indicate that our method can effectively and efficiently abstract an appropriate OO design out of the original C code. In addition, some of the code from the original system can be automatically identified and reused in the new OO system.


2019 ◽  
pp. 1124-1156
Author(s):  
Alshaimaa Abo-alian ◽  
Nagwa. L. Badr ◽  
Mohamed F. Tolba

Cloud computing is an emerging computing paradigm that is rapidly gaining attention as an alternative to other traditional hosted application models. The cloud environment provides on-demand, elastic and scalable services, moreover, it can provide these services at lower costs. However, this new paradigm poses new security issues and threats because cloud service providers are not in the same trust domain of cloud customers. Furthermore, data owners cannot control the underlying cloud environment. Therefore, new security practices are required to guarantee the availability, integrity, privacy and confidentiality of the outsourced data. This paper highlights the main security challenges of the cloud storage service and introduces some solutions to address those challenges. The proposed solutions present a way to protect the data integrity, privacy and confidentiality by integrating data auditing and access control methods.


Author(s):  
Zakaria Benlalia ◽  
Karim Abouelmehdi ◽  
Abderrahim Beni-hssane ◽  
Abdellah Ezzati

<p>Cloud computing has emerged as a new paradigm for providing on-demand computing resources and outsourcing software and hardware infrastructures. Load balancing is one of the major concerns in cloud computing environment means how to distribute load efficiently among all the nodes. For solving such a problem, we need some load balancing algorithms, so in this paper we will compare the existing algorithms for web application.and based on results obtained we choose the best among them.</p>


2014 ◽  
Vol 536-537 ◽  
pp. 611-615
Author(s):  
Bang Fan Liu ◽  
Hui Hui Zhong ◽  
Tao Tao ◽  
Yu Han Hu

Cloud computing appears for the development of e-government to provide new ideas and direction. By the basic of cloud computing to build e-government information resources sharing cloud service centers, it is benefit for integration and sharing of information resources, at the same time, information security has also been effectively guaranteed; of course, it is not only Conducive to the establishment of efficient and transparent service-oriented, conservation-oriented, dynamic government; and facilitate to public oversight and political participation, but also conducive to improve the government's own work. Construction of e-government information resources sharing cloud service centers, technology is support system is to protect, to change the concept of interaction and look at the effectiveness.


Sign in / Sign up

Export Citation Format

Share Document