Principles, Methodology and Tools for Engineering Cloud Computing Systems

Author(s):  
Luis M. Vaquero ◽  
Luis Rodero-Merino ◽  
Juan Cáceres ◽  
Clovis Chapman ◽  
Maik Lindner ◽  
...  

Cloud computing has emerged as a paradigm to provide every networked resource as a service. The Cloud has also introduced a new way to control cloud services (mainly due to the illusion of infinite resources and its on-demand and pay-per-use nature). Here, we present this lifecycle and highlight recent research initiatives that serve as a support for appropriately engineering Cloud systems during the different stages of its lifecycle.

2012 ◽  
pp. 1553-1575
Author(s):  
Luis M. Vaquero ◽  
Luis Rodero-Merino ◽  
Juan Cáceres ◽  
Clovis Chapman ◽  
Maik Lindner ◽  
...  

Cloud computing has emerged as a paradigm to provide every networked resource as a service. The Cloud has also introduced a new way to control cloud services (mainly due to the illusion of infinite resources and its on-demand and pay-per-use nature). Here, we present this lifecycle and highlight recent research initiatives that serve as a support for appropriately engineering Cloud systems during the different stages of its lifecycle.


2019 ◽  
pp. 211-225
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.


Web Services ◽  
2019 ◽  
pp. 712-727
Author(s):  
Fawzy Soliman

Cloud systems could help companies to optimize the structure and operation of supply chain and improve organizational performance into a higher level. In this chapter, the advantages and basic operation methods of cloud computing are analyzed, and the essential factors that contribute to the success of the cloud system are evaluated through some business examples. Supply chain firms rely on cloud system to share resources and to achieve integration through the Internet. Cloud systems could transform customer relationship and internal operation to achieve sustainable competitive advantages. Cloud services are providing the ability to share information to the supply chain at any time anywhere. This chapter explores the relationship between supply chain organization and cloud computing. This chapter also discusses the benefits and advantage to evaluate of cloud system in successful factors.


Author(s):  
Saravanan K ◽  
P. Srinivasan

Cloud IoT has evolved from the convergence of Cloud computing with Internet of Things (IoT). The networked devices in the IoT world grow exponentially in the distributed computing paradigm and thus require the power of the Cloud to access and share computing and storage for these devices. Cloud offers scalable on-demand services to the IoT devices for effective communication and knowledge sharing. It alleviates the computational load of IoT, which makes the devices smarter. This chapter explores the different IoT services offered by the Cloud as well as application domains that are benefited by the Cloud IoT. The challenges on offloading the IoT computation into the Cloud are also discussed.


Author(s):  
Christoph Reich ◽  
Sandra Hübner ◽  
Hendrik Kuijs

Cloud computing is used to provide users with computer resources on-demand any time over the Internet. At the Hochschule Furtwangen University (HFU) students, lecturers, and researchers can leverage cloud computing to enhance their e-learning experience. This chapter presents how cloud computing provides on-demand virtual desktops for problem solving, on-demand virtual labs for special courses, and on-demand collaboration platforms to support research groups. The focus is how cloud services can be used, how they can be integrated into the existing HFU-IT infrastructure, and how new didactic models could look.


Author(s):  
Hongyan Tang ◽  
Ying Li ◽  
Tong Jia ◽  
Xiaoyong Yuan ◽  
Zhonghai Wu

To better understand task failures in cloud computing systems, the authors analyze failure frequency of tasks based on Google cluster dataset, and find some frequently failing tasks that suffer from long-term failures and repeated rescheduling, which are called killer tasks as they can be a big concern of cloud systems. Hence there is a need to analyze killer tasks thoroughly and recognize them precisely. In this article, the authors first investigate resource usage pattern of killer tasks and analyze rescheduling strategies of killer tasks in Google cluster to find that repeated rescheduling causes large amount of resource wasting. Based on the above observations, they then propose an online killer task recognition service to recognize killer tasks at the very early stage of their occurrence so as to avoid unnecessary resource wasting. The experiment results show that the proposed service performs a 93.6% accuracy in recognizing killer tasks with an 87% timing advance and 86.6% resource saving for the cloud system averagely.


2015 ◽  
Vol 6 (1) ◽  
pp. 24-46
Author(s):  
Azadeh Alebrahim ◽  
Denis Hatebur ◽  
Stephan Fassbender ◽  
Ludger Goeke ◽  
Isabelle Côté

To benefit from cloud computing and the advantages it offers, obstacles regarding the usage and acceptance of clouds have to be cleared. For cloud providers, one way to obtain customers' confidence is to establish security mechanisms when using clouds. The ISO 27001 standard provides general concepts for establishing information security in an organization. Risk analysis is an essential part in the ISO 27001 standard for achieving information security. This standard, however, contains ambiguous descriptions. In addition, it does not stipulate any method to identify assets, threats, and vulnerabilities. In this paper, the authors present a method for cloud computing systems to perform risk analysis according to the ISO 27001. The authors' structured method is tailored to SMEs. It relies upon patterns to describe context and structure of a cloud computing system, elicit security requirements, identify threats, and select controls, which ease the effort for these activities. The authors' method guides companies through the process of risk analysis in a structured manner. Furthermore, the authors provide a model-based tool for supporting the ISO 27001 standard certification. The authors' tool consists of various plug-ins for conducting different steps of their method.


Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.


2012 ◽  
Vol 4 (1) ◽  
pp. 52-66 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu ◽  
Wei Jie

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
Osuolale A. Festus ◽  
Adewale O. Sunday ◽  
Alese K. Boniface

The introduction of computers has been a huge plus to human life in its entirety because it provides both the world of business and private an easy and fast means to process, generate and exchange information. However, the proliferation of networked devices, internet services and the amount of data being generated frequently is enormous. This poses a major challenge, to the procurement cost of high performing computers and servers capable of processing and housing the big data. This called for the migration of organizational and/or institutional data upload to the cloud for highlevel of productivity at a low cost. Therefore, with high demand for cloud services and resources by users who migrated to the cloud, cloud computing systems have experienced an increase in outages or failures in real-time cloud computing environment and thereby affecting its reliability and availability. This paper proposes and simulates a system comprising four components: the user, task controller, fault detector and fault tolerance layers to mitigate the occurrence of fault combining checkpointing and replication techniques using cloud simulator (CloudSim).


Sign in / Sign up

Export Citation Format

Share Document