A Systematic Mapping Study on Cloud Computing

Preview:

DESCRIPTION

Apresentação de pré-defesa de mestrado, 04-Feb-2012, A Systematic Mapping Study on Cloud Computing

Citation preview

Outline q INTRODUCTION

q Problem & Research Questions q Objectives

q RESEARCH METHODOLOGY q Search Strategy q Data Source q Study Selection q Classification Scheme q Data Extraction Strategy

q RESULTS q FINAL CONSIDERATIONS

1/65

INTRODUCTION

What is the Cloud?

" is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. NIST

3/65

Evolution of core concept

“...computing may someday be organized as a public utility just as the telephone system is

a public utility... The computer utility could become the basis of a new and important industry”

John McCarthy 1961-2011

4/65

Evolution of core concept

5/65

Evolution of core concept

6/65

Evolution of core concept

7/65

Evolution of core concept

8/65

Comparing Gartner

9/65

Global attention to the Cloud

q  Crisis 2008; q  Global economic crisis (today); q  The promise of Lower upfront IT costs [1]; q  Opportunities; q  New business models;

10/65

The Problems

q  It gains are still unsure; q  conception of contracts of service [2] [3]; q  software architecture to develop a SaaS [6]; q  the data privacy [23]; q  agile process methodology [16]; q  LAWs [11] [12] [5];

11/65

The Problems

12/65

About experiments from UFPE q  Jobs; q  software engineering; q  Business Models; q  Sustainability; q  Federated Clouds

The Proposal

q  Combining systematic Mapping Studies [34] and Systematic Reviews [39] this study aims to map out the cloud computing area while its mainly problems, solutions and challenges, synthesizing available evidences to suggest important implications for practice, as well as, identifying research trends and open issues.

13/65

The Main Question

q  What are the main problems and solutions in cloud computing area?

14/65

The Sub-Question q  RQ1. Which challenges were found regarding to

economic problems? q  RQ2. What problems and solutions were found

regarding to SLA? q  RQ3. What are the cloud computing social impact? q  RQ4. What are the challenges found regarding to

infrastructures of datacenters and development of applications?

q  RQ5. What are the main challenges regarding to the Elastic property?

q  RQ6. What are the problems and solutions about data storage?

q  RQ7. How is performed the monitoring of services? q  RQ8. Which are the main security challenges?

15/65

RESEARCH METHODOLOGY

Overview

Fig. 1. The Systematic Mapping Process [34].

17/65

Search Strategy

Fig. 2.Cycle for refine Terms

18/65

STRINGS

19/65

Data Source

q  ACM Digital library, ScienceDirect, IEEE Xplore, COMPENDEX, SCOPUS, and DBLP;

q  All search string were checked by more than one author.

q  Snowballing q  Journals and Events referred by Researchers

20/65

Including and Excluding

INCLUDING §  Research that explores Cloud computing as mainly focus; §  Studies that address utility computing linked to Cloud computing; §  Studies that address comparison among cloud and grid computing; §  Books with access to chapters.

EXCLUDING §  Studies that dont have Cloud as the main focus; §  Duplicated Studies; §  Keynotes and Whitepapers.

21/65

Classification

22/65

Stages of Process

23/65

RESULTS

q  Investments grossly underutilized[49];

u Industry •  Servers: 30-40%; •  Desktops: less than 5%;

u Academy •  maintainability of scientific projects[7][15];

25/65

RQ1 - Which challenges were found regarding to economic problems?

RQ1 - Which challenges were found regarding to economic problems?

26/65

Flexibility of Cloud deployment Models [51].

27/65

RQ1 - Which challenges were found regarding to economic problems?

q  Billing; q  SMEs flexibility; q  Choice of Tecnology (Pandora Planning System )

28/65

RQ1 - Which challenges were found regarding to economic problems?

PROBLEMS §  the greatest issue was the penalties as a consequence of

contracts broken [2] [3] [4] [31] [53]; §  Transparency on contracts [4] [53];

SOLUTIONS §  MONITORING; §  Algorithms: Weighted Round Robin (WRR) and First In First Out

(FIFO)[53] §  SLA among components of System

29/65

RQ2 - What problems and solutions were found regarding to SLA?

USER §  “In terms of service availability, can you get you vendor to sign

a Service-level agreement?”; §  “What happens if the SLA is not met?”; and §  “How data is handled when the service contract ends, the type

of data returned to the company?”.

30/65

RQ2 - What problems and solutions were found regarding to SLA?

E-Government: §  For [10], cloud computing platform can help the

Government on its procedures, reducing the delays.

31/65

RQ3 - What are the cloud computing social impact?

32/65

RQ3 - What are the cloud computing social impact?

LAWS: §  In [11], the author affirms that due to nature of cloud

computing (distributed and flexible), collects evidences about facts is a hard work. This is because a data inserted on cloud environments could be encrypted before entering in cloud platform, for example. Or the stored data could be globally disposing among countries. Then, even though an authority solicits information about a fact, it will be a problem.

JOBS: §  With the growing use of technologies such as Hadoop

and Virtualization[14] [55]. GREEN IT

§  [32] the author reported that energy saving dont occur for all cases on his experi- ence.

33/65

RQ3 - What are the cloud computing social impact?

SOFTWARE(choice of a software architecture to develop a SaaS [6]) §  Liquid Architecture. §  MULTI-TENANCY[1]

34/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

35/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

36/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

Classic Database Architecture [6] Distributed Control [6]

37/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

RESERVOIR:

§  A common referred [9] [57] [58] work to guide stakeholders in the development of architectures in the Cloud was the RESERVOIR framework [59].

38/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

q  Best effort §  BROKER(cloud Busting)

39/65

RQ5 - What are the main challenges regarding to the Elastic property?

Broker Components[8]

40/65

RQ5 - What are the main challenges regarding to the Elastic property?

Load Balancer and Scalling Point [63]

41/65

RQ5 - What are the main challenges regarding to the Elastic property?

A standard feedback control system [64]

42/65

RQ5 - What are the main challenges regarding to the Elastic property?

RQ6 - What are the problems and solutions about data storage?

§  Because concentrating of high quantity of requests to storage system, I/O is an evident problem on Cloud Computing [67] [68].

SOLUTION §  Some authors [69] [70] proposes P2P model such as

alternative to solve that problem. §  When the user accesses the storage system during

the reserved time, the requested performance is guaranteed because the storage system allocates the resources according to the reservation, and prioritizes I/O re- quests for the reserved access. [71].

I/O PROBLEM

43/65

RQ6 - What are the problems and solutions about data storage?

q  For guarantee the integrity of data on Cloud, the environment needs to adopt a Proof Of Integrity (POI) protocol [74] [75]. Such protocol prevent the cloud storage archives from misrepresenting or modifying the data stored at it without the consent of the data owner by using frequent checks on the storage archives. However, [74] emphasis the possible overhead generated by POI system.

q On-Line Analytical Processing (OLAP) - (MAPREDUCE) [77] q  [78] presents a how to about SQL on Cloud.

44/65

RQ6 - What are the problems and solutions about data storage?

q  For [57], two approaches can be used in monitoring context;

§  The first the monitoring system is charged for observes

behaviors on infrastructure based on Hard disk, RAM memory and Virtual Machines resource usage.

§  The second is charged for observes point in applications modules such as quantity of users logged or time of life of threads.

45/65

RQ7 - How is performed the monitoring of services?

q  Another suggestion is the usage of Grid Monitoring Architecture (GMA) a project developed by Global Grid Forum [80]

46/65

RQ7 - How is performed the monitoring of services?

q  FEDERATED CLOUD RESTFULL:(Paul, Mariah, Read, CloudStorage, /root/)[24] q  [82] RSA algorithm

q Health Cloud must adopt the security role as a mission and not as a property (information security). That factor gains emphasis when handling with Health care [26] [27] context.

47/65

RQ8 - Which are the main security challenges?

q  patching According to [84] a good way to resolves that problem is creating a centralized flow of update. q Multi-Tenancy isolation among tenants on multi-tenant architecture [85] [86];

48/65

RQ8 - Which are the main security challenges?

Results – Analysis

49/65

Results – Analysis

50/65

Results – Analysis

51/65

Results – Analysis

52/65

Results – Analysis

53/65

Results – Analysis

54/65

Results – Analysis

55/65

Results – Discussion

q  ADOPTION(GRID OR CLOUD); q  PROMISSE OF LOW COST(needs more evidence); q  HOW MUCH ?(SLA MMORPG) q  WARNING: SLA!!! q  GREEN IT; q  REUSE(APEX-PAAS 70% gain on development); q  SCIENCE; q  BROKER SYSTEM(QOS!!); q  GOVERNEMNTs; q  LAWS vs CLOUD; q  Where are BILLING, MONITORING, GREEN IT?

56/65

Results – Discussion

q  SAAS: model-driven [44] Database, mul-titenant maturity levels [1], Service-Oriented Architecture [14] and RESTFull model [24]; q MARKET REQUIREMENTS VS CLOUD; q  STANDARDs

57/65

FINAL CONSIDERATIONS

THREATS OF VALIDITY

q  Research Questions; q  Publication Bias; q  Conduct the Search(ACM

PROBLEM); q Data Extraction;

59/65

Conclusion

q  Investigate State-of-the-art and guide to future researches;

q  Cloud haves many opportunities; q  Some questions of Security (resolving). q  Care with Low Cost Promisse; q  cloud computing is not entirely adequate to the market q  Social machines can help to develop Cloud

60/65

REFERENCES

[1] Cadan, K, Selcuk; ALi, Wen-Syan; Phan, Thomas; Zhou, Minqi(2009). Frontiers in Information and Software as Ser- vices. Conference ICDE 2009. [2] Nae, Vlad; Prodan, Radu; Iosup, Alexandru(2011). A New Business Model for Massively Multiplayer Online Games. Conference ICPE 2011. [3] Luo, Min; Zhang, Liang-Jie; Lei, Fengyun (2010). An Insuan- rance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing. Conference ICWS 2010. [4] Kandukuri, Balachandra Reddy; Ramakrishna Paturi; Rak- shit, Atanu (2009). Cloud Security Issues. SCC 2009. [5] Cho, Brian; Gupta, Indranil (2010). New Algorithms for Planning Bulk Transfer via Internet and Shipping Networks. Conference ICDCS 2010. [6] Kossmann, Donald; Kraska, Tim; Loesing, Simon(2010). An Avaluation of Alternative Architectures for Transaction Pro- cessing in the Cloud. In Conference SIGMOD 2010. [7] Kondo, Derrick; Javadi, Bahman;Malecot, Paul; Cappello, Franck; Anderson, David P (2009). Cost-benefit analysis of cloud computing versus desktop grids. In conference IPDPS 2009. [8] Nair, Srijith K.;Porwal, Sakshi; Dimitrakos, Theo; Ferrer, Ana Juan; Tordsson, Johan; Sharif, Tabassum; Sheridan, Craig; Rajarajan, Muttukrishnan; Khan, Afnan Ullah(2010). Towards Secure Cloud Bursting, Brokerage and Aggregation. In ECOWS 2010. [9] Lin, F.T.; Shih, T.S. (2010). Cloud computing: The emerging computing technology. In Journal ICIC International , vol. 1, number 1, 2010. [10] Zissis, Dimitrios; Lekkas, Dimitrios (2011). Securing e- Government and e-Voting with an open cloud computing architecture. In Journal Government Information Quarterly, vol. 28, issue 2, p.239-251, 2011. [11] Taylor, M; Haggerty, J; Gresty, D; Hegarty, R (2010).Digital evidence in cloud computing systems. Computer Law and Security Report Review 26, p. 204-208, 2010. [12] Doelitzscher, Frank; Reich, Christoph; Sulistio, Anthony(2010). Designing Cloud Services Adhering to Government Privacy Laws. In Conference CIT 2010 [14] Hutchinson, Chuck; Ward, Jeff; Castilon, Karen (2009). Nav- igating the Application Architecture. In Journal IT Profes- sional, Volume 11, Issue 2, p. 18-22, 2009. [15] Hou, Zhengxiong; Zhou, Xingshe (2010).ASAAS: Application Software as a Service for High Performance Cloud Comput- ing. In conference HPC 2010. [16] Guha, R; Al-Dabass, D(2010). Impact of Web 2.0 and Cloud Computing Platform on Software Engineering. In Conference ISED 2010. [23] Zhou, Minqi; Zhang, Rong; Xie, Wei; Qian, Weining; Zhou, Aoying (2010). Security and Privacy in Cloud Computing: A Survey. In conference SKG 2010. [24] Calero, J.M.A; Edwards, N; Kirschnick, J; Wilcock, L; Wray, M (2010). Toward a Multi-Tenancy Authorization System for Cloud Services. In Journal Security & Privacy, IEEE, vol 8,issue 6, 48-55, 2010. [25] Popovic, K. ;Hocenski, Z. (2010). Cloud computing security issues and challenges. In conference MIPRO 2010. [26] Lhr, Hans; Sadeghi, A.R.; Winandy, Marcel (2010). Securing the e-health cloud. In Conference IHI 2010. [31] Chaves, S. Aparecida; Westphall, C. Becker; Lamin, F. Ro- drigo (2010). SLA Perspective in Security Management for Cloud Computing. In Conference ICNS 2010.

……………

[32] Baliga, J; Ayre, R.W.A; Hinton, Kerry; Tucker, R.S. (2010). Green Cloud Computing: Balancing Energy in Processing, Storage and Transport. In Journal Proceedings of the IEEE, vol. 99, No. 1, 2010. [34] K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, Systematic mapping studies in software engineering, in EASE 08: Pro- ceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, University of Bari, Italy, 2008. [39] B. Kitchenham and S. Charters, Guidelines for performing Systematic Literature Reviews in Software Engineering. In conference EBSE 2007. [44] Menzel, Michael; Warschofsky, Robert; Thomas, Ivonne; Willems, Christian; Meinel, Christoph (2010). The Service Security Lab: A Model-Driven Platform to Compose and Ex- plore Service Security in the Cloud. In Conference SERVICES- I 2010. [49] Marston, Sean;Li, Zhi; Bandyopadhyay, Subhajyoti; Zhang, Juheng; Ghalsasi, Anand (2010). Cloud computing-The busi- ness perspective. Journal Decision Support Systems, Vol 51, Issue 1, p.176-189, 2010. [51] Shi, A; Xia, Y; Zhan, H (2010). Applying cloud computing in financial service industry. In Conference ICICIP 2010. [53] Boloor, Keerthana; Chirkova, Rada; Viniotis, Yannis; Salo, Tiia(2010). Dynamic Request Allocation and Scheduling for Context Aware Applications Subject to a Percentile Response Time SLA in a Distributed Cloud. Conference CLOUDCOM 2010. [55] Babu, Shivnath (2010). Towards Automatic Optimization of MapReduce Programs. In Conference SoCC 2010. [57] Elmroth, Erik; Larsson, Lars(2009). Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds. In Conference GCC 2009 [58] Costa, Rostand; Brasileiro, Francisco; Filho, Guido Lemos; Souza, Dnio Mariz(2009). OddCI: On-Demand Distributed Computing Infrastructure. Conference MTAGS 2009 [59] Chapman, Clovis; Emmerich, Wolfgang; Mrquez, Fermn Galn; Clayman, Stuart;Galis, Alex(2011). Software architec- ture definition for on-demand cloud provisioning. Journal Cluster Computing, vol 14, p. 1-22. [63] Mehta, Hemant Kuma; Kanungo, Priyesh; Chandwani, Manohar (2011). Performance Enhancement of Scheduling Algorithms in Clusters and Grids using Improved Dynamic Load Balancing Techniques. In Conference WWW 2011. [64] Li, Qiang; Hao, Qinfen; Xiao, Limin; Li, Zhoujun (2009). Adaptive Management of Virtualized Resources in Cloud Computing Using Feedback Control. In Conference ICISE 2009. [67] Wang, Jianzong; Varman, Peter(2010). Avoiding Performance Fluctuation in Cloud Storage. In conference HiPC 2010. [68] Sivathanu, Sankaran; Liu, Ling; Yiduo, Mei; Pu, Xing (2010). Storage management in virtualized cloud environment. In conference CLOUD 2010. [69] Ke, Xu; Meina, Song; Xiaoqi, Zhang; Junde, Song (2009) .A cloud computing platform based on P2P. In conference ITIME 2009.

……………

[70] Cheng, Kun-Yi,Wu, Chun-Hsin (2009). Peeraid: A resilient path-aware storage system for open clouds. In conference SOCA 2009. [71] Yusuke, Tanimura; Koie, Hidetaka; Tomohiro,Kudoh; Isao, Kojima; Yoshio ,Tanaka (2010). A Distributed Storage System Allowing Application Users to Reserve I/O Performance in Advance for Achieving SLA. In Conference GRID 2010 [74] Kumar, Sravan R.; Saxena, A.(2011).Data integrity proofs in cloud storage. In conference COMSNETS 201. [75] Zheng, Qingji; Xu, Shouhuai (2010). Fail and Dynamic Proofs of Retrievability. In Conference CODASPY 2010. [77] Hadoop. Welcome to MapReduce. http://hadoop.apache.org/mapreduce/. [78] Johnson, J.L. ; (2009). SQL in the Clouds. In Journal Comput- ing in Science & Engineering, vol. 11, issue 4, 2009. [80] B. Tierney, R. Aydt, D. Gunter, W. Smith, V. Taylor, R. Wolski, and M. Swany(2002). A Grid Monitoring Architecture, GWD-I (Informational), Aug. 2002. [Online]. Available: http://www-didc.lbl.gov/GGF-PERF/GMA- WG/papers/GWD-GP-16-3.pdf. [82] Jianhong, Z.; Hua, Chen (2010). Secuirty Storage in the Cloud Computing : A RSA-based Assumption Data Integrity Check without Original Data. In Conference ICEIT 2010. [85] Li, X.Y.; Shi, Yong; Guo, Y.; Ma, W. (2010). Multi-Tenancy Based Access Control in Cloud. In Conference CiSE 2010. [86] Bertram, S.; Boniface, M.; Surridge, M.; Briscombe, N.; Hall- May, M. (2010). On-Demand Dynamic Security for Risk- Based Secure Collaboration in Clouds. In conference CLOUD 2010.

Recommended