Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The
MAY 2014
www.computer.org/cloudcomputing
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Contact Information
For more information on the search process and to submit
application materials for IEEE Security & Privacy, please contact:
Kathy Clark-Fisher at __________________
kclark-sher@computer.org.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
EDITOR IN CHIEF
EDITORIAL BOARD
Zahir Tari, RMIT University
Rajiv Ranjan, CSIRO Computational Informatics
Eli Collins, Cloudera
Kim-Kwang Raymond Choo, University of South Australia
Ivona Brandic, Vienna University of Technology
David Bernstein, Cloud Strategy Partners
STEERING COMMITTEE
Manish Parashar, Rutgers, the State University of New Jersey
Steve Gorshe, PMC-Sierra (Communications Society
liaison; EIC Emeritus IEEE Communications)
Carl Landwehr, NSF, IARPA (EIC Emeritus IEEE S&P)
Dennis Gannon, Microsoft
EDITORIAL STAFF
CS MAGAZINE
OPERATIONS COMMITTEE
,BUIZ$MBSL'JTIFS.BOBHJOH&EJUPS
kclark-sher@computer.org
_________________
Chris Nelson, Mark Gallaher, Cheryl Baltes, Joan
5BZMPS
BOE,FSJ4DISFJOFS$POUSJCVUJOH&EJUPST
.POFUUF7FMBTDP
+FOOJF;IV.BJ1SPEVDUJPO%FTJHO
3PCJO#BMEXJO4FOJPS.BOBHFS
&EJUPSJBM4FSWJDFT
+FOOJGFS4UPVU.BOBHFS
&EJUPSJBM4FSWJDFT
&WBO#VUUFSFME1SPEVDUTBOE4FSWJDFT%JSFDUPS
4BOEZ#SPXO4FOJPS#VTJOFTT%FWFMPQNFOU.BOBHFS
.BSJBO"OEFSTPO4FOJPS"EWFSUJTJOH$PPSEJOBUPS
IEEE Cloud Computing (ISSN 2325-6095) is published quarterly by the IEEE Computer
Society. IEEE headquarters: Three Park Ave., 17th Floor, New York, NY 10016-5997.
IEEE Computer Society Publications Office: 10662 Los Vaqueros Cir., Los Alamitos, CA
90720; +1 714 821 8380; fax +1 714 821 4010. IEEE Computer Society headquarters:
2001 L St., Ste. 700, Washington, DC 20036.
CS PUBLICATIONS BOARD
Jean-Luc Gaudiot (VP for Publications), Alain April,
Laxmi N. Bhuyan, Angela R. Burgess, Greg Byrd,
Robert Dupuis, David S. Ebert, Frank Ferrante, Paolo
Montuschi, Linda I. Shafer, H.J. Siegel, Per Stenstrm
Subscription rates: IEEE Computer Society members get the lowest rate of US$39
per year. Go to www.computer.org/subscribe to order and for more information on
other subscription prices.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
50
CONTENT
What will the future of cloud computing look like? What are some of the issues
professionals, practitioners, and researchers need to address when utilizing cloud
services? This inaugural issue of IEEE Cloud Computing magazine serves as a forum for the constantly shifting cloud landscape, bringing you original research, best
practices, in-depth analysis, and timely columns from the luminaries in the eld.
THEME ARTICLES
28
Practical Methods
for Securing the Cloud
Edward G. Amoroso
21
FEATURED ARTICLES
Pascal Bouvry
62 Cloud Economics
The Costs of Cloud Migration
Omer Rana
66 Cloud Management
Challenges in Cloud Management
J.P. Martin-Flatin
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
62
10
71
May 2014
Volume 1, Issue 1
www.computer.org/cloudcomputing
74 Cloud Services
Samee U. Khan
Beniamino Di Martino
COLUMNS
86 StandardsNow
Dening Our Terms
Alan Sill
Mazin Yousif
8 Q&A
Q&A with Mazin Yousif, IEEE Cloud
Computing Editor in Chief
78 BlueSkies
Streaming Big Data Processing in
Datacenter Clouds
90 Cloud Tidbits
Todays Tidbit: VoltDB
David Bernstein
Rajiv Ranjan
84 Whats Trending?
53 IEEE CS Information
70 Advertising Index
Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2)
includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products
or services. Authors and their companies are permitted to post the accepted version of their IEEE-copyrighted material on their own Web servers without
permission, provided that the IEEE copyright notice and a full citation to the origin al work appear on the first screen of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copyediting, proofreading and
formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html.
Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution
must be obtained from the IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or pubs-permissions@
_________
ieee.org. Copyright 2014 IEEE. All rights reserved.
Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the
per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.
IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Introducing
IEEE Cloud
Computing:
A Very Timely
Magazine
IT IS A PLEASURE TO WELCOME YOU TO
THE FIRST ISSUE OF IEEE CLOUD COMPUTING. Cloud computing, or simply the cloud, is
changing how we deploy and run IT. Cloud computing promises that we dont need to worry about
running our IT because it will be delivered as a service from inside or outside the enterprise or from
the walls of our offices and homes. Thats a great
vision, and to some extent, its already happening.
So, instead of spending time on our IT, we can
focus on more interesting things: the develop-
MAZIN YOUSIF
T-Systems International
mazin@computer.org
______________
The cloud vision is still a work in progress. Consumers, especially enterprises, have not yet put their full
faith in cloud computing. There are therefore many
opportunities for researchers to improve cloud technologies and elevate them to the promised vision.
This is a call to action to all researchers and technologists to push the envelope to address current
cloud challenges. IEEE Cloud Computing offers a
powerful forum in which to highlight cloud chal2325- 6095/14/$31 .0 0 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Magazine Structure
IEEE Cloud Computing seeks to foster
the evolution of cloud computing and
M AY 2 0 14
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
5
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
I EEE CLO U D CO M P U T I N G
Columns
The columns in IEEE Cloud Computing
will seek to provide in-depth analysis of
cloud-related topics. Well start with the
following list and expand it as the market demands evolve:
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Editorial Board
Finally, I am pleased to announce the
IEEE Cloud Computing editorial board:
r David Bernstein (Cloud Strategy
Partners, USA)
r Ivona Brandic (Vienna University of
Technology, Austria)
r Pascal Bouvry (University of
Luxembourg)
r Kim-Kwang Raymond Choo (University of South Australia)
r Eli Collins (Cloudera, USA)
r Beniamino Di Martino (Seconda
Universit di Napoli, Italy)
r Samee U. Khan (North Dakota
State University, USA)
r J.P. Martin-Flatin (EPFL, Switzerland)
r Omer Rana (Cardiff University,
UK)
r Rajiv Ranjan (CSIRO, Australia)
r Alan Sill (Texas Tech University,
USA)
r Zahir Tari (RMIT, Australia)
These well-accomplished individuals
have extensive experience in cloud computing. They also have the energy and
commitment to deliver an outstanding
magazine. Im very excited to have them
onboard.
Members of the board will serve
as column editors or area editors. The
main role of the area editors is to manage articles submitted in their respecM AY 2 0 14
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
7
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Q&A
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
9
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
DATACENTER MANAGEMENT
Trends and
Challenges in Cloud
Datacenters
Kashif Bilal, Saif Ur Rehman Malik, and Samee U. Khan,
North Dakota State University
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Growth rate
Market
25
200
20
150
15
100
10
50
0
2010
2011
2012
2013
2014
2015
2016
250
0
2017
Year
FIGURE 1. Market and growth rate of public clouds. The market is
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
11
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
DATACENTER MANAGEMENT
FIGURE 2. Adoption of cloud computing in the information and communications technology (ICT) sector. In 2014,
the amount spent on clouds is expected to reach $55 billion annually.
Similarly, JellyFish and Scafida are nonsymmetric DC architectures that randomly connect servers
to switches for high scalability. In the JellyFish architecture, the servers are connected randomly to
switches such that a network switch can be connected to n servers. Each network switch is then connected to k other switches. The Scafida DC architecture has a scale-free network architecture. The
servers are connected to switches using the Barabasi
and Albert network-generation algorithm. Because
of the large number of nodes within the network,
DC architectures cant use conventional routing algorithms. The customized routing algorithms that
DC architectures use, such as DCell Routing, perform poorly under high network loads and many-tomany traffic patterns.
In a previous study,4 we analyzed the network
performance of state-of-the-art DC architectures
with various configurations and traffic patterns.4
Our analysis revealed that server-centric architectures, such as DCell, suffer from high network
delays and low network throughput compared with
12
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
250
180
FatTree
DCell
ThreeTier
FatTree
ThreeTier
DCell
160
200
Throughput
120
150
100
80
100
60
160
40
50
20
0
0
16
32
64
128
256
512
1,024
2,048
4,096
Seconds
FIGURE 3. Average network throughput and packet delay of datacenter networks. As the number of nodes
within the DC architecture increases, DCell experiences higher network delays and low throughput.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
13
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
DATACENTER MANAGEMENT
100
Idle servers
80
60
40
20
0
5,000
10,000
15,000
20,000
25,000
30,000
35,000
40,000
44,270
Time (minutes)
FIGURE 4. Idle servers in the University of New York at Buffalo datacenter. Careful workload placement and
consolidation can result in better resource allocation and thus reduced energy consumption.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
However, dynamic and virtualized cloud environments are prone to failures and workload perturbations. A small performance deprivation or minor
failure in a cloud may have severe operational and
economic impacts. In one incident, a small network
failure in the O2 network (the UKs leading cellular network provider) affected around seven million customers for three days.3 Similarly, because
of a core switch failure in BlackBerrys network,
millions of customers lost Internet connectivity for
three days. In other incidents, the Bank of America
website outage affected around 29 million customers, and Virgin Blue airline lost approximately $20
million because of a hardware failure in its system.14
Major brands faced service outages in 2013, including Google, Facebook, Microsoft, Amazon, Yahoo,
Bank of America, and Motorola.
The cloud market is growing rapidly, and the
European Network and Information Security Agency (ENISA) has projected that approximately 80 percent of public and private organizations will be cloud
dependent by 2014. Many cloud service providers
(CSPs) offer 99.9 percent annual availability of their
services. However, a 99.9 percent availability rate
still translates into 8.76 hours of annual downtime.
For any cloud-dependent organization, around-theclock availability is of utmost importance. Moreover,
even a short downtime could result in huge revenue
losses. For instance, in a survey of 200 DC managers, USA Today reported that DC downtime costs
per hour exceed $50,000.14 The business sector is
expected to lose around $108,000 for every hour of
downtime. InformationWeek reported that IT outages result in a revenue loss of approximately $26.5
billion per year.14
In addition to huge revenue losses, service
downtimes also result in reputation damage and
customer attrition. Therefore, robustness and
failure resiliency within the cloud paradigm is of
paramount importance. We analyzed the robustness
and connectivity of the major DC architectures
under various types of failures, such as random,
targeted, and network-only failures.3 We found
that the legacy DC architectures lack the required
robustness against random and targeted failures.
A single access layer switch failure disconnects
all the connected servers from the network. The
DCell architecture exhibits better connectivity
and robustness against various types of failures.
However, the DCell architecture cannot deliver the
required QoS and performance necessary for large
networks and heavy network loads.
Using consolidation, dynamic power (sleep/
wake) management, and proportional computing
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
15
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
DATACENTER MANAGEMENT
Software-driven thermal
management strategies
Jobs
Thermal
Management
Exhaust lter/fan
Input lters/fans
Exhaust
air to
outside
Air from
outside
ITE racks
Economization
FIGURE 5. Thermal management strategies. Cloud DCs can utilize one or more strategies to regulate and
manage operating temperatures.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
further breakdown of the energy consumption within a DC reveals that an overwhelming portion of
those costs are incurred to stabilize the DCs thermal dynamics, such as the computer room air conditioning (CRAC) units, chillers, and fans. In a typical
DC, the annual electricity cost of cooling alone is $4
to $8 million, including the cost of purchasing and
installing the CRAC units.15 High operating temperatures can decrease the reliability of the underlying
computing devices. Moreover, inappropriate air-flow
management within DCs can create hotspots that
may cause servers to throttle down, increasing the
possibility of failures. The DC industry uses several
strategies to stabilize thermal subtleties. As Figure
5 shows, we can broadly categorize such strategies
into four areas:
r software-driven thermal management and temperature-aware strategies,
r DC design strategies,
r air-flow management strategies, and
r economization.
Software-driven thermal management strategies
mainly focus on maintaining a thermal balance
within the DC. The goal is to reduce the average
heat dissipation of the servers to reduce the cost
of running the CRAC unit. Such strategies adopt
various methods for job allocation. For instance,
genetic-algorithm-based job allocation16 attempts
to select a set of feasible servers to minimize the
thermal impact of job allocation, the integer linearprogramming modeling approach17 aims to meet
real-time deadlines while minimizing hotspots
and spatial temperature differences through job
scheduling, and thermodynamic-formulation and
thermal-profiling-based strategies optimize the
DCs thermal status.18 However, different softwaredriven thermal strategies produce different thermal
footprints, depending on the nature of the workload
being processed.
DC design strategies aim to build efficient
physical DC layouts, such as a raised floor and
hot and cold aisles. In a typical air-cooled DC, hot
and cold aisles are separated by rows of racks. The
CRAC units blower pressurizes the under-floor
plenum with cold air that is drawn through the vents
located in front of the racks in the cold aisle. The
hot air coming out of the servers is pushed into the
hot aisles. To enhance efficiency, DC managers have
added containment systems that isolate hot and cold
aisles to avoid air mixing. Initially, physical barriers,
such as vinyl plastic sheeting or Plexiglas covers,
were used for containment. However, today vendors
M AY 2 0 14
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
17
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
Eucalyptus memory
Open Nebula memory
Nimbus memory
3.5
Memory (Mbytes)
3.0
350
300
2.5
250
2.0
200
1.5
150
1.0
100
0.5
50
DATACENTER MANAGEMENT
0
10
20
30
40
50
60
70
80
90
100
Virtual machines
FIGURE 6. Verication time and memory consumed by VM-based cloud management platforms. The exercise to investigate the
scalability of the models revealed they functioned appropriately as the numbers of VMs increased.
I EEE CLO U D CO M P U T I N G
Despite all the benefits, virtualization technology poses several serious threats and adds further
challenges to efficiently and appropriately managing a DC. Moreover, network services in a virtualized environment have to look beyond the physical
machine level to a lower virtual level. The advent of
virtual switches and virtual topologies bring further
complexity to the DC network topology. A legacy
ThreeTier topology, for example, may grow to four or
five tiers, which may be suboptimal and impractical
in various cloud environments.11 The MAC address
management and scalability of the consolidated
VMs is a major concern that must prevent the MAC
tables from overloading in network devices.
Specifically, virtualization faces some key challenges, including VM hopping, where an attacker on
one VM can access another VM; VM mobility, or the
quick spread of vulnerable configurations that can
be exploited to jeopardize security; VM diversity,
where the range of operating systems creates difficulties when securing and maintaining VMs; and
cumbersome management, where managing the configuration, network, and security-specific settings is
a difficult task. The inception of the cloud is based
on distributed (grid and cluster) computing and
virtualization.
Previous research has focused on the computing and storage aspects of the cloud, while a crucial
aspect, the connectivity (networking), is usually unaddressed.22 In a recent study, we performed formal
modeling, analysis, and verification of three stateof-the-art VM-based cloud management platforms:
Eucalyptus, Open Nebula, and Nimbus.20 The exercise was to demonstrate the models flexibility and
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
SDN-based automated DC networks are a possible solution to the various challenges faced by legacy DC networks, but such technologies are still in
their infancy. Moreover, SDN deployment requires
OpenFlow (or another SDN-based communication
protocol) compliant network devices to operate, but
legacy network devices do not support such communication protocols. In addition, a central SDN controller creates a single point of failure, and prevention of malicious misuse of the SDN platforms is a
major security concern.
nergy efficiency, robustness, and scalability are among the foremost concerns faced by
cloud DCs. Researchers and industry are striving
to find the viable solutions for the challenges facing
DCs. Hybrid DC architectures employing optical
and wireless technologies are one of the strongest
feasible solutions today. The SDN-based DCs architectures are also being considered to handle
various network-related problems and to deliver
high performance. The hybrid DC architectures and
SDN-based DCs are still in their infancy, however.
Therefore, serious research efforts are necessary
to overcome the limitations and drawbacks of the
emerging technologies to deliver the required QoS
and performance.
References
1. Gartner, Forecast Overview: Public Cloud
Services, Worldwide, 20112016, 4Q12 Update,
2013.
2. K. Bilal et al., A Taxonomy and Survey on
Green Data Center Networks, to be published
in Future Generation Computer Systems; doi:10
.1016/j.future.2013.07.006.
3. K. Bilal et al., On the Characterization of
the Structural Robustness of Data Center
Networks, IEEE Trans. Cloud Computing, vol.
1, no. 1, 2013, pp. 6477.
4. K. Bilal et al., Quantitative Comparisons of
the State of the Art Data Center Architectures,
Concurrency and Computation: Practice and
Experience, vol. 25, no. 12, 2013, pp. 17711783.
5. Bell Labs and Univ. of Melbourne, The Power
of Wireless Cloud: An Analysis of the Energy
Consumption of Wireless Cloud, Apr. 2013;
w
w w.ceet.unimelb.edu.au/pdfs/ceet_white_
________________________________
paper_wireless_cloud.pdf.
_________________
6. A. Vahdat et al., The Emerging Optical Data
Center, Proc. Conf. Optical Fiber Comm., 2011;
w w w.opticsinfobase.org /abstract.cfm?URI=
ofc-2011-otuh2.
__________
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
19
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
DATACENTER MANAGEMENT
20
I EEE CLO U D CO M P U T I N G
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Enabling On-Demand
Science via Cloud
Computing
Kate Keahey, Argonne National Laboratory and University of Chicago
Manish Parashar, Rutgers, The State University of New Jersey
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
21
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
I EEE CLO U D CO M P U T I N G
Science On Demand
Large-scale experiments, such as the Large Hadron
Collider (LHC), equipped with millions of sensors
and capable of producing up to petabytes of data per
second, have highlighted the importanceor, rather, the criticalityof computational support as an
extension of scientific instruments. Data produced
in such large quantities often must first be reduced
by orders of magnitude in real time to a volume that
can be stored at an acceptable cost. Data may even
have to be analyzed in real time so that it can provide feedback during the experiment. Additionally,
raw data must be processed into derived products
that give actual insight into the observed phenomena and can be analyzed by groups of diverse scientists contributing their expertise and generating
new scientific insight. Such processing must happen within the context of an experimentthat is,
in real or near-real time. Thus, science is performed
in bursty cycles, akin to the uptick of shopping
during the Christmas season relative to other times
of the year. This exploration pattern increasingly
places a premium on the on-demand availability of
resources, a demand that traditional batch-oriented
computational centers cant always satisfy.
The advent of infrastructure cloud
computing has had a tremendous, disruptive force in this space; it enables
the ability to lease resources on demand
with a preconfigured environment that
guarantees correct and consistent execution. The transformation and the potential that this capability has opened
up are exemplified by the Solenoidal
Tracker at RHIC (STAR) nuclear physics experiment.2 Using a traditional approach, a
local clusters computational capacity would have
throttled the speed at which experimental results
could be processed, and as a result, STAR scientists
would have had to wait almost a year to assess the
results of the experiment. With cloud computing resources, the STAR scientists were able to reduce this
time to just three monthsa significant difference
in a competitive field. Furthermore, the scientists
were able to run the data calibration component of
processing concurrently with data collection, opening up the possibility of adaptively tuning the experimental parameters, a highly desirable capability.
Such advances are particularly interesting as we
consider the types of experiments we are likely to
conduct in the future. Inexpensive and increasingly
sophisticated sensor devices now allow scientists to
instrument ecological systems (such as oceans and
rivers) or cities, turning our planet and everything
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
structure clouds in science and shaping their capabilities and ecosystem into a viable and responsive
scientific tool.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
23
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
24
I EEE CLO U D CO M P U T I N G
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
rather than technological. Perhaps the most important aspect of the cloud computing disruption is that
it has revolutionized our idea of resource procurement. Instead of buying a system wholesale to run a
certain class of computationsan investment that
can cost millions of dollars to buy, house, build, and
operatewe can now shop retail and spend only a
few thousand dollars on a per-computation basis as
the need arises. This capability makes the timecapacity product more flexible. For example, instead of buying a small cluster
and waiting a year for a computation to
complete, researchers can now rent a
large cluster for a short time and complete
the computation using all the available
resources.
Making this equation work, however,
requires admitting that there is a premium on time, in other words, acknowledging that the instantaneous, on-demand
availability of a resource is worth more than batch
cycles and that this should be reflected in the market price of time on said resources. Currently, established funding, procurement, and allocation systems
arent equipped to deal with such a nuanced and
multifaceted concept of worth, even if it can bring
substantial benefits.
And now that we have computing power on tap,
turning the tap on proves to be a nontrivial operation.
Previously, maintenance and user support were provided as part of the wholesale purchase; a traditional
cluster user would expect it to be configured and upgraded as needed and to include all the standard software. In contrast, the cloud currently provides some
features, such as resource availability, but doesnt
provide other features, such as virtual machine configuration. Moreover, choosing the optimal configuration among the myriad cloud offeringsincluding diverse services, instance types, billing models, storage
options, and providersrequires special expertise
and a significant time commitment.
The Case of the Missing Infrastructure
Many of the challenges we outline here are, arguably, merely the growing pains of a deceptively
simple but deeply disruptive innovation. Certainly,
many of them can be resolved with a research and
development investment in critical ecosystem components and by creating new support relationships
that provide the necessary layer between users/applications and cloud services.
A relatively short-term challenge is establishing a cloud ecosystem that can enable and drive research and can address issues related to deployment
M AY 2 0 14
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
25
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
options with varying service levels, networks architectures to support data transport needs and their
interaction with cloud storage offerings, and the colocation of computing and data. Combining those
two areas of exploration into support for cyberphysical systems will ultimately provide a viable platform
for instruments at large.
Lack of understanding of security and privacy
issues as they relate to clouds is a critical barrier to
adoption, especially in areas dealing with private
data such as biomedical applications. Clouds renegotiate the security space with new types of attacks proposed all the time, emphasizing the need
for high-quality security mechanisms because of the
sharing of storage and computing.
In addition to crosscutting cloud security challenges, specific issues related to cloud and CI integration with CDS&E include the interoperability
with broader CI security mechanisms and policies,
such as single-sign-on, federated identify management (such as inCommon, cilogin, and SCIM), and
security policies and mechanisms for specific applications (including differential privacy and data ano-
I EEE CLO U D CO M P U T I N G
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
5.
6.
7.
lthough industry has enthusiastically embraced
cloud computing, and it has demonstrated enticing possibilities for various branches of scienceparticularly those that place a premium on on-demand
availability such as the experimental sciencescloud
computing currently runs the risk of getting stuck
crossing the chasm between potential and reality in its
broad application to scientific problems. This impasse
is due to the computationally demanding nature of scientific applications, both in terms of performance and
infrastructure support, as well as the lack of economic
flexibility in the scientific environment. Catalyzing
progress in this space is essential before the potential
of clouds as enablers for science can be realized.
As we look to the future and ponder the needs
of technologies underlying future experimental instruments that integrate computation as an inherent component, we can see this will become all the
more important. Such computations will rely on the
on-demand availability and control over the environment provided by infrastructure clouds. They will
also require support for the big compute applications
that are currently running in HPC centers. Finding
ways to overcome the performance, usage modes,
and infrastructure barriers currently dividing clouds
and HPC is therefore of primary importance.
References
1. M. Parashar et al., Cloud Paradigms and
Practices for Computational and Data-Enabled
Science and Engineering, Computing in Science
& Eng., vol. 15, no. 4, 2013, pp. 1018.
2. J. Balewski et al., Offloading Peak Processing to
Virtual Farm by STAR Experiment at RHIC, J.
Physics Conf. Series, 2012, p. 368.
3. E. Deelman et al., The Cost of Doing Science on
the Cloud: The Montage Example, Proc. 2008
ACM/IEEE Conf. Supercomputing, 2008, pp. 112.
M AY 2 0 14
8.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
27
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
CLOUD SECURITY
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
29
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
CLOUD SECURITY
Internal, trusted
enterprise resident user
Internal
access
External network
(Internet)
External, untrusted
nonenterprise resident user
Private
cloud
Corporate
rewall
External
access
Enterprise
perimeter
Enterprise
network
FIGURE 1. Private cloud with enterprise perimeter. As the most common solution for enterprise organizations,
made over long periods of time to allow a multitude of enterprise services and approved exceptions
through the corporate firewall, combined with the
increasingly common method of bypassing the perimeter using mobile devices, have rendered the
enterprise perimeter essentially useless from an advanced threat perspective.2
An additional fatal issue with private clouds is
that enterprise security teams cant stop determined
insider attacks. Even in the presence of segregation
of duty controls, as with Sarbanes-Oxley relevant
systems, the approach is vulnerable to collusion,
which is easy to achieve with malware on multiple
compromised systems. Thus, by situating a private
cloud inside the enterprise and assuming that internal access can be trusted, an organization places its
cloud infrastructure at direct risk of compromise.
The result is that private cloud infrastructures
have devolved into architectures that are indistinguishable, at least to the security engineer, from public cloud systems. Purveyors of private clouds may
have control over vendor selection, cloud service fea30
I EEE CLO U D CO M P U T I N G
tures, degree of sharing between users, and day-today system administration, but the idea that theyre
immune to external attacks because of enterprise perimeter protections is no longer justifiable. As such,
private cloud deployments should never rely on an enterprise perimeter as their sole security control.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Internal, trusted
enterprise resident user
External network
(Internet)
Internal
access
External, untrusted
nonenterprise resident users
Firewall,
IDPS, DLP
External
access
Private
cloud
Access
gateway
Enterprise
perimeter
Enterprise
cryptography
Internal
integration
Enterprise
network
Internal
integration
Enterprise
SIEM
FIGURE 2. Private cloud security architecture. Private clouds may incorporate additional enterprise safeguards
r Service provider perimeter. Cloud service providers, like all service providers, run an in-
M AY 2 0 14
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
31
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
CLOUD SECURITY
Authorized
administrative
access
External network
(Internet)
Unauthorized
external traffic
Authorized
external users
Public
cloud
Cloud
service
gateways
Access
(usage or API)
Cloud provider
network
Cloud provider
perimeter
FIGURE 3. Public cloud with service gateways. The gateway approach isnt subject to the security risks of
everyday enterprise usage.
I EEE CLO U D CO M P U T I N G
Content Encryption
To address data confidentiality, cloud encryption is
generally designed to ensure that cloud-resident content cant be retrieved as plain text by APT malware
or by compromised insiders with direct access inside
a perimeter. The encryption algorithms strength and
key management should be based on risk analysis. Encryption tools can be integrated on top of a public or
private cloud infrastructure or can be selected from
native encryption features offered by the cloud service
provider (see Figure 5). The over-the-top encryption
approach lets users maintain control of key management and infrastructure, but it usually increases costs.
Cloud encryption works only if the underlying
cryptographic algorithm or supporting key management cant be broken. Strong, resilient ciphers that
utilize expert cryptanalysis are readily available, so
the primary focus is generally on the security of the
underlying key management. Stated simply, if malicious actors can easily gain access to decryption
keys, then encrypted cloud storage is useless. The
primary security requirements for encrypted content
in the cloud are as follows:
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Authenticated user
account management
Unauthorized
external traffic
CDN
Authorized
external users
Private
cloud
Gateway
security
(rewall,
IDPS, DLP)
Separation
Access
(usage or API)
Cloud provider
perimeter
Internal
integration
Cloud provider
network
SIEM
FIGURE 4. Public cloud security architecture. Cloud service providers run an infrastructure behind gateways
r Stored data secrecy. Encrypting cloud data prevents backdoor leakage and restricts access to
privileged users and administrators. Many companies provide encryption for cloud systems
data at rest, including Pawaa, which encrypts
files at the device before they are sent off to the
cloud infrastructure for storage.
r Cloud storage malware resistance. Encryption
provides malware resistance for stored data, especially in the case of remote access tool (RAT)
attacks that target individuals with authorized
access to data. Additional tools exist to ensure
that malicious users dont insert malware directly into the cloud. Companies such as CipherCloud, for example, include filters that scan
in-bound and outbound cloud content for the
presence of malware.
The functional requirements for most cloud
ciphers include maintaining search capabilities
for stored data as well as the ability to perform big
data analysis. CipherClouds Searchable Strong Encryption (SSE) is one example. Such interoperability with public, private, or hybrid cloud capabilities
and associated business processes is an important
requirement for encryption solutions. Cloud fedM AY 2 0 14
eration and orchestration of key management infrastructure in hybrid systems require a bit more attention, but theyre still practically workable.
Session Containers
A cloud security solution for mobile access to a public cloud involves a session container (see Figure 6).
The idea is that any user interested in obtaining
access to cloud services or content would initiate a
secure connection that would maintain end-to-end
closure, not unlike the way HTML5 sessions are encapsulated between the browser and website. Such
closure usually requires a software client-server arrangement with the provision that no residual information exists on the client device after the session
has been completed.
A key consideration for session containers involves support for multiple personas. Bring-yourown-device (BYOD) environments, for example, require differentiation between corporate personas,
where session-contained access to proprietary applications such as payroll systems is done under a
corporate persona. Correspondingly, access to nonbusiness relevant applications such as games or YouTube is done under nonsession-contained access in a
noncorporate persona.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
33
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
CLOUD SECURITY
Malicious
insider
Direct,
back door
inside access
to data
Malicious
actors
APT
attack
Perimeter
rewall
APT
attack
Successful
data
capture
Unencrypted,
stored plaintext
content
Encrypted,
stored plaintext
content
Successful
data
capture
Cloud
Unsuccessful
data
capture
Perimeter
Direct,
back door
inside access
to data
Unsuccessful
data
capture
Malicious
insider
FIGURE 5. Encrypted content in the cloud. Encryption tools integrated on top of a public or private cloud
34
r Client system data wipe. Session containers ensure that, once a user has completed access to
a cloud-resident object such as an application,
the associated data are properly wiped from the
client device. Invincea, for example, provides a
session container solution that allows for access
to cloud applications from a variety of devices,
such as mobile smartphones, and wipes the data
securely afterward.
r Data separation. Session containers provide dynamic separation of different user activities
within the cloud. The separation is enforced at
the client and server levels by controls that keep
data from being intermingled with resources
outside the container. The company Bromium
uses hardware assistance to ensure trusted separation during user access to cloud resources.
r Multiple persona support. The idea of compart-
I EEE CLO U D CO M P U T I N G
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Cloud session
Client container
Cloud object
Cloud user
Cloud
Cloud session
server (shared)
FIGURE 6. Session container. The user may obtain access to cloud services or content via a secure connection
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
35
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
CLOUD SECURITY
Passive mode:
offline security monitoring
(IDS, SIEM)
Cloud access
security module
(offline)
Cloud user
Cloud access
Cloud access
Cloud
object
Cloud access
security broker
(inline)
Cloud
access
gateway
Cloud
object
Cloud user
Active mode:
in-line security mitigation
(rewall, IPS)
Passive mode:
in-line security monitoring
(IDS, SIEM)
FIGURE 7. Cloud access broker. Brokers, often implemented as a forward or reverse proxy, can provide either
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Cloud user
Cloud object
conguration
Cloud object
conguration
Cloud object
provisioning
Cloud object
provisioning
Object attributes
Runtime security
provisioning
Cloud
object
Object attributes
with security
Runtime
secured object
Cloud user
FIGURE 8. Runtime virtualization. Runtime security components are virtualized alongside the cloud objects theyre intended to
protect.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
37
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
CLOUD SECURITY
Solution A:
Below state
of practice
No protection
Solution B:
Above state of practice,
below target
Typical protection
(existing)
Solution C:
Above target,
below perfect
Target protection
(practical)
Perfect protection
(theoretical)
FIGURE 9. Security protection effectiveness. Today, solutions for threat protection range from below the state
of the practice (solution A), above the state of the practice but below target protection levels (solution B), or
above target protection levels, but below perfect (solution C).
I EEE CLO U D CO M P U T I N G
EDWARD G. AMOROSO is the senior vice president and chief security officer at AT&T, where his primary responsibilities lie in the real-time protection of
AT&Ts vast enterprise, network, and computing infrastructure, including its emerging Long-Term Evolution (LTE) mobile network and cloud services. He
also manages AT&Ts intellectual property and patent
development group. Amoroso has a PhD in computer science from the Stevens Institute of Technology,
where he also serves as an adjunct professor of computer science. He was awarded the AT&T Labs Technology Medal and is an AT&T fellow. Contact him at
eamoroso@att.com.
____________
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Special Issue
on Secure Cloud
Computing Techniques
for Big Data
For IEEE Cloud Computings Sep/Oct 2014 issue
Submission Deadline: 20 July 2014
Submission Guidelines
Submissions will be subject to IEEE Cloud Computing magazines peer-review process. Articles should be at most 6,000
words, with a maximum of 15 references, and should be
understandable to a broad audience of people interested in
cloud computing, big data, and related application areas. The
writing style should be down to earth, practical, and original.
All accepted articles will be edited according to the IEEE
Computer Society style guide. Submit your papers through
Manuscript Central at https://mc.manuscriptcentral.com/
ccm-cs.
_____
Guest Editors
www.computer.org/cloudcomputing
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
ROUNDTABLE
EDSALL
KREBBERS
PAPPE
KHALIDI
Cloud Computing
Roundtable
Mazin Yousif, T-Systems International
Tom Edsall, Cisco
Johan Krebbers, Shell
Stefan Pappe, IBM
Yousef A. Khalidi, Microsoft
40
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
41
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
ROUNDTABLE
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
ise, youll see your large transactional big database systems supporting your ERP system and the like. Some
move to the cloud just fine. Others will probably stay
on premise. You still have systems that are technically built out of very large systems, use half a terabyte
of memory, a big cluster of machines, transactional
workloads, and so on. Trying to move that to the cloud
would be very painful at the moment. The customization you can do on premise isnt really possible in the
cloud. You can do it in a hoster, in which case you really need a hosting place, the same kind of cost structure, anyway, that you might have on premise.
Another example is if you have a lot of data on
premise, latency considerations, or governance considerations you might keep it on premise. These things
would be painful to move to the cloud. It wont be cost
effective. Therefore, I believe that hybrid is the way
were going to live in this space for a long time.
Yousif: How do you envision cloud evolving going
forward, lets say in 2020. Are we going to see more
diversity in services? What about manageability?
What about the degree of automation?
Pappe: Software-defined environments (SDE) are
the drivers for cloud automation, and its implemented in pockets already. SDE enables the abstraction
from the infrastructure, it makes your infrastructure programmable. Thats great because you can
hide all the specifics from lets say our many infrastructure vendors from your cloud automation. For
example, you dont have to bother with your switch
configuration in your network anymore. OpenStack
is a central element to this concept, and our strategy
is very much aligned with OpenStack. SDE based on
OpenStack to programmatically manage your infrastructure without having to manually configure it or
go down to the device. It is enabling the next level
of agilityby having a programmable infrastructure. SDE also prevents a vendor lock-in because
you can move between infrastructures much more
easily. These are the infrastructure benefits, but it
becomes even more interesting, if you couple this
programmable infrastructure with workload awareness. What that means is you will be able to define
your workload characteristics formally, for example
in OpenStack HOT, including the topology and
the networks setup and so on, but also your nonfunctional requirements. For example, you can define thresholds, like for performance and with that
knowledge built into the application definition, your
control layer can automatically react if an incident
happens. So, for example, if your performance falls
below a certain threshold, you monitor it, you will
M AY 2 0 14
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
43
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
ROUNDTABLE
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
es, and policies are applied? Often you dont know the
off-premise rules and policies, as well as you know your
own policies. Lets take the example of the famous malicious insider. On premise, hopefully you dont have
shared privileged IDs, so if theres a malicious insider,
you know who it is. Does your off-premise provider
follow the same rule set? If not, the probability that
theyll catch a malicious insider is much lower.
Krebbers: Im more careful of statements like on
premise is more secure than off premise.
Pappe: My statement is only that if you dont
know the policies, you cant judge. Therefore, a
general statement is difficult to make. But, if you
say, I know cloud provider XYZs policies, and
they publish them, and Im fine with them, then
you have a base on which to judge your security
level. If its not published to the detail you need,
then you cant judge.
Krebbers: You need to create a base, but even if you
have the base, you still need confidence that people
operate against that base. You need to verify it. And
my point is that, internally and externally, dont operate against that base, even if you have agreed upon it.
Yousif: For third-party independent consultants to
do their jobs, do we need to architect additional capabilities in the platforms?
Edsall: That will be a matter of gathering information and providing audit trails and having standards
around what should be done, along with documentation of processes and those sorts of things. I think
a lot of this will be worked out. I do believe there
is room for differentiation as cloud providers might
differentiate themselves on their level of transparency or level of security.
Yousif: This could be along the lines of auditing performance benchmarks.
Krebbers: Yes, but the point we made is farther
along, because certain companies will start offering
certain types of services or certain types of compliance services that will start to add the hooks youre
talking about, but only if you provide the types of
service that will provide the type of hooks you need.
Okay, but I fully focus, in Shell terms, on storing
the most confidential data. If theres data you need
to be very secure, youll need to add another type
of hook to your environment, so there will special
companies for that. There are special companies for
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
45
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
ROUNDTABLE
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Edsall: That will be part of how providers differentiate themselves. For example, theyll provide different
levels of security or compliance, or audit capability,
or maybe theyll provide content to their customers
that you cant get anywhere else. Certainly, if I was
running one of these networks, I would be doing everything I could to attract more customers and trying every economic model I could think of.
Pappe: I see a trend from the pure lowering of IT
costa trend shifting the value to industry solutions, to industry transformations.
Yousif: What does that mean?
Pappe: I mean, using clouds to provide industryspecific applications and value adds, which wouldnt
be possible without cloud. Take Netflix, for example.
Netflix wouldnt be there without cloud. Netflixs
entire business model is based on the cloud. Netflix wrote its own open source platform on top of an
infrastructure cloud service. Netflixs platform is an
industry solution which is a large differentiator for
them and their business model. The future drivers
of cloud are new business models and platforms enabling those which wouldnt work without a cloud.
Yousif: What about cloud use cases, experiences,
and adoption? Do you think enterprises will have
full faith in the cloud by that timeframe, that user
experiences will be always positive? Are we going to
see additional use cases that will be defined?
Edsall: Certainly not everyone is using cloud yet. In
fact, most enterprises dont have a cloud. Theyre developing their cloud strategies. Theyre experimenting with it and clearly there are exceptions. Theres
a whole decision process theyre going through right
now, whether they want to have the cloud on premise or off.
That will be mostly driven by economics. As the
infrastructure community reacts to whats happening in the cloud space, those economics are changing. Until just recently, if you wanted a private
cloud, you had to build it yourself using components
designed for a different kind of infrastructure. Now
were starting to see products designed for the cloud.
So maybe I can build my own cloud economically. I
might therefore evaluate the on-premise versus offpremise decision a bit differently.
There is also the question, If Im going to use
cloud, will it be on-premise or off-premise? I recently had some feedback that companies are pulling
back a little bit from off premise, primarily because
M AY 2 0 14
of recent US National Security Agency (NSA) revelations. This is related to concerns about who is really looking at my data when it is off premise.
Pappe: Let me put a different spin on it. Im not as
strict as Johan in terms of cloud vis--vis on premise.
Were seeing a transformation in how we develop and
deploy applications. Say some developers are writing
an application using the DevOps method. The process is driven by continuous delivery, so turnaround
times are fast. A cloud delivery model is essential for
such a process to work, regardless of whether the
cloud runs on or off premise. The cloud model is the
underlying principle of such a DevOps model. The
ability to execute that is a huge value for our enterprise and our clients, because they derive business
value out of it. They become more agile and they can
differentiate themselves better from the competition,
and thats more than infrastructure services.
Khalidi: A few years back, it was testing and development, not production. Now were seeing production
in the cloud. Were also seeing new application mixes
in the cloud. Youll see more and more services running in the cloud that are extending what you have
on premise and, importantly, adding value to what
you have. In the next few years, I predict well see a
combination of more lift and shift, more extension,
but, importantly, new applications. Frankly, Im surprised at what people are coming up with. When you
give them a global computer infrastructure with rich
services and go all the way up to SaaS services and
unshackle them from the mundane aspects of putting
in the data centers doing mundane work, people are
actually coming up with very interesting applications.
Yousif: Are you saying that adoption will increase
quite quickly, despite the existing sensitivities about
security and privacy?
Edsall: I agree with Stefan. The adoption of cloud
is occurring across the industry. Everybodys moving
to cloud. By cloud, I mean both on and off premise.
As I said earlier, theres a lot happening on premise,
but thats going to change. There are a lot of considerations for a company when they adopt a cloud
strategy and as we were saying about the DevOps
lifecycle of an application, it changes how we think
about applications and how they interact with the
infrastructure. I might be developing policies in
parallel with my application development, and developing my QA as Im deploying these applications and
iterating on this rapidly. That certainly will happen
quite a lot if youre going on premise.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
47
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
ROUNDTABLE
OUR PANELISTS
Stefan Pappe is an IBM Fellow and vice president for Cloud Architecture in IBMs Global
Technology Services. In this capacity he
oversees the architecture and design of cloud
offerings and client solutions. Pappe received
a Master degree in Economics from University
of Karlsruhe, Germany, and a PhD in Computer Science from University of Kaiserslautern,
Germany. Stefan spent most of the 25 years
of his IBM career fueling the services business
through technical advancements and assetbased innovation. He is an author of several
patents and technical papers, including the
IBM Cloud Computing Reference Architecture, a comprehensive technical blueprint
guiding cloud design and delivery.
Johan Krebbers is the Shell Group IT architect and the lead architect for Shells Projects
& Technology Business. As Group IT architect he is responsible for the IT architecture
across the entire group, including business,
applications, data, and infrastructure. Previous position include infrastructure architect
in Shells Exploration and Production business unit and architecture and development
manager for the Shell Group Infrastructure
Desktop (GID) project, which rolled out the
same desktop infrastructure to 130,000 users in more than 130 countries. Krebbers is
currently based in the Netherlands.
Mazin Yousif is the EIC of IEEE Cloud Computing. For his full bio, see page 7.
I EEE CLO U D CO M P U T I N G
moving from a lot of handcrafted scripts and configurations that are somewhat fragile and static to a
process thats much more automated and more software driven.
Yousif: On a related topic, do you see in that timeframe cloud services delivered by few 800-pound
gorilla providers or a large number of small cloud
providers, each delivering specialized cloud services?
Pappe: There might be a consolidation of infraW
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
structure providers because of the need for large investments and continued optimization of operations
down to the tenth of a penny and even smaller. I
think we might see consolidation on the infrastructure side. But at the higher level of the stack, middleware, platforms, industry solutions, we will see
the number of service offerings exploding. New enterprises are coming up, which wouldnt be possible
without a cloud. Were seeing a lot of SaaS and PaaS
providers with exceptional innovations. Of course,
often they get acquired by somebody, which leads to
some consolidation, but they fuel innovations on all
levels, including new industry models.
Edsall: I agree completely. Of course were going to
see a mix. The race to zero will be by the big guys
and everybody else is going to try to figure out how
to inject value so they dont have to race to zero, but
we see that with almost everything that happens on
the Internet.
Khalidi: Given that building a cloud requires capital-intensive businesses, not just at datacenters and
servers, but also at the global network level, it will
favor large scale. I am not an economist, but this
pattern will result in fewer providers. Having said
that, there are regulations. There are geopolitical
considerations that will make this more than a pure
economical argument, which in my opinion says
you still need either on-premise private clouds or
specialized vendors that are within some domains.
So, in my opinion, we can end up with a handful of
large public global cloud providers, augmented with
technology providers and on-premise technologies
that cater to local governance issues.
As you move up the stack you get specialization.
Youll always see vendors that do special functions.
So as you move up the stack, you get more specialization, meaning many providers.
M AY 2 0 14
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
49
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
IEEE Cloud Computing aims to publish articles that describe not only
cloud-specific standards seeing use, but also the process through which
theyre developed.
50
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Topics of Interest
Are there really established and emerging standards in the new world of cloud computing? Yes,
defi nitely. You might not know about such efforts
yet, so the magazine aims to collect the most coherent explanations available and expand on them
wherever possible. This effort will aim to study, explain, document, and give a forum for describing
not only the standards that are seeing use, but also
the process through which theyre developed to the
point that they can see the light of day. As well
see, standards in the cloud computing world arent
new at all; many of these protocols and specifications have been under continuous development for
several years, leading to an increasing state of maturity that makes it possible and practical to take
on such an effort.
What about standards adoption? We shouldnt
miss the opportunity to engage in this topic directly.
Articles that document adoption efforts for both established and emerging standards sets are welcome
here. Of course, standards that are experiencing
substantial uptake are the best ones to document,
and possibly the ones that least need documentation, but theres room also to put promising new
efforts into the spotlight to provide exposure and
possibly improve their uptake.
Because standards are in fact a communal activity, Ill be relying on the community, meaning you,
to identify whats of interest. Contributions can be
historical or modern in approach, as long as theyre
focused on creating a successful standards-based
framework for cloud computing innovation. Ill also
make space available for short tutorials or relevant
and revealing use-case examples, if these examples
are general in nature and illustrate the solution provided by the standard being described.
Specific topics to be targeted include
r architectural efforts;
r ontology, taxonomy, and definitions;
r standards structured for particular branches
of service-oriented architectures (SOAs), such
as infrastructure as a service (IaaS), software
as a service (SaaS), and platform as a service
(PaaS);
r standards intended to cut across or bridge SOA
levels;
r proofs of principle;
r use cases and requirements;
r test infrastructures; and
M AY 2 0 14
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
51
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Road to Adoption
I understand that the topic of standards might not
be everyones cup of tea, and that often people need
to encounter this topic multiple times before it even
begins to make sense to them. This is true of many
other aspects of IT development, especially in the
new world of cloud computing (which, again, is actually not that new).
This characteristic makes it especially important to recruit good, clear articles that not only
capture the technical details of a standard set or
specification, but that go beyond such details to
explain the motivation, usage scenarios, value, and
expected interdependency of such standards for the
benefit of the educated reader.
I EEE CLO U D CO M P U T I N G
need your help identifying areas in which a substantial discussion on cloud standards is now
possible. To be successful, articles must go beyond
normal levels of clarity and readability. Too often,
jargon associated with the standards-development
process can and does exhaust the patience of many
participants in the cloud computing world, so I appeal to you to write topical, lively (but not too argumentative!) articles that will truly illuminate the
subject under discussion.
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
M
q
M
q
M
q
MqM
q
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
EXECUTIVE STAFF
Next Board Meeting: 1617 Nov. 2014, New Brunswick, NJ, USA
EXECUTIVE COMMITTEE
President: Dejan S. Milojicic
President-Elect: Thomas M. Conte; Past President: David Alan Grier;
Secretary: David S. Ebert; Treasurer: Charlene (Chuck) J. Walrad; VP,
Educational Activities: Phillip Laplante; VP, Member & Geographic
Activities: Elizabeth L. Burd; VP, Publications: Jean-Luc Gaudiot; VP,
Professional Activities: Donald F. Shafer; VP, Standards Activities: James
W. Moore; VP, Technical & Conference Activities: Cecilia Metra; 2014
IEEE Director & Delegate Division VIII: Roger U. Fujii; 2014 IEEE Director
& Delegate Division V: Susan K. (Kathy) Land; 2014 IEEE Director-Elect &
Delegate Division VIII: John W. Walz
BOARD OF GOVERNORS
Term Expiring 2014: Jose Ignacio Castillo Velazquez, David S. Ebert,
Hakan Erdogmus, Gargi Keeni, Fabrizio Lombardi, Hironori Kasahara,
Arnold N. Pears
Term Expiring 2015: Ann DeMarle, Cecilia Metra, Nita Patel, Diomidis
Spinellis, Phillip Laplante, Jean-Luc Gaudiot, Stefano Zanero
Term Expriring 2016: David A. Bader, Pierre Bourque, Dennis Frailey, Jill
I. Gostin, Atsuhiro Goto, Rob Reilly, Christina M. Schober
M AY 2 0 14
,;,9G$3:90
GFax:
G
Email: tokyo.ofc@computer.org
_____________
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
53
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
academia have sought to improve the clouds security and privacy. Here I give a quick (and incomplete)
overview of new challenges, opportunities, and solutions in this area, with the purpose of stimulating
more in-depth and extensive discussion on related
problems in upcoming issues of this magazine.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
victim, it can launch a side-channel attack by monitoring the status of shared physical resources such
as level-1 and level-2 caches, and thus infer the victims computation and I/O activities.
A follow-up study showed that its possible to
extract private keys via the cross-VM side channel
in a lab environment.2 In another study, researchers
from the College of William and Mary reported that
side-channel attacks arent just a potential risk, but
a realistic threat.3 They created a covert channel via
another shared resource (the memory bus) that had
a level of reliability and throughput of more than
100 bps in both lab and EC2 environments.
These risks represent a small subset of known
cloud-specific vulnerabilities and threats. However, they motivate us to think further about new
adversary models, trust relations, and risk factors
relative to cloud computing stakeholders. In the examples, the cloud provider isnt trusted because of
its resource sharing and VM consolidation practices.
Hence, the cloud provider doesnt provide a desirable
level of isolation and protection between tenants in
the cloud, allowing them to attack each other.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
55
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
57
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Emerging Paradigms
and Areas for Expansion
Pascal Bouvry, University of Luxembourg
58
With the development of new technologies in biomedicine, researchers gained access to -omics
experimental readouts of high dimensionality and
volume, such as genomics, transcriptomics, proteomics, and metabolomics.1 Consequently, tremendous amounts of data have become available. One
reason is the great reduction of -omics costs. In
the last decade, the price of genetic sequencing (genomics) dropped from millions to thousands of US
dollars per sequence, and the costs will eventually
drop even more.2 At the same time, the scope of collected data keeps growing, from sequencing a family
a few years ago, to cohorts today, to entire populations in the future.
Although the prices are dropping, the size of the
collected genomics data remains the sameroughly 0.3 terabytes per sequence. With the number of
sequences reaching hundreds, current networks
cant support their prompt transfer. Instead, major
Growth in Data
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Hardware advances boosted by research on motransport companies (Fedex, UPS, TNT, DHL, and
so on) ship disks across the globe. From a broader bile computing create new opportunities to enrich
perspective, these data transfers occur in huge data the cloud. For example, more than 10 billion ARM
flows. Newly developed models and techniques will processors are sold each year. Moreover, chip and
be required to parallelize the information transfer to board manufacturers continually announce new
exploit the many paths connecting one point to an- generations of low-power chipsets and the coupling
of such chipsets at the cache level with GPUs and
other but also multipoint communications.
Another biomedical domain observing a rapid other accelerators, such as field-programmable gate
increase in the size and volume of collected data arrays (FPGAs). We intend to investigate new generis imaging. Here the challenge isnt only to store ations of hardware, how well they work in the cloud
or analyze the data,3 but also to remotely visualize paradigm, which category of cloud services they can
provide, and upcoming trends.
large images.4
Big data and data analytics are
among the biggest technology trends.5
IBM divides big data into four dimensions: volume, velocity, veracity, and
Hardware advances boosted by research
variety, or the 4 Vs. Each dimension
brings new challenges in terms of reon mobile computing create new
quired models, methods, algorithms,
and technologies. The notion of big
opportunities to enrich the cloud.
data is also tightly coupled with the
emergence of the cloud. Indeed, Web
At the other end of the cloud spectrum, the
2.0 technologies and social networks present a tremendous amount of data that cant be stored locally main reason for the current relatively restrictive use
to be processed for key information, such as societal of the cloud for high-performance computing (HPC)
resides in the lack of cloud offers featuring highor marketing studies.
Tying together zetabytes of data with the required performance interconnects, such as Infi niband, as
processing power and providing this as a service to well as the lack of efficient cloud driver implementapotential customers involves some major underlying tions for such interconnects. Therefore, HPC users
challenges. Well need new generations of data ware- typically restrict their use of cloud computing to the
houses, (no-)file systems, and data-processing tech- bag-of-tasks paradigmthat is, groupings of uncorniques. IEEE Cloud Computing will investigate all of related tasks.
The virtualization and cloud management laythese adjacent technologies and explore how theyll
ers also induce an overhead; however, the pay-perimpact and shape the clouds future.
use paradigm and the clouds elasticity features are
so attractive that users are willing to pay this extra
Hardware Advances
Some of the paradigm shifts, such as sustainable price.
Technology advances in this field that will incomputing and technologies like those developed
for mobile computing (for example, low-power CPUs crease the clouds appeal for scientific computing in
and systems on chip) or advanced networking (such the coming years is another prime area of interest.
as passive components and network coding) are also
expected to revolutionize the clouds core compo- Toward a Safer and Trusted Cloud
nents. Cyberphysical systems develop quickly, and A key goal is to increase the security level and trust
cloud computing will help further blur the hard- in the cloud. Indeed, the virtualization layer, includware/software border.6
ing the hypervisor and various device drivers, is the
Because of the mass market, i.e. billions of source of several newly discovered vulnerabilities.
units sold per year, the unit prices of the newest Standard subcontracting approaches involve a sergeneration of hardware components has dropped vice-level agreement (SLA) and trusting the subconlow enough to allow an HaaS approach, in which tractor. However, trusting the subcontractors other
hardware sharing needs, such as CPUs using virtu- customers, which is somehow implicit when sharing
alization, are less crucial. Some of the techniques hardware with them, is rather new and unusual.
developed by the grid computing community, such Dedicated hardware coupled with trusted platform
as elastic parallel designs, will be re-explored and modules will help build chains of trusts and attract
more customers to the cloud.
further developed in this new context.
M AY 2 0 14
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
59
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
us to rebuild original, missing information. For example, recent stories have reported successful attempts to trace the names of anonymous genetic
sequences simply by looking at publicly available
information, such as the study location and local
phone books. An enhanced legal framework and
recommendations are required to bring customers
peace of mind. Such frameworks have started to appear,8 but the technologies needed to enforce such
rules require further development.
Cloud management techniques must also be improved. Many recent publications have highlighted
the problems multiobjective nature, minimizing cost
and energy while maximizing resilience. These aspects are currently handled at various levelsfrom
hardware to middleware to application. Decisions
at the various levels could be contradictory, or they
might unnecessarily reinforce some requirements,
for example, duplicating resources used for fault tolerance. This certainly calls for cross-layer approaches, such as hardware-software codesign, and for the
various research communities to join forces.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
bourg passed a project of law guaranteeing the conservation of data in the event of a local providers
bankruptcy.
Because clouds are distributed across many
countries, international laws and regulations also
play a key role. Classical ways of dealing regionally with copyright for technologies, such as zoning,
dont hold in distributed cloud services. Watching
the emergence of new international laws and regulations facilitating the use of the cloud will also be of
a prime importance.
Sciences Policy; Institute of Medicine. Discussion Framework for Clinical Trial Data Sharing:
Guiding Principles, Elements, and Activities,
Natl Academies Press, 2014.
9. S. Fowler, Survey on Mobile Cloud ComputingChallenges Ahead, IEEE CommSoft ELetters, vol. 2, no. 1, May 2013.
10. C. Berge, Hypergraphs, Combinatorics of Finite
Sets, North Holland Mathematical Library/
Elsevier, 1989.
NEWSLETTERS
computer.org/newsletters
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
61
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD ECONOMICS
The Costs of
Cloud Migration
Omer Rana, Cardiff University
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
their infrastructure or services to a cloud provider. Such decisions factor in issues of pricing/cost,
reputation/trust, performance/availability, energy
savings, and security and privacy. Each of these
decision factors impacts both shorter-term revenue
and cost savings, and longer-term reputation and
strategic operation.
Cloud providers also need to estimate the cost
of provisioning infrastructure and services to clients, accounting for their own
operational and capital expenditures,
as well as potential reputation concerns
(such as how potential clients perceive
them in terms of reliability and their
ability to deliver what they advertise)
that impact their long-term survivability in the marketplace. Energy costs are
increasingly important in this equation
for many cloud providers and have influenced where
they build their datacenters as well as potential alliances with energy providers offering special pricing.
There is also often a cloud supply chain, in
which a single company uses services that are provisioned by others (in various service mashups), as
well as associated dependencies within the supply
chain. For instance, a company might run its own
website but outsource storage to an infrastructureas-a-service (IaaS) provider, establishing mutually
beneficial service-level agreements (SLAs) that provide financial security for the company running the
website (allowing them to establish penalty clauses
that could lead to crediting customers in case of
unavailability, for instance). Are users who access
such websites fully aware of the different providers
in the supply chain? Do service providers fully disclose their dependencies within their supply chains
to their users/customers? Brokers play an important
role in establishing these supply chains, matchmaking service requests to providers based on factors
such as cost, operational history (for example, uptime and availability), and user feedback.
in a range of pricing bands (current versus older instances) and market models (spot market versus reserved instances, and so on), often requires input
from economic and technical experts working in
collaboration. Standards (see the StandardsNow
column in this magazine) play an important role in
creating suitable terminology that can be shared
across providers. In the research community, there
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
63
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD ECONOMICS
64
I EEE CLO U D CO M P U T I N G
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
hese are still early days for the cloud computing research and development communityin
particular, how this community perceives and uses
utility computing. The IEEE/ACM Utility and
Cloud Computing conference, for instance, is only
in its seventh year, compared with conferences in
areas such as parallel computing that have been
occurring for decadesfor example, the International Conference on Parallel Processing is now
in its 43rd edition. There is still plenty of room for
innovation. With improved understanding of how
cloud computing systems and services are used in
practice, intermediate (brokerage) organizations
can find numerous opportunities for interacting
with users and cloud providers. Increasing interest
and adoption of cloud standards can also be an important catalyst for generating a more sustainable
cloud market.
M AY 2 0 14
References
1. O. Rogers, Improved Public Cloud Capacity
Planning through the Sale of Options, Forwards
and Provision Point Contracts, PhD thesis,
Dept. of Computer Science, Bristol Univ., UK,
2013.
2. Gartner, Forecast: Public Cloud Services,
Worldwide, 2011-2017, 4Q13 Update, 26
Dec. 2013; www.gartner.com/doc/2642020/
forecast-public-cloud-services-worldwide.
__________________________
OMER RANA is a professor of performance engineering in the School of Computer Science and Informatics at Cardiff University. He also currently acts
as an advisor to CBNine, a company specializing in
cloud computing for the architecture, engineering,
and construction sector. His research interests include
high-performance distributed computing, data analysis/mining, and multiagent systems. Rana has a PhD
in neural and parallel computing from Imperial College (London University). He is a member of the IEEE
Cloud Computing editorial board and a member of
IEEE. Contact him at ________________
o.f.rana@cs.cardiff.ac.uk.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
65
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD MANAGEMENT
Challenges in Cloud
Management
J.P. Martin-Flatin, EPFL
66
ensure that these services are delivered with the expected quality in terms of robustness, performance,
and so on. If service-level agreements (SLAs) are
specified, these guarantees are translated into measurable quality metrics such as maximum downtime,
average uptime per month, maximum response time,
average response time per hour, or maximum time to
detect and block an intrusion.
Cloud management deals with the operations of
cloud infrastructures (software and hardware) and
cloud services, and the enforcement of SLAs. The
latter specify cloud quality metrics, including userperceived quality of cloud services.
Some aspects of cloud management are generic management concerns; others pose challenges
that are specific to (or particularly acute in) cloud
environments.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
M AY 2 0 14
Users
SaaS
Networks
PaaS add-on
PaaS
IaaS
Datacenters
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
67
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD MANAGEMENT
68
I EEE CLO U D CO M P U T I N G
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Security
In the past few years, cloud security has
received considerable attention in the
press. Data security is one of the main concerns
of people who remain hesitant about using public
clouds (see the Securing Cloud Infrastructure, Services, and Content: An Overview of Current Methods introduction).
In cloud management, security also covers other
aspects. In public clouds, for example, monitoring
data needs to be transferred from the monitored entity to the analytics engine. How can you secure all
these monitoring data exchanges that go across public cloud datacenters, telco networks, Internet backbone switches, transoceanic optical fibers, and so
on? Security problems also abound in multiprovider
public clouds, when multiple providers are involved
in the root cause analysis of a given problem.
Diagnosis
Diagnosing the causes of a performance problem, a
fault, or a security problem requires access to monitoring dataa lot of monitoring data in the case
of cloud environments. In private clouds, all cloud
resources and services normally run in a single administrative domainthat is, under the control of
a single administrative entity that enforces its own
management policy. Issues such as access control
(Who can access what monitoring data?) are therefore easy to solve. The situation is quite different
when multiple providers are involved, because we
have multiple administrative domains and thus sevM AY 2 0 14
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
69
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD MANAGEMENT
4.
5.
6.
7.
8.
ADVERTISER INFORMATION
Advertising Personnel
Marian Anderson: Sr. Advertising Coordinator
Email: ________________
manderson@computer.org
Phone: +1 714 816 2139 | Fax: +1 714 821 4010
Sandy Brown: Sr. Business Development Mgr.
Email ______________
sbrown@computer.org
Phone: +1 714 816 2144 | Fax: +1 714 821 4010
Southwest, California:
Mike Hughes
Email: _________________
mikehughes@computer.org
Phone: +1 805 529 6790
Southeast:
Heather Buonadies
Email: _________________
h.buonadies@computer.org
Phone: +1 973 304 4123
Fax: +1 973 585 7071
70
I EEE CLO U D CO M P U T I N G
Heather Buonadies
Email: h.buonadies@computer.org
_________________
Phone: +1 973 304 4123
Fax: +1 973 585 7071
Advertising Sales Representatives (Jobs Board)
Heather Buonadies
Email: _________________
h.buonadies@computer.org
Phone: +1 973 304 4123
Fax: +1 973 585 7071
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Elements of
Cloud Adoption
Samee U. Khan, North Dakota State University
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
71
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Growth Areas
In a Market Trends report, Gartner estimates that
the cloud-based business services and software-as-aservice (SaaS) markets will increase from US$13.4
billion in 2011 to $32.2 billion in 2016.4 Similarly,
the infrastructure-as-a-service (IaaS) and platformas-a-service (PaaS) markets are estimated to grow
from $7.6 billion in 2011 to $35.5 billion in 2016.4
In addition to supporting various operations in
the business and enterprise sector, cloud computing is transforming many aspects of our social and
personal lives. For instance, social networking has
minimized the communication gap by helping users
connect seamlessly through the cloud. The cloud
also facilitates the downloading and updating of various mobile applications and allows people to easily share pictures, videos, files, and product reviews.
Moreover, cloud gaming lets users play state-of-theart online games on low-performance endpoints,
such as smartphones. Not only do players have a
rich set of online competitors to choose from, but all
of the game processing and rendering is performed
in the cloud for a real-time gaming experience.
The business sector is overwhelmingly adopting cloud computing. An IBM Institute of Business
Value and Economist Intelligence Unit survey of
572 technology and business executives across the
globe revealed that around three-fourths of the surveyed companies are using the cloud.5 Moreover, 90
percent of these surveyed executives are expected
to adopt the cloud paradigm within the next three
years5 The benefits offered by cloud computing,
such as unlimited resources at nominal prices, are
motivating enterprises and research organizations to
use the cloud for their computation and data storage requirements. Cloud computing is also being
used widely in e-commerce, agriculture, nuclear
science, healthcare, smart grids, and scientific applications.6 For example, pharmaceutical company
Eli Lilly executed a complex bioinformatics workload
72
I EEE CLO U D CO M P U T I N G
Open Issues
Round-the-clock service availability is integral to
cloud-based organizations. However, these automated systems are error prone. Regardless of safety
measures and infrastructure robustness, many organizations have faced failures. In the cloud, downtime and failures have a huge effect. Organizations
pay an average of approximately $5,600 per minute
of the datacenter downtime.9 For a datacenter outage having a recovery time of 134 minutes, the average loss is around $680,000.9
Data privacy and security are among the foremost concerns pertaining to cloud computing. In addition to malicious threats, cloud providers receive
information disclosure requests from government
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
SAMEE U. KHAN is an assistant professor of electrical and computer engineering at North Dakota State
University. His research interests include the optimization, robustness, and security of cloud, grid, cluster,
and big data computing; social networks; wired and
wireless networks; power systems; smart grids; and
optical networks. Khan has a PhD in computer science from the University of Texas, Arlington. He is a
Fellow of the Institution of Engineering and Technology (IET, formerly IEE) and a Fellow of the British
Computer Society (BCS). Khan is a member of the
IEEE Cloud Computing editorial board. Contact him
at _______________
samee.khan@ndsu.edu.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
73
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD SERVICES
Applications
Portability and Services
Interoperability among
Multiple Clouds
Beniamino Di Martino, Second University of Naples
74
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Multiagent Systems
Multiagent systems seem to offer another effective
approach. In particular, the outcome of the European Commissions Open Source API and Platform for
Multiple Clouds (mOSAIC) research project2,3 demonstrates in the cloud agency4 the benefits of adopting a cloud multiagent technology.
Cloud Patterns
Another promising methodology currently emerging is cloud patternsthat is, defining sets of prepackaged and preconfigured architectural solutions,
exposed through the concepts and mechanisms of
software engineering design patterns.5,6 These cloud
patterns support cloud application developers in
defining, in vendor-agnostic terms, the most viable
cloud architectural solutions for their cloud development or porting activity. Patterns describe common
aspects of cloud computing environments and application designs and can be useful in understanding
the application code changes that might be needed
for a successful migration to cloud.
Several cloud pattern catalogs are emerging, proposed from academia 6 (see also www.
____
cloudcomputingpatterns.org and http://cloudpatterns
.org) and from commercial cloud providers such
___
as Amazon Web Services (AWS; see http://en
.clouddesignpattern.org),
Windows Azure,7 and IBM
_______________
(www-01.ibm.com/software/ucd/designpatterns.html).
Some of these catalogs are closer to a specific cloud
platform, and thus they present patterns that are
cloud-platform specific in terms of cloud components
that can implement the pattern. They also propose
specific, platform-dependent cloud services to use
during application development and deployment.
Following a specific cloud pattern or a composition of cloud patterns to migrate and port an application to the cloud represents a best practice:
the patterns themselves support the redesign and
deployment of applications on the cloudand, because the design pattern solutions are proven, their
consistent application tends to naturally improve the
quality of system designs.
Semantic Models
A contributing factor in interoperability and portability issues is the difference in the offered services
semantics: providers use proprietary terms and semantics, without offering uniform representations
of services. As Amit Sheth and Ajith Ranabahu
stated,8 semantic models are helpful in three ways:
functional and nonfunctional definitions, data modeling, and service description enhancement.
Metadata added through annotations pointing
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
75
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD SERVICES
Toward a Standard
I EEE CLO U D CO M P U T I N G
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Acknowledgment
I thank both Giuseppina Cretella and Antonio Esposito for their valuable contributions to this article.
References
1. R. Soley, OMG: Model Driven Architecture,
white paper, Object Management Group, 2000.
2. B. Di Martino et al., Building a Mosaic of
Clouds, Euro-Par 2010 Parallel Processing Workshops, LNCS 6586, Springer, 2011, pp. 571578.
3. D. Petcu et al., Experiences in Building a Mosaic
of Clouds, J. Cloud Computing: Advances, Systems, and Applications, vol. 2, no. 1, 2013, p. 12.
4. S. Venticinque, Luca Tasquier, and Beniamino
Di Martino, Agents-Based Cloud Computing
Interface for Resource Provisioning and Management, Proc. 6th Intl Conf. Complex, Intelligent and Software Intensive Systems (CISIS 12),
2012, pp. 249256.
5. C. Baudoin, Migrating Applications to the Cloud:
Roadmap for Success, white paper, Cloud Standards Customer Council (CSCC), 2013; www.
____
cloudstandardscustomercouncil.org/MigratingApps-to-the-Cloud-Final.pdf.
___________________
6. C. Fehling et al., Cloud Computing Patterns,
Springer, 2014.
7. J.D. Meier, Windows Azure Application Patterns, blog, 11 Sept. 2010; http://blogs.msdn.
com / b/jmeier/archive/2010/09/11/w indows________________________________
azure-application-patterns.aspx.
_____________________
M AY 2 0 14
8. A. Sheth and Ajith Ranabahu, Semantic Modeling for Cloud Computing, Part 2, IEEE Internet
Computing, vol. 14, no. 4, 2010, pp. 8184.
9. G. Cretella and B. Di Martino, Towards a Semantic Engine for Cloud Applications Development, Proc. 6th Intl Conf. Complex, Intelligent, and Software Intensive Systems, 2012, pp.
198203.
10. G. Cretella and B. Di Martino, Semantic and
Matchmaking Technologies for Discovering,
Mapping and Aligning Cloud Providers Services, Proc. 15th Intl Conf. Information Integration
and Web-Based Applications and Services (iiWAS
13), 2013, p. 380384.
11. Cloud Standards CoordinationFinal Report,
version 1.1, European Commission, 1 Sept. 2013;
http://ec.europa.eu/digital-agenda/en/news/
cloud-standards-coordination-final-report.
___________________________
12. P2302 Standard for Intercloud Interoperability and Federation (SIIF), Intercloud Working
Group, IEEE Standards Assoc., 2012; ____
http://
standards.ieee.org/develop/project/2302.html.
13. P. Mell and T. Grance, The NIST Definition of
Cloud Computing (draft), NIST Special Publication 800-145, 2011.
14. Topology and Orchestration Specification for
Cloud Applications Version 1.0, Oasis Committee Specification 01, 18 Mar. 2013; http://
____
docs.oasis-open.org/tosca/ TOSCA /v1.0/cs01/
TOSCA-v1.0-cs01.html.
_______________
15. Cloud Application Management for Platforms
Version 1.1, Oasis Committee Specification
Draft 03, 31 July 2013; http://docs.oasis-open.
org/camp/camp-spec/v1.1/csprd01/camp-spec-v1
.1-csprd01.html.
___________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
77
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
BLUE SKIES
Rajiv Ranjan
Commonwealth
Scientific and Industrial Research
Organization,
Australia
Today, we live in a digital universe in which information and technology are not only around us but also
play important roles in dictating the quality of our
lives. As we delve deeper into this digital universe,
were witnessing explosive growth in the variety, velocity, and volume of data1,2 being transmitted over
the Internet. A zetabyte of data passed through the
Internet in the past year; IDC predicts that this digital universe will explode to an unimaginable eight
Zbytes by 2015. These data are and will be generated
mainly from Internet search, social media, mobile
devices, the Internet of Things, business transactions, next-generation radio astronomy telescopes,
high-energy physics synchrotron, and content distribution. Government and business organizations
78
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Datacenter Clouds
The second key technology is datacenter clouds,810 which promise on-demand access to affordable large-scale
resources in computing (such as multicore CPUs, GPUs, and CPU clusters)
and storage (such as disks) without substantial upfront investment.
Datacenter cloud services are a natu-
works simplify the process of distributing the training and learning tasks
across a parallel set of machines. The
frameworks also automatically take care
of low-level distributed system management complexities, such as task scheduling, fault management, interprocess
communication, and result collection.
Finally, NoSQL database frameworks,
such as MongoDB (www.mongodb.org),
____________
HyperTable (http://hypertable.org),
Cas_____________
sandra (http://cassandra.apache.org), and
Amazon Dynamo (http://aws.amazon.
com/dynamodb), allow data access based
on predefined access primitives such as
key-value pairs. Given the exact key, the
value is returned. This well-defined data
access pattern results in better scalability and performance predictability
that is suitable for storing and indexing
real-time streams of big datasets. These
frameworks can scale more naturally to
ad hoc and evolving large datasets, as
NoSQL databases dont require fixed
table schemas or support expensive join
operations.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
79
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
BLUE SKIES
Applications
Disaster
management
Radio
astronomy
Smart energy
grids
Healthcare
Telephone fraud
detection
Distributed
streaming
systems
Distributed data
queuing systems
Batch processing
systems
Large-scale data
mining
framework
NoSQL
databases
Datacenter provider A
Datacenter provider B
Datacenter provider C
FIGURE 1. A high-level architecture of large-scale data processing service. The big data analytics architectures have three layers
data ingestion, analytics, and storageand the rst two layers communicate with various databases during execution.
Apache
Cassandra
Apache Kafka
Apache Storm
FIGURE 2. A simple instance of large-scale datastream-processing service. The
example service consists of Apache Kafka (data ingestion layer), Apache Storm (data
analytics layer), and Apache Cassandra Systems (data storage layer).
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
81
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
BLUE SKIES
Esper
Architecture
Language
Support
Integration
Documentation
Centralized
in-memory
Java
Well-documented API
and a thorough reference
architecture that covers
all features with clear-cut
examples
.NET
Declarative
SQL-like query
language
Apache
Samza
Paralleldistributed
Java Virtual
Machine (JVM)
languages
Apache Kafka
Spark
Streaming12
Paralleldistributed
Scala
Java
SQL-like query
language
(Shark)
Apache Storm
Paralleldistributed
Higher-level
programming
model (Trident)
Apache Kafka
Several books
Kestrel
Active community
RabbitMQ
Java Messaging Services (JMS)
Apache HBase (Storm-HBase)
Twitter
Machine learning integration with
TridentML library
Apache S413
Paralleldistributed
aspects. First, from a big data applications perspective, its difficult to estimate workload behavior in terms of
the data volume to be analyzed, data
arrival rate, datatypes, data processing time distributions, and I/O system
behavior. Second, from a datacenter
resource perspective, without knowing the big datas requirements or behaviors, its difficult to make decisions
about the size of resources to be provi82
I EEE CLO U D CO M P U T I N G
Apache YARN
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Acknowledgements
I thank Omer Rana (Cardiff University), Lizhe Wang (Chinese Academy
of Sciences), and Alireza Khoshkbarforoushha (Australian National University) for providing and discussing their
viewpoints on research areas related to
this column. I also thank Khoshkbarforoushha for his instrumental input in
the compilation of Table 1.
M AY 2 0 14
References
1. X. Wu et al., Data Mining with Big
Data, IEEE Trans. Knowledge and
Data Eng., vol. 26, no. 1, 2013, pp.
97107.
2. W. Fan and A. Bifet, Mining Big
Data: Current Status, and Forecast
to the Future, SIGKDD Explorations Newsletter, vol. 14, no. 2, 2013,
pp. 15.
3. Y. Low et al., Distributed GraphLab:
A Framework for Machine Learning and Data Mining in the Cloud,
Proc. Very Large Database Endowment, vol. 5, no. 8, 2012, pp. 716727.
4. S.R. Upadhyaya, Parallel Approaches to Machine LearningA Comprehensive Survey, J. Parallel Distributed Computing, vol. 73, no. 3,
2013, pp. 284292.
5. D. Peteiro-Barral and B. GuijarroBerdias, A Survey of Methods for
Distributed Machine Learning,
Progress in Artificial Intelligence,
vol. 2, no. 1, 2013, pp. 111.
6. O.C. Derby, FlexGP: a Scalable System for Factored Learning in the
Cloud, doctoral dissertation, Dept.
Electrical and Computing Eng.,
MIT, 2013.
7. T. Kraska, MLBase: A Distributed Machine-Learning System,
Proc. Sixth Biennial Conf. Innovative Data Systems Research, 2013;
www.cidrdb.org/cidr2013/Papers/
CIDR13_Paper118.pdf.
_______________
8. M. Armbrust et al., A View of Cloud
Computing, Comm. ACM, vol. 53,
no. 4, 2010, pp. 5058.
9. D.A. Patterson, Technical Perspective: The Data Center Is the Computer, Comm. ACM, vol. 51, no. 1,
2008, pp. 105105.
10. L. Wang et al., eds., Cloud Computing: Methodology, Systems, and Applications, CRC Press, 2011.
11. N. Marz, Big Data: Principles and
Best Practices of Scalable Real-Time
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
83
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
WHATS TRENDING?
Intersection of
the Cloud and
Big Data
THE
ELI COLLINS
Cloudera
eli@cloudera.com
____________
84
thing from the data center to the storage, computing, networking, and software infrastructure up to
the application.
For producers, on the other hand, the cloud is
about the technology that goes into providing service offerings at each level. The technology required
to provide an application as a service in the public
cloud may differ significantly from the software
product that a customer installs to run an internal
service. For example, virtual machines are the resource allocation units in most cloud infrastructure
offerings, but they might not be used when implementing an application as a public service.
For consumers, big data is about using large datasets from new or diverse sources to provide meaningful and actionable information about how the world
works. For example, Netflix can use customer data
to produce shows tailored to their audiences.
For producers, however, big data is about the
technology necessary to handle these large, diverse
datasets. Producers characterize big data in terms
of volume, variety, and velocity. How much data is
there, of what types, and how quickly can you derive
value from it?
Although these are good technical descriptions
of big data, they dont fully explain it. Just as adopting a service-oriented approach is the macro trend
behind the cloud, there are several macro trends
behind big data. The first trend is consumption; we
consume data as part of the everyday activities in
our personal and working lives. From booking a
flight, to finding a partner, to diagnosing disease,
data is driving many more decisions today than it
has in the past. We live in a relatively new social
context where people increasingly want to make
data-driven decisions.
Related to consumption, the second trend is instrumentation. We collect data at each step in many
of our activities, and much of it is now produced by
machines instead of people. From supply chains to
Fitbits, we collect information about all our activities with the intent to measure and analyze them.
The third trend is exploration. The relatively
easy access to this abundance of data means we can
use it to construct, test, and consume experiments
that were previously not feasible. Finally, related to
2325- 6095/14/$31 .0 0 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Converging Technologies
So what is the relationship between big
data and the cloud? Big data has its origins in the cloud. Apache Hadoop, one
of the most widely used big data technologies today, was built on research
from Google and initially deployed at
Yahoo. Google invented this technology
because indexing the Web was infeasible
with existing systems. Now companies
adopting Hadoop are bringing a cloud
architecture into their data centers.
The simultaneous rise of cloud and
big data technologies isnt coincidentaltheyre mutually reinforcing. Big
data enables the cloud services we consume. For example, SaaS lets us collect
data that was infeasible or impossible
in a world of packaged software. An application can record every interaction
from millions of users. This service in
turn drives demand for big data technologies to store, process, and analyze
these interactions and inject the value
of the analysis back into the application
through query and visualization.
The expansion of the cloud continues to drive both the creation of new big
data technologies and big data adoption
by making it easier and cheaper to access storage and computing resources.
Companies can run their big data platforms on infrastructure provided as a
service (IaaS) or consume the big data
M AY 2 0 14
platform as a service (PaaS). Both models work in the public cloud and in onpremise systems.
The decision for enterprises is
thus a familiar one: How vertically or
horizontally integrated should your infrastructure be? A spectrum of valid
options exists, but cloud technology is
already enabling more infrastructure
outsourcing, whether its outsourced to
a cloud provider or an internal centralized IT department.
Big data infrastructures also play a
role in this trend. For example, recent
advances in the Apache Hadoop ecosystem enable more types of workloads
and more tenants to share a cluster.
What were once discrete systems running on their own hardware are now
effectively applications running on Hadoop, sharing the same data and hardware resources. As this abstraction layer
evolves and more projects build on it,
users will be able to run more types of
infrastructures on the same Hadoop
cluster, which itself may be running
on a cloud infrastructure. As big data
infrastructures become more generic,
the cloud infrastructure will add more
specialized services for data storage,
processing, and analysis. Future columns will examine new developments
in both areas and the increasing overlap
between them.
Another area of exploration for
this column will be technologies and
trends that are leveraging both cloud
computing and big data. The combination of big data, cloud computing, and
new algorithms and techniques for visualizing information enables converged
analyticsperforming analytics on data
from many different sources. These new
techniques for data delivery and data
management also enable cloud-based
analytics as a service (AaaS). Upcoming
columns will cover the development and
use of converged analytics and AaaS.
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
85
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
STANDARDS NOW
Dening Our
Terms
WHEN I WAS IN COLLEGE, A MEMBER OF
THE DEBATE TEAM ONCE TOLD ME THAT
THE BEST METHOD HE HAD FOUND SO FAR
TO STOP A SUCCESSFUL ARGUMENT BY
MEMBERS OF AN OPPOSING TEAM WAS TO
ASK THEM TO DEFINE THEIR TERMS. This always struck me as obscure and unproductive advice:
after all, isnt the point of a useful debate not just
tactics, but arriving at the truth of the matter?
After much reflection and subsequent experience, Ive decided that there might be more value
hidden in my debate team friends observation than
I noticed at the time, or perhaps than even he had
in mind. Collectively defining our terms is a crucial
step toward fully understanding and illuminating
any topic under discussion.
ALAN SILL
Texas Tech University,
alan.sill@standards-now.org
__________________
86
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
87
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
STANDARDS NOW
I EEE CLO U D CO M P U T I N G
intercloudtestbed.org)
______________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Register today!
www.compsac.org
________________
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
89
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD TIDBITS
Todays Tidbit:
VoltDB
WELCOME TO CLOUD TIDBITS! In each issue,
Ill be looking at a different tidbit of technology
that I consider unique or eye-catching and of particular interest to IEEE Cloud Computing readers.
Todays tidbit is VoltDB, a new cloud database.
This system caught my eye for several reasons.
First, its the latest database designed by Michael
Stonebraker, the database pioneer best known for
Ingres, PostgreSQL, Illustra, Streambase, and
more recently, Vertica. But interestingly, in this goaround, Stonebraker declared that he has thrown
all previous database architecture out the window and started over with a complete rewrite.1
Whats resulted is something totally different from
every other databaseincluding all the column- and
table-oriented NoSQL systems. Moreover, VoltDB
claims a 50 to 100x speed improvement over other
relational database management systems (RDBMSs)
and NoSQL systems. It sounds too good to be true.
What we have is nothing short of a whole class
of SQL, as compared to the NoSQL compromises
detailed above. This total rearchitecture, called
NewSQL, supports 100 percent in memory op-
Early Databases
The first databases used hierarchical data models
in which all data was organized in a tree-like structure. This structure is simple but inflexible because
its confined to a one-to-many relationship. The
IBM Information Management System (IMS), one
of the first production databases, used this model.
The hierarchical data model lost traction as the relational model became the de facto standard used
by virtually all mainstream DBMSs. The relational
database uses a data model much more aligned with
real-world business models. In this model, each data
item has a row of attributes, so the database displays
a fundamentally tabular organization. Tables can be
related to other tables using a key mechanism. Relational databases displaced hierarchical databases
because the ability to add new relations made it possible to add new, valuable information. SQL offered
a way to program relational queries, and the database-powered IT marketplace was born.
Implementations of relational databases trace
their roots to the original RDBMS designs (IBM
System R and follow-ons) of the 1970s. At that time,
business data processing was the only DBMS market.
The main user interface device then was the dumb
terminal, and vendors imagined operators inputting
queries through an interactive terminal prompt. Key
architectural features of the original DBMSs were
disk-oriented storage and indexing structures, multithreading to hide latency, locking-based concurrency
control mechanisms, and log-based recovery.
DAVID
BERNSTEIN
Cloud Strategy Partners,
david@cloudstrategypartners.com
______________________
90
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
20%
18%
10%
11%
12%
29%
Index management
Logging
Locking
Latching
Buffer management
Useful work
Introducing VoltDB
VoltDB was formed to commercialize the NewSQL technology. The H-Store project found an open
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
91
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
CLOUD TIDBITS
I EEE CLO U D CO M P U T I N G
A CLOUD-FRIENDLY SCALE-OUT
ARCHITECTURE RDBMS? We thought
that was impossible. And this, my friends,
qualified it to be this columns Cloud
Tidbit. I hope you enjoyed it!
Reference
1. M. Stonebraker et al., The End of
an Architectural Era (Its Time for
a Complete Rewrite), Proc. Very
Large Databases (VLDB), 2007, pp.
11501160.
W
W W.CO M P U T ER .O RG /CLO U D CO M P U T I N G
_________________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Membership Matters
to Your Career, Your Technical Excellence,
the Profession, and the World.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Legal Issues in
the Cloud
ENSURING A SECURE CLOUD SYSTEM (AND
ECOSYSTEM) IS A HIGHLY SPECIALIZED AND
INTERDISCIPLINARY FIELD. It requires a deep
understanding of the underlying technical, social,
public policy, regulatory, and legal and law enforcement aspects, as well as intimate knowledge of
temporal trends (historical, recent, and emerging).
Although security, privacy, public policy, legal, and
forensic challenges associated with cloud computing
have attracted academic attentionparticularly the
issues relating to data sovereignty and confidentiality and to the inadequacy of our existing legislative
and regulatory frameworks to protect data from prying eyes16 research on the topic is still in its infancy. To inaugurate this column, I present here a
general overview of some of these legal issues.
As cloud computing use grows throughout society, so, too, does its use by criminals.1,7 This is particularly true in sophisticated and organized crime,
where ongoing secure communication, dissemination, and data storage is critical for a criminal syndicates operation. However, emerging technologies
such as cloud computing entail various challenges
and implications for governmentsparticularly law
KIM-KWANG
RAYMOND CHOO
University of South Australia
raymond.choo@fulbrightmail.org
______________________
94
enforcement and regulatory agenciesas well as other key stakeholders in both public and private sectors.
Crimes involving cloud computing use typically
involve an accumulation or retention of data on a
digital device (such as a mobile phone) that must be
identified, preserved, analyzed, and presented in a
court of lawa process known as digital forensics.810
Conventional forensic tools often focus on physically
accessing the media that stores the target data. However, in a cloud computing environment, it is often
impossible or infeasible to access the physical media
and, in many cases, forensic investigators would have
to rely on the cloud service provider to locate where
the evidential data resides in the cloud.11,12
As Darren Quick and I pointed out,10 not all
countries have legal provisions that allow data to be
secured when a warrant is served, such as during
a search and seizure process. For example, Section
3L of Australias Crimes Act 1914 (a Commonwealth
legislation) allows the officer executing a search and
seizure warrant to access data. This includes data
not held at the premises, such as data accessible
from a computer or data storage device used to access cloud services. Such provisions are designed to
overcome the efforts of accused people to conceal
data through the use of passwords or encryption, including in cloud services, but the provisions might
not be available in other countries.10
Data fragmentation and distribution across numerous international datacenters also presents technical and jurisdictional challenges in identifying
and seizing (the fragile and elusive) evidential data
by government agencies in criminal investigations,
as well as by businesses in civil litigation.7,13,14 The
technical and legal uncertainties surrounding these
questions are, perhaps, why traditional boundaries
are now blurred.15 As Australias Chief Defence Scientist Alexander Zelinsky noted,
Due to the virtual, dynamic, and borderless nature of cloud computing services, government and law enforcement
investigations into malicious cyber activities will require cooperation between government agencies from multiple countries.
Government and law enforcement investigators face difficulty in accessing the physical hardware to locate evidential data.16
2325- 6095/14/$31 .0 0 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
r data protection,
r data governance,
r data sovereignty,
r forensics,
r incident response and management,
r information assurance,
r privacy,
r provenance,
r publicprivate partnership,
r risk management,
r security,
IT MIGHT BE IMPOSSIBLE TO
COMPLETELY ERADICATE ILLEGAL AND MALICIOUS CYBER ACTIVITIES, but its important to maintain
persistent pressure on threat actors to
safeguard cloud security and a secure
cloud ecosystem. To help advance the
state of the art in this research area and
to address emerging cloud-related risks,
this column is actively seeking highquality technical-, business-, policy- and
legal-oriented submissions related to
cloud issues such as
r cloud computing strategies,
r extraterritorial jurisdiction (in theory and practice),
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
95
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
References
I EEE CLO U D CO M P U T I N G
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
atural and man-made emergencies, such as tsunamis, earthquakes, floods, and epidemics pose a significant threat to human societies. Well-coordinated
emergency management activities that involve guiding citizens out of danger areas, placing medical team in the most
appropriate locations, and planning evacuation routes before
and after a disaster, play a significant role in saving lives, protecting critical infrastructures, and minimizing casualties.
The management of evacuation activities, such as guiding
people out of dangerous areas and coordinating rescue teams,
depends on the availability of historical data as well as on the
effective real-time integration and utilization of data streaming
from multiple sources, including on-site sensors, social media
feeds, and messaging on mobile devices. However, the growing ubiquity of on-site sensors, social media, and mobile devices means there are more sources of outbound traffic, which
ultimately results in the creation of a tsunami of data, beginning shortly after the onset of emergency events. This data
tsunami phenomenon presents a new grand challenge in computing. During the 2010 Haiti earthquake, text messaging via
mobile phones and Twitter made headlines as being crucial for
disaster response, but only some 100,000 messages were actually processed by government agencies because of the lack
of an automated and scalable data processing infrastructure.
Design and development of evacuation systems for emergency management requires a complete information and communication technology (ICT) paradigm shift so that systems
do not get overwhelmed by incoming data volume, data rate,
data sources, and data types. New cloud-based techniques
are needed that can extract meaningful information from
Submission Guidelines
Submissions will be subject to IEEE Cloud Computing magazines peer-review process. Articles should be at most 6,000
words, with a maximum of 15 references, and should be
understandable to a broad audience of people interested in
cloud computing, big data, and related application areas. The
writing style should be down to earth, practical, and original.
All accepted articles will be edited according to the IEEE
Computer Society style guide. Submit your papers through
Manuscript Central at https://mc.manuscriptcentral.com/
ccm-cs.
_____ For more information, contact the guest editors:
t Rajiv Ranjan, CSIRO, Australia, raj.ranjan@csiro.au
____________
t Samee Khan, NDSU, USA, _______________
samee.khan@ndsu.edu
t Joanna Kolodziej, CUT, Poland, _____________
joanna.kolodziej68@
gmail.com
t Albert Zomaya, Sydney University, Australia, zomaya@
______
it.usyd.edu.a
_________
www.computer.org/cloudcomputing
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND
F
O
S
R
A
T
S
K
C
RO
R
E
B
Y
C
Y
T
I
R
U
C
E
S
PETER ALLOR
IBM, Cyber Security Strategist
Federal
GARY MCGRAW
Cigital, CTO
PETER FONASH
Dept. of Homeland Security, CTO
BRETT WAHLIN
HP, Vice President and CISO
24 SEPTEMBER 2014
Brazos Hall
Austin, TX
REGISTER NOW
PEDER JUNGCK
BAE, Vice President and CTO
computer.org/cyber-security
SARATH GEETHAKUMAR
VISA, Senior Director
Global Information Security
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLDS NEWSSTAND