Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
Cloud computing is the latest effort in delivering computing resources as a service. It represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale data centres or clouds. Cloud computing has been trying to make its impact since 1998 Internet boom. One of the main reasons for it not being able to make a big impact is "Customer perception about Data Availability". In traditional backup model, the application server and data storage are local. The backup is remote for availability. In cloud computing it should be the other way round. App and storage, remote and backup should be local to customer. Whilst cloud computing is gaining growing popularity in the IT industry, academia appeared to be lagging behind the rapid developments in this field. Cloud Computing frequently is taken to be a term that simply renames common technologies and techniques that we have come to know in IT. It may be interpreted to mean data centre hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that permit near real time, policy-based control of computing resources.
Cloud computing represents a different way to architect and remotely manage computing resources. In traditional backup, the backup server handles the backup clients (application and database servers, & storage devices) and desktops/workstations. In Tenacive Backup, the backup server handles the workstations and clients as its application and storage systems. This is a fundamental paradigm shift that needs different kind of WAN optimized algorithms for metadata.
psychological safety for the customer that the data is available with him all the time. This paper talks about Tenacive backup model that Cloud Computing can use to provide seamless data availability locally to customer.
Currently, there is not much work on measurement and analysis of data center traffic. Report on data center traffic characteristics on flow sizes and concurrent flows, and use these to guide network infrastructure design. Data security Data security is another important research topic in cloud computing. Since service providers typically do not have access to the physical security system of data centers, they must rely on the infrastructure provider to achieve full data security. Even for a virtual private cloud, the service provider can only specify the security setting remotely, without knowing whether it is fully implemented. The infrastructure provider, in this context, must achieve the following objectives: (1) Confidentiality, for secure data access and transfer, and (2) Auditability, for attesting whether security
Setting of applications has been tampered or not. Confidentiality is usually achieved using cryptographic protocols, whereas auditability can be achieved using remote attestation techniques. Remote attestation typically requires a trusted platform module (TPM) to generate non-forgeable system summary (i.e. system state encrypted using TPMs private key) as the proof of system security. However, in a virtualized environment like the clouds, VMs can dynamically migrate from one location to another; hence directly using remote attestation is not sufficient. In this case, it is critical to build trust mechanisms at every architectural layer of the cloud. Firstly, the hardware layer must be trusted. Secondly, the virtualization platform must be trusted using secure virtual machine monitors.
Business interactions have the potential to become more complex than personal transactions. Because they are likely to be formed as composite services, and because services on which they depend may be provisioned in multiple clouds, the ability to provision and uniformly manage composite cloud services will be required, as will be the ability to ensure that these services satisfy specified business policy constraints.
The way that users and access control are managed in typical applications today is no longer flexible enough to express roles and responsibilities that people will play in nextgeneration business interactions. Roles will be played by people outside of or across corporate boundaries in an online context just as frequently as they are inside. Access control and the management of roles and responsibilities must be externalized from business functionality so that it becomes more feasible to composite functional behaviour into distributed service oriented applications that can be governed by externalized policy. A cloud should be dynamically configurable: configuration should be automatable in varying and unpredictable, possibly even event-driven, conditions. Systems management technologies for clouds must integrate constraints on business with constraints on infrastructure to make them manageable in aggregate. - A cloud should be able to dynamically provision itself and optimize its own construction and resource consumption over time. - A cloud must be able to recover from routine and extraordinary events that might cause some or all of its parts to malfunction. - A cloud must be aware of the contexts in which it is used so that cloud contents can behave accordingly to be used to determine priority access to physical resources. Application platforms today are unaware of their usage context, but business functionality in next-generation platforms will have to be managed with context in mind. A cloud must be secure, and it must be able to secure itself. Delivering services over the Internet. The rise of cloud computing is rapidly changing the landscape of information technology.
4.0 SUMMARY
Cloud computing has recently emerged as a compelling paradigm for managing and ultimately turning the long-held promise of utility computing into a reality. However, despite the significant benefits offered by cloud computing, the current technologies are not matured enough to realize its full potential. Many key challenges in this domain, including automatic resource provisioning, power management and security management, are only starting to receive attention from the research community. Therefore, we believe there is still tremendous opportunity for researchers to make ground breaking contributions in this field, and bring significant impact to their development in the industry.
5.0 BIBLIOGRAPHY
1.CLOUD PERSPECTIVES BY DELOITTE [Page no: 1,14-17]
cloud.pubs.dbs.uni-leipzig.de/sites/clouds.pubs.dbi..../fulltext.pdf