Heading Off Correlated Failures through Independence-as-a-Service

Size: px
Start display at page:

Download "Heading Off Correlated Failures through Independence-as-a-Service"

Transcription

1 Heading Off Correlated Failures through Independence-as-a-Service Ennan Zhai 1 Ruichuan Chen 2, David Isaac Wolinsky 1, Bryan Ford 1 1 Yale University 2 Bell Labs/Alcatel-Lucent

2 Background Cloud services ensure reliability by redundancy: - Amazon S3 replicates data on multiple racks - icloud rents EC2 and Azure redundantly

3 Background Cloud services ensure reliability by redundancy: - Amazon S3 replicates data on multiple racks - icloud rents EC2 and Azure redundantly

4 Background Cloud services ensure reliability by redundancy: - Amazon S3 replicates data on multiple racks - icloud rents EC2 and Azure redundantly

5 Background Cloud services ensure reliability by redundancy: - Amazon S3 replicates data on multiple racks - icloud rents EC2 and Azure redundantly Unexpected common dependencies!

6 Service Outage Losses Data Center Outages Generate Big Losses Downtime in a data center can cost an average of $505,500 per incident, according to a Ponemon Institute study. Analytics Slideshow: 2010 Data Center Operational Trends Report

7 Service Outage Losses Data Center Outages Generate Big Losses Downtime in a data center can cost an average of $505,500 per incident, according to a Ponemon Institute study. Analytics Slideshow: 2010 Data Center Operational Trends Report

8 What is correlated failure?

9 What is correlated failure? Rack1 Rack2 Rack3 Switch1 Switch2 Switch3

10 What is correlated failure? Rack1 Rack2 Rack3 Primary Backup Backup Switch1 Switch2 Switch3

11 What is correlated failure? Rack1 Rack2 Rack3 Primary Backup Backup Switch1 Switch2 Switch3 Agg Switch

12 What is correlated failure? Rack1 Rack2 Rack3 Primary Backup Backup Switch1 Switch2 Switch3 Agg Switch

13 What is correlated failure? Rack1 Rack2 Rack3 Primary Backup Backup Switch1 Switch2 Switch3 Agg Switch

14 Realistic Example

15 Realistic Example Correlated failures resulting from EBS due to bugs in one EBS server Summary of the October 22, 2012 AWS Service Event in the US-East Region We d like to share more about the service event that occurred on Monday, October 22nd in the US-East Region. We have now completed the analysis of the events that affected AWS customers, and we want to describe what happened, our understanding of how customers were affected, and what we are doing to prevent a similar issue from occurring in the future. The Primary Event and the Impact to Amazon Elastic Block Store (EBS) and Amazon Elastic Compute Cloud (EC2)

16 Realistic Example Elastic Compute Cloud (EC2) Elastic Block Store (EBS)

17 Realistic Example Elastic Block Store (EBS)

18 Realistic Example VM1 VM2 VM1 VM3 VM1 VM2 VM3 VM Elastic Block Store (EBS)

19 Realistic Example VM1 VM2 VM1 VM3 VM1 VM2 VM3 VM EBS Server1 EBS Server2

20 Realistic Example VM1 VM2 VM1 VM3 VM1 VM2 VM3 VM EBS Server1 EBS Server2

21 Realistic Example VM1 VM2 VM1 VM3 VM1 VM2 VM3 VM EBS Server1 EBS Server2

22 Realistic Example VM1 VM2 VM1 VM3 VM1 VM2 VM3 VM EBS Server1 EBS Server2

23 Even Worse

24

25 Video App Cloud Provider A Cloud Provider B

26 Video App Cloud Provider A Cloud Provider B Third-party infrastructure components

27 Video App Cloud Provider A Cloud Provider B Third-party infrastructure components ISP Router A ISP Router B ISP Router C

28 Video App Cloud Provider A Cloud Provider B Third-party infrastructure components ISP Router A ISP Router B ISP Router C Power Source

29 Video App Cloud Provider A Cloud Provider B Third-party infrastructure components ISP Router A ISP Router B ISP Router C Power Source

30 Video App Cloud Provider A Cloud Provider B Third-party infrastructure components ISP Router A ISP Router B ISP Router C Power Source

31 Video App Cloud Provider A Cloud Provider B Cloud providers do not usually share Third-party infrastructure components information about their dependencies ISP Router A ISP Router B ISP Router C Power Source

32 Existing Efforts Cloud providers allocate or tolerate failures via: - diagnosis systems; - fault-tolerant systems.

33 Existing Efforts Cloud providers allocate or tolerate failures via: - diagnosis systems; - fault-tolerant systems. Solving the problem after outage occurs. We want to prevent the problem before the outage occurs.

34 Existing Efforts Cloud providers allocate or tolerate failures via: - diagnosis systems; - fault-tolerant systems. Solving the problem after outage occurs. Prevent correlated failures before outage occurs.

35 Existing Efforts Cloud providers allocate or tolerate failures via: - diagnosis systems; - fault-tolerant systems. Solving the problem after outage occurs. Prevent correlated failures before outage occurs. Independence-as-a-Service (INDaaS)

36 INDaaS Workflow Service Provider, Alice INDaaS A Given Redundancy Configuration

37 INDaaS Workflow Service Provider, Alice INDaaS Two-Way Redundancy Configuration Dependency Data Source1 Dependency Data Source2

38 INDaaS Workflow Service Provider, Alice Independence of this two-way redundancy? INDaaS Two-Way Redundancy Configuration Dependency Data Source1 Dependency Data Source2

39 INDaaS Workflow Service Provider, Alice Step1: Specification Submission INDaaS Dependency Data Source1 Dependency Data Source2

40 INDaaS Workflow Service Provider, Alice Step1 INDaaS Step2: Dependency data collection Dependency Data Source1 Step2: Dependency data collection Dependency Data Source2

41 INDaaS Workflow Service Provider, Alice Step1 Step3: Independence Evaluation INDaaS Step2 Step2 Dependency Data Source1 Dependency Data Source2

42 INDaaS Workflow Service Provider, Alice Relative Independence is 0.3 Step1 Step3 INDaaS Step2 Step2 Dependency Data Source1 Dependency Data Source2

43 Multiple Cloud Providers Service Provider, Alice Step1 Step3 INDaaS Step2 Step2 Dependency Data Source1 Dependency Data Source2

44 Multiple Cloud Providers Service Provider, Alice Step1 Step3 Unwilling to share the dependency data INDaaS Step2 Step2 Unwilling to share the dependency data Data Source1 (Cloud1) Data Source2 (Cloud2)

45 Private Independence Evaluation Service Provider, Alice Step1 INDaaS Step2 Data Source1 (Cloud1) Step3: Private auditing Step2 Data Source2 (Cloud2)

46 Private Independence Evaluation Service Provider, Alice Step1 INDaaS Step2 Step4 Step4 Step2 Data Source1 (Cloud1) Step3 Data Source2 (Cloud2)

47 Private Independence Evaluation Service Provider, Alice Step1 Only know my information Step2 Step4 INDaaS Step4 Step2 Only know my information Data Source1 (Cloud1) Step3 Data Source2 (Cloud2)

48 Private Independence Evaluation Service Provider, Alice Only the relative independence Step1 INDaaS Step2 Step4 Step4 Step2 Data Source1 (Cloud1) Step3 Data Source2 (Cloud2)

49 Private Independence Evaluation Service Provider, Alice Step1 Step5 INDaaS Step2 Step4 Step4 Step2 Data Source1 (Cloud1) Step3 Data Source2 (Cloud2)

50 Technical Challenges Step1 Step5 INDaaS Step2 Step4 Step4 Step2 Dependency Data Source1 Step3 Dependency Data Source2

51 Technical Challenges #1: Dependency collections - Solution: Reusing existing tools Step1 Step5 INDaaS Step2 Step4 Step4 Step2 Dependency Data Source1 Step3 Dependency Data Source2

52 Technical Challenges #1: Dependency collections - Solution: Reusing existing tools Step1 INDaaS Step5 #2: Dependency representation - Solution: Fault graphs Step2 Step4 Step4 Step2 Dependency Data Source1 Step3 Dependency Data Source2

53 Technical Challenges #1: Dependency collections - Solution: Reusing existing tools Step2 Step1 Step5 INDaaS Step4 Step4 Step2 #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm Dependency Data Source1 Step3 Dependency Data Source2

54 Technical Challenges Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

55 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

56 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

57 Dependency Data Collections Reuse existing data collection tools: - Convert the outputs to uniform format. - Three types of format: NET, HW and SW. Our defined format Type Network Hardware Software Dependency Expression <src= S dst= D route= x,y,z /> <hw= H type= T dep= x /> <pgm= S hw= H dep= x,y,z /> Please see our paper for more details

58 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

59 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

60 Example Redundancy

61 Example Redundancy

62 Example Redundancy SW HW NET

63 Building Fault Graph Top-to-Bottom SW HW NET

64 Step1: Root Node Redundancy configuration fails

65 Step2: Server Nodes Redundancy configuration fails Server 1 fails Server 2 fails

66 Step2: Server Nodes Redundancy configuration fails Server 1 fails Server 2 fails AND gate: all the sublayer nodes fail, the upper layer node fails

67 Step3: Dependency Nodes Redundancy configuration fails Server 1 fails Server 2 fails +" +" HW fails Net fails SW fails Net fails SW fails HW fails

68 Step3: Dependency Nodes Redundancy configuration fails Server 1 fails Server 2 fails +" +" HW fails Net fails SW fails Net fails SW fails HW fails OR gate: one of the sublayer nodes fails, the upper layer node fails

69 Step4: Hardware Dependency Redundancy configuration fails Server 1 fails Server 2 fails +" +" HW fails Net fails SW fails Net fails SW fails HW fails +" +" CPU1 Disk1 CPU2 Disk2

70 Step5: Network Dependency Redundancy configuration fails Server 1 fails Server 2 fails +" +" HW fails Net fails SW fails Net fails SW fails HW fails +" +" CPU1 Disk1 Path1 Path2 CPU2 Disk2 Core1 +" +" ToR1 Core2

71 Step6: Software Dependency Redundancy configuration fails Server 1 fails Server 2 fails +" +" HW fails Net fails SW fails Net fails SW fails HW fails +" CPU1 Disk1 Path1 Path2 Riak +" Query CPU2 +" Disk2 +" +" +" +" Core1 ToR1 Core2 libsvnl libc6 libccl

72 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

73 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

74 Efficient Auditing Two algorithms balancing cost and accuracy: - Minimal fault set algorithm - Failure sampling algorithm

75 Efficient Auditing Two algorithms balancing cost and accuracy: - Minimal fault set algorithm - Failure sampling algorithm

76 Minimal Fault Set Algorithm Traditional algorithm in safety engineering - Exponential complexity (NP-hard) We are the first to apply it in Cloud area: - Analyzing a fat tree with 30,528 with ~40 hours

77 Minimal Fault Set Algorithm Traditional algorithm in safety engineer - Exponential complexity (NP-hard) We are the first to apply it in Cloud area: - Analyzing a fat tree with 30,528 with ~40 hours We propose efficient failure sampling algorithm.

78 Failure Sampling Algorithm Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails

79 Failure Sampling Algorithm Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails 1 or 0 1 or 0 1 or 0

80 Failure Sampling Algorithm Redundancy configuration fails 1 or 0? Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails 1 or 0 1 or 0 1 or 0

81 Failure Sampling Algorithm Redundancy configuration fails 1 or 0? Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails 1 or 0 1 or 0 1 or 0 Fault Sets

82 The 1st Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails Fault Sets

83 The 1st Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails 1 or 0 1 or 0 1 or 0 Fault Sets

84 The 1st Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails

85 The 1st Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails

86 The 1st Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails {Server1 s HW, Server2 s HW}

87 The 2nd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails Fault Sets {Server1 s HW, Server2 s HW}

88 The 2nd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails 1 or 0 1 or 0 1 or 0 Fault Sets {Server1 s HW, Server2 s HW}

89 The 2nd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails {Server1 s HW, Server2 s HW}

90 The 2nd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails {Server1 s HW, Server2 s HW}

91 The 3rd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Server2 s HW fails Fault Sets {Server1 s HW, Server2 s HW}

92 The 3rd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails {Server1 s HW, Server2 s HW}

93 The 3rd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails {Server1 s HW, Server2 s HW}

94 The 3rd Sampling Round Redundancy configuration fails Server 1 fails Server 2 fails +" +" Server1 s HW fails Switch1 fails Fault Sets Server2 s HW fails {Server1 s HW, Server2 s HW} {Switch1}

95 After Many (e.g., 10 7 ) Rounds Fault Sets {Server1 s HW, Server2 s HW} {Switch1} {Switch1, Server2 s HW} {Switch1} {Switch1, Server2 s HW}......

96 Size-Based Ranking Fault Sets {Server1 s HW, Server2 s HW} {Switch1} {Switch1, Server2 s HW} {Switch1} {Switch1, Server2 s HW}......

97 Size-Based Ranking Fault Sets {Switch1} {Switch1} {Switch1, Server2 s HW} {Switch1, Server2 s HW} {Server1 s HW, Server2 s HW}......

98 Independence Evaluation Multiple equations for option: - summation of sizes - weighted average of sizes Fault Sets {Switch1} {Switch1} {Switch1, Server2 s HW} {Switch1, Server2 s HW} {Server1 s HW, Server2 s HW}......

99 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

100 RoadMap Step2 Step1 Step4 Dependency Data Source1 INDaaS Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

101 RoadMap Step2 Step1 Step4 Data Source1 (Cloud1) INDaaS Step3 Step5 Step4 Step2 Data Source2 (Cloud2) #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

102 Service Provider INDaaS Agent Cloud A Cloud B Cloud C

103 Service Provider INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

104 Service Provider Select two clouds for redundancy: A&B? B&C? or A&C? INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

105 Trusted Third-Party Service Provider Select two clouds for redundancy: A&B? B&C? or A&C? INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

106 Trusted Third-Party Service Provider Select two clouds for redundancy: A&B? B&C? or A&C? INDaaS Agent Cloud providers are reluctant to share this information! Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

107 Secure Multiparty Computation (SMPC) Service Provider Select two clouds for redundancy: A&B? B&C? or A&C? INDaaS Agent SMPC Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

108 Secure Multiparty Computation (SMPC) Select two clouds for redundancy: A&B? B&C? or A&C? INDaaS Agent SMPC is hard to scale! SMPC [Xiao et al. CCSW 13] Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

109 Service Provider Select two clouds for redundancy: A&B? B&C? or A&C? INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

110 Service Provider INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

111 Service Provider INDaaS Agent Evaluating independence by the dataset similarity between clouds Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

112 Service Provider INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

113 Service Provider INDaaS Agent ISP A Power A Power B ISP B Power A Power B ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

114 App Provider INDaaS Auditor Agent ISP A Power A Power B ISP B Power A Power B Using Jaccard similarity to evaluate the ISP B Power C independence of each redundancy configuration. Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

115 App Provider INDaaS Agent S1 S Sn J(S1, S2,..., Sn) = ISP A Power A Power B ISP B Power A Power B S1 S Sn ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

116 Service Provider INDaaS Agent ISP A Power A Power B ISP B Power A Power B ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

117 Service Provider INDaaS Agent ISP A Power A Power B =2 =4 ISP B Power A Power B ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

118 Service Provider INDaaS Agent ISP A Power A Power B =2 =4 ISP B Power A Power B ISP B Power C J = 2/4 Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

119 Deployment Sim Cloud A&B 0.5 Service Provider INDaaS Agent ISP A Power A Power B =2 =4 ISP B Power A Power B ISP B Power C J = 2/4 Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

120 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Service Provider INDaaS Agent ISP A Power A Power B ISP B Power A Power B =1 =4 ISP B Power C J = 1/4 Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

121 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Cloud A&C 0 Service Provider INDaaS Agent ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

122 Service Provider 0 means fully independent INDaaS Agent Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Cloud A&C 0 ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

123 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Cloud A&C 0 Service Provider INDaaS Agent ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

124 Deployment Sim Cloud A&C 0 Cloud B&C 0.25 Cloud A&B 0.5 Service Provider INDaaS Agent ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

125 Deployment Sim Cloud A&C 0 Cloud B&C 0.25 Cloud A&B 0.5 Service Provider INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

126 P-SOP [Vaidya et al. JCS05] We apply Private Set Operation Protocol (P-SOP): - Private set intersection cardinality. - Private set union cardinality. S1 S Sn J(S1, S2,..., Sn) = S1 S Sn

127 P-SOP [Vaidya et al. JCS05] Allow k parties to compute both intersection and union cardinalities without learning other information.

128 P-SOP [Vaidya et al. JCS05] Allow k parties to compute both intersection and union cardinalities without learning other information

129 P-SOP [Vaidya et al. JCS05] Allow k parties to compute both intersection and union cardinalities without learning other information P-SOP

130 P-SOP [Vaidya et al. JCS05] Allow k parties to compute both intersection and union cardinalities without learning other information =1, = =1, =7 =1, =7 P-SOP

131 P-SOP [Vaidya et al. JCS05] Allow k parties to compute both intersection and union cardinalities without learning other information. But I do not know which elements are overlapping/union. Protocol P-SOP 3 7 But I do not know which elements are overlapping/union. But I do not know which elements are overlapping/union

132 P-SOP [Vaidya et al. JCS05] 3 7 Kf Kd Ke Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

133 P-SOP [Vaidya et al. JCS05] 3 7 Kf Kd Ke Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

134 P-SOP [Vaidya et al. JCS05] 3 7 Kf Kd Ke Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

135 P-SOP [Vaidya et al. JCS05] Ee(Ed(Ef(3))) 3 Ee(Ed(Ef(7))) 7 Kf Ef(Ee(Ed(3))) 11 Ef(Ee(Ed(10))) 3 Ef(Ee(Ed(11))) 10 Kd Ke Ed(Ef(Ee(3))) 1 Ed(Ef(Ee(5))) 5 Ed(Ef(Ee(1))) 20 Ed(Ef(Ee(20))) 3 Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

136 P-SOP [Vaidya et al. JCS05] Ee(Ed(Ef(3))) 3 Ee(Ed(Ef(7))) 7 Kf Ef(Ee(Ed(3))) 11 Ef(Ee(Ed(10))) 3 Ef(Ee(Ed(11))) 10 Kd Ke Ed(Ef(Ee(3))) 1 Ed(Ef(Ee(5))) 5 Ed(Ef(Ee(1))) 20 Ed(Ef(Ee(20))) 3 Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

137 P-SOP [Vaidya et al. JCS05] Ee(Ed(Ef(3))) 3 Ee(Ed(Ef(7))) 7 Kf Ef(Ee(Ed(3))) 11 Ef(Ee(Ed(10))) 3 Ef(Ee(Ed(11))) 10 Kd Ke Ed(Ef(Ee(3))) 1 Ed(Ef(Ee(5))) 5 Ed(Ef(Ee(1))) 20 Ed(Ef(Ee(20))) 3 Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

138 P-SOP [Vaidya et al. JCS05] Ee(Ed(Ef(3))) 3 Ee(Ed(Ef(7))) 7 Kf Ef(Ee(Ed(3))) 11 Ef(Ee(Ed(10))) 3 Ef(Ee(Ed(11))) 10 Kd Ef(Ee(Ed(3))) Ke Ed(Ef(Ee(3))) 1 Ed(Ef(Ee(5))) 5 Ed(Ef(Ee(1))) 20 Ed(Ef(Ee(20))) 3 Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

139 P-SOP [Vaidya et al. JCS05] Ee(Ed(Ef(3))) 3 Kf Ef(Ee(Ed(3))) 11 Kd Ef(Ee(Ed(3))) Ef(Ee(Ed(10))) Ef(Ee(Ed(11))) Ee(Ed(Ef(7))) Ed(Ef(Ee(5))) Ed(Ef(Ee(1))) Ed(Ef(Ee(20))) Ke Ed(Ef(Ee(3))) 1 Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

140 P-SOP [Vaidya et al. JCS05] Kf Kd Ef(Ee(Ed(3))) Ef(Ee(Ed(10))) Ef(Ee(Ed(11))) Ee(Ed(Ef(7))) Ed(Ef(Ee(5))) Ed(Ef(Ee(1))) Ed(Ef(Ee(20))) 7 Ke Each party maintains a commutative encryption key Commutative encryption holds: Ex(Ey(m)) = Ey(Ex(m))

141 Private Independence Evaluation

142 Service Provider Select two clouds for redundancy: A&B? B&C? or A&C? INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

143 Service Provider INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

144 Service Provider INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

145 Service Provider INDaaS Agent ISP A Power A Power B ISP B Power A Power B ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

146 Service Provider INDaaS Agent ISP A Power A Power B P-SOP ISP B Power A Power B ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

147 Service Provider INDaaS Agent ISP A Power A Power B =2 ISP B Power A Power B ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

148 Service Provider INDaaS Agent ISP A Power A Power B =2 =4 ISP B Power A Power B ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

149 Service Provider INDaaS Agent ISP A Power A Power B =2 =4 ISP B Power A Power B ISP B Power C J = 2/4 Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

150 Deployment Sim Cloud A&B 0.5 Service Provider INDaaS Agent ISP A Power A Power B =2 =4 ISP B Power A Power B ISP B Power C J = 2/4 Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

151 Deployment Sim Cloud A&B 0.5 Service Provider INDaaS Agent ISP A Power A Power B ISP B Power A Power B P-SOP ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

152 Deployment Sim Cloud A&B 0.5 Service Provider INDaaS Agent ISP A Power A Power B ISP B Power A Power B =1 =4 ISP B Power C J = 1/4 Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

153 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Service Provider INDaaS Agent ISP A Power A Power B ISP B Power A Power B =1 =4 ISP B Power C J = 1/4 Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

154 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Service Provider INDaaS Agent ISP A Power A Power B P-SOP ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

155 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Service Provider INDaaS Agent ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

156 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Cloud A&C 0 Service Provider INDaaS Agent ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

157 Deployment Sim Cloud A&B 0.5 Cloud B&C 0.25 Cloud A&C 0 Service Provider INDaaS Agent ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

158 Deployment Sim Cloud A&C 0 Cloud B&C 0.25 Cloud A&B 0.5 Service Provider INDaaS Agent ISP A Power A Power B =0, =5, J = 0/5 ISP B Power C Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

159 Deployment Sim Cloud A&C 0 Cloud B&C 0.25 Cloud A&B 0.5 Service Provider INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

160 Service Provider Deployment Sim Cloud A&C 0 Cloud B&C 0.25 Cloud A&B 0.5 INDaaS Agent Cloud A Cloud B Cloud C ISP A Power A Power B ISP B Power C

161 RoadMap Step2 Step1 INDaaS Agent Step4 Dependency Data Source1 Step3 Step5 Step4 Step2 Dependency Data Source2 #1: Dependency collections - Solution: Reusing existing tools #2: Dependency representation - Solution: Fault graphs #3: Efficient auditing - Solution: Failure sampling algorithm #4: Private independence audit - Solution: Private Jaccard similarity

162 Evaluation

163 Evaluation Three realistic case studies. Tradeoff between auditing algorithms Overhead of P-SOP protocol

164 Evaluation Three realistic case studies. Tradeoff between auditing algorithms Overhead of P-SOP protocol

165 Three Case Studies Common network dependency Common hardware dependency Common software dependency Please see our paper for more details

166 Evaluation Three realistic case studies. Tradeoff between auditing algorithms Overhead of P-SOP protocol

167 Tradeoff Evaluation We evaluate efficiency/accuracy tradeoff. We generate topology based on fat tree model. We also bu

168 Tradeoff Evaluation Topology A Topology B Topology C # of Core Routers # of Agg Switches ,152 # of ToR Switches ,152 # of Servers 1,024 3,456 27,648 Total # of devices 1,344 4,176 30,528

169 Tradeoff Evaluation Topology A Topology B Topology C # of Core Routers # of Agg Switches ,152 # of ToR Switches ,152 # of Servers 1,024 3,456 27,648 Total # of devices 1,344 4,176 30,528

170 Topology C: 30,528 Devices Minimal Fault Set Algorithm % critical fault sets detected Failure Sampling Algorithm (10 4 ) Minimal Fault Set Algorithm Failure Sampling Algorithm Computational time (minutes) Failure Sampling Algorithm (10 6 )

171 Topology C: 30,528 Devices Minimal Fault Set Algorithm % critical fault sets detected Failure Sampling Algorithm (10 4 ) Minimal Fault Set Algorithm Failure Sampling Algorithm Computational time (minutes) Failure Sampling Algorithm (10 6 )

172 Evaluation Three realistic case studies. Tradeoff between auditing algorithms Overhead of P-SOP protocol

173 What we evaluate? Kissner and Song (KS) protocol for comparison. Bandwidth overhead of P-SOP and KS. Computational overhead of P-SOP and KS.

174 Bandwidth Overhead Total traffic sent (MB) KS (4) P-SOP (4) KS (3) P-SOP (3) KS (2) P-SOP (2) Number of elements in each provider s dataset

175 Bandwidth Overhead Total traffic sent (MB) KS (4) P-SOP (4) KS (3) P-SOP (3) KS (2) P-SOP (2) Number of elements in each provider s dataset

176 Bandwidth Overhead Total traffic sent (MB) KS (4) P-SOP (4) KS (3) P-SOP (3) KS (2) P-SOP (2) Number of elements in each provider s dataset ~80MB

177 Computational Overhead Computational time (seconds) 1e KS (4) KS (3) KS (2) P-SOP (4) P-SOP (3) P-SOP (2) Number of elements in each provider s dataset ~10 3 sec

178 Conclusions INDaaS is a first step towards reliable clouds: - Dependency collections - Dependency representations - Efficient auditing - Private independence auditing We evaluated INDaas with three realistic case studies and large-scale simulations.

179 Thanks, questions? INDaaS: Heading off correlated failures in clouds Find out more at: - We will be at the poster session tonight.

Cloud Computing. Ennan Zhai. Computer Science at Yale University

Cloud Computing. Ennan Zhai. Computer Science at Yale University Cloud Computing Ennan Zhai Computer Science at Yale University ennan.zhai@yale.edu About Final Project About Final Project Important dates before demo session: - Oct 31: Proposal v1.0 - Nov 7: Source code

More information

Failures in Distributed Systems

Failures in Distributed Systems CPSC 426/526 Failures in Distributed Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-14 In lec-14, we learned: - Difference between privacy and anonymity - Anonymous communications

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud? DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided

More information

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India (AWS) Overview: AWS is a cloud service from Amazon, which provides services in the form of building blocks, these building blocks can be used to create and deploy various types of application in the cloud.

More information

Introduction to data centers

Introduction to data centers Introduction to data centers Paolo Giaccone Notes for the class on Switching technologies for data centers Politecnico di Torino December 2017 Cloud computing Section 1 Cloud computing Giaccone (Politecnico

More information

LINUX, WINDOWS(MCSE),

LINUX, WINDOWS(MCSE), Virtualization Foundation Evolution of Virtualization Virtualization Basics Virtualization Types (Type1 & Type2) Virtualization Demo (VMware ESXi, Citrix Xenserver, Hyper-V, KVM) Cloud Computing Foundation

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

AWS Solution Architecture Patterns

AWS Solution Architecture Patterns AWS Solution Architecture Patterns Objectives Key objectives of this chapter AWS reference architecture catalog Overview of some AWS solution architecture patterns 1.1 AWS Architecture Center The AWS Architecture

More information

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration

More information

Cloud Computing. Amazon Web Services (AWS)

Cloud Computing. Amazon Web Services (AWS) Cloud Computing What is Cloud Computing? Benefit of cloud computing Overview of IAAS, PAAS, SAAS Types Of Cloud private, public & hybrid Amazon Web Services (AWS) Introduction to Cloud Computing. Introduction

More information

Designing Fault-Tolerant Applications

Designing Fault-Tolerant Applications Designing Fault-Tolerant Applications Miles Ward Enterprise Solutions Architect Building Fault-Tolerant Applications on AWS White paper published last year Sharing best practices We d like to hear your

More information

Lecture 7: Data Center Networks

Lecture 7: Data Center Networks Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

Enroll Now to Take online Course Contact: Demo video By Chandra sir

Enroll Now to Take online Course   Contact: Demo video By Chandra sir Enroll Now to Take online Course www.vlrtraining.in/register-for-aws Contact:9059868766 9985269518 Demo video By Chandra sir www.youtube.com/watch?v=8pu1who2j_k Chandra sir Class 01 https://www.youtube.com/watch?v=fccgwstm-cc

More information

HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION

HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION Steve Bertoldi, Solutions Director, MarkLogic Agenda Cloud computing and on premise issues Comparison of traditional vs cloud architecture Review of use

More information

AWS: Basic Architecture Session SUNEY SHARMA Solutions Architect: AWS

AWS: Basic Architecture Session SUNEY SHARMA Solutions Architect: AWS AWS: Basic Architecture Session SUNEY SHARMA Solutions Architect: AWS suneys@amazon.com AWS Core Infrastructure and Services Traditional Infrastructure Amazon Web Services Security Security Firewalls ACLs

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

ArcGIS Server Architecture Considerations. Andrew Sakowicz

ArcGIS Server Architecture Considerations. Andrew Sakowicz ArcGIS Server Architecture Considerations Andrew Sakowicz Introduction Andrew Sakowicz - Esri Professional Services - asakowicz@esri.com 2 Audience Audience - System Architects - Project Managers - Developers

More information

Oracle IaaS, a modern felhő infrastruktúra

Oracle IaaS, a modern felhő infrastruktúra Sárecz Lajos Cloud Platform Sales Consultant Oracle IaaS, a modern felhő infrastruktúra Copyright 2017, Oracle and/or its affiliates. All rights reserved. Azure Window collapsed Oracle Infrastructure as

More information

Cooperative Private Searching in Clouds

Cooperative Private Searching in Clouds Cooperative Private Searching in Clouds Jie Wu Department of Computer and Information Sciences Temple University Road Map Cloud Computing Basics Cloud Computing Security Privacy vs. Performance Proposed

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS Dr Adnene Guabtni, Senior Research Scientist, NICTA/Data61, CSIRO Adnene.Guabtni@csiro.au EC2 S3 ELB RDS AMI

More information

The Cloud's Cutting Edge: ArcGIS for Server Use Cases for Amazon Web Services. David Cordes David McGuire Jim Herries Sridhar Karra

The Cloud's Cutting Edge: ArcGIS for Server Use Cases for Amazon Web Services. David Cordes David McGuire Jim Herries Sridhar Karra The Cloud's Cutting Edge: ArcGIS for Server Use Cases for Amazon Web Services David Cordes David McGuire Jim Herries Sridhar Karra Atlas Maps Jim Herries Atlas sample application The Esri Thematic Atlas

More information

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal 1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for

More information

Introduction to Database Services

Introduction to Database Services Introduction to Database Services Shaun Pearce AWS Solutions Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Today s agenda Why managed database services? A non-relational

More information

At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

At Course Completion Prepares you as per certification requirements for AWS Developer Associate. [AWS-DAW]: AWS Cloud Developer Associate Workshop Length Delivery Method : 4 days : Instructor-led (Classroom) At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

More information

Oracle Exadata X7. Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer

Oracle Exadata X7. Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer Oracle Exadata X7 Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer 05.12.2017 Oracle Engineered Systems ZFS Backup Appliance Zero Data Loss Recovery Appliance Exadata Database

More information

Microsoft Azure for AWS Experts

Microsoft Azure for AWS Experts Microsoft Azure for AWS Experts OD40390B; On-Demand, Video-based Course Description This course provides an in-depth discussion and practical hands-on training of Microsoft Azure Infrastructure Services

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

Cloud & container monitoring , Lars Michelsen Check_MK Conference #4

Cloud & container monitoring , Lars Michelsen Check_MK Conference #4 Cloud & container monitoring 04.05.2018, Lars Michelsen Some cloud definitions Applications Data Runtime Middleware O/S Virtualization Servers Storage Networking Software-as-a-Service (SaaS) Applications

More information

Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.)

Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.) Volume: 91 Questions Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.) A. Oracle Cloud Infrastructure Desktop Client B. Oracle Cloud Infrastructure

More information

CIT 668: System Architecture. Amazon Web Services

CIT 668: System Architecture. Amazon Web Services CIT 668: System Architecture Amazon Web Services Topics 1. AWS Global Infrastructure 2. Foundation Services 1. Compute 2. Storage 3. Database 4. Network 3. AWS Economics Amazon Services Architecture Regions

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET1949BU Seamless Network Connectivity for Virtual and Bare-metal s with NSX Suresh Thiru Sridhar Subramanian VMworld 2017 Content: Not for publication VMworld 2017 - NET1949BU Disclaimer This presentation

More information

Lecture 09: VMs and VCS head in the clouds

Lecture 09: VMs and VCS head in the clouds Lecture 09: VMs and VCS head in the Hands-on Unix system administration DeCal 2012-10-29 1 / 20 Projects groups of four people submit one form per group with OCF usernames, proposed project ideas, and

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Best Practices and Performance Tuning on Amazon Elastic MapReduce

Best Practices and Performance Tuning on Amazon Elastic MapReduce Best Practices and Performance Tuning on Amazon Elastic MapReduce Michael Hanisch Solutions Architect Amo Abeyaratne Big Data and Analytics Consultant ANZ 12.04.2016 2016, Amazon Web Services, Inc. or

More information

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson Migrating Enterprise Applications to the Cloud Session 672 Leighton L. Nelson Leighton L. Nelson Instructional Technology Principal Oracle ACE & Oracle Certified Expert Oracle Database Administrator Author/blogger

More information

Welcome to the New Era of Cloud Computing

Welcome to the New Era of Cloud Computing Welcome to the New Era of Cloud Computing Aaron Kimball The web is replacing the desktop 1 SDKs & toolkits are there What about the backend? Image: Wikipedia user Calyponte 2 Two key concepts Processing

More information

Windows Azure Services - At Different Levels

Windows Azure Services - At Different Levels Windows Azure Windows Azure Services - At Different Levels SaaS eg : MS Office 365 Paas eg : Azure SQL Database, Azure websites, Azure Content Delivery Network (CDN), Azure BizTalk Services, and Azure

More information

Welcome to the. Migrating SQL Server Databases to Azure

Welcome to the. Migrating SQL Server Databases to Azure Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine

More information

NEXT GENERATION CLOUD SECURITY

NEXT GENERATION CLOUD SECURITY SESSION ID: CMI-F02 NEXT GENERATION CLOUD SECURITY Myles Hosford Head of FSI Security & Compliance Asia Amazon Web Services Agenda Introduction to Cloud Security Benefits of Cloud Security Cloud APIs &

More information

Amazon Web Services Training. Training Topics:

Amazon Web Services Training. Training Topics: Amazon Web Services Training Training Topics: SECTION1: INTRODUCTION TO CLOUD COMPUTING A Short history Client Server Computing Concepts Challenges with Distributed Computing Introduction to Cloud Computing

More information

Splunk & AWS. Gain real-time insights from your data at scale. Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk

Splunk & AWS. Gain real-time insights from your data at scale. Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk Splunk & AWS Gain real-time insights from your data at scale Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk Forward-Looking Statements During the course of this presentation, we may

More information

Optimizing Network Performance in Distributed Machine Learning. Luo Mai Chuntao Hong Paolo Costa

Optimizing Network Performance in Distributed Machine Learning. Luo Mai Chuntao Hong Paolo Costa Optimizing Network Performance in Distributed Machine Learning Luo Mai Chuntao Hong Paolo Costa Machine Learning Successful in many fields Online advertisement Spam filtering Fraud detection Image recognition

More information

Next-Generation Cloud Platform

Next-Generation Cloud Platform Next-Generation Cloud Platform Jangwoo Kim Jun 24, 2013 E-mail: jangwoo@postech.ac.kr High Performance Computing Lab Department of Computer Science & Engineering Pohang University of Science and Technology

More information

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Walter Cerroni, Franco Callegati DEI University of Bologna, Italy Outline Motivations Virtualized edge networks

More information

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations Today s Presenter Dan Freeman, CISSP Senior Solutions Consultant HelpSystems Steve Luebbe Director of Development HelpSystems

More information

Secure Block Storage (SBS) FAQ

Secure Block Storage (SBS) FAQ What is Secure Block Storage (SBS)? Atlantic.Net's Secure Block Storage allows you to easily attach additional storage to your Atlantic.Net Cloud Servers. You can use SBS for your file, database, application,

More information

Cloud Programming. Programming Environment Oct 29, 2015 Osamu Tatebe

Cloud Programming. Programming Environment Oct 29, 2015 Osamu Tatebe Cloud Programming Programming Environment Oct 29, 2015 Osamu Tatebe Cloud Computing Only required amount of CPU and storage can be used anytime from anywhere via network Availability, throughput, reliability

More information

Course Outline. Module 1: Microsoft Azure for AWS Experts Course Overview

Course Outline. Module 1: Microsoft Azure for AWS Experts Course Overview Course Outline Module 1: Microsoft Azure for AWS Experts Course Overview In this module, you will get an overview of Azure services and features including deployment models, subscriptions, account types

More information

High Availability & Disaster Recovery. Witt Mathot

High Availability & Disaster Recovery. Witt Mathot High Availability & Disaster Recovery Witt Mathot Managing the Twin Risks to your Operations Data Loss Down Time Business Continuity Terminology Resiliency High Availability RTO Round Robin Cost Business

More information

Availability in the Modern Datacenter

Availability in the Modern Datacenter Availability in the Modern Datacenter Adriana Rangel SIS Research Director IDC Middle East, Turkey & Africa IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 US$ Mn Middle East IT Market Spending

More information

COMP6511A: Large-Scale Distributed Systems. Windows Azure. Lin Gu. Hong Kong University of Science and Technology Spring, 2014

COMP6511A: Large-Scale Distributed Systems. Windows Azure. Lin Gu. Hong Kong University of Science and Technology Spring, 2014 COMP6511A: Large-Scale Distributed Systems Windows Azure Lin Gu Hong Kong University of Science and Technology Spring, 2014 Cloud Systems Infrastructure as a (IaaS): basic compute and storage resources

More information

DEEP DIVE INTO CLOUD COMPUTING

DEEP DIVE INTO CLOUD COMPUTING International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai

More information

Amazon Web Services (AWS) Training Course Content

Amazon Web Services (AWS) Training Course Content Amazon Web Services (AWS) Training Course Content SECTION 1: CLOUD COMPUTING INTRODUCTION History of Cloud Computing Concept of Client Server Computing Distributed Computing and it s Challenges What is

More information

Agenda. AWS Database Services Traditional vs AWS Data services model Amazon RDS Redshift DynamoDB ElastiCache

Agenda. AWS Database Services Traditional vs AWS Data services model Amazon RDS Redshift DynamoDB ElastiCache Databases on AWS 2017 Amazon Web Services, Inc. and its affiliates. All rights served. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon Web Services,

More information

An Auditing Language for Preventing Correlated Failures in the Cloud

An Auditing Language for Preventing Correlated Failures in the Cloud 97 An Auditing Language for Preventing Correlated Failures in the Cloud ENNAN ZHAI, Yale University, USA RUZICA PISKAC, Yale University, USA RONGHUI GU, Columbia University, USA XUN LAO, Yale University,

More information

NetApp AWS Worldwide Public Sector Summit Washington, D.C.

NetApp AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Private Storage for Amazon Web Services: Oakland County, MI & other Case Studies Private Storage for Amazon Web Services Solution An agile, joint infrastructure that allows enterprises

More information

Cloud Computing /AWS Course Content

Cloud Computing /AWS Course Content Cloud Computing /AWS Course Content 1. Amazon VPC What is Amazon VPC? How to Get Started with Amazon VPC Create New VPC Launch an instance (Server) to use this VPC Security in Your VPC Networking in Your

More information

Security & Compliance in the AWS Cloud. Amazon Web Services

Security & Compliance in the AWS Cloud. Amazon Web Services Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any

More information

Mellanox InfiniBand Solutions Accelerate Oracle s Data Center and Cloud Solutions

Mellanox InfiniBand Solutions Accelerate Oracle s Data Center and Cloud Solutions Mellanox InfiniBand Solutions Accelerate Oracle s Data Center and Cloud Solutions Providing Superior Server and Storage Performance, Efficiency and Return on Investment As Announced and Demonstrated at

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud

More information

Exam : Implementing Microsoft Azure Infrastructure Solutions

Exam : Implementing Microsoft Azure Infrastructure Solutions Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Azure File Sync. Webinaari

Azure File Sync. Webinaari Azure File Sync Webinaari 12.3.2018 Agenda Why use Azure? Moving to the Cloud Azure Storage Backup and Recovery Azure File Sync Demo Q&A What is Azure? A collection of cloud services from Microsoft that

More information

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Data Centers and Cloud Computing. Slides courtesy of Tim Wood Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

DATA PROTECTION FOR THE CLOUD

DATA PROTECTION FOR THE CLOUD DATA PROTECTION FOR THE CLOUD ERWIN FREISLEBEN ADVISORY SYSTEMS ENGINEER, DELL EMC Data Protection Everywhere Where You Need It Consumption Models On-Prem Continuous Availability Virtualized Converged

More information

High Availability Infrastructure for Cloud Computing

High Availability Infrastructure for Cloud Computing High Availability Infrastructure for Cloud Computing Oracle Technology Network Architect Day Reston, VA, May 16, 2012 Kai Yu Oracle Solutions Engineering Lab Enterprise Solutions Engineering, Dell Inc.

More information

CPSC 426/526. Cloud Computing. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. Cloud Computing. Ennan Zhai. Computer Science Department Yale University CPSC 426/526 Cloud Computing Ennan Zhai Computer Science Department Yale University Recall: Lec-7 In the lec-7, I talked about: - P2P vs Enterprise control - Firewall - NATs - Software defined network

More information

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS

More information

Lecture 16: Data Center Network Architectures

Lecture 16: Data Center Network Architectures MIT 6.829: Computer Networks Fall 2017 Lecture 16: Data Center Network Architectures Scribe: Alex Lombardi, Danielle Olson, Nicholas Selby 1 Background on Data Centers Computing, storage, and networking

More information

Web Cloud Solution. User Guide. Issue 01. Date

Web Cloud Solution. User Guide. Issue 01. Date Issue 01 Date 2017-05-30 Contents Contents 1 Overview... 3 1.1 What Is Web (CCE+RDS)?... 3 1.2 Why You Should Choose Web (CCE+RDS)... 3 1.3 Concept and Principle... 4... 5 2.1 Required Services... 5 2.2

More information

Utilizing Datacenter Networks: Centralized or Distributed Solutions?

Utilizing Datacenter Networks: Centralized or Distributed Solutions? Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

/ Cloud Computing. Recitation 5 September 26 th, 2017

/ Cloud Computing. Recitation 5 September 26 th, 2017 15-319 / 15-619 Cloud Computing Recitation 5 September 26 th, 2017 1 Overview Administrative issues Office Hours, Piazza guidelines Last week s reflection Project 2.1, OLI Unit 2 modules 5 and 6 This week

More information

ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM

ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM ROLE OF NETWORK VIRTUALIZATION AND SOFTWARE DEFINED SECURITY IN MULTICLOUD ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM This statement of direction sets forth Juniper Networks current intention and

More information

Exam Questions

Exam Questions Exam Questions 70-475 Designing and Implementing Big Data Analytics Solutions https://www.2passeasy.com/dumps/70-475/ 1. Drag and Drop You need to recommend data storage mechanisms for the solution. What

More information

Hosting DesktopNow in Amazon Web Services. Ivanti DesktopNow powered by AppSense

Hosting DesktopNow in Amazon Web Services. Ivanti DesktopNow powered by AppSense Hosting DesktopNow in Amazon Web Services Ivanti DesktopNow powered by AppSense Contents Purpose of this Document... 3 Overview... 3 1 Non load balanced Amazon Web Services Environment... 4 Amazon Web

More information

CogniFit Technical Security Details

CogniFit Technical Security Details Security Details CogniFit Technical Security Details CogniFit 2018 Table of Contents 1. Security 1.1 Servers........................ 3 1.2 Databases............................3 1.3 Network configuration......................

More information

Automate best practices and operational health for your AWS resources with Trusted Advisor and AWS Health

Automate best practices and operational health for your AWS resources with Trusted Advisor and AWS Health Automate best practices and operational health for your AWS resources with Trusted Advisor and AWS Health Heitor Lessa, Solutions Architect @ AWS Stephen Gran, Senior Technical Architect @ Piksel June

More information

1V0-621.testking. 1V VMware Certified Associate 6 - Data Center Virtualization Fundamentals Exam

1V0-621.testking.  1V VMware Certified Associate 6 - Data Center Virtualization Fundamentals Exam 1V0-621.testking Number: 1V0-621 Passing Score: 800 Time Limit: 120 min 1V0-621 VMware Certified Associate 6 - Data Center Virtualization Fundamentals Exam Exam A QUESTION 1 An administrator needs to gracefully

More information

Data Sheet Gigamon Visibility Platform for AWS

Data Sheet Gigamon Visibility Platform for AWS Data Sheet Gigamon Visibility Platform for Overview The rapid evolution of Infrastructure-as-a-Service (IaaS), or public clouds, brings instant advantages of economies of scale, elasticity, and agility

More information

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure 70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center

More information

Hosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution.

Hosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Hosted Azure for your business Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Azure is approximately 50 percent cheaper than other cloud services

More information

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content Introduction to Cloud Computing A Short history Client Server Computing Concepts Challenges with Distributed Computing Introduction

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

Deploying High Availability and Business Resilient R12 Applications over the Cloud

Deploying High Availability and Business Resilient R12 Applications over the Cloud Deploying High Availability and Business Resilient R12 Applications over the Cloud Session ID#: 13773 Deploying R12 applications over the cloud - The best practices you need to know and the pitfalls to

More information

What s in Installing and Configuring Windows Server 2012 (70-410):

What s in Installing and Configuring Windows Server 2012 (70-410): What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

More information

Launching a Highly-regulated Startup in the Cloud

Launching a Highly-regulated Startup in the Cloud Launching a Highly-regulated Startup in the Cloud Poornaprajna Udupi (@poornaudupi) 1 Starting in the 86%by 2020 Cloud Cisco Global Cloud Index: Forecast and Methodology, 2015 2020 2 Building blocks, Cost,

More information

About Intellipaat. About the Course. Why Take This Course?

About Intellipaat. About the Course. Why Take This Course? About Intellipaat Intellipaat is a fast growing professional training provider that is offering training in over 150 most sought-after tools and technologies. We have a learner base of 600,000 in over

More information

Oracle WebLogic Server 12c on AWS. December 2018

Oracle WebLogic Server 12c on AWS. December 2018 Oracle WebLogic Server 12c on AWS December 2018 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

Training on Amazon AWS Cloud Computing. Course Content

Training on Amazon AWS Cloud Computing. Course Content Training on Amazon AWS Cloud Computing Course Content 15 Amazon Web Services (AWS) Cloud Computing 1) Introduction to cloud computing Introduction to Cloud Computing Why Cloud Computing? Benefits of Cloud

More information

Magento Commerce Architecture and Security Model Last updated: Aug 2017

Magento Commerce Architecture and Security Model Last updated: Aug 2017 Magento Commerce Architecture and Security Model Last updated: Aug 2017 Architecture The Magento Commerce architecture is designed to provide a highly secure environment. Each customer is deployed into

More information

We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info

We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info START DATE : TIMINGS : DURATION : TYPE OF BATCH : FEE : FACULTY NAME : LAB TIMINGS : Storage & Database Services : Introduction

More information

Differential Privacy

Differential Privacy CPSC 426/526 Differential Privacy Ennan Zhai Computer Science Department Yale University Recall: Lec-11 In lec-11, we learned: - Cryptographic basics - Symmetric key cryptography - Public key cryptography

More information

The HR Avatar Testing Platform

The HR Avatar Testing Platform The HR Avatar Testing Platform Purpose This document is intended to provide a high level overview of the HR Avatar testing platform what makes it different from other, legacy testing platforms. Overview

More information

Better, Faster, Stronger web apps with Amazon Web Services. Senior Technology Evangelist, Amazon Web Services

Better, Faster, Stronger web apps with Amazon Web Services. Senior Technology Evangelist, Amazon Web Services Better, Faster, Stronger web apps with Amazon Web Services Simone Brunozzi ( @simon ) Senior Technology Evangelist, Amazon Web Services (from the previous presentation) Knowledge starts from great questions.

More information

Oracle Database 11g: Real Application Testing & Manageability Overview

Oracle Database 11g: Real Application Testing & Manageability Overview Oracle Database 11g: Real Application Testing & Manageability Overview Top 3 DBA Activities Performance Management Challenge: Sustain Optimal Performance Change Management Challenge: Preserve Order amid

More information