ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT

Size: px
Start display at page:

Download "ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT"

Transcription

1 ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT Maram Hassan AlAlwan Alalwan.maram@gmail.com Soha S. Zaghloul smekki@ksu.edu.sa College of Computer and Information Science Department of Computer Sciences Kind Saud University Riyadh, Saudi Arabia ABSTRACT Recently, cloud computing became a dominant field in the information technology world. It prevails over both academia and industry. Cloud Service Providers (CSP) provide many services such as storage, platform and applications. However, security is the most critical concern that impedes the dominance of cloud usage. Since Software as a Service (SaaS) security issues are under the end-user s control, it became more common than other cloud service models. In addition, its popularity comes from its remote delivery for the application functions over the Internet to subscribed users. Multi-tenancy is the main property of SaaS, it allows vendors to provide multiple requests and configurations through a single instance of the application. In this context, a customer is known as a "tenant". In the same way, a single database is shared amongst customers to store all tenants data: this is known as "multi-tenant database". This reduces operational and maintenance costs; offers more reliability. On the other hand, the occurrence of a problem affects all customers. The risk of leaking information is the most undesirable situation in this architecture. In addition, multi-tenant databases are the most suitable architecture for data mining: this may increase the income of CSPs. From tenants perspective, this approach lacks flexibility. This paper explores the different implementation approaches used in multi-tenant databases. It also provides an analytical study on each of the presented approaches. KEYWORDS Cloud; SaaS; Multi-tenancy; Multitenant database; Chunk Table. 1 INTRODUCTION In the traditional model of the software application, customers should buy the needed application and then install it on their local computer or data center. Today the cloud computing paradigm offers an alternative service model which is Software as a Service (SaaS). Accordingly, the application functions are delivered remotely over the Internet on subscription basis. In SaaS model, customers are not required to install, maintain or even manage the application; alternatively, the Cloud Service Provider (CSP) is responsible for these jobs. On the other hand, the IT departments in most organizations consume a lot of effort and money in developing and managing their applications. Since cloud computing reduces effort and cost, then most organizations tend to outsource their IT applications and devote themselves to other commercial competitions. Many SaaS applications are widely used in business such as Customer Relationship Management (CRM), Supplier Relationship Management (SRM), Business intelligence (BI) and Academic and administrative resources (multiple educational institutions are sharing the same database-space to collaborate and benefit from each other) [1], [2]. However, this model works only for specific applications whose behavior is well defined and universally accepted. The most important SaaS characteristic is multitenancy, where a single running instance of an application serves multiple requests from multiple customers, each customer is considered as a tenant. All tenants participate and use the same database to store their data. This leads us to use a multi-tenant database architecture [3]. The rest of the paper is organized as follows: Section 2 explores the different isolation degrees that might be used in creating multi-tenant data architecture. Various implementation approaches for multi-tenant database are presented in Section 3. Section 4 analyzes the implementation approaches presented in the previous section. Finally, Section 5 concludes the paper. ISBN: SDIWC 523

2 2 MULTI-TENANT DATABASE ARCHITECTURE Data is the most important asset for any business; it is also the heart of SaaS application. Therefore, the provision of a secure and efficient database architecture became one of the highest priorities for SaaS vendors. This is an attempt to gain tenant's trust who is concerned about surrendering his data to a place that is shared with other tenants. Moreover, he has no control over it. Many approaches are implemented for the purpose of data isolation for each tenant in a database. The selection of the approach to use depends on the complexity of the application and many other business considerations. Mainly three approaches are covered in literature. Here they are: - Separate Database: In this approach, a separate database is assigned to each tenant for data storage. Each database contains some metadata used to redirect each tenant to the correct database. This approach is considered expensive in both implementation and maintenance. - Shared database, separate schema: In this approach all tenants share the same physical database, however, the schema different for each tenant. This approach is relatively simple to implement. - Shared database, shared schema: In this approach all tenants will share both the physical database and the schema. Tables are shared by all tenants. Customers information is separated using primary keys which are specified in the database design. This approach is relatively economic because it supports a large number of tenants per database server [1]. Selecting the appropriate approach depends on different criteria. For example, the separate database approach is the appropriate solution for large organizations tenants who need to store large amounts of data. The same approach is also suitable if security and legal requirements are of high concern. On the other hand, the shared database shared schema is the appropriate solution for individual tenants who have low amounts of data to store. Also, the same approach is the optimum solution in case of frequent changed applications. [4]. 3 IMPLEMENTING MULTI-TENANT DATABASES In order to implement multi-tenancy in the database, most hosted services use a query transformation layer to map multiple single-tenant logical schemas in the application to one multitenant physical schema in the database. For normal workloads, the fundamental development limitation of this approach is the number of tables the database can handle. In turn, the number of tables depends on the amount of available memory, the tables design, and their development in such a way that the tenant receives a response to any query in an efficient way [5]. Various approaches are explored and implemented in the literature. The general idea is to map the logical source tables into fixed generic structures. In the following sub-sections, these approaches are explained, followed by an example that illustrates how different tenants (Tenant A, Tenant B, and Tenant C) use that approach to configure one sales table which stores their salesperson s information in multi-tenant application. Here they are: 3.1 Private Tables The private table technique provides a high level of isolation and privacy among tenants. This is achieved by allowing each tenant to have his own private table in the database to satisfy his needs. Figure 1 illustrates the implementation of such approach. Figure 1: Private Table Implementation ISBN: SDIWC 524

3 3.2 Universal Table The universal table layout holds a large number of generic data columns with a flexible data type such as VARCHAR data type. The n-th column of a logical source table for each tenant is mapped to ColN in the universal table. In addition, two unique columns, Tenant_id and Table columns are used: Tenant_id identifies tenants from each other, whereas the Table column identifies the specific table of the same tenant. - Each table consists of five columns: Tenant_id used to identify each tenant from other; the Table column is used to identify the specific table of the same tenant; the col column is used to determine the Each tenant fills his columns with the needed data. The rest of the columns that are not related to him are filled with Null values. Figure 2 illustrates the implementation of such approach. Figure 3: Extension Table Implementation represented column in the logical source table; the row column is used to determine the represented row in the logical source table; and finally the data type column used to store the values of the logical source table rows according to their data types in the designated pivot Table. Figure 2: Universal Table Implementation 3.3 Extension Tables In Extension Tables, the logical source table is partitioned into different tables; the common attribute for all tenants is stored in the base table. Each group having the same attribute is stored in different extension tables. These separated tables are joined together by adding Tenant_id column and row column. The latter represents the specific row in the logical source tables. So, multiple tenants can share the base tables as well as the extension. Figure 3 illustrates the implementation of such approach. In general, each new row in the pivot table is created for each field "cell" in the logical source table. Figure 4 illustrates the implementation of the pivot table. 3.4 Pivot Tables In this technique, Pivot tables are shared by all tenants. The source tables are mapped as follows: - A separate table for each data type is created. For example, we might have two pivot tables, the first one pivot_int to store integer values, and the second is pivot_str to store string values. Figure 4: Pivot Table Implementation ISBN: SDIWC 525

4 3.5 Chunk Table The Chunk Table technique is similar to the Pivot Table approach; however, they are different in two points: 1. It has a set of data columns with multiple data types with or without indexes. 2. The column col in the Pivot Table is replaced by the chunk column in the Chunk Table. In the Chunk Table technique the columns in the logical source tables are partitioned into groups according to their popularity. Each group is assigned to a chunk ID and mapped to the appropriate Chunk Table. In fact, the Universal Table is an extreme chunking: only one chunk per row. On the other hand, we have one row for each field in the pivot table in contrast to having one row for each chunk in the Chunk Tables. Figure 5 illustrates the implementation of the Chunk Tables. Figure 6: Chunk Folding Table Implementation 3.7 The XML Data Type/Document The XML data type database extension technique is a combination of relational database systems and Extensible Markup Language (XML). The extension of XML can be provided as native XML data type, or by storing the XML document in the database as a Character Large Object (CLOB) or Binary Large Object (BLOB). Figure 5: Chunk Table Implementation 3.6 Chunk Folding Table In the Chunk folding Table technique, logical source tables are vertically partitioned into two tables. The first one the base table - is used to store the heavily used part of the logical source tables; in other words, the columns that are used the most by the tenants. On the other hand, the second table is used to store the remaining columns which are less frequently used by most of the tenants: these are the Chunk Tables. Therefore, we can say that the Chunk Folding table technique mixes the ideas of both the Extension table and Chunk Tables. Figure 6 illustrates an implementation of such technique. Figure 7: XML Data Type Implementation XML data type is used to facilitate the creation of the database tables, columns, views, as well as variables and parameters. This technique satisfies most tenants needs, because their data can be handled without changing the original database ISBN: SDIWC 526

5 relational schema. XML data type can be supported by several relational database products [6]. Figure 7 illustrates the XML data type implementation. 4 ANALYSIS This section analyzes the previously mentioned approaches. 4.1 Private Table This technique is very simple to implement. In addition, it provides a high level of privacy. Moreover, the query transformation layer needs only to rename the tables in order to map each tenant to his own table. The main drawback of this approach is the large number of tables created for each tenant since no sharing is allowed. Therefore, this technique achieves a good performance for a low number of tenants. 4.2 Universal Table In contrast to the private table technique, the Universal table offers a great consolidation degree with no extensibility. This approach is relatively easy to implement. In fact, it is considered as a flexible approach because tenants can extend their tables as needed. The main drawback of this approach is that the rows need to be very wide even for slender source tables. As a result, the database has to handle many null values. Furthermore, indexes on the columns are not supported in this approach. On the other hand, the data type becomes an important issue since each tenant might have a different data type in his logical source table. This issue leads to the necessity of adding additional structures to provide indexing in this technique. 4.3 Extension Table This approach lies somewhere in the middle between the Private and Universal tables. In other words, it provides a better consolidation than the Private Table Layout. At the same time, it outperforms the Universal table in terms of extensibility. However, the number of tables increases proportionally with the number of tenants and the diversity of their business requirements. Another drawback for this approach is that an additional join operation takes place at the run time when reconstructing the logical source tables. 4.4 Pivot Table The Pivot Table technique provides much and better performance for the following reasons: - It is a safe data-type structure: each Pivot Table is created for each different data type. - It efficiently supports indexing, two Pivot Tables can be created for each type: one with indexes and one without, each value is placed in one of these tables depending on whether it needs to be indexed or not. - This approach eliminates the need to handle many null values. The main drawback in this technique is that it has more columns of meta-data than the actual data. Moreover, reconstructing the logical source column requires many join operations along the row column. As a result, this leads to a much higher runtime overhead for interpreting the metadata [7]. 4.5 Chunk Table Unlike the Pivot Tables, this approach reduces the ratio of stored meta-data to actual data. Therefore, there is less overhead for reconstructing the logical source tables. Unlike the Universal Tables, this approach provides a well-defined way of adding indexes and reducing the number of columns. Moreover, this technique provides high flexibility since the width of the Chunk Tables may vary. However, this flexibility adds more complexity at the querytransformation layer. 4.6 Chunk Folding Table Chunk Folding technique achieves good performance that is obtained by mapping the most heavily utilized parts of the logical schemas into the basic tables; the remaining parts are mapped into Chunk Tables that match their structure as closely as possible. Furthermore, it does not put any limitations on the consolidation or the extensibility. However, it is not efficient with generic structures that use only a small and/or fixed number of tables. Chunk Folding tries to utilize the database s entire meta-data in an effective way as much as possible [7]. 4.7 The XML Data Type/Document Obviously, using the XML data type in the database extension technique adds many advantages to the database in terms of its ISBN: SDIWC 527

6 simplicity in the implementation. Also, it provides flexibility to have multiple data types with the various numbers of columns in each logical source table. Furthermore, the insertion and the retrieval of XML data is fast, however overall performance is affected by this data structure [6]. 5 CONCLUSION The multi-tenancy concept is the primary characteristic of SaaS applications. With SaaS, we need to use a multi-tenant database where all tenants (customers) participate and share a database. However, each tenant stores his own data. In this paper, the approach of multi-tenancy is explained in detail. Several implementation techniques in designing a multi-tenant database are presented. An analytical study of each technique is also presented: its advantages, disadvantages, and performance. In addition, the paper reveals the usability of each technique: when it is preferably used and under which circumstances. 6 REFERENCES [1] Pippal, S., Sharma, V., Mishra, S., Kushwaha, D.S.: An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication and Authorization Framework. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, (2011). [2] Xu, J., Li, X., Zhao, X.: Design of Database Architecture in the SaaS-based Multi-tenant Educational Information System. In the 6th International Conference on Computer Science & Education, , ( 2011). [3] Li, X., Shi, Y., Guo, Y., Ma, W.: Multi-tenancy Based Access Control in Cloud. In International Conference on Computational Intelligence and Software Engineering (CiSE) (2010). [4] Last accessed on 24/12/2012. [5] Mateljan, V., Cisic, D., Ogrizovic, D.: Cloud Databaseas-a-Service (DaaS) ROI. In MIPRO, Proceedings of the 33 rd International Convention, (2010). [6] Yaish, H., Goyal, M., Feuerlicht, G.: An Elastic Multitenant Database Schema for Software as a Service. In the 9 th IEEE International Conference on Dependable, Autonomic and Secure Computing, (2011). [7] Aulbach, S., Grust, T., Jacobs, D., Kemper, A., Rittinger, J.: Multi-Tenant Databases for Software as a Service:Schema-Mapping Techniques. In ACM SIGMOD Proceedings International Conference on Management of Data, (2008). ISBN: SDIWC 528

Multitenant Software as a Service: Application Development Approach

Multitenant Software as a Service: Application Development Approach Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1, Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed

More information

Abstract. Keywords. 1. Introduction. Suhas Gajakosh 1,Mukta Takalikar 2

Abstract. Keywords. 1. Introduction. Suhas Gajakosh 1,Mukta Takalikar 2 Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1,Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed

More information

Research Article A MULTI-TENANT WEB APPLICATION FRAMEWORK FOR SOFTWARE AS A SERVICE (SAAS)

Research Article   A MULTI-TENANT WEB APPLICATION FRAMEWORK FOR SOFTWARE AS A SERVICE (SAAS) ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com A MULTI-TENANT WEB APPLICATION FRAMEWORK FOR SOFTWARE AS A SERVICE (SAAS) 1 Naveen.M.J, 2 Dr.Muthukumar.B Department-MCA,

More information

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,

More information

Proxy Service for Multi-tenant Database Access

Proxy Service for Multi-tenant Database Access Proxy Service for Multi-tenant Database Access Haitham Yaish 1,2, Madhu Goyal 1,2, and George Feuerlicht 2,3 1 Centre for Quantum Computation & Intelligent Systems 2 Faculty of Engineering and Information

More information

A Multi-Tenant Web Application Framework for Software as a Service (SAAS)

A Multi-Tenant Web Application Framework for Software as a Service (SAAS) European Journal of Applied Sciences 8 (4): 251-256, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.4.22981 A Multi-Tenant Web Application Framework for Software as a Service

More information

A NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS

A NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS A NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS Haitham Yaish, Madhu Goyal and George Feuerlicht 1,2 1 Faculty of Engineering and Information Technology, University of Technology,

More information

Building Multi-tenant Applications with Pervasive PSQL

Building Multi-tenant Applications with Pervasive PSQL Building Multi-tenant Applications with Pervasive PSQL Pervasive PSQL White Paper August 2012 This white paper is the first in a series of three designed to show how easily Pervasive PSQL can provide all

More information

A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform

A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform Sungjoo Kang 1, Sungwon Kang 2, Sungjin Hur 1 Software Service Research Team, Electronics and Telecommunications Research

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Proxy Service for Multi-tenant Database Access

Proxy Service for Multi-tenant Database Access Proxy Service for Multi-tenant Database Access Haitham Yaish, Madhu Goyal, George Feuerlicht To cite this version: Haitham Yaish, Madhu Goyal, George Feuerlicht. Proxy Service for Multi-tenant Database

More information

A Multi-Tenant Framework for Multimedia Conference System

A Multi-Tenant Framework for Multimedia Conference System 2013 8th International Conference on Communications and Networking in China (CHINACOM) A Multi-Tenant Framework for Multimedia Conference System Wang Shaofeng,Shang Yanlei,Tian Yue The State Key Lab of

More information

Database Design on Construction Project Cost System Nannan Zhang1,a, Wenfeng Song2,b

Database Design on Construction Project Cost System Nannan Zhang1,a, Wenfeng Song2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) Database Design on Construction Project Cost System Nannan Zhang1,a, Wenfeng Song2,b 1 School

More information

IJSER. Gayake, Prof.R.L.Paikrao

IJSER. Gayake, Prof.R.L.Paikrao Volume 7, Issue 1, January-2016 1269 Integration of Databases with Cloud Enviornment Anuradha Gayake, Prof.R.L.Paikrao Abstract Cloud computing mainly concern, shared or distributed computing, networking,

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

1. Introduction. 2. Technology concepts

1. Introduction. 2. Technology concepts 1 Table of Contents 1. Introduction...2 2. Technology Concepts...3 2.1. Sharding...4 2.2. Service Oriented Data Architecture...4 2.3. Aspect Oriented Programming...4 3. Technology/Platform-Specific Features...5

More information

PPKM: Preserving Privacy in Knowledge Management

PPKM: Preserving Privacy in Knowledge Management PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com

More information

An Introduction to Big Data Formats

An Introduction to Big Data Formats Introduction to Big Data Formats 1 An Introduction to Big Data Formats Understanding Avro, Parquet, and ORC WHITE PAPER Introduction to Big Data Formats 2 TABLE OF TABLE OF CONTENTS CONTENTS INTRODUCTION

More information

SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS

SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS WHITE PAPER SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS This white paper describes, from a storage vendor perspective, the major differences between Software Defined Storage and traditional SAN

More information

Securing the Cloud Today: How do we get there?

Securing the Cloud Today: How do we get there? Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,

More information

LivePoplet: Technology That Enables Mashup of Existing Applications

LivePoplet: Technology That Enables Mashup of Existing Applications LivePoplet: Technology That Enables Mashup of Existing Applications Akihiko Matsuo Kenji Oki Akio Shimono (Manuscript received January 29, 2009) We have developed LivePoplet, a technology that allows the

More information

Software as a Service Multi-tenant Data Architecture. Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation

Software as a Service Multi-tenant Data Architecture. Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation Software as a Service Multi-tenant Data Architecture Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation Agenda SIMT principles and considerations Database options for storing multi-tenant

More information

Cloud Computing An IT Paradigm Changer

Cloud Computing An IT Paradigm Changer Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App

More information

Application Multi-Tenancy for Software as a Service

Application Multi-Tenancy for Software as a Service ACM SIGSOFT Software Engineering Notes Page 1 March 2015 Volume 40 Number 2 Application Multi-Tenancy for Software as a Service Sanjukta Pal Department of Computer Applications National Institute of Technology,

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM *

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM * Journal of Contemporary Issues in Business Research ISSN 2305-8277 (Online), 2012, Vol. 1, No. 2, 42-56. Copyright of the Academic Journals JCIBR All rights reserved. IMPLEMENTATION OF INFORMATION RETRIEVAL

More information

BRINGING CLARITY TO THE CLOUD

BRINGING CLARITY TO THE CLOUD BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that

More information

BigDataBench-MT: Multi-tenancy version of BigDataBench

BigDataBench-MT: Multi-tenancy version of BigDataBench BigDataBench-MT: Multi-tenancy version of BigDataBench Gang Lu Beijing Academy of Frontier Science and Technology BigDataBench Tutorial, ASPLOS 2016 Atlanta, GA, USA n Software perspective Multi-tenancy

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo. CA ERwin Data Modeler s Role in the Relational Cloud Nuccio Piscopo Table of Contents Abstract.....3 Introduction........3 Daas requirements through CA ERwin Data Modeler..3 CA ERwin in the Relational

More information

V Conclusions. V.1 Related work

V Conclusions. V.1 Related work V Conclusions V.1 Related work Even though MapReduce appears to be constructed specifically for performing group-by aggregations, there are also many interesting research work being done on studying critical

More information

Multi Agent System-Based on Case Based Reasoning for Cloud Computing System

Multi Agent System-Based on Case Based Reasoning for Cloud Computing System Multi Agent System-Based on Case Based Reasoning for Cloud Computing System Amir Mohamed Talib 1 and Nour Eldin Mohamed Elshaiekh 2 1 Faculty of Computer and Information Science, Information Technology

More information

The Value of Force.com as a GRC Platform

The Value of Force.com as a GRC Platform The Value of Force.com as a GRC Platform Andy Evans - Xactium Limited March 2009 Executive Summary The importance of governance, risk and compliance (GRC) activities to organizations has become increasingly

More information

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Lou Topfl Director, New Technology Product Development Engineering AT&T Agenda What is the Cloud? Types of Cloud

More information

Introduction to Oracle

Introduction to Oracle Class Note: Chapter 1 Introduction to Oracle (Updated May 10, 2016) [The class note is the typical material I would prepare for my face-to-face class. Since this is an Internet based class, I am sharing

More information

Implementing a Storage Pattern in the OR Mapping Framework

Implementing a Storage Pattern in the OR Mapping Framework , pp.29-38 http://dx.doi.org/10.14257/ijgdc.2013.6.5.03 Implementing a Storage Pattern in the OR Mapping Framework Muhammad Naeem Ahmed Khan, Arsalan Shahid and Sarah Shafqat Shaheed Zulfikar Ali Bhutto

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

CHEM-E Process Automation and Information Systems: Applications

CHEM-E Process Automation and Information Systems: Applications CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

Database Assessment for PDMS

Database Assessment for PDMS Database Assessment for PDMS Abhishek Gaurav, Nayden Markatchev, Philip Rizk and Rob Simmonds Grid Research Centre, University of Calgary. http://grid.ucalgary.ca 1 Introduction This document describes

More information

Genomics on Cisco Metacloud + SwiftStack

Genomics on Cisco Metacloud + SwiftStack Genomics on Cisco Metacloud + SwiftStack Technology is a large component of driving discovery in both research and providing timely answers for clinical treatments. Advances in genomic sequencing have

More information

Rocky Mountain Technology Ventures

Rocky Mountain Technology Ventures Rocky Mountain Technology Ventures Comparing and Contrasting Online Analytical Processing (OLAP) and Online Transactional Processing (OLTP) Architectures 3/19/2006 Introduction One of the most important

More information

Personal Grid. 1 Introduction. Zhiwei Xu, Lijuan Xiao, and Xingwu Liu

Personal Grid. 1 Introduction. Zhiwei Xu, Lijuan Xiao, and Xingwu Liu Personal Grid Zhiwei Xu, Lijuan Xiao, and Xingwu Liu Institute of Computing Technology, Chinese Academy of Sciences 100080 Beijing, China Abstract. A long-term trend in computing platform innovation is

More information

Introduction to Computer Science and Business

Introduction to Computer Science and Business Introduction to Computer Science and Business This is the second portion of the Database Design and Programming with SQL course. In this portion, students implement their database design by creating a

More information

DISTRIBUTED DATABASE OPTIMIZATIONS WITH NoSQL MEMBERS

DISTRIBUTED DATABASE OPTIMIZATIONS WITH NoSQL MEMBERS U.P.B. Sci. Bull., Series C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 DISTRIBUTED DATABASE OPTIMIZATIONS WITH NoSQL MEMBERS George Dan POPA 1 Distributed database complexity, as well as wide usability area,

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Data Warehousing 11g Essentials

Data Warehousing 11g Essentials Oracle 1z0-515 Data Warehousing 11g Essentials Version: 6.0 QUESTION NO: 1 Indentify the true statement about REF partitions. A. REF partitions have no impact on partition-wise joins. B. Changes to partitioning

More information

Efficient, Scalable, and Provenance-Aware Management of Linked Data

Efficient, Scalable, and Provenance-Aware Management of Linked Data Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization

More information

EXAM Microsoft Database Fundamentals. Buy Full Product.

EXAM Microsoft Database Fundamentals. Buy Full Product. Microsoft EXAM - 98-364 Microsoft Database Fundamentals Buy Full Product http://www.examskey.com/98-364.html Examskey Microsoft 98-364 exam demo product is here for you to test the quality of the product.

More information

Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati

Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering

More information

A Review Of Multi-Tenant Database And Factors That Influence Its Adoption.

A Review Of Multi-Tenant Database And Factors That Influence Its Adoption. Association for Information Systems AIS Electronic Library (AISeL) UK Academy for Information Systems Conference Proceedings 2014 UK Academy for Information Systems Spring 4-9-2014 A Review Of Multi-Tenant

More information

Survey of Oracle Database

Survey of Oracle Database Survey of Oracle Database About Oracle: Oracle Corporation is the largest software company whose primary business is database products. Oracle database (Oracle DB) is a relational database management system

More information

Survey on Incremental MapReduce for Data Mining

Survey on Incremental MapReduce for Data Mining Survey on Incremental MapReduce for Data Mining Trupti M. Shinde 1, Prof.S.V.Chobe 2 1 Research Scholar, Computer Engineering Dept., Dr. D. Y. Patil Institute of Engineering &Technology, 2 Associate Professor,

More information

Cloud Computing Concepts, Models, and Terminology

Cloud Computing Concepts, Models, and Terminology Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and

More information

Global Journal of Engineering Science and Research Management

Global Journal of Engineering Science and Research Management CONFIGURATION FILE RECOMMENDATIONS USING METADATA AND FUZZY TECHNIQUE Gnanamani.H*, Mr. C.V. Shanmuka Swamy * PG Student Department of Computer Science Shridevi Institute Of Engineering and Technology

More information

Multi-tenancy version of BigDataBench

Multi-tenancy version of BigDataBench Multi-tenancy version of BigDataBench Gang Lu Institute of Computing Technology, Chinese Academy of Sciences BigDataBench Tutorial MICRO 2014 Cambridge, UK INSTITUTE OF COMPUTING TECHNOLOGY 1 Multi-tenancy

More information

Alternative Approaches for Deduplication in Cloud Storage Environment

Alternative Approaches for Deduplication in Cloud Storage Environment International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 10 (2017), pp. 2357-2363 Research India Publications http://www.ripublication.com Alternative Approaches for

More information

Semantics, Metadata and Identifying Master Data

Semantics, Metadata and Identifying Master Data Semantics, Metadata and Identifying Master Data A DataFlux White Paper Prepared by: David Loshin, President, Knowledge Integrity, Inc. Once you have determined that your organization can achieve the benefits

More information

Cloud Computing Introduction & Offerings from IBM

Cloud Computing Introduction & Offerings from IBM Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?

More information

Licensing Guide for Partners

Licensing Guide for Partners Microsoft PowerApps & Microsoft Flow Licensing Guide for Partners November 2016 The Microsoft PowerApps & Flow Licensing Guide November 2016 Contents Introduction to Microsoft PowerApps & Microsoft Flow...

More information

Security Models for Cloud

Security Models for Cloud Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer

More information

EXAM - CL CompTIA Cloud Essentials Exam. Buy Full Product.

EXAM - CL CompTIA Cloud Essentials Exam. Buy Full Product. CompTIA EXAM - CL0-001 CompTIA Cloud Essentials Exam Buy Full Product http://www.examskey.com/cl0-001.html Examskey CompTIA CL0-001 exam demo product is here for you to test the quality of the product.

More information

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 A Real Time GIS Approximation Approach for Multiphase

More information

How to Select the Right Marketing Cloud Edition

How to Select the Right Marketing Cloud Edition How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire

More information

Faculté Polytechnique

Faculté Polytechnique Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and

More information

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate

More information

Michel Ruffin Software coordination manager

Michel Ruffin Software coordination manager STANDARDIZING THE FOSS GOVERNANCE PROCESSES Michel Ruffin Software coordination manager December 2013 STANDARDIZING THE FOSS GOVERNANCE PROCESSES Background The use of Free and/or Open Source Software

More information

IBM DB2 UDB V7.1 Family Fundamentals.

IBM DB2 UDB V7.1 Family Fundamentals. IBM 000-512 DB2 UDB V7.1 Family Fundamentals http://killexams.com/exam-detail/000-512 Answer: E QUESTION: 98 Given the following: A table containing a list of all seats on an airplane. A seat consists

More information

A Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS)

A Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS) A Proposed Framework for Mobile Cloud Based Applications Using Mobile as a Service (MTaaS) Engr. Ali Ahmed Computer & Software Engineering Department Bahria University, Karachi Campus Karachi, Pakistan

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

Native Support of Multi-tenancy in RDBMS for Software as a Service

Native Support of Multi-tenancy in RDBMS for Software as a Service Native Support of Multi-tenancy in RDBMS for Software as a Service Oliver Schiller Benjamin Schiller Andreas Brodt Bernhard Mitschang Applications of Parallel and Distributed Systems Universität Stuttgart

More information

XML in the bipharmaceutical

XML in the bipharmaceutical XML in the bipharmaceutical sector XML holds out the opportunity to integrate data across both the enterprise and the network of biopharmaceutical alliances - with little technological dislocation and

More information

International Jmynal of Intellectual Advancements and Research in Engineering Computations

International Jmynal of Intellectual Advancements and Research in Engineering Computations www.ijiarec.com ISSN:2348-2079 DEC-2015 International Jmynal of Intellectual Advancements and Research in Engineering Computations VIRTUALIZATION OF DISTIRIBUTED DATABASES USING XML 1 M.Ramu ABSTRACT Objective

More information

An Oracle White Paper April 2010

An Oracle White Paper April 2010 An Oracle White Paper April 2010 In October 2009, NEC Corporation ( NEC ) established development guidelines and a roadmap for IT platform products to realize a next-generation IT infrastructures suited

More information

Directory Structure and File Allocation Methods

Directory Structure and File Allocation Methods ISSN:0975-9646 Mandeep Kaur et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 2016, 577-582 Directory Structure and ile Allocation Methods Mandeep Kaur,

More information

Cloud Computing Overview. The Business and Technology Impact. October 2013

Cloud Computing Overview. The Business and Technology Impact. October 2013 Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Storage Networking Strategy for the Next Five Years

Storage Networking Strategy for the Next Five Years White Paper Storage Networking Strategy for the Next Five Years 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Top considerations for storage

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Evaluation Guide for ASP.NET Web CMS and Experience Platforms

Evaluation Guide for ASP.NET Web CMS and Experience Platforms Evaluation Guide for ASP.NET Web CMS and Experience Platforms CONTENTS Introduction....................... 1 4 Key Differences...2 Architecture:...2 Development Model...3 Content:...4 Database:...4 Bonus:

More information

The future of database technology is in the clouds

The future of database technology is in the clouds Database.com Getting Started Series White Paper The future of database technology is in the clouds WHITE PAPER 0 Contents OVERVIEW... 1 CLOUD COMPUTING ARRIVES... 1 THE FUTURE OF ON-PREMISES DATABASE SYSTEMS:

More information

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared

More information

Delivering Complex Enterprise Applications via Hybrid Clouds

Delivering Complex Enterprise Applications via Hybrid Clouds Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked

More information

An Interactive Web based Expert System Degree Planner

An Interactive Web based Expert System Degree Planner An Interactive Web based Expert System Degree Planner Neil Dunstan School of Science and Technology University of New England Australia ph: +61 2 67732350 fax: +61 2 67735011 neil@cs.une.edu.au ABSTRACT

More information

Building Self-Service BI Solutions with Power Query. Written By: Devin

Building Self-Service BI Solutions with Power Query. Written By: Devin Building Self-Service BI Solutions with Power Query Written By: Devin Knight DKnight@PragmaticWorks.com @Knight_Devin CONTENTS PAGE 3 PAGE 4 PAGE 5 PAGE 6 PAGE 7 PAGE 8 PAGE 9 PAGE 11 PAGE 17 PAGE 20 PAGE

More information

Integrated Security Context Management of Web Components and Services in Federated Identity Environments

Integrated Security Context Management of Web Components and Services in Federated Identity Environments Integrated Security Context Management of Web Components and Services in Federated Identity Environments Apurva Kumar IBM India Research Lab. 4, Block C Vasant Kunj Institutional Area, New Delhi, India-110070

More information

Introduction to Information Systems

Introduction to Information Systems Table of Contents 1... 2 1.1 Introduction... 2 1.2 Architecture of Information systems... 2 1.3 Classification of Data Models... 4 1.4 Relational Data Model (Overview)... 8 1.5 Conclusion... 12 1 1.1 Introduction

More information

Part 1: Indexes for Big Data

Part 1: Indexes for Big Data JethroData Making Interactive BI for Big Data a Reality Technical White Paper This white paper explains how JethroData can help you achieve a truly interactive interactive response time for BI on big data,

More information

[This is not an article, chapter, of conference paper!]

[This is not an article, chapter, of conference paper!] http://www.diva-portal.org [This is not an article, chapter, of conference paper!] Performance Comparison between Scaling of Virtual Machines and Containers using Cassandra NoSQL Database Sogand Shirinbab,

More information

RACKSPACE ONMETAL I/O V2 OUTPERFORMS AMAZON EC2 BY UP TO 2X IN BENCHMARK TESTING

RACKSPACE ONMETAL I/O V2 OUTPERFORMS AMAZON EC2 BY UP TO 2X IN BENCHMARK TESTING RACKSPACE ONMETAL I/O V2 OUTPERFORMS AMAZON EC2 BY UP TO 2X IN BENCHMARK TESTING EXECUTIVE SUMMARY Today, businesses are increasingly turning to cloud services for rapid deployment of apps and services.

More information

A Survey on Secure Sharing In Cloud Computing

A Survey on Secure Sharing In Cloud Computing A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing

More information

Lecture 1: January 22

Lecture 1: January 22 CMPSCI 677 Distributed and Operating Systems Spring 2018 Lecture 1: January 22 Lecturer: Prashant Shenoy Scribe: Bin Wang 1.1 Introduction to the course The lecture started by outlining the administrative

More information

A Benchmarking Criteria for the Evaluation of OLAP Tools

A Benchmarking Criteria for the Evaluation of OLAP Tools A Benchmarking Criteria for the Evaluation of OLAP Tools Fiaz Majeed Department of Information Technology, University of Gujrat, Gujrat, Pakistan. Email: fiaz.majeed@uog.edu.pk Abstract Generating queries

More information

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN STUDY ON CLOUD COMPUTING

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19,   ISSN STUDY ON CLOUD COMPUTING Omkumar R. Badhai, Shreya A. Deo, Snehal B.Satpute, Mansi Agrawal Department of Computer Engineering, Sipna College Of engineering and Technology, Amravati, Sant Gadge Baba Amravati University ABSTRACT:

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers

More information

IBM EXAM - C DB Fundamentals. Buy Full Product.

IBM EXAM - C DB Fundamentals. Buy Full Product. IBM EXAM - C2090-610 DB2 10.1 Fundamentals Buy Full Product http://www.examskey.com/c2090-610.html Examskey IBM C2090-610 exam demo product is here for you to test the quality of the product. This IBM

More information

Data Vault Brisbane User Group

Data Vault Brisbane User Group Data Vault Brisbane User Group 26-02-2013 Agenda Introductions A brief introduction to Data Vault Creating a Data Vault based Data Warehouse Comparisons with 3NF/Kimball When is it good for you? Examples

More information

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and

More information