Decentralized Control of Large-Scale Distributed System

Size: px
Start display at page:

Download "Decentralized Control of Large-Scale Distributed System"

Transcription

1 Decentralized Control of Large-Scale Distributed System Mario Südholt Département Informatique, Mines Nantes IMT Colloquium; March 26, 2014

2 Outline Large-scale software systems 1 Large-scale software systems 2 Improving distributed control in the Cloud The Discovery initiative Capacity planning Advanced choreographies for service compositions Protocols and distributed property enforcement Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 2 / 24

3 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24

4 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24

5 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24

6 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24

7 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24

8 Large-scale software systems Large-scale software systems Large-scale software systems (we are interested in) The Web The Cloud Major questions How are they built and coordinated? New architectures and implementation mechanisms? How to ensure availability, correctness and security? Handle cross-domain functionalities (across technical and policy domains) Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 4 / 24

9 The Web Large-scale software systems Basic model: distributed coordination of services Loose coupling (Some) Well-defined, standardized interfaces REST interfaces Centralization often arises: popular services, service orchestration... Correctness, security Standards, protocols for low-level properties But: frequent violation of high-level properties Ex.: social cross-site forgery (S-CSRF) attacks Support for distributed property enforcement? Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 5 / 24

10 The Cloud Large-scale software systems Mutualize resources required by many users Many types Public (Cloudwatt, Numergy, Amazon, Google, Microsoft,...) Private, community, hybrid clouds Different service levels: IaaS, PaaS, SaaS Homogeneous environment Hardware: datacenters (up to hundreds of thousands of servers) Software: virtual environments Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 6 / 24

11 Cloud federations Large-scale software systems Mutualize resources among one or several providers Scale cloud services over geographic regions Significant centralization Problems Availability Connectivity Energy consumption ("ice clouds") Legal issues (data privacy) Alice Duke Paula Users energy footprint Bob Internet backbone Tom Dan Rob Charles Sam Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 7 / 24

12 Large-scale software systems Issues with centralized control Recap: centralized control in large-scale infrastructures Cloud: significant centralization Web: access to special servers, service orchestration Scaling issues, legal issues Issues on the system architecture level Ex.: datacenters at the edge of the backbone Implementation-level issues Ex.: centralized capacity planning in datacenters Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 8 / 24

13 Outline Improving distributed control in the Cloud 1 Large-scale software systems 2 Improving distributed control in the Cloud The Discovery initiative Capacity planning Advanced choreographies for service compositions Protocols and distributed property enforcement Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 9 / 24

14 Improving distributed control in the Cloud The Discovery initiative 1. The Discovery initiative: architecture A new architectural principle: from federated clouds... Bob Dan Alice Charles Duke Internet backbone Sam Paula Users energy footprint Tom Rob Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 10 / 24

15 DISCOVERY Network DISCOVERY Network DISCOVERY Network DISCOVERY Network DISCOVERY Network Improving distributed control in the Cloud The Discovery initiative 1. The Discovery initiative: architecture A new architectural principle:...to cooperative clouds Bob Dan Alice Charles Duke DISCOVERY Network DISCOVERY Network Sam - - Paula Users energy footprint Tom Rob Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 10 / 24

16 Improving distributed control in the Cloud Main characteristics The Discovery initiative Cooperative and autonomous management of virtual environments Manipulate virtual environments like processes in traditional OSes Localization of data and computations Key to efficiency and sustainability Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 11 / 24

17 Improving distributed control in the Cloud The Discovery initiative Locality in backbones (ex. Renater) Network state on 17 May 13 Underutilized links Redundancy Evolves in terms of points-of-presence (PoP) Potential for "close" Clouds Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 12 / 24

18 Improving distributed control in the Cloud The Discovery initiative Distributed cooperative clouds (ex. Renater) 12 A.Le bre et al. Close deployment to network infrastructure hal , version 1-26 Aug 2013 Extend network hubs with servers Dedicated to VM hosting Proportional to PoP s size Mario Südholt (IMT, Mines Nantes) Figure 2: Overlay local groups on top of the RENATER platform. in terms of number of bridge nodes to go through. Hence, the system will be able to route quickly between close groups. The routing of requests between far groups will be based on a random decision when no information are available, but oriented by the aim of going away from the request s source. This overlay will provide the basic building block of the platform, on which will which 26/3/14 are described in13 the/ 24 Decentralized control...rely higher level overlays and functionalities, IMT Coll.,

19 Improving distributed control in the Cloud Capacity planning 2. Capacity planning: virtual machines Virtual machines: software emulation of a computer Advantages Isolation Snapshotting Suspend/resume Fast live migration in a datacenter Downtime: ca. 60ms But: migration plans for large sets of VMs are costly Crucial for handling over-/underutilization Migration across datacenters? Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 14 / 24

20 VM scheduling Improving distributed control in the Cloud Capacity planning Objective: autonomously manage millions of VMs on tens of thousands of machines Limitations of current approaches because of centralization Reactivity and scalability Fault-tolerance (single point of failure) Service node Worker node Communication between nodes 1. Monitoring 3. Applying schedule 2. Computing schedule Discovery also needs new VM scheduling strategy Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 15 / 24

21 Improving distributed control in the Cloud Distributed VM scheduling Capacity planning DVMS alg.: first fully decentralized algorithm Nodes have a local view of the system Cooperation between direct neighbors to solve scheduling events Validation [Quesnel et al.: CCPE 12]} In vivo (on Grid5000): ca. 500 physical machines, 4500 VMs Simulation (using Simgrid): ca. 10K PMs, 80K VMs Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 16 / 24

22 Improving distributed control in the Cloud Advanced choreographies for service compositions 3. Management of service compositions Service compositions (e.g., for business processes) Composition programs (not manageable on large-scale) Declarative definitions: orchestrations, choreographies Service orchestration (e.g., using BPEL) Central chef d orchestra Subject to scalability issues (availability, lack of autonomy,...) S B:Item Service choreography No central orchestrator Correct implementation? Properties? B S:Sale B C:Purchase Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 17 / 24

23 Improving distributed control in the Cloud Advanced choreographies for service compositions Service choreographies with session types Session types: type-based fully distributed choreographies Global types define an interaction as a whole Projection: compilation to correct decentralized implementation Guarantee correctness properties No messages send at wrong times to wrong receiver No deadlocks From 1998 (researchers from Imperial College L., U Lisbon) Multi-party session types [POPL 08] Session-types with roles [POPL 12] Extension by security properties [Concur 12] Problems Forbidden functionalities: no race conditions Extensive rewrites for adding functionalities Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 18 / 24

24 Improving distributed control in the Cloud Aspectual session types Advanced choreographies for service compositions Extension [Tabareau et al.: Modularity 14] Larger set of functionalities (admit some race conditions) Simple and declarative adding B S:* + B C:* S B:Item + S B:Item proceed B S:* + B C:* B A:Auth A B:Retry B S:Sale B C:Purchase + + C B:Counter B C:Offer proceed + A B:Ok B L:LogData proceed a) Trade session b) Negotiation aspect c) Logging aspect d) Authentication aspect Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 19 / 24

25 1. Display UA Improving distributed control in the Cloud 4. Protocol adaptation Protocols and distributed property enforcement Ex. OAuth 2.0 Framework for the authorization of resource accesses Access by third parties without original credentials Used by all major Web, Cloud and software editors companies Facebook, Google, Microsoft, SAP... Third-Party Client (TC) User Agent (UA) 5. Grant Access 2. Fill authentication credential 4. Grant Access 3. Request Access Alice OAuth 2.0 Provider (OP) Main OAuth protocol flow Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 20 / 24

26 1. Display UA 11. Alice's Authz Code Improving distributed control in the Cloud OAuth single sign-on attacks Protocols and distributed property enforcement Use access token to access data Cloud Storage/ Identity Server (RS) Third-Party App (TA) 5. Alice's Authz Code 2. Fill authentication credential Alice Holds Alice's Authz Code from TA Chuck Initially already authenticated 7. Fill authentication credential 10. Rewrite Chuck's Authz Code with Alice's Authz Code Another Third-Party App (ATA) 6. Display UA User Agent (UA) 3. Request Access OAuth 2.0 Provider (OP) 8. Request Access User Agent (UA) 4. Alice's Authz Code 9. Chuck's Authz Code (a) Alice Authorization/Authentication with OAuth (b) Alice Session Swapping while OAuth Authentication New types of distributed attacks Single sign-on (SSO), social cross-site request forgery (S-CSRF) May involve one instance of an OAuth protocol May include several instances Problem: OAuth is a framework not a protocol Right usage has to be enforced Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 21 / 24

27 Improving distributed control in the Cloud Protocols and distributed property enforcement Distributed transformation of protocols Modifications to the protocol flows needed Dynamic modifications Over different steps/different instances of the protocols Over different levels of the software stack Ex.: session identification, state introduction Approach [Cherrueau et al.: CoudCom 13] Domain-specific framework/protocol transformation language Invasive but controled transformation of service compositions and implementations Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 22 / 24

28 Conclusion Improving distributed control in the Cloud Protocols and distributed property enforcement Centralized control (still) common and problematic Cloud architectures, capacity management, service orchestrations Discovery initiative for a cloud architecture Cooperative Clouds close to users Interest by large players: Renater, Orange... New distributed algorithms and tools for VM scheduling, service choreographies, protocol manipulations Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 23 / 24

29 Improving distributed control in the Cloud Thank you for your attention! Protocols and distributed property enforcement Questions? Further information: Ascola research team: Discovery initiative: (PI) Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 24 / 24

Eventuation properties and interaction contracts

Eventuation properties and interaction contracts Eventuation properties and interaction contracts Mario Südholt Ascola research team; Mines Nantes, Inria, Lina SCRIPT WS Vrije Universiteit Brussel, 12 Nov. 2013 Motivation 1 Motivation 2 Generalizing

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 20 - Tuesday November 23 2010. SOA Service-oriented

More information

Faculté Polytechnique

Faculté Polytechnique Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and

More information

Cloud I - Introduction

Cloud I - Introduction Cloud I - Introduction Chesapeake Node.js User Group (CNUG) https://www.meetup.com/chesapeake-region-nodejs-developers-group START BUILDING: CALLFORCODE.ORG 3 Agenda Cloud Offerings ( Cloud 1.0 ) Infrastructure

More information

CSE 5306 Distributed Systems. Course Introduction

CSE 5306 Distributed Systems. Course Introduction CSE 5306 Distributed Systems Course Introduction 1 Instructor and TA Dr. Donggang Liu @ CSE Web: http://ranger.uta.edu/~dliu Email: dliu@uta.edu Phone: 817-2720741 Office: ERB 555 Office hours: Tus/Ths

More information

Securing Cloud Computing

Securing Cloud Computing Securing Cloud Computing NLIT Summit, May 2018 PRESENTED BY Jeffrey E. Forster jeforst@sandia.gov Lucille Forster lforste@sandia.gov Sandia National Laboratories is a multimission laboratory managed and

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Module Day Topic. 1 Definition of Cloud Computing and its Basics Module Day Topic 1 Definition of Cloud Computing and its Basics 1 2 3 1. How does cloud computing provides on-demand functionality? 2. What is the difference between scalability and elasticity? 3. What

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors

More information

UMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group

UMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group UMA and Dynamic Client Registration Thomas Hardjono on behalf of the UMA Work Group 1 UMA is... A web protocol that lets you control authorization of data sharing and service access made on your behalf

More information

Securely Access Services Over AWS PrivateLink. January 2019

Securely Access Services Over AWS PrivateLink. January 2019 Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date

More information

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.

More information

Standards-based Secure Signon for Cloud and Native Mobile Agents

Standards-based Secure Signon for Cloud and Native Mobile Agents Standards-based Secure Signon for Cloud and Native Mobile Agents P. Dingle July 2013 1 Mobile http://www.flickr.com/photos/nataliejohnson/2776045330 2 http://www.flickr.com/photos/soo/5525383948 Mobile

More information

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

Real-world security analyses of OAuth 2.0 and OpenID Connect

Real-world security analyses of OAuth 2.0 and OpenID Connect Real-world security analyses of OAuth 2.0 and OpenID Connect Wanpeng Li and Chris J Mitchell 1 Agenda Single sign-on and identity management OAuth 2.0 Two case studies Security analyses OpenID Connect

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course details Course Outline Module 1: Introduction to Azure This module explains cloud computing, and compares cloud computing and

More information

Course Outline. Lesson 2, Azure Portals, describes the two current portals that are available for managing Azure subscriptions and services.

Course Outline. Lesson 2, Azure Portals, describes the two current portals that are available for managing Azure subscriptions and services. Course Outline Module 1: Overview of the Microsoft Azure Platform Microsoft Azure provides a collection of services that you can use as building blocks for your cloud applications. Lesson 1, Azure Services,

More information

Cloud Computing Lecture 4

Cloud Computing Lecture 4 Cloud Computing Lecture 4 1/17/2012 What is Hypervisor in Cloud Computing and its types? The hypervisor is a virtual machine monitor (VMM) that manages resources for virtual machines. The name hypervisor

More information

Online Editor for Compiling and Executing Different Languages Source Code

Online Editor for Compiling and Executing Different Languages Source Code Online Editor for Compiling and Executing Different Languages Source Code Ratnadip Kawale 1, Pooja Soni 2,Gaurav Suryawanshi 3 & Prof.Pradip Balbudhe 4 1 VIII Sem, B.E,.CE,Suryodaya College of Engg. &

More information

Understanding Cloud Migration. Ruth Wilson, Data Center Services Executive

Understanding Cloud Migration. Ruth Wilson, Data Center Services Executive Understanding Cloud Migration Ruth Wilson, Data Center Services Executive rhwilson@us.ibm.com Migrating to a Cloud is similar to migrating data and applications between data centers with a few key differences

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

Industry-leading Application PaaS Platform

Industry-leading Application PaaS Platform Industry-leading Application PaaS Platform Solutions Transactional Apps Digital Marketing LoB App Modernization Services Web Apps Web App for Containers API Apps Mobile Apps IDE Enterprise Integration

More information

Lecture 9: MIMD Architecture

Lecture 9: MIMD Architecture Lecture 9: MIMD Architecture Introduction and classification Symmetric multiprocessors NUMA architecture Cluster machines Zebo Peng, IDA, LiTH 1 Introduction MIMD: a set of general purpose processors is

More information

DEEP DIVE INTO CLOUD COMPUTING

DEEP DIVE INTO CLOUD COMPUTING International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai

More information

CS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following:

CS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following: CS 470 Spring 2018 Mike Lam, Professor Virtualization and Cloud Computing Content taken from the following: A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, 9 th Edition (Chapter

More information

The intelligence of hyper-converged infrastructure. Your Right Mix Solution

The intelligence of hyper-converged infrastructure. Your Right Mix Solution The intelligence of hyper-converged infrastructure Your Right Mix Solution Applications fuel the idea economy SLA s, SLA s, SLA s Regulations Latency Performance Integration Disaster tolerance Reliability

More information

METADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS

METADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS METADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS ACK CYFRONET AGH, Kraków, Poland AGH University of Science and Technology, Kraków, Poland Faculty of Computer Science, Electronics

More information

Cloud Computing Context. Image: T. Sridhar

Cloud Computing Context. Image: T. Sridhar Introduction to Cloud Computing Sunland Springs Village Computer Club March 2 nd, 2016 Mesa, AZ Presented and edited by Bob Samson, Faculty - Mesa Community College Cloud Computing We will be discussing:

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Distributing OpenStack on top of a Key/Value store

Distributing OpenStack on top of a Key/Value store Distributing OpenStack on top of a Key/Value store Jonathan Pastor (Inria, Ascola, Ecole des Mines de Nantes) PhD candidate, under the supervision of Adrien Lebre and Frédéric Desprez Journée Cloud 2015

More information

Developing Microsoft Azure Solutions: Course Agenda

Developing Microsoft Azure Solutions: Course Agenda Developing Microsoft Azure Solutions: 70-532 Course Agenda Module 1: Overview of the Microsoft Azure Platform Microsoft Azure provides a collection of services that you can use as building blocks for your

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

1/10/2011. Topics. What is the Cloud? Cloud Computing

1/10/2011. Topics. What is the Cloud? Cloud Computing Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Course Outline. Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led

Course Outline. Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led About this course This course is intended for students who have experience building ASP.NET and C# applications. Students will

More information

Developing Microsoft Azure Solutions (MS 20532)

Developing Microsoft Azure Solutions (MS 20532) Developing Microsoft Azure Solutions (MS 20532) COURSE OVERVIEW: This course is intended for students who have experience building ASP.NET and C# applications. Students will also have experience with the

More information

70-532: Developing Microsoft Azure Solutions

70-532: Developing Microsoft Azure Solutions 70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.

More information

Picocenter: Supporting long-lived, mostly-idle applications in cloud environments

Picocenter: Supporting long-lived, mostly-idle applications in cloud environments Picocenter: Supporting long-lived, mostly-idle applications in cloud environments Liang Zhang* James Litton Frank Cangialosi Theophilus Benson Dave Levin Alan Mislove* *Northeastern University University

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

User-Managed Access (UMA)

User-Managed Access (UMA) User-Managed Access (UMA) Joni Brennan, Kantara Managing Director Eve Maler, PayPal, UMA WG chair ITU-T Q10/17 Identity Summit 10 December 2010 (feel free to send questions to @xmlgrrl) 1 Privacy is not

More information

Large Scale Computing Infrastructures

Large Scale Computing Infrastructures GC3: Grid Computing Competence Center Large Scale Computing Infrastructures Lecture 2: Cloud technologies Sergio Maffioletti GC3: Grid Computing Competence Center, University

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Securing Your Cloud Introduction Presentation

Securing Your Cloud Introduction Presentation Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today

More information

COMP6511A: Large-Scale Distributed Systems. Windows Azure. Lin Gu. Hong Kong University of Science and Technology Spring, 2014

COMP6511A: Large-Scale Distributed Systems. Windows Azure. Lin Gu. Hong Kong University of Science and Technology Spring, 2014 COMP6511A: Large-Scale Distributed Systems Windows Azure Lin Gu Hong Kong University of Science and Technology Spring, 2014 Cloud Systems Infrastructure as a (IaaS): basic compute and storage resources

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Data Centers and Cloud Computing. Slides courtesy of Tim Wood Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings EXPERTS LIVE SUMMER NIGHT Close your datacenter and give your users-wings Stefan van der Wiele Robbert van der Zwan TSP EMS Blackbelt TSP EMS Netherlands EXPERTS LIVE SUMMER NIGHT Stefan van der Wiele

More information

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90

More information

Cloud Computing introduction

Cloud Computing introduction Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

RA-GRS, 130 replication support, ZRS, 130

RA-GRS, 130 replication support, ZRS, 130 Index A, B Agile approach advantages, 168 continuous software delivery, 167 definition, 167 disadvantages, 169 sprints, 167 168 Amazon Web Services (AWS) failure, 88 CloudTrail Service, 21 CloudWatch Service,

More information

Chapter 3 Virtualization Model for Cloud Computing Environment

Chapter 3 Virtualization Model for Cloud Computing Environment Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Distributed System. Gang Wu. Spring,2019

Distributed System. Gang Wu. Spring,2019 Distributed System Gang Wu Spring,2019 Computer Systems How a single computer works? (traditional single core system) Interrupt User-level System-level Operating System How a distributed system works?

More information

CHEM-E Process Automation and Information Systems: Applications

CHEM-E Process Automation and Information Systems: Applications CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison

More information

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES

More information

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model.

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. TEG Progress Update Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. Fulup Ar Foll Master Architect Sun Microsystems Fulup@sun.com 1 What is the

More information

Research Challenges in Cloud Computing

Research Challenges in Cloud Computing Research Challenges in Cloud Computing November 7th, 2016 Cloud Computing Consultation Orange Labs 1 Orange Restricted next big things for the digital future Big Data Internet of Things Cloud g g g 21

More information

Modeling & Simulation as a Service (M&SaaS)

Modeling & Simulation as a Service (M&SaaS) Modeling & Simulation as a Service (M&SaaS) NASA Phase II SBIR COTR: Michael Seablom PI: Mario Bulhoes Co-I: Curt Larock, Dabrien Murphy & Steven Armentrout Corporate Overview Parabon Computation, Inc.!

More information

5 reasons why choosing Apache Cassandra is planning for a multi-cloud future

5 reasons why choosing Apache Cassandra is planning for a multi-cloud future White Paper 5 reasons why choosing Apache Cassandra is planning for a multi-cloud future Abstract We have been hearing for several years now that multi-cloud deployment is something that is highly desirable,

More information

Transform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date

Transform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date Transform Your Business To An Open Hybrid Cloud Architecture Presenter Name Title Date Why You Need To Transform Your Business Public cloud performance setting new expectations for: IT speed, flexibility

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

RELIABILITY & AVAILABILITY IN THE CLOUD

RELIABILITY & AVAILABILITY IN THE CLOUD RELIABILITY & AVAILABILITY IN THE CLOUD A TWILIO PERSPECTIVE twilio.com To the leaders and engineers at Twilio, the cloud represents the promise of reliable, scalable infrastructure at a price that directly

More information

Network Services, Cloud Computing and Virtualization

Network Services, Cloud Computing and Virtualization Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor

More information

Transform to Your Cloud

Transform to Your Cloud Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to

More information

Load Balancing Algorithms in Cloud Computing: A Comparative Study

Load Balancing Algorithms in Cloud Computing: A Comparative Study Load Balancing Algorithms in Cloud Computing: A Comparative Study T. Deepa Dr. Dhanaraj Cheelu Ravindra College of Engineering for Women G. Pullaiah College of Engineering and Technology Kurnool Kurnool

More information

SaaS. Public Cloud. Co-located SaaS Containers. Cloud

SaaS. Public Cloud. Co-located SaaS Containers. Cloud SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers APP SERVICES ACCESS TLS/SSL DNS NETWORK WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES F5 Beside the Cloud Why Get Closer to

More information

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:

More information

The IBM Platform Computing HPC Cloud Service. Solution Overview

The IBM Platform Computing HPC Cloud Service. Solution Overview The IBM Platform Computing HPC Cloud Service Solution Overview Industry-leading workload management 20 years managing distributed scale-out systems with 2000+ customers in many industries High performance

More information

Mobile Cloud Computing

Mobile Cloud Computing MTAT.03.262 -Mobile Application Development Lecture 8 Mobile Cloud Computing Satish Srirama, Huber Flores satish.srirama@ut.ee Outline Cloud Computing Mobile Cloud Access schemes HomeAssignment3 10/20/2014

More information

5 OAuth EssEntiAls for APi AccEss control layer7.com

5 OAuth EssEntiAls for APi AccEss control layer7.com 5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the

More information

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology Securing Cloud Applications with a Distributed Web Application Firewall www.riverbed.com 2013 Riverbed Technology Primary Target of Attack Shifting from Networks and Infrastructure to Applications NETWORKS

More information

CPSC 426/526. Cloud Computing. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. Cloud Computing. Ennan Zhai. Computer Science Department Yale University CPSC 426/526 Cloud Computing Ennan Zhai Computer Science Department Yale University Recall: Lec-7 In the lec-7, I talked about: - P2P vs Enterprise control - Firewall - NATs - Software defined network

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention

More information

RED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect

RED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect RED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to Cloud Infrastructure CLOUD TYPES AND DEPLOYMENT

More information

The Post-Cloud. Where Google, DevOps, and Docker Converge

The Post-Cloud. Where Google, DevOps, and Docker Converge The Post-Cloud Where Google, DevOps, and Docker Converge About me Principal Architect, Intel Corporation DevOps, Telemetry, PaaS, Containers, Puppies Former: VMware EMC Nicholas Weaver nicholas.weaver@intel.com

More information

Development and Operations: Continuous Delivery in Practice

Development and Operations: Continuous Delivery in Practice Development and Operations: Continuous Delivery in Practice Dr. Julie Wagner Senior UX Researcher at Fujitsu EST Copyright 2016 FUJITSU LIMITED Enchantée Studied computer science in Aachen, Germany Majored

More information

Security and Compliance for Office 365

Security and Compliance for Office 365 Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world, you may be

More information

Cisco Container Platform

Cisco Container Platform Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click

More information

Lecture 9: MIMD Architectures

Lecture 9: MIMD Architectures Lecture 9: MIMD Architectures Introduction and classification Symmetric multiprocessors NUMA architecture Clusters Zebo Peng, IDA, LiTH 1 Introduction A set of general purpose processors is connected together.

More information

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Zabbix on a Clouds. Another approach to a building a fault-resilient, scalable monitoring platform

Zabbix on a Clouds. Another approach to a building a fault-resilient, scalable monitoring platform Zabbix on a Clouds Another approach to a building a fault-resilient, scalable monitoring platform Preface 00:20:00 We will be discussing a few topics on how you will deploy or migrate Zabbix monitoring

More information

Challenges in Authenticationand Identity Management

Challenges in Authenticationand Identity Management Sep 05 ISEC INFOSECURITY TOUR 2017 05.09.2017, Buenos Aires, Argentina Challenges in Authenticationand Identity Management CAMINANTE NO HAY CAMINO, SE HACE CAMINO AL ANDAR 2016 SecurIT Who is MerStar?

More information

FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention

FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy AT&T Labs Research, Bedminster,

More information

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065

More information

Lesson 14: Cloud Computing

Lesson 14: Cloud Computing Yang, Chaowei et al. (2011) 'Spatial cloud computing: how can the geospatial sciences use and help shape cloud computing?', International Journal of Digital Earth, 4: 4, 305 329 GEOG 482/582 : GIS Data

More information

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud

More information

2018 Edition. Security and Compliance for Office 365

2018 Edition. Security and Compliance for Office 365 2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

David Bernstein June 2012

David Bernstein June 2012 David Bernstein IEEE Cloud Standards P2300 Series Founder and Working Group Chair, European Commission FP7 einfrastructure Expert/Roadmap Group, U.S. National Institute of Standards, Cloud Computing Project

More information

OPENSTACK: THE OPEN CLOUD

OPENSTACK: THE OPEN CLOUD OPENSTACK: THE OPEN CLOUD Anuj Sehgal (s.anuj@jacobs-university.de) AIMS 2012 Labs 04 June 2012 1 Outline What is the cloud? Background Architecture OpenStack Nova OpenStack Glance 2 What is the Cloud?

More information

Microsoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled

Microsoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled Microsoft Azure Integration and Security Course Code: AZ-101; Duration: 4 days; Instructorled WHAT YOU WILL LEARN This course teaches IT professionals how to discover, assess, plan and implement a migration

More information

How to return control over user data back to the user The rethink framework

How to return control over user data back to the user The rethink framework How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon

More information