ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT
|
|
- Rosalyn Willis
- 6 years ago
- Views:
Transcription
1 ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT Maram Hassan AlAlwan Alalwan.maram@gmail.com Soha S. Zaghloul smekki@ksu.edu.sa College of Computer and Information Science Department of Computer Sciences Kind Saud University Riyadh, Saudi Arabia ABSTRACT Recently, cloud computing became a dominant field in the information technology world. It prevails over both academia and industry. Cloud Service Providers (CSP) provide many services such as storage, platform and applications. However, security is the most critical concern that impedes the dominance of cloud usage. Since Software as a Service (SaaS) security issues are under the end-user s control, it became more common than other cloud service models. In addition, its popularity comes from its remote delivery for the application functions over the Internet to subscribed users. Multi-tenancy is the main property of SaaS, it allows vendors to provide multiple requests and configurations through a single instance of the application. In this context, a customer is known as a "tenant". In the same way, a single database is shared amongst customers to store all tenants data: this is known as "multi-tenant database". This reduces operational and maintenance costs; offers more reliability. On the other hand, the occurrence of a problem affects all customers. The risk of leaking information is the most undesirable situation in this architecture. In addition, multi-tenant databases are the most suitable architecture for data mining: this may increase the income of CSPs. From tenants perspective, this approach lacks flexibility. This paper explores the different implementation approaches used in multi-tenant databases. It also provides an analytical study on each of the presented approaches. KEYWORDS Cloud; SaaS; Multi-tenancy; Multitenant database; Chunk Table. 1 INTRODUCTION In the traditional model of the software application, customers should buy the needed application and then install it on their local computer or data center. Today the cloud computing paradigm offers an alternative service model which is Software as a Service (SaaS). Accordingly, the application functions are delivered remotely over the Internet on subscription basis. In SaaS model, customers are not required to install, maintain or even manage the application; alternatively, the Cloud Service Provider (CSP) is responsible for these jobs. On the other hand, the IT departments in most organizations consume a lot of effort and money in developing and managing their applications. Since cloud computing reduces effort and cost, then most organizations tend to outsource their IT applications and devote themselves to other commercial competitions. Many SaaS applications are widely used in business such as Customer Relationship Management (CRM), Supplier Relationship Management (SRM), Business intelligence (BI) and Academic and administrative resources (multiple educational institutions are sharing the same database-space to collaborate and benefit from each other) [1], [2]. However, this model works only for specific applications whose behavior is well defined and universally accepted. The most important SaaS characteristic is multitenancy, where a single running instance of an application serves multiple requests from multiple customers, each customer is considered as a tenant. All tenants participate and use the same database to store their data. This leads us to use a multi-tenant database architecture [3]. The rest of the paper is organized as follows: Section 2 explores the different isolation degrees that might be used in creating multi-tenant data architecture. Various implementation approaches for multi-tenant database are presented in Section 3. Section 4 analyzes the implementation approaches presented in the previous section. Finally, Section 5 concludes the paper. ISBN: SDIWC 523
2 2 MULTI-TENANT DATABASE ARCHITECTURE Data is the most important asset for any business; it is also the heart of SaaS application. Therefore, the provision of a secure and efficient database architecture became one of the highest priorities for SaaS vendors. This is an attempt to gain tenant's trust who is concerned about surrendering his data to a place that is shared with other tenants. Moreover, he has no control over it. Many approaches are implemented for the purpose of data isolation for each tenant in a database. The selection of the approach to use depends on the complexity of the application and many other business considerations. Mainly three approaches are covered in literature. Here they are: - Separate Database: In this approach, a separate database is assigned to each tenant for data storage. Each database contains some metadata used to redirect each tenant to the correct database. This approach is considered expensive in both implementation and maintenance. - Shared database, separate schema: In this approach all tenants share the same physical database, however, the schema different for each tenant. This approach is relatively simple to implement. - Shared database, shared schema: In this approach all tenants will share both the physical database and the schema. Tables are shared by all tenants. Customers information is separated using primary keys which are specified in the database design. This approach is relatively economic because it supports a large number of tenants per database server [1]. Selecting the appropriate approach depends on different criteria. For example, the separate database approach is the appropriate solution for large organizations tenants who need to store large amounts of data. The same approach is also suitable if security and legal requirements are of high concern. On the other hand, the shared database shared schema is the appropriate solution for individual tenants who have low amounts of data to store. Also, the same approach is the optimum solution in case of frequent changed applications. [4]. 3 IMPLEMENTING MULTI-TENANT DATABASES In order to implement multi-tenancy in the database, most hosted services use a query transformation layer to map multiple single-tenant logical schemas in the application to one multitenant physical schema in the database. For normal workloads, the fundamental development limitation of this approach is the number of tables the database can handle. In turn, the number of tables depends on the amount of available memory, the tables design, and their development in such a way that the tenant receives a response to any query in an efficient way [5]. Various approaches are explored and implemented in the literature. The general idea is to map the logical source tables into fixed generic structures. In the following sub-sections, these approaches are explained, followed by an example that illustrates how different tenants (Tenant A, Tenant B, and Tenant C) use that approach to configure one sales table which stores their salesperson s information in multi-tenant application. Here they are: 3.1 Private Tables The private table technique provides a high level of isolation and privacy among tenants. This is achieved by allowing each tenant to have his own private table in the database to satisfy his needs. Figure 1 illustrates the implementation of such approach. Figure 1: Private Table Implementation ISBN: SDIWC 524
3 3.2 Universal Table The universal table layout holds a large number of generic data columns with a flexible data type such as VARCHAR data type. The n-th column of a logical source table for each tenant is mapped to ColN in the universal table. In addition, two unique columns, Tenant_id and Table columns are used: Tenant_id identifies tenants from each other, whereas the Table column identifies the specific table of the same tenant. - Each table consists of five columns: Tenant_id used to identify each tenant from other; the Table column is used to identify the specific table of the same tenant; the col column is used to determine the Each tenant fills his columns with the needed data. The rest of the columns that are not related to him are filled with Null values. Figure 2 illustrates the implementation of such approach. Figure 3: Extension Table Implementation represented column in the logical source table; the row column is used to determine the represented row in the logical source table; and finally the data type column used to store the values of the logical source table rows according to their data types in the designated pivot Table. Figure 2: Universal Table Implementation 3.3 Extension Tables In Extension Tables, the logical source table is partitioned into different tables; the common attribute for all tenants is stored in the base table. Each group having the same attribute is stored in different extension tables. These separated tables are joined together by adding Tenant_id column and row column. The latter represents the specific row in the logical source tables. So, multiple tenants can share the base tables as well as the extension. Figure 3 illustrates the implementation of such approach. In general, each new row in the pivot table is created for each field "cell" in the logical source table. Figure 4 illustrates the implementation of the pivot table. 3.4 Pivot Tables In this technique, Pivot tables are shared by all tenants. The source tables are mapped as follows: - A separate table for each data type is created. For example, we might have two pivot tables, the first one pivot_int to store integer values, and the second is pivot_str to store string values. Figure 4: Pivot Table Implementation ISBN: SDIWC 525
4 3.5 Chunk Table The Chunk Table technique is similar to the Pivot Table approach; however, they are different in two points: 1. It has a set of data columns with multiple data types with or without indexes. 2. The column col in the Pivot Table is replaced by the chunk column in the Chunk Table. In the Chunk Table technique the columns in the logical source tables are partitioned into groups according to their popularity. Each group is assigned to a chunk ID and mapped to the appropriate Chunk Table. In fact, the Universal Table is an extreme chunking: only one chunk per row. On the other hand, we have one row for each field in the pivot table in contrast to having one row for each chunk in the Chunk Tables. Figure 5 illustrates the implementation of the Chunk Tables. Figure 6: Chunk Folding Table Implementation 3.7 The XML Data Type/Document The XML data type database extension technique is a combination of relational database systems and Extensible Markup Language (XML). The extension of XML can be provided as native XML data type, or by storing the XML document in the database as a Character Large Object (CLOB) or Binary Large Object (BLOB). Figure 5: Chunk Table Implementation 3.6 Chunk Folding Table In the Chunk folding Table technique, logical source tables are vertically partitioned into two tables. The first one the base table - is used to store the heavily used part of the logical source tables; in other words, the columns that are used the most by the tenants. On the other hand, the second table is used to store the remaining columns which are less frequently used by most of the tenants: these are the Chunk Tables. Therefore, we can say that the Chunk Folding table technique mixes the ideas of both the Extension table and Chunk Tables. Figure 6 illustrates an implementation of such technique. Figure 7: XML Data Type Implementation XML data type is used to facilitate the creation of the database tables, columns, views, as well as variables and parameters. This technique satisfies most tenants needs, because their data can be handled without changing the original database ISBN: SDIWC 526
5 relational schema. XML data type can be supported by several relational database products [6]. Figure 7 illustrates the XML data type implementation. 4 ANALYSIS This section analyzes the previously mentioned approaches. 4.1 Private Table This technique is very simple to implement. In addition, it provides a high level of privacy. Moreover, the query transformation layer needs only to rename the tables in order to map each tenant to his own table. The main drawback of this approach is the large number of tables created for each tenant since no sharing is allowed. Therefore, this technique achieves a good performance for a low number of tenants. 4.2 Universal Table In contrast to the private table technique, the Universal table offers a great consolidation degree with no extensibility. This approach is relatively easy to implement. In fact, it is considered as a flexible approach because tenants can extend their tables as needed. The main drawback of this approach is that the rows need to be very wide even for slender source tables. As a result, the database has to handle many null values. Furthermore, indexes on the columns are not supported in this approach. On the other hand, the data type becomes an important issue since each tenant might have a different data type in his logical source table. This issue leads to the necessity of adding additional structures to provide indexing in this technique. 4.3 Extension Table This approach lies somewhere in the middle between the Private and Universal tables. In other words, it provides a better consolidation than the Private Table Layout. At the same time, it outperforms the Universal table in terms of extensibility. However, the number of tables increases proportionally with the number of tenants and the diversity of their business requirements. Another drawback for this approach is that an additional join operation takes place at the run time when reconstructing the logical source tables. 4.4 Pivot Table The Pivot Table technique provides much and better performance for the following reasons: - It is a safe data-type structure: each Pivot Table is created for each different data type. - It efficiently supports indexing, two Pivot Tables can be created for each type: one with indexes and one without, each value is placed in one of these tables depending on whether it needs to be indexed or not. - This approach eliminates the need to handle many null values. The main drawback in this technique is that it has more columns of meta-data than the actual data. Moreover, reconstructing the logical source column requires many join operations along the row column. As a result, this leads to a much higher runtime overhead for interpreting the metadata [7]. 4.5 Chunk Table Unlike the Pivot Tables, this approach reduces the ratio of stored meta-data to actual data. Therefore, there is less overhead for reconstructing the logical source tables. Unlike the Universal Tables, this approach provides a well-defined way of adding indexes and reducing the number of columns. Moreover, this technique provides high flexibility since the width of the Chunk Tables may vary. However, this flexibility adds more complexity at the querytransformation layer. 4.6 Chunk Folding Table Chunk Folding technique achieves good performance that is obtained by mapping the most heavily utilized parts of the logical schemas into the basic tables; the remaining parts are mapped into Chunk Tables that match their structure as closely as possible. Furthermore, it does not put any limitations on the consolidation or the extensibility. However, it is not efficient with generic structures that use only a small and/or fixed number of tables. Chunk Folding tries to utilize the database s entire meta-data in an effective way as much as possible [7]. 4.7 The XML Data Type/Document Obviously, using the XML data type in the database extension technique adds many advantages to the database in terms of its ISBN: SDIWC 527
6 simplicity in the implementation. Also, it provides flexibility to have multiple data types with the various numbers of columns in each logical source table. Furthermore, the insertion and the retrieval of XML data is fast, however overall performance is affected by this data structure [6]. 5 CONCLUSION The multi-tenancy concept is the primary characteristic of SaaS applications. With SaaS, we need to use a multi-tenant database where all tenants (customers) participate and share a database. However, each tenant stores his own data. In this paper, the approach of multi-tenancy is explained in detail. Several implementation techniques in designing a multi-tenant database are presented. An analytical study of each technique is also presented: its advantages, disadvantages, and performance. In addition, the paper reveals the usability of each technique: when it is preferably used and under which circumstances. 6 REFERENCES [1] Pippal, S., Sharma, V., Mishra, S., Kushwaha, D.S.: An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication and Authorization Framework. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, (2011). [2] Xu, J., Li, X., Zhao, X.: Design of Database Architecture in the SaaS-based Multi-tenant Educational Information System. In the 6th International Conference on Computer Science & Education, , ( 2011). [3] Li, X., Shi, Y., Guo, Y., Ma, W.: Multi-tenancy Based Access Control in Cloud. In International Conference on Computational Intelligence and Software Engineering (CiSE) (2010). [4] Last accessed on 24/12/2012. [5] Mateljan, V., Cisic, D., Ogrizovic, D.: Cloud Databaseas-a-Service (DaaS) ROI. In MIPRO, Proceedings of the 33 rd International Convention, (2010). [6] Yaish, H., Goyal, M., Feuerlicht, G.: An Elastic Multitenant Database Schema for Software as a Service. In the 9 th IEEE International Conference on Dependable, Autonomic and Secure Computing, (2011). [7] Aulbach, S., Grust, T., Jacobs, D., Kemper, A., Rittinger, J.: Multi-Tenant Databases for Software as a Service:Schema-Mapping Techniques. In ACM SIGMOD Proceedings International Conference on Management of Data, (2008). ISBN: SDIWC 528
Multitenant Software as a Service: Application Development Approach
Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1, Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed
More informationAbstract. Keywords. 1. Introduction. Suhas Gajakosh 1,Mukta Takalikar 2
Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1,Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed
More informationResearch Article A MULTI-TENANT WEB APPLICATION FRAMEWORK FOR SOFTWARE AS A SERVICE (SAAS)
ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com A MULTI-TENANT WEB APPLICATION FRAMEWORK FOR SOFTWARE AS A SERVICE (SAAS) 1 Naveen.M.J, 2 Dr.Muthukumar.B Department-MCA,
More informationEFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]
EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,
More informationProxy Service for Multi-tenant Database Access
Proxy Service for Multi-tenant Database Access Haitham Yaish 1,2, Madhu Goyal 1,2, and George Feuerlicht 2,3 1 Centre for Quantum Computation & Intelligent Systems 2 Faculty of Engineering and Information
More informationA Multi-Tenant Web Application Framework for Software as a Service (SAAS)
European Journal of Applied Sciences 8 (4): 251-256, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.4.22981 A Multi-Tenant Web Application Framework for Software as a Service
More informationA NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS
A NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS Haitham Yaish, Madhu Goyal and George Feuerlicht 1,2 1 Faculty of Engineering and Information Technology, University of Technology,
More informationBuilding Multi-tenant Applications with Pervasive PSQL
Building Multi-tenant Applications with Pervasive PSQL Pervasive PSQL White Paper August 2012 This white paper is the first in a series of three designed to show how easily Pervasive PSQL can provide all
More informationA Design of the Conceptual Architecture for a Multitenant SaaS Application Platform
A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform Sungjoo Kang 1, Sungwon Kang 2, Sungjin Hur 1 Software Service Research Team, Electronics and Telecommunications Research
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationProxy Service for Multi-tenant Database Access
Proxy Service for Multi-tenant Database Access Haitham Yaish, Madhu Goyal, George Feuerlicht To cite this version: Haitham Yaish, Madhu Goyal, George Feuerlicht. Proxy Service for Multi-tenant Database
More informationA Multi-Tenant Framework for Multimedia Conference System
2013 8th International Conference on Communications and Networking in China (CHINACOM) A Multi-Tenant Framework for Multimedia Conference System Wang Shaofeng,Shang Yanlei,Tian Yue The State Key Lab of
More informationDatabase Design on Construction Project Cost System Nannan Zhang1,a, Wenfeng Song2,b
3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) Database Design on Construction Project Cost System Nannan Zhang1,a, Wenfeng Song2,b 1 School
More informationIJSER. Gayake, Prof.R.L.Paikrao
Volume 7, Issue 1, January-2016 1269 Integration of Databases with Cloud Enviornment Anuradha Gayake, Prof.R.L.Paikrao Abstract Cloud computing mainly concern, shared or distributed computing, networking,
More informationChapter 4. Fundamental Concepts and Models
Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas
More informationThird Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
More information1. Introduction. 2. Technology concepts
1 Table of Contents 1. Introduction...2 2. Technology Concepts...3 2.1. Sharding...4 2.2. Service Oriented Data Architecture...4 2.3. Aspect Oriented Programming...4 3. Technology/Platform-Specific Features...5
More informationPPKM: Preserving Privacy in Knowledge Management
PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com
More informationAn Introduction to Big Data Formats
Introduction to Big Data Formats 1 An Introduction to Big Data Formats Understanding Avro, Parquet, and ORC WHITE PAPER Introduction to Big Data Formats 2 TABLE OF TABLE OF CONTENTS CONTENTS INTRODUCTION
More informationSOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS
WHITE PAPER SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS This white paper describes, from a storage vendor perspective, the major differences between Software Defined Storage and traditional SAN
More informationSecuring the Cloud Today: How do we get there?
Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,
More informationLivePoplet: Technology That Enables Mashup of Existing Applications
LivePoplet: Technology That Enables Mashup of Existing Applications Akihiko Matsuo Kenji Oki Akio Shimono (Manuscript received January 29, 2009) We have developed LivePoplet, a technology that allows the
More informationSoftware as a Service Multi-tenant Data Architecture. Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation
Software as a Service Multi-tenant Data Architecture Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation Agenda SIMT principles and considerations Database options for storing multi-tenant
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More informationApplication Multi-Tenancy for Software as a Service
ACM SIGSOFT Software Engineering Notes Page 1 March 2015 Volume 40 Number 2 Application Multi-Tenancy for Software as a Service Sanjukta Pal Department of Computer Applications National Institute of Technology,
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationIMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM *
Journal of Contemporary Issues in Business Research ISSN 2305-8277 (Online), 2012, Vol. 1, No. 2, 42-56. Copyright of the Academic Journals JCIBR All rights reserved. IMPLEMENTATION OF INFORMATION RETRIEVAL
More informationBRINGING CLARITY TO THE CLOUD
BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that
More informationBigDataBench-MT: Multi-tenancy version of BigDataBench
BigDataBench-MT: Multi-tenancy version of BigDataBench Gang Lu Beijing Academy of Frontier Science and Technology BigDataBench Tutorial, ASPLOS 2016 Atlanta, GA, USA n Software perspective Multi-tenancy
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationCA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.
CA ERwin Data Modeler s Role in the Relational Cloud Nuccio Piscopo Table of Contents Abstract.....3 Introduction........3 Daas requirements through CA ERwin Data Modeler..3 CA ERwin in the Relational
More informationV Conclusions. V.1 Related work
V Conclusions V.1 Related work Even though MapReduce appears to be constructed specifically for performing group-by aggregations, there are also many interesting research work being done on studying critical
More informationMulti Agent System-Based on Case Based Reasoning for Cloud Computing System
Multi Agent System-Based on Case Based Reasoning for Cloud Computing System Amir Mohamed Talib 1 and Nour Eldin Mohamed Elshaiekh 2 1 Faculty of Computer and Information Science, Information Technology
More informationThe Value of Force.com as a GRC Platform
The Value of Force.com as a GRC Platform Andy Evans - Xactium Limited March 2009 Executive Summary The importance of governance, risk and compliance (GRC) activities to organizations has become increasingly
More informationNetwork Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010
Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Lou Topfl Director, New Technology Product Development Engineering AT&T Agenda What is the Cloud? Types of Cloud
More informationIntroduction to Oracle
Class Note: Chapter 1 Introduction to Oracle (Updated May 10, 2016) [The class note is the typical material I would prepare for my face-to-face class. Since this is an Internet based class, I am sharing
More informationImplementing a Storage Pattern in the OR Mapping Framework
, pp.29-38 http://dx.doi.org/10.14257/ijgdc.2013.6.5.03 Implementing a Storage Pattern in the OR Mapping Framework Muhammad Naeem Ahmed Khan, Arsalan Shahid and Sarah Shafqat Shaheed Zulfikar Ali Bhutto
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationIntroduction to Cloud Computing. [thoughtsoncloud.com] 1
Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:
More informationDatabase Assessment for PDMS
Database Assessment for PDMS Abhishek Gaurav, Nayden Markatchev, Philip Rizk and Rob Simmonds Grid Research Centre, University of Calgary. http://grid.ucalgary.ca 1 Introduction This document describes
More informationGenomics on Cisco Metacloud + SwiftStack
Genomics on Cisco Metacloud + SwiftStack Technology is a large component of driving discovery in both research and providing timely answers for clinical treatments. Advances in genomic sequencing have
More informationRocky Mountain Technology Ventures
Rocky Mountain Technology Ventures Comparing and Contrasting Online Analytical Processing (OLAP) and Online Transactional Processing (OLTP) Architectures 3/19/2006 Introduction One of the most important
More informationPersonal Grid. 1 Introduction. Zhiwei Xu, Lijuan Xiao, and Xingwu Liu
Personal Grid Zhiwei Xu, Lijuan Xiao, and Xingwu Liu Institute of Computing Technology, Chinese Academy of Sciences 100080 Beijing, China Abstract. A long-term trend in computing platform innovation is
More informationIntroduction to Computer Science and Business
Introduction to Computer Science and Business This is the second portion of the Database Design and Programming with SQL course. In this portion, students implement their database design by creating a
More informationDISTRIBUTED DATABASE OPTIMIZATIONS WITH NoSQL MEMBERS
U.P.B. Sci. Bull., Series C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 DISTRIBUTED DATABASE OPTIMIZATIONS WITH NoSQL MEMBERS George Dan POPA 1 Distributed database complexity, as well as wide usability area,
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationData Warehousing 11g Essentials
Oracle 1z0-515 Data Warehousing 11g Essentials Version: 6.0 QUESTION NO: 1 Indentify the true statement about REF partitions. A. REF partitions have no impact on partition-wise joins. B. Changes to partitioning
More informationEfficient, Scalable, and Provenance-Aware Management of Linked Data
Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization
More informationEXAM Microsoft Database Fundamentals. Buy Full Product.
Microsoft EXAM - 98-364 Microsoft Database Fundamentals Buy Full Product http://www.examskey.com/98-364.html Examskey Microsoft 98-364 exam demo product is here for you to test the quality of the product.
More informationRaunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati
Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering
More informationA Review Of Multi-Tenant Database And Factors That Influence Its Adoption.
Association for Information Systems AIS Electronic Library (AISeL) UK Academy for Information Systems Conference Proceedings 2014 UK Academy for Information Systems Spring 4-9-2014 A Review Of Multi-Tenant
More informationSurvey of Oracle Database
Survey of Oracle Database About Oracle: Oracle Corporation is the largest software company whose primary business is database products. Oracle database (Oracle DB) is a relational database management system
More informationSurvey on Incremental MapReduce for Data Mining
Survey on Incremental MapReduce for Data Mining Trupti M. Shinde 1, Prof.S.V.Chobe 2 1 Research Scholar, Computer Engineering Dept., Dr. D. Y. Patil Institute of Engineering &Technology, 2 Associate Professor,
More informationCloud Computing Concepts, Models, and Terminology
Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and
More informationGlobal Journal of Engineering Science and Research Management
CONFIGURATION FILE RECOMMENDATIONS USING METADATA AND FUZZY TECHNIQUE Gnanamani.H*, Mr. C.V. Shanmuka Swamy * PG Student Department of Computer Science Shridevi Institute Of Engineering and Technology
More informationMulti-tenancy version of BigDataBench
Multi-tenancy version of BigDataBench Gang Lu Institute of Computing Technology, Chinese Academy of Sciences BigDataBench Tutorial MICRO 2014 Cambridge, UK INSTITUTE OF COMPUTING TECHNOLOGY 1 Multi-tenancy
More informationAlternative Approaches for Deduplication in Cloud Storage Environment
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 10 (2017), pp. 2357-2363 Research India Publications http://www.ripublication.com Alternative Approaches for
More informationSemantics, Metadata and Identifying Master Data
Semantics, Metadata and Identifying Master Data A DataFlux White Paper Prepared by: David Loshin, President, Knowledge Integrity, Inc. Once you have determined that your organization can achieve the benefits
More informationCloud Computing Introduction & Offerings from IBM
Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?
More informationLicensing Guide for Partners
Microsoft PowerApps & Microsoft Flow Licensing Guide for Partners November 2016 The Microsoft PowerApps & Flow Licensing Guide November 2016 Contents Introduction to Microsoft PowerApps & Microsoft Flow...
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationEXAM - CL CompTIA Cloud Essentials Exam. Buy Full Product.
CompTIA EXAM - CL0-001 CompTIA Cloud Essentials Exam Buy Full Product http://www.examskey.com/cl0-001.html Examskey CompTIA CL0-001 exam demo product is here for you to test the quality of the product.
More informationA Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 A Real Time GIS Approximation Approach for Multiphase
More informationHow to Select the Right Marketing Cloud Edition
How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire
More informationFaculté Polytechnique
Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and
More informationAzure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk
Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate
More informationMichel Ruffin Software coordination manager
STANDARDIZING THE FOSS GOVERNANCE PROCESSES Michel Ruffin Software coordination manager December 2013 STANDARDIZING THE FOSS GOVERNANCE PROCESSES Background The use of Free and/or Open Source Software
More informationIBM DB2 UDB V7.1 Family Fundamentals.
IBM 000-512 DB2 UDB V7.1 Family Fundamentals http://killexams.com/exam-detail/000-512 Answer: E QUESTION: 98 Given the following: A table containing a list of all seats on an airplane. A seat consists
More informationA Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS)
A Proposed Framework for Mobile Cloud Based Applications Using Mobile as a Service (MTaaS) Engr. Ali Ahmed Computer & Software Engineering Department Bahria University, Karachi Campus Karachi, Pakistan
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationNative Support of Multi-tenancy in RDBMS for Software as a Service
Native Support of Multi-tenancy in RDBMS for Software as a Service Oliver Schiller Benjamin Schiller Andreas Brodt Bernhard Mitschang Applications of Parallel and Distributed Systems Universität Stuttgart
More informationXML in the bipharmaceutical
XML in the bipharmaceutical sector XML holds out the opportunity to integrate data across both the enterprise and the network of biopharmaceutical alliances - with little technological dislocation and
More informationInternational Jmynal of Intellectual Advancements and Research in Engineering Computations
www.ijiarec.com ISSN:2348-2079 DEC-2015 International Jmynal of Intellectual Advancements and Research in Engineering Computations VIRTUALIZATION OF DISTIRIBUTED DATABASES USING XML 1 M.Ramu ABSTRACT Objective
More informationAn Oracle White Paper April 2010
An Oracle White Paper April 2010 In October 2009, NEC Corporation ( NEC ) established development guidelines and a roadmap for IT platform products to realize a next-generation IT infrastructures suited
More informationDirectory Structure and File Allocation Methods
ISSN:0975-9646 Mandeep Kaur et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 2016, 577-582 Directory Structure and ile Allocation Methods Mandeep Kaur,
More informationCloud Computing Overview. The Business and Technology Impact. October 2013
Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationStorage Networking Strategy for the Next Five Years
White Paper Storage Networking Strategy for the Next Five Years 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Top considerations for storage
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationEvaluation Guide for ASP.NET Web CMS and Experience Platforms
Evaluation Guide for ASP.NET Web CMS and Experience Platforms CONTENTS Introduction....................... 1 4 Key Differences...2 Architecture:...2 Development Model...3 Content:...4 Database:...4 Bonus:
More informationThe future of database technology is in the clouds
Database.com Getting Started Series White Paper The future of database technology is in the clouds WHITE PAPER 0 Contents OVERVIEW... 1 CLOUD COMPUTING ARRIVES... 1 THE FUTURE OF ON-PREMISES DATABASE SYSTEMS:
More informationSecure Conjunctive Keyword Ranked Search over Encrypted Cloud Data
Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared
More informationDelivering Complex Enterprise Applications via Hybrid Clouds
Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked
More informationAn Interactive Web based Expert System Degree Planner
An Interactive Web based Expert System Degree Planner Neil Dunstan School of Science and Technology University of New England Australia ph: +61 2 67732350 fax: +61 2 67735011 neil@cs.une.edu.au ABSTRACT
More informationBuilding Self-Service BI Solutions with Power Query. Written By: Devin
Building Self-Service BI Solutions with Power Query Written By: Devin Knight DKnight@PragmaticWorks.com @Knight_Devin CONTENTS PAGE 3 PAGE 4 PAGE 5 PAGE 6 PAGE 7 PAGE 8 PAGE 9 PAGE 11 PAGE 17 PAGE 20 PAGE
More informationIntegrated Security Context Management of Web Components and Services in Federated Identity Environments
Integrated Security Context Management of Web Components and Services in Federated Identity Environments Apurva Kumar IBM India Research Lab. 4, Block C Vasant Kunj Institutional Area, New Delhi, India-110070
More informationIntroduction to Information Systems
Table of Contents 1... 2 1.1 Introduction... 2 1.2 Architecture of Information systems... 2 1.3 Classification of Data Models... 4 1.4 Relational Data Model (Overview)... 8 1.5 Conclusion... 12 1 1.1 Introduction
More informationPart 1: Indexes for Big Data
JethroData Making Interactive BI for Big Data a Reality Technical White Paper This white paper explains how JethroData can help you achieve a truly interactive interactive response time for BI on big data,
More information[This is not an article, chapter, of conference paper!]
http://www.diva-portal.org [This is not an article, chapter, of conference paper!] Performance Comparison between Scaling of Virtual Machines and Containers using Cassandra NoSQL Database Sogand Shirinbab,
More informationRACKSPACE ONMETAL I/O V2 OUTPERFORMS AMAZON EC2 BY UP TO 2X IN BENCHMARK TESTING
RACKSPACE ONMETAL I/O V2 OUTPERFORMS AMAZON EC2 BY UP TO 2X IN BENCHMARK TESTING EXECUTIVE SUMMARY Today, businesses are increasingly turning to cloud services for rapid deployment of apps and services.
More informationA Survey on Secure Sharing In Cloud Computing
A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing
More informationLecture 1: January 22
CMPSCI 677 Distributed and Operating Systems Spring 2018 Lecture 1: January 22 Lecturer: Prashant Shenoy Scribe: Bin Wang 1.1 Introduction to the course The lecture started by outlining the administrative
More informationA Benchmarking Criteria for the Evaluation of OLAP Tools
A Benchmarking Criteria for the Evaluation of OLAP Tools Fiaz Majeed Department of Information Technology, University of Gujrat, Gujrat, Pakistan. Email: fiaz.majeed@uog.edu.pk Abstract Generating queries
More informationInternational Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN STUDY ON CLOUD COMPUTING
Omkumar R. Badhai, Shreya A. Deo, Snehal B.Satpute, Mansi Agrawal Department of Computer Engineering, Sipna College Of engineering and Technology, Amravati, Sant Gadge Baba Amravati University ABSTRACT:
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers
More informationIBM EXAM - C DB Fundamentals. Buy Full Product.
IBM EXAM - C2090-610 DB2 10.1 Fundamentals Buy Full Product http://www.examskey.com/c2090-610.html Examskey IBM C2090-610 exam demo product is here for you to test the quality of the product. This IBM
More informationData Vault Brisbane User Group
Data Vault Brisbane User Group 26-02-2013 Agenda Introductions A brief introduction to Data Vault Creating a Data Vault based Data Warehouse Comparisons with 3NF/Kimball When is it good for you? Examples
More informationCAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture
CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and
More information