Cloud Computing. Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative

Similar documents
Cloud Computing. Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative

Architectural Implications of Cloud Computing

2013 US State of Cybercrime Survey

ARINC653 AADL Annex Update

Components and Considerations in Building an Insider Threat Program

Cyber Threat Prioritization

Empirically Based Analysis: The DDoS Case

Fall 2014 SEI Research Review Verifying Evolving Software

COTS Multicore Processors in Avionics Systems: Challenges and Solutions

CHAPTER 2 BASICS OF CLOUD COMPUTING

Current Threat Environment

Service Level Agreements: An Approach to Software Lifecycle Management. CDR Leonard Gaines Naval Supply Systems Command 29 January 2003

Multi-Modal Communication

Panel: Future of Cloud Computing

Architecting for Resiliency Army s Common Operating Environment (COE) SERC

COMPUTATIONAL FLUID DYNAMICS (CFD) ANALYSIS AND DEVELOPMENT OF HALON- REPLACEMENT FIRE EXTINGUISHING SYSTEMS (PHASE II)

DoD Common Access Card Information Brief. Smart Card Project Managers Group

Kathleen Fisher Program Manager, Information Innovation Office

Information, Decision, & Complex Networks AFOSR/RTC Overview

C2-Simulation Interoperability in NATO

By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community

Technological Advances In Emergency Management

Preventing Insider Sabotage: Lessons Learned From Actual Attacks

Using Model-Theoretic Invariants for Semantic Integration. Michael Gruninger NIST / Institute for Systems Research University of Maryland

Dana Sinno MIT Lincoln Laboratory 244 Wood Street Lexington, MA phone:

Concept of Operations Discussion Summary

FUDSChem. Brian Jordan With the assistance of Deb Walker. Formerly Used Defense Site Chemistry Database. USACE-Albuquerque District.

4. Lessons Learned in Introducing MBSE: 2009 to 2012

A Review of the 2007 Air Force Inaugural Sustainability Report

Software, Security, and Resiliency. Paul Nielsen SEI Director and CEO

Model-Driven Verifying Compilation of Synchronous Distributed Applications

ENVIRONMENTAL MANAGEMENT SYSTEM WEB SITE (EMSWeb)

Modeling the Implementation of Stated-Based System Architectures

ATCCIS Replication Mechanism (ARM)

75th Air Base Wing. Effective Data Stewarding Measures in Support of EESOH-MIS

Julia Allen Principal Researcher, CERT Division

Towards a Formal Pedigree Ontology for Level-One Sensor Fusion

QuanTM Architecture for Web Services

Smart Grid Maturity Model

HEC-FFA Flood Frequency Analysis

Distributed Real-Time Embedded Video Processing

An Update on CORBA Performance for HPEC Algorithms. Bill Beckwith Objective Interface Systems, Inc.

Vision Protection Army Technology Objective (ATO) Overview for GVSET VIP Day. Sensors from Laser Weapons Date: 17 Jul 09 UNCLASSIFIED

Running CyberCIEGE on Linux without Windows

Space and Missile Systems Center

Setting the Standard for Real-Time Digital Signal Processing Pentek Seminar Series. Digital IF Standardization

Using the SORASCS Prototype Web Portal

High-Assurance Security/Safety on HPEC Systems: an Oxymoron?

Engineering Improvement in Software Assurance: A Landscape Framework

2011 NNI Environment, Health, and Safety Research Strategy

Use of the Polarized Radiance Distribution Camera System in the RADYO Program

Washington University

Shallow Ocean Bottom BRDF Prediction, Modeling, and Inversion via Simulation with Surface/Volume Data Derived from X-Ray Tomography

Introducing I 3 CON. The Information Interpretation and Integration Conference

A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the Cloud

Energy Security: A Global Challenge

The CERT Top 10 List for Winning the Battle Against Insider Threats

Developing an Agent Systems Reference Architecture

Defense Hotline Allegations Concerning Contractor-Invoiced Travel for U.S. Army Corps of Engineers' Contracts W912DY-10-D-0014 and W912DY-10-D-0024

SINOVIA An open approach for heterogeneous ISR systems inter-operability

Web Site update. 21st HCAT Program Review Toronto, September 26, Keith Legg

Space and Missile Systems Center

VICTORY VALIDATION AN INTRODUCTION AND TECHNICAL OVERVIEW

Data Reorganization Interface

Roles and Responsibilities on DevOps Adoption

AFRL-ML-WP-TM

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

A Distributed Parallel Processing System for Command and Control Imagery

David W. Hyde US Army Engineer Waterways Experiment Station Vicksburg, Mississippi ABSTRACT

Module Day Topic. 1 Definition of Cloud Computing and its Basics

MODELING AND SIMULATION OF LIQUID MOLDING PROCESSES. Pavel Simacek Center for Composite Materials University of Delaware

Cloud Computing Introduction & Offerings from IBM

Requirements for Scalable Application Specific Processing in Commercial HPEC

The C2 Workstation and Data Replication over Disadvantaged Tactical Communication Links

Computer Aided Munitions Storage Planning

Situational Awareness Metrics from Flow and Other Data Sources

Office of Global Maritime Situational Awareness

Exploring the Query Expansion Methods for Concept Based Representation

Wireless Connectivity of Swarms in Presence of Obstacles

The State of Standardization Efforts to support Data Exchange in the Security Domain

CASE STUDY: Using Field Programmable Gate Arrays in a Beowulf Cluster

ASSESSMENT OF A BAYESIAN MODEL AND TEST VALIDATION METHOD

Topology Control from Bottom to Top

PEO C4I Remarks for NPS Acquisition Research Symposium

Corrosion Prevention and Control Database. Bob Barbin 07 February 2011 ASETSDefense 2011

BUPT at TREC 2009: Entity Track

Automation Middleware and Algorithms for Robotic Underwater Sensor Networks

Dr. Stuart Dickinson Dr. Donald H. Steinbrecher Naval Undersea Warfare Center, Newport, RI May 10, 2011

MATREX Run Time Interface (RTI) DoD M&S Conference 10 March 2008

Accuracy of Computed Water Surface Profiles

Defining Computer Security Incident Response Teams

32nd Annual Precise Time and Time Interval (PTTI) Meeting. Ed Butterline Symmetricom San Jose, CA, USA. Abstract

INFS 214: Introduction to Computing

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

DoD M&S Project: Standardized Documentation for Verification, Validation, and Accreditation

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Guide to Windows 2000 Kerberos Settings

U.S. Army Research, Development and Engineering Command (IDAS) Briefer: Jason Morse ARMED Team Leader Ground System Survivability, TARDEC

SURVIVABILITY ENHANCED RUN-FLAT

ASPECTS OF USE OF CFD FOR UAV CONFIGURATION DESIGN

Transcription:

Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative SEI Webinar November 12, 2009

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 12 NOV 2009 4. TITLE AND SUBTITLE 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Carnegie Mellon University,Software Engineering Institute,Pittsburgh,PA,15213 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 11. SPONSOR/MONITOR S REPORT NUMBER(S) 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Same as Report (SAR) 18. NUMBER OF PAGES 31 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Polling Question 1 How did you hear about this webinar? o Email invitation from the SEI o SEI Website o Website with webinar calendar (ie www.webinar-directory.com) o Social Media site ( LinkedIn, Twitter) o Other 7

Agenda Defined Types of Cloud Drivers for Adoption Barriers to Relationship to Other Technologies Summary 8

Polling Question 2 Has your organization adopted cloud computing? o No o No, but we have plans to do so o Just starting o Yes 9

A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. 1 is a distributed computing paradigm that focuses on providing a wide range of users with distributed access to virtualized hardware and/or software infrastructure over the Internet. 1 I. Foster, Y. Zhau, R. Ioan, and S. Lu. and Grid Computing : 360-Degree Compared. Grid Computing Environments Workshop, 2008. 10

Core Concepts Distributed computing paradigm Large-scale distributed system Resource-based and service-based Provides access to a resource and/or service Elastic and on demand Has the ability to scale up or down based on demand Economies of scale Contains a large number of nodes and therefore reduces the overall cost of resource acquisition and operation Utility payment models Based on pay-per-use model Based on existing technologies Leverages existing technologies such as virtualization, service-orientation and grid computing 11

Types Software-as-a-Service (SaaS) Public Cloud Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS) Private Cloud Based on Type of Capability Based on Access Based on access 12

Infrastructure-as-a-Service (IaaS) Generic computational infrastructure available over the Internet, e.g. compute, storage, etc. Allows organizations and developers to extend their IT infrastructure on an ondemand basis Examples Amazon Elastic Compute Cloud (EC2) Provides users with a special virtual machine (AMI) that can be deployed and run on the EC2 infrastructure Amazon Simple Storage Solution (S3) Provides users with access to dynamically scalable storage resources IBM Computing on Demand (CoD) Provides users with access to highly configurable servers plus value-added services such as data storage Microsoft Live Mesh Provides users with access to a distributed file system; targeted at individual use 13

Platform-as-a-Service (PaaS) Application development platforms, e.g. containers to host Java components Allows developers to leverage the resources of established organizations to create and host applications of a larger scale than an individual or small business would be able to handle Examples Google App Engine Provides users a complete development stack and allows them to run their applications on Google s infrastructure Yahoo! Open Strategy (Y!OS) Provides users with a means of developing web applications on top of the existing Yahoo! platform, and in doing so leveraging a significant portion of the Yahoo! resources Akamai EdgePlatform Provides a large distributed computing platform on which organizations can deploy their web applications; large focus on analysis and monitoring Microsoft Azure Services Platform Provides users with on-demand compute and storage services as well as a development platform based on Windows Azure 14

Software-as-a-Service (SaaS) Application-specific capabilities, e.g., service that provides customer management Allows organizations and developers to use business-specific capabilities developed by third parties Examples Force.com From salesforce.com (SaaS leader), provides enterprise users a platform to build and run applications and components bought from AppExchange or custom applications Zoho Provides a large suite of web-based applications, mostly for enterprise use 15

Types Based on Access Public Offered as a service, usually over an Internet connection Typically charge a monthly usage fee Users can scale on-demand and do not need to purchase hardware Service providers manage the infrastructure and pool resources into capacity required by consumers Private Deployed inside the firewall and managed by the user organization User organization owns the software and hardware running in the cloud User organization manages the cloud and provides cloud resources Resources typically not shared outside the organization and full control is retained by the organization PERSPECTIVE Cloud Consumer Cloud Provider 16

Development Tools for the Cloud Provider 3tera Provides developers with tools to build their own cloud computing infrastructures Eucalyptus Systems Provides an open-source application that can be used to implement a cloud computing environment on a datacenter Trying to establish an open set of standards for cloud computing 17

Polling Question 3 In your opinion, what is the main driver for adoption? o Reduced costs o Reduced risk o Higher scalability o Other o Don t Know 18

Drivers for Adoption Scalability Elasticity Virtualization Cost Mobility Collaboration Risk Reduction Users have access to a large amount of resources that scale based on user demand The environment transparently manages a user s resource utilization based on dynamically changing needs Each user has a single view of the available resources, independently of how they are arranged in terms of physical devices The pay-per-usage model allows an organization to only pay for the resources they need with basically no investment in the physical resources available in the cloud. There are no infrastructure maintenance or upgrade costs Users have the ability for the user to access data and applications from around the globe Users are starting to see the cloud as a way to work simultaneously on common data and information Users can use the cloud to test ideas and concepts before making major investments in technology 19

Polling Question 4 In your opinion, what is the main barrier to cloud computing adoption? o Security o Lack of control o Reliability o Performance o Other 20

Barriers for Adoption Security Interoperability Control Performance Reliability Platform or Language Specificity The key concern is data privacy: users do not have control of or know where their data is being stored A universal set of standards and/or interfaces have not yet been defined, resulting in a significant risk of vendor lock-in The amount of control that the user has over the cloud environment varies greatly All access to the cloud is done via the internet, introducing latency into every communication between the user and the environment Many existing cloud infrastructures leverage commodity hardware that is known to fail unexpectedly Some cloud environments provide support for specific platforms and languages only 21

Other Criteria for Adoption Feedback Usability The ability for the user to obtain the statistics on usage levels The ease with which the user is able to configure and operate virtual resources 22

Relationship to Other Technologies Distributed Systems Supercomputers Scale Grids Clouds Clusters Web 2.0 Application- Oriented Service- Oriented Source: I. Foster, Y. Zhau, R. Ioan, and S. Lu. and Grid Computing : 360-Degree Compared. Grid Computing Environments Workshop, 2008. 23

Relationship to Other Technologies: Service- Oriented Architecture Service-oriented architecture (SOA) A way of designing, developing, deploying, and managing systems characterized by coarse-grained services that represent reusable functionality Service consumers compose applications or systems using the functionality provided by these services through standard interfaces. The services in a cloud can be defined as services in a SOA context. As an example, some of the cloud environments presented earlier offer web service interfaces to their services (one specific implementation of SOA) From an architectural perspective A cloud infrastructure could be built on top on an SOA infrastructure by adding a layer or virtualization and self-provisioning A service layer could be added on top of cloud resources Some even consider SOA adoption a pre-requisite for cloud computing 24

Relationship to Other Technologies: Software as a Service (SaaS) Model of software deployment in which a provider licenses an application to customers for use as a service on demand Multiple Levels Level 1: An application is specifically run for one customer at an SaaS provider, similar to the traditional ASP (application server provider) model Level 2: The SaaS application is customizable via configuration and one instance of the application serves only one customer. Level 3: The SaaS application is customizable and a single instance of the SaaS application serves multiple tenants. Level 4: The SaaS application is developed as a single instance multi-tenant application and several instances are run in a load-balanced server farm. Levels 3 and 4 of SaaS fall under the definition of cloud computing. 3 F. Chong and G. Carraro. Building Distributed Applications Architecture Strategies for Catching the Long Tail. MSDN architecture center, http://msdn2.microsoft.com/enus/library/aa479069.aspx, 2006. 25

Relationship to Other Technologies: Grid Computing A grid is a system that uses open, general-purpose protocols to federate distributed resources and to deliver better-than-best-effort qualities of service 1 Although the distinction with cloud computing is not clear, one differentiator is that grid computing relates exclusively to infrastructure services A grid infrastructure provides a set of abstractions and interfaces for access to, and management of, shared resources Related terms: utility computing, on-demand computing 1 Foster, I. 2002. What is the grid? A three-point checklist; http://www-fp.mcs.anl.gov/~foster/articles/whatisthegrid.pdf 2 Foster, I., Kesselman, C., Nick, J.M., and Tuecke, S. Grid services for distributed systems integration. IEEE Computer 35 (6): 37-46. 26

Summary is in essence an economic model It is a different way to acquire and manage IT resources There are multiple cloud providers the cloud is real Currently most cloud consumers are small enterprises Large enterprises are exploring private clouds The number of providers will most probably grow as people start seeing greater savings and work to reduce adoption barriers adoption requires cost/benefit/risk analysis to determine What resources to move to the cloud (if any) What situations warrant use of cloud resources, even for one-time situations Implementation of private clouds vs. usage of public clouds What risks are associated with using resources on the cloud 27

Contact Information Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative Software Engineering Institute 4500 Fifth Avenue Pittsburgh, PA 15213-2612 USA Phone: +1 412-268-5851 Email: glewis@sei.cmu.edu WWW: http://www.sei.cmu.edu/about/people/glewis.cfm 28

Environment and Tool References 3tera: http://www.3tera.com/ Akamai EdgePlatform: http://www.akamai.com/html/technology/edgeplatform.html Amazon Elastic Compute Cloud (EC2): http://aws.amazon.com/ec2/ Amazon Simple Storage Solution (S3): http://aws.amazon.com/s3/ Eucalyptus Systems: http://www.eucalyptus.com/ Force.com: http://www.salesforce.com/platform/ Google App Engine: http://code.google.com/appengine/ IBM Computing On Demand: http://www- 03.ibm.com/systems/deepcomputing/cod/ Microsoft Azure Services Platform: http://www.microsoft.com/azure/ Microsoft Live Mesh: http://www.mesh.com/ Yahoo! Open Strategy (Y!OS): http://developer.yahoo.com/yos/intro/ Zoho: http://www.zoho.com/ 29

Selected Literature References Drdogmus, H. : Does Nirvana Hide Behind the Nebula? IEEE Software: March/April 2009. Foster, I., Y. Zhau, R. Ioan, and S. Lu. and Grid Computing 360-Degree Compared. Grid Computing Environments Workshop, 2008.2. Grossman, R. The Case for. ITPro: March/April 2009.3. Hayes, B.. Communications of the ACM. 51(7): July 2008, p 9-11.4. Lin, G., F. David, Z. Jinzy, and D. Glenn. : IT as a Service. IT Pro: March/April 2009, p 10-13.5. McEvoy, G. and B. Schulze. Using Clouds to address Grid Limitations. MGC, December 2008.6. Wang, L, J. Tao, M. Kunze, A. Castellanos, D. Kramer, W. Karl. Scientific : Early Difinition and Experience. The 10th IEEE International Conference on High Performance Computing and Communications. 2008.7. Weiss, A. Computing in the Clouds. December 2007. 30

NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. This Presentation may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. This work was created in the performance of Federal Government Contract Number FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at 252.227-7013. 31

1

March 22-25, 2010 Savannah, Georgia :- Software Engineering Institute / CarnegieMellon 2

CERT's Podcast Series: Security for Business Leaders www.cert.org/podcast/ 3

4

5