Architectural Implications of Cloud Computing

Similar documents
Cloud Computing. Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative

Cloud Computing. Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative

2013 US State of Cybercrime Survey

ARINC653 AADL Annex Update

CHAPTER 2 BASICS OF CLOUD COMPUTING

Components and Considerations in Building an Insider Threat Program

Cyber Threat Prioritization

Fall 2014 SEI Research Review Verifying Evolving Software

COTS Multicore Processors in Avionics Systems: Challenges and Solutions

Empirically Based Analysis: The DDoS Case

Service Level Agreements: An Approach to Software Lifecycle Management. CDR Leonard Gaines Naval Supply Systems Command 29 January 2003

Architecting for Resiliency Army s Common Operating Environment (COE) SERC

Current Threat Environment

DoD Common Access Card Information Brief. Smart Card Project Managers Group

COMPUTATIONAL FLUID DYNAMICS (CFD) ANALYSIS AND DEVELOPMENT OF HALON- REPLACEMENT FIRE EXTINGUISHING SYSTEMS (PHASE II)

Preventing Insider Sabotage: Lessons Learned From Actual Attacks

Panel: Future of Cloud Computing

Multi-Modal Communication

Dana Sinno MIT Lincoln Laboratory 244 Wood Street Lexington, MA phone:

Using the SORASCS Prototype Web Portal

High-Assurance Security/Safety on HPEC Systems: an Oxymoron?

4. Lessons Learned in Introducing MBSE: 2009 to 2012

Software, Security, and Resiliency. Paul Nielsen SEI Director and CEO

ATCCIS Replication Mechanism (ARM)

Using Model-Theoretic Invariants for Semantic Integration. Michael Gruninger NIST / Institute for Systems Research University of Maryland

C2-Simulation Interoperability in NATO

A Review of the 2007 Air Force Inaugural Sustainability Report

Information, Decision, & Complex Networks AFOSR/RTC Overview

Model-Driven Verifying Compilation of Synchronous Distributed Applications

Running CyberCIEGE on Linux without Windows

75th Air Base Wing. Effective Data Stewarding Measures in Support of EESOH-MIS

Julia Allen Principal Researcher, CERT Division

Technological Advances In Emergency Management

The C2 Workstation and Data Replication over Disadvantaged Tactical Communication Links

Cloud Computing Introduction & Offerings from IBM

Concept of Operations Discussion Summary

ENVIRONMENTAL MANAGEMENT SYSTEM WEB SITE (EMSWeb)

By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community

FUDSChem. Brian Jordan With the assistance of Deb Walker. Formerly Used Defense Site Chemistry Database. USACE-Albuquerque District.

Modeling the Implementation of Stated-Based System Architectures

Cloud Essentials for Architects using OpenStack

Setting the Standard for Real-Time Digital Signal Processing Pentek Seminar Series. Digital IF Standardization

QuanTM Architecture for Web Services

Introducing I 3 CON. The Information Interpretation and Integration Conference

Kathleen Fisher Program Manager, Information Innovation Office

CASE STUDY: Using Field Programmable Gate Arrays in a Beowulf Cluster

2011 NNI Environment, Health, and Safety Research Strategy

An Update on CORBA Performance for HPEC Algorithms. Bill Beckwith Objective Interface Systems, Inc.

Distributed Real-Time Embedded Video Processing

Space and Missile Systems Center

Towards a Formal Pedigree Ontology for Level-One Sensor Fusion

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

SINOVIA An open approach for heterogeneous ISR systems inter-operability

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed

Smart Grid Maturity Model

The CERT Top 10 List for Winning the Battle Against Insider Threats

Cloud Computing introduction

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Web Site update. 21st HCAT Program Review Toronto, September 26, Keith Legg

CLOUD COMPUTING ABSTRACT

Space and Missile Systems Center

A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the Cloud

Data Reorganization Interface

32nd Annual Precise Time and Time Interval (PTTI) Meeting. Ed Butterline Symmetricom San Jose, CA, USA. Abstract

CENTER FOR ADVANCED ENERGY SYSTEM Rutgers University. Field Management for Industrial Assessment Centers Appointed By USDOE

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing Briefing Presentation. DANU

ECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University

AFRL-ML-WP-TM

ASSESSMENT OF A BAYESIAN MODEL AND TEST VALIDATION METHOD

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

Washington University

MODELING AND SIMULATION OF LIQUID MOLDING PROCESSES. Pavel Simacek Center for Composite Materials University of Delaware

Mitigating Risks with Cloud Computing Dan Reis

Requirements for Scalable Application Specific Processing in Commercial HPEC

Headquarters U.S. Air Force. EMS Play-by-Play: Using Air Force Playbooks to Standardize EMS

Computer Aided Munitions Storage Planning

73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation

Guide to Windows 2000 Kerberos Settings

Defining Computer Security Incident Response Teams

A Distributed Parallel Processing System for Command and Control Imagery

Multi Packed Security Addressing Challenges in Cloud Computing

Defense Hotline Allegations Concerning Contractor-Invoiced Travel for U.S. Army Corps of Engineers' Contracts W912DY-10-D-0014 and W912DY-10-D-0024

An Efficient Architecture for Ultra Long FFTs in FPGAs and ASICs

Use of the Polarized Radiance Distribution Camera System in the RADYO Program

Vision Protection Army Technology Objective (ATO) Overview for GVSET VIP Day. Sensors from Laser Weapons Date: 17 Jul 09 UNCLASSIFIED

David W. Hyde US Army Engineer Waterways Experiment Station Vicksburg, Mississippi ABSTRACT

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

MATREX Run Time Interface (RTI) DoD M&S Conference 10 March 2008

Topology Control from Bottom to Top

Engineering Improvement in Software Assurance: A Landscape Framework

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Introduction To Cloud Computing

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

INFS 214: Introduction to Computing

ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast

The State of Standardization Efforts to support Data Exchange in the Security Domain

Office of Global Maritime Situational Awareness

DATA COLLECTION AND TESTING TOOL: SAUDAS

HEC-FFA Flood Frequency Analysis

Transcription:

Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology, and System Solutions (RTSS) Program. Her current interests and projects are in service-oriented architecture (SOA), cloud computing, and context-aware mobile applications.

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 24 OCT 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Architectural Implications of Cloud Computing 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Carnegie Mellon University,Software Engineering Institute,Pittsburgh,PA,15213 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 11. SPONSOR/MONITOR S REPORT NUMBER(S) 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Same as Report (SAR) 18. NUMBER OF PAGES 34 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Agenda Basic Cloud Computing Concepts Architectural Implications of Cloud Computing Final Thoughts

Cloud Computing A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. I. Foster, Y. Zhau, R. Ioan, and S. Lu. Cloud Computing and Grid Computing: 360-Degree Compared. Grid Computing Environments Workshop, 2008. jaworski.net A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. National Institute of Standards and Technology (NIST), 2011.

Cloud Computing Types Software-as-a-Service (SaaS) Public Cloud Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS) Private Cloud Based on Type of Capability Based on Who Can Access Resources

Infrastructure-as-a-Service (IaaS) Mainly computational infrastructure available over the internet, such as compute cycles and storage Allows organizations and developers to extend their IT infrastructure on an on-demand basis Examples of IaaS Providers Amazon Elastic Compute Cloud (EC2) Provides users a special virtual machine (AMI) that can be deployed and run on the EC2 infrastructure Amazon Simple Storage Solution (S3) Provides users access to dynamically scalable storage resources IBM Computing on Demand (CoD) Provides users access to highly configurable servers plus valueadded services such as data storage Microsoft Live Mesh Provides users access to a distributed file system; targeted at individual use z.about.com

Platform-as-a-Service (PaaS) Application development platforms the allow the usage of external resources to create and host applications of a larger scale than an individual or small organization would be able to handle Examples of PaaS providers Akamai EdgePlatform Large distributed computing platform for web application deployment (focus on analysis and monitoring of resources) Force.com Platform to build and run applications and components bought from AppExchange or custom applications Google App Engine Platform to develop and run applications on Google s infrastructure Microsoft Azure Services Platform On-demand compute and storage services as well as a development platform based on Windows Azure Yahoo! Open Strategy (Y!OS) Platform to develop and web applications on top of the existing Yahoo! Platform (focus on social applications) vertoda.files.wordpress.com

Software-as-a-Service (SaaS) Model of software deployment in which a third-party provider licenses an application to customers for use as a service on demand Examples Google Apps Web-based office tools such as e-mail, calendar and document management tools Salesforce.com Full customer relationship management (CRM) application Zoho Large suite of web-based applications, mostly for enterprise use cloudtp.com

Cloud Computing Types Based on Access Public Offered as a service, usually over an Internet connection Typically charge a pay-per-use fee Users can scale on-demand and do not need to purchase hardware Cloud providers manage the infrastructure and pool resources into capacity required by consumers Private Deployed inside the firewall and managed by the user organization User organization owns the software and hardware running in the cloud User organization manages the cloud and provides cloud resources Resources typically not shared outside the organization and full control is retained by the organization PERSPECTIVE Cloud Consumer Cloud Provider

Drivers for Cloud Computing Adoption Scalability Elasticity Virtualization Lower Infrastructure Costs Availability Collaboration Risk Reduction Reliability Organizations have access to a large amount of resources that scale based on user demand Organization s can request, use, and release as many resources as needed based on changing needs Each user has a single view of the available resources, independently of how they are arranged in terms of physical devices The pay-per-use model allows an organization to only pay for the resources they need with basically no investment in the physical resources available in the cloud. There are no infrastructure maintenance or upgrade costs Organizations have the ability for the user to access data and applications from around the globe Organizations are starting to see the cloud as a way to work simultaneously on common data and information Organizations can use the cloud to test ideas and concepts before making major investments in technology In order to support SLAs (service-level agreements), cloud providers have reliability mechanisms that are much more robust than those that could be cost-effectively provided by a single organization

Barriers for Cloud Computing Adoption Security Interoperability Resource Control Latency Platform or Language Constraints Legal Issues The key concern is data privacy: organizations do not have control of or know where their data is being stored A universal set of standards and/or interfaces has not yet been defined, resulting in a significant risk of vendor lock-in The amount of control that the organization has over the cloud environment varies greatly All access to the cloud is done via the internet, introducing latency into every communication between the user and the environment Some cloud environments provide support for specific platforms and languages only There are concerns in the cloud computing community over jurisdiction, data protection, fair information practices, and international data transfer

Agenda Basic Cloud Computing Concepts Architectural Implications of Cloud Computing Final Thoughts

IaaS: Examples of Architecture and Design Questions What computation is performed in the cloud? A full application? Only certain functionality? What communication mechanisms exist between the consumer and the cloud resource? How are resource failures detected and communicated? How are SLA commitments maintained and monitored? What data is stored in the cloud? Is it synchronized with other sets of data? Are there data privacy concerns? What security mechanisms are provided by the cloud resource? Systems residing in the cloud or using resources from the cloud will have to be designed and architected to account for lack of full control over important quality attributes

PaaS: Examples of Architecture and Design Questions Where do external users authenticate? Will cloud resources always be active? Is a cloud bursting strategy appropriate? What data is stored in the cloud? Is it possible for the system to run in the cloud and the data to remain local? Are all system elements compatible with the cloud platform? Are adapters necessary?

SaaS: Examples of Architecture and Design Questions What type of client is used to interact with the SaaS resource? How does the cloud system fit with the existing infrastructure? What data adapters and transformers are necessary to interoperate with other systems? What additional mechanisms need to be put in place to monitor system performance and usage? Is the SaaS security architecture compatible with the organization s security architecture?

Cloud Consumer Example Decision # 1: Data Model Typical decisions of a distributed environment Local vs. Remote Total vs. Partitioned Distributed vs. Centralized Active Replication vs. Passive Replication Data Security Model Challenges Data privacy Data synchronization Performance www.jasonkolb.com

Cloud Consumer Example Decision # 2: User Authentication Model Authentication is the mechanism by which consumers and providers prove to one another that they are acting on behalf of specific users or systems Typical decisions of a distributed, multi-organizational environment Local vs. Remote Authentication Single Sign-On or Separate Authentication Local or Remote Identity Data Authentication Method Challenges Incompatible authentication methods Physical security of identity data Synchronization of identity data Auditing blogs.verisign.com

Cloud Consumer Example Decision # 3: Allocation of Functionality Decisions depend on the type of cloud implementation What functionality to deploy in the cloud? What functionality has to be implemented in addition to the functionality offered by the cloud provider? Security Management Abstraction layers, e.g. data access, transformations, adapters leogrilo.files.wordpress.com

Cloud Consumer Example Decision # 4: Cloud Bursting Refers to a system that is designed for average load, but is capable of load balancing to a cloud when it reaches its full capacity Decisions Activation, initialization and de-activation of the cloud resource State and data synchronization Computational elements to determine full capacity Computational elements for monitoring load and usage mccallioncom425.files.wordpress.com

Cloud Consumer Example Decision # 5: Cloud Resource Management Decisions Elements for failure detection and communication Elements for SLA monitoring Logging: where, what and when blogumn.com

Cloud Provider Example Decision #1: Multi-Tenancy 1 Mainly in SaaS implementations, a tenant is an organization that makes use of cloud resources Multi-tenancy requires Awareness of tenant context: the capability of recognizing the identity of the tenant requesting the resources based on message information as well as configuration data Data isolation: tenants should only have access to their own data Performance isolation: resource performance should conform to servicelevel agreements, regardless of the load on the system i.zdnet.com

Cloud Provider Example Decision #1: Multi-Tenancy 2 One option is to have one instance per tenant Option 1 Option 2 Option 3 Another option is to have multiple identical instances that are managed by a load balancer Another option is to have a single instance that uses tenant configuration data to provide tenant context Hybrid options are also possible

Cloud Provider Example Decision #2: Virtualization Strategy 1 Virtualization in general is the abstraction of computing resources, e.g. Network virtualization: division of available bandwidth into channels that can be assigned to a particular resource in real time Storage virtualization: combination of physical storage devices into what appears to be a single storage device, e.g. SAN (storage area network) Server virtualization: hiding of server resources (number and identity of individual physical servers, processors, and operating systems) from server users, e.g. VMs (virtual machines) Server Virtualization Example news.cnet.com/i/bto/20090528/virtualization_stack_270x258.jpg

Cloud Provider Example Decision #2: Virtualization Strategy 2 Server Virtualization Example Requires dedicated machine OS can execute other applications, e.g. custom monitoring applications However, there is a performance penalty Main question is How and when are virtual machines deployed, started, initialized, deactivated, replaced, managed and terminated?

Cloud Provider Example Decision #3: Resource Interfaces 1 Cloud APIs are not yet standardized, so each cloud provider has its own specific APIs for managing its services Currently, most Cloud APIs are SOAP- or REST-based

Cloud Provider Example Decision #3: Resource Interfaces 2 Supported Protocols Operations Functionality Configuration Management QoS Support Security Usability Configurability Sample Amazon EC2 Operations (IaaS) Create Image Stop Instances Create Security Group Monitor Instances Sample Google App Engine Operations (PaaS) Upload Application Code Authenticate User Send E-mail Sample Zoho.com Operations (SaaS) Set Up Application View Application Usage Data Embed in X

Agenda Basic Cloud Computing Concepts Architectural Implications of Cloud Computing Final Thoughts

Cloud Computing is at the Peak of Inflated Expectations Source: Gartner, Hype Cycle for Emerging Technologies, 2009

The Concept of Private Clouds is Starting to Appear Source: Gartner, Hype Cycle for Emerging Technologies, 2010

Final Thoughts 1 Cloud Computing is in essence an economic model It is a different way to acquire and manage IT resources There are multiple cloud providers the cloud is real Currently most cloud consumers are small enterprises Large enterprises are exploring private clouds The number of providers will most probably grow as people start seeing greater savings and improvements to reduce adoption barriers Cloud Computing adoption requires cost/benefit/risk analysis to determine What resources to move to the cloud (if any) What situations warrant use of cloud resources, even for one-time situations Implementation of private clouds vs. usage of public clouds What risks are associated with using resources on the cloud What risks are associated to providing resources in the cloud

Final Thoughts 2 Decisions from a cloud consumer perspective depend on Required control level Required security level Compatibility with local infrastructure Decisions from a cloud provider perspective depend on Market/user characteristics Established SLAs Available technology In general, these are not fully technical decisions Processes especially engineering practices Governance Cost/Benefit analysis askbobrankin.com

Cloud Provider and Tool References 3tera: http://www.3tera.com/ Akamai EdgePlatform: http://www.akamai.com/html/technology/edgeplatform.html Amazon Elastic Compute Cloud (EC2): http://aws.amazon.com/ec2/ Amazon Simple Storage Solution (S3): http://aws.amazon.com/s3/ Eucalyptus Systems: http://www.eucalyptus.com/ Force.com: http://www.salesforce.com/platform/ Google App Engine: http://code.google.com/appengine/ Google Apps: http://www.google.com/apps/intl/en/business/index.html IBM Computing On Demand: http://www-03.ibm.com/systems/deepcomputing/cod/ Microsoft Azure Services Platform: http://www.microsoft.com/azure/ Microsoft Live Mesh: http://www.mesh.com/ Salesforce.com: http://www.salesforce.com/crm/products.jsp Ubuntu: http://www.ubuntu.com/cloud Yahoo! Open Strategy (Y!OS): http://developer.yahoo.com/yos/intro/ Zoho: http://www.zoho.com/

Contact Information Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program Advanced Mobile Systems (AMS) Initiative Software Engineering Institute 4500 Fifth Avenue Pittsburgh, PA 15213-2612 USA Phone: +1 412-268-5851 Email: glewis@sei.cmu.edu WWW: http://www.sei.cmu.edu/about/people/glewis.cfm

This work was created in the performance of Federal Government Contract Number FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at 252.227-7013. This Presentation may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

As projects continue to grow in scale and complexity, effective collaboration across geographical, cultural, and technical boundaries is increasingly prevalent and essential to system success. SATURN 2012 will explore the theme of Architecture: Catalyst for Collaboration.