You are on page 1of 5

TEAM ID:9847

ABSTRACT
Cloud computing is the latest effort in delivering computing resources as a service. It represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale data centres or clouds. Cloud computing has been trying to make its impact since 1998 Internet boom. One of the main reasons for it not being able to make a big impact is "Customer perception about Data Availability". In traditional backup model, the application server and data storage are local. The backup is remote for availability. In cloud computing it should be the other way round. App and storage, remote and backup should be local to customer. Whilst cloud computing is gaining growing popularity in the IT industry, academia appeared to be lagging behind the rapid developments in this field. Cloud Computing frequently is taken to be a term that simply renames common technologies and techniques that we have come to know in IT. It may be interpreted to mean data centre hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that permit near real time, policy-based control of computing resources.

Cloud computing represents a different way to architect and remotely manage computing resources. In traditional backup, the backup server handles the backup clients (application and database servers, & storage devices) and desktops/workstations. In Tenacive Backup, the backup server handles the workstations and clients as its application and storage systems. This is a fundamental paradigm shift that needs different kind of WAN optimized algorithms for metadata.

1.0 PROBLEMS FACED BY CLOUD USERS


Cloud computing has been trying to make its impact since 1998 Internet boom. One of the main reasons for it not being able to make a big impact is "Customer perception about Data Availability". In traditional backup model, the application server and data storage are local. And backup is remote for availability. In cloud computing it should be the other way round. App and storage remote and backup should be local to customer. This provides a

psychological safety for the customer that the data is available with him all the time. This paper talks about Tenacive backup model that Cloud Computing can use to provide seamless data availability locally to customer.

1.1 TRAFFIC MANAGEMENT AND ANALYSIS


Analysis of data traffic is important for todays data centers. For example, many web applications rely on analysis of traffic data to optimize customer experiences. Network operators also need to know how traffic flows through the network in order to make many of the management and planning decisions. However, there are several challenges for existing traffic measurement and analysis methods in Internet Service Providers (ISPs) networks and enterprise to extend to data. centers. Firstly, the density of links is much higher than that in ISPs or enterprise networks, which makes the worst case scenario for existing methods. Secondly, most existing methods can compute traffic matrices between a few hundreds end hosts, but even a modular data center can have several thousand servers. Finally, existing methods usually assume some flow patterns that are reasonable in Internet and enterprises networks, but the applications deployed on data centers, such as Map Reduce jobs, significantly change the traffic pattern. Further, there is tighter coupling in applications use of network, computing, and storage resources, than what is seen in other settings.

Currently, there is not much work on measurement and analysis of data center traffic. Report on data center traffic characteristics on flow sizes and concurrent flows, and use these to guide network infrastructure design. Data security Data security is another important research topic in cloud computing. Since service providers typically do not have access to the physical security system of data centers, they must rely on the infrastructure provider to achieve full data security. Even for a virtual private cloud, the service provider can only specify the security setting remotely, without knowing whether it is fully implemented. The infrastructure provider, in this context, must achieve the following objectives: (1) Confidentiality, for secure data access and transfer, and (2) Auditability, for attesting whether security

Setting of applications has been tampered or not. Confidentiality is usually achieved using cryptographic protocols, whereas auditability can be achieved using remote attestation techniques. Remote attestation typically requires a trusted platform module (TPM) to generate non-forgeable system summary (i.e. system state encrypted using TPMs private key) as the proof of system security. However, in a virtualized environment like the clouds, VMs can dynamically migrate from one location to another; hence directly using remote attestation is not sufficient. In this case, it is critical to build trust mechanisms at every architectural layer of the cloud. Firstly, the hardware layer must be trusted. Secondly, the virtualization platform must be trusted using secure virtual machine monitors.

2.0 NEW ERA OF CLOUD COMPUTING


In traditional backup, the backup server handles the backup clients (application and database servers, & storage devices) and desktops/workstations. In Tenacive Backup, the backup server handles the workstations and clients as its application and storage systems. This is a fundamental paradigm shift that needs different kind of WAN optimized algorithms for metadata. The paper presents a sample.

3.0 APPLICATIONS OF CLOUD COMPUTING


It will be necessary to rapidly set up a temporary collaboration network enabling network members to securely interact online, where interaction could imply interoperability with back office systems as well as human oriented exchanges all in a matter of hours. Examples that come to mind include emergency medical scenarios, global supply chains and other business process networks. Policies defining infrastructure and business constraints will be varied, so policy must be external to, and must interact with, deployed functionality.

Business interactions have the potential to become more complex than personal transactions. Because they are likely to be formed as composite services, and because services on which they depend may be provisioned in multiple clouds, the ability to provision and uniformly manage composite cloud services will be required, as will be the ability to ensure that these services satisfy specified business policy constraints.

The way that users and access control are managed in typical applications today is no longer flexible enough to express roles and responsibilities that people will play in nextgeneration business interactions. Roles will be played by people outside of or across corporate boundaries in an online context just as frequently as they are inside. Access control and the management of roles and responsibilities must be externalized from business functionality so that it becomes more feasible to composite functional behaviour into distributed service oriented applications that can be governed by externalized policy. A cloud should be dynamically configurable: configuration should be automatable in varying and unpredictable, possibly even event-driven, conditions. Systems management technologies for clouds must integrate constraints on business with constraints on infrastructure to make them manageable in aggregate. - A cloud should be able to dynamically provision itself and optimize its own construction and resource consumption over time. - A cloud must be able to recover from routine and extraordinary events that might cause some or all of its parts to malfunction. - A cloud must be aware of the contexts in which it is used so that cloud contents can behave accordingly to be used to determine priority access to physical resources. Application platforms today are unaware of their usage context, but business functionality in next-generation platforms will have to be managed with context in mind. A cloud must be secure, and it must be able to secure itself. Delivering services over the Internet. The rise of cloud computing is rapidly changing the landscape of information technology.

3.1 CONSIDERATIONS OF A CLOUD


4.0 SUMMARY
Cloud computing has recently emerged as a compelling paradigm for managing and ultimately turning the long-held promise of utility computing into a reality. However, despite the significant benefits offered by cloud computing, the current technologies are not matured enough to realize its full potential. Many key challenges in this domain, including automatic resource provisioning, power management and security management, are only starting to receive attention from the research community. Therefore, we believe there is still tremendous opportunity for researchers to make ground breaking contributions in this field, and bring significant impact to their development in the industry.

5.0 BIBLIOGRAPHY
1.CLOUD PERSPECTIVES BY DELOITTE [Page no: 1,14-17]
cloud.pubs.dbs.uni-leipzig.de/sites/clouds.pubs.dbi..../fulltext.pdf

2. TECHNICAL ASPECTS OF CLOUD COMPUTING BY I.I.SRIRAM [Page no: 1,9]


arxis.org/ftp/arxis/papers/1001/1001.3259.pdf

You might also like