66

A Systematic Mapping Study on Cloud Computing

Embed Size (px)

DESCRIPTION

Apresentação de pré-defesa de mestrado, 04-Feb-2012, A Systematic Mapping Study on Cloud Computing

Citation preview

Page 1: A Systematic Mapping Study on Cloud Computing
Page 2: A Systematic Mapping Study on Cloud Computing

Outline q INTRODUCTION

q Problem & Research Questions q Objectives

q RESEARCH METHODOLOGY q Search Strategy q Data Source q Study Selection q Classification Scheme q Data Extraction Strategy

q RESULTS q FINAL CONSIDERATIONS

1/65

Page 3: A Systematic Mapping Study on Cloud Computing

INTRODUCTION

Page 4: A Systematic Mapping Study on Cloud Computing

What is the Cloud?

" is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. NIST

3/65

Page 5: A Systematic Mapping Study on Cloud Computing

Evolution of core concept

“...computing may someday be organized as a public utility just as the telephone system is

a public utility... The computer utility could become the basis of a new and important industry”

John McCarthy 1961-2011

4/65

Page 6: A Systematic Mapping Study on Cloud Computing

Evolution of core concept

5/65

Page 7: A Systematic Mapping Study on Cloud Computing

Evolution of core concept

6/65

Page 8: A Systematic Mapping Study on Cloud Computing

Evolution of core concept

7/65

Page 9: A Systematic Mapping Study on Cloud Computing

Evolution of core concept

8/65

Page 10: A Systematic Mapping Study on Cloud Computing

Comparing Gartner

9/65

Page 11: A Systematic Mapping Study on Cloud Computing

Global attention to the Cloud

q  Crisis 2008; q  Global economic crisis (today); q  The promise of Lower upfront IT costs [1]; q  Opportunities; q  New business models;

10/65

Page 12: A Systematic Mapping Study on Cloud Computing

The Problems

q  It gains are still unsure; q  conception of contracts of service [2] [3]; q  software architecture to develop a SaaS [6]; q  the data privacy [23]; q  agile process methodology [16]; q  LAWs [11] [12] [5];

11/65

Page 13: A Systematic Mapping Study on Cloud Computing

The Problems

12/65

About experiments from UFPE q  Jobs; q  software engineering; q  Business Models; q  Sustainability; q  Federated Clouds

Page 14: A Systematic Mapping Study on Cloud Computing

The Proposal

q  Combining systematic Mapping Studies [34] and Systematic Reviews [39] this study aims to map out the cloud computing area while its mainly problems, solutions and challenges, synthesizing available evidences to suggest important implications for practice, as well as, identifying research trends and open issues.

13/65

Page 15: A Systematic Mapping Study on Cloud Computing

The Main Question

q  What are the main problems and solutions in cloud computing area?

14/65

Page 16: A Systematic Mapping Study on Cloud Computing

The Sub-Question q  RQ1. Which challenges were found regarding to

economic problems? q  RQ2. What problems and solutions were found

regarding to SLA? q  RQ3. What are the cloud computing social impact? q  RQ4. What are the challenges found regarding to

infrastructures of datacenters and development of applications?

q  RQ5. What are the main challenges regarding to the Elastic property?

q  RQ6. What are the problems and solutions about data storage?

q  RQ7. How is performed the monitoring of services? q  RQ8. Which are the main security challenges?

15/65

Page 17: A Systematic Mapping Study on Cloud Computing

RESEARCH METHODOLOGY

Page 18: A Systematic Mapping Study on Cloud Computing

Overview

Fig. 1. The Systematic Mapping Process [34].

17/65

Page 19: A Systematic Mapping Study on Cloud Computing

Search Strategy

Fig. 2.Cycle for refine Terms

18/65

Page 20: A Systematic Mapping Study on Cloud Computing

STRINGS

19/65

Page 21: A Systematic Mapping Study on Cloud Computing

Data Source

q  ACM Digital library, ScienceDirect, IEEE Xplore, COMPENDEX, SCOPUS, and DBLP;

q  All search string were checked by more than one author.

q  Snowballing q  Journals and Events referred by Researchers

20/65

Page 22: A Systematic Mapping Study on Cloud Computing

Including and Excluding

INCLUDING §  Research that explores Cloud computing as mainly focus; §  Studies that address utility computing linked to Cloud computing; §  Studies that address comparison among cloud and grid computing; §  Books with access to chapters.

EXCLUDING §  Studies that dont have Cloud as the main focus; §  Duplicated Studies; §  Keynotes and Whitepapers.

21/65

Page 23: A Systematic Mapping Study on Cloud Computing

Classification

22/65

Page 24: A Systematic Mapping Study on Cloud Computing

Stages of Process

23/65

Page 25: A Systematic Mapping Study on Cloud Computing

RESULTS

Page 26: A Systematic Mapping Study on Cloud Computing

q  Investments grossly underutilized[49];

u Industry •  Servers: 30-40%; •  Desktops: less than 5%;

u Academy •  maintainability of scientific projects[7][15];

25/65

RQ1 - Which challenges were found regarding to economic problems?

Page 27: A Systematic Mapping Study on Cloud Computing

RQ1 - Which challenges were found regarding to economic problems?

26/65

Page 28: A Systematic Mapping Study on Cloud Computing

Flexibility of Cloud deployment Models [51].

27/65

RQ1 - Which challenges were found regarding to economic problems?

Page 29: A Systematic Mapping Study on Cloud Computing

q  Billing; q  SMEs flexibility; q  Choice of Tecnology (Pandora Planning System )

28/65

RQ1 - Which challenges were found regarding to economic problems?

Page 30: A Systematic Mapping Study on Cloud Computing

PROBLEMS §  the greatest issue was the penalties as a consequence of

contracts broken [2] [3] [4] [31] [53]; §  Transparency on contracts [4] [53];

SOLUTIONS §  MONITORING; §  Algorithms: Weighted Round Robin (WRR) and First In First Out

(FIFO)[53] §  SLA among components of System

29/65

RQ2 - What problems and solutions were found regarding to SLA?

Page 31: A Systematic Mapping Study on Cloud Computing

USER §  “In terms of service availability, can you get you vendor to sign

a Service-level agreement?”; §  “What happens if the SLA is not met?”; and §  “How data is handled when the service contract ends, the type

of data returned to the company?”.

30/65

RQ2 - What problems and solutions were found regarding to SLA?

Page 32: A Systematic Mapping Study on Cloud Computing

E-Government: §  For [10], cloud computing platform can help the

Government on its procedures, reducing the delays.

31/65

RQ3 - What are the cloud computing social impact?

Page 33: A Systematic Mapping Study on Cloud Computing

32/65

RQ3 - What are the cloud computing social impact?

Page 34: A Systematic Mapping Study on Cloud Computing

LAWS: §  In [11], the author affirms that due to nature of cloud

computing (distributed and flexible), collects evidences about facts is a hard work. This is because a data inserted on cloud environments could be encrypted before entering in cloud platform, for example. Or the stored data could be globally disposing among countries. Then, even though an authority solicits information about a fact, it will be a problem.

JOBS: §  With the growing use of technologies such as Hadoop

and Virtualization[14] [55]. GREEN IT

§  [32] the author reported that energy saving dont occur for all cases on his experi- ence.

33/65

RQ3 - What are the cloud computing social impact?

Page 35: A Systematic Mapping Study on Cloud Computing

SOFTWARE(choice of a software architecture to develop a SaaS [6]) §  Liquid Architecture. §  MULTI-TENANCY[1]

34/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

Page 36: A Systematic Mapping Study on Cloud Computing

35/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

Page 37: A Systematic Mapping Study on Cloud Computing

36/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

Page 38: A Systematic Mapping Study on Cloud Computing

Classic Database Architecture [6] Distributed Control [6]

37/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

Page 39: A Systematic Mapping Study on Cloud Computing

RESERVOIR:

§  A common referred [9] [57] [58] work to guide stakeholders in the development of architectures in the Cloud was the RESERVOIR framework [59].

38/65

RQ4 - What are the challenges found regarding to infrastructures of datacenters and development of

applications?

Page 40: A Systematic Mapping Study on Cloud Computing

q  Best effort §  BROKER(cloud Busting)

39/65

RQ5 - What are the main challenges regarding to the Elastic property?

Page 41: A Systematic Mapping Study on Cloud Computing

Broker Components[8]

40/65

RQ5 - What are the main challenges regarding to the Elastic property?

Page 42: A Systematic Mapping Study on Cloud Computing

Load Balancer and Scalling Point [63]

41/65

RQ5 - What are the main challenges regarding to the Elastic property?

Page 43: A Systematic Mapping Study on Cloud Computing

A standard feedback control system [64]

42/65

RQ5 - What are the main challenges regarding to the Elastic property?

Page 44: A Systematic Mapping Study on Cloud Computing

RQ6 - What are the problems and solutions about data storage?

§  Because concentrating of high quantity of requests to storage system, I/O is an evident problem on Cloud Computing [67] [68].

SOLUTION §  Some authors [69] [70] proposes P2P model such as

alternative to solve that problem. §  When the user accesses the storage system during

the reserved time, the requested performance is guaranteed because the storage system allocates the resources according to the reservation, and prioritizes I/O re- quests for the reserved access. [71].

I/O PROBLEM

43/65

RQ6 - What are the problems and solutions about data storage?

Page 45: A Systematic Mapping Study on Cloud Computing

q  For guarantee the integrity of data on Cloud, the environment needs to adopt a Proof Of Integrity (POI) protocol [74] [75]. Such protocol prevent the cloud storage archives from misrepresenting or modifying the data stored at it without the consent of the data owner by using frequent checks on the storage archives. However, [74] emphasis the possible overhead generated by POI system.

q On-Line Analytical Processing (OLAP) - (MAPREDUCE) [77] q  [78] presents a how to about SQL on Cloud.

44/65

RQ6 - What are the problems and solutions about data storage?

Page 46: A Systematic Mapping Study on Cloud Computing

q  For [57], two approaches can be used in monitoring context;

§  The first the monitoring system is charged for observes

behaviors on infrastructure based on Hard disk, RAM memory and Virtual Machines resource usage.

§  The second is charged for observes point in applications modules such as quantity of users logged or time of life of threads.

45/65

RQ7 - How is performed the monitoring of services?

Page 47: A Systematic Mapping Study on Cloud Computing

q  Another suggestion is the usage of Grid Monitoring Architecture (GMA) a project developed by Global Grid Forum [80]

46/65

RQ7 - How is performed the monitoring of services?

Page 48: A Systematic Mapping Study on Cloud Computing

q  FEDERATED CLOUD RESTFULL:(Paul, Mariah, Read, CloudStorage, /root/)[24] q  [82] RSA algorithm

q Health Cloud must adopt the security role as a mission and not as a property (information security). That factor gains emphasis when handling with Health care [26] [27] context.

47/65

RQ8 - Which are the main security challenges?

Page 49: A Systematic Mapping Study on Cloud Computing

q  patching According to [84] a good way to resolves that problem is creating a centralized flow of update. q Multi-Tenancy isolation among tenants on multi-tenant architecture [85] [86];

48/65

RQ8 - Which are the main security challenges?

Page 50: A Systematic Mapping Study on Cloud Computing

Results – Analysis

49/65

Page 51: A Systematic Mapping Study on Cloud Computing

Results – Analysis

50/65

Page 52: A Systematic Mapping Study on Cloud Computing

Results – Analysis

51/65

Page 53: A Systematic Mapping Study on Cloud Computing

Results – Analysis

52/65

Page 54: A Systematic Mapping Study on Cloud Computing

Results – Analysis

53/65

Page 55: A Systematic Mapping Study on Cloud Computing

Results – Analysis

54/65

Page 56: A Systematic Mapping Study on Cloud Computing

Results – Analysis

55/65

Page 57: A Systematic Mapping Study on Cloud Computing

Results – Discussion

q  ADOPTION(GRID OR CLOUD); q  PROMISSE OF LOW COST(needs more evidence); q  HOW MUCH ?(SLA MMORPG) q  WARNING: SLA!!! q  GREEN IT; q  REUSE(APEX-PAAS 70% gain on development); q  SCIENCE; q  BROKER SYSTEM(QOS!!); q  GOVERNEMNTs; q  LAWS vs CLOUD; q  Where are BILLING, MONITORING, GREEN IT?

56/65

Page 58: A Systematic Mapping Study on Cloud Computing

Results – Discussion

q  SAAS: model-driven [44] Database, mul-titenant maturity levels [1], Service-Oriented Architecture [14] and RESTFull model [24]; q MARKET REQUIREMENTS VS CLOUD; q  STANDARDs

57/65

Page 59: A Systematic Mapping Study on Cloud Computing

FINAL CONSIDERATIONS

Page 60: A Systematic Mapping Study on Cloud Computing

THREATS OF VALIDITY

q  Research Questions; q  Publication Bias; q  Conduct the Search(ACM

PROBLEM); q Data Extraction;

59/65

Page 61: A Systematic Mapping Study on Cloud Computing

Conclusion

q  Investigate State-of-the-art and guide to future researches;

q  Cloud haves many opportunities; q  Some questions of Security (resolving). q  Care with Low Cost Promisse; q  cloud computing is not entirely adequate to the market q  Social machines can help to develop Cloud

60/65

Page 62: A Systematic Mapping Study on Cloud Computing

REFERENCES

Page 63: A Systematic Mapping Study on Cloud Computing

[1] Cadan, K, Selcuk; ALi, Wen-Syan; Phan, Thomas; Zhou, Minqi(2009). Frontiers in Information and Software as Ser- vices. Conference ICDE 2009. [2] Nae, Vlad; Prodan, Radu; Iosup, Alexandru(2011). A New Business Model for Massively Multiplayer Online Games. Conference ICPE 2011. [3] Luo, Min; Zhang, Liang-Jie; Lei, Fengyun (2010). An Insuan- rance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing. Conference ICWS 2010. [4] Kandukuri, Balachandra Reddy; Ramakrishna Paturi; Rak- shit, Atanu (2009). Cloud Security Issues. SCC 2009. [5] Cho, Brian; Gupta, Indranil (2010). New Algorithms for Planning Bulk Transfer via Internet and Shipping Networks. Conference ICDCS 2010. [6] Kossmann, Donald; Kraska, Tim; Loesing, Simon(2010). An Avaluation of Alternative Architectures for Transaction Pro- cessing in the Cloud. In Conference SIGMOD 2010. [7] Kondo, Derrick; Javadi, Bahman;Malecot, Paul; Cappello, Franck; Anderson, David P (2009). Cost-benefit analysis of cloud computing versus desktop grids. In conference IPDPS 2009. [8] Nair, Srijith K.;Porwal, Sakshi; Dimitrakos, Theo; Ferrer, Ana Juan; Tordsson, Johan; Sharif, Tabassum; Sheridan, Craig; Rajarajan, Muttukrishnan; Khan, Afnan Ullah(2010). Towards Secure Cloud Bursting, Brokerage and Aggregation. In ECOWS 2010. [9] Lin, F.T.; Shih, T.S. (2010). Cloud computing: The emerging computing technology. In Journal ICIC International , vol. 1, number 1, 2010. [10] Zissis, Dimitrios; Lekkas, Dimitrios (2011). Securing e- Government and e-Voting with an open cloud computing architecture. In Journal Government Information Quarterly, vol. 28, issue 2, p.239-251, 2011. [11] Taylor, M; Haggerty, J; Gresty, D; Hegarty, R (2010).Digital evidence in cloud computing systems. Computer Law and Security Report Review 26, p. 204-208, 2010. [12] Doelitzscher, Frank; Reich, Christoph; Sulistio, Anthony(2010). Designing Cloud Services Adhering to Government Privacy Laws. In Conference CIT 2010 [14] Hutchinson, Chuck; Ward, Jeff; Castilon, Karen (2009). Nav- igating the Application Architecture. In Journal IT Profes- sional, Volume 11, Issue 2, p. 18-22, 2009. [15] Hou, Zhengxiong; Zhou, Xingshe (2010).ASAAS: Application Software as a Service for High Performance Cloud Comput- ing. In conference HPC 2010. [16] Guha, R; Al-Dabass, D(2010). Impact of Web 2.0 and Cloud Computing Platform on Software Engineering. In Conference ISED 2010. [23] Zhou, Minqi; Zhang, Rong; Xie, Wei; Qian, Weining; Zhou, Aoying (2010). Security and Privacy in Cloud Computing: A Survey. In conference SKG 2010. [24] Calero, J.M.A; Edwards, N; Kirschnick, J; Wilcock, L; Wray, M (2010). Toward a Multi-Tenancy Authorization System for Cloud Services. In Journal Security & Privacy, IEEE, vol 8,issue 6, 48-55, 2010. [25] Popovic, K. ;Hocenski, Z. (2010). Cloud computing security issues and challenges. In conference MIPRO 2010. [26] Lhr, Hans; Sadeghi, A.R.; Winandy, Marcel (2010). Securing the e-health cloud. In Conference IHI 2010. [31] Chaves, S. Aparecida; Westphall, C. Becker; Lamin, F. Ro- drigo (2010). SLA Perspective in Security Management for Cloud Computing. In Conference ICNS 2010.

……………

Page 64: A Systematic Mapping Study on Cloud Computing

[32] Baliga, J; Ayre, R.W.A; Hinton, Kerry; Tucker, R.S. (2010). Green Cloud Computing: Balancing Energy in Processing, Storage and Transport. In Journal Proceedings of the IEEE, vol. 99, No. 1, 2010. [34] K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, Systematic mapping studies in software engineering, in EASE 08: Pro- ceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, University of Bari, Italy, 2008. [39] B. Kitchenham and S. Charters, Guidelines for performing Systematic Literature Reviews in Software Engineering. In conference EBSE 2007. [44] Menzel, Michael; Warschofsky, Robert; Thomas, Ivonne; Willems, Christian; Meinel, Christoph (2010). The Service Security Lab: A Model-Driven Platform to Compose and Ex- plore Service Security in the Cloud. In Conference SERVICES- I 2010. [49] Marston, Sean;Li, Zhi; Bandyopadhyay, Subhajyoti; Zhang, Juheng; Ghalsasi, Anand (2010). Cloud computing-The busi- ness perspective. Journal Decision Support Systems, Vol 51, Issue 1, p.176-189, 2010. [51] Shi, A; Xia, Y; Zhan, H (2010). Applying cloud computing in financial service industry. In Conference ICICIP 2010. [53] Boloor, Keerthana; Chirkova, Rada; Viniotis, Yannis; Salo, Tiia(2010). Dynamic Request Allocation and Scheduling for Context Aware Applications Subject to a Percentile Response Time SLA in a Distributed Cloud. Conference CLOUDCOM 2010. [55] Babu, Shivnath (2010). Towards Automatic Optimization of MapReduce Programs. In Conference SoCC 2010. [57] Elmroth, Erik; Larsson, Lars(2009). Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds. In Conference GCC 2009 [58] Costa, Rostand; Brasileiro, Francisco; Filho, Guido Lemos; Souza, Dnio Mariz(2009). OddCI: On-Demand Distributed Computing Infrastructure. Conference MTAGS 2009 [59] Chapman, Clovis; Emmerich, Wolfgang; Mrquez, Fermn Galn; Clayman, Stuart;Galis, Alex(2011). Software architec- ture definition for on-demand cloud provisioning. Journal Cluster Computing, vol 14, p. 1-22. [63] Mehta, Hemant Kuma; Kanungo, Priyesh; Chandwani, Manohar (2011). Performance Enhancement of Scheduling Algorithms in Clusters and Grids using Improved Dynamic Load Balancing Techniques. In Conference WWW 2011. [64] Li, Qiang; Hao, Qinfen; Xiao, Limin; Li, Zhoujun (2009). Adaptive Management of Virtualized Resources in Cloud Computing Using Feedback Control. In Conference ICISE 2009. [67] Wang, Jianzong; Varman, Peter(2010). Avoiding Performance Fluctuation in Cloud Storage. In conference HiPC 2010. [68] Sivathanu, Sankaran; Liu, Ling; Yiduo, Mei; Pu, Xing (2010). Storage management in virtualized cloud environment. In conference CLOUD 2010. [69] Ke, Xu; Meina, Song; Xiaoqi, Zhang; Junde, Song (2009) .A cloud computing platform based on P2P. In conference ITIME 2009.

……………

Page 65: A Systematic Mapping Study on Cloud Computing

[70] Cheng, Kun-Yi,Wu, Chun-Hsin (2009). Peeraid: A resilient path-aware storage system for open clouds. In conference SOCA 2009. [71] Yusuke, Tanimura; Koie, Hidetaka; Tomohiro,Kudoh; Isao, Kojima; Yoshio ,Tanaka (2010). A Distributed Storage System Allowing Application Users to Reserve I/O Performance in Advance for Achieving SLA. In Conference GRID 2010 [74] Kumar, Sravan R.; Saxena, A.(2011).Data integrity proofs in cloud storage. In conference COMSNETS 201. [75] Zheng, Qingji; Xu, Shouhuai (2010). Fail and Dynamic Proofs of Retrievability. In Conference CODASPY 2010. [77] Hadoop. Welcome to MapReduce. http://hadoop.apache.org/mapreduce/. [78] Johnson, J.L. ; (2009). SQL in the Clouds. In Journal Comput- ing in Science & Engineering, vol. 11, issue 4, 2009. [80] B. Tierney, R. Aydt, D. Gunter, W. Smith, V. Taylor, R. Wolski, and M. Swany(2002). A Grid Monitoring Architecture, GWD-I (Informational), Aug. 2002. [Online]. Available: http://www-didc.lbl.gov/GGF-PERF/GMA- WG/papers/GWD-GP-16-3.pdf. [82] Jianhong, Z.; Hua, Chen (2010). Secuirty Storage in the Cloud Computing : A RSA-based Assumption Data Integrity Check without Original Data. In Conference ICEIT 2010. [85] Li, X.Y.; Shi, Yong; Guo, Y.; Ma, W. (2010). Multi-Tenancy Based Access Control in Cloud. In Conference CiSE 2010. [86] Bertram, S.; Boniface, M.; Surridge, M.; Briscombe, N.; Hall- May, M. (2010). On-Demand Dynamic Security for Risk- Based Secure Collaboration in Clouds. In conference CLOUD 2010.

Page 66: A Systematic Mapping Study on Cloud Computing