Cloud Computing: Deployment Issues For The Enterprise Systems
Cloud Computing: Deployment Issues For The Enterprise Systems
ORG
61
MS Student, Department of Computer Science & IT, The Islamia University of Bahawalpur, PAKISTAN
MS Student, Department of Computer Science & IT, The Islamia University of Bahawalpur, PAKISTAN
Assistant Professor, Department of Computer Science & IT, The Islamia University of Bahawalpur, PAKISTAN
Abstract Cloud computing has developed from being a gifted commerce idea to one of the top geared sector of the Information Technology. Now, declined organizations are progressively introducing themselves in this technology in order to achieve reliable services at minimal cost. But as small and medium size business are looking forward to adopt least economical computing resources for their business applications, there is a need to identify all the issues while deploying it. The paper highlights some of most critical issues along with some mitigating steps in order to achieve rewarding deployment. This also describes some future development work of under laying concept. Keywords: IaaS, PaaS, SaaS
started, By mid-2008, cloud computing achieved status in media, and many interconnected proceedings happened. To elucidate, Cloud Computing is same in concept of buying a land, constructing a building and then rent it out as whole or by portion. In cloud computing, supplier keeps the software on internet which is then used, paying only for the used services, by end users. There is no comprehensive definition of cloud computing. So far, the simplest operational description of cloud is Computing paradigm where services and data reside in shared resources in scalable data centers, and those services and data are accessible by any authenticated device over the internet [7][14]. The remainder of this paper is organized as follows: Section 2 presents the overview of Cloud Computing. Section 3 is a comparison of Grid and Cloud computing. Section 4 is about the level of Cloud. In section 5 we discuss the advantages of cloud computing. Section 6 is about the adaption issues. Section 7 is about the migration steps and section 8 presents the conclusion.
1. Introduction
The History of Cloud computing notion in on track from 1960, [1] When John McCarthy proposed the model of computation as a public utility. First public usage of the term Cloud as a allegory for the internet, appeared in MIT Published paper, in 1996. [2] In 1999, the first step toward this modern term was taken by Salesforce.com, which led the way of delivering business applications through a web. In 2002, Amazon introduced a collection of cloud-based services comprising storage and computation via the Amazon Mechanical Trunk [3]. Mean while, IBM adopted this model in their applications and showed the new computing (Grid, pervasive computing, automated computing and utility computing) methods. The first widely accessible web application was Elastic Compute cloud (EC2) by Amazon, as a commercial web service that let small businesses and individuals to lease computers on which they can enjoy their own computer applications. [4] In 2007, Google, IBM, and a large number of universities get on a huge scale cloud computing research project, [5] around the time the term
2. Overview Computing
of
Modern
Distributed
The goal of distributed computing is to solve large computational problems. These are popular due to two main reasons: First, the nature of the problem requires using communication network that connects several computers and second the use of distributed system is beneficial for practical reasons [14]. The following are the foundations for the distributed computing: a- Remote Communication. b- Fault tolerance. c- High availability.
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
62
d- Remote information access. e- Security and privacy. Figure 1below shows different types of distributed computing:
applications for knowledge discovery. The basic services of grid computing are communication, authentication, information and resource management. This is not a new concept but not yet perfect. People are still working on creating, establishing and implementing standards and protocols. The applications of grid computing are limitless. The main challenges are: Resource sharing & coordinated problem, Coordinated problem solving in dynamic, Multi-institutional virtual organizations, Data protection, No clear standard, Better understanding as simple as possible, Difficult to develop, Lack of gridenabled software, Centralized management, and the limited number of users are allowed the full access of network otherwise the control node will be flooded with processing requests which can create deadlock situation [12][15].
It is a business model in which a company outsources its computer support to other company. This support can be in the form of processing power, storage, hardware and software applications. The major advantage of utility computing is convenience because client has not to buy all hardware and licensed software for his business. He has to rely on another party to provide these services. The main issues are: This type of computing model is suitable for medium or large scale enterprise, not suitable for small business. Another main disadvantage of utility computing is reliability i.e. clients may hesitate to hand over duties to a smaller company where they feel the lost of data. It is an easy target of hackers. The major challenge in utility computing is that the consumers are not educated about its service. Its awareness is not very widespread [13][15].
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
63
Service) and PaaS (Platform as a Service) [9], where users can strike into these services from Web browsers through Internet formulates them cloud services.
2.
3.
4.
5.
cloud saves cost on important business applications and managed by SLA. On one hand where the cloud makes better security and observation within a central data access, besides, it provides usage of automated system interfaces. User does not need to care about backend engineering, maintenance and troubleshooting of ongoing operations. The idea is flourishing every coming day with great success in the upcoming time, as now offshore services are well-liked more than ever and industrialists are putting their money in the low capable countries in term of technology advancement and then sending off their cloud computing environment world wide. In cloud computing, customers using web applications, access the environment and services retained by a 3rd party. As a result, the idea of offshore software development in least economic IT countries is running at enormous pace as developers can access the utility worldwide, at any time from a handheld device, PC, or a laptop, history making. Cloud computing is a thought that is based on transforming the stack of IT away from firms into the hands of cloud providers. It buttresses a culture of modernization by eradicating a major fraction of the economic risks linked with bearing out archetype of new ideas.
6. ADAPTATION ISSUES
The following are the adaptation issues of cloud computing: 1. If the customers are given privilege to control over data in cloud, any wrong transaction may cause performance loss, while transferring the operational data in order to sustain the link between the clients in an organization. 2. Most companies are worried about security of their business data in the publicly accessed cloud environment. A key barrier is the security of the data during transportation to other public cloud and within the cloud. The threat of shoulder surfing and other social attack are same as it was in old environment. Another vital issue is data persistency. Companies need to contractually make it certain that the data has really been deleted by provider when it is asked to be deleted. 3. Performance of the web-based application is totally dependent on internet speed and server performance of providers, as the cloud server may be inundated, and a variety of users along the network could be struck, too. If internet
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
64
4.
5.
6.
connection is slow or you are in the areas where you dont have a reliable or high speed connection, even some times with faster connection its very hard to get processing performance from these services. On the top there is no comparison between internet speed and system processing speed, as system always has far more better processing for application reside in it. You have to use what a provider is willing to provide. Basic network security is faulty at its finest form. Even with current practices, cyberterrorist can hit a system and generate chaos within no time. According to several experts, high-tech and cyber crime is becoming more sophisticated and target oriented, as Peter Yapp, head of forensics at consultancy Control Risks, says the credit critical situation is already opening for more spotted frauds, and evidently at higher levels, as now more educated and skilled people are unemployed who may cause further cyber crime, and there is more opportunity to attack than last ten years [11]. The virtual machines have a seldom discussed flaw. Virtual machines, which execute same as physical machines but are replicated with software, have lesser resources of entropy (e.g. Linux virtual machines take millisecond time on their internal clocks to get random number) and that source isn't sufficient to produce wellbuilt keys for encryption. In other words, all the time, virtual machines don't have sufficient contact to the indiscriminate numbers required to correctly encrypt data [10]. Legal compliance requirements are not relaxed. In order to restrict the risk of loss, it is more essential for the parties to ensure the proper and secure contract. The cloud environment may create matchless risks of superior coverage. The technology used (e.g. a distributed computing environment), may create it hard to trace the data. Secondly, the parties are situated in unlike jurisdictions and legal regime.
2. 3. 4. 5. 6. 7. 8.
9.
Do a careful research for possible solutions and calculate their timely effect not just the initial cost. Be alert about updates and assure that users have limited access privileges. Figure out all interlinked providers connected to particular Cloud service provider to inquire, exactly which have access to your data. Request for exclusion monitoring systems Ask provider for maintaining your security polices along with providers owned policies, during the period of services. Plan out, the arrangement for an independent security audit of service provider. Make it sure, that the data being transferred is protected and secured by standard security techniques and managed by appropriate professionals. Find out service availability assurances and consequences.
8. Conclusion
Cloud Computing guarantees momentous paybacks, but currently there are some privacy, security and other hurdles that put a stop to extensive organizational adjustment of a public cloud. In addition the cost advantages for huge enterprises have not yet been noticeably confirmed. The center of attention in Cloud development is the emergent of the cloud from the indoors (Private Cloud) to outdoors (Public Cloud). This paper keenly observed, to describe that the major advantages and disadvantages seen by cloudbased applications deploying in small and medium organizations. At each evolutionary stage for enterprise systems and the continuing deployment of ever more cloud-based applications will reach a critical mass, before it becomes effectively main stream. But that day is coming.
Future Work
There are different research areas surrounded by Cloud Security from official characteristics to novel methods. Cloud Privacy and Trust are further connected regions of prospective research (e.g. measures of necessary and sufficient, centralized or decentralized security, Single handed security management,). Some of proposed areas may be brought under consideration. 1. Development is to develop and assessing methods to let mapped into proper low-level
7. MIGRATION STEPS
The following are the migration steps: 1. Develop an iterative policy for migration form conventional environment to Cloud environment. 2. trials, specified high-level attributes and their consequences to be considered and accounted, much required.
3.
Explore realistic issues related to data relocation in the cloud and propose method to state policies for a data management system foundation.
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
65
4.
5.
6.
Many web2.0 and cloud applications have a social aspect to them (e.g., groupware, e-mail). The aim of this development is to examine the utilization of social network study to progress these applications, as currently it might not be achievable to decide where to cache the huge data? Constraint-Based Cloud Management must be mechanical - but generating quality management assessments for a cloud of momentous extent is a tricky job. Future work needed to apply constraint programming techniques to answer this dilemma professionally. The development is to engage reworking the systematic model to hold Cloud Computing and find out trials and dimensions, to compare the awareness with earlier work done on Web and cloud computing, as technology improved education settings always put up with capricious and erratic max out demands that are much more than their customary load.
References
[1] McCarthy, J. , Recursive functions of symbolic expressions and their computation by machine, Communications of the ACM 3(4):184-195, 1960. [2] Sharon Eisner Gillett, Mitchell Kapor, The Selfgoverning Internet, Coordination by Design, Coordination and Administration of the Internet, Workshop at Kennedy School of Government, Harvard University September 810, 1996, Coordination of the Internet, edited by Brian Kahin and James Keller, MIT Press, 1997. [3] Amazonmechanical Turk, Artificial Intelligence, https://www.mturk.com/mturk/welcome. [4] JOHN MARKOFF, Internet Critic Takes on Microsoft, The Newyork Time, Technology, http://www.nytimes.com/2001/04/09/technology/09HAIL. html? ex=1217563200&en=7c46bdefb6a8450a &ei=5070, Monday, April 9, 2001. [5] Scott Hazelhurst , Scientific Computing using Virtual high-Performance Computing: A Case Study using the Amazon Elastic Computing Cloud,. ACM International Conference Proceeding Series; Vol. 338. [6] STEVE LOHR, Google and I.B.M., Join in Cloud Computing Research, http://www.nytimes.com/2007/10/08/technology/08cloud. html?_r=2&ex=1349496000&en=92627f0f65ea0d75&ei= 5090&partner=rssuserland &emc=rss&oref=slogin, Published: October 8, 2007. [7] Developing an Enterprise cloud computing strategy, Intel Information technology, Computer Manufacturing cloud computing, at www.intel.com/IT. [8] Daniel Numi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman, Lamia Youseff, Dmitrii
Zagorodnoy, The Eucalyptus Open-Source CloudComputing System, CCGRID, Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid - Volume 00, Pages 124131, 2009. [9] J. Nicholas Hoover and Richard Martin, Demystifying the Cloud, InformationWeek Research & Reports, pp. 303 7, InformationWeek Research & Reports, pp. 30-37, http://searchcloudcomputing.techtarget.com/sDefinition/0, sid201_gci117 0781,00.html, June 23, 2008. [10] Security Guidance for Critical Areas of Focus in Cloud Computing Prepared by the Cloud Security Alliance http://www.cloudsecurityalliance.or g/csaguide.pdf, April 2009. [11] Andy Greenberg, Why Cloud Computing Needs More Chaos, Security, http://www.forbes.com/2009/07/30/cloudcomputing-security-technology-cio-network-cloud-computing.html, 30th July, 2009. [12] C. Mario., T. Domenico., T. Paolo., Distributed data mining on the grid, ICAR-CNR, Via P. Bucci, Cubo 41C, 87036, Rende (CS), Italy, August 2002. [13] Y. Chee, B. Rajkumar, D. Marcos, Y. Jia, S. Anthony, V. Srikumar, P. Martin, Utility Computing on Global Grids Chapter 143, Hossein Bidgoli (ed.), The Handbook of Computer Networks, ISBN: (978-0-47178461-6, John Wil ey & Sons, New York, USA, 2007. [14] Khan, Dost Muhammad. & Mohamudally, Nawaz., From Mainframe to Cloud Computing: A Study of Programming Paradigms with the Evolution of ClientServer Architecture, Journal of Computing, Volume 3, Issue 12, pp 21-27, ISSN: 2151-9617, 2011. [15] Khan, Dost Muhammad. & Mohamudally, Nawaz., The Adaptability of Conventional Data Mining Algorithms through Intelligent Mobile Agents in Modern Distributed Systems, International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 1, No. 1, pp. 38-46, ISSN: 1694-0814, 2012.