Journal of Grid Computing

, Volume 9, Issue 1, pp 3–26 | Cite as

Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach

  • Bhaskar Prasad RimalEmail author
  • Admela Jukan
  • Dimitrios Katsaros
  • Yves Goeleven


Cloud Computing is a model of service delivery and access where dynamically scalable and virtualized resources are provided as a service over the Internet. This model creates a new horizon of opportunity for enterprises. It introduces new operating and business models that allow customers to pay for the resources they effectively use, instead of making heavy upfront investments. The biggest challenge in Cloud Computing is the lack of a de facto standard or single architectural method, which can meet the requirements of an enterprise cloud approach. In this paper, we explore the architectural features of Cloud Computing and classify them according to the requirements of end-users, enterprises that use the cloud as a platform, and cloud providers themselves. We show that several architectural features will play a major role in the adoption of the Cloud Computing paradigm as a mainstream commodity in the enterprise world. This paper also provides key guidelines to software architects and Cloud Computing application developers for creating future architectures.


Architecture Cloud Computing Grid Computing Requirements On-demand 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adabala, S., Chadha, V., Chawla, P., Figueiredo, R., Fortes, J., Krsul, I., Matsunaga, A., Tsugawa, M., Zhang, J., Zhao, M., Zhu, L., Zhu, X.: From virtualized resources to virtual computing Grids: the In-VIGO system. Future Gener. Comput. Syst. 21(6), 896–909 (2005)CrossRefGoogle Scholar
  2. 2.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing. Technical Report No. UCB/EECS-2009-28, Electrical Engineering and Computer Sciences, University of California at Berkeley (2009)Google Scholar
  3. 3.
    AWS Service Health Dashboard: Amazon S3 availability event. Available online at (2009). Accessed on March 2009
  4. 4.
    Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (2003)Google Scholar
  5. 5.
    Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice. Addison-Wesley, Reading, Massachusetts (1998)Google Scholar
  6. 6.
    Beckmann, C.: Google App Engine. (2008). Accessed on July 2009
  7. 7.
    Bonvin, N., Papaioannou, T.G., Aberer, K.: Dynamic cost-efficient replication in data clouds. In: Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds (2009)Google Scholar
  8. 8.
    Brodkin, J.: Gartner: seven cloud-computing security risks. Available online at (2008). Accessed on March 2009
  9. 9.
    Carr, N.: The Big Switch—Rewiring the World from Edisson to Google. W. W. Norton (2008)Google Scholar
  10. 10.
    Carr, N.: Rough Type. Available online at (2010). Accessed on January 2010
  11. 11.
    Cavoukian, A.: Privacy in the Clouds—A White Paper on Privacy and Digital Identity: Implications for the Internet. Information and Privacy Commission of Ontario (2008)Google Scholar
  12. 12.
    Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. ACM Trans Comput. Syst. 26(2), 1–26 (2008)zbMATHCrossRefGoogle Scholar
  13. 13.
    Choudhary, V.: Software as a service: implications for investment in software development. In: Proceedings of the 40th Hawaii International Conference on System Sciences (2006)Google Scholar
  14. 14.
    Clements, P., Northrop, L.M.: Software architecture: an executive overview. Software Engineering Institute, Carnegie Mellon University, Technical Report CMU/SEI-96-TR-003 (1996)Google Scholar
  15. 15.
    Cruz, A.: Gmail site reliability manager, update in Gmail. Available online at (2009). Accessed on March 2009
  16. 16.
    Dash, D., Kantere, V., Ailamaki, A.: An economic model for self-tuned cloud caching. In: Proceedings of the IEEE International Conference on Data Engineering (2009)Google Scholar
  17. 17.
    David, R.: Cloud computing explained. Available online at (2009). Retrieved on 1 Sept 2009
  18. 18.
    Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)CrossRefGoogle Scholar
  19. 19.
    DeWitt, D.J., Robinson, E., Shankar, S., Paulson, E., Naughton, J., Krioukov, A., Royalty, J.: Clustera: an integrated computation and data management system. In: Proceedings of the Very Large Databases (2008)Google Scholar
  20. 20.
    Emeneker, W., Stanzione, D.: Dynamic virtual clustering. In: IEEE International Conference on Cluster Computing (2007)Google Scholar
  21. 21.
    Federal Data Protection Act, Bundesdatenschutzgesetz (BDSG), (1990). Accessed 10 December 2009
  22. 22.
    Fielding, R.T.: The representational state transfer (REST). Ph.D. Dissertation, Department of Information and Computer Science, University of California, Irvine. Available online at (2000)
  23. 23.
    Figueiredo, R.J., Dinda, P.A., Fortes, A.B.: A case for Grid computing on virtual machines. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (2003)Google Scholar
  24. 24.
    Fingar, P.: Extreme Competition: Cloud Oriented Business Architecture. Business Process Trends (2009)Google Scholar
  25. 25.
    Flouris, M.D., Lachaize, R., Bilas, A.: Violin: a framework for extensible block-level storage. In: Knowledge and Data Management in Grids, CoreGRID series, vol. 3, pp. 83–98. Springer Verlag (2007)Google Scholar
  26. 26.
    Foster, I., Kesselman, C.: Globus ametacomputing infrastructure toolkit. Int. J. Supercomput. Appl. 11(2), 115–128 (1997)CrossRefGoogle Scholar
  27. 27.
    Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl. 15(3), 200–222 (2001)CrossRefGoogle Scholar
  28. 28.
    Foster, I., Freeman, T., Keahey, K., Scheftner, D., Sotomayor, B., Zhang, X.: Virtual clusters for Grid communities. In: 6th IEEE International Symposium on Cluster Computing and the Grid (2006)Google Scholar
  29. 29.
    Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing cloud computing and Grid computing 360 degree compared. In: Grid Computing Environments Workshop (2008)Google Scholar
  30. 30.
    Fox, A., Gribble, S.D., Chawathe, Y., Brewer, E.A., Gauthier, P.: Cluster-based scalable network services. In: Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles (1997)Google Scholar
  31. 31.
    Garg, V.K.: Elements of Distributed Computing. Wiley-IEEE Press. ISBN 0471036005 (2002)Google Scholar
  32. 32.
    Gartner Research: Predicts 2009: Cloud Computing Beckons (2009)Google Scholar
  33. 33.
    Gathering Clouds of XaaS! (2008)
  34. 34.
    Gellman, R.: Privacy in the clouds: risks to privacy and confidentiality from cloud computing. In: World Privacy Forum (2009)Google Scholar
  35. 35.
    Golden, B.: Virtualization for Dummies. Wiley Publishing, Inc. (2008)Google Scholar
  36. 36.
    Graefe, G.: The five-minute rule twenty years later, and how flash memory changes the rules. In: Proceedings of the 3rd International Workshop on Data Management on New Hardware (2007)Google Scholar
  37. 37.
    Gu, Y., Grossman, R.L.: Sector and sphere towards simplified storage and processing of large scale distributed data. Philos. Trans. R. Soc. Lond. A. 367(1897), 2429–2445 (2009)CrossRefGoogle Scholar
  38. 38.
    Hoeren, T.: The new German data protection act and its compatibility with the European Data Protection Directive. J. Comput. Law, Security Review, Elsevier 25(4), 318–324 (2009)CrossRefGoogle Scholar
  39. 39.
    Irwin, D., Chase, J., Grit, L., Yumerefendi, A., Becker, D., Yocum, K.: Sharing networked resources with brokered leases. In: USENIX Technical Conference (2006)Google Scholar
  40. 40.
    Jackson, T.: We feel your pain, and we’re sorry. Available online at (2008). Accessed on March 2009
  41. 41.
    Kapil Bakshi, K.: Cisco cloud computing-data center strategy, architecture, and solutions. Point of View White Paper for U.S. Public Sector (2009)Google Scholar
  42. 42.
    Katsaros, D., Pallis, G., Stamos, K., Vakali, A., Sidiropoulos, A., Manolopoulos, Y.: CDNs content outsourcing via generalized communities. IEEE Trans. Knowl. Data Eng. 21(1), 137–151 (2009)CrossRefGoogle Scholar
  43. 43.
    Kavis, M.: Enterprise mashups—the icing on your SOA. Available online at (2008). Accessed on July 2009
  44. 44.
    Keahey, K., Foster, I., Freeman, T., Zhang, X.: Virtual workspaces: achieving quality of service and quality of life in the Grid. Sci. Program. J. 13(4), 265–276 (2005)Google Scholar
  45. 45.
    Keahey, K., Foster, I., Freeman, T., Zhang, X., Galron, D.: Virtual workspaces in the Grid. In: 11th International Euro-Par Conference (2005)Google Scholar
  46. 46.
    Kolakowski, N.: Microsoft’s cloud azure service suffers outage. Available online at (2009). Accessed on April 2009
  47. 47.
    Lee, S.W., Kim, W.: On flash-based DBMSs: issues for architectural re-examination. J. Object Technol. 6(8), 39–49 (2007)CrossRefGoogle Scholar
  48. 48.
    Lee, S.W., Moon, B., Park, C.: Advances in flash memory SSD technology for enterprise database applications. In: Proceedings of the ACM Conference on the Management of Data (SIGMOD) (2009)Google Scholar
  49. 49.
    Lim, K., Ranganathan, P., Chang, J., Patel, C., Mudge, T., Reinhardt, S.K.: Server designs for warehouse-computing environments. IEEE Micro 29(1), 41–49 (2009)CrossRefGoogle Scholar
  50. 50.
    Louth, W.: Metering the cloud: applying activity based costing (ABC) from code profiling up to performance & cost management of cloud computing. In: The International Conference on JAVA Technology (2009)Google Scholar
  51. 51.
    Mayer, M.: This site may harm your computer on every search results. Available online at (2009). Accessed on February 2009
  52. 52.
    Mell, P., Grance, T.: Perspectives on Cloud Computing and Standards. National Institute of Standards and Technology (NIST), Information Technology Laboratory (2009)Google Scholar
  53. 53.
    Murphy, M.A., Goasgue, S.: Virtual organization clusters self-provisioned clouds on the Grid. Future Gener. Comput. Syst. (Elsevier) 26(8), 1271–1281 (2010)CrossRefGoogle Scholar
  54. 54.
    Murphy, M.A., Abraham, L., Fenn, M., Goasguen, S.: Autonomic clouds on the Grid. J. Grid Computing 8(1), 1–18 (2010)CrossRefGoogle Scholar
  55. 55.
    Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L., Zagorodnov, D.: The eucalyptus open-source cloud-computing system. In: Proceedings of Cloud Computing and its Applications (2008)Google Scholar
  56. 56.
    OASIS: Security services technical committee, Security Assertion Markup Language (SAML). 2.0 Technical Overview Working Draft (2004)Google Scholar
  57. 57.
    Olston, C., Reed, B., Srivastava, U.: Pig latin: a not-so-foreign language for data processing. In: Proceedings of the ACM Conference on the Management of Data (2008)Google Scholar
  58. 58.
    Open Platform as a Service: Available online at (2009). Accessed on December 2009
  59. 59.
    Pete: App Engine outage today. Available online at (2008). Accessed on April 2009
  60. 60.
    Rings, T., Caryer, G., Gallop, J., Grabowski, J., Kovacikova, T., Schulz, S., Stokes-Rees, I.: Grid and cloud computing: opportunities for integration with the next generation network. J. Grid Computing 7(3), 375–393 (2009)CrossRefGoogle Scholar
  61. 61.
    Ross, J.W., Westerman, G.: Preparing for utility computing: the role of IT architecture and relationship management. IBM Syst. J. 43(1) (2004)Google Scholar
  62. 62.
    Siebeck, R., Janner, T., Schroth, C., Hoyer, V., Wörndl, W., Urmetzer, F.: Cloud-based enterprise mashup integration services for B2B scenarios. In: 2nd Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM 2009) in Conjunction with the 18th International World Wide Web Conference (2009)Google Scholar
  63. 63.
    Software & Information Industry Association: Software as a service: strategic backgrounder (2001)Google Scholar
  64. 64.
    Sotomayor, B., Montero, R.S., Llorente, I.M., Foster, I: Capacity leasing in cloud systems using the opennebula engine. In: Workshop on Cloud Computing and its Applications (2008)Google Scholar
  65. 65.
    Sotomayor, B., Montero, R.S., Llorente, I.M., Foster, I.: Virtual infrastructure management in private and hybrid clouds. IEEE Internet Computing 13(5), 14–22 (2009)CrossRefGoogle Scholar
  66. 66.
    Stern, A.: Update from Amazon regarding Friday’s S3 downtime. Available online at (2008). Accessed on April 2009
  67. 67.
    The Cloud Computing Interoperability Forum (CCIF): Available online at (2009). Accessed on March 2009
  68. 68.
    The Open Group, Service Oriented Architecture (SOA): Available online at (2010). Accessed on July 2009
  69. 69.
    The Open Group: Building return on investment from cloud computing. A white paper, cloud business artifacts project. Cloud Computing Work Group (2010)Google Scholar
  70. 70.
    Tsirogiannis, D., Harizopoulos, S., Shah, M.A., Wiener, J.L., Graefe, G.: Query processing techniques for solid state drives. In: Proceedings of the ACM Conference on the Management of Data (2009)Google Scholar
  71. 71.
    Tubanos, A.:, FlexiScale suffers 18-hour outage. Available online at (2008). Accessed on January 2009
  72. 72.
    Turner, M., Budgen, D., Brereton, P.: Turning software into a service. Computer 36(10), 38–44 (2003)CrossRefGoogle Scholar
  73. 73.
    Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2009)CrossRefGoogle Scholar
  74. 74.
    Vogels, W.: A word on scalability. Available online at (2006). Accessed on April 2009
  75. 75.
    Weinman, J.: The 10 laws of cloudonomics. Available online at (2008). Accessed on 14 July 2009
  76. 76.
    Working Party on Information Security and Privacy: The role of digital identity management in the internet economy: a primer for policy makers (2009)Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  • Bhaskar Prasad Rimal
    • 1
    Email author
  • Admela Jukan
    • 1
  • Dimitrios Katsaros
    • 2
  • Yves Goeleven
    • 3
  1. 1.Institute of Computer and Network EngineeringTechnische Universität Carolo-Wilhelmina zu BraunschweigBraunschweigGermany
  2. 2.Department of Computer and Communication EngineeringUniversity of ThessalyVolosGreece
  3. 3.CapGeminiDiegemBelgium

Personalised recommendations