Advertisement

Securely and Automatically Deploying Micro-services in an Hybrid Cloud Infrastructure

  • Waldemar Cruz
  • Fanghui Liu
  • Laurent MichelEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11008)

Abstract

Modern cloud-based services help deliver distributed software and aim to deliver a cost-effective solution while ensuring that application requirements are met. Deploying a Cloud-based implementation demands the resolution of a resource allocation problem to determine where and how software modules are deployed. For instance, one must decide, for each module, whether to deploy on a commercial elastic cloud provider or an in-house data-center as well as how to secure the communication channels that exist between services hosted with different providers. Each application is a collection of communicating micro-services that provides load-balancing and fault-tolerance to ensure quality of service requirements. There exists many choices as to what to deploy, where and which communication technologies to use. The purpose of this paper is to simultaneously solve the deployment of software services, the selection of suitable technologies for communication channels to meet the functional, performance and security requirements while minimizing economic costs.

Notes

Acknowledgment

This work was supported under the award SOW BL 7891 and project CSI Selected Projects 2017: Securing Virtualization Configuration and Managing the Attack Surfaces funded by Comcast Corporation. Special thanks to Jim Fahrny and Vaibhav Garg from Comcast.

References

  1. 1.
    Armant, V., Cauwer, M.D., Brown, K.N., O’Sullivan, B.: Semi-online task assignment policies for workload consolidation in cloud computing systems. Future Gener. Comput. Syst. 82, 89–103 (2018). http://www.sciencedirect.com/science/article/pii/S0167739X17319143CrossRefGoogle Scholar
  2. 2.
    Boussemart, F., Hemery, F., Lecoutre, C.: Revision ordering heuristics for the constraint satisfaction problem. In: First International Workshop: Constraint Propagation and Implementation (2004). http://www.cril.univ-artois.fr/~lecoutre/research/publications/2004/CPW2004.ps
  3. 3.
    Cambazard, H., Mehta, D., O’Sullivan, B., Simonis, H.: Bin packing with linear usage costs. CoRR abs/1509.06712, http://arxiv.org/abs/1509.06712 (2015)
  4. 4.
    Castiñeiras, I., Chisca, D.S., Mehta, D., O’Sullivan, B.: Trichotomic search for thermal-aware data centre workload optimisation. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), pp. 528–533, December 2015Google Scholar
  5. 5.
    Cauwer, M.D., Mehta, D., O’Sullivan, B.: The temporal bin packing problem: an application to workload management in data centres. In: 2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 157–164, November 2016Google Scholar
  6. 6.
    Chisca, D.S., Castineiras, I., Mehta, D., OSullivan, B.: On energy- and cooling-aware data centre workload management. In: 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 1111–1114, May 2015Google Scholar
  7. 7.
    Fontaine, D., Michel, L., Van Hentenryck, P.: Model combinators for hybrid optimization. In: Schulte, C. (ed.) CP 2013. LNCS, vol. 8124, pp. 299–314. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-40627-0_25CrossRefGoogle Scholar
  8. 8.
    Fontaine, D., Michel, L., Van Hentenryck, P.: Parallel composition of scheduling solvers. In: Quimper, C.-G. (ed.) CPAIOR 2016. LNCS, vol. 9676, pp. 159–169. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-33954-2_12CrossRefzbMATHGoogle Scholar
  9. 9.
    Gutin, G., Jensen, T., Yeo, A.: Batched bin packing. Discrete Optim. 2(1), 71–82 (2005). http://www.sciencedirect.com/science/article/pii/S1572528605000058MathSciNetCrossRefGoogle Scholar
  10. 10.
    Hermenier, F., Demassey, S., Lorca, X.: Bin repacking scheduling in virtualized datacenters. In: Lee, J. (ed.) CP 2011. LNCS, vol. 6876, pp. 27–41. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-23786-7_5CrossRefGoogle Scholar
  11. 11.
    Hermenier, F., Lawall, J., Muller, G.: BtrPlace: a flexible consolidation manager for highly available applications. IEEE Trans. Dependable Sec. Comput. 10(5), 273–286 (2013)CrossRefGoogle Scholar
  12. 12.
    Kadioglu, S., Colena, M., Sebbah, S.: Heterogeneous resource allocation in cloud management. In: 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), pp. 35–38. IEEE (2016)Google Scholar
  13. 13.
    Michel, L., Van Hentenryck, P.: A microkernel architecture for constraint programming. Constraints 22(2), 107–151 (2017). https://doi.org/10.1007/s10601-016-9242-1MathSciNetCrossRefGoogle Scholar
  14. 14.
    Sebbah, S., Bagley, C., Colena, M., Kadioglu, S.: Availability optimization in cloud-based in-memory data grids. In: Rueher, M. (ed.) CP 2016. LNCS, vol. 9892, pp. 666–679. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-44953-1_42CrossRefGoogle Scholar
  15. 15.
    Shaw, P.: Using constraint programming and local search methods to solve vehicle routing problems. In: Maher, M., Puget, J.-F. (eds.) CP 1998. LNCS, vol. 1520, pp. 417–431. Springer, Heidelberg (1998).  https://doi.org/10.1007/3-540-49481-2_30CrossRefGoogle Scholar
  16. 16.
    Srikantaiah, S., Kansal, A., Zhao, F.: Energy aware consolidation for cloud computing. In: Proceedings of the 2008 Conference on Power Aware Computing and Systems, HotPower 2008, p. 10. USENIX Association, Berkeley, CA, USA (2008). http://dl.acm.org/citation.cfm?id=1855610.1855620
  17. 17.
    Van Hentenryck, P., Michel, L.: The objective-CP optimization system. In: Proceedings of the 19th International Conference on Principles and Practice of Constraint Programming, September 2013Google Scholar
  18. 18.
    Wahbi, M., Grimes, D., Mehta, D., Brown, K.N., O’Sullivan, B.: A distributed optimization method for the geographically distributed data centres problem. In: Salvagnin, D., Lombardi, M. (eds.) CPAIOR 2017. LNCS, vol. 10335, pp. 147–166. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-59776-8_12CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Computer Science and Engineering Department, School of EngineeringUniversity of ConnecticutStorrsUSA

Personalised recommendations