Virtual Networking with Azure for Hybrid Cloud Computing in Aneka
Hybrid cloud environments are a highly scalable and cost-effective option for enterprises that need to expand their on-premises infrastructure. In every hybrid cloud solutions, the issue of inter-cloud network connectivity has to be overcome to allow communications, possibly secure, between resources scattered over multiple networks. Network visualization provides the right method for addressing this issue. We present how Azure Virtual Private Network (VPN) services are used to establish an overlay network for hybrid clouds in our Aneka platform. First, we explain how Aneka resource provisioning module is extended to support Azure Resource Manger (ARM) application programming interfaces (APIs). Then, we walk through the process of establishment of an Azure Point-to-Site VPN to provide connectivity between Aneka nodes in the hybrid cloud environment. Finally, we present a case study hybrid cloud in Aneka and we experiment with it to demonstrate the functionality of the system.
We thank Australian Research Council (ARC) Future Fellowship and the Australia-India Strategic Research Fund (AISRF) for their support of our research. We also thank Microsoft for providing access to the Azure IaaS infrastructure.
- 1.Assuno, M. D., Calheiros, R. N., Bianchi, S., Netto, M. A. S., & Buyya, R. (2015). Big data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 7980, 3–15. Special Issue on Scalable Systems for Big Data Management and Analytics.Google Scholar
- 2.Belgacem, M. B., & Chopard, B. (2015). A hybrid HPC/cloud distributed infrastructure: Coupling EC2 cloud resources with HPC clusters to run large tightly coupled multiscale applications. Future Generation Computer Systems, 42, 11–21.Google Scholar
- 3.Brock, M., & Goscinski, A. (2012, July). Execution of compute intensive applications on hybrid clouds (case study with mpiBLAST). In Proceedings of the Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (pp. 995–1000).Google Scholar
- 4.Brunetti, R. (2011). Windows Azure Step by Step. Microsoft Press.Google Scholar
- 5.Buyya, R., & Barreto, D. (2015, December) Multi-cloud resource provisioning with Aneka: A unified and integrated utilisation of microsoft azure and amazon EC2 instances. In 2015 International Conference on Computing and Network Communications (CoCoNet) (pp. 216–229).Google Scholar
- 6.Buyya, R., & Dastjerdi, A. V. (eds.) (2016, May). Internet of Things: Principles and Paradigms. Burlington, Massachusetts, USA: Morgan Kaufmann.Google Scholar
- 8.Clemente-Castell, F. J., Nicolae, B., Katrinis, K., Rafique, M. M., Mayo, R., & Fernndez, J. C. (2015, December). Enabling big data analytics in the hybrid cloud using iterative mapreduce. In Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing (UCC) (pp. 290–299).Google Scholar
- 9.de Assunção, M. D., di Costanzo, A., & Buyya, R. (2010). A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Cluster Computing, 13(3), 335–347.Google Scholar
- 11.Flores, H., Narayana Srirama, S., & Paniagua, C. (2011). A generic middleware framework for handling process intensive hybrid cloud services from mobiles. In Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia, MoMM ’11, New York, NY, USA (pp. 87–94). ACM.Google Scholar
- 13.Lackermair, G. (2011). Hybrid cloud architectures for the online commerce. Procedia Computer Science, World Conference on Information Technology, 3, 550–555.Google Scholar
- 15.Mattess, M., Vecchiola, C., & Buyya, R. (2010, September). Managing peak loads by leasing cloud infrastructure services from a spot market. In Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications (HPCC) (pp. 180–188).Google Scholar
- 18.Xu, X., & Zhao, X. (2015, August). A framework for privacy-aware computing on hybrid clouds with mixed-sensitivity data. In Proceedings of the IEEE International Symposium on Big Data Security on Cloud (pp. 1344–1349).Google Scholar