Skip to main content

A Study on Scalability of Services and Privacy Issues in Cloud Computing

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2012)

Abstract

Cloud Computing is rapidly emerging and the new development in Information Technology. There are many patterns, or categories, in the world of cloud computing that are needed for the enterprise architecture. Some of the categories of services are storage, database, information, process, application, platform, integration, security, privacy, management/governance, testing, and infrastructure. Scalability is one of the important features applied on any of the services. The existing analysis specially focuses on Architectural and policy Implications without exploring the data privacy issues. In this paper, the application scalability and data privacy initiatives on various services in cloud environments are presented, with an overview of the trends they follow.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2009)

    Article  Google Scholar 

  2. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  3. Righscale web site (May 2010), http://www.rightscale.com

  4. Owens, D.: Securing elasticity in the cloud. Queue 8(5), 10–16 (2010)

    Article  Google Scholar 

  5. Sun cloud web site (May 2010), http://kenai.com/projects/suncloudapis

  6. vcloud api programming guide. (May 2010), http://communities.vmware.com/static/vcloudapi/vCloudAPIProgrammingGuidev0.8.pdf

  7. Varia, J.: Amazon white paper on cloud architectures (September 2008), http://aws.typepad.com/aws/2008/07/white-paper-on.html

  8. Gogrid web site (May 2010), http://www.gogrid.com

  9. Galán, F., Sampaio, A., Rodero-Merino, L., Loy, I., Gil, V., Vaquero, L.M.: Service specification in cloud environments based on extensions to open standards. In: COMSWARE 2009: Proceedings of the Fourth International ICST Conference on Communication System Software and Middleware, pp. 1–12. ACM, New York (2009)

    Google Scholar 

  10. Amazon auto scaling service (August 2010), http://aws.amazon.com/autoscaling/

  11. Lim, H.C., Babu, S., Chase, J.S.: Automated control for elastic storage. In: ICAC 2010, pp. 19–24. ACM, New York (2010)

    Google Scholar 

  12. Rodero-Merino, L., Vaquero, L., Gil, V., Galán, F., Fontán, J., Montero, R., Llorente, I.: From infrastructure delivery to service management in clouds. Future Generation Computer Systems 26, 1226–1240 (2010)

    Article  Google Scholar 

  13. Berger, E., Browne, J.C.: Scalable load distribution and load balancing for dynamic parallel programs. In: IWCBC 1999: Proceedings of the International Workshop on Cluster-Based Computing 1999, Rhodes/Greece (1999)

    Google Scholar 

  14. Marshall, P., Keahey, K., Freeman, T.: Elastic site: Using clouds to elastically extend site resources. In: IEEE International Symposium on Cluster Computing and the Grid, pp. 43–52 (2010)

    Google Scholar 

  15. Wu, H., Kemme, B.: A Unified Framework for Load Distribution and Fault-Tolerance of Application Servers. In: Sips, H., Epema, D., Lin, H.-X. (eds.) Euro-Par 2009. LNCS, vol. 5704, pp. 178–190. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Olivier, S., Prins, J.: Scalable dynamic load balancing using up. In: ICPP 2008: Proceedings of the 2008 37th International Conference on Parallel Processing, pp. 123–131. IEEE Computer Society, Washington, DC, USA (2008)

    Chapter  Google Scholar 

  17. Youseff, L., Butrico, M., da Silva, D.: Toward a unified ontology of cloud computing. In: Proceedings of the Grid Computing Environments Workshop, Austin, Texas, USA, pp. 1–10 ( November 2008)

    Google Scholar 

  18. Baldine, I., Xin, Y., Evans, D., Heerman, C., Chase, J., Marupadi, V., Yumerefendi, A.: The missing link: Putting the network in networked cloud computing. In: ICVCI 2009: International Conference on the Virtual Computing Initiative (2009)

    Google Scholar 

  19. Buyya, R., Ranjan, R., Calheiros, R.N.: InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010. LNCS, vol. 6081, pp. 13–31. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  20. Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: ICSE 2009: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, pp. 23–31 (May 2009)

    Google Scholar 

  21. Berger, B., Berger, E., Browne, J.C.: Scalable load distribution and load balancing for dynamic parallel programs. In: Proceedings of the International Workshop on Cluster-Based Computing 1999, Rhodes/Greece (1999)

    Google Scholar 

  22. Lim, H.C., Babu, S., Chase, J.S., Parekh, S.S.: Automated control in cloud computing: challenges and opportunities. In: Proceedings of the 1st Workshop on Automated Control for Data Centers and Clouds, pp. 13–18. ACM, New York (2009)

    Chapter  Google Scholar 

  23. Wee, S., Liu, H.: Client-side load balancer using cloud. In: SAC 2010: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 399–405. ACM, New York (2010)

    Google Scholar 

  24. Liu, H., Wee, S.: Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 369–380. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  25. Bavier, A., Feamster, N., Huang, M., Peterson, L., Rexford, J.: In vini verities: realistic and controlled network experimentation. In: SIGCOMM 2006:Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 3–14. ACM, New York (2006)

    Chapter  Google Scholar 

  26. Jiang, X., Xu, D.: VIOLIN: Virtual Internetworking on Overlay Infrastructure. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds.) ISPA 2004. LNCS, vol. 3358, pp. 937–946. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  27. Keshariya, M., Hunt, R.: A new architecture for performance-based policy management in heterogeneous wireless networks. In: Mobility 2008 Proceedings of the International Conference on Mobile Technology, Applications, and Systems, pp. 1–6. ACM, New York (2008)

    Google Scholar 

  28. Alex, T.W., Shenoy, P., Merwe, J.V.: The case for enterprise-ready virtual private clouds. In: HotCloud 2009: Proceedings of the Workshop on Hot Topics in Cloud Computing, pp. 1–5 (2009)

    Google Scholar 

  29. Raghavan, B., Vishwanath, K., Ramabhadran, S., Yocum, K., Snoeren, A.C.: Cloud control with distributed rate limiting. In: SIGCOMM 2007: Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 337–348. ACM, New York (2007)

    Chapter  Google Scholar 

  30. Sherwood, R., Chan, M., Covington, A., Gibb, G., Flajslik, M., Handigol, N., Huang, T.-Y., Kazemian, P., Kobayashi, M., Naous, J., Seetharaman, S., Underhill, D., Yabe, T., Yap, K.-K., Yiakoumis, Y., Zeng, H., Appenzeller, G., Johari, R., McKeown, N., Parulkar, G.: Carving research slices out of your production networks with open flow. SIGCOMM Comput. Commun. Rev. 40(1), 129–130 (2010)

    Article  Google Scholar 

  31. Chohan, N., Bunch, C., Pang, S., Krintz, C., Mostafa, N., Soman, S., Wolski, R.: AppScale design and implementation. UCBS, Tech. Rep. 2009-02 (2009)

    Google Scholar 

  32. Motiwala, M., Elmore, M., Feamster, N., Vempala, S.: Path splicing. In: SIGCOMM 2008: Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, pp. 27–38. ACM, New York (2008)

    Chapter  Google Scholar 

  33. Herzog, A., Shahmehri, N.: Problems Running Untrusted Services as Java Threads. IFIP International Federation for Information Processing, vol. 177, pp. 19–32. Springer, Heidelberg (2005)

    Google Scholar 

  34. Vecchiola, C., Chu, X., Buyya, R.: Aneka: A Software Platform for. NET-based Cloud Computing

    Google Scholar 

  35. Marian, T., Bal Krishnan, M., Birman, K., van Renesse, R.: Tempest: Soft state replication in the service tier. In: DSN 2008: Proceedings of the 38th International Conference on Dependable Systems and Networks, Anchorage, Alaska, pp. 227–236 (June 2008)

    Google Scholar 

  36. Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L., Zagorodnov, D.: The eucalyptus open-source cloud-computing system. In: CCGRID 2009: Proceedings of 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, Shanghai, China, pp. 124–131 (May 2009)

    Google Scholar 

  37. Petrovic, J.: Using memcached for data distribution in industrial environment. In: ICONS 2008: Proceedings of the 3rd International Conference on Systems, Cancún, México, pp. 368–372 (April 2008)

    Google Scholar 

  38. Ling, B.C., Kiciman, E., Fox, A.: Session state: beyond soft state. In: NSDI 2004: Proceedings of the 1st Symposium on Networked Systems Design and Implementation, San Francisco, California, USA, pp. 295–308 (March 2004)

    Google Scholar 

  39. Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems 22 (June 2008)

    Google Scholar 

  40. Leavitt, N.: Will NoSQL databases live up to their promise? Computer 43, 12–14 (2010)

    Article  Google Scholar 

  41. Cecchet, E., Candea, G., Ailamaki, A.: Middleware-based database replication: the gaps between theory and practice. In: SIGMOD 2008: Proceedings of the 28th ACM International Conference on Management of Data, Vancouver, Canada, pp. 739–752 (June 2008)

    Google Scholar 

  42. Gray, J., Helland, P., O’Neil, P., Shasha, D.: The dangers of replication and a solution. In: SIGMOD 1996: Proceedings of the 16th ACM International Conference on Management of Data, Montreal, Quebec, Canada, pp. 173–182 (June 1996)

    Google Scholar 

  43. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  44. Pearson, S. (ed.): Trusted Computing Platforms. Prentice Hall (2002)

    Google Scholar 

  45. Trusted Computing Group: Trusted Platform Module (TPM) Specifications. Web site, https://www.trustedcomputinggroup.org/specs/TPM/ (2009)

  46. Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: IEEE Workshop on Data and Expert Systems Applications, pp. 377–382. IEEE Computer Society Press, Washington DC (2003)

    Google Scholar 

  47. Dalton, C., Plaquin, D., Weidner, W., Kuhlmann, D., Balacheff, B., Brown, R.: Trusted virtual platforms: a key enabler for converged client devices. ACM SIGOPS Operating Systems Review 43(1), 36–43 (2009)

    Article  Google Scholar 

  48. Pearson, S.: Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 305–320. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  49. Otemba project: The Reasons for Otemba’s Existence, http://sourceforge.net/apps/trac/otemba/wiki/Reasons%20for%20existence

  50. Gritzalis, D., Moulinos, K., Kostis, K.: A Privacy-Enhancing e-Business Model Based on Infomediaries. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 72–83. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  51. Julie, E.C., Marguerite, J., Zwaenepoel, W.: C-jdbc: Flexible database clustering middleware. In: USENIX 2004: Proceedings of the USENIX 2004 Annual Technical Conference, pp. 9–18 (June 2004)

    Google Scholar 

  52. Milan-Franco, J.M., Jiménez-Peris, R., Patiño-Martínez, M., Kemme, B.: Adaptive Middleware for Data Replication. In: Jacobsen, H.-A. (ed.) Middleware 2004. LNCS, vol. 3231, pp. 175–194. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  53. Plattner, C., Alonso, G., Özsu, M.T.: DBFarm: A Scalable Cluster for Multiple Databases. In: van Steen, M., Henning, M. (eds.) Middleware 2006. LNCS, vol. 4290, pp. 180–200. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Patibandla, R.S.M.L., Kurra, S.S., Mundukur, N.B. (2012). A Study on Scalability of Services and Privacy Issues in Cloud Computing. In: Ramanujam, R., Ramaswamy, S. (eds) Distributed Computing and Internet Technology. ICDCIT 2012. Lecture Notes in Computer Science, vol 7154. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28073-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28073-3_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28072-6

  • Online ISBN: 978-3-642-28073-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics