Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2399776.2399780dlproceedingsArticle/Chapter ViewAbstractPublication PagescasconConference Proceedingsconference-collections
research-article

Partitioning applications for hybrid and federated clouds

Published: 05 November 2012 Publication History

Abstract

On-demand access to computing resources as-a-service has the potential to allow enterprises to temporarily scale out of their private data center into the infrastructure of a public cloud provider during times of peak demand. However, concerns about privacy and security may limit the adoption of this technique. We describe an approach to partitioning a software application (particularly a client-facing web application) into components that can be run in the public cloud and components that should remain in the private data center. Static code analysis is used to automatically establish a partitioning based on low-effort input from the developer. Public and private versions of the application are created and deployed; at runtime, user navigation proceeds seamlessly with requests routed to the public or private data center as appropriate. We present implementations for both Java and PHP web applications, tested on sample applications.

References

[1]
Bram Adams, Wolfgang De Meuter, Herman Tromp, and Ahmed E. Hassan. Can we refactor conditional compilation into aspects? In Proceedings of the 8th ACM international conference on Aspect-oriented software development, AOSD '09, pages 243--254, New York, NY, USA, 2009.
[2]
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hippocratic databases. In Proceedings of the 28th international conference on Very Large Data Bases, pages 143--154, 2002.
[3]
D. Alur, J. Crupi, and D. Malks. Core J2EE patterns: best practices and design strategies. Prentice Hall PTR, 2003.
[4]
D. Binkley. Source code analysis: A road map. In Future of Software Engineering, 2007. FOSE '07, pages 104--119, 2007.
[5]
Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. Wedge: splitting applications into reduced-privilege compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pages 309--322, Berkeley, CA, USA, 2008.
[6]
D. Callahan, K. Kennedy, et al. Automatic decomposition of scientific programs for parallel execution. In Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pages 63--76. ACM, 1987.
[7]
S. Ceri, M. Negri, and G. Pelagatti. Horizontal data partitioning in database design. In Proceedings of the ACM SIGMOD international conference on Management of data, pages 128--136. ACM, 1982.
[8]
Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng. Secure web applications via automatic partitioning. SIGOPS Oper. Syst. Rev., 41(6):31--44, 2007.
[9]
H. Ghanbari, B. Simmons, M. Litoiu, and G. Iszlai. Exploring alternative approaches to implement an elasticity policy. In Cloud Computing (CLOUD), 2011 IEEE International Conference on, pages 716--723, 2011.
[10]
W. A. Jansen. Cloud hooks: Security and privacy issues in cloud computing. In Proc. 44th Hawaii Int System Sciences (HICSS) Conf, pages 1--10, 2011.
[11]
Seongwook Jin, Jeongseob Ahn, Sanghoon Cha, and Jaehyuk Huh. Architectural support for secure virtualization under a vulnerable hypervisor. In Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture, pages 272--283, New York, NY, USA, 2011.
[12]
Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham, and Sharad Mehrotra. Secure data processing in a hybrid cloud. CoRR, abs/1105.1982, 2011.
[13]
P. Lee and Z. M. Kedem. Automatic data and computation decomposition on distributed memory parallel computers. ACM Transactions on Programming Languages and Systems (TOPLAS), 24(1):1--50, 2002.
[14]
D. Manolescu, B. Beckman, and B. Livshits. Volta: Developing distributed applications by recompiling. Software, IEEE, 25(5):53--59, 2008.
[15]
Andrew C. Myers and Barbara Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410--442, 2000.
[16]
Przemyslaw Pawluk, Bradley Simmons, Michael Smit, Marin Litoiu, and Serge Mankovski. Introducing STRATOS: A cloud broker service. In 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pages 891--898, 2012.
[17]
SAVI. Strategic network for smart applications on virtual infrastructure (savi). http://www.savinetwork.ca/, 2011. Last access 02/01/2012.
[18]
Mark Shtern, Bradley Simmons, Michael Smit, and Marin Litoiu. An architecture for overlaying private clouds on public providers. In 8th International Conference on Network and Service Management, CNSM 2012, Las Vegas, USA, 2012.
[19]
Michael Smit, K. Lyons, M. McAllister, and J. Slonim. Detecting privacy infractions in applications: A framework and methodology. In IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009., pages 694--701, 2009.
[20]
Marten Van Dijk and Ari Juels. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proceedings of the 5th USENIX conference on Hot topics in security, pages 1--8, Berkeley, CA, USA, 2010.
[21]
Virtualization Special Interest Group, PCI Security Standards Council. PCI data security standard (PCI DSS) - information supplement: PCI DSS virtualization guidelines. https://www.pcisecuritystandards.org/documents/Virtualization_InfoSupp_v2.pdf, June 2011.
[22]
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning. ACM Trans. Comput. Syst., 20(3):283--328, 2002.
[23]
Kehuan Zhang, Xiaoyong Zhou, Yangyi Chen, XiaoFeng Wang, and Yaoping Ruan. Sedic: privacy-aware data intensive computing on hybrid clouds. In Proceedings of the 18th ACM conference on Computer and communications security, pages 515--526, New York, NY, USA, 2011.

Cited By

View all
  • (2018)Delay-Sensitive Video Computing in the CloudACM Transactions on Multimedia Computing, Communications, and Applications10.1145/321280414:3s(1-29)Online publication date: 27-Jun-2018
  • (2018)Application partitioning algorithms in mobile cloud computingJournal of Network and Computer Applications10.1016/j.jnca.2014.09.00948:C(99-117)Online publication date: 28-Dec-2018
  • (2016)The 8th CASCON Workshop on Cloud ComputingProceedings of the 26th Annual International Conference on Computer Science and Software Engineering10.5555/3049877.3049916(300-303)Online publication date: 31-Oct-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image DL Hosted proceedings
CASCON '12: Proceedings of the 2012 Conference of the Center for Advanced Studies on Collaborative Research
November 2012
291 pages

Publisher

IBM Corp.

United States

Publication History

Published: 05 November 2012

Qualifiers

  • Research-article

Acceptance Rates

Overall Acceptance Rate 24 of 90 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Delay-Sensitive Video Computing in the CloudACM Transactions on Multimedia Computing, Communications, and Applications10.1145/321280414:3s(1-29)Online publication date: 27-Jun-2018
  • (2018)Application partitioning algorithms in mobile cloud computingJournal of Network and Computer Applications10.1016/j.jnca.2014.09.00948:C(99-117)Online publication date: 28-Dec-2018
  • (2016)The 8th CASCON Workshop on Cloud ComputingProceedings of the 26th Annual International Conference on Computer Science and Software Engineering10.5555/3049877.3049916(300-303)Online publication date: 31-Oct-2016
  • (2016)Designing Adaptive Applications Deployed on Cloud EnvironmentsACM Transactions on Autonomous and Adaptive Systems10.1145/282289610:4(1-26)Online publication date: 13-Jan-2016
  • (2015)Hybrid cloud service selection strategyComputer Applications in Engineering Education10.1002/cae.2163423:5(645-657)Online publication date: 1-Sep-2015
  • (2014)Designing search based adaptive systems: a quantitative approachProceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems10.1145/2593929.2593935(7-16)Online publication date: 2-Jun-2014
  • (2013)Network latency impact on performance of software deployed across multiple cloudsProceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research10.5555/2555523.2555547(216-229)Online publication date: 18-Nov-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media