Table of Contents
ISRN Software Engineering
Volume 2013, Article ID 782174, 31 pages
http://dx.doi.org/10.1155/2013/782174
Review Article

Foundations and Technological Landscape of Cloud Computing

Faculty of Computer Science, Free University of Bolzano-Bozen, Piazza Domenicani 3, 39100 Bolzano, Italy

Received 31 October 2012; Accepted 12 December 2012

Academic Editors: M. Meringer and R. J. Walker

Copyright © 2013 Nattakarn Phaphoom et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Voas and J. Zhang, “Cloud computing: new wine or just a new bottle?” IT Professional, vol. 11, no. 2, pp. 15–17, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” 2011.
  3. M. Armbrust, A. Fox, R. Griffith et al., “A Berkeley view of cloud computing,” Tech. Rep. UCB/EECS-2009-28, EECS Department, U.C. Berkeley, 2009. View at Google Scholar
  4. M. Creeger, “CTO roundtable: cloud computing,” Communications of the ACM, vol. 52, no. 8, pp. 50–56, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. L. Herbert and J. Erickson, The ROI of Software-As-A-Service. White Paper, Forrester Research, Inc., 2009.
  6. A. Khajeh-Hosseini, I. Sommerville, J. Bogaerts, and P. Teregowda, “Decision support tools for cloud migration in the enterprise,” in Proceedings of the IEEE International Conference on Cloud Computing (CLOUD '11), pp. 541–548, 2011.
  7. N. Phaphoom, N. Oza, X. Wang, and P. Abrahamsson, “Does cloud computing deliver the promised benefits for IT industry?” in Proceedings of the WICSA/ECSA Companion Volume(WICSA/ECSA '12), pp. 45–52, ACM, 2012.
  8. N. Gruschka and M. Jensen, “Attack surfaces: a taxonomy for attacks on cloud services,” in Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD '10), pp. 276–279, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. P. Hofmann and D. Woods, “Cloud computing: the limits of public clouds for business applications,” IEEE Internet Computing, vol. 14, no. 6, pp. 90–93, 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding cloud computing vulnerabilities,” IEEE Security and Privacy, vol. 9, no. 2, pp. 50–57, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Baun, M. Kunze, J. Nimin, and S. Tai, Cloud Computing: Web-Based Dynamic IT Services, Springer, 2011.
  12. I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing 360-degree compared,” in Proceedings of the Grid Computing Environments Workshop (GCE '08), pp. 1–10, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” SIGCOMM Computer Communication Review, vol. 39, pp. 50–55, 2008. View at Google Scholar
  14. DMTF, “Interoperable Clouds a white paper from the Open Cloud Standards Incubator,” 2009.
  15. IBM, “IBM Cloud Computing—Service Management,” 2009.
  16. Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” 2009.
  17. Cisco, “Cisco Cloud Computing—Data Center Strategy, Architecture, and Solutions,” 2009.
  18. Open Security Architecture, “SP-011: Cloud Computing Pattern,” 2011.
  19. US General Service Administration, “Cloud Computing Initiative Vision and Strategy Document (DRAFT),” 2010.
  20. Storage Networking Industry Association, “5. Overview of Cloud Storage,” 2011.
  21. L. Youseff, M. Butrico, and D. Da Silva, “Toward a unified ontology of cloud computing,” in Proceedings of the Grid Computing Environments Workshop (GCE '08), pp. 1–10, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. L. J. Zhang and Q. Zhou, “CCOA: cloud computing open architecture,” in Proceedings of the IEEE International Conference on Web Services (ICWS '09), pp. 607–616, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  23. S. Ghemawat, H. Gobioff, and S. Leung, “The Google file system,” ACM SIGOPS Operating Systems Review, vol. 37, pp. 29–43, 2003. View at Google Scholar
  24. A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, “What's inside the cloud? An architectural map of the cloud landscape,” in Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing (CLOUD '09), pp. 23–31, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Howe, “The rise of crowdsourcing,” Wired Magazine, vol. 14, pp. 1–5, 2006. View at Google Scholar
  26. A. Kittur, E. H. Chi, and B. Suh, “Crowdsourcing user studies with Mechanical Turk,” in Proceedings of the 26th Annual CHI Conference on Human Factors in Computing Systems (CHI '08), pp. 453–456, ACM, New York, NY, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. J. G. Davis, “From crowdsourcing to crowdservicing,” IEEE Internet Computing, vol. 15, no. 3, pp. 92–94, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. T. Dillon, C. Wu, and E. Chang, “Cloud computing: issues and challenges,” in Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA '10), pp. 27–33, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  29. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7–18, 2010. View at Google Scholar
  30. I. Foster, “The anatomy of the grid: enabling scalable virtual organizations,” in Proceedings of the 1st IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 6–7, 2001.
  31. A. Andrzejak, M. Arlitt, and J. Rolia, “Bounding the resource savings of utility computing models,” Tech. Rep. HPL-2002-339, Hewlett Packard Labs, 2002. View at Google Scholar
  32. J. E. Smith and R. Nair, “The architecture of virtual machines,” Computer, vol. 38, no. 5, pp. 32–38, 2005. View at Publisher · View at Google Scholar · View at Scopus
  33. R. Uhlig, G. Neiger, D. Rodgers et al., “Intel virtualization technology,” Computer, vol. 38, no. 5, pp. 48–56, 2005. View at Publisher · View at Google Scholar · View at Scopus
  34. M. Rosenblum and T. Garfinkel, “Virtual machine monitors: current technology and future trends,” Computer, vol. 38, no. 5, pp. 39–47, 2005. View at Publisher · View at Google Scholar · View at Scopus
  35. E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, 1994.
  36. P. Bianco, R. Kotermanski, and P. Merson, “Evaluating a Service-Oriented Architecture,” Tech. Rep. CMU/SEI-2007-TR-015, Software Engineering Institute of Carnegie Mellon University, 2007. View at Google Scholar
  37. T. Erl, SOA Design Patterns, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2009.
  38. S. Sakr, A. Liu, D. Batista, and M. Alomari, “A survey of large scale data management approaches in cloud environments,” IEEE Communications Surveys & Tutorials, no. 99, pp. 1–26, 2011. View at Google Scholar
  39. Y. Yu, M. Isard, D. Fetterly et al., “DryadLINQ: a system for general-purpose distributed data-parallel computing using a high-level language,” in Proceedings of the 8th USENIX Conference on Operating systems design and implementation (OSDI '08), pp. 1–14, USENIX Association, Berkeley, Calif, USA, 2008.
  40. The US National Institute of Standards, “Cloud Architecture Reference Models,” 2011.
  41. Cloud Security Alliance, “Top threats to cloud computing V1.0,” 2010.
  42. J. Oriol Fitó, I. Goiri, and J. Guitart, “SLA-driven elastic cloud hosting provider,” in Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP '10), pp. 111–118, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  43. F. Faniyi and R. Bahsoon, “Engineering proprioception in SLA management for cloud architectures,” in Proceedings of the 9th Working IEEE/IFIP Conference on Software Architecture (WICSA '11), pp. 336–340, 2011.
  44. J. Y. Lee, J. W. Lee, D. W. Cheun, and S. D. Kim, “A quality model for evaluating software-as-a-service in cloud computing,” in Proceedings of the 7th ACIS International Conference on Software Engineering Research, Management and Applications ( SERA '09), pp. 261–266, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  45. D. Jayasinghe, S. Malkowski, Q. Wang, J. Li, P. Xiong, and C. Pu, “Variations in performance and scalability when migrating n-tier applications to different clouds,” in Proceedings of the IEEE International Conference on Cloud Computing (CLOUD '11), pp. 73–80, 2011.
  46. D. Bao, Z. Xiao, Y. Sun, and J. Zhao, “A method and framework for quality of cloud services measurement,” in Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE '10), pp. V5358–V5362, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  47. S. Dowell, A. Barreto, J. B. Michael, and M.-T. Shing, “Cloud to cloud interoperability,” in Proceedings of the 6th International Conference on System of Systems Engineering (SoSE '11), pp. 258–263, 2011.
  48. M. Alhamad, T. Dillon, and E. Chang, “Conceptual SLA framework for cloud computing,” in Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST '10), pp. 606–610, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  49. S. Gilbert and N. Lynch, “Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services,” SIGACT News, vol. 33, pp. 51–59, 2002. View at Google Scholar
  50. B. F. Cooper, R. Ramakrishnan, and U. Srivastava, “PNUTS: Yahoo!’s hosted data serving platform,” in Proceedings of the VLDB Endowment, vol. 2, pp. 1277–1288, 2008.
  51. W. Vogels, “Eventually consistent,” Communications of the ACM, vol. 52, pp. 40–44, 2009. View at Google Scholar
  52. H. Douglas and C. Gehrmann, “Secure Virtualization and Multicore Platforms State-of-the-Art report,” Swedish Institute of Computer Science, 2009.
  53. S. J. Vaughan-Nichols, “New approach to virtualization is a lightweight,” Computer, vol. 39, no. 11, pp. 12–14, 2006. View at Publisher · View at Google Scholar · View at Scopus
  54. A. Whitaker, M. Shaw, and S. D. Gribble, “Denali: lightweight virtual machines for distributed and networked applications,” Tech. Rep., The University of Washington, 2002. View at Google Scholar
  55. W. Chen, H. Lu, L. Shen, Z. Wang, N. Xiao, and D. Chen, “A novel hardware assisted full virualization technique,” in Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS '08), pp. 1292–1297, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  56. I. Pratt, K. Fraser, S. Hand, C. Limpach, and A. Warfield, “Xen 3.0 and the art of virtulization,” in Proceedings of the Ottawa Linux Symposium, pp. 65–77, 2005.
  57. Advanced Micro Devices Inc., “AMD-V Nested Paging revision 1.0,” Whitepaper, 2008.
  58. G. P. Chen and J. S. Bozman, “Optimizing I/O Virtualization: preparing the datacenter for next-generation applications,” White Paper sponsored by Intel Corporation, 2009.
  59. J. Sugerman, G. Venkitachalam, and B. Lim, “Virtualizing I/O devices on VMware workstation's hosted virtual machine monitor,” in Proceedings of the General Track, USENIX Annual Technical Conference, pp. 1–14, 2001.
  60. P. Barham, B. Dragovic, K. Fraser et al., “Xen and the art of virtualization,” in Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP '03), pp. 164–177, ACM, New York, NY, USA, October 2003. View at Scopus
  61. A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori, “kvm:thelinux virtual machine monitor,” in Proceedings of the Ottawa Linux Symposium, pp. 225–230, 2007.
  62. M. Stonebraker, “SQL databases v. NoSQL databases,” Communications of the ACM, vol. 53, no. 4, pp. 10–11, 2010. View at Publisher · View at Google Scholar · View at Scopus
  63. F. Chang, J. Dean, S. Ghemawat et al., “Bigtable: a distributed storage system for structured data,” ACM Transactions on Computer Systems, vol. 26, no. 2, article 4, 2008. View at Publisher · View at Google Scholar · View at Scopus
  64. A. Lakshman and P. Malik, “Cassandra: a decentralized structured storage system,” ACM SIGOPS Operating Systems Review, vol. 44, pp. 35–40, 2010. View at Google Scholar
  65. M. Stonebraker, S. Madden, D. J. Abadi, S. Harizopoulos, N. Hachem, and P. Helland, “The end of an architectural era: (it's time for a complete rewrite),” in Proceedings of the 33rd international conference on Very large data bases (VLDB '07), pp. 1150–1160, VLDB Endowment, 2007.
  66. T. Haerder and A. Reuter, “Principles of transaction-oriented database recovery,” Computing Surveys, vol. 15, no. 4, pp. 287–317, 1983. View at Google Scholar · View at Scopus
  67. Z. Wei, G. Pierre, and C.-H. Chi, “CloudTPS: scalable transactions for web applications in the cloud,” IEEE Transactions on Services Computing, vol. 99, p. 1, 2011. View at Google Scholar
  68. B. Kemme and G. Alonso, “Don't be lazy, be consistent: postgres-r, a new way to implement database replication,” in Proceedings of the 26th International Conference on Very Large Data Bases (VLDB '00), pp. 134–143, Morgan Kaufmann Publishers, San Francisco, Calif, USA, 2007.
  69. A. Lith and J. Mattsson, Investigating storage solutions for large data—a comparison of well performing and scalable data storage solutions for real time extraction and batch insertion of data [M.S. thesis], Chalmers Tekniska Hogskola, Sweden, 2010.
  70. B. G. Tudorica and C. Bucur, “A comparison between several NoSQL databases with comments and notes,” in Proceedings of the 10th Roedunet International Conference (RoEduNet '11), pp. 1–5, 2011.
  71. E. A. Brewer, “Toward robust distributed systems,” Principles of distributed computing, Portland, Ore, USA, 2000.
  72. B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears, “Benchmarking cloud serving systems with YCSB,” in Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC '10), pp. 143–154, ACM, New York, NY, USA, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  73. G. DeCandia, D. Hastorun, M. Jampani et al., “Dynamo: amazon's highly available key-value store,” in Proceedings of 21st ACM SIGOPS symposium on Operating systems principles (SOSP '07), pp. 205–220, ACM, New York, NY, USA, 2007.
  74. D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, and R. Panigrahy, “Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web,” in Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC '97), pp. 654–663, ACM, New York, NY, USA, May 1997. View at Scopus
  75. J. Spring, “Monitoring cloud computing by layer—part 1,” IEEE Security and Privacy, vol. 9, no. 2, pp. 66–68, 2011. View at Publisher · View at Google Scholar · View at Scopus
  76. J. Spring, “Monitoring cloud computing by layer—part 2,” IEEE Security and Privacy, vol. 9, no. 3, pp. 52–55, 2011. View at Publisher · View at Google Scholar · View at Scopus
  77. I. Iankoulova and M. Daneva, “Cloud computing security requirements: a systematic review,” in Proceedings of the 6th International Conference on Research Challenges in Information Science (RCIS '12), pp. 1–7, 2012.
  78. W. A. Jansen, “Cloud hooks: security and privacy issues in cloud computing,” in Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS '10), pp. 1–10, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  79. S. A. Almulla and C. Y. Yeun, “Cloud computing security management,” in Proceedings of the 2nd International Conference on Engineering System Management and Applications (ICESMA '10), pp. 1–7, April 2010. View at Scopus
  80. R. Chow, P. Golle, M. Jakobsson et al., “Controlling data in the cloud: outsourcing computation without outsourcing control,” in Proceedings of the ACM Workshop on Cloud Computing Security (CCSW '09), pp. 85–90, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  81. L. M. Kaufman, “Can public-cloud security meet its unique challenges?” IEEE Security and Privacy, vol. 8, no. 4, pp. 55–57, 2010. View at Publisher · View at Google Scholar · View at Scopus
  82. IBM, “Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security,” 2009.
  83. Microsoft Global Foundation Services, “Securing Microsoft’s Cloud Infrastructure,” 2009.
  84. Google, “Security Whitepaper: Google Apps Messaging and Collaboration Products,” 2010.
  85. A. Walters and N. L. Petroni Jr., “Volatools: integrating volatile memory forensics into the digital investigation process,” in presented at Black Hat DC, 2007.