SlideShare a Scribd company logo
1 of 6
Download to read offline
Real-Time Service-Oriented Cloud Computing
Wei-Tek Tsai*, Qihong Shao, Xin Sun, Jay Elston
Abstract
Cloud computing has received significant attention
recently. This paper presents real-time issues related to
cloud computing, such as multi-tenancy architecture,
scheduling, paralleled computing and proposes a
framework for real-time service-oriented cloud
computing. Specially, we propose a novel real time
architecture which solve the new challenges in Cloud
Computing.
1. Introduction
Cloud computing has received significant attention
recently as it is a new computing infrastructure to enable
rapid delivery of computing resources as a utility in a
dynamic, scalable, and virtualized manner [1]. SaaS
(Software as a Service), often deployed on a cloud, is a
new way to deliver software. In SaaS, software is
maintained and updated on a cloud, and presented to the
end users as services on demand, usually in a browser.
Many industry service providers start to support SaaS,
for example Googleā€™s recent announcement of its
Chrome OS, an operating system designed to run SaaS
applications faster, simpler and more securely further
shows that SaaS is viable. With Chrome OS, users will
be able to listen to music, play games, watch video, and
even store their data online.
As SaaS is gaining popularity, people require more
and more real-time features for a SaaS application.
Popular social SaaS applications, such as Facebook,
Twitter, made further enhancement to enable real-time
communication. Major search engines also jump in real-
time war by providing real-time search results, such as
news, sport results, Facebook and Twitter updates. On
the enterprise side, start-ups like Arithum [2] provide a
real-time cloud computing platform and deliver
pioneering real-time consumer and enterprise solutions.
Force.com allows real-time integration with other on-
premises applications and third-party cloud services [3].
Cloud computing is inherently real time, and more
specifically soft real time, as a user will give up if the
cloud does not provide the needed services almost
instantaneously. For example, if a popular web-based
email system responds slowly, most users will switch to
another service provider or use a traditional email server.
While the failure of the system to respond quickly may
not cause any catastrophic consequences, it might lead to
usersā€™ dissatisfaction.
The discussion of real time feature in SOA starts from
[4], Tsai et al proposed a real-time service-oriented
architecture. There is also RTSOA software available [5].
As U.S. Department of Defense (DoD) as well as U.K.
Ministry of Defense (MoD) both use service-oriented
computing for their mission-critical projects, RTSOA
becomes an important topic.
Cloud computing uses SOC(Service Oriented
Computing) as one of key technologies, however, it has
other key aspects that SOC often does not address.
Specifically, cloud computing emphasizes significantly
about its high-performance server aspects. A cloud
environment often has hundreds of thousands of
processors with numerous disks interconnected by
dedicated high-speed networks, and the infrastructure
provides soft real-time computing for Web users.
A cloud computing often has three layers on top of a
data center: 1) SaaS (Software as a Service); 2) PaaS
(Platform as a Service); 3) IaaS (Infrastructure as a
Service). The IaaS layer provides a virtualized
infrastructure including processors, storage, and networks
to support various OS execution. The PaaS layer provides
traditional system services such as OS services using the
resources provided by the IaaS. The SaaS layer provides
application software that end users can compose, deploy,
and execute in a cloud environment. The SaaS
application is often written in a service-oriented manner,
and is hosted on a cloud for users to execute. One key
feature of SaaS application is the multi-tenancy
architecture, and it will be discussed in this paper. Since
SaaS essentially uses a client-server model, to achieve
real-time requirements, one needs to address computing
at both client and server sites.
This paper is organized as follows: Section 2 presents
typical cloud client-site issues; Section 3 presents major
cloud server-site issues; Section 4 shows a service-
oriented design lifecycle for real-time cloud application;
Section 5 present scheduling and database management
for real-time cloud applications; and Section 6 concludes
this paper.
2. Client-Site Issues
A cloud client may be a mobile device or a PC that
connects to a cloud server. A good example of a client-
School of Computing, Informatics,
and Decision Systems Engineering
Arizona State University
Computer Science and Technology, Tsinghua
University, Beijing, China*
{wtsai, qihong.shao, xin.sun, jelston}@asu.edu
2010 IEEE 6th World Congress on Services
978-0-7695-4129-7/10 $26.00 Ā© 2010 IEEE
DOI 10.1109/SERVICES.2010.127
473
side system is the recently announced Chrome OS, a
network OS developed from Linux, and its open-source
version Chromium. They are essentially lightweight OS
designed for web browsing and SaaS applications. Figure
1 shows a comparison between traditional OS boot
sequence and Chromium OS fast boot sequence. It takes
14 steps and more than 30 seconds for a traditional OS to
open a browser from being turned on, while it takes only
5 steps and 4 seconds for Chromium OS to the same.
Chrome software is adaptive as it checks the integrity
of its code, and if the code is compromised, it will take
actions in a pro-active manner to reboot the system. All
applications will be services without installation. The
system also verifies the digital signatures of services to
ensure that the services are trustworthy. Furthermore, it
provides a highly optimized JavaScript engine for
efficient processing, and the data are stored in local
caches for efficient retrieval. Furthermore, only data
needed immediately are retrieved from the Web to avoid
unnecessary bandwidth waste. Note that as a
consequence of using services, a client system can be
viewed as ā€œsystem + the Webā€ rather than just the system
as it can search services from the Web for execution. All
these designs lead to efficient Web service execution
with self-adaptive features.
There are several unique challenges in the client site:
Efficient client-site execution, caching and pre-
fetching: A lot of feature-rich web applications use
JavaScript heavily. The core component of Chrome OS,
Chrome browser has a highly optimized JavaScript
engine. Moreover, services that are often used can be
found at the local cache, and data are also pre-fetched
from the Web for better user experience.
Paging: In other words, only retrieve the data that will be
used immediately. The obvious reason is that a lot of
resources are wasted as most of the results returned will
be discarded before being used, and it often results longer
lags.
Stream filtering: Not all requests from the users require
computation work. Sometimes they can be safely
ignored; sometimes, the according response can be found
in server-side cache. But utilizing stream filtering and
data comparison tools, the performance can be further
improved.
Runtime checking, verification, and recovery: The
system keeps on checking the integrity of its code to
ensure that nothing is compromised, and if compromised,
it takes actions in a pro-active manner to reboot the
system. The system also verifies the digital signatures of
services to ensure that the services are trustworthy.
Environment-aware evolution and adaption: The
environment of a client is the Web, and it depends on
search engines to identify the needed services. As the
Web is an open and changing environment, the system is
thus open and dynamic.
Figure 1 Boot Sequence Comparison between Chromium OS
and Traditional OS
3. Server-Site Issue
Compared to a client, a cloud server may be hosted
on a data center with hundreds of thousands of processors
and disks interconnected by high-speed networks. One
important feature of SaaS is the multi-tenancy
architecture. The cloud server will provide the internal
bookkeeping so that data from different clients will be
protected. A multi-tenant application can be compared
with multi-instance software where individualized
software will serve different tenants. The multi-tenancy
architecture save significant cost in terms of software
application development, however, it also adds
significant overhead in bookkeeping to ensure that end
users can enjoy satisfactory performance. Some critical
issues related to SaaS applications are as follows:
Customization: As a SaaS application serves multiple
tenants, it is important that it can be customized for
different tenants, which is often done by storing
customization data in a backend database in the cloud
environment. This leads to significant design issues
because this involves database design, concurrent and
parallel database processing, and data synchronization.
Many cloud companies thus decide to develop special
database management systems and distributed file
systems to support this operation, such as Googleā€™s
BigTable and GFS (Google File System). Customization
can be done on the level of individual services and the
composition of services. The customization can be either
tenant-specific or can be multi-tenant aware and reused
by other tenants. Most Cloud computing service provides
can support customization. For example, Salesforce.com
[6] offers a platform (AppExchange platform) that allows
tenants to create and deploy their own extensions to the
application.
Scalability: Scalability is another feature of multi-tenant
SaaS application. Ideally, the cloud environment should
provide additional resources proportional to the customer
requests while keeping customer tasks at an acceptable
level of performance. Two kinds of scalability often need
474
Figure 3 Real-Time Service-Oriented Cloud Computing Lifecycle
to be addressed including scale-up and scale-out. Scale-
up involves making the processor more powerful such as
using a more powerful CPU with additional cache space;
scale-out involves adding additional processors or
networks into the cloud environment. A SaaS application
must have a scalable design to meet the real-time
requirements.
Auto provisioning: To provide on-demand services to
clients, a cloud environment often provides an automated
way to supply the needed resources dynamically. The
cloud environment is constantly monitoring the progress
and status of various applications/services, and if it
detects a slowdown of a process due to the lack of
resources, it will automatically allocate resources for this
task. In a real-time cloud environment, there are mainly
two steps to execute application requests, first step is VM
provisioning, which consists of generating VM instances
for each application that satisfy its characteristics and
requirements. The second step is to map and schedule
requests to physical resources. Most existing data
centers can only support general VM classes for all types
of workload, e.g. Amazonā€™s EC2 supports only the five
basic VM types [7].
Autonomous operation: Provision is just one of many
autonomous features of a cloud server; it also monitors,
verifies, and recovers any tasks from failed processors or
storage units. These are done without any intervention of
the end users.
Scheduling and prioritization: A cloud environment
needs to schedule numerous tasks, and as a SaaS
application software may serve multiple tenants, it also
needs a separate scheduler to schedule tasks to various
versions of the software for execution, and each version
also needs to access the data stored in processor caches,
memory, or storage devices.
Safety and security: The security issues on a cloud focus
primarily on data confidentiality, data safety and data
privacy. Also the malicious attacks performed in a cloud
system, including web service security [8], Transport
Layer Security [9]. The data security can be addressed by
some database authority control mechanisms, such as
filter-based pattern at the application level, and
permission-based pattern at the DBMS level. The system
security can be addressed by some metadata on the
service implementation modules, at least for
identification purposes.
4. Real-Time Cloud Computing LifeCycle
Figure 3 shows a lifecycle for real-time service-oriented
cloud computing development. It is different from
traditional SOA lifecycle in that it takes consideration of
the characteristics of cloud computing, such as multi-
tenancy, customization, distributed processing, tenant-
based scheduling, etc. There are six phases and a practice
that spans the whole lifecycle as the following:
Modeling: This phase models usersā€™ requirements in a
system model with a set of services. Services should be
modeled in a customizable way so that each tenant can
customize the services according to their specific
requirements. All services should be searchable and
annotated with ontology [10] and timing [11]
information, which can be used to guide service
discovery. Certain backend characteristics, such as
distributed database, MapReduce-like parallel process
should also be integrated with the model.
Composition: This phase composes applications using
services that have been created or discovered at runtime
according to the model specified in the previous phase;
Workflow templates, collaboration templates can be
reused to expedite the composition process. The timing
475
model proposed in [11] can be used to select services that
meet the timing constraints.
Code Generation: Code generator can automatically
generate simulation code and deployment code. Code
generator module needs to consider both client and server
site characteristics. For client-site, the generated code is
optimized to run faster in a client runtime environment.
Techniques such as paging, caching, pre-fetching can be
used. For server-site, the generated code can take
advantages of existing distributed programming models,
such as MapReduce or Pig [12], partitioned distributed
database discussed in section 5. The generated code is
checked by the code verification and validation module.
Simulation & Model Analysis: Before the code is
deployed, simulation needs to be performed to further
verify the correctness. The workload can also be
simulated at this phase to help figure out how much
resource, such as CPU time, storage capacity, is needed
for the application. The results can be used for resource
provisioning before the code is deployed. The model can
be further verified by simulation to see if it can meet the
functional and non-functional requirements of the
application.
Execution & Provision: The deployed application is
running on the distributed environment on the clouds.
Resource is provisioned initially according to the
simulation results. The workload can be distributed on
hundreds of thousands of nodes. The data can be stored
in virtualized distributed databases, such as the one
discussed in section 5. A coordination service, like
ZooKeeper [13], can be used to coordinate the
computation among the participating nodes. As the
request volume fluctuates, the system can also
dynamically allocate or retract the resource. Policy
enforcement can also be applied at runtime to ensure
various security, timing constraints.
Data Analysis: In this phrase, various analyses can be
performed on the data collected by the data provenance
service from all the phrases. For example, based on the
historical data, a future trend can be predicted using data
mining techniques, which will help pre-allocate the
resources the application needs, and result a better
performance. Various data analysis techniques, such as
time series analysis, cluster analysis, principle
component analysis, discriminate function analysis,
logistic regression, can be used.
Data Provenance & Fault Tolerant Computing:
Various data, such response time, application up time,
storage used, and tenant-specific requests, are collected
by the data provenance service throughout the whole
lifecycle. Fault Tolerant measurements are taken at all
phases in the lifecycle too. For example, redundant
service and application instances need to be deployed to
provide a high availability; failure detection logic is also
embedded to allow recovery actions to take place in time.
5. Scheduling Tasks at Server-Site
This section presents scheduling approaches to schedule
tasks for the multi-tenancy SaaS applications. As
discussed in Section 4, there are several unique features
of multi-tenancy architecture; a realistic cloud scheduling
algorithm needs to address the issues, including
scalability, dynamic resource allocation, database
partitioning and consistency, security and fairness,
parallel processing, fault-tolerant and isolation.
The simplest scalable scheduling approach to
duplicate the software for each tenant with individual
databases, i.e., each version of the software has its own
isolated database as shown in Figure 3. This approach
handles security well because tenant data and software
versions are isolated internally. However, while the data
are isolated, computing resources such as processors and
storage are still shared.
Figure 3 Isolated Databases
As each database is isolated from other databases, it
is relatively easy to extend the data model for each client
as in the conventional systems, and it is also relatively
easy to recover from failures using the conventional
techniques. This solution is straightforward but
expensive, as separate databases need to be maintained
including backup. As the application software needs to
interact with individual databases, and potentially the
number of clients and thus databases can be large, the
overhead will be high and scalability limited.
Several multi-tenant solutions use the shared database
approach to support scalability [14]. In this approach,
databases are shared among tenants with separate or
shared schema, and internal database operations need to
address data and performance isolation among tenants, in
addition to perform database operations including
transaction management, cache consistency, and storage
processing. Various cloud environments such as
BigTable have optimization algorithms including in-
memory processing and batching process where most of
operations will be done in the memory to speed up the
processing and actual storage processing in a batch mode.
In this way, a write operation is essentially setting a bit in
the memory, and writes to a disk will be pooled in a
batch mode. Even though this approach greatly reduce
the response time, it needs a sophisticated mechanism
476
(such as having the master writer responsible to update
other processors about the change of data and use
intelligent cache update algorithms) to maintain cache
and memory data consistent. The basic idea is to perform
most of operations in the memory, and batch processing
storage processing with hardware support including
dedicated high-speed networks such as a Fibre Channel.
This approach can be scaled up if each processor has
more computing power with more cache, and thus it can
host multiple partitions concurrently. This approach can
be also further scaled out if more processors, memory
units, or storage devices can be attached to the cloud
environment.
5.1. Database Partitioning
Two database partitioning approaches are available:
application-based distribution keys and tenant-used
distribution keys. For example, IBM DB2 V9[15]
supports both approaches.
The application-based distribution keys is a
traditional way to partition a database, and this is done by
choosing one or more attributes as a distribution key,
according to the domain knowledge. For example,
ā€œREGIONā€ attribute can be used as a distribution key.
However, this scheme needs a good distribution key to
balance the load among multiple partitions, and this
needs data profiling information. This solution also needs
to be upgraded to consider the multi-tenancy architecture,
and address the related isolation issues including:
x Performance isolation: A tenant with a large high-cost
requests in a short period can degrade other tenantsā€™
performance greatly
x Availability isolation: the failure of any partition may
result in service unavailability to all other tenants; and
x Management isolation: Data migration, backup, and
restoration should be performed in a tenant-isolated
manner.
The tenant-based distribution keys approach stores
each tenantā€™s data in a single partition. It can use
TenantID as the distribution key. Using this method, one
can map the tenant with any specific partition freely by
assigning or change the TenantID. As a tenant-aware
method, it provides better isolation than the previous
approach, as well as the availability. The table
partitioning provides a way to create a table in which
ranged of data are stored separately. The advantage of
this partition is to improve the query performance and
facilitate the table change, for example, one can use
ALTER TABLE statement to modify a table. At the
meanwhile, this requires the users have a clear
understanding of the table storage information.
5.2. Scheduling and Resource Management with
Database Partitioning
Most cloud scheduling algorithms and database
solutions address their problems independently.
However, most of cloud components and functionalities
are interconnected. Specifically, a task scheduling
algorithm should consider database partitioning to
provide an efficient solution for performance and
scalability. More specific, a task assigned to a processor
should host the appropriate data partitions otherwise data
updates and migration among caches and processors can
be expensive.
The most scalable multi-tenancy solution requires a
SaaS scheduler that can dispatch tasks to multiple copies
of the same software in a data center [14]. As the same
version of the software is used, user customization must
be stored in databases, and thus an integrated solution
must address both scheduling and database partitioning
together as shown in Figure 4.
Figure 4 Scheduler Service with Databases Partitioning
All databases are partitioned into chunks, i.e., single
units of database physical storage. In BigTable, GFS, and
other similar Web system, each chunk has 64 MB.
Tenants can have multiple chunks distributed at different
databases and share resources. There is a scheduler
service for each SaaS application in charge of scheduling
resources among tenants, including migrating,
distributing, and duplicating tenants among partitions by
monitoring the load, to optimize the overall performance.
The cloud environment has its own schedulers to
coordinate various SaaS schedulers and allocate cloud
resources for them.
The scheduler can have at least the following
database allocation approaches:
(a)Allocate databases with fixed partitions
periodically or asynchronously: given the number of
tenants k in a cloud, it can partition the available database
chunks into k groups based on resource constraints and
user requests. This method will decrease the contention,
and each partition will be allocated to a certain copy of
the software. As the workload changes, a re-allocation
needs to be done. One way is to perform the update
periodically, whenver the changes or the rates of changes
exceed certain thresholds, or when the system slows
down significantly due to unbalanced workload among
different tenants.
477
(b)Flexible partitioning and re-parititoning. Unlike
the previous approach, the partitions will be dynamically
maintained as the workload changes. For example, one
may use a scheme similar to B-tree to organize data
partition accordingly. A B-tree allows a congested
partition to double the resource, and a lightly loaded
partition to reduce its resources by half, and it may be
served together with another light partition in the same
processor. In this way, a busy tenant can have its needs
met, and a light tenant will not occupy idle resources by
sharing with fellow light tenants. By using this approach,
the resource can be automatically maintained and
balanced.
Based on the database partitioning, a SaaS scheduler
can make various scheduling decisions. The scheduling
can be done in a two-level hierarchy:
x At Cloud level, the master service could schedule the
requests from tenants according their priority. Different
features are considered in the prioritization model, and
a CM (Crystalline Mapping) approach [16], is used to
prioritize requests from tenants, that guarantee the fair,
independent, and relevant order property.
x At the tenant level, the ownership of the system
resource, including CPU time, memory, network
connection as well as the database usage is partitioned.
Both spatial and temporal partitioning [17][18] among
softwares are acting as isolation wall which can
guarantee the execution in a partition would not affect
others. Each partition Sk is scheduled periodically with
a fixed period, partition cycle Șk. In each partition
cycle, the server can execute the tasks in the partition
for an interval Șk * Ä®k, Ä®k is partition capacity (Ä®kā€¢1).
For the remaining interval of (1-Įk) *Șk, the server is
blocked.
Using this approach, the scalability is maintained at
both server level and database level.
6. Conclusion
This paper has presented some critical design issues
for real-time multi-tenancy SaaS applications. As SaaS
applications involve multiple technical fields within
computer science including real-time computing,
databases, scheduling, fault-tolerant computing,
distributed computing, and service-oriented computing,
and thus many new exciting problems and issues remain
open. This paper presents two solutions, one related to
design and implementation of real-time applications on a
cloud, and the other deals with scheduling multi-tenant
tasks with automated database partition management.
7. Acknowledgement
This project is sponsored by U.S. National Science
Foundation and U.S. Department of Education FIPSE, as
well as by the EU funding via Polytechnic University of
Bucharest.
8. References
[1] Wikipedia Cloud Computing. [Online].
http://en.wikipedia.org/wiki/Cloud_computing
[2] (2010, April) Arithum. [Online]. http://www.arithum.com/
[3] (2010, April) Proven Real-Time Integration. [Online].
http://www.salesforce.com/platform/cloud-
infrastructure/integration.jsp
[4] We-Tek Tsai, Yann-Hang Lee, Zhibin Cao, Yinong Chen,
and Bingnan Xiao, "RTSOA:Real-Time Service-Oriented
Architecture," in 2nd IEEE International Symposium on
Service-Orieted System Engineering, 2006, pp. 49-46.
[5] (2010, April) RT-SOA. [Online]. http://openrtsoa.com/
[6] (2010, April) Salesforce. [Online].
http://www.salesforce.com/
[7] (2010, April) Amazon Elastic Compute Cloud. [Online].
http://aws.amazon.com/ec2/
[8] Meiko Jensen, Jƶrg Schwenk, Nils Gruschka, and Luigi Lo
Iacono, "On Technical Security Issues in Cloud Computing,"
in 2009 IEEE International Conference on Cloud Computing,
2009, pp. 109-116.
[9] T. Dierks and E. Rescorla. (2010, Aprl) The Transport Layer
Security (TLS) Protocol Version 1.2. [Online].
http://www.ietf.org/rfc/rfc5246.txt
[10] Wei-Tek Tsai, Xin Sun, Qian Huang, and Helen Karatza, "An
Ontology-Based Collaborative Service-Oriented Simulation
Framework with Microsoft Robotics StudioĀ®," Simulation
Modelling Practice and Theory, vol. 16, no. 9, pp. 1392-
1414, Octobor 2008.
[11] Wei-Tek Tsai, Hessam S. Sarjoughian, Wu Li, and Xin Sun,
"Timing Specification and Analysis for Service-oriented
Simulation," in Proceedings of the 2009 Spring Simulation
Multiconference, San Diego, CA, 2009.
[12] (2010, April) Hadoop Pig. [Online].
http://hadoop.apache.org/pig/
[13] (2010, April) Hadoop ZooKeeper. [Online].
http://hadoop.apache.org/zookeeper/
[14] Frederick Chong, Gianpaolo Carraro, and Roger Wolter.
(2010, April) Multi-Tenant Data Architecture. [Online].
http://msdn.microsoft.com/en-us/library/aa479086.aspx
[15] ibm.com. [Online]. http://www.ibm.com
[16] Yinong Chen and Wei-Tek Tsai, Service-Oriented Computing
and Web Data Management, 9780757577475th ed., 2010.
[17] Yann-Hang Lee, Daeyoung Kim, Mohamed Younis, Jeff
Zhou, and James McElroy, "Resource Scheduling in
Dependable Integrated Modular Avionics," in Proceedings of
the 2000 International Conference on Dependable Systems
and Networks (formerly FTCS-30 and DCCA-8) , 2000, pp.
14-23.
[18] Daeyoung Kim, Yann-Hang Lee, and Mohamed Younis,
"SPIRIT-/spl mu/Kernel for strongly partitioned real-time
systems," in Proceedings of the Seventh International
Conference on Real-Time Systems and Applications, 2000, p.
73.
478

More Related Content

What's hot

Comparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing PlatformsComparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing Platformsijsrd.com
Ā 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESTushar Dhoot
Ā 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 pptDr VISU P
Ā 
Current services in cloud computing a survey
Current services in cloud computing a surveyCurrent services in cloud computing a survey
Current services in cloud computing a surveyijcseit
Ā 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
Ā 
CLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICECLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICEijdms
Ā 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2Shyam Kona
Ā 
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperComparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperTorry Harris Business Solutions
Ā 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Ā 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated versionDr. Radhey Shyam
Ā 
Cloud computing abstract
Cloud computing abstractCloud computing abstract
Cloud computing abstractJagadeesh Kumar
Ā 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...acijjournal
Ā 
Cloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 MayCloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 MayGovCloud Network
Ā 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
Ā 

What's hot (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ā 
Comparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing PlatformsComparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing Platforms
Ā 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
Ā 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
Ā 
Unit 2
Unit 2Unit 2
Unit 2
Ā 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 ppt
Ā 
Current services in cloud computing a survey
Current services in cloud computing a surveyCurrent services in cloud computing a survey
Current services in cloud computing a survey
Ā 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
Ā 
Unit 1
Unit 1Unit 1
Unit 1
Ā 
Sla in cloud
Sla in cloudSla in cloud
Sla in cloud
Ā 
CLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICECLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICE
Ā 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
Ā 
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperComparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Ā 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
Ā 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
Ā 
Unit 3
Unit   3Unit   3
Unit 3
Ā 
Cloud computing abstract
Cloud computing abstractCloud computing abstract
Cloud computing abstract
Ā 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
Ā 
Cloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 MayCloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 May
Ā 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
Ā 

Similar to Real time service oriented cloud computing

CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
Ā 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalLaud Randy Amofah
Ā 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadFaisal Shehzad
Ā 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingRishu Mehra
Ā 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with servicesSuresh Kumar
Ā 
6Virtualization and Cloud Computing Wor.docx
6Virtualization and Cloud Computing Wor.docx6Virtualization and Cloud Computing Wor.docx
6Virtualization and Cloud Computing Wor.docxevonnehoggarth79783
Ā 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxPiyush793067
Ā 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxssuserf71896
Ā 
Clpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxClpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxaravym456
Ā 
Serverless Architecture
Serverless ArchitectureServerless Architecture
Serverless ArchitectureRajind Ruparathna
Ā 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
Ā 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxSurajThapa79
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computingAbhijit Bilgi
Ā 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
Ā 
Discovering the value of the cloud for the business
Discovering the value of the cloud for the business Discovering the value of the cloud for the business
Discovering the value of the cloud for the business Dr. Ramkumar Lakshminarayanan
Ā 
Performance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud ServicesPerformance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud ServicesMd.Saiedur Rahaman
Ā 

Similar to Real time service oriented cloud computing (20)

Introducing cloud computing complete
Introducing cloud computing completeIntroducing cloud computing complete
Introducing cloud computing complete
Ā 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
Ā 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
Ā 
The Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing EssayThe Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing Essay
Ā 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
Ā 
Performance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for ServerPerformance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for Server
Ā 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ā 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with services
Ā 
6Virtualization and Cloud Computing Wor.docx
6Virtualization and Cloud Computing Wor.docx6Virtualization and Cloud Computing Wor.docx
6Virtualization and Cloud Computing Wor.docx
Ā 
Cloud computing (3)
Cloud computing (3)Cloud computing (3)
Cloud computing (3)
Ā 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptx
Ā 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptx
Ā 
Clpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxClpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptx
Ā 
Serverless Architecture
Serverless ArchitectureServerless Architecture
Serverless Architecture
Ā 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Ā 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ā 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
Ā 
Discovering the value of the cloud for the business
Discovering the value of the cloud for the business Discovering the value of the cloud for the business
Discovering the value of the cloud for the business
Ā 
Performance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud ServicesPerformance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud Services
Ā 

More from www.pixelsolutionbd.com

Adaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingAdaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingwww.pixelsolutionbd.com
Ā 
Software rejuvenation based fault tolerance
Software rejuvenation based fault toleranceSoftware rejuvenation based fault tolerance
Software rejuvenation based fault tolerancewww.pixelsolutionbd.com
Ā 
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 pPrivacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 pwww.pixelsolutionbd.com
Ā 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveywww.pixelsolutionbd.com
Ā 
Adaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computingAdaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computingwww.pixelsolutionbd.com
Ā 
Protecting from transient failures in cloud deployments
Protecting from transient failures in cloud deploymentsProtecting from transient failures in cloud deployments
Protecting from transient failures in cloud deploymentswww.pixelsolutionbd.com
Ā 
Protecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deploymentsProtecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deploymentswww.pixelsolutionbd.com
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computingwww.pixelsolutionbd.com
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computingwww.pixelsolutionbd.com
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computingwww.pixelsolutionbd.com
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computingwww.pixelsolutionbd.com
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computingwww.pixelsolutionbd.com
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computingwww.pixelsolutionbd.com
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computingwww.pixelsolutionbd.com
Ā 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...www.pixelsolutionbd.com
Ā 
Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...www.pixelsolutionbd.com
Ā 
A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...www.pixelsolutionbd.com
Ā 
Privacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2PPrivacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2Pwww.pixelsolutionbd.com
Ā 

More from www.pixelsolutionbd.com (20)

Adaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingAdaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computing
Ā 
Software rejuvenation based fault tolerance
Software rejuvenation based fault toleranceSoftware rejuvenation based fault tolerance
Software rejuvenation based fault tolerance
Ā 
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 pPrivacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 p
Ā 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud survey
Ā 
Adaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computingAdaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computing
Ā 
Protecting from transient failures in cloud deployments
Protecting from transient failures in cloud deploymentsProtecting from transient failures in cloud deployments
Protecting from transient failures in cloud deployments
Ā 
Protecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deploymentsProtecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deployments
Ā 
Speaking
SpeakingSpeaking
Speaking
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
Ā 
Cyber Physical System
Cyber Physical SystemCyber Physical System
Cyber Physical System
Ā 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
Ā 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Ā 
Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...
Ā 
A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...
Ā 
Privacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2PPrivacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2P
Ā 

Recently uploaded

šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
Ā 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
Ā 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
Ā 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Ā 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
Ā 

Recently uploaded (20)

šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Ā 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Ā 
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Serviceyoung call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
Ā 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Ā 
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
Ā 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Ā 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Ā 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Ā 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Ā 
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Ā 

Real time service oriented cloud computing

  • 1. Real-Time Service-Oriented Cloud Computing Wei-Tek Tsai*, Qihong Shao, Xin Sun, Jay Elston Abstract Cloud computing has received significant attention recently. This paper presents real-time issues related to cloud computing, such as multi-tenancy architecture, scheduling, paralleled computing and proposes a framework for real-time service-oriented cloud computing. Specially, we propose a novel real time architecture which solve the new challenges in Cloud Computing. 1. Introduction Cloud computing has received significant attention recently as it is a new computing infrastructure to enable rapid delivery of computing resources as a utility in a dynamic, scalable, and virtualized manner [1]. SaaS (Software as a Service), often deployed on a cloud, is a new way to deliver software. In SaaS, software is maintained and updated on a cloud, and presented to the end users as services on demand, usually in a browser. Many industry service providers start to support SaaS, for example Googleā€™s recent announcement of its Chrome OS, an operating system designed to run SaaS applications faster, simpler and more securely further shows that SaaS is viable. With Chrome OS, users will be able to listen to music, play games, watch video, and even store their data online. As SaaS is gaining popularity, people require more and more real-time features for a SaaS application. Popular social SaaS applications, such as Facebook, Twitter, made further enhancement to enable real-time communication. Major search engines also jump in real- time war by providing real-time search results, such as news, sport results, Facebook and Twitter updates. On the enterprise side, start-ups like Arithum [2] provide a real-time cloud computing platform and deliver pioneering real-time consumer and enterprise solutions. Force.com allows real-time integration with other on- premises applications and third-party cloud services [3]. Cloud computing is inherently real time, and more specifically soft real time, as a user will give up if the cloud does not provide the needed services almost instantaneously. For example, if a popular web-based email system responds slowly, most users will switch to another service provider or use a traditional email server. While the failure of the system to respond quickly may not cause any catastrophic consequences, it might lead to usersā€™ dissatisfaction. The discussion of real time feature in SOA starts from [4], Tsai et al proposed a real-time service-oriented architecture. There is also RTSOA software available [5]. As U.S. Department of Defense (DoD) as well as U.K. Ministry of Defense (MoD) both use service-oriented computing for their mission-critical projects, RTSOA becomes an important topic. Cloud computing uses SOC(Service Oriented Computing) as one of key technologies, however, it has other key aspects that SOC often does not address. Specifically, cloud computing emphasizes significantly about its high-performance server aspects. A cloud environment often has hundreds of thousands of processors with numerous disks interconnected by dedicated high-speed networks, and the infrastructure provides soft real-time computing for Web users. A cloud computing often has three layers on top of a data center: 1) SaaS (Software as a Service); 2) PaaS (Platform as a Service); 3) IaaS (Infrastructure as a Service). The IaaS layer provides a virtualized infrastructure including processors, storage, and networks to support various OS execution. The PaaS layer provides traditional system services such as OS services using the resources provided by the IaaS. The SaaS layer provides application software that end users can compose, deploy, and execute in a cloud environment. The SaaS application is often written in a service-oriented manner, and is hosted on a cloud for users to execute. One key feature of SaaS application is the multi-tenancy architecture, and it will be discussed in this paper. Since SaaS essentially uses a client-server model, to achieve real-time requirements, one needs to address computing at both client and server sites. This paper is organized as follows: Section 2 presents typical cloud client-site issues; Section 3 presents major cloud server-site issues; Section 4 shows a service- oriented design lifecycle for real-time cloud application; Section 5 present scheduling and database management for real-time cloud applications; and Section 6 concludes this paper. 2. Client-Site Issues A cloud client may be a mobile device or a PC that connects to a cloud server. A good example of a client- School of Computing, Informatics, and Decision Systems Engineering Arizona State University Computer Science and Technology, Tsinghua University, Beijing, China* {wtsai, qihong.shao, xin.sun, jelston}@asu.edu 2010 IEEE 6th World Congress on Services 978-0-7695-4129-7/10 $26.00 Ā© 2010 IEEE DOI 10.1109/SERVICES.2010.127 473
  • 2. side system is the recently announced Chrome OS, a network OS developed from Linux, and its open-source version Chromium. They are essentially lightweight OS designed for web browsing and SaaS applications. Figure 1 shows a comparison between traditional OS boot sequence and Chromium OS fast boot sequence. It takes 14 steps and more than 30 seconds for a traditional OS to open a browser from being turned on, while it takes only 5 steps and 4 seconds for Chromium OS to the same. Chrome software is adaptive as it checks the integrity of its code, and if the code is compromised, it will take actions in a pro-active manner to reboot the system. All applications will be services without installation. The system also verifies the digital signatures of services to ensure that the services are trustworthy. Furthermore, it provides a highly optimized JavaScript engine for efficient processing, and the data are stored in local caches for efficient retrieval. Furthermore, only data needed immediately are retrieved from the Web to avoid unnecessary bandwidth waste. Note that as a consequence of using services, a client system can be viewed as ā€œsystem + the Webā€ rather than just the system as it can search services from the Web for execution. All these designs lead to efficient Web service execution with self-adaptive features. There are several unique challenges in the client site: Efficient client-site execution, caching and pre- fetching: A lot of feature-rich web applications use JavaScript heavily. The core component of Chrome OS, Chrome browser has a highly optimized JavaScript engine. Moreover, services that are often used can be found at the local cache, and data are also pre-fetched from the Web for better user experience. Paging: In other words, only retrieve the data that will be used immediately. The obvious reason is that a lot of resources are wasted as most of the results returned will be discarded before being used, and it often results longer lags. Stream filtering: Not all requests from the users require computation work. Sometimes they can be safely ignored; sometimes, the according response can be found in server-side cache. But utilizing stream filtering and data comparison tools, the performance can be further improved. Runtime checking, verification, and recovery: The system keeps on checking the integrity of its code to ensure that nothing is compromised, and if compromised, it takes actions in a pro-active manner to reboot the system. The system also verifies the digital signatures of services to ensure that the services are trustworthy. Environment-aware evolution and adaption: The environment of a client is the Web, and it depends on search engines to identify the needed services. As the Web is an open and changing environment, the system is thus open and dynamic. Figure 1 Boot Sequence Comparison between Chromium OS and Traditional OS 3. Server-Site Issue Compared to a client, a cloud server may be hosted on a data center with hundreds of thousands of processors and disks interconnected by high-speed networks. One important feature of SaaS is the multi-tenancy architecture. The cloud server will provide the internal bookkeeping so that data from different clients will be protected. A multi-tenant application can be compared with multi-instance software where individualized software will serve different tenants. The multi-tenancy architecture save significant cost in terms of software application development, however, it also adds significant overhead in bookkeeping to ensure that end users can enjoy satisfactory performance. Some critical issues related to SaaS applications are as follows: Customization: As a SaaS application serves multiple tenants, it is important that it can be customized for different tenants, which is often done by storing customization data in a backend database in the cloud environment. This leads to significant design issues because this involves database design, concurrent and parallel database processing, and data synchronization. Many cloud companies thus decide to develop special database management systems and distributed file systems to support this operation, such as Googleā€™s BigTable and GFS (Google File System). Customization can be done on the level of individual services and the composition of services. The customization can be either tenant-specific or can be multi-tenant aware and reused by other tenants. Most Cloud computing service provides can support customization. For example, Salesforce.com [6] offers a platform (AppExchange platform) that allows tenants to create and deploy their own extensions to the application. Scalability: Scalability is another feature of multi-tenant SaaS application. Ideally, the cloud environment should provide additional resources proportional to the customer requests while keeping customer tasks at an acceptable level of performance. Two kinds of scalability often need 474
  • 3. Figure 3 Real-Time Service-Oriented Cloud Computing Lifecycle to be addressed including scale-up and scale-out. Scale- up involves making the processor more powerful such as using a more powerful CPU with additional cache space; scale-out involves adding additional processors or networks into the cloud environment. A SaaS application must have a scalable design to meet the real-time requirements. Auto provisioning: To provide on-demand services to clients, a cloud environment often provides an automated way to supply the needed resources dynamically. The cloud environment is constantly monitoring the progress and status of various applications/services, and if it detects a slowdown of a process due to the lack of resources, it will automatically allocate resources for this task. In a real-time cloud environment, there are mainly two steps to execute application requests, first step is VM provisioning, which consists of generating VM instances for each application that satisfy its characteristics and requirements. The second step is to map and schedule requests to physical resources. Most existing data centers can only support general VM classes for all types of workload, e.g. Amazonā€™s EC2 supports only the five basic VM types [7]. Autonomous operation: Provision is just one of many autonomous features of a cloud server; it also monitors, verifies, and recovers any tasks from failed processors or storage units. These are done without any intervention of the end users. Scheduling and prioritization: A cloud environment needs to schedule numerous tasks, and as a SaaS application software may serve multiple tenants, it also needs a separate scheduler to schedule tasks to various versions of the software for execution, and each version also needs to access the data stored in processor caches, memory, or storage devices. Safety and security: The security issues on a cloud focus primarily on data confidentiality, data safety and data privacy. Also the malicious attacks performed in a cloud system, including web service security [8], Transport Layer Security [9]. The data security can be addressed by some database authority control mechanisms, such as filter-based pattern at the application level, and permission-based pattern at the DBMS level. The system security can be addressed by some metadata on the service implementation modules, at least for identification purposes. 4. Real-Time Cloud Computing LifeCycle Figure 3 shows a lifecycle for real-time service-oriented cloud computing development. It is different from traditional SOA lifecycle in that it takes consideration of the characteristics of cloud computing, such as multi- tenancy, customization, distributed processing, tenant- based scheduling, etc. There are six phases and a practice that spans the whole lifecycle as the following: Modeling: This phase models usersā€™ requirements in a system model with a set of services. Services should be modeled in a customizable way so that each tenant can customize the services according to their specific requirements. All services should be searchable and annotated with ontology [10] and timing [11] information, which can be used to guide service discovery. Certain backend characteristics, such as distributed database, MapReduce-like parallel process should also be integrated with the model. Composition: This phase composes applications using services that have been created or discovered at runtime according to the model specified in the previous phase; Workflow templates, collaboration templates can be reused to expedite the composition process. The timing 475
  • 4. model proposed in [11] can be used to select services that meet the timing constraints. Code Generation: Code generator can automatically generate simulation code and deployment code. Code generator module needs to consider both client and server site characteristics. For client-site, the generated code is optimized to run faster in a client runtime environment. Techniques such as paging, caching, pre-fetching can be used. For server-site, the generated code can take advantages of existing distributed programming models, such as MapReduce or Pig [12], partitioned distributed database discussed in section 5. The generated code is checked by the code verification and validation module. Simulation & Model Analysis: Before the code is deployed, simulation needs to be performed to further verify the correctness. The workload can also be simulated at this phase to help figure out how much resource, such as CPU time, storage capacity, is needed for the application. The results can be used for resource provisioning before the code is deployed. The model can be further verified by simulation to see if it can meet the functional and non-functional requirements of the application. Execution & Provision: The deployed application is running on the distributed environment on the clouds. Resource is provisioned initially according to the simulation results. The workload can be distributed on hundreds of thousands of nodes. The data can be stored in virtualized distributed databases, such as the one discussed in section 5. A coordination service, like ZooKeeper [13], can be used to coordinate the computation among the participating nodes. As the request volume fluctuates, the system can also dynamically allocate or retract the resource. Policy enforcement can also be applied at runtime to ensure various security, timing constraints. Data Analysis: In this phrase, various analyses can be performed on the data collected by the data provenance service from all the phrases. For example, based on the historical data, a future trend can be predicted using data mining techniques, which will help pre-allocate the resources the application needs, and result a better performance. Various data analysis techniques, such as time series analysis, cluster analysis, principle component analysis, discriminate function analysis, logistic regression, can be used. Data Provenance & Fault Tolerant Computing: Various data, such response time, application up time, storage used, and tenant-specific requests, are collected by the data provenance service throughout the whole lifecycle. Fault Tolerant measurements are taken at all phases in the lifecycle too. For example, redundant service and application instances need to be deployed to provide a high availability; failure detection logic is also embedded to allow recovery actions to take place in time. 5. Scheduling Tasks at Server-Site This section presents scheduling approaches to schedule tasks for the multi-tenancy SaaS applications. As discussed in Section 4, there are several unique features of multi-tenancy architecture; a realistic cloud scheduling algorithm needs to address the issues, including scalability, dynamic resource allocation, database partitioning and consistency, security and fairness, parallel processing, fault-tolerant and isolation. The simplest scalable scheduling approach to duplicate the software for each tenant with individual databases, i.e., each version of the software has its own isolated database as shown in Figure 3. This approach handles security well because tenant data and software versions are isolated internally. However, while the data are isolated, computing resources such as processors and storage are still shared. Figure 3 Isolated Databases As each database is isolated from other databases, it is relatively easy to extend the data model for each client as in the conventional systems, and it is also relatively easy to recover from failures using the conventional techniques. This solution is straightforward but expensive, as separate databases need to be maintained including backup. As the application software needs to interact with individual databases, and potentially the number of clients and thus databases can be large, the overhead will be high and scalability limited. Several multi-tenant solutions use the shared database approach to support scalability [14]. In this approach, databases are shared among tenants with separate or shared schema, and internal database operations need to address data and performance isolation among tenants, in addition to perform database operations including transaction management, cache consistency, and storage processing. Various cloud environments such as BigTable have optimization algorithms including in- memory processing and batching process where most of operations will be done in the memory to speed up the processing and actual storage processing in a batch mode. In this way, a write operation is essentially setting a bit in the memory, and writes to a disk will be pooled in a batch mode. Even though this approach greatly reduce the response time, it needs a sophisticated mechanism 476
  • 5. (such as having the master writer responsible to update other processors about the change of data and use intelligent cache update algorithms) to maintain cache and memory data consistent. The basic idea is to perform most of operations in the memory, and batch processing storage processing with hardware support including dedicated high-speed networks such as a Fibre Channel. This approach can be scaled up if each processor has more computing power with more cache, and thus it can host multiple partitions concurrently. This approach can be also further scaled out if more processors, memory units, or storage devices can be attached to the cloud environment. 5.1. Database Partitioning Two database partitioning approaches are available: application-based distribution keys and tenant-used distribution keys. For example, IBM DB2 V9[15] supports both approaches. The application-based distribution keys is a traditional way to partition a database, and this is done by choosing one or more attributes as a distribution key, according to the domain knowledge. For example, ā€œREGIONā€ attribute can be used as a distribution key. However, this scheme needs a good distribution key to balance the load among multiple partitions, and this needs data profiling information. This solution also needs to be upgraded to consider the multi-tenancy architecture, and address the related isolation issues including: x Performance isolation: A tenant with a large high-cost requests in a short period can degrade other tenantsā€™ performance greatly x Availability isolation: the failure of any partition may result in service unavailability to all other tenants; and x Management isolation: Data migration, backup, and restoration should be performed in a tenant-isolated manner. The tenant-based distribution keys approach stores each tenantā€™s data in a single partition. It can use TenantID as the distribution key. Using this method, one can map the tenant with any specific partition freely by assigning or change the TenantID. As a tenant-aware method, it provides better isolation than the previous approach, as well as the availability. The table partitioning provides a way to create a table in which ranged of data are stored separately. The advantage of this partition is to improve the query performance and facilitate the table change, for example, one can use ALTER TABLE statement to modify a table. At the meanwhile, this requires the users have a clear understanding of the table storage information. 5.2. Scheduling and Resource Management with Database Partitioning Most cloud scheduling algorithms and database solutions address their problems independently. However, most of cloud components and functionalities are interconnected. Specifically, a task scheduling algorithm should consider database partitioning to provide an efficient solution for performance and scalability. More specific, a task assigned to a processor should host the appropriate data partitions otherwise data updates and migration among caches and processors can be expensive. The most scalable multi-tenancy solution requires a SaaS scheduler that can dispatch tasks to multiple copies of the same software in a data center [14]. As the same version of the software is used, user customization must be stored in databases, and thus an integrated solution must address both scheduling and database partitioning together as shown in Figure 4. Figure 4 Scheduler Service with Databases Partitioning All databases are partitioned into chunks, i.e., single units of database physical storage. In BigTable, GFS, and other similar Web system, each chunk has 64 MB. Tenants can have multiple chunks distributed at different databases and share resources. There is a scheduler service for each SaaS application in charge of scheduling resources among tenants, including migrating, distributing, and duplicating tenants among partitions by monitoring the load, to optimize the overall performance. The cloud environment has its own schedulers to coordinate various SaaS schedulers and allocate cloud resources for them. The scheduler can have at least the following database allocation approaches: (a)Allocate databases with fixed partitions periodically or asynchronously: given the number of tenants k in a cloud, it can partition the available database chunks into k groups based on resource constraints and user requests. This method will decrease the contention, and each partition will be allocated to a certain copy of the software. As the workload changes, a re-allocation needs to be done. One way is to perform the update periodically, whenver the changes or the rates of changes exceed certain thresholds, or when the system slows down significantly due to unbalanced workload among different tenants. 477
  • 6. (b)Flexible partitioning and re-parititoning. Unlike the previous approach, the partitions will be dynamically maintained as the workload changes. For example, one may use a scheme similar to B-tree to organize data partition accordingly. A B-tree allows a congested partition to double the resource, and a lightly loaded partition to reduce its resources by half, and it may be served together with another light partition in the same processor. In this way, a busy tenant can have its needs met, and a light tenant will not occupy idle resources by sharing with fellow light tenants. By using this approach, the resource can be automatically maintained and balanced. Based on the database partitioning, a SaaS scheduler can make various scheduling decisions. The scheduling can be done in a two-level hierarchy: x At Cloud level, the master service could schedule the requests from tenants according their priority. Different features are considered in the prioritization model, and a CM (Crystalline Mapping) approach [16], is used to prioritize requests from tenants, that guarantee the fair, independent, and relevant order property. x At the tenant level, the ownership of the system resource, including CPU time, memory, network connection as well as the database usage is partitioned. Both spatial and temporal partitioning [17][18] among softwares are acting as isolation wall which can guarantee the execution in a partition would not affect others. Each partition Sk is scheduled periodically with a fixed period, partition cycle Șk. In each partition cycle, the server can execute the tasks in the partition for an interval Șk * Ä®k, Ä®k is partition capacity (Ä®kā€¢1). For the remaining interval of (1-Ä®k) *Șk, the server is blocked. Using this approach, the scalability is maintained at both server level and database level. 6. Conclusion This paper has presented some critical design issues for real-time multi-tenancy SaaS applications. As SaaS applications involve multiple technical fields within computer science including real-time computing, databases, scheduling, fault-tolerant computing, distributed computing, and service-oriented computing, and thus many new exciting problems and issues remain open. This paper presents two solutions, one related to design and implementation of real-time applications on a cloud, and the other deals with scheduling multi-tenant tasks with automated database partition management. 7. Acknowledgement This project is sponsored by U.S. National Science Foundation and U.S. Department of Education FIPSE, as well as by the EU funding via Polytechnic University of Bucharest. 8. References [1] Wikipedia Cloud Computing. [Online]. http://en.wikipedia.org/wiki/Cloud_computing [2] (2010, April) Arithum. [Online]. http://www.arithum.com/ [3] (2010, April) Proven Real-Time Integration. [Online]. http://www.salesforce.com/platform/cloud- infrastructure/integration.jsp [4] We-Tek Tsai, Yann-Hang Lee, Zhibin Cao, Yinong Chen, and Bingnan Xiao, "RTSOA:Real-Time Service-Oriented Architecture," in 2nd IEEE International Symposium on Service-Orieted System Engineering, 2006, pp. 49-46. [5] (2010, April) RT-SOA. [Online]. http://openrtsoa.com/ [6] (2010, April) Salesforce. [Online]. http://www.salesforce.com/ [7] (2010, April) Amazon Elastic Compute Cloud. [Online]. http://aws.amazon.com/ec2/ [8] Meiko Jensen, Jƶrg Schwenk, Nils Gruschka, and Luigi Lo Iacono, "On Technical Security Issues in Cloud Computing," in 2009 IEEE International Conference on Cloud Computing, 2009, pp. 109-116. [9] T. Dierks and E. Rescorla. (2010, Aprl) The Transport Layer Security (TLS) Protocol Version 1.2. [Online]. http://www.ietf.org/rfc/rfc5246.txt [10] Wei-Tek Tsai, Xin Sun, Qian Huang, and Helen Karatza, "An Ontology-Based Collaborative Service-Oriented Simulation Framework with Microsoft Robotics StudioĀ®," Simulation Modelling Practice and Theory, vol. 16, no. 9, pp. 1392- 1414, Octobor 2008. [11] Wei-Tek Tsai, Hessam S. Sarjoughian, Wu Li, and Xin Sun, "Timing Specification and Analysis for Service-oriented Simulation," in Proceedings of the 2009 Spring Simulation Multiconference, San Diego, CA, 2009. [12] (2010, April) Hadoop Pig. [Online]. http://hadoop.apache.org/pig/ [13] (2010, April) Hadoop ZooKeeper. [Online]. http://hadoop.apache.org/zookeeper/ [14] Frederick Chong, Gianpaolo Carraro, and Roger Wolter. (2010, April) Multi-Tenant Data Architecture. [Online]. http://msdn.microsoft.com/en-us/library/aa479086.aspx [15] ibm.com. [Online]. http://www.ibm.com [16] Yinong Chen and Wei-Tek Tsai, Service-Oriented Computing and Web Data Management, 9780757577475th ed., 2010. [17] Yann-Hang Lee, Daeyoung Kim, Mohamed Younis, Jeff Zhou, and James McElroy, "Resource Scheduling in Dependable Integrated Modular Avionics," in Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8) , 2000, pp. 14-23. [18] Daeyoung Kim, Yann-Hang Lee, and Mohamed Younis, "SPIRIT-/spl mu/Kernel for strongly partitioned real-time systems," in Proceedings of the Seventh International Conference on Real-Time Systems and Applications, 2000, p. 73. 478