Modeling and Simulation of Cloud Computing:A Review Wei Zhao, Yong Peng, Feng Xie, Zhonghua Dai 報告者 : 饒展榕.

Slides:



Advertisements
Similar presentations
SLA-Oriented Resource Provisioning for Cloud Computing
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Cloud Computing to Satisfy Peak Capacity Needs Case Study.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Cloud SUT proposal OSGcloud group. Objective To fill in the Research the group about the thinking within the OSG working group To solicit new ideas/proposals.
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Cloud Basics.  Define what the Cloud is  Describe the essential characteristics are of the Cloud  Describe the service models of the Cloud  Describe.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
Discussion on LI for Mobile Clouds
Plan Introduction What is Cloud Computing?
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Effectively and Securely Using the Cloud Computing Paradigm.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Introduction to Cloud Computing
VIRTUALIZATION AND CLOUD COMPUTING Dr. John P. Abraham Professor, Computer Engineering UTPA.
Security issues in the Cloud Presentation for CloudCamp 2012 (Lagos) Christopher Odutola FVC Inc. Dubai.
Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Computer Science and Engineering 1 Cloud ComputingSecurity.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
In the Cloud How to Address Security in the Cloud.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
Using SaaS and Cloud computing For “On Demand” E Learning Services Application to Navigation and Fishing Simulator Author Maha KHEMAJA, Nouha AMMARI, Fayssal.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Introduction to Cloud Computing Insigma Hengtian Software Ltd. * 部分材料摘自 * 部分材料摘自 Jimmy Jiang , Doug Terry Shanping Li
PaaSport Introduction on Cloud Computing PaaSport training material.
Overview and Comparison of Software Tools for Power Management in Data Centers Msc. Enida Sheme Acad. Neki Frasheri Polytechnic University of Tirana Albania.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Software Acquisition Management. Cloud Computing 2.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Web Technologies Lecture 13 Introduction to cloud computing.
Bay Ridge Security Consulting (BRSC) Cloud Computing.
Cloudsim: simulator for cloud computing infrastructure and modeling Presented By: SHILPA V PIUS 1.
Innovative Partnership Solution-Driven Commitment Agile Value Sustainable.
Software as a Service (SaaS) Fredrick Dande, MBA, PMP.
Discussion Context NIST Cloud definition and extension to address network and infrastructure issues Discussion of the ISPD-RG Infrastructure definition.
Template V.17, July 29, 2011 What’s the Cloud Got to do with HR Transformation? Heath Brownsworth, Director Technology Strategy.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Welcome To We have registered over 5,000 domain names and host over 1,500 cloud servers for individuals and organizations, Our fast and reliable.
Advanced cloud infrastructures and services SAULIUS ŽIŪKAS.
CLOUD COMPUTING Presented to Graduate Students Mechanical Engineering Dr. John P. Abraham Professor, Computer Engineering UTPA.
The National Institute of Standards and Technology (NIST) define Cloud Computing as “a model for enabling convenient, on-demand network access to a shared.
LIGHTWEIGHT CLOUD COMPUTING FOR FAULT-TOLERANT DATA STORAGE MANAGEMENT
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Cloud Computing.
Chapter 22: Cloud Computing Technology and Security
Cloud Computing Dr. Sharad Saxena.
Dr. John P. Abraham Professor, Computer Engineering UTPA
Service Oriented Architecture for Cloud Based Travel Reservation Software as a Service Comp 684 – Rayna Burgess.
Cloud Computing: Concepts
Computer Science and Engineering
Cloud Computing Erasmus+ Project
Presentation transcript:

Modeling and Simulation of Cloud Computing:A Review Wei Zhao, Yong Peng, Feng Xie, Zhonghua Dai 報告者 : 饒展榕

Outline 1.INTRODUCTION 2.PRELIMINARIES 3.MODELING AND SIMULATION OF CLOUD COMPUTING 4.DISCUSSIONS 5.CONCLUSIONS

INTRODUCTION As the experimentation in a real environment is expensive, time costly, and not repeatable, it is often hard to analyze the performance and security issues on actual cloud environments. Therefore, modeling and simulation technology becomes increasingly popular in the cloud industry and academy.

In the literature, some traditional distributed system simulators can’t provide the environment that can be directly used by the cloud computing community. Briefly, these simulators can be broadly divided into two types: simulators just based on software, simulator based on both software and hardware.

PRELIMINARIES In the industry and academy, there exist many definitions for cloud computing and is no canonical one. In this section, we review the definition of cloud computing proposed by National Institute of Standards and Technology (NIST).

A. Definitions of Cloud Computing In 2011, NIST defined cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

B. Security Issues of Cloud Coputing Cloud Security Alliance indicates that cloud computing confronts the following top security threats: 1. abuse and nefarious use of cloud computing; 2. insecure interfaces and APIs 3. malicious insiders 4. shared technology issues 5. data loss or leakage 6.account or service hijacking 7. unknown risk profile

MODELING AND SIMULATION OF CLOUD COMPUTING A. CloudSim B. CloudAnalyst C. SPECI D. GreenCloud E. OCT F. Open Cirrus G. GroudSim H. NetworkCloudSim I. EMUSIM J. DCSim K. iCanCloud

A. CloudSim

B. CloudAnalyst

C. SPECI This simulation tool is composed of two packages, one refers to the data center layout and topology, and the other one consists of the components for experiment execution and measuring.

D. GreenCloud

E. OCT

F. Open Cirrus

G. GroudSim Ostermann et al. [28] proposed an event- based simulator GorudSim for scientific applications on grid and cloud environment that requires one simulation thread only. This simulator focuses on the IaaS area of cloud computing and is easily extendable to support additional models like cloud storage or platform as a service.

H. NetworkCloudSim

I. EMUSIM

J. DCSim Tighe et al. proposed a Data Centre Simulator (DCSim) which is an extensible simulation framework for simulating a data centre hosting an IaaS cloud.

J. DCSim

K. iCanCloud

DISCUSSIONS In this section, as shown in Table I, we make analysis and comparison on the cloud computing simulators from three aspects: underlying platform that simulators are based on, developing language that simulators used, software or hardware that simulators is designed as.

CONCLUSIONS During the past few years, cloud computing has been one of the fastest growing parts in IT industry. Users have express concern about security problems that exist with the widespread implementation of cloud computing. It is extensively necessary to evaluate performance and security risks cloud computing confronts, and thus can find more effective solutions to security issues raised by cloud computing applications.