SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Improving Utilization of
Infrastructure Clouds
Abstract
 A key advantage of Infrastructure-as-a-Service (IaaS)
clouds is providing users on-demand access to
resources.
 To provide on-demand access, cloud providers must
either significantly overprovision their infrastructure
(and pay a high price for operating resources with
low utilization) or reject a large proportion of user
requests (in which case the access is no longer on-
demand).
 At the same time, not all users require truly on-
demand access to resources.
 Many applications and workflows are designed
for recoverable systems where interruptions in
service are expected.
 We propose a cloud infrastructure that combines
on-demand allocation of resources with
opportunistic provisioning of cycles from idle
cloud nodes to other processes.
Existing System
 Impossible to know whether the terms of the Service
Level Agreement (SLA) are being met without
monitoring and measuring the performance of the
service.
 Service Level Management is how that performance
information is gathered and handled.
 Measurements of the service are based on the
Service Level Objectives in the SLA.
 A cloud provider uses Service Level Management to
make decisions about its infrastructure.
Disadvantages
 Many applications and workflows are
designed for recoverable systems where
interruptions in service are expected.
 Impossible to know whether the terms of the
Service Level Agreement (SLA) are being met
without monitoring and measuring the
performance of the service.
Architecture
Problem Statement
 Infrastructure-as-a-Service (IaaS) cloud
computing has emerged as an attractive
alternative to the acquisition and management of
physical resources.
 The on demand provisioning it supports allows
users to elastically expand and contract the
resource base available to them based on an
immediate need – a pattern that enables a quick
turnaround time when dealing with emergencies,
working towards deadlines, or growing an
institutional resource base.
Proposed System
 We demonstrate that a shared infrastructure
between IaaS cloud providers and an HTC job
management system can be highly beneficial
to both the IaaS cloud provider and HTC users
by increasing the utilization of the cloud
infrastructure (thereby decreasing the overall
cost) and contributing cycles that would
otherwise be idle to processing HTC jobs.
Modules
1. Ondemand User
2. Opportunistic User
3. Fraud Detection Service
4. Automation and Management service
Ondemand User
 On-demand, non-preemptible and flexible
leases give a user access to a resource within
interactive time of making the request and
make the resource available for an agreed-
upon period of time. The user can deploy any
VM compatible with the system.
Opportunistic User
 Opportunistic, preemptible and pre-set leases
give a user access to a resource at an
indeterminate time and make the resource
available to the user for an indeterminate
amount of time. Further, this resource is pre-
defined for the user by the cloud
administrator, i.e. the user cannot provide his
or her own VM.
Fraud Detection Service
 Our goal is to detect when the distributor’s
sensitive data has been leaked by agents, and
if possible to identify the agent that leaked
the data. Perturbation is a very useful
technique where the data is modified and
made “less sensitive” before being handed to
agents. we develop unobtrusive techniques
for detecting leakage of a set of objects or
records.
Automation and Management service
 This system typically enables the top level
management to keep track of the status of the
projects under their control.
H/W System Configuration
 Processor - Pentium –III
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
S/W System Configuration
‱ Operating System - Windows95/98/2000/XP
‱ Front End - HTML, Java, JSP
‱ Database - MsAccess
‱ Database Connectivity- JDBC.
Improving utilization of infrastructure clouds

Weitere Àhnliche Inhalte

Was ist angesagt?

Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
Sandip Kadam
 

Was ist angesagt? (20)

Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Management Mechanisms
Cloud Management MechanismsCloud Management Mechanisms
Cloud Management Mechanisms
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
 
Consumer side
Consumer sideConsumer side
Consumer side
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
 
Mod05lec25(resource mgmt ii)
Mod05lec25(resource mgmt ii)Mod05lec25(resource mgmt ii)
Mod05lec25(resource mgmt ii)
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
How to choose the right Database technology for your business?
How to choose the right Database technology for your business?How to choose the right Database technology for your business?
How to choose the right Database technology for your business?
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
tcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud Computingtcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud Computing
 
Fundamental Cloud Architectures
Fundamental Cloud ArchitecturesFundamental Cloud Architectures
Fundamental Cloud Architectures
 
Cloud computing-intro
Cloud computing-introCloud computing-intro
Cloud computing-intro
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Emergence of cloud computing and internet of things an overview
Emergence of cloud computing and internet of things   an overviewEmergence of cloud computing and internet of things   an overview
Emergence of cloud computing and internet of things an overview
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Performance issues in Cloud Computing
Performance issues in Cloud ComputingPerformance issues in Cloud Computing
Performance issues in Cloud Computing
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 

Ähnlich wie Improving utilization of infrastructure clouds

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
SURBHI SAROHA
 
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
nipun014p
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
AngelineR
 

Ähnlich wie Improving utilization of infrastructure clouds (20)

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
E42053035
E42053035E42053035
E42053035
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing charecteristics and types   altanai bisht , 2nd year,  part iiiCloud computing charecteristics and types   altanai bisht , 2nd year,  part iii
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Introducing cloud computing
Introducing cloud computingIntroducing cloud computing
Introducing cloud computing
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
IaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloudIaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloud
 
B03410609
B03410609B03410609
B03410609
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
 

Mehr von Raga Deepthi

Mehr von Raga Deepthi (11)

Group Discussions
Group DiscussionsGroup Discussions
Group Discussions
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
Image processing
Image processingImage processing
Image processing
 
blue eye technology
blue eye technologyblue eye technology
blue eye technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Humanoid robot
Humanoid robotHumanoid robot
Humanoid robot
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
 
Artifial intelligence
Artifial intelligenceArtifial intelligence
Artifial intelligence
 

KĂŒrzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

KĂŒrzlich hochgeladen (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Improving utilization of infrastructure clouds

  • 2. Abstract  A key advantage of Infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources.  To provide on-demand access, cloud providers must either significantly overprovision their infrastructure (and pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the access is no longer on- demand).
  • 3.  At the same time, not all users require truly on- demand access to resources.  Many applications and workflows are designed for recoverable systems where interruptions in service are expected.  We propose a cloud infrastructure that combines on-demand allocation of resources with opportunistic provisioning of cycles from idle cloud nodes to other processes.
  • 4. Existing System  Impossible to know whether the terms of the Service Level Agreement (SLA) are being met without monitoring and measuring the performance of the service.  Service Level Management is how that performance information is gathered and handled.  Measurements of the service are based on the Service Level Objectives in the SLA.  A cloud provider uses Service Level Management to make decisions about its infrastructure.
  • 5. Disadvantages  Many applications and workflows are designed for recoverable systems where interruptions in service are expected.  Impossible to know whether the terms of the Service Level Agreement (SLA) are being met without monitoring and measuring the performance of the service.
  • 7. Problem Statement  Infrastructure-as-a-Service (IaaS) cloud computing has emerged as an attractive alternative to the acquisition and management of physical resources.  The on demand provisioning it supports allows users to elastically expand and contract the resource base available to them based on an immediate need – a pattern that enables a quick turnaround time when dealing with emergencies, working towards deadlines, or growing an institutional resource base.
  • 8. Proposed System  We demonstrate that a shared infrastructure between IaaS cloud providers and an HTC job management system can be highly beneficial to both the IaaS cloud provider and HTC users by increasing the utilization of the cloud infrastructure (thereby decreasing the overall cost) and contributing cycles that would otherwise be idle to processing HTC jobs.
  • 9. Modules 1. Ondemand User 2. Opportunistic User 3. Fraud Detection Service 4. Automation and Management service
  • 10. Ondemand User  On-demand, non-preemptible and flexible leases give a user access to a resource within interactive time of making the request and make the resource available for an agreed- upon period of time. The user can deploy any VM compatible with the system.
  • 11. Opportunistic User  Opportunistic, preemptible and pre-set leases give a user access to a resource at an indeterminate time and make the resource available to the user for an indeterminate amount of time. Further, this resource is pre- defined for the user by the cloud administrator, i.e. the user cannot provide his or her own VM.
  • 12. Fraud Detection Service  Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents. we develop unobtrusive techniques for detecting leakage of a set of objects or records.
  • 13. Automation and Management service  This system typically enables the top level management to keep track of the status of the projects under their control.
  • 14. H/W System Configuration  Processor - Pentium –III  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB
  • 15. S/W System Configuration ‱ Operating System - Windows95/98/2000/XP ‱ Front End - HTML, Java, JSP ‱ Database - MsAccess ‱ Database Connectivity- JDBC.