Abstract
Deployment in Cloud of applications affected by restrictive security and dependability requirements, and currently considered too critical to be hosted on existing public Clouds, can be a challenge, but at the same time, a necessity for owners of mission-critical applications and services and a new business opportunity for federated Clouds. In particular, new paradigms should be designed to leverage the greater scalability and elasticity offered by federated Cloud infrastructures, as well as tools should be developed to implement a more secure, resilient and performing inter-cloud ecosystem. Such solutions can enable application owners to control in a finer-grained manner the security and dependability of their resources across federated Clouds, in order to satisfy the same critical requirements achieved by hosting the application on its private Cloud. This paper presents the main technical issues and challenges, which must be addressed to migrate mission-critical applications on public Clouds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Esposito, C., Ficco, M., Palmieri, F., & Castiglione, A. (2015). A knowledge-based platform for big data analytics based on publish/subscribe services and stream processing. Journal of Knowledge-Based Systems, 79, 3–17.
Diaz-Montes, J., Diaz-Granados, M., Zou, M., & Tao, S. (2015). Supporting data-intensive workflows in software-defined federated multi-clouds. In IEEE Transactions on Cloud Computing (Vol. 99).
Ficco, M., Esposito, C., Chang, H., & Raymond Choo, K. K. (2016). Live migration in emerging cloud paradigms. IEEE Cloud Computing, 3(2), 12–19.
Cloud Computing Comes of Age, available at https://hbr.org/resources/pdfs/comm/oracle/19128_HBR_Oracle_Report_webview.pdf.
Esposito, C., Ficco, M., Palmieri, P., & Castiglione, A. (2013). Interconnecting federated clouds by using publish-subscribe service. Cluster Computing, 6(4), 887–903.
Ficco, M., Tasquier, L., & Di Martino, B. (2014). Interconnection of federated clouds. Intelligent Distributed Computing VII, 511, 243–248.
SWITCH project, Software Workbench for Interactive, Time Critical and Highly self-adaptive Cloud applications, available at http://www.switchproject.eu/.
SUPERCLOUD project, User-centric management of security and dependability in clouds of clouds, available at https://supercloud-project.eu/.
Ficco, M., Palmieri, F., & Castiglione, A. (2015). Modeling security requirements for cloud-based system development. Concurrency and Computation: Practice and Experience, 27(8), 2107–2124.
Buyya, R., Ranjan, R., & Calheiros, R. N. (2010). InterCloud: Utility-oriented federation of cloud computing environments for scaling of application services. Algorithms and Architectures for Parallel Processing, LNCS, 6081, 13–31.
Ficco, M., & Rak, M. (2013). SLA-oriented security provisioning for cloud computing. LNCS, 367, 230–244.
Ficco, M., & Rak, M. (2012). Intrusion tolerance of stealth DoS attacks to web services. Information Security and Privacy, LNCS, 376, 579–584.
Andersen, J. (2015). Moving mission-critical applications to the cloud. Network Computing, available at: http://www.networkcomputing.com/cloud-infrastructure/moving-mission-critical-applications-cloud/2132272314.
Ficco, M., & Rak, M. (2015). Stealthy denial of service strategy in cloud computing. IEEE Transactions on Cloud Computing, 3(1), 80–94.
Brataas, G., Stav, E., Becker, S. (2013). CloudScale: Scalability management for cloud systems. In Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (pp. 335–338).
Rak, M., & Ficco, M. (2012). Intrusion tolerance as a service: A SLA-based solution. In Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012) (pp. 375–384). Porto, Portugal.
Weingärtner, R., Bräscher, G. B., & Westphall, C. B. (2015). Cloud resource management: A survey on forecasting and profiling models. Journal of Network and Computer Applications, 47, 99–106.
Ficco, M., Rak, M., & Di Martino, B. (2012). An intrusion detection framework for supporting SLA assessment in cloud computing. In Proceedings of the 4th International Conference on Computational Aspects of Social Networks (CASoN 2012) (pp. 244–249). Sao Carlos, Brazil.
Geronimo, G., Werner, J., Westphall, C., & Defenti, L. (2013). Provisioning and resource allocation for green clouds. In Proceedings of the International Conference on Networks (pp. 81–86).
Raja Wasim, A., et al. (2015). A survey on virtual machine migration and server consolidation frameworks for cloud data centers. Journal of Network and Computer Applications, 52, 11–25.
Macías, M., & Guitart, J. (2016). Analysis of a trust model for SLA negotiation and enforcement in cloud markets. Future Generation Computer Systems, 55, 460–472.
Calheiros, R. N., et al. (2015). Workload prediction using ARIMA model and its impact on cloud applications’ QoS. IEEE Transactions on Cloud Computing, 3(4), 449–458.
Bonvin, T., Papaioannou, G., & Aberer, K. (2011). Autonomic SLA-driven provisioning for cloud applications. In Proceedings of the 11th International Symposium on Cluster, Cloud and Grid Computing (pp. 434–443).
Islam, S., Keung, J., Lee, K., & Liu, A. (2012). Empirical prediction models for adaptive resource provisioning in the cloud. Future Generation Computing System, 28(1), 155–162.
Pacheco-Sanchez, S., et al. (2011). Markovian workload characterization for QoS prediction in the cloud. In Proceedings of the 4th International Conference on Cloud Computing (pp. 147–154).
Tran, V. G., Debusschere, V., & Bacha, S. (2012). Hourly server workload forecasting up to 168 hours ahead using seasonal ARIMA model. In Proceedings of the 13th International Conference on Industrial Technology (pp. 1127–1131).
Mustafa, S., et al. (2015). Resource management in cloud computing: Taxonomy, prospects, and challenges. Computers & Electrical Engineering, 47, 186–203.
Farahabady, M. R. H., Lee, Y. C., & Zomaya, A. Y. (2014). Pareto-optimal cloud bursting. IEEE Transactions on Parallel Distributed System, 25(10), 2670–2682.
AzureWatch, available at: www.paraleap.com/azurewatch/.
Meinel, C., Dawoud, W., & Takouna, I. (2011). Elastic vm for dynamic virtualized resources provisioning and optimization (Technical Report), Hasso Plattner Institute, University of Potsdam.
Roy, N., Dubey, A., & Gokhale, A. (2011). Efficient autoscaling in the cloud using predictive models for workload forecasting. In Proceedings of the 4th International Conference on Cloud Computing (pp. 500–507).
Gong, Z., Gu, X., & Wilkes, J. (2010). Press: Predictive elastic resource scaling for cloud systems. In Proceedings of the 6th International Conference on Network and Service Management (pp. 9–16).
Vasi, N., Novakovi, D., Miu, S., Kosti, D., & Bianchini, R. (2012). Dejavu: Accelerating resource allocation in virtualized environments. In Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 423–436).
Ficco, M., Venticinque, S., & Di Martino, B. (2012). mOSAIC-based intrusion detection framework for cloud computing. In Move to Meaningful Internet Systems: OTM 2012, LNCS (Vol. 7566, pp. 628–644).
SPECS Project. Secure Provisioning of Cloud Services based on SLA management. FP7-ICT-2013.1.5, available at: http://specs-project.eu/.
SLAReady—Making Cloud SLAs readily usable in the EU private sector, available at: http://www.sla-ready.eu/.
SLALOM—SLALOM—Service Level Agreement—Legal and Open Model, available at: http://slalom-project.eu/.
MUSA Project. MUlti-cloud Secure Applications, H2020-ICT-2014-1, available at: www.musa-project.eu.
Bennani, N., Ghedira-guegan, C., Vargas-solar, G., & Musicante, M. A. (2015). Towards a secure database integration using SLA in a multi-cloud context. In Proceedings of the Computer Software and Applications Conference (pp. 4–9).
Bohli, J. M., Gruschka, N., Jensen, M., Iacono, L. L., & Marnau, N. (2013). Security and privacy-enhancing multicloud architectures. IEEE Transactions on Dependable and Secure Computing, 10, 212–224.
Singhal, M., et al. (2013). Collaboration in multicloud computing environments: Framework and security issues. In IEEE Computer (pp. 76–84).
5 questions to consider as you shift more business critical applications to the cloud, available at: http://www.networkworld.com/article/3027682/cloud-computing/5-questions-to-consider-as-you-shift-more-business-critical-applications-to-the-cloud.html (Retrieved January 2015).
Trending: Enterprises Move Business-Critical Application to the Cloud, available at: http://news.verizonenterprise.com/2015/06/enterprise-cloud-workloads-applications-adoption/ (Retrieved February 2015).
The future of cloud computing, 3rd annual survey 2013. North Bridge in partnership with GigaOM Research. Available at http://www.northbridge.com/2013-cloud-computing-survey (Retrieved February 2015).
Acknowledgements
This research is partially supported by the projects CoSSMic (Collaborating Smart Solar-powered Micro-grids—FP7-ICT-608806), CRYSTAL (Critical System Engineering Acceleration—no. 332830), and ITINERE (Integrated and Interoperable System for Railway Enhanced Applications—P.O.R. FESR Campania 2007/2013).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ficco, M., Amato, A., Venticinque, S. (2018). Hosting Mission-Critical Applications on Cloud: Technical Issues and Challenges. In: Lamboglia, R., Cardoni, A., Dameri, R., Mancini, D. (eds) Network, Smart and Open. Lecture Notes in Information Systems and Organisation, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-319-62636-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-62636-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62635-2
Online ISBN: 978-3-319-62636-9
eBook Packages: Business and ManagementBusiness and Management (R0)