Skip to main content

Hosting Mission-Critical Applications on Cloud: Technical Issues and Challenges

  • Conference paper
  • First Online:
Network, Smart and Open

Abstract

Deployment in Cloud of applications affected by restrictive security and dependability requirements, and currently considered too critical to be hosted on existing public Clouds, can be a challenge, but at the same time, a necessity for owners of mission-critical applications and services and a new business opportunity for federated Clouds. In particular, new paradigms should be designed to leverage the greater scalability and elasticity offered by federated Cloud infrastructures, as well as tools should be developed to implement a more secure, resilient and performing inter-cloud ecosystem. Such solutions can enable application owners to control in a finer-grained manner the security and dependability of their resources across federated Clouds, in order to satisfy the same critical requirements achieved by hosting the application on its private Cloud. This paper presents the main technical issues and challenges, which must be addressed to migrate mission-critical applications on public Clouds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Esposito, C., Ficco, M., Palmieri, F., & Castiglione, A. (2015). A knowledge-based platform for big data analytics based on publish/subscribe services and stream processing. Journal of Knowledge-Based Systems, 79, 3–17.

    Article  Google Scholar 

  2. Diaz-Montes, J., Diaz-Granados, M., Zou, M., & Tao, S. (2015). Supporting data-intensive workflows in software-defined federated multi-clouds. In IEEE Transactions on Cloud Computing (Vol. 99).

    Google Scholar 

  3. Ficco, M., Esposito, C., Chang, H., & Raymond Choo, K. K. (2016). Live migration in emerging cloud paradigms. IEEE Cloud Computing, 3(2), 12–19.

    Article  Google Scholar 

  4. Cloud Computing Comes of Age, available at https://hbr.org/resources/pdfs/comm/oracle/19128_HBR_Oracle_Report_webview.pdf.

  5. Esposito, C., Ficco, M., Palmieri, P., & Castiglione, A. (2013). Interconnecting federated clouds by using publish-subscribe service. Cluster Computing, 6(4), 887–903.

    Article  Google Scholar 

  6. Ficco, M., Tasquier, L., & Di Martino, B. (2014). Interconnection of federated clouds. Intelligent Distributed Computing VII, 511, 243–248.

    Article  Google Scholar 

  7. SWITCH project, Software Workbench for Interactive, Time Critical and Highly self-adaptive Cloud applications, available at http://www.switchproject.eu/.

  8. SUPERCLOUD project, User-centric management of security and dependability in clouds of clouds, available at https://supercloud-project.eu/.

  9. Ficco, M., Palmieri, F., & Castiglione, A. (2015). Modeling security requirements for cloud-based system development. Concurrency and Computation: Practice and Experience, 27(8), 2107–2124.

    Article  Google Scholar 

  10. Buyya, R., Ranjan, R., & Calheiros, R. N. (2010). InterCloud: Utility-oriented federation of cloud computing environments for scaling of application services. Algorithms and Architectures for Parallel Processing, LNCS, 6081, 13–31.

    Article  Google Scholar 

  11. Ficco, M., & Rak, M. (2013). SLA-oriented security provisioning for cloud computing. LNCS, 367, 230–244.

    Google Scholar 

  12. Ficco, M., & Rak, M. (2012). Intrusion tolerance of stealth DoS attacks to web services. Information Security and Privacy, LNCS, 376, 579–584.

    Google Scholar 

  13. Andersen, J. (2015). Moving mission-critical applications to the cloud. Network Computing, available at: http://www.networkcomputing.com/cloud-infrastructure/moving-mission-critical-applications-cloud/2132272314.

  14. Ficco, M., & Rak, M. (2015). Stealthy denial of service strategy in cloud computing. IEEE Transactions on Cloud Computing, 3(1), 80–94.

    Article  Google Scholar 

  15. Brataas, G., Stav, E., Becker, S. (2013). CloudScale: Scalability management for cloud systems. In Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (pp. 335–338).

    Google Scholar 

  16. Rak, M., & Ficco, M. (2012). Intrusion tolerance as a service: A SLA-based solution. In Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012) (pp. 375–384). Porto, Portugal.

    Google Scholar 

  17. Weingärtner, R., Bräscher, G. B., & Westphall, C. B. (2015). Cloud resource management: A survey on forecasting and profiling models. Journal of Network and Computer Applications, 47, 99–106.

    Article  Google Scholar 

  18. Ficco, M., Rak, M., & Di Martino, B. (2012). An intrusion detection framework for supporting SLA assessment in cloud computing. In Proceedings of the 4th International Conference on Computational Aspects of Social Networks (CASoN 2012) (pp. 244–249). Sao Carlos, Brazil.

    Google Scholar 

  19. Geronimo, G., Werner, J., Westphall, C., & Defenti, L. (2013). Provisioning and resource allocation for green clouds. In Proceedings of the International Conference on Networks (pp. 81–86).

    Google Scholar 

  20. Raja Wasim, A., et al. (2015). A survey on virtual machine migration and server consolidation frameworks for cloud data centers. Journal of Network and Computer Applications, 52, 11–25.

    Article  Google Scholar 

  21. Macías, M., & Guitart, J. (2016). Analysis of a trust model for SLA negotiation and enforcement in cloud markets. Future Generation Computer Systems, 55, 460–472.

    Article  Google Scholar 

  22. Calheiros, R. N., et al. (2015). Workload prediction using ARIMA model and its impact on cloud applications’ QoS. IEEE Transactions on Cloud Computing, 3(4), 449–458.

    Article  Google Scholar 

  23. Bonvin, T., Papaioannou, G., & Aberer, K. (2011). Autonomic SLA-driven provisioning for cloud applications. In Proceedings of the 11th International Symposium on Cluster, Cloud and Grid Computing (pp. 434–443).

    Google Scholar 

  24. Islam, S., Keung, J., Lee, K., & Liu, A. (2012). Empirical prediction models for adaptive resource provisioning in the cloud. Future Generation Computing System, 28(1), 155–162.

    Article  Google Scholar 

  25. Pacheco-Sanchez, S., et al. (2011). Markovian workload characterization for QoS prediction in the cloud. In Proceedings of the 4th International Conference on Cloud Computing (pp. 147–154).

    Google Scholar 

  26. Tran, V. G., Debusschere, V., & Bacha, S. (2012). Hourly server workload forecasting up to 168 hours ahead using seasonal ARIMA model. In Proceedings of the 13th International Conference on Industrial Technology (pp. 1127–1131).

    Google Scholar 

  27. Mustafa, S., et al. (2015). Resource management in cloud computing: Taxonomy, prospects, and challenges. Computers & Electrical Engineering, 47, 186–203.

    Google Scholar 

  28. Farahabady, M. R. H., Lee, Y. C., & Zomaya, A. Y. (2014). Pareto-optimal cloud bursting. IEEE Transactions on Parallel Distributed System, 25(10), 2670–2682.

    Article  Google Scholar 

  29. AzureWatch, available at: www.paraleap.com/azurewatch/.

  30. Meinel, C., Dawoud, W., & Takouna, I. (2011). Elastic vm for dynamic virtualized resources provisioning and optimization (Technical Report), Hasso Plattner Institute, University of Potsdam.

    Google Scholar 

  31. Roy, N., Dubey, A., & Gokhale, A. (2011). Efficient autoscaling in the cloud using predictive models for workload forecasting. In Proceedings of the 4th International Conference on Cloud Computing (pp. 500–507).

    Google Scholar 

  32. Gong, Z., Gu, X., & Wilkes, J. (2010). Press: Predictive elastic resource scaling for cloud systems. In Proceedings of the 6th International Conference on Network and Service Management (pp. 9–16).

    Google Scholar 

  33. Vasi, N., Novakovi, D., Miu, S., Kosti, D., & Bianchini, R. (2012). Dejavu: Accelerating resource allocation in virtualized environments. In Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 423–436).

    Google Scholar 

  34. Ficco, M., Venticinque, S., & Di Martino, B. (2012). mOSAIC-based intrusion detection framework for cloud computing. In Move to Meaningful Internet Systems: OTM 2012, LNCS (Vol. 7566, pp. 628–644).

    Google Scholar 

  35. SPECS Project. Secure Provisioning of Cloud Services based on SLA management. FP7-ICT-2013.1.5, available at: http://specs-project.eu/.

  36. SLAReady—Making Cloud SLAs readily usable in the EU private sector, available at: http://www.sla-ready.eu/.

  37. SLALOM—SLALOM—Service Level Agreement—Legal and Open Model, available at: http://slalom-project.eu/.

  38. MUSA Project. MUlti-cloud Secure Applications, H2020-ICT-2014-1, available at: www.musa-project.eu.

  39. Bennani, N., Ghedira-guegan, C., Vargas-solar, G., & Musicante, M. A. (2015). Towards a secure database integration using SLA in a multi-cloud context. In Proceedings of the Computer Software and Applications Conference (pp. 4–9).

    Google Scholar 

  40. Bohli, J. M., Gruschka, N., Jensen, M., Iacono, L. L., & Marnau, N. (2013). Security and privacy-enhancing multicloud architectures. IEEE Transactions on Dependable and Secure Computing, 10, 212–224.

    Article  Google Scholar 

  41. Singhal, M., et al. (2013). Collaboration in multicloud computing environments: Framework and security issues. In IEEE Computer (pp. 76–84).

    Google Scholar 

  42. 5 questions to consider as you shift more business critical applications to the cloud, available at: http://www.networkworld.com/article/3027682/cloud-computing/5-questions-to-consider-as-you-shift-more-business-critical-applications-to-the-cloud.html (Retrieved January 2015).

  43. Trending: Enterprises Move Business-Critical Application to the Cloud, available at: http://news.verizonenterprise.com/2015/06/enterprise-cloud-workloads-applications-adoption/ (Retrieved February 2015).

  44. The future of cloud computing, 3rd annual survey 2013. North Bridge in partnership with GigaOM Research. Available at http://www.northbridge.com/2013-cloud-computing-survey (Retrieved February 2015).

Download references

Acknowledgements

This research is partially supported by the projects CoSSMic (Collaborating Smart Solar-powered Micro-grids—FP7-ICT-608806), CRYSTAL (Critical System Engineering Acceleration—no. 332830), and ITINERE (Integrated and Interoperable System for Railway Enhanced Applications—P.O.R. FESR Campania 2007/2013).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimo Ficco .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ficco, M., Amato, A., Venticinque, S. (2018). Hosting Mission-Critical Applications on Cloud: Technical Issues and Challenges. In: Lamboglia, R., Cardoni, A., Dameri, R., Mancini, D. (eds) Network, Smart and Open. Lecture Notes in Information Systems and Organisation, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-319-62636-9_12

Download citation

Publish with us

Policies and ethics