Abstract
The complexity of large cloud offerings makes it extremely hard to guarantee their dependability and security. This paper extracts lessons from some years of research on the notion of using several clouds –instead of a single one– with the objective of achieving high dependability and security. We show that using such clouds-of-clouds it is possible for services to continue to operate correctly despite dependability and security issues in a subset of the clouds. We show this approach with three cases: clouds-of-clouds for storage with the DepSky system; cloud-of-clouds for data processing with MapReduce; the execution of arbitrary services in clouds-of-clouds with the EBAWA algorithm.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Amazon EC2 pricing, http://aws.amazon.com/ec2/pricing/ (accessed August 15, 2013)
Amazon EC2 user guide – regions and availability zones, http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html (accessed August 15, 2013)
Amir, Y., Coan, B., Kirsch, J., Lane, J.: Byzantine replication under attack. In: Proceedings of the IEEE/IFIP 38th International Conference on Dependable Systems and Networks, pp. 197–206 (June 2008)
Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)
Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: DepSky: Dependable and secure storage in a cloud-of-clouds. In: Proceedings of the 6th ACM SIGOPS/EuroSys European Systems Conference, pp. 31–46 (April 2011)
Brewer, E.: Towards robust distributed systems. In: Proceedings of the 19th ACM Annual Symposium on Principles of Distributed Computing, pp. 7–10 (2000)
Cascella, R.G., Blasi, L., Jegou, Y., Coppola, M., Morin, C.: Contrail: Distributed application deployment under SLA in federated heterogeneous clouds. In: Galis, A., Gavras, A. (eds.) FIA 2013. LNCS, vol. 7858, pp. 91–103. Springer, Heidelberg (2013)
Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation, pp. 173–186 (February 1999)
Correia, M., Costa, P., Pasin, M., Bessani, A., Ramos, F., Verissimo, P.: On the feasibility of Byzantine fault-tolerant MapReduce in clouds-of-clouds. In: Proceedings of the 1st International Workshop on Dependability Issues in Cloud Computing (October 2012)
Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. In: Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, pp. 137–150 (December 2004)
Gilbert, S., Lynch, N.: Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, 51–59 (June 2002)
Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Computing 11(4), 203–213 (1998)
Nightingale, E.B., Douceur, J.R., Orgovan, V.: Cycles, cells and platters: an empirical analysis of hardware failures on a million consumer PCs. In: Proceedings of the 6th ACM SIGOPS/EuroSys European Systems Conference, pp. 343–356 (2011)
NIST: FIPS 180-2, Secure Hash Standard (August 2002)
Rabinovich, M., Rabinovich, I., Rajaraman, R., Aggarwal, A.: A dynamic object replication and migration protocol for an internet hosting service. In: Proceedings of the 19th IEEE International Conference on Distributed Computing Systems, pp. 101–113 (1999)
Rocha, F., Correia, M.: Lucy in the sky without diamonds: Stealing confidential data in the cloud. In: Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (2011)
Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys 22(4), 299–319 (1990)
Schroeder, B., Pinheiro, E., Weber, W.D.: DRAM errors in the wild: a large-scale field study. In: Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems, pp. 193–204 (2009)
Topchiy, S.: Testing Amazon EC2 network speed (March 2013), http://epamcloud.blogspot.pt/2013/03/testing-amazon-ec2-network-speed.html (accessed August 15, 2013)
Veronese, G.S., Correia, M., Bessani, A.N., Lung, L.C.: EBAWA: Efficient Byzantine agreement for wide-area networks. In: Proceedings of the IEEE 12th International Symposium on High-Assurance Systems Engineering, pp. 10–19 (November 2010)
White, T.: Hadoop: The Definitive Guide. O’Reilly (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Correia, M. (2014). Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud. In: an Mey, D., et al. Euro-Par 2013: Parallel Processing Workshops. Euro-Par 2013. Lecture Notes in Computer Science, vol 8374. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54420-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-54420-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54419-4
Online ISBN: 978-3-642-54420-0
eBook Packages: Computer ScienceComputer Science (R0)