SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters

SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters

Shao-Jui Chen, Jing-Ying Huang, Cheng-Ta Huang, Wei-Jen Wang
Copyright: © 2013 |Pages: 16
DOI: 10.4018/jghpc.2013040102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is an emerging computing paradigm that provides all kinds of services through the Internet. Existing elastic computing approaches are popular in cloud computing. They can fulfill the requirements of some cloud applications, but usually fail to provide an isolated computing environment consisting of connected virtual machines over a user-defined network topology. This paper presents a system architecture, namely SAMEVED, which exposes a cloud service that can allocate and manage a private, virtual elastic datacenter by integrating VPN and virtual routers into existing virtualization technologies. Authentication is required by user login while using SAMEVED. A user-friendly web interface and remote invocation interface are provided to support different operations for different users with different privileges.
Article Preview
Top

Introduction

Cloud computing (Armbrust et al., 2010; Foster, Yong Zhao, Raicu, & Lu, 2008; Armbrust et al., 2009) usually refers to delivering software, hardware, or a development platform through the Internet as a service. Cloud services are generally classified into three different types according to what resources are provided: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Among these types of cloud services, IaaS is the foundation of the other two types of services. It provides on-demand computing power and storage as an execution environment for cloud software. With IaaS, people need not concern about resource over-provisioning, which is required in a traditional datacenter to meet users’ maximum computing requirements. Users can pay what they need since an IaaS provider can virtually slice their computing facility into many instances and provide these instances on demand. This model sometimes refers to elastic computing (Wernsing & Stitt, 2010) or utility computing (Ross & Westerman, 2004), which is widely used in industry. For example, Amazon provides EC2 (http://www.citrix.com) share some common features that are fundamental to elastic computing. The first common feature is to provide users the ability to start, to login, and to terminate their virtual machines. For example, an interface is required to interact with the users in these systems. The second common feature is to protect users’ private data from been accessed by unauthorized people. A typical solution is to ask users to register their accounts in the infrastructure service. A privacy protection mechanism can use the account information to verify the access rights of data on the infrastructure service.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 2 Issues (2023)
Volume 14: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing