Abstract
A major factor in the growth of the Information and Communications Technology has been the widespread use of data centers for deploying and executing web services, business processes, and scientific and e-commerce applications. While some data centers are designed to operate a specific business (e.g., Google’s search engine), others are used as the backbone infrastructure to deliver computing resources as services to hundreds of users (e.g., Amazon’s EC2 service). Relying on data centers for running applications, particularly when resources are delivered to the users as a service, offer significant benefits. For example, applications can benefit significantly from the economy of scale, and users are relieved from buying expensive hardware and software licenses and from maintaining the computing infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B. Addis, D. Ardagna, B. Panicucci, and L. Zhang, “Autonomic management of cloud service centers with availability guarantees,” in Proc. of 3rd International Conference on Cloud Computing, Miami, FL, USA, July 2010, pp. 220–227
M. Albanese, S. Jajodia, R. Jhawar, and V. Piuri, “Reliable Mission Deployment in Vulnerable Distributed Systems,” in Proc. of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, Budapest, Hungary, June 24–27, 2013, pp. 1–8
M. Albanese, S. Jajodia, R. Jhawar, and V. Piuri, “Securing Mission-Centric Operations in the Cloud,” in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2013
C. A. Ardagna, R. Jhawar, and V. Piuri, “Dependability Certification of Services: A Model-Based Approach,” in Computing, Springer, Oct, 2013, pp. 1–28
G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri, “On the propagation of faults and their detection in a hardware implementation of the Advanced Encryption Standard”, in Proc. of the 2002 IEEE International Conference on Application-Specific Systems, Architectures and Processors, San Jose, CA, USA, July 2002, pp. 303–312
E. Bin, O. Biran, O. Boni, E. Hadad, E. Kolodner, Y. Moatti, and D. Lorenz, “Guaranteeing high availability goals for virtual machine placement,” in Proc. of 31st International Conference on Distributed Computing Systems, Minneapolis, USA, June 2011, pp. 700–709
C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati, “Efficient Key Management for Enforcing Access Control in Outsourced Scenarios,” in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece, May 2009
I. Cunha, J. Almeida, V. Almeida, and M. Santos, “Self-adaptive capacity management for multi-tier virtualized environments,” in Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, May 2007, pp. 129–138
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Key Management for Multiuser Encrypted Databases," in Proc. of the International Workshop on Storage Security and Survivability, Fairfax, Virginia, USA, Nov 2005
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, “Controlled Information Sharing in Collaborative Distributed Query Processing,” in Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 2008
S. De Capitani di Vimercati, S. Foresti, S. Ja jodia, and G. Livraga, “Enforcing Subscription-based Authorization Policies in Cloud Scenarios,” in Proc. of the 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Paris, France, July 11–13, 2012
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, and P. Samarati, “Enforcing Dynamic Write Privileges in Data Outsourcing,” in Computers & Security, 2013
S. De Capitani di Vimercati, S. Foresti, P. Samarati, “Managing and Accessing Data in the Cloud: Privacy Risks and Approaches,” in Proc. of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), Cork, Ireland, Oct 2012
S. De Capitani di Vimercati, G. Livraga, V. Piuri, F. Scotti, “Privacy and Security in Environmental Monitoring Systems,” in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome, Italy, Oct 2012
S. De Capitani di Vimercati, A. Genovese, G. Livraga, V. Piuri, F. Scotti, “Privacy and Security in Environmental Monitoring Systems: Issues and Solutions”, in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, Boston, 2013, pp. 835–853
P. Gill, N. Jain, and N. Nagappan, “Understanding Network Failures in Data Centers: Measurement, Analysis and Implications”, ACM Computer Communication Review, vol. 41, no. 4, 2011, pp. 350–361
S. Gilbert and N. Lynch, “Brewer’s conjecture and the feasibility of Consistent, Available, Partition-tolerant web services,” SIGACT News, vol. 33, no. 2, Jun 2002, pp. 51–59
R. Guerraoui and M. Yabandeh, “Independent faults in the cloud,” in Proc. of 4th International Workshop on Large Scale Distributed Systems and Middleware, Zurich, Switzerland: ACM, 2010, pp. 12–17
U. Helzle and L. A. Barroso, “The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines”, 1st ed. Morgan and Claypool Publishers, 2009
F. Hermenier, S. Demassey, and X. Lorca, “Bin repacking scheduling in Virtualized datacenters”, in Proc. of Constraints Programming, Perugia, Italy, 2011
F. Hermenier, J. Lawall, J.M. Menaud, and G. Muller, “Dynamic Consolidation of Highly Available Web Applications”, INRIA, Tech. Rep. RR-7545, 2011
G. Jung, K. Joshi, M. Hiltunen, R. Schlichting, and C. Pu, “Performance and availability aware regeneration for cloud based multitier applications,” in Proc. of 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, Chicago, IL, USA, July 2010, pp. 497–506
R. Jhawar and V. Piuri, “Fault tolerance management in IaaS Clouds,” in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Telecommunications, Rome, Italy, Oct 2012, pp. 1–6
R. Jhawar and V. Piuri, “Adaptive resource management for balancing availability and performance in Cloud computing,” in Proc. of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, Jul 2013, pp. 254–264
R. Jhawar and V. Piuri, “Fault Tolerance and Resilience in Cloud Computing Environments,” in Computer and Information Security Handbook, 2nd ed., J. Vacca (ed.), Morgan Kaufmann, 2013, pp. 125–141
D. Jayasinghe, C. Pu, T. Eilam, M. Steinder, I. Whally, and E. Snible, “Improving performance and availability of services hosted on IaaS Clouds with structural constraint-aware virtual machine placement,” in Proc. of IEEE International Conference on Services Computing, Washington, DC, USA, Jul 2011, pp. 72–79
R. Jhawar, V. Piuri, and P. Samarati, “Supporting security requirements for resource management in cloud computing,” in Proc. of the 15th IEEE International Conference on Computational Science and Engineering, Paphos, Cyprus, Dec 2012, pp. 170–177
R. Jhawar, V. Piuri, and M. Santambrogio, “Fault Tolerance Management in Cloud Computing: A System-Level Perspective,” in IEEE Systems Journal 7 (2), June, 2013, pp. 288–297
S. Kim, F. Machida, and K. Trivedi, “Availability modeling and analysis of virtualized system,” in Proc. of 15th IEEE Pacific Rim International Symposium on Dependable Computing, Shanghai, China, Nov 2009, pp. 365–371
K. Mills, J. Filliben, and C. Dabrowski, “Comparing VM-Placement Algorithms for on-demand Clouds”, in Proc. of CLOUD’11, Washington, DC, USA, 2011, pp. 91–98
F. Machida, M. Kawato, and Y. Maeno, “Redundant Virtual Machine Placement for Fault Tolerant Consolidated Server Clusters”, in Proc. of IEEE/IFIP NOMS’10, Osaka, Japan, 2010, pp. 32–39
L. Shi, B. Butler, D. Botvich, and B. Jennings, “Provisioning of requests for virtual machine sets with placement constraints in IaaS clouds,” in Proc. of IFIP/IEEE International Symposium on Integrated Network Management, Ghent, Belgium, May 2013, pp. 499–505
P. Samarati and S. De Capitani di Vimercati, “Data Protection in Outsourcing Scenarios: Issues and Directions”, in Proc. of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010, pp. 1–14
K. Shin, C. M. Krishna, and Y. Hang Lee, “Optimal dynamic control of resources in a distributed system,” IEEE Transactions on Software Engineering, vol. 15, no. 10, 1989, pp. 1188–1198
A. Singh, M. Korupolu, and D. Mohapatra, “Server-storage virtualization: Integration and load balancing in data centers,” in Proc. of SC’08, Austin, TX, USA, Nov 2008, pp. 53:1–53:12
W.E. Smith, K.S. Trivedi, L.A. Tomek, and J. Ackaret, “Availability Analysis of Blade Server Systems”, IBM Systems Journal, vol. 47, no. 4, 2008, pp. 621–640
K. Vishwanath and N. Nagappan, “Characterizing Cloud Computing Hardware Reliability”, in Proc. of SoCC’10, Indianapolis, IN, USA, 2010, pp. 193–204
B. Yang, X. Xu, F. Tan, and D.-H. Park, “An utility-based job scheduling algorithm for cloud computing considering reliability factor,” in Proc. of International Conference on Cloud and Service Computing, Hong Kong, Dec 2011, pp. 95–102
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this chapter
Cite this chapter
Jhawar, R., Piuri, V. (2015). Dependability-Oriented Resource Management Schemes for Cloud Computing Data Centers. In: Khan, S., Zomaya, A. (eds) Handbook on Data Centers. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2092-1_45
Download citation
DOI: https://doi.org/10.1007/978-1-4939-2092-1_45
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-2091-4
Online ISBN: 978-1-4939-2092-1
eBook Packages: Computer ScienceComputer Science (R0)