Skip to main content

Dependability-Oriented Resource Management Schemes for Cloud Computing Data Centers

  • Chapter
  • First Online:
Book cover Handbook on Data Centers
  • 4038 Accesses

Abstract

A major factor in the growth of the Information and Communications Technology has been the widespread use of data centers for deploying and executing web services, business processes, and scientific and e-commerce applications. While some data centers are designed to operate a specific business (e.g., Google’s search engine), others are used as the backbone infrastructure to deliver computing resources as services to hundreds of users (e.g., Amazon’s EC2 service). Relying on data centers for running applications, particularly when resources are delivered to the users as a service, offer significant benefits. For example, applications can benefit significantly from the economy of scale, and users are relieved from buying expensive hardware and software licenses and from maintaining the computing infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B. Addis, D. Ardagna, B. Panicucci, and L. Zhang, “Autonomic management of cloud service centers with availability guarantees,” in Proc. of 3rd International Conference on Cloud Computing, Miami, FL, USA, July 2010, pp. 220–227

    Google Scholar 

  2. M. Albanese, S. Jajodia, R. Jhawar, and V. Piuri, “Reliable Mission Deployment in Vulnerable Distributed Systems,” in Proc. of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, Budapest, Hungary, June 24–27, 2013, pp. 1–8

    Google Scholar 

  3. M. Albanese, S. Jajodia, R. Jhawar, and V. Piuri, “Securing Mission-Centric Operations in the Cloud,” in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2013

    Google Scholar 

  4. C. A. Ardagna, R. Jhawar, and V. Piuri, “Dependability Certification of Services: A Model-Based Approach,” in Computing, Springer, Oct, 2013, pp. 1–28

    Google Scholar 

  5. G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri, “On the propagation of faults and their detection in a hardware implementation of the Advanced Encryption Standard”, in Proc. of the 2002 IEEE International Conference on Application-Specific Systems, Architectures and Processors, San Jose, CA, USA, July 2002, pp. 303–312

    Google Scholar 

  6. E. Bin, O. Biran, O. Boni, E. Hadad, E. Kolodner, Y. Moatti, and D. Lorenz, “Guaranteeing high availability goals for virtual machine placement,” in Proc. of 31st International Conference on Distributed Computing Systems, Minneapolis, USA, June 2011, pp. 700–709

    Google Scholar 

  7. C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati, “Efficient Key Management for Enforcing Access Control in Outsourced Scenarios,” in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece, May 2009

    Google Scholar 

  8. I. Cunha, J. Almeida, V. Almeida, and M. Santos, “Self-adaptive capacity management for multi-tier virtualized environments,” in Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, May 2007, pp. 129–138

    Google Scholar 

  9. E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Key Management for Multiuser Encrypted Databases," in Proc. of the International Workshop on Storage Security and Survivability, Fairfax, Virginia, USA, Nov 2005

    Google Scholar 

  10. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, “Controlled Information Sharing in Collaborative Distributed Query Processing,” in Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 2008

    Google Scholar 

  11. S. De Capitani di Vimercati, S. Foresti, S. Ja jodia, and G. Livraga, “Enforcing Subscription-based Authorization Policies in Cloud Scenarios,” in Proc. of the 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Paris, France, July 11–13, 2012

    Google Scholar 

  12. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, and P. Samarati, “Enforcing Dynamic Write Privileges in Data Outsourcing,” in Computers & Security, 2013

    Google Scholar 

  13. S. De Capitani di Vimercati, S. Foresti, P. Samarati, “Managing and Accessing Data in the Cloud: Privacy Risks and Approaches,” in Proc. of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), Cork, Ireland, Oct 2012

    Google Scholar 

  14. S. De Capitani di Vimercati, G. Livraga, V. Piuri, F. Scotti, “Privacy and Security in Environmental Monitoring Systems,” in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome, Italy, Oct 2012

    Google Scholar 

  15. S. De Capitani di Vimercati, A. Genovese, G. Livraga, V. Piuri, F. Scotti, “Privacy and Security in Environmental Monitoring Systems: Issues and Solutions”, in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, Boston, 2013, pp. 835–853

    Google Scholar 

  16. P. Gill, N. Jain, and N. Nagappan, “Understanding Network Failures in Data Centers: Measurement, Analysis and Implications”, ACM Computer Communication Review, vol. 41, no. 4, 2011, pp. 350–361

    Article  Google Scholar 

  17. S. Gilbert and N. Lynch, “Brewer’s conjecture and the feasibility of Consistent, Available, Partition-tolerant web services,” SIGACT News, vol. 33, no. 2, Jun 2002, pp. 51–59

    Google Scholar 

  18. R. Guerraoui and M. Yabandeh, “Independent faults in the cloud,” in Proc. of 4th International Workshop on Large Scale Distributed Systems and Middleware, Zurich, Switzerland: ACM, 2010, pp. 12–17

    Book  Google Scholar 

  19. U. Helzle and L. A. Barroso, “The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines”, 1st ed. Morgan and Claypool Publishers, 2009

    Google Scholar 

  20. F. Hermenier, S. Demassey, and X. Lorca, “Bin repacking scheduling in Virtualized datacenters”, in Proc. of Constraints Programming, Perugia, Italy, 2011

    Google Scholar 

  21. F. Hermenier, J. Lawall, J.M. Menaud, and G. Muller, “Dynamic Consolidation of Highly Available Web Applications”, INRIA, Tech. Rep. RR-7545, 2011

    Google Scholar 

  22. G. Jung, K. Joshi, M. Hiltunen, R. Schlichting, and C. Pu, “Performance and availability aware regeneration for cloud based multitier applications,” in Proc. of 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, Chicago, IL, USA, July 2010, pp. 497–506

    Google Scholar 

  23. R. Jhawar and V. Piuri, “Fault tolerance management in IaaS Clouds,” in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Telecommunications, Rome, Italy, Oct 2012, pp. 1–6

    Google Scholar 

  24. R. Jhawar and V. Piuri, “Adaptive resource management for balancing availability and performance in Cloud computing,” in Proc. of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, Jul 2013, pp. 254–264

    Google Scholar 

  25. R. Jhawar and V. Piuri, “Fault Tolerance and Resilience in Cloud Computing Environments,” in Computer and Information Security Handbook, 2nd ed., J. Vacca (ed.), Morgan Kaufmann, 2013, pp. 125–141

    Google Scholar 

  26. D. Jayasinghe, C. Pu, T. Eilam, M. Steinder, I. Whally, and E. Snible, “Improving performance and availability of services hosted on IaaS Clouds with structural constraint-aware virtual machine placement,” in Proc. of IEEE International Conference on Services Computing, Washington, DC, USA, Jul 2011, pp. 72–79

    Google Scholar 

  27. R. Jhawar, V. Piuri, and P. Samarati, “Supporting security requirements for resource management in cloud computing,” in Proc. of the 15th IEEE International Conference on Computational Science and Engineering, Paphos, Cyprus, Dec 2012, pp. 170–177

    Google Scholar 

  28. R. Jhawar, V. Piuri, and M. Santambrogio, “Fault Tolerance Management in Cloud Computing: A System-Level Perspective,” in IEEE Systems Journal 7 (2), June, 2013, pp. 288–297

    Article  Google Scholar 

  29. S. Kim, F. Machida, and K. Trivedi, “Availability modeling and analysis of virtualized system,” in Proc. of 15th IEEE Pacific Rim International Symposium on Dependable Computing, Shanghai, China, Nov 2009, pp. 365–371

    Google Scholar 

  30. K. Mills, J. Filliben, and C. Dabrowski, “Comparing VM-Placement Algorithms for on-demand Clouds”, in Proc. of CLOUD’11, Washington, DC, USA, 2011, pp. 91–98

    Google Scholar 

  31. F. Machida, M. Kawato, and Y. Maeno, “Redundant Virtual Machine Placement for Fault Tolerant Consolidated Server Clusters”, in Proc. of IEEE/IFIP NOMS’10, Osaka, Japan, 2010, pp. 32–39

    Google Scholar 

  32. L. Shi, B. Butler, D. Botvich, and B. Jennings, “Provisioning of requests for virtual machine sets with placement constraints in IaaS clouds,” in Proc. of IFIP/IEEE International Symposium on Integrated Network Management, Ghent, Belgium, May 2013, pp. 499–505

    Google Scholar 

  33. P. Samarati and S. De Capitani di Vimercati, “Data Protection in Outsourcing Scenarios: Issues and Directions”, in Proc. of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010, pp. 1–14

    Google Scholar 

  34. K. Shin, C. M. Krishna, and Y. Hang Lee, “Optimal dynamic control of resources in a distributed system,” IEEE Transactions on Software Engineering, vol. 15, no. 10, 1989, pp. 1188–1198

    Article  Google Scholar 

  35. A. Singh, M. Korupolu, and D. Mohapatra, “Server-storage virtualization: Integration and load balancing in data centers,” in Proc. of SC’08, Austin, TX, USA, Nov 2008, pp. 53:1–53:12

    Google Scholar 

  36. W.E. Smith, K.S. Trivedi, L.A. Tomek, and J. Ackaret, “Availability Analysis of Blade Server Systems”, IBM Systems Journal, vol. 47, no. 4, 2008, pp. 621–640

    Article  Google Scholar 

  37. K. Vishwanath and N. Nagappan, “Characterizing Cloud Computing Hardware Reliability”, in Proc. of SoCC’10, Indianapolis, IN, USA, 2010, pp. 193–204

    Google Scholar 

  38. B. Yang, X. Xu, F. Tan, and D.-H. Park, “An utility-based job scheduling algorithm for cloud computing considering reliability factor,” in Proc. of International Conference on Cloud and Service Computing, Hong Kong, Dec 2011, pp. 95–102

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Jhawar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this chapter

Cite this chapter

Jhawar, R., Piuri, V. (2015). Dependability-Oriented Resource Management Schemes for Cloud Computing Data Centers. In: Khan, S., Zomaya, A. (eds) Handbook on Data Centers. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2092-1_45

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-2092-1_45

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-2091-4

  • Online ISBN: 978-1-4939-2092-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics