You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/267330445

ReSA: Architecture for Resources Sharing Between Clouds

Conference Paper · June 2014


DOI: 10.1109/CIACS.2014.6861326

CITATIONS READS

12 228

4 authors, including:

Ahmad Waqas Asadullah Shah


Sukkur IBA University, Pakistan International Islamic University Malaysia
82 PUBLICATIONS   334 CITATIONS    197 PUBLICATIONS   978 CITATIONS   

SEE PROFILE SEE PROFILE

Mohammad Asif Khan


Sukkur Institute of Business Administration
15 PUBLICATIONS   31 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

ICT adoption and acceptance by academicians View project

Offline Signature Verification View project

All content following this page was uploaded by Ahmad Waqas on 25 October 2014.

The user has requested enhancement of the downloaded file.


2014 Conference on Information Assurance and Cyber Security (CIACS)

ReSA: Architecture for Resources Sharing Between


Clouds
1
Ahmad Waqas, 2Zulkefli Muhammed Yusof, 3Asadullah Shah, 4Mohammad Asif Khan
1,2,3
Department of Computer Science, Kulliyah of Information and Communication Technology
International Islamic University Malaysia, Kuala Lumpur, Malaysia
4
Department of Computer Science, Sukkur Institute of Business Administration, Sukkur, Pakistan
1, 4
{ahmad.waqas,asif.khan}@iba-suk.edu.pk, 2, 3{zulmy,asadullah}@iium.edu.my

Abstract— Cloud computing has emerged as paradigm for fundamental features that include on-demand self-service,
hosting and delivering services over the Internet. It is evolved as broad network access, resource pooling, rapid elasticity and
a key computing platform for delivering on-demand resources measured service [3]. The supreme objective is to deliver
that include infrastructures, software, applications, and business computational services when demanded with assurance of
processes. Mostly, clouds are deployed in a way that they are scalability, availability and reliability.
often isolated from each other. These implementations cause
lacking of resources collaboration between different clouds. For
example, cloud consumer requests some resource and that is not II. RESOURCES OFFERED BY CLOUD
available at that point in time. Client satisfaction is important for Cloud offers variety of resources to its consumers that
business as denying the client may be expensive in many ways. To include computational resources, software resources, low-level
fulfill the client request, the cloud may ask the requested hardware, and storage resources and last but not least,
resource from some other cloud. In this research paper we aim to communication resources. Cloud offers its resources as
propose a trust worthy architecture named ReSA (Resource services that may be Software-as-a-Service (SaaS), Platform-
Sharing Architecture) for sharing on-demand resources between as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) [4]
different clouds that may be managed under same or different
and is called SPI services model. The SaaS model offers the
rules, policies and management.
clients with usage of on-demand software that may include the
Keywords— cloud computing; cloud architecture; resource business, education and personal applications. There is no
management; resource collaboration; federated clouds need of managing infrastructure and platform by the cloud
client on which the application is running, thus it simplifies
the support and maintenance. Google Apps, Microsoft Office
I. INTRODUCTION 365, and Onlive are few examples of SaaS. In PaaS, the client
Cloud computing is an attractive business for the is offered with a runtime environment for designing,
companies and organizations that own large data centers to deploying and testing of application. The Cloud Service
rent their resources. During the last decade, cloud computing Providers (CSPs) typically facilitate the cloud customers with
evolved promptly and captured the current business market. a computing platform that usually include system software and
Multibillion dollar organizations such as IBM, Amazon, programing run-time environment [5]. Windows Azure
Google and EBay have hugely capitalized in cloud technology Compute, Amazon Elastic Beanstalk, EngineYard, Cloud
with the hype of cloud computing. Surveys show that Foundry, Force.com, Mendix, Google App Engine, Heroku
enterprises and critical business organizations are moving and OrangeScape are a few examples of PaaS. The basic level
from public to private cloud. More than 50% of the of cloud service model is IaaS, where consumers are provided
Fortune500 enterprises are using some form of the cloud with the virtualized computer components and resources to
computing and its growth ratio is 30% per year [1]. build and run their applications without purchasing the actual
Technology Business Research (TBR) recently claimed that expensive computing components. Windows Azure, Virtual
revenue generated by private and professional cloud services Machines, Amazon CloudFormation and underlying services
is projected to Grow to $66 Billion by 2018. They further such as Amazon EC2, Google Compute Engine and
estimated that the public cloud market to be $110 billion by Rackspace Cloud are examples of IaaS. Fig. 1 depicts the
2018 [2]. services available to cloud consumers.
“Cloud Computing is a model for enabling ubiquitous, The cloud services may be deployed in four models that
convenient, on-demand network access to a shared pool of are Pubic, Private, Community and Hybrid. The Public Cloud
configurable computing resources (e.g., networks, servers, deployment model enables the availability of resources for
storage, applications, and services) that can be rapidly public or for the huge number of organizations through the
provisioned and released with minimal management efforts or internet only. Anyone can use the public cloud resources and
service provider interaction”. In accordance with the definition infrastructure provided by the Cloud Service Provider (CSP).
of Cloud computing stated by National Institute of Standards Public CSPs are few, for example, Google and Microsoft etc.
and Technology (NIST), cloud computing provides the five as it requires capital investment. CSPs may allow the resource

23
978-1-4799-5852-8/14/$31.00 ©2014 IEEE
usage free of cost or may charge the public cloud client on the C. Huang et al [9] proposed a sub-optimal resource
basis of pay-per-usage policy. The Private Cloud is allocation mechanism in a cloud computing environment.
exclusively managed for a solitary company, business or They introduced the use of support vector regressions (SVRs)
corporation. Whereas, the Community Cloud model enables for assessing the number of resource consumption in line with
the infrastructure and resources to be shared among two or the Service Level Agreement (SLA) of every process. After
more organizations forming a community that have shared predicting recourse utilization, the resources will be then
interests including mission, security, compliances. The Private reallocated based on the recent status of all virtual machines.
and Community cloud infrastructure and resources either exist They further presented the formal procedure for dispatching
within the organization or somewhere out of the premises that resources with the help of genetic algorithms (GAs) to
may be managed internally by the cloud owners or by the determine the redistribution of resources.
third-party. The hybrid cloud is formed by combining two or
more clouds (public, private, community) that linger the Y.B. Ma [10] proposed a job allocation algorithm for cloud
distinctive clouds and obligated organized by proprietary or computing environment based on ontology. The aim of
standardized technologies that supports applications and data proposed algorithm is to accomplish inferences on the basis of
movability and manageability. semantic meanings. They extracted resource candidates
according to user requirements and allocate the job to the most
appropriate candidate based on agreed Service Level
Agreement (SLA).
Andrew J. Younge et al. [11] presented a Green Cloud
Framework that facilitates with proficient green improvements
within a scalable cloud computing architecture. This is
empowered with the usage and integration of power-aware
scheduling techniques, variable resource management, live
migration, and a minimal virtual machine design. They
proposed the power based scheduling for virtual machines to
schedule and allocate resources effectively and efficiently.
Although, many techniques and methods have been
proposed and research is undergoing for efficient resources
management, utilization and allocation but this only focuses
the resource management and allocation within the single
cloud and between cloud client and cloud service provider.
Resource sharing between multiple clouds has not been
focused yet. To fulfill the demand of client, a cloud can ask or
borrow resource from some other clouds if it does not have
available resource at that point in time. This has been seen in
federated clouds that are under single rules, policies,
Fig. 1. Resources offered to cloud consumers [6] management and authority but for clouds with different
ownership, rules, policies and management has not been
focused. In proceeding section, we investigated and proposed
III. LITERATURE REVIEW cloud architecture ReSA for resource sharing between
Efficient resources management, evaluation and allocation different clouds.
is one of vital and complex task in cloud computing. Many
techniques have been proposed and implemented for IV. STATE-OF-THE-ART CLOUD COMPUTING ARCHITECTURE
managing resources within cloud computing environment.
National Institute of Standards and Technology (NIST)
R. Buyya et al. [7] presented the vision, challenges, and presented a Cloud Computing Reference Architecture and
architectural elements of resource management based on Taxonomy [6][12] to provide a framework for accurate
Service Level Agreement (SLA). Their proposed architecture communication of the components and offerings of cloud
provides the support to incorporate policies related to market computing. It aims to develop a universal vendor neutral
based provisioning and virtualization technologies. This architecture that is reliable to NIST cloud computing
enables the flexible allocation of resources to applications. definition and to obtain a solution that does not choke
innovation by expressing a specified technical solution. There
J. Espadas et al. [8] proposed a tenant based resource are five components in this model i.e. cloud provider, cloud
allocation model. This tenant based resource allocation consumer, cloud broker, cloud carrier and cloud auditor.
enables the deployment of Software-as-a-Service (SaaS) Cloud providers offer cloud services (SaaS, PaaS, Iaas) having
applications over cloud computing platforms by taking into the cloud infrastructure (physical resources) along with service
account their multi-tenancy. This is to provide a cost-effective management procedures and ensure security and privacy at
scalable environment. This is done by consideration of the every layer of service. Cloud consumer consumes cloud
formal measurements of under and over provisioning of services according to Service Level Agreement (SLA) offered
virtualized resources in cloud infrastructures, specifically for by cloud provider either directly or through a third-party
SaaS platform.

24
named as cloud broker. Cloud Auditor performs security, for each entity that includes objects, clients and services. CSM
privacy and performance auditing of cloud to ensure the itself is a fault tolerant distributed system for serving clients
quality of services. Cloud carrier is the medium between cloud with requested services.
provider, cloud broker, cloud consumer and cloud auditor.

V. RESA: RESOURCE SHARING ARCHITECTURE – SHARING


RESOURCES BETWEEN CLOUDS
We propose a Resource Sharing Architecture (ReSA), a
trustworthy architecture for clouds to connect and collaborate
with other clouds that may be under same rules, policies,
ownership and management. Different clouds can connect
with each other by agreeing upon the Service Level
Agreement (SLA) and signing the mutual contract to share
resources with each other when requested. We suppose this
agreement between clouds as a manual process at this time.
We will extend this agreement process to be dynamic later.
Fig. 2 depicts the top-level view of cloud computing
implementation. It contains the cloud client who wants to
access the cloud services and resources that may be SaaS, IaaS
or PaaS. Cloud Services Manager (CSM) is responsible to
obtain the authentication and authorization of client as the Fig. 2. Top-level view of cloud implementation
client is directly connected with CSM only, and CSM is the
single point of entry. The Cloud Manager (CM) is a distributed and fault tolerant
system that is responsible for connecting and communicating
CSM will allocate and delegate the requested services to
the client after authentication and authorization process with other (foreign) clouds for resource collaboration. CM will
according to service level agreement (SLA). A log file for all have full read-only access on the log file maintained by the
events (both sucessful and failed) will be maintained by CSM CSM to monitor the entities and services. Table 1 summarizes

Fig. 3. Architecture for sharing resources between clouds

25
the architectural components of Resource Sharing through a secure channel for communication to avoid any
Architecture (ReSA). security breach. Fig. 3 depicts that how the CMs of different
clouds are connected with each other under predefined rules
TABLE I. RESA ARCHITECTURAL COMPONENTS
and policies to form a network.
Key Table has to be maintained by all CMs that gives the
Component Functions and Purpose
full view of the CMs network. At present, we assume that the
Cloud Client • Any entity including users, objects and other management of these key tables is static as the agreement
federated cloud who want to connect with process between clouds is also supposed to be manual at this
cloud for services usage.
time for experiments. Later, we will extend these key tables to
• Utilizes cloud services through secure web
be dynamic with the process of dynamic agreement between
connections only.
clouds.
Cloud • Services offered by the cloud that includes
Services SaaS, PaaS and IaaS. The key table contains the information of the CMs of other
Cloud Service • An important distributed fault tolerant clouds. Fig. 4 gives an example of key tables maintained for
Manager component and single point of entry for all above scenario (Fig.3). Key table maintained by the CM of
(CSM) cloud clients except foreign cloud because cloud A will have the necessary information of cloud B, C and
foreign clouds are only connected with CM. D (Fig. 4, Table II) as these are the connected clouds under
• Client can only connect to cloud through agreed rules and policies. Similarly, CMs of cloud B, C and D
CSM and can never bypass it as it is the only also maintained the key tables with information shown in table
point of entry. III, IV and V respectively.
• Responsible to maintain the log files for each
and every action of client and services.
• Responsible to attend client’s request and TABLE II. KEY TABLE OF CM AT CLOUD A
validation of client by authentication and CloudID IP MAC SLA
authorization process. Cd_B 10.10.10.1 74-E5-0B-51-4E-58 3
• Requests CM to borrow requested resource Cd_C 192.168.0.1 74-E5-0B-51-4E-59 1
by client from other clouds if it is not Cd_D 172.152.0.1 74-E5-0B-51-4E-60 2
available to fulfill the client’s requirement.
• Responsible to delegate requested services to TABLE III. KEY TABLE OF CM AT CLOUD B
client according to SLA.
• Coordinate with CM to collaborate with CloudID IP MAC SLA
foreign clouds to share services. Cd_A 11.1.1.1 74-E5-0B-51-4E-61 1
• Responsible to compute resources and Cd_C 192.168.0.1 74-E5-0B-51-4E-59 1
provision of resources to foreign clouds Cd_D 172.152.0.1 74-E5-0B-51-4E-60 2
according to SLAs.
TABLE IV. KEY TABLE OF CM AT CLOUD C
Cloud • An important distributed fault tolerant
Manager component and single point of entry for CloudID IP MAC SLA
(CM) foreign cloud only. Cd_A 11.1.1.1 74-E5-0B-51-4E-61 1
• Responsible to coordinate with CSM for log Cd_B 10.10.10.1 74-E5-0B-51-4E-58 2
maintenance. Cd_D 172.152.0.1 74-E5-0B-51-4E-60 2
• Responsible to maintain Key Table that
contains the entries of other connected TABLE V. KEY TABLE OF CM AT CLOUD D
clouds.
• Responsible to monitor and sense the overall CloudID IP MAC SLA
performance and cloud services request from Cd_A 11.1.1.1 74-E5-0B-51-4E-61 1
its CSM and from other clouds. Cd_B 10.10.10.1 74-E5-0B-51-4E-58 2
• Responsible to send borrow message to all Cd_C 192.168.0.1 74-E5-0B-51-4E-59 1
clouds listed in Key Table to borrow the
required resource.
• Responsible to overhear resource request Fig. 4. Key Tables
messages from other clouds and inform CSM
urgently. CM will have full read-only access on the log file
• Maintains queue to decide about choices of maintained by the CSM to monitor the entities and services.
resource offered by other clouds because it For Example, some resource X is requested by consumer of
will request for resource to all connected cloud A, the CSM will evaluate the resources and if that is
clouds and will get responses from them. available it will delegate the requested resource to the
• Responsible to delegating other cloud’s consumer based on Service Level Agreement (SLA). If the
requests for sharing services to CSM. resource is not available, it can request the resource to the
connected clouds to fulfill the consumer’s request. As the
foreign clouds are only connected through CM, the CSM will
The CM is connected with CSM of its cloud and the CMs place a request message to CM of its cloud A to ask and
of other clouds only. CMs are supposed to be connected borrow that resource from foreign connected clouds.

26
Fig. 5. Resource Sharing Processes between Clouds

The CM of cloud A will broadcast a resource request cloud to other clouds and delivery of that resource back to the
message to all connected clouds for example clouds B, C and client.
D. The information of connected clouds is already maintained
in the key table. On receiving end, the CM of clouds B, C and VI. CONCLUSIONS AND FUTURE WORK
D will forward the request message to their CSM. The CSM
will evaluate its resources upon receiving request and will In this paper we have proposed ReSA, a trust worthy cloud
intimate its CM if resource is available. The CM of clouds B, computing architecture, for resources sharing and
C and D will then reply to the cloud A if the resource is collaboration between different clouds. This architecture is
available. It is possible that none of the cloud has the resource good to share resources between clouds that may be under
available or all of them have resource available. A queue will different management, ownership and policies. The aim of
be maintained at CM of cloud A to receive the responses from cloud computing is to facilitate with on-demand resources.
other clouds. Suppose cloud D responses first that the resource The problem may arise that cloud does not have available
is available than cloud B and cloud C does not responded resource at that point in time when it is requested by cloud
because of resource unavailability. It will be decided to client. In such case, cloud can ask or borrow the requested
receive services from cloud D by the CM of cloud A as it is at resource to its connected clouds rather than refusing the client.
front of queue. This will be helpful to align the cloud computing objective to
facilitate with on-demand resource availability.
CM of cloud A will then send a message including its ID,
IP, MAC and secret code to cloud D about the confirmation In future, we aim to implement this resource sharing
for availing resource. The CM of cloud D will forward the architecture (ReSA) and to develop algorithms for computing
information to its CSM who will then get the authentication resources, SLA management between clouds, risk analysis and
and authorization of cloud A based on SLA and will allocate resolution of the contention process that inevitably pops up
the resource to cloud A that will be allocated to the cloud when a cloud is asked for resources by several other clouds.
consumer. The consumer of cloud A will be using resources We will also extend this architecture for sharing attack related
from cloud D in a transparent manner. Fig. 5 depicts the information between clouds to protect themselves without
processes of resource request from client to cloud, from one involvement of any third party. This will facilitate to improve
the cloud computing security and auditing measures and will
lead towards a self-securing architecture for clouds.

27
REFERENCES [7] R. Buyya, S. K. Garg, and R. N. Calheiros, “SLA-Oriented Resource
Provisioning for Cloud Computing : Challenges , Architecture , and
Solutions” in 2011 International Conference on Cloud and Service
[1] Ing. J. Hermans “From Hype to Future, KPMG’s 2010 Cloud Computing, 2011, pp. 1–10.
Computing Survey,” Amsterlveen, The Netherlands, 2010. [8] J. Espadas, A. Molina, G. Jiménez, M. Molina, R. Ramírez, and D.
[2] Hampton, “Cloud Managed Private and Professional Services Revenue Concha, “A tenant-based resource allocation model for scaling
Projected to Grow to $66 Billion by 2018,” Technology Businesss Software-as-a-Service applications over cloud computing
Research Report, 2013. [Online]. Available: infrastructures”, in Futur. Gener. Comput. Syst., vol. 29, no. 1, pp. 273–
http://www.prweb.com/releases/2013/10/prweb11251691.htm#! 286, Jan. 2013.
[Accessed: 02-Nov-2013]. [9] C.-J. Huang, C.-T. Guan, H.-M. Chen, Y.-W. Wang, S.-C. Chang, C.-Y.
[3] P. Mell and T. Grance, “The NIST Definition of Cloud Computing Li, and C.-H. Weng, “An adaptive resource management scheme in
(Draft) Recommendations of the National Institute of Standards and cloud computing”, Eng. Appl. Artif. Intell., vol. 26, no. 1, pp. 382–389,
Technology,” Special Publication 800-145 (Draft), Comput. Secur. Div. Jan. 2013.
Inf. Technol. Lab. Natl. Inst. Stand. Technol. Gaithersburg, MD 20899- [10] Y. B. Ma, S. H. Jang, and J. S. Lee, “Ontology-Based Resource
8930, Jan 2011. Management for Cloud,” in ACIIDS 2011 : The Third Asian
[4] A. Waqas, Zulkefli.Muhammed.Yusof, Asadullah Shah, “Fault Tolerant Conference on Intelligent Information and Database Systems, 2011, pp.
Cloud Auditing” in 4th International Conference on ICT for Mulsim 343–352.
World (ICT4M2013), 2013, pp. 1 - 5. [11] A. J. Younge, G. von Laszewski, L. Wang, S. Lopez-Alarcon, and W.
[5] B. Prasad, R. Admela, D. Katsaros, and Y. Goeleven, “Architectural Carithers, “Efficient resource management for Cloud computing
Requirements for Cloud Computing Systems : An Enterprise Cloud environments,” in International Conference on Green Computing, 2010,
Approach,” in JGrid Comput. Springer, vol. 9, pp. 3–26, Dec 2010. pp. 357–364.
[6] F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, [12] A. Waqas, Zulkefli.Muhammed.Yusof, Asadullah Shah, “A security-
“NIST Cloud Computing Reference Architecture Recommendations of based survey and classification of Cloud Architectures, State of Art and
the National Institute of Standards and Technology”, Special Publication Future Directions,” presented at 2nd International Conference on
500-292, Recommendations of the National Institute of Standards and Advanced Computer Science Applications and Technologies –
Technology, Sep 2011. ACSAT2013, 2013, pp. 284-289.

28

View publication stats

You might also like