Professional Documents
Culture Documents
G.ABHINAV RISHI
Introduction to domain
• This domain provides the conceptual framework for the rest of the Cloud
Security Alliance’s guidance. It describes and defines cloud computing, sets our
baseline terminology, and details the overall logical and architectural frameworks
used in the rest of the document.
•There are many different ways of viewing cloud computing: It's a technology, a
collection of technologies, an operational model, a business model, just to name a
few. It is, at its essence, transformative and disruptive. It's also growing very, very
quickly, and shows no signs of slowing down.
Introduction to the research topic
• Majority of the recent Internet applications utilize cloud computing
infrastructure to provide elastic and cost-effective services.
• Cloud providers provision computing, memory, storage, and networking
resources for tenants to serve their applications with different
requirements. These applications require different amounts of resources
with a different priority.
• Compute-intensive applications such as large scientific application
require more computing and memory power than networking resources,
while network intensive applications need more networking bandwidth
than computing power.
• Cloud providers should allocate and provision resources efficiently in
the data centre to satisfy various requirements.
Need / Rational & scope of the study
• Model the priority of application discretely. Each application provides its priority
as a critical (higher priority) or normal (lower-priority) application.
● [2] M. Al-Fares, A. Loukissas, and A. Vahdat, “A scalable, commodity data center network architecture,” in
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication. New York, NY, USA: ACM,
2008, pp. 63–74.
● [3] L. Popa, G. Kumar, M. Chowdhury, A. Krishnamurthy, S. Ratnasamy, and I. Stoica, “Faircloud: Sharing
the network in cloud computing,” in Proceedings of the ACM SIGCOMM 2012 Conference on Applications,
Technologies, Architectures, and Protocols for Computer Communication. New York, NY, USA: ACM, 2012,
pp. 187– 198.