CFP last date
20 December 2024
Reseach Article

Having Centralized Monitoring as a Service in Cloud Computing: A Study of Performance Aspects

by Ajay Prasad, Prasun Chakrabarti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 18
Year of Publication: 2013
Authors: Ajay Prasad, Prasun Chakrabarti
10.5120/12841-0055

Ajay Prasad, Prasun Chakrabarti . Having Centralized Monitoring as a Service in Cloud Computing: A Study of Performance Aspects. International Journal of Computer Applications. 73, 18 ( July 2013), 17-22. DOI=10.5120/12841-0055

@article{ 10.5120/12841-0055,
author = { Ajay Prasad, Prasun Chakrabarti },
title = { Having Centralized Monitoring as a Service in Cloud Computing: A Study of Performance Aspects },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 18 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number18/12841-0055/ },
doi = { 10.5120/12841-0055 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:27.424936+05:30
%A Ajay Prasad
%A Prasun Chakrabarti
%T Having Centralized Monitoring as a Service in Cloud Computing: A Study of Performance Aspects
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 18
%P 17-22
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Centralized Monitoring as a Service (CMaaS) is a desired and necessary feature to be included in cloud computing. One of the concerns in having CMaaS from both user and provider's perspectives would be that of performance implications. Carrying out a performance analysis thus, becomes an important task before suggesting a MaaS solution. A straight forward performance study would be to find out whether the inclusion of monitoring processes affects the normal user request processing or not. The paper studies the affects by forming a simulation environment. The studies will also help datacenters in deciding whether to have dedicated VMs allocated for monitoring or to have monitoring processes share the VMs allocated for processing user requests.

References
  1. Ali Khajeh-Hosseini, Ian Sommerville, Ilango Sriram, "Research Challenges for Enterprise Cloud Computing", arXiv:1001. 3257v1 [cs. DC], 2010.
  2. Jay Heiser, Mark Nicolett, "Assessing the Security Risks of Cloud Computing", Gartner, June 2008.
  3. "Distributed Computing", http://en. wikipedia. org/wiki/Distributed_computing, retrieved Jan 2012.
  4. Grobauer, B. ; Walloschek, T. ; Stocker, E. ; , "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE , vol. 9, no. 2, pp. 50-57, March-April 2011.
  5. "Guidance for Identity & Access Management V2. 1", http://www. cloudsecurityalliance. org/guidance/csaguide-dom12. pdf, 2010.
  6. Spring, J. ; , "Monitoring Cloud Computing by Layer, Part 1-Part 2," Security & Privacy, IEEE , vol. 9, no. 2, pp. 66-68, March-April 2011,doi: 10. 1109/MSP. 2011. 33
  7. Manuel, P. D. ; Thamarai Selvi, S. ; Barr, M. I. A. -E. ; , "Trust management system for grid and cloud resources," Advanced Computing, 2009. ICAC 2009. First International Conference on , vol. , no. , pp. 176-181, 13-15 Dec. 2009.
  8. George Coulouris, Jean Dollimore, Tim Kindberg, Gordon Blair, "Time and Global States", in Distributed Systems Concepts and Design, Fifth Edition, Pearson Education, chapter 14 pg 595-626.
  9. Digital Signature Standard, FIPS PUB 186-3, National Institute of Standards and Technology, http://csrc. nist. gov/publications/, June, 2009.
  10. Lynch, L. , "Inside the Identity Management Game," Internet Computing, IEEE , vol. 15, no. 5, pp. 78,82, Sept. -Oct. 2011 doi: 10. 1109/MIC. 2011. 119
  11. Lindsey, W. C. ; Ghazvinian, F. ; Hagmann, W. C. ; Dessouky, K. , "Network synchronization," Proceedings of the IEEE , vol. 73, no. 10, pp. 1445,1467, Oct. 1985 doi: 10. 1109/PROC. 1985. 13317
  12. Calheiros, R. N. , Ranjan, R. , Beloglazov, A. , De Rose, C. A. F. and Buyya, R. , CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience, 41: 23–50. doi: 10. 1002/spe. 995 2011.
  13. Ferretti, S. ; Ghini, V. ; Panzieri, F. ; Pellegrini, M. ; Turrini, E. ; , "QoS–Aware Clouds," Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on , vol. , no. , pp. 321-328, 5-10 July 2010
  14. Kirschnick, J. ; Alcaraz Calero, J. M. ; Wilcock, L. ; Edwards, N. , "Toward an architecture for the automated provisioning of cloud services," Communications Magazine, IEEE , vol. 48, no. 12, pp. 124,131, December 2010, doi: 10. 1109/MCOM. 2010. 5673082.
  15. The Service Level Agreement Zone; url: http://www. sla-zone. co. uk/; retrieved oct 2012.
  16. Ibrahim, S. ; Bingsheng He; Hai Jin; , "Towards Pay-As-You-Consume Cloud Computing," Services Computing (SCC), 2011 IEEE International Conference on , vol. , no. , pp. 370-377, 4-9 July 2011
  17. Borja Sotomayor, Rubén S. Montero, Ignacio M. Llorente, Ian Foster, Capacity Leasing in Cloud Systems using the OpenNebula Engine (2009)
  18. Jerry banks, "statistical models in simulation",in Discrete Event System Simulation, 4/e, chapter 5, pg 129-172, Pearson Education, 2005.
  19. Andrew Odlyzko, "The low utilization and high cost of data networks", AT&TLabs–Research, http://www. dtc. umn. edu/~odlyzko/doc/high. network. cost
Index Terms

Computer Science
Information Sciences

Keywords

cloud computing monitoring Access management MaaS Centralized MaaS Performance study.