DocumentCode :
623644
Title :
PACE: Policy-Aware Application Cloud Embedding
Author :
Li, Li Erran ; Liaghat, Vahid ; Hongze Zhao ; Hajiaghay, MohammadTaghi ; Dan Li ; Wilfong, Gordon ; Yang, Y. Richard ; Chuanxiong Guo
fYear :
2013
fDate :
14-19 April 2013
Firstpage :
638
Lastpage :
646
Abstract :
The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include not only computational and storage entities, but also policy entities (e.g., load balancers, firewalls, intrusion prevention boxes). Deploying applications on a cloud infrastructure without the policy entities may introduce substantial policy violations and/or security holes. In this paper, we present PACE: the first systematic framework for Policy-Aware Application Cloud Embedding. We precisely define the policy-aware, cloud application embedding problem, study its complexity and introduce simple, efficient, online primal-dual algorithms to embed applications in cloud data centers. We conduct evaluations using data from a real, large campus network and a realistic data center topology to evaluate the feasibility and performance of PACE. We show that deployment in a cloud without considering in-network policies may lead to a large number of policy violations (e.g., using tree routing as a way to enforce in-network policies may observe up to 91% policy violations). We also show that our embedding algorithms are very efficient by comparing with a good online fractional embedding algorithm.
Keywords :
cloud computing; computer centres; trees (mathematics); PACE; campus network; cloud data center; data center topology; elastic cloud computing infrastructure; firewall; in-network policies; intrusion prevention boxes; load balancer; online fractional embedding algorithm; online primal-dual algorithm; policy entities; policy violation; policy-aware application cloud embedding; private cloud computing infrastructure; public cloud computing infrastructure; security holes; tree routing; virtualization; Bandwidth; Middleboxes; Network topology; Routing; Security; Topology; Virtual machining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2013 Proceedings IEEE
Conference_Location :
Turin
ISSN :
0743-166X
Print_ISBN :
978-1-4673-5944-3
Type :
conf
DOI :
10.1109/INFCOM.2013.6566849
Filename :
6566849
Link To Document :
بازگشت