Cloud Resource Orchestration

Cloud Resource Orchestration 

I. Introduction

The cloud computing paradigm is steadily shifting the course of computing away from physical hardware with locally managed software platforms toward virtualized, cloud-based services. This new paradigm, brought about by cloud computing, provides users with instant access to virtually unlimited computing resources and, at the same time, allows providers to deploy complex IT infrastructure as a service (IAAS).

There is a huge benefit from economies of scale and tremendous gains in multiplexing offered by the sharing of the underlying physical infrastructure using virtualization. But all these benefits come at great cost. The sheer scale and highly dynamic nature of available cloud platforms bring considerable new challenges to service providers. To realize these complicated cloud services, a control framework must be present which can orchestrate cloud resource configuration, provisioning, utilization and decommissioning, and real-time monitoring across extensively distributed physical resources.

The main goal of cloud resource orchestration is the successful hosting and delivery of cloud-based applications and services through achieving the quality of service (QoS) objectives of users and clients. QoS is composed of functional and non-functional attributes such as security, consistency, reliability, integrity, availability, statistics, scalability and cost.

II. Challenges in Resource Orchestration

Cloud resource orchestration is becoming challenging because of the increasing sophistication of services provided through the cloud, the rapid growth of datacenters and the high failure rate of commercial hardware. Dynamic service features require the orchestration of resources across the different domains of computation, storage and networking, across geographically separated datacenters and in a sequential manner. Each of these operations is fairly complex and highly susceptible to failure. The final hurdle of a resource orchestration platform is concurrently handling numerous similar orchestration requests.

Resource orchestration functions must be performed while dealing with huge numbers of simultaneous user requests, enforcing engineering rules and service policies, and performing error handling, all in a very dynamic environment.

III. Approaches to Cloud Resource Orchestration 

A. The Data-centric (DMF) Approach

One approach to resource orchestration is the data-centric management framework (DMF). This approach aims to maintain a conceptually centralized repository for data of all managed resources, including computational, storage and network devices. Every resource object has two copies which represent its state: the primary copy in the physical layer (physical device) and the secondary copy in the logical layer (resides in memory).

B.The Transactional Resource Orchestration Platform In the Cloud (TROPIC) Approach

This is a transactional orchestration resource platform for Infrastructure-as-a-Service (IaaS) cloud infrastructures. This approach to orchestration of physical resources is transactional, which can guarantee atomicity, consistency, isolation, and durability (ACID) of cloud service operations. Procedures are performed as transactions using ACID properties. Transactional semantics ensure that errors have no effect and that concurrent orchestrations will not violate rules due to clean abstraction.

IV. Conclusion

Implementing a cloud resource orchestration framework is not an easy task, and there are different ways to implement such a framework, depending on the nature of the cloud service being provided. But no matter which kind of orchestration is implemented, it must meet user expectations and prevent or at least handle errors fairly well, while providing simultaneous orchestration services. There are new approaches being developed as new problems arise, so the field is still developing and maturing. We have yet to fully realize all the benefits which cloud computing can offer.

By Abdul Salam

Sorry, comments are closed for this post.

Comics
Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…