Importance Of Cloud Computing Interoperability

Importance Of Cloud Computing Interoperability

Importance Of Cloud Computing Interoperability

Cloud Computing and Provider Lock-In

Provider lock-in is well known obstacle of cloud computing business model. It is characterized by the inability or limited ability to connect to resources that are not part of the selected cloud offer. Migration of application and corresponding data to alternative cloud services may be expensive and time-consuming, and the user depends on a vendor’s technology. If we want to circumvent the mentioned obstacle, we must find a way to achieve cloud computing interoperability.

Everyone has their own API

Currently, each cloud provider prefers some specific technological solutions and their own design of available remote methods (SOAP and REST APIs). For example, Google App Engine, Oracle PaaS Platform, Salesforce, and Microsoft Azure offer very different APIs. Some vendors even try to invent new programming languages (for example, Salesforce and its proprietary Apex language). In addition, models of data storage can range from NoSQL to the relational databases, providers use their own query languages, and they support different data types.

Standardization

For now, there are no cloud computing standards accepted by the most of major commercial cloud providers. However, many initiatives are active. DMTF OCSI (Open Cloud Standards Incubator) is standardizing the management of cloud resources. DMTF has also proposed OVF (Open Virtualization Format) specification to support open, secure, efficient and extensible format for the packaging and distribution of software that will run on virtual machines. OCCI-WG (Open Cloud Computing Interface Working Group) is developing practical specifications of infrastructure as a service. SNIA CDMI (Cloud Data Management Interface) enables cloud applications to create access, update and modify data elements stored in clouds. OASIS TOSCA (Topology and Orchestration Specification for Cloud Applications) aims to increase the portability of applications and IT services to the cloud.

Broker libraries

One solution to solve cloud interoperability problems is to use brokers. There are API-Active-Directory-SaaS and frameworks that act as intermediaries:

  • Apache Libcloud is a Python library which hides differences among cloud providers APIs and enables managing different cloud resources through a unified API
  • Deltacloud API is an API that abstracts differences between clouds
  • Apache jclouds is an open-source library to use portable abstractions or cloud-specific features
  • The Dasein Cloud API is inspired by JDBC and it provides an abstraction for applications that wish to be written independent of the clouds they are controlling.

Prototypes from research projects

The problem of interoperability of cloud computing has been recognized by the European research funding organizations. For example, several FP7 research projects that are dealing with this issue are active:

  • Cloud4SOA provides a harmonized API that enables the seamless interconnection and management of applications across different platforms as a service.
  • mOSAIC offers a standard API for programming clouds
  • Contrail designs an open source system for cloud federations
  • Vision Cloud addresses the issues of data management in cloud federations

Cloud computing interoperability problems are far from being solved, but there are some feasible solutions before cloud standards become mature and adopted by major cloud players.

By Darko Androcec

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…