Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime

In providing tremendous access to data and computing power of thousands of commodity servers, large-scale cloud systems must address a new challenge: they must detect and recover from a growing number of failures, in both hardware and software components. The growing complexity of technology scaling...

Full description

Saved in:
Bibliographic Details
Main Author: Clement, Clarissa Terry
Format: Thesis
Language:English
English
Published: 2015
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/15880/1/ENHANCED%20MODEL%20TO%20MINIMIZE%20FUTURE%20DOWNTIME%20CASE%20STUDY%20OF%20MALAYSIA%20CLOUD%20PROVIDERS%20TOWARDS%20NEAR%20ZERO%20DOWNTIME%20%2824%20pgs%29.pdf
http://eprints.utem.edu.my/id/eprint/15880/2/Enhanced%20model%20to%20minimize%20future%20downtime%20%20case%20study%20of%20Malaysia%20cloud%20providers%20towards%20near-zero%20downtime.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.15880
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Md Salleh, Norhaziah
topic TK Electrical engineering
Electronics Nuclear engineering
spellingShingle TK Electrical engineering
Electronics Nuclear engineering
Clement, Clarissa Terry
Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
description In providing tremendous access to data and computing power of thousands of commodity servers, large-scale cloud systems must address a new challenge: they must detect and recover from a growing number of failures, in both hardware and software components. The growing complexity of technology scaling, manufacturing, design logic, usage, and operating environment increases the occurrence of failures. Unfortunately, downtime handling has proven to be problematic in today’s cloud systems. The downtime recovery path is often complex, under-specified, and tested less frequently than the normal path. As indicated by recent cloud outage incidents, existing large-scale cloud systems are still fragile and error-prone. The purpose of this study to identify the issues causing cloud downtime, to investigate the recovery ability of the database during cloud downtime and to propose enhanced model that can be used to minimize the future downtime.
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Clement, Clarissa Terry
author_facet Clement, Clarissa Terry
author_sort Clement, Clarissa Terry
title Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
title_short Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
title_full Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
title_fullStr Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
title_full_unstemmed Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
title_sort enhanced model to minimize future downtime : case study of malaysia cloud providers towards near-zero downtime
granting_institution Universiti Teknikal Melaka Malaysia
granting_department Faculty of Information and Communication Technology
publishDate 2015
url http://eprints.utem.edu.my/id/eprint/15880/1/ENHANCED%20MODEL%20TO%20MINIMIZE%20FUTURE%20DOWNTIME%20CASE%20STUDY%20OF%20MALAYSIA%20CLOUD%20PROVIDERS%20TOWARDS%20NEAR%20ZERO%20DOWNTIME%20%2824%20pgs%29.pdf
http://eprints.utem.edu.my/id/eprint/15880/2/Enhanced%20model%20to%20minimize%20future%20downtime%20%20case%20study%20of%20Malaysia%20cloud%20providers%20towards%20near-zero%20downtime.pdf
_version_ 1776103096287494144
spelling my-utem-ep.158802023-05-26T10:04:24Z Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime 2015 Clement, Clarissa Terry TK Electrical engineering. Electronics Nuclear engineering In providing tremendous access to data and computing power of thousands of commodity servers, large-scale cloud systems must address a new challenge: they must detect and recover from a growing number of failures, in both hardware and software components. The growing complexity of technology scaling, manufacturing, design logic, usage, and operating environment increases the occurrence of failures. Unfortunately, downtime handling has proven to be problematic in today’s cloud systems. The downtime recovery path is often complex, under-specified, and tested less frequently than the normal path. As indicated by recent cloud outage incidents, existing large-scale cloud systems are still fragile and error-prone. The purpose of this study to identify the issues causing cloud downtime, to investigate the recovery ability of the database during cloud downtime and to propose enhanced model that can be used to minimize the future downtime. 2015 Thesis http://eprints.utem.edu.my/id/eprint/15880/ http://eprints.utem.edu.my/id/eprint/15880/1/ENHANCED%20MODEL%20TO%20MINIMIZE%20FUTURE%20DOWNTIME%20CASE%20STUDY%20OF%20MALAYSIA%20CLOUD%20PROVIDERS%20TOWARDS%20NEAR%20ZERO%20DOWNTIME%20%2824%20pgs%29.pdf text en public http://eprints.utem.edu.my/id/eprint/15880/2/Enhanced%20model%20to%20minimize%20future%20downtime%20%20case%20study%20of%20Malaysia%20cloud%20providers%20towards%20near-zero%20downtime.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96208 mphil masters Universiti Teknikal Melaka Malaysia Faculty of Information and Communication Technology Md Salleh, Norhaziah 1. Kumar, “Malaysian cloud investment could touch US$900m by 2020,” 2013. [Online]. Available at: http://www.computerworld.com.my/resource/cloud-computing/malaysian-cloud investment-could-touch-us900m-by-2020/ 2. Adil E. Shamoo, David B. Resnik, 2003. Responsible Conduct of Research. p. 32. Oxford University Press, 2003. 3. Amazon, “AWS Service Health Dashboard,” http://status.aws.amazon.com/. Retrieved on 11 May 2011. 4. Amazon, “Summary of the Amazon EC2 and Amazon RDS service disruption in the US East region,” http://aws.amazon.com/message/65648/ 5. Bigelow, S., 2011. The Causes and Costs of Data Center System Downtime. 6. Chen, D. & Zhao, H., 2012. Data Security and Privacy Protection Issues in Cloud Computing. 2012 International Conference on Computer Science and Electronics Engineering, (973), pp.647–651. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6187862 7. Deb Shinder, 2015. When Good Clouds Go Bad: All about Cloud Services Outages (Part 2). 19 Feb. 2015. Available at http://www.cloudcomputingadmin.com/articles-tutorials/public- cloud/when-good-clouds-go-bad-all-about-cloud-services-outages-part2.html 8. Deepak Mashru, n.d. ELT Through Social Media. Available at https://books.google.com.my/books?id=nbyrCQAAQBAJ&printsec=frontcover&dq=Deepak+ Mashru,+n.d.+ELT+Through+Social+Media.&hl=en&sa=X&redir_esc=y#v=onepage&q=Dee pak%20Mashru%2C%20n.d.%20ELT%20Through%20Social%20Media.&f=false 9. Dr Nashaat el-Khameesy; Hossam Abdel Rahman, 2012. A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems. , 3(6), pp.970–974. 10. Ellen Messmer, “U.S. military takes cloud computing to Afghanistan,” September 2010, http://www.networkworld.com/news/2010/ 092310-cloud-computing-afghanistan.html. 11. Google, “Google Apps service level agreement,” 2011. Available at: http://www.google.com/apps/intl/en/terms/sla.html. 12. Hashizume, K., David G Rosado, Eduardo Fernández-Medina, & Eduardo B Fernandez, 2013. An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), p.5. Available at: http://www.jisajournal.com/content/4/1/5. 13. Hines, M.R. & Gopalan, K., 2009. Post-copy based live virtual machine migration using adaptive pre-paging and dynamic self-ballooning. Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE ’09, p.51. Available at: http://portal.acm.org/citation.cfm?doid=1508293.1508301. 14. Hirofuchi, T., Hidemoto Nakada, Satoshi Itoh & Satoshi Sekiguchi, 2011. Reactive consolidation of virtual machines enabled by postcopy live migration. Proceedings of the 5th international workshop on Virtualization technologies in distributed computing - VTDC ’11, p.11. Available at: http://portal.acm.org/citation.cfm?doid=1996121.1996125. 15. Jason Zander, 2014. Final Root Cause Analysis and Improvement Areas: Nov 18 Azure Storage Service Interruption. December 17, 2014. Available at http://azure.microsoft.com/blog/2014/12/17/final-root-cause-analysis-and-improvement-areas- nov-18-azure-storage-service-interruption/ 16. Jean-Jacques Lambin, Isabelle Schuiling, 2012. Market-Driven Management: Strategic and Operational Marketing. Palgrave Macmillan, 19 Jul 2012 17. Kaur, A. & Bhardwaj, M., 2012. HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY. , (3), pp.737–741. 18. Li Zheng, Mingfei Liang, Liam O'Brien, and He Zhang, 2013. The Cloud’s Cloudy Moment: A Systematic Survey of Public Cloud Service Outage. , p.11. Available at: http://arxiv.org/abs/1312.6485 [Accessed January 8, 2015]. 19. Piao, J.T. & Yan, J., 2010. A network-aware virtual machine placement and migration approach in cloud computing. Proceedings - 9th International Conference on Grid and Cloud Computing, GCC 2010, pp.87–92. 20. Shreyas. S, Dr. Pradeep. B. S & Deepak. G, 2013. Security Aspects of Mobile Cloud Computing. , 4(9). 21. Sagana, C., M. Geetha, and R.C.S., 2013. Enhancing the Performance of Live Migration of Virtual Machine’s with WSClock Replacement Algorithm. , 02(01). 22. Shaksha Vali; M. Rajasekhar, 2012. DIFFERENTIAL – PRIVACY – SECRET – ENCRYPTION FOR NETWORK FLOW CAPACITY. , 2(5). 23. Sharma, S. & Chawla, M., 2013. A technical review for efficient virtual machine migration. Proceedings - 2013 International Conference on Cloud and Ubiquitous Computing and Emerging Technologies, CUBE 2013, pp.20–25. 24. Shamoo, A.E., Resnik, B.R. (2003). Responsible Conduct of Research. Oxford University Press. 25. S. Lohr, “Amazon’s Trouble Raises Cloud Computing Doubts,” The New York Times, April 22, 2011, http://www.nytimes.com/2011/04/23/technology/23cloud.html. 26. State, L., Lagos, P. & Campus, O., 2012. Cloud Security Using Authentication And File Base Encryption. , 1(9), pp.1–4. 27. Svärd, P., Benoit Hudzia & Johan Tordsson, 2011. Evaluation of delta compression techniques for efficient live migration of large virtual machines. ACM SIGPLAN Notices, 46(7), p.111. 28. Wang, G. & Ng, T.S.E., INFOCOM10-ec2-The impact of virtualization on network performance of Amazon EC2 data center.pdf. 29. Wood, T., 2011. PipeCloud: Using Causality to Overcome Speed-of-Light Delays in Cloud- Based Disaster Recovery. Computing, 40, p.17. Available at: http://dl.acm.org/citation.cfm?id=2038933. 30. Ye, K., Xiaohong Jiang, Dawei Huang, Jianhai Chen & Bei Wang, 2011. Live Migration of Multiple Virtual Machines with Resource Reservation in Cloud Computing Environments. 2011 IEEE 4th International Conference on Cloud Computing, pp.267–274. 31. V. Krishna Reddy, B. Thirumal Rao, Dr. L.S.S. Reddy, P.Sai Kiran “Research Issues in Cloud Computing “Global Journal of Computer Science and Technology, Volume 11, Issue 11, July 2011. 32. W. Guohui, and T. S. E. NG. The Impact of Virtualization on Network Performance of Amazon EC2 Data Center. INFOCOM, 2010 Proceedings IEEE. 33. White Paper, 2013. Database Security in the Cloud. 34. William Zikmund, Barry Babin, Jon Carr, Mitch Griffin, 2012. Business Research Methods. Cengage Learning, 12 Mar 2012