Revolution of Storms from Vendor lock-in to the Data storage

Main Article Content

Y.ANITHA
D.RAVIKIRAN

Abstract

The open stack-based private cloud can help mitigate vendor lock-in and promises transparent use of cloud computing services. Most of the basic technologies necessary to realize the open stack-based private cloud already exist, yet lack integration. Thus, integrating these state-of-the-art tools promises a huge leap toward the open stackbased private cloud. To avoid vendor lock-in, the community must drive the ideas and create a truly open stack-based private cloud with added value for all customers and broad support for different providers and implementation technologies.

Article Details

How to Cite
[1]
Y.ANITHA and D.RAVIKIRAN, “Revolution of Storms from Vendor lock-in to the Data storage”, Int. J. Comput. Eng. Res. Trends, vol. 1, no. 6, pp. 391–396, Dec. 2014.
Section
Research Articles

References

A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, “What’s inside the Cloud? An architectural map of the Cloud landscape,” in Software Engineering Challenges of Cloud Computing, 2009. CLOUD’09. ICSE Workshop on. IEEE, 2009, pp. 23–31.

C. Baun, M. Kunze, J. Nimis, and S. Tai,Cloud Computing: Web-basierte dynamische IT-Services, ser. Informatik im Fokus. Berlin:Springer, 2010.

G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman,A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, “Dynamo:amazon’s highly available key value store,” inProc. SOSP, 2007

M. Welsh, D. Culler, and E. Brewer, “SEDA: architecture forwell-conditioned, scalable Internet services,”ACM SIGOPS OperatingSystems Review, vol. 35, no. 5, pp. 230–243, 2001.

S. Garfinkel, “An Evaluation of Amazon’s Grid Computing Services:EC2, S3, and SQS,” inCenter for. Citeseer, 2007

A. T. Velte, T. J. Velte, and R. Elsenpeter,Cloud Computing: A Practical Approach. Upper Saddle River, NJ: McGraw-Hill, 2010.

D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Yous-eff, and D. Zagorodnov, “The eucalyptus open-source cloud-computing system,” in Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid. IEEE, 2009, pp.124–13

N. Chohan, C. Bunch, S. Pang, C. Krintz, N. Mostafa, S. Soman,and R. Wolski, “Appscale: Scalable and open appengine applicationdevelopment and deployment,”First International Conference on CloudComputing, 2009.

A. Lakshman and P. Malik, “Cassandra: a decentralized structuredstorage system,”ACM SIGOPS Operating Systems Review, vol. 44, no. 2,pp. 35–40, 2010.

R. Thomas, “A majority consensus approach to concurrency controlfor multiple copy databases,” ACM Transactions on Database Systems(TODS), vol. 4, no. 2, pp. 180–209, 1979

D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, andD. Lewin, “Consistent hashing and random trees: Cloud cachingprotocols for relieving hot spots on the World Wide Web,” in Proceedings of the twenty-ninth annual ACM symposium on Theory ofcomputing. ACM, 1997, pp. 654–663.

I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan,“Chord: A scalable peer-to-peer lookup service for internet applications, “in Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2001,pp. 149–160

J. Elson and J. Howell, “Handling flash crowds from your garage,”in USENIX 2008 Annual Technical Conference on Annual TechnicalConference. USENIX Association, 2008, pp. 171–184.

S. Bourne, “A conversation with Bruce Lindsay,”Queue, vol. 2, no. 8,pp. 22–33, 2004.

T. Chandra, R. Griesemer, and J. Redstone, “Paxos made live: anengineering perspective,” inProceedings of the twenty-sixth annual ACMsymposium on Principles of Cloud computing. ACM, 2007, pp.398–407

L. Lamport, “The part-time parliament,”ACM Transactions on ComputerSystems (TOCS), vol. 16, no. 2, pp. 133–169, 1998

H. Weatherspoon, P. Eaton, B. Chun, and J. Kubiatowicz, “Antiquity:exploiting a secure log for wide-area Cloud storage,”ACM SIGOPSOperating Systems Review, vol. 41, no. 3, pp. 371–384, 2007.

M. Burrows, “The Chubby lock service for loosely-coupled Cloudsystems,” in Proceedings of the 7th symposium on Operating systemsdesign and implementation. USENIX Association, 2006, pp. 335– 350.

A. Adya, W. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. Douceur,J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer, “FARSITE:Federated, available, and reliable storage for an incompletely trustedenvironment,”ACM SIGOPS Operating Systems Review, vol. 36, no. SI, pp. 1–14, 2002

K. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability andintegrity layer for cloud storage,” in Proceedings of the 16th ACMconference on Computer and communications security. ACM, 2009,pp. 187–198.

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels,R. Gummadi, S. Rhea, H. Weatherspoon, C. Wellset al., “Oceanstore: An architecture for global-scale persistent storage,”ACM SIGARCH Computer Architecture News, vol. 28, no. 5, pp. 190–201, 2000

Google, Datastore Performance Growing Pains. Google, Jun.2010, (accessed on December 4, 2010). [Online]. Available: http://googleappengine.blogspot.com/2010/06/datast ore-perfor mance-growing-pains.html

C. Bunch, N. Chohan, C. Krintz, J. Chohan, J. Kupferman, P. Lakhina,Y. Li, and Y. Nomura, “An evaluation of Cloud datastores using the appscale cloud platform,” in Cloud Computing (CLOUD), 2010 IEEE3rd International Conference on, 2010, pp. 305 –312

Broberg, Buyya, and Tari, “Creating a Cloud Storage Mashup forHigh Performance, Low Cost Content Delivery,” inService-OrientedComputing– ICSOC 2008 Workshops. Springer, 2009, pp. 178–183.

J. Broberg, R. Buyya, and Z. Tari, “MetaCDN: Harnessing ’StorageClouds’ for high performance content delivery,”Journal of Network andComputer Applications, vol. 32, no. 5, pp. 1012–1022, 2009

H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, “RACS: a casefor cloud storage diversity,” in Proceedings of the 1st ACM symposiumon Cloud computing. ACM, 2010, pp. 229–240.

H. Weatherspoon and J. Kubiatowicz, “Erasure coding vs. replication:A quantitative comparison,”Peer-to-Peer Systems, pp. 328–337, 2002.