International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 8 | Year 2013 | Article Id. IJCTT-V4I8P131 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I8P131

A survey on multi cloud systems for data progression


G. Minni, M. Venkata Dilip Kumar

Citation :

G. Minni, M. Venkata Dilip Kumar, "A survey on multi cloud systems for data progression," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 8, pp. 2567-2571, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I8P131

Abstract

Reconfigurable computing in the cloud helps to solve many practical problems relating to scaling out data centres where computation is limited by energy consumption or latency. However, for reconfigurable computing in the cloud to become practical several research challenges have to be addressed. This paper identifies some of the perquisites for reconfigurable computing systems in the cloud and picks out several scenarios made possible with immense cloud-based computing capability.

Keywords

reconfigurable computing; cloud computing.

References

1] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho,  R. Neugebauer, I. Pratt, and A. Warfield, ―Xen and the Art of Virtualization,‖ in Proceedings of the 19th ACM Symposium on Operating Systems Principles. New York, NY, USA: ACM, 2003, pp. 164–177. 
[2] G.  DeCandia,  D.  Hastorun,  M.  Jampani,  G.  Kakulapati,  A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, ―Dynamo: Amazon‘s highly available key-value store, in Proceedings of ACM SIGOPS Symposium on Operating Systems Principles, 2007, pp. 205–220. 
[3] J. Dean and S. Ghemawat, ―MapReduce: Simplified Data Processing on Large Clusters, in Proceedings of the 6th Conference on Operating Systems Design & Implementation. Berkeley, CA, USA: USENIX Association, 2004, pp. 10–10.  [4] J. B. Carter, ―A Look Inside IBM‘s Green Data Center Research, in Proceedings of the 14th ACM/IEEE Interna-tional Symposium on Low Power Electronics and Design, ser. ISLPED ‘09. ACM, 2009, pp. 153154. 
[5] A. Warfield, S. Hand, K. Fraser, and T. Deegan, ―Facilitat-ing the Development of Soft Devices,in Proceedings of the USENIX Annual Technical Conference, ser. ATEC ‘05. Berkeley, CA, USA: USENIX Association, 2005, pp. 22–22. 
[6] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar L. Peterson, J. Rexford, S. Shenker, and J. Turner, ―Open-Flow: enabling innovation in campus networks, SIGCOMM Comput. Commun. Rev., vol. 38, pp. 69–74, March 2008.  [7] D. T. Meyer, G. Aggarwal, B. Cully, G. Lefebvre, M. J. Feeley, N. C. Hutchinson, and A. Warfield, ―Parallax: virtual disks for virtual machines, SIGOPS Oper. Syst. Rev., vol. 42, pp. 41–54, April 2008. 
[8] E. B. Nightingale, O. Hodson, R. McIlroy, C. Hawblitzel, and G. Hunt, ―Helios: Heterogeneous Multiprocessing with Satellite Kernels, in Proceedings of the 22nd Symposium on Operating Systems Principles. New York, NY, USA: ACM, 2009, pp. 221–234. 
[9] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, ―Dryad: distributed data-parallel programs from sequential building blocks SIGOPS Oper. Syst. Rev., vol. 41, pp. 59–72, March 2007. 
[10] D. G. Murray, M. Schwarzkopf, C. Smowton, S. Smith,  A. Madhavapeddy, and S. Hand, ―CIEL: a universal execution engine for distributed data-flow computing, in Proceedings of the 8th USENIX Symposium on Networked System Design and Implementation (NSDI). USENIX, 2011. 
[11] B. Hindman, A. Konwinski, M. Zaharia, and I. Stoica, ―A common substrate for cluster computing, in Proceedings of the 2009 conference on Hot Topics in Cloud Computing, ser. HotCloud‘09. Berkeley, CA, USA: USENIX Association, 2009, pp. 19–19. 
[12] R. Mueller, J. Teubner, and G. Alonso, ―Data processing on FPGAs, Proc. VLDB Endow., vol. 2, pp. 910–921, August 2009. 
[13] W. Vanderbauwhede, M. Margala, S. R. Chalamalasetti, and  S. Purohit, ―A C/C++-embedded domain-specific language for programming the mora soft processor array, in 21st IEEE International Conference on Application-specific Systems Ar-chitectures and Processors (ASAP), Jul. 2010, pp. 141 –148. 
[14] I. Lebedev, S. Cheng, A. Doupnik, J. Martin, C. Fletcher,  D. Burke, M. Lin, and J. Wawrzynek, ―Rethinking FPGA computing with a many-core approach, in International Conference on Reconfigurable Computing and FPGAs, Dec. 2010. 
[15] M. M. T. Chakravarty and G. Keller, ―More types for nested data parallel programming, in Proceedings of the fifth ACM SIGPLAN international conference on Functional program-ming, ser. ICFP ‘00. New York, NY, USA: ACM, 2000, pp. 94–105. 
[16] S. Singh, ―Integrating FPGAs in high-performance comput-ing: programming models for parallel systems – the program-mer‘s perspective, in Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays, ser. FPGA ‘07. New York, NY, USA: ACM, 2007, pp. 133–135. 
[17] F. Chen, R. Goyal, E. Westbrook, and W. Taha, ―Implicitly heterogeneous multi-stage programmng for FPGAs, in Pro-ceedings of the Eleventh Symposium on Trends in Functional Programming (TFP), May 2010. 
[18] N. Provos, M. Friedl, and P. Honeyman, ―Preventing privilege escalation, in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12. Berkeley, CA, USA: USENIX Association, 2003, pp. 16–16. 
[19] W. Zhou, M. Sherr, W. R. Marczak, Z. Zhang, T. Tao,  B. T. Loo, and I. Lee, ―Towards a data-centric view of cloud security, in Proceedings of the second international workshop on Cloud data management, ser. CloudDB ‘10. New York, NY, USA: ACM, 2010, pp. 25–32. 
[20] A. Sabelfeld and A. Myers, ―Language-based information-flow security, Selected Areas in Communications, IEEE Journal on, vol. 21, no. 1, pp. 5 – 19, Jan. 2003. 
[21] J. Reed and B. C. Pierce, ―Distance makes the types grow stronger: a calculus for differential privacy, in Proceedings of the 15th ACM SIGPLAN international conference on Functional programming, ser. ICFP ‘10. New York, NY, USA: ACM, 2010, pp. 157–168. 
[22] R. Rivest, L. Adleman, and M. Dertouzos, ―On data banks and privacy homomorphisms, Foundations of Secure Com-putation, pp. 169–177, 1978. 
[23] C. Gentry, ―Fully homomorphic encryption using ideal lat-tices,‖ in Proceedings of the 41st annual ACM symposium on Theory of computing, ser. STOC ‘09. New York, NY, USA: ACM, 2009, pp. 169–178. 
[24] J. Detrey, G. Hanrot, X. Pujol, and D. Stehle,´ ―Accelerat-ing lattice reduction with FPGAs, in Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America, ser. LATINCRYPT‘10. Springer-Verlag, 2010, pp. 124–143. 
[25] R. Dingledine, N. Mathewson, and P. Syverson, ―Tor: the secondgeneration onion router, in Proceedings of the 13th conference on USENIX Security Symposium, ser. SSYM‘04. Berkeley, CA, USA: USENIX Association, 2004, pp. 21–21.  [26] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, ―Freenet: a distributed anonymous information storage and retrieval system, in International workshop on Designing privacy enhancing technologies: design issues in anonymity and un-observability. New York, NY, USA: Springer-Verlag New York, Inc., 2001, pp. 46–66. 
[27] R. Mortier, A. Madhavapeddy, T. Hong, D. Murray, and  M. Schwarzkopf, ―Using dust clouds to enhance anonymous communication, in Eighteenth International Workshop on Security Protocols, Apr. 2010. 
[28] J. Naous, D. Erickson, G. A. Covington, G. Appenzeller, and  N. McKeown, ―Implementing an OpenFlow switch on the NetFPGA platform, in Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communi-cations Systems, ser. ANCS ‘08. New York, NY, USA: ACM, 2008, pp. 1–9. 
[29] D. Unnikrishnan, R. Vadlamani, Y. Liao, A. Dwaraki, J. Crenne, L. Gao, and R. Tessier, ―Scalable network vir-tualization using fpgas, in Proceedings of the 18th an-nual ACM/SIGDA international symposium on Field pro-grammable gate arrays, ser. FPGA ‘10. New York, NY, USA: ACM, 2010, pp. 219–228.