Criteria for Evaluation of Open Source Cloud Computing Solutions

Criteria for Evaluation of Open Source Cloud Computing Solutions

Criteria for Evaluation of Open Source Cloud Computing Solutions Ivan Voras, Branko Mihaljević, and Marin Orlić Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia [email protected], [email protected], [email protected] Abstract. Cloud computing promises on- IT departments to elastically deploy resources demand scalability and flexibility for the from a centrally managed pool. Open source enterprise environment and open source solutions, with lower initial investments, are a products have a large presence in this area. We viable alternative to commercial vendors, have devised an elaborate set of criteria for especially as business conditions deteriorate and evaluation and comparison of open source IaaS the economy constrains. cloud computing solutions which can be used for ranking and choosing between the available 3. Criteria products. We explain each criteria group, and give both the rationale and the estimated impact Evaluation of complex products requires an of the criteria. We also briefly introduce a elaborate and complete set of evaluation criteria number of most common open source cloud as a baseline for comparison. Even though the computing IaaS solutions to be evaluated using primary focus of our evaluation is on open the explained criteria. source IaaS products, we found the opportunity to objectively compare such products to those Keywords. Cloud Computing, Open Source from closed/commercial domain to be very Cloud, Infrastructure as a Service, Enterprise, valuable. Furthermore, some of the criteria can Evaluation be directly applied to or easily extended to apply to other cloud computing models (SaaS and 1. Introduction PaaS). This is especially true for high-level criteria such as management, security and service Cloud computing is a recent combination of levels. resource management and provisioning We have devised a set of about 100 criteria technologies build on the concepts of elasticity, grouped into six main categories: storage, ease of use and mass deployment. Cloud virtualization, network, management, security computing implementations are centered around and vendor support. These categories, targeting three service models [3]: Software-as-a-Service features interesting for enterprise deployment, (SaaS), offering its users a ready-made can further be divided into basic IaaS properties application with little or no control or commonly described in literature (storage, customizability of its innards or underlying virtualization, network and management) [3,4], infrastructure; Platform-as-a-Service (PaaS), and additional generic features (security, vendor offering developers a development and support). Assigning weights to areas of special deployment platform with a rich set of APIs, interest enables high-level decisions. programming languages and tools used to create customized applications for end-users, with 3.1. Storage criteria limited control over the entire environment; and Infrastructure-as-a-Service (IaaS), offering full Virtual machine storage management is vital control of virtualized low-level infrastructure for cloud computing architectures as it must be used to build customized applications or higher- powerful and flexible enough to allow the level products. implementation of core cloud goals: flexibility, scaling and ease of use. Storage criteria cover the 2. Motivation main technology groups in which the storage may be implemented: direct-attached storage Most important goals for enterprise IT (DAS), storage area networks (SAN) and departments are agility and cost control. Cloud network-attached storage (NAS). Backup computing fulfills these requirements and allows technologies are covered as a related feature. These main technology groups include a list (IEEE 802.1p), and the Integration group of criteria which detailed support for specific describes the support for IPv6 and virtual private technologies, e.g. the NAS group considers the networks (VPNs) for access and management. support for NFS and CIFS network file systems, and the DAS group the supported file system and 3.4. Management criteria block-based replication. Similarly, the backup group contains criteria for backup over local Management category describes features (tape and DAS) and remote (NAS) storage. directly related to the way evaluated products Organizations can thus choose products manage their clouds. The criteria within this depending on their internal storage strategies category are grouped into Integration, (e.g. if they invested in SAN storage) or even Accounting, Reporting and Recovery. plan future strategies based on selected products. The Integration group focuses on software integration between the host and the guest 3.2. Virtualization criteria operating systems, support for specific and mass management of both, and available options for Virtualization technologies are at the core of integration with third party software via exposed cloud computing idea of flexible and scalable and consumed APIs. The Accounting group computing resources. Open source products are deals with data collecting and billing resource ahead of the commercial/closed products in the usage to cloud users. Along with billing, we number of supported virtualization technologies, included criteria for reporting on current system often supporting several different open source, status and historical logs in the Reporting and to some extent even commercial hypervisors. category, while the Recovery category contains Virtualization criteria are grouped as follows: criteria describing the product's automatic VM Type, VM Technology, Quotas, recovery abilities, high availability features and Prioritization, Migration, Cloning, Hot administrative alerting about exceptional configuration and Provisioning. These groups operational conditions. address the virtualization type (full, Easy and comprehensive management is paravirtualized or containers), specific crucial for successfully implementing clouds, virtualization technology (Xen, KVM, OpenVZ and we believe that the proposed criteria can be etc.), quotas and prioritizing of CPU, network, used to asses and compare these features across memory and disk, live and offline migration and varied products. cloning, hot reconfiguration and provisioning, respectively. 3.5. Security criteria As the support for certain feature-sets differs among supported virtualization types, we Security features are important for all decided that the evaluation process should computer system deployments and clouds are no consider the feature superset, with additional exception. Security criteria groups are commentary describing which features are Integration, Permissions, Reporting, Support, available in which virtualization products. Encryption, Certification and Auditing. The Integration group describes the product's 3.3. Network criteria ability to integrate with Active Directory and generic LDAP servers for user authentication, Network is important both as means of using while the Permission group deals with the services deployed inside the virtual machines authorization levels for specific resource (e.g. and for managing the entire cloud environment. VM server or storage servers) or virtual machine We divided low-level network support into four access. Reporting covers the security report types groups: VLAN, Firewall, Performance and available to cloud administrators, and Auditing Integration. covers the types of events which can be audited. The VLAN group describes the support for Certification details third-party product VLAN packet tagging (IEEE 802.1Q) for evaluations for compliance with security network management and isolation, the Firewall standards. Finally, Encryption contains the group describes the level of support for network criteria describing support for encrypted virtual filtering in the form of stateful packet inspection, disk storage and secure management access. the Performance group covers Ethernet QoS Security criteria are more important in public classical grades 1-5 used in education systems. and hybrid clouds than in private clouds, but a Alongside these grades, each criteria in the comprehensive list of criteria allows comparison evaluation sheet can contain a note with detailed and evaluation to be used in making decision information about the relation of specific criteria about overall security architecture. to the product, if required. 3.6. Vendor support criteria 5. Open source cloud computing solutions Large open source projects are often This chapter presents (alphabetically) a supported or even created by commercial selected set of open source cloud computing entities. Support for such projects is often solutions. divided between a community, which is almost exclusively oriented toward open source 5.1. Abiquo Community Edition development, and a vendor in a strict sense, which may offer commercial support or even Abiquo1 presents cloud management solutions commercial versions of the products. Our criteria in the form of commercial Abiquo Enterprise cover both potential sides of a project and Edition and as open source Abiquo Community contain the following groups: Community, Edition, differing mostly in resource limits and Certification, Documentation, Vendor, Support management features. It provides network, and Overall. storage and workload management, multiple- The Community group deals with support image public, shared and private libraries, and channels freely available to everyone via the multi-tenancy hierarchical user management. open source community

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us