DocumentCode
623644
Title
PACE: Policy-Aware Application Cloud Embedding
Author
Li, Li Erran ; Liaghat, Vahid ; Hongze Zhao ; Hajiaghay, MohammadTaghi ; Dan Li ; Wilfong, Gordon ; Yang, Y. Richard ; Chuanxiong Guo
fYear
2013
fDate
14-19 April 2013
Firstpage
638
Lastpage
646
Abstract
The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include not only computational and storage entities, but also policy entities (e.g., load balancers, firewalls, intrusion prevention boxes). Deploying applications on a cloud infrastructure without the policy entities may introduce substantial policy violations and/or security holes. In this paper, we present PACE: the first systematic framework for Policy-Aware Application Cloud Embedding. We precisely define the policy-aware, cloud application embedding problem, study its complexity and introduce simple, efficient, online primal-dual algorithms to embed applications in cloud data centers. We conduct evaluations using data from a real, large campus network and a realistic data center topology to evaluate the feasibility and performance of PACE. We show that deployment in a cloud without considering in-network policies may lead to a large number of policy violations (e.g., using tree routing as a way to enforce in-network policies may observe up to 91% policy violations). We also show that our embedding algorithms are very efficient by comparing with a good online fractional embedding algorithm.
Keywords
cloud computing; computer centres; trees (mathematics); PACE; campus network; cloud data center; data center topology; elastic cloud computing infrastructure; firewall; in-network policies; intrusion prevention boxes; load balancer; online fractional embedding algorithm; online primal-dual algorithm; policy entities; policy violation; policy-aware application cloud embedding; private cloud computing infrastructure; public cloud computing infrastructure; security holes; tree routing; virtualization; Bandwidth; Middleboxes; Network topology; Routing; Security; Topology; Virtual machining;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM, 2013 Proceedings IEEE
Conference_Location
Turin
ISSN
0743-166X
Print_ISBN
978-1-4673-5944-3
Type
conf
DOI
10.1109/INFCOM.2013.6566849
Filename
6566849
Link To Document