Cloud Computing

2 views
Skip to first unread message

Bhaskar

unread,
Apr 3, 2009, 8:48:03 AM4/3/09
to BigCloud
Hello everybody

Can you suggest me the possible areas on cloud computing for Master's
thesis.My Background is Computer Engineering

Thanks

Saifi Khan

unread,
Apr 3, 2009, 3:05:31 PM4/3/09
to BigCloud

Hi Bhaskar:

Cloud computing is an expansive subject.

Is there already some area that you are specialized in/worked in
and like to utilize that knowledge ?


thanks
Saifi.

Bhaskar

unread,
Apr 3, 2009, 9:42:44 AM4/3/09
to BigCloud
Hello

I am Graduate student having knowlegde on Distributed Computing,
Hadoop and some knowledge on mapreduce programming.Now I am looking
the way for Cloud Computing so I am looking suggestion

Saifi Khan

unread,
Apr 3, 2009, 9:27:22 PM4/3/09
to BigCloud
On Fri, 3 Apr 2009, Bhaskar wrote:

>
> Hello
>
> I am Graduate student having knowlegde on Distributed Computing,
> Hadoop and some knowledge on mapreduce programming.Now I am looking
> the way for Cloud Computing so I am looking suggestion
>
> On Apr 3, 12:05 pm, Saifi Khan <saifi.k...@twincling.org> wrote:
> > On Fri, 3 Apr 2009, Bhaskar wrote:
> >
> > > Hello everybody
> >
> > > Can you suggest me the possible areas on cloud computing for Master's
> > > thesis.My Background is Computer Engineering
> >
> > > Thanks
> >
> > Hi Bhaskar:
> >
> > Cloud computing is an expansive subject.
> >
> > Is there already some area that you are specialized in/worked in
> > and like to utilize that knowledge ?
> >
> > thanks
> > Saifi.
>

Here is one suggestion:
Relational Database as a service on Hadoop/EC2.

thanks
Saifi.

Aditya

unread,
Apr 7, 2009, 1:57:43 AM4/7/09
to BigCloud
Hi Bhaskar,

My suggestion: Create a service that can track token usage.

An indicative API is as follows -

RegisterToken( myId:String, Token:String, Limit:Integer) -> boolean
- This registers a new token with your service with starting usage
count as 0
- Limit attribute signifies how much the token can be used
- It returns true on successful registration, false otherwise

TokenUsed( myId, Token, [usage:Integer]) -> boolean
- Here the user informs the service of its usage of the token (default
usage = 1)
- Internally it should increase the token usage count if within limit
and returns true
- In case limit is exceeded it returns false and everything remains
unchanged

GetInfo( myId, [Token]) -> [ { Token, usage, limit }, ... ]
- Simple inquiry for set of tokens their usage along with limit.
- Here Token is additional (optional) filter

Note this is on a web-scale which implies a single user can create
millions of tokens. You need to make this service highly available and
also ENSURE that the token count never goes wrong irrespective of m/c
failure, disk crashes, etc.

In my opinion, solving this problem will help you in your work of
enabling RDBMS over Hadoop/EC2 as per Saifi suggestion.

HTH

Aditya

Bhaskar1

unread,
Apr 7, 2009, 3:31:37 AM4/7/09
to BigCloud
Hello Aditya,

Idea is good, the main problem is that scalability of data for cloud
computing with RDBMS. any more ideas ??


Thanks

adhi

unread,
Apr 12, 2009, 8:02:14 AM4/12/09
to BigCloud
Hi !

There is a need for a open source connection broker in cloud
computing. I have made a detailed study of all available connection
brokers for connecting to VMs and all seem to be proprietary
solutions .

Cheers

Varadarajan

Saifi Khan

unread,
Apr 13, 2009, 8:35:10 AM4/13/09
to BigCloud

Hi Varadarajan:

It would be good if you could share your knowledge on the topic
of 'connection brokers'.

i'm also keen to know if there are any new design patterns you have
observed in connection management ?

The DB guys, the PROXY guys and the ORB guys were doing this
for quite sometime.

Have a nice day !


thanks
Saifi.

varadarajan narayanan

unread,
Apr 13, 2009, 3:27:28 AM4/13/09
to bigc...@googlegroups.com


It would be good if you could share your knowledge on the topic
of 'connection brokers'.


Hi !

Here is a spreadsheet which gives an idea about all the connection brokers available in the market.

http://cloudversity.com/pg/pages/view/724/

and

http://cloudversity.com/pg/pages/view/607/

Virtualisation plays an important role in cloud computing.

Well ! We virtualised  the server and  virtual machines are all sitting there but how to route an incoming connection to a specific machine in the cloud. I found that all are proprietary solutions based on VMware.

http://www.scribd.com/doc/14179452/Ideal-VDI-Solution

Hope this helps !

Cheers

Varadarajan

Ottawa , Canada
www.cloudversity.com




Saifi Khan

unread,
Apr 14, 2009, 7:37:40 AM4/14/09
to bigc...@googlegroups.com
On Mon, 13 Apr 2009, varadarajan narayanan wrote:

>
> Virtualisation plays an important role in cloud computing.
>
> Well ! We virtualised the server and virtual machines are all sitting
> there but how to route an incoming connection to a specific machine in the
> cloud. I found that all are proprietary solutions based on VMware.
>

You make a very important point.

At Twincling we did think of the same during the engg team meetup
and came up with VirtuE idea. However beyond the logo and choice
of FreeBSD as a platform for implementation, it is currently vaporware
:(

http://www.twincling.org/virtue


thanks
Saifi.

Saifi Khan

unread,
Apr 14, 2009, 9:13:09 AM4/14/09
to BigCloud
On Fri, 3 Apr 2009, Bhaskar wrote:

in case somebody is interested in 'security aspects of cloud',
i'd like to recommend a security model based on 'artificial
immune system'.

In 2007, i did read a bit of Ivan Roit's 'Essential Immunology'.
Failure in distributed systems is well modelled around the lines
of infection in a biological system as we are multi-cellular.
There are some papers by Leandro and Timmis.

@Shameer any interest in this area ?


thanks
Saifi.

Puneeth

unread,
Apr 14, 2009, 5:21:19 AM4/14/09
to bigc...@googlegroups.com
Hi Saifi,

Can you throw more light on security aspects of cloud -pointers/links should do.

Cheers,
Puneeth

Saifi Khan

unread,
Apr 14, 2009, 11:15:58 AM4/14/09
to bigc...@googlegroups.com

Most of the security architectures we look at are
. end-point
. end to end

In cloud computing terms, this means:
. end-point --> cloud perimeter
. end to end --> over my cloud

In the cloud model, a lot of traffic would be "inside the cloud"

This contrasts with the model, most brittle security companies
are used to looking at.

Hence my emphasis on 'multi-cellular system model'.

Anyway, the main websites (though not the best) are:

http://www.cloudsecurityalliance.org/
and
http://cloudsecurity.org/

The usual gokers are all listed up on these sites.

My next startup idea is 'legal hold in the cloud' :)


thanks
Saifi.

Puneeth

unread,
Apr 14, 2009, 4:05:37 PM4/14/09
to bigc...@googlegroups.com
Thanks :)
Reply all
Reply to author
Forward
0 new messages