October 6, 2010
HDR Defense at ENS Lyon.
This lecture focus on a large point of view of the current distributed infrastructure. We focus on the infrastructure used in many application field: Cloud Infrastructure.
In this part of the course, we plan to introduce the most important Cloud research topics. In the scope of this kind of infrastructure we will introduce Data Management (Big Data), Resources Management, Elasticity and Dynamicity, Scheduling, Budget Management, OpenStack project, etc. In other words, we will see how the science can take benefit of the Cloud.
[0.1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A Berkeley view of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb 2009.
[0.2] E. Caron, F. Desprez, A. Muresan, and F. Suter. Budget Constrained Resource Allocation for Non- Deterministic Workows on an IaaS Cloud. In 12th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2012), Fukuoka (Japan), September 4-7 2012. Springer.
While managing the structure of an application is a difficult task for a sequential application, it is far more difficult for a distributed application. However, the mapping of the constituents of an application to resources is an important operation with respect to performance, security, or cost. This part of the module focuses mainly on component models: it will describes the concepts used by these models as well as it will present some major models used in distributed and parallel components. Last, it will introduce model transformation as an approach to deal with application structure modelization.
After a survey of why energy is one of the main limitating factor for the design of large Clouds (made with DataCenters) [2.1], we will introduce the concepts of energy management and energy efficiency in Clouds [2.2]. We will focus on various clouds energy levers, models and algorithms allowing energy reduction at large scale [2.3]. Finally, we conclude by presenting on-going research done in this domain within ENS-Lyon [2.4,2.5].
After a survey of different research areas of security, we will introduce the concept of system protection and especially access control. We present the current approach used to protect systems and present their shortcoming [3.1]. Then we explain how information flow can be used to enhance system protection. Based on this explanation, we present a method to provide an easy-to-use and highly secured protection mechanism for operating system [3.2]. Thereafter, we introduce the new security issues related to Cloud Computing and other virtualized Platforms [3.3]. Furthermore, we present why the protection mechanism protected before must be improved for Cloud Computing and large scale Platforms. Finally, we conclude by introducing the different hot topics on Cloud security and present on-going research done in this domain within ENS-Lyon [3.4,3.5].
In this part we will discover MapReduce Environments: Design, Performance, Optimizations. It covers the basic design of the runtime environments, which implements the MapReduce programming model; Hadoop being the most famous one. Then, several research challenges and results are presented (task management, outliers, greener mapreduce). Finally, we introduce some of the results we obtained based on our research around MapReduce for Internet Computing.
Each part will be evaluated separately by either: a short homework, article reading, a short programming project, or writing a report.