KEMBAR78
L6 Distributed Computing | PDF | Security | Computer Security
0% found this document useful (0 votes)
22 views37 pages

L6 Distributed Computing

Uploaded by

sujoyy19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views37 pages

L6 Distributed Computing

Uploaded by

sujoyy19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

Distributed

Computing

11/20/2023 1
Distributed Computing
• A distributed computer system consists of multiple software components that are

on multiple computers, but run as a single system.

• The computers that are in a distributed system can be physically close together

and connected by a local network, or they can be geographically distant and

connected by a wide area network.

• A distributed system can consist of any number of possible configurations, such

as mainframes, personal computers, workstations, minicomputers, and so on. The

goal of distributed computing is to make such a network work as a single

computer.
11/20/2023 2
Distributed Computing

• There are several advantages of this system over


traditional computing models such as scalability,
reliability, flexibility.

• Distributed computing has many forms such as cluster


computing, grid computing ,cloud computing etc.

11/20/2023 3
Cluster Computing

• Cluster computing involves connecting multiple


computers (nodes) together to work as a single
integrated computing resource. These nodes are usually
connected in a local area network (LAN) and are used to
solve complex computational tasks.

11/20/2023 4
Cluster Computing
Characteristics of this computing:
❑Many similar machines, close interconnection
❑Often special, standardized hardware (racks, blades)
❑Usually owned and used by a single organization

However, these cluster of machines require a massive amount of


power and cooling mechanism. Therefore, these clusters are
moved into separate building known as data center

11/20/2023 5
Grid Computing
• Grid computing is a form of distributed computing where
resources from various sources are combined to solve big
computational problems.

• It allows resources to be shared and combined across computers


located in diverse geographical areas and networks.

11/20/2023 6
Grid Computing

• Grids use special software (middleware) to manage and


distribute tasks across diverse and widely spread
resources and authorize any process that is being
executed on the network.

• Grids are typically used for scientific, engineering, and


research applications that require substantial
computational power.
11/20/2023 7
Cloud Computing

• Cloud computing is a model for enabling convenient,


on-demand network access to a shared pool of configurable
computing resources that can be rapidly provisioned
and released with minimal management effort or
service provider interaction.

• It provides a wide range of services that can be


distinguished into 3 catogery: SaaS, PaaS and IaaS
11/20/2023 8
What is virtualization?
Bo
b

Charli
Alic e
e
Physical
machine Dani
el
■ Suppose Alice has a machine with 4 CPUs and 8
GB of memory, and three customers:
■ Bob wants a machine with 1 CPU and 3GB of memory
■ Charlie wants 2 CPUs and 1GB of memory
■ Daniel wants 1 CPU and 4GB of memory
■ What should Alice do?
11/20/2023 9
What is virtualization?
Bo
b
Virtual
machin
e
Charli
monito
Alic e
r
e
Physical
machine Dani
Virtual
machines el
■ Alice can sell each customer a virtual machine
(VM) with the requested resources
■ From each customer's perspective, it appears as if
they had a physical machine all by themselves
(isolation)
11/20/2023 10
What is virtualization?

• Virtualization is a technique to separate a service from the


underlying physical delivery of that service.

• Virtualization allows sharing of a single physical instance


of a resource or an application among multiple customers
and organizations at one time.

• It is a key characteristics of cloud computing that provides


the required isolation, abstraction and encapsulation
11/20/2023 11
Security Issues

• Cloud computing provides improved, optimized, and low


cost services to the customers through virtualization and
multi-tenancy architecture.

• The use of cloud technologies, service models, and


deployment methods brings about specific security risks
and vulnerabilities unique to the cloud environment.

11/20/2023 12
Security Issues

• Issues at communication level :

We divide the cloud communication into two categories,


namely: (a) communication external to the cloud

(b) communication internal to the cloud

The challenges faced by the external communication are


same as the challenges of conventional IT communication.
11/20/2023 13
Security Issues

• Shared communication infrastructure:

o The sharing of network components provides attacker


the window of cross-tenant attack.

o Service providers often restrict users from conducting


vulnerability scans to avoid confusion with potential
cyberattacks, ensuring the security and stability of their
networks.
11/20/2023 14
Security Issues
• Issues at Virtual network:

o The virtual networks are responsible for communication between


VMs. Security and protection mechanisms over the physical network
are not able to monitor the traffic over virtualized network.

o Intrusion detection and prevention mechanisms usually depend on


the traffic patterns and activities to judge the anomalies and detect
the possibility of the attack. Virtualized network poses a hindrance
to the goal of such preventive measures
11/20/2023 15
Security Issues
• Security misconfigurations:

o A small misconfiguration can breach the security of the system.

o One of the most common misconfiguration occur when


administrators select such a configuration tool that they are
familiar with but not necessarily covers all the security
requirements.

o This can lead to data leakage of private information of customers.

11/20/2023 16
Security Issues

As a security measure for these attacks, Advanced cloud protection


system has been proposed where :

• VMs are constantly monitored.

• auditability for the actions of VMs.

• interceptor module is used for detecting any suspicious activities

To avoid misconfigurations, workforce needs to be extensively


trained with appropriate knowledge of the entire framework.
11/20/2023 17
Security Issues
• Virtualization issues:

o Virtualization can lead to data breach and cross-VM attacks.


Isolation is required storage devices, memory and hardware
level.

o During the migration phase, the contents of VM as well as the


source code of the VM itself becomes exposed to the network.

o A successful VM escape attack can provide access to the


computing and storage hardware
11/20/2023 18
Security Issues

• Virtualization issues:

o The key module of virtualization is hypervisor or VMM.


A compromised VMM can put all the VMs that are
managed by the victim VMM under attacker’s control.
The metadata of the VMs, kept by the VMM, may also be
exposed to an attacker if the attacker takes control of a
VMM.
11/20/2023 19
Security Issues

• Strategies to mitigating thse risks:

o The stored VMs should be encrypted.

o Built in security measures should be adopted for


virtualized OS

o Hypervisor state monitoring through third party

o Third party security technology should be used


11/20/2023 20
Security Issues

• Data/storage issues:

o Data privacy and integrity

o Data recovery vulnerability

o Data backup

The users and organizations are encouraged to use standard


encryption algorithms with off-the-shelf-technology.
11/20/2023 21
Reliability in CC
• Reliability in cloud computing is how consistently a cloud
computing system is able to provide its services without
interruption and failure.

• Cloud computing is a service-oriented architecture so the


attributes of the reliability rely on service models

• If a failure event has occurred at a particular instance, then partial


or even delayed services need to be delivered. The recovery
should be done with minimum intervention of human.
11/20/2023 22
Reliability in CC

Service Failure Management in Cloud Computing:

Ensuring reliable services in cloud computing involves effectively


handling service failures. Service failure management techniques
are categorized into two groups:

1. Reactive Failure Management and

2. Proactive Failure Management

11/20/2023 23
Reliability in CC

Reactive Failure Management : In this model, measures are


taken after the occurrence of failure. Whenever failures have
occurred in cloud services,

the required measures will be taken by restarting the services from


the last

execution instance recorded earlier using checkpointing or logging.

11/20/2023 24
Reliability in CC

Checkpointing:

• In this method, current state of a running process is saved on


some backup resources and on the occurrence of failure, the
process will be restarted or rolled back by using the last saved
state.

• It has been proved that using checkpointing task competition time


can be reduced to linear from exponential.

11/20/2023 25
Reliability in CC

Checkpointing:

• On the basis of the working principle, checkpointing has divided


been into three different categories such as Uncoordinated
Checkpointing, Coordinated Checkpointing and Communication
Induced Checkpointing.

• The determination of optimal checkpointing interval is a crucial


design decision for system performance.

11/20/2023 26
Reliability in CC

Logging:

• Each process is recorded or saved in its present state and


messages are sent periodically as the logs at some stable storage.
When a process crashes, a new process is created on the place of
a crashed process by using the recorded logs.

• The logs are saved in the order of the operations execution for
regeneration of a process in case of a failure.

11/20/2023 27
Reliability in CC

Logging:

• In the event of a failure, the system can use the log to either
replay the operations that were lost or undo the operations that
were only partially completed. This ensures that the system can
recover to a consistent state and avoid orphan process.

• To avoid logging overheads, system can combine checkpointing


and logging.

11/20/2023 28
Reliability in CC

Redundancy:

Here, the backup resources are used to run replicas of the running
processes.

On the basis of updating of running replicas to handle the


inconsistency, replication has divided into two categories :

• Primary Backup (Passive) replication

• Active replication
11/20/2023 29
Reliability in CC
Proactive Failure Management :

• In this method, the prevention measures are taken before the


occurrence of failure.

• The productivity of proactive failure management methods depends


upon the prediction of the occurrence of the failures.

• On the basis of the failure prediction results, the running processes


are migrated from the suspected resource to other healthy
resource for an uninterruptable execution.
11/20/2023 30
Reliability in CC
Proactive Failure Management :

• Migration method is used to provide fault tolerance by


incorporating failure prediction methods.

• Due to the dynamic nature of the cloud infrastructure, VM


migration based fault-tolerance methods more popular.

• There are 2 approaches for VM migration: Pre-copy VM Migration


Approach and Post-copy VM Migration Approach.

11/20/2023 31
Reliability in CC
Pre-copy VM Migration Approach :

• Hypervisor copies the state of the running VMs such as CPU state,
memory state, and state of other devices and the VM stops at the
source machine. This is the warm up phase.

• The stop and copy phase copies the remaining les or pages (if any) in
the memory that gets modfied (dirty pages) during the warm-up phase.

• After the transfer of all the pages the virtual machine resumes its
execution over the destination machine
11/20/2023 32
Reliability in CC
Post-copy VM Migration Approach :

• The process involves suspending running virtual machines (VMs) at the source
nodes and then migrating them to the destination nodes.

• During this migration, only partial attributes of the execution state are transferred,
including details such as CPU state and register usage. At the destination, the VMs
resumes with the execution.

• In parallel the source machine also stay active serving the migrated VMs.

• Whenever a VM does not find a page in its local memory, destination machine
redirects the page request to the source machine which in-turn responds with the
faulted page
11/20/2023 33
Green ICT
Green IT (green information technology) is the practice of creating and using
environmentally sustainable computing resources.

Green IT aims to minimize the negative effects of IT operations on the


environment by designing, manufacturing, operating and disposing of
servers, PCs and other computer-related products in an environmentally
friendly manner.

The motives behind green IT practices include reducing the use of hazardous
materials, maximizing energy efficiency during a product's lifetime, and
promoting the biodegradability of unused and outdated products.
11/20/2023 34
Green ICT
Importance of green ICT:

• Climate change

• Compliance

• Competitive advantage

• Reduced use of energy and other natural resources

11/20/2023 35
Green ICT
Challenges of green ICT:

1. Cost

2. Cultural pushback

3. Prioritization

4. Conflicting initiatives

5. Emerging fields

11/20/2023 36
Reference
• Web

• Security in cloud computing: Opportunities and challenges Mazhar Ali,


Samee U. Khan, Athanasios V. Vasilakos

• Reliability and Energy Efficiency in Cloud Computing Systems: Survey and


Taxonomy-Yogesh Sharma, Bahman Javadi, Weisheng Si,Daniel Sun

• https://www.techtarget.com/searchcio/definition/green-IT-green-information-
technology

11/20/2023 37

You might also like