SlideShare a Scribd company logo
1 of 11
Download to read offline
Mobile Summit, Cloud Networking – Technical and Business Challenges I
                                      Berlin, July 4, 2012




           Clouds — Challenges and Risks
                                   Burkhard Stiller1
          1Department of Informatics IFI, Communication Systems Group CSG,
                               University of Zürich UZH
                                    stiller@ifi.uzh.ch

in collaboration with Guilherme Machado1 and Andrei Vancea1 and SESERV                 .


                                 Introduction and Definition
                               Challenges and State-of-the-Art
                                    Risks and Economics
                                        Conclusions

  © 2012 UZH, CSG@IFI                         1




                        From Desktops to Clouds
       Desktops and workstations
         – Networked, low capacity storage, limited processing
       Local clusters
         – Connected, centralized, higher storage/processing
       Institutional clusters, High-performance Computing HPC
         – Access-controlled, centralized, high storage/processing
       Grids
         – Shared services on top of visible
           hardware and software resources


       Clouds: IaaS, PaaS, SaaS?                                     Great Globular
                                                                 Cluster in Hercules
  © 2012 UZH, CSG@IFI                         2
Clouds – Common Grounds
     Clouds are [defined as]
       – a large pool of easily usable and accessible virtualized
         resources (such as hardware, development platforms, and/or
         services [and software]).
       – These resources can be dynamically reconfigured
            • to adjust to a variable load (scale),
            • allowing also for an optimum resource utilization.
       – This pool of resources is typically exploited by a
         pay-per-use model
            • in which guarantees are offered by the infrastructure provider by
              means of customized SLAs [Service Level Agreements].

                       L. M. Vaquero, L. Rodero-Merino, J. Caceres, M. Lindner: A Break in the Clouds: Towards a Cloud Definition;
                                               ACM Computer Communications Review Vol. 39, No. 1, December 2008, pp 50-55.

© 2012 UZH, CSG@IFI                                          3




        Cloud Characteristics in Practice (1)
     Flexible pricing via pay-per-use
       – Users pay for consumption of services/resources
       – Computing capabilities exploited in models
     Elastic scaling
       – Resource availability can scale up or down at any time
         by different factors as demand increases or decreases
     Rapid provisioning
       – Computing capabilities/services are immediately
         provisioned without physical delivery/transferring
         ownership or resources
     Improvement of energy consumption
       – Minimization of IT infrastructure power consumption
© 2012 UZH, CSG@IFI                                          4
Cloud Characteristics in Practice (2)
     Virtualization
       – Basically all computing resources are virtualized
            • To provide independence of underlying infrastructure
            • To achieve optimal utilization of resources


     (Semi-)Standardized offerings
       – Cloud services are highly provider-specific
       – Cloud services offer limited customization
       – Cloud services are usually available through
         self-service interfaces
       – Service request and provisioning processes automated
                      Based on J. De Vos, E. van Heusden: Implications of Cloud Computing on IT Service Management, 2010.

© 2012 UZH, CSG@IFI                                    5




                          Challenges
                  and Selected State-of-the-Art




© 2012 UZH, CSG@IFI                                    6
Key Challenges (1)
       – Security and legal functionality
            • Data location
            • Data segregation between competitor’s data
            • Privileged user access for sharing physical resources
            • Recovery in case of disasters
            • Fault investigation support
            • Long-term viability wrt contracts
       – Interoperability and standards
            • Common and standard interfaces for cloud computing
            • Portability of virtual appliances across diverse clouds providers
                  – E.g., migration of virtual machines, virtual networks, or live migration,
                    from one Cloud Provider to another
                  – Needed for robust and available cloud services
            • Device-independency (bring your own – BYO), especially mobile
© 2012 UZH, CSG@IFI                                            7




                                  Key Challenges (2)
       – Optimization of capacity utilization
            • “Avoid the promise of something that cannot be delivered!”
                  – Scheduling considering typical Cloud-specific parameters, e.g., CPU, RAM, bandwidth, and any other
                    parameter being sold …

            • Over-capacity decreases user’s satisfaction, leading to loss of
              revenue
            • Under-capacity does not generate revenue for the Cloud Provider
       – Cloud aggregation
            • To ensure availability in case of faults
                  – Sharing of resources between cloud providers
                  – Brokering algorithms for high availability, performance, proximity, legal domains, price, or energy efficiency

            • Networking in the deployment of services across multiple cloud
              providers
            • SLA negotiation and management between cloud providers
       – SLAs, monitoring, and accounting (accountability)
© 2012 UZH, CSG@IFI                                            8
Open Issues – SLA, Monitoring, Accounting

      Cloud providers typically do not offer guarantees
        – Large to very huge sizes of Cloud provider IT infrastructures
               • Technically hard to provide deterministic guarantees
               • High complexity due to multiple inter-dependencies of resources
                 (physical, virtual, and their combinations)
        – SLA specifications tailored toward Cloud users’ interests
               • E.g., in terms of parameters like availability, but less focused on
                 technical ones, such as performance or bandwidth

      Monitoring and accounting management
        – Needs to consider layers inside and outside Cloud providers
        – Accounting of virtual resources utilized (accountability)
               • Even further, auditability is in full hands of Cloud providers
 © 2012 UZH, CSG@IFI                                        9




                                            State-of-the-Art
                                            in Cloud SLAs
Cloud Provider             Service                                       SLA Parameters
                                            Availability (99.9%) with the following definitions: Error Rate, Monthly Uptime
                              S3
                                            Percentage, Service Credit
                                            Availability (99.95%) with the following definitions: Service Year: 365 days of
                       EC2 (Elastic         the year, Annual Percentage Uptime, Region Unavailable/Unavailability,
   Amazon
                       Compute Cloud)       Unavailable: no external connectivity during a five minute period, Eligible
                                            Credit Period, Service Credit
                                            Subject to the Amazon Web Services Customer Agreement, since no specific
                           SimpleDB
                                            SLA is defined. Such agreement does not guarantee availability.
                                            The company’s Web site does not contain information regarding SLAs for this
  SalesForce                 CRM
                                            specific service.
                       Google Apps (incl.   Availability (99.9%) with the following definitions: Downtime, Downtime
    Google             Gmail business,      Period: 10 consecutive minutes downtime, Google Apps Covered Services,
                       Google Docs)         Monthly Uptime Percentage, Scheduled Downtime, Service, Service Credit.
                                            Availability regarding the following:
                                            Internal Network: 100%, Data Center Infrastructure: 100%
                                            Performance related to service degradation: Server Migration in case of
                         Cloud Server       performance problems: migration is notified 24 hours in advance, and is
                                            completed in 3 hours (maximum).
Rackspace Cloud
                                            Recovery Time: In case of failure, guarantee the restoration/recovery in 1
                                            hour after the problem is identified.
                          Cloud Sites       Availability, Unplanned Maintenance: 0%, Service Credit.
 © 2012 UZH, CSG@IFI      Cloud Files       Availability: 99.9%, Service Credit.
                                                            10
State-of-the-Art
          in Cloud SLA Management and Monitoring
Approach          SLA@         RESERVOIR          R. Serral-          Trust         Assess             SLACC
                   SOI                             Gracia             COM            Grid
Prediction for     Static         Static         Yes, evaluating        No              No         Dynamically added
                 Parameters     Parameters        past service                                        parameters
                                                   disruptions
 Range of         Narrow        Medium and          Narrow          Wide and        Unknown,        Wide and flexible
Parameters                       Flexible                            flexible       but flexible

 Estimation          No              No                No               No              No                Yes
 Algorithm

   Risk              No              No                No               No             Yes         Embedding prepared
Assessment

      IT             No         Yes, just for      Unknown         Only partially   Unknown               Yes
Infrastructure                  virtualization                      available –
    Model                                                           incomplete
 Estimates           No              No                No               No           Yes, risk            Yes
 Repository                                                                         repository

   SLA            Yes, not     WS-Agreement        Unknown             WS-             WS-                Yes
 Language        defined yet                                        Agreement       Agreement

   SLA              Yes             Yes           No, detects          Yes             Yes                Yes
 Monitoring                                         service
   © 2012 UZH, CSG@IFI                                    11
                                                   disruption




                               Risks and Economics




   © 2012 UZH, CSG@IFI                                      12
Basic Risks in Clouds
                  National Institute of Standards and Technology: An Introduction to Computer Security: The NIST Handbook, 800-12.



     Risk = Threat X Vulnerabilities
       – Threat:
            • Any potentially malicious or other occurrence that can have an
              undesirable effect on the assets and resources of the Cloud system
       – Vulnerability:
            • A quality or characteristic of the Cloud-based system that
              provides an opportunity for misuse (internal or external)
     Manifold Cloud-based threats, vulnerabilities (external):
       – Eavesdropping, changing data, DDoS, provider shut-down …
            • Threats for confidentiality, integrity, authenticity, availability …
  – Service interfaces, data transfer, data storage, virtual
     machines/sand-box, accounting data …
→ Risks are expressed typically in monetary values
© 2012 UZH, CSG@IFI                                          13




                                              Economics
     Economics (simplified): pricing – costs – chargeback
       – External view: pricing for utilized Cloud services
            • Common today: pay-per-use pricing models
                  – Elastic scaling of resources, usage of shared virtualized infrastructure …
            • Hypothesis: The Cloud fundamentally changes the economics of IT.
       – How to determine prices, find “good” ones?
            • Cloud providers don’t provide guarantees
            • Cloud users can easily switch between different providers
            • Both do not really see strong economic commitments
       – Internal view: how to determine and handle IT costs?
            • Dynamic resource provisioning, (lack of) commitments, contracts (SLAs),
              contract violations, monitoring tools, accounting models, personnel …
            • Hypothesis: Pay-per-use models enable a more efficient use of capital,
              potential cost reductions, and provide for business flexibility.
                                            14
© 2012 UZH, CSG@IFI
Accounting and Costs
     Existing knowledge
       – Modeling of larger computing/data centers exist
       – Understanding of almost all technical details,
         however, not of all personnel-related costs
       – Models in place for accounting and (selected) costs
     Missing knowledge
       – Models for “typical” IT infrastructures of (a) SME, (b) SME+,
         and (c) SME- types of scenarios
       – Accounting for virtual resources, mappings into physicals
            • Needed to form the basis for evaluating usage and in turn costs
              in IT infrastructures (technical and personnel)
       – This may form the basis for utilizable pricing of cloud services
© 2012 UZH, CSG@IFI                                            15




    Key Success Factors for Cloud Pricing
     Transparency and understandability
       – To offer transparent and understandable pricing models to stakeholders
     Controllability
       – To denote to what extent consumers are in control of IT costs
     Cost of costing
       – To quantify costs of the application of accounting models and to compare
         them against potential benefits
     Fairness
       – To optimize perceived fairness, the key to pricing models, which refers to
         the user’s perception of how fair the model is
     Accuracy
       – To what extent charges (allocated to an organizational unit) match to
         each service accurately, approximating actual costs (cost recovery)
                  Based on B. Stiller, G. Fankhauser, N. Weiler, B. Plattner: Charging and Accounting for Integrated Internet Services
                    – State of the Art, Problems, and Trends, The Interet Summit (INET '98), Geneva, Switzerland, July 21-24, 1998,
                               and on J. De Vos, E. van Heusden: Implications of Cloud Computing on IT Service Management, 2010.
© 2012 UZH, CSG@IFI                                            16
Cloud Chargeback Metrics
     What metrics can IT departments use to charge back
     business units for cloud services?
       – Chargeback for any IT service?
     The question is complex!
       – Charging for (tele-)communication services
       – Charging for Infrastructure-as-a-Service (IaaS)
            • CPU cycles, memory, disc space, I/O, bandwidth (telco)
       – Charging for Platform-as-a-Service (PaaS)                                ?
            • Concern at application development and support level
       – Charging for Software-as-a-Service (SaaS)                              ?
            • Metric evaluates business value of the service, such as the number of
              customer requests responded to within a given period of time
© 2012 UZH, CSG@IFI                       17




                      Economics Reconsidered
     Economics (simplified): pricing – costs – chargeback
       – External view: pricing for utilized Cloud services
            • Hypothesis: Does the Cloud fundamentally change economics of IT?


            • NO – but it demands for a much more transparent understanding of IT
              and service costs within a Cloud user’s infrastructure.


       – Internal view: how to determine and handle IT costs?
            • Hypothesis: Pay-per-use enables more efficient use of capital,
              potential cost reductions, and business flexibility.


            • YES – As it seems today, however, total costs may not be reduced.


© 2012 UZH, CSG@IFI                       18
Conclusions




© 2012 UZH, CSG@IFI              19




                      Clouds’ “Don’ts and Does”

     Clouds do not define a single technology
                                                     Don‘ts
     Clouds do not revolutionize technology

     Clouds determine a business evolution to match agile
     and flexible computing demands
     Clouds enable an IT “capacity” increases (storage,
     computing) while keeping costs low (or similar) without
     investing in new infrastructure, maintenance, software
     Clouds offer multiple technology facets and solutions
                                                      Does
© 2012 UZH, CSG@IFI              20
Generic Cloud Evaluation
                   + Scale and encapsulated update/change management
positive aspects



                      • Greater efficiency of provision as economies of scale hold
                   + Costs
    Mostly




                      • Pay-as-you-go scheme, which avoids over-buying resources
                   + Flexibility and agility as well as next generation migration
                      • On-demand computing demands
                      • Ability to create new compute resources to experiment with
                   – Security (Integrity, privacy, and data protection)
negative aspects




                      • Dedicated scenario- and technology-dependent case analysis required
   Partially




                   – Availability, reliability, and lack of control
                      • Full dependency on cloud provider (technology, SLA)
                   – Lock-in effects
                      • Cloud provider-specific interfaces, maintenance, SLAs, and pricing exist
© 2012 UZH, CSG@IFI                                  21




                          Thank you for your attention.

                                             Questions?




© 2012 UZH, CSG@IFI                                  22

More Related Content

Viewers also liked

Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5ictseserv
 
Mturi licentiate presentation
Mturi licentiate presentationMturi licentiate presentation
Mturi licentiate presentationpajo01
 
2:a generationens sociala medier
2:a generationens sociala medier2:a generationens sociala medier
2:a generationens sociala medierpajo01
 
BPM in crisis
BPM in crisisBPM in crisis
BPM in crisispajo01
 
Cooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud EnvironmentsCooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud Environmentsictseserv
 

Viewers also liked (7)

Eunice2012
Eunice2012Eunice2012
Eunice2012
 
Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5
 
Mturi licentiate presentation
Mturi licentiate presentationMturi licentiate presentation
Mturi licentiate presentation
 
2:a generationens sociala medier
2:a generationens sociala medier2:a generationens sociala medier
2:a generationens sociala medier
 
BPM in crisis
BPM in crisisBPM in crisis
BPM in crisis
 
Aims2012
Aims2012Aims2012
Aims2012
 
Cooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud EnvironmentsCooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud Environments
 

Similar to Burkhard stiller cloiuds-fu-nems-2012

Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understandRahulBhole12
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewsri_kanth0526
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewjaimehra05
 
Cloud Computing (Infrastructure as a Service)UNIT 2
Cloud Computing (Infrastructure as a Service)UNIT 2Cloud Computing (Infrastructure as a Service)UNIT 2
Cloud Computing (Infrastructure as a Service)UNIT 2SURBHI SAROHA
 
Aims2011 SLA support system
Aims2011 SLA support systemAims2011 SLA support system
Aims2011 SLA support systemictseserv
 
Aims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionAims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionictseserv
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelHitesh Mohapatra
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noidataramandal
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemClovis Chapman
 
oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373Prithvi Rajkumar
 

Similar to Burkhard stiller cloiuds-fu-nems-2012 (20)

MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101
 
Cloud management
Cloud managementCloud management
Cloud management
 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputing
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understand
 
Coud discovery chap 10
Coud discovery chap 10Coud discovery chap 10
Coud discovery chap 10
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud Computing (Infrastructure as a Service)UNIT 2
Cloud Computing (Infrastructure as a Service)UNIT 2Cloud Computing (Infrastructure as a Service)UNIT 2
Cloud Computing (Infrastructure as a Service)UNIT 2
 
Aims2011 SLA support system
Aims2011 SLA support systemAims2011 SLA support system
Aims2011 SLA support system
 
Aims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionAims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-version
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Virtualization Into Cloud
Virtualization Into CloudVirtualization Into Cloud
Virtualization Into Cloud
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
cloud computing advantages.pptx
cloud computing advantages.pptxcloud computing advantages.pptx
cloud computing advantages.pptx
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud Ecosystem
 
Cloud Computing & DCIM
Cloud Computing & DCIMCloud Computing & DCIM
Cloud Computing & DCIM
 
oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373
 

More from ictseserv

Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01ictseserv
 
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...ictseserv
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Vesa terava net neutrality in europe - seserv se workshop june 2012
Vesa terava   net neutrality in europe - seserv se workshop june 2012Vesa terava   net neutrality in europe - seserv se workshop june 2012
Vesa terava net neutrality in europe - seserv se workshop june 2012ictseserv
 
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
Stephen minton   tech transformation in the age of uncertainty - seserv se wo...Stephen minton   tech transformation in the age of uncertainty - seserv se wo...
Stephen minton tech transformation in the age of uncertainty - seserv se wo...ictseserv
 
Sara de freitas the gamification of everyday life - seserv se workshop june...
Sara de freitas   the gamification of everyday life - seserv se workshop june...Sara de freitas   the gamification of everyday life - seserv se workshop june...
Sara de freitas the gamification of everyday life - seserv se workshop june...ictseserv
 
Javier salcedo cloud computing - seserv se workshop june 2012
Javier salcedo   cloud computing - seserv se workshop june 2012Javier salcedo   cloud computing - seserv se workshop june 2012
Javier salcedo cloud computing - seserv se workshop june 2012ictseserv
 
Falk von bornstaedt networks perspectives and analysis in the future intern...
Falk von bornstaedt   networks perspectives and analysis in the future intern...Falk von bornstaedt   networks perspectives and analysis in the future intern...
Falk von bornstaedt networks perspectives and analysis in the future intern...ictseserv
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012ictseserv
 
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012ictseserv
 
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
Alessandro bogliolo   workshop introduction - seserv se workshop june 2012Alessandro bogliolo   workshop introduction - seserv se workshop june 2012
Alessandro bogliolo workshop introduction - seserv se workshop june 2012ictseserv
 
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...ictseserv
 
Alan hartman trust measurement and management - seserv se workshop june 2012
Alan hartman   trust measurement and management - seserv se workshop june 2012Alan hartman   trust measurement and management - seserv se workshop june 2012
Alan hartman trust measurement and management - seserv se workshop june 2012ictseserv
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatieictseserv
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Seserv workshop manos dramitinos - tussle analysis from etics project
Seserv workshop   manos dramitinos - tussle analysis from etics projectSeserv workshop   manos dramitinos - tussle analysis from etics project
Seserv workshop manos dramitinos - tussle analysis from etics projectictseserv
 
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop   costas kalogiros - tussle analysis examples dns-tcpSeserv workshop   costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop costas kalogiros - tussle analysis examples dns-tcpictseserv
 
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...ictseserv
 
Sending party network pays
Sending party network paysSending party network pays
Sending party network paysictseserv
 

More from ictseserv (20)

Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01
 
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Vesa terava net neutrality in europe - seserv se workshop june 2012
Vesa terava   net neutrality in europe - seserv se workshop june 2012Vesa terava   net neutrality in europe - seserv se workshop june 2012
Vesa terava net neutrality in europe - seserv se workshop june 2012
 
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
Stephen minton   tech transformation in the age of uncertainty - seserv se wo...Stephen minton   tech transformation in the age of uncertainty - seserv se wo...
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
 
Sara de freitas the gamification of everyday life - seserv se workshop june...
Sara de freitas   the gamification of everyday life - seserv se workshop june...Sara de freitas   the gamification of everyday life - seserv se workshop june...
Sara de freitas the gamification of everyday life - seserv se workshop june...
 
Javier salcedo cloud computing - seserv se workshop june 2012
Javier salcedo   cloud computing - seserv se workshop june 2012Javier salcedo   cloud computing - seserv se workshop june 2012
Javier salcedo cloud computing - seserv se workshop june 2012
 
Falk von bornstaedt networks perspectives and analysis in the future intern...
Falk von bornstaedt   networks perspectives and analysis in the future intern...Falk von bornstaedt   networks perspectives and analysis in the future intern...
Falk von bornstaedt networks perspectives and analysis in the future intern...
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012
 
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
 
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
Alessandro bogliolo   workshop introduction - seserv se workshop june 2012Alessandro bogliolo   workshop introduction - seserv se workshop june 2012
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
 
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
 
Alan hartman trust measurement and management - seserv se workshop june 2012
Alan hartman   trust measurement and management - seserv se workshop june 2012Alan hartman   trust measurement and management - seserv se workshop june 2012
Alan hartman trust measurement and management - seserv se workshop june 2012
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatie
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Seserv workshop manos dramitinos - tussle analysis from etics project
Seserv workshop   manos dramitinos - tussle analysis from etics projectSeserv workshop   manos dramitinos - tussle analysis from etics project
Seserv workshop manos dramitinos - tussle analysis from etics project
 
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop   costas kalogiros - tussle analysis examples dns-tcpSeserv workshop   costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
 
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
 
Sending party network pays
Sending party network paysSending party network pays
Sending party network pays
 

Recently uploaded

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Recently uploaded (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Burkhard stiller cloiuds-fu-nems-2012

  • 1. Mobile Summit, Cloud Networking – Technical and Business Challenges I Berlin, July 4, 2012 Clouds — Challenges and Risks Burkhard Stiller1 1Department of Informatics IFI, Communication Systems Group CSG, University of Zürich UZH stiller@ifi.uzh.ch in collaboration with Guilherme Machado1 and Andrei Vancea1 and SESERV . Introduction and Definition Challenges and State-of-the-Art Risks and Economics Conclusions © 2012 UZH, CSG@IFI 1 From Desktops to Clouds Desktops and workstations – Networked, low capacity storage, limited processing Local clusters – Connected, centralized, higher storage/processing Institutional clusters, High-performance Computing HPC – Access-controlled, centralized, high storage/processing Grids – Shared services on top of visible hardware and software resources Clouds: IaaS, PaaS, SaaS? Great Globular Cluster in Hercules © 2012 UZH, CSG@IFI 2
  • 2. Clouds – Common Grounds Clouds are [defined as] – a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms, and/or services [and software]). – These resources can be dynamically reconfigured • to adjust to a variable load (scale), • allowing also for an optimum resource utilization. – This pool of resources is typically exploited by a pay-per-use model • in which guarantees are offered by the infrastructure provider by means of customized SLAs [Service Level Agreements]. L. M. Vaquero, L. Rodero-Merino, J. Caceres, M. Lindner: A Break in the Clouds: Towards a Cloud Definition; ACM Computer Communications Review Vol. 39, No. 1, December 2008, pp 50-55. © 2012 UZH, CSG@IFI 3 Cloud Characteristics in Practice (1) Flexible pricing via pay-per-use – Users pay for consumption of services/resources – Computing capabilities exploited in models Elastic scaling – Resource availability can scale up or down at any time by different factors as demand increases or decreases Rapid provisioning – Computing capabilities/services are immediately provisioned without physical delivery/transferring ownership or resources Improvement of energy consumption – Minimization of IT infrastructure power consumption © 2012 UZH, CSG@IFI 4
  • 3. Cloud Characteristics in Practice (2) Virtualization – Basically all computing resources are virtualized • To provide independence of underlying infrastructure • To achieve optimal utilization of resources (Semi-)Standardized offerings – Cloud services are highly provider-specific – Cloud services offer limited customization – Cloud services are usually available through self-service interfaces – Service request and provisioning processes automated Based on J. De Vos, E. van Heusden: Implications of Cloud Computing on IT Service Management, 2010. © 2012 UZH, CSG@IFI 5 Challenges and Selected State-of-the-Art © 2012 UZH, CSG@IFI 6
  • 4. Key Challenges (1) – Security and legal functionality • Data location • Data segregation between competitor’s data • Privileged user access for sharing physical resources • Recovery in case of disasters • Fault investigation support • Long-term viability wrt contracts – Interoperability and standards • Common and standard interfaces for cloud computing • Portability of virtual appliances across diverse clouds providers – E.g., migration of virtual machines, virtual networks, or live migration, from one Cloud Provider to another – Needed for robust and available cloud services • Device-independency (bring your own – BYO), especially mobile © 2012 UZH, CSG@IFI 7 Key Challenges (2) – Optimization of capacity utilization • “Avoid the promise of something that cannot be delivered!” – Scheduling considering typical Cloud-specific parameters, e.g., CPU, RAM, bandwidth, and any other parameter being sold … • Over-capacity decreases user’s satisfaction, leading to loss of revenue • Under-capacity does not generate revenue for the Cloud Provider – Cloud aggregation • To ensure availability in case of faults – Sharing of resources between cloud providers – Brokering algorithms for high availability, performance, proximity, legal domains, price, or energy efficiency • Networking in the deployment of services across multiple cloud providers • SLA negotiation and management between cloud providers – SLAs, monitoring, and accounting (accountability) © 2012 UZH, CSG@IFI 8
  • 5. Open Issues – SLA, Monitoring, Accounting Cloud providers typically do not offer guarantees – Large to very huge sizes of Cloud provider IT infrastructures • Technically hard to provide deterministic guarantees • High complexity due to multiple inter-dependencies of resources (physical, virtual, and their combinations) – SLA specifications tailored toward Cloud users’ interests • E.g., in terms of parameters like availability, but less focused on technical ones, such as performance or bandwidth Monitoring and accounting management – Needs to consider layers inside and outside Cloud providers – Accounting of virtual resources utilized (accountability) • Even further, auditability is in full hands of Cloud providers © 2012 UZH, CSG@IFI 9 State-of-the-Art in Cloud SLAs Cloud Provider Service SLA Parameters Availability (99.9%) with the following definitions: Error Rate, Monthly Uptime S3 Percentage, Service Credit Availability (99.95%) with the following definitions: Service Year: 365 days of EC2 (Elastic the year, Annual Percentage Uptime, Region Unavailable/Unavailability, Amazon Compute Cloud) Unavailable: no external connectivity during a five minute period, Eligible Credit Period, Service Credit Subject to the Amazon Web Services Customer Agreement, since no specific SimpleDB SLA is defined. Such agreement does not guarantee availability. The company’s Web site does not contain information regarding SLAs for this SalesForce CRM specific service. Google Apps (incl. Availability (99.9%) with the following definitions: Downtime, Downtime Google Gmail business, Period: 10 consecutive minutes downtime, Google Apps Covered Services, Google Docs) Monthly Uptime Percentage, Scheduled Downtime, Service, Service Credit. Availability regarding the following: Internal Network: 100%, Data Center Infrastructure: 100% Performance related to service degradation: Server Migration in case of Cloud Server performance problems: migration is notified 24 hours in advance, and is completed in 3 hours (maximum). Rackspace Cloud Recovery Time: In case of failure, guarantee the restoration/recovery in 1 hour after the problem is identified. Cloud Sites Availability, Unplanned Maintenance: 0%, Service Credit. © 2012 UZH, CSG@IFI Cloud Files Availability: 99.9%, Service Credit. 10
  • 6. State-of-the-Art in Cloud SLA Management and Monitoring Approach SLA@ RESERVOIR R. Serral- Trust Assess SLACC SOI Gracia COM Grid Prediction for Static Static Yes, evaluating No No Dynamically added Parameters Parameters past service parameters disruptions Range of Narrow Medium and Narrow Wide and Unknown, Wide and flexible Parameters Flexible flexible but flexible Estimation No No No No No Yes Algorithm Risk No No No No Yes Embedding prepared Assessment IT No Yes, just for Unknown Only partially Unknown Yes Infrastructure virtualization available – Model incomplete Estimates No No No No Yes, risk Yes Repository repository SLA Yes, not WS-Agreement Unknown WS- WS- Yes Language defined yet Agreement Agreement SLA Yes Yes No, detects Yes Yes Yes Monitoring service © 2012 UZH, CSG@IFI 11 disruption Risks and Economics © 2012 UZH, CSG@IFI 12
  • 7. Basic Risks in Clouds National Institute of Standards and Technology: An Introduction to Computer Security: The NIST Handbook, 800-12. Risk = Threat X Vulnerabilities – Threat: • Any potentially malicious or other occurrence that can have an undesirable effect on the assets and resources of the Cloud system – Vulnerability: • A quality or characteristic of the Cloud-based system that provides an opportunity for misuse (internal or external) Manifold Cloud-based threats, vulnerabilities (external): – Eavesdropping, changing data, DDoS, provider shut-down … • Threats for confidentiality, integrity, authenticity, availability … – Service interfaces, data transfer, data storage, virtual machines/sand-box, accounting data … → Risks are expressed typically in monetary values © 2012 UZH, CSG@IFI 13 Economics Economics (simplified): pricing – costs – chargeback – External view: pricing for utilized Cloud services • Common today: pay-per-use pricing models – Elastic scaling of resources, usage of shared virtualized infrastructure … • Hypothesis: The Cloud fundamentally changes the economics of IT. – How to determine prices, find “good” ones? • Cloud providers don’t provide guarantees • Cloud users can easily switch between different providers • Both do not really see strong economic commitments – Internal view: how to determine and handle IT costs? • Dynamic resource provisioning, (lack of) commitments, contracts (SLAs), contract violations, monitoring tools, accounting models, personnel … • Hypothesis: Pay-per-use models enable a more efficient use of capital, potential cost reductions, and provide for business flexibility. 14 © 2012 UZH, CSG@IFI
  • 8. Accounting and Costs Existing knowledge – Modeling of larger computing/data centers exist – Understanding of almost all technical details, however, not of all personnel-related costs – Models in place for accounting and (selected) costs Missing knowledge – Models for “typical” IT infrastructures of (a) SME, (b) SME+, and (c) SME- types of scenarios – Accounting for virtual resources, mappings into physicals • Needed to form the basis for evaluating usage and in turn costs in IT infrastructures (technical and personnel) – This may form the basis for utilizable pricing of cloud services © 2012 UZH, CSG@IFI 15 Key Success Factors for Cloud Pricing Transparency and understandability – To offer transparent and understandable pricing models to stakeholders Controllability – To denote to what extent consumers are in control of IT costs Cost of costing – To quantify costs of the application of accounting models and to compare them against potential benefits Fairness – To optimize perceived fairness, the key to pricing models, which refers to the user’s perception of how fair the model is Accuracy – To what extent charges (allocated to an organizational unit) match to each service accurately, approximating actual costs (cost recovery) Based on B. Stiller, G. Fankhauser, N. Weiler, B. Plattner: Charging and Accounting for Integrated Internet Services – State of the Art, Problems, and Trends, The Interet Summit (INET '98), Geneva, Switzerland, July 21-24, 1998, and on J. De Vos, E. van Heusden: Implications of Cloud Computing on IT Service Management, 2010. © 2012 UZH, CSG@IFI 16
  • 9. Cloud Chargeback Metrics What metrics can IT departments use to charge back business units for cloud services? – Chargeback for any IT service? The question is complex! – Charging for (tele-)communication services – Charging for Infrastructure-as-a-Service (IaaS) • CPU cycles, memory, disc space, I/O, bandwidth (telco) – Charging for Platform-as-a-Service (PaaS) ? • Concern at application development and support level – Charging for Software-as-a-Service (SaaS) ? • Metric evaluates business value of the service, such as the number of customer requests responded to within a given period of time © 2012 UZH, CSG@IFI 17 Economics Reconsidered Economics (simplified): pricing – costs – chargeback – External view: pricing for utilized Cloud services • Hypothesis: Does the Cloud fundamentally change economics of IT? • NO – but it demands for a much more transparent understanding of IT and service costs within a Cloud user’s infrastructure. – Internal view: how to determine and handle IT costs? • Hypothesis: Pay-per-use enables more efficient use of capital, potential cost reductions, and business flexibility. • YES – As it seems today, however, total costs may not be reduced. © 2012 UZH, CSG@IFI 18
  • 10. Conclusions © 2012 UZH, CSG@IFI 19 Clouds’ “Don’ts and Does” Clouds do not define a single technology Don‘ts Clouds do not revolutionize technology Clouds determine a business evolution to match agile and flexible computing demands Clouds enable an IT “capacity” increases (storage, computing) while keeping costs low (or similar) without investing in new infrastructure, maintenance, software Clouds offer multiple technology facets and solutions Does © 2012 UZH, CSG@IFI 20
  • 11. Generic Cloud Evaluation + Scale and encapsulated update/change management positive aspects • Greater efficiency of provision as economies of scale hold + Costs Mostly • Pay-as-you-go scheme, which avoids over-buying resources + Flexibility and agility as well as next generation migration • On-demand computing demands • Ability to create new compute resources to experiment with – Security (Integrity, privacy, and data protection) negative aspects • Dedicated scenario- and technology-dependent case analysis required Partially – Availability, reliability, and lack of control • Full dependency on cloud provider (technology, SLA) – Lock-in effects • Cloud provider-specific interfaces, maintenance, SLAs, and pricing exist © 2012 UZH, CSG@IFI 21 Thank you for your attention. Questions? © 2012 UZH, CSG@IFI 22