Blueprint for the Intercloud - Protocols and Formats for Cloud Computing Interoperability

Cloud Computing is a term applied to large, hosted datacenters, usually geographically distributed, which offer various computational services on a “utility” basis. Most typically the configuration and provisioning of these datacenters, as far as the services for the subscribers go, is highly automated, to the point of the service being delivered within seconds of the subscriber request. Additionally, the datacenters typically use hypervisor based virtualization as a technique to deliver these services. The concept of a cloud operated by one service provider or enterprise interoperating with a clouds operated by another is a powerful idea. So far that is limited to use cases where code running on one cloud explicitly references a service on another cloud. There is no implicit and transparent interoperability. Use cases for interoperability, as well as work-in-progress around inter-cloud protocols and formats for enabling those use cases, are discussed in this paper.

[1]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[2]  Brian Adams,et al.  Interdomain Multicast Solutions Guide , 2002 .

[3]  Dino Farinacci,et al.  LISP for Multicast Environments , 2008 .

[4]  Tony Bates,et al.  Guidelines for creation, selection, and registration of an Autonomous System (AS) , 1996, RFC.

[5]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[6]  Ralf Schmitz,et al.  Mobile Networks Experimental evaluation of a handover optimization solution for multimedia applications in a mobile IPv6 network , 2005, Eur. Trans. Telecommun..

[7]  David L. Mills,et al.  Network Time Protocol (Version 3) Specification, Implementation and Analysis , 1992, RFC.

[8]  James Murty,et al.  Programming Amazon web services - S3, EC2, SQS, FPS, and SimpleDB: outsource your infrastructure , 2008 .

[9]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[10]  Dmitrii Zagorodnov,et al.  Eucalyptus : A Technical Report on an Elastic Utility Computing Archietcture Linking Your Programs to Useful Systems , 2008 .

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Keijiro Araki,et al.  Design of scalable interdomain IP multicast architecture , 2000, Proceedings 15th International Conference on Information Networking.

[13]  Ieee Standards Board IEEE standards for local and metropolitan area networks : overview and architecture , 1990 .

[14]  V. Skendzic,et al.  Provision of Precise Timing via IEEE 1588 Application Interfaces , 2007, 2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.

[15]  Steve Vinoski,et al.  Advanced Message Queuing Protocol , 2006, IEEE Internet Computing.

[16]  Jari Arkko,et al.  Enhanced Route Optimization for Mobile IPv6 , 2007, RFC.

[17]  Kang Lee,et al.  Object-oriented Model for IEEE 1588 Standard , 2007, 2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.

[18]  Kang Lee,et al.  IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.

[19]  Roy T. Fielding,et al.  Uniform Resource Identifiers (URI): Generic Syntax , 1998, RFC.