International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
Performance evaluation of Keystone in cloud (OpenStack) for applications in Disaster Management & Recovery Abdur Rasheed*, Dr. Umar Shoaib , Dr. Shahzad Sarfraz
[email protected] ,
[email protected] ,
[email protected] Department of Computer Science, Faculty of Computing & Information Technology, University of Gujrat, Hafiz Hayat. Gujrat, Punjab Pakistan
Abstract--The purpose of the present work is to identify the challenges in the world due to disaster management. Disaster is different in nature and it affects all fields of life; especially in IT-field. Disaster is different is nature. Due to disaster all the infrastructure of work is damaged and we face a lot of loss. This research paper deals with the IT-field issues which are faced during disaster. We propose a platform which helps us to handles all the IT-related issues during disaster management that is “Cloud Computing”. Cloud computing is an Anti-fragile system and resilient. The basic issue in disaster management is security of all kind of data. We propose that we shall transfer all the data on cloud computing. Cloud computing deals different kind of services like storage services, identity services etc. In this article, we explain how the cloud computing provides security of data during disaster and how we can identify the rights of the users. For this purpose, we used a service of cloud computing that is Keystone. Keystone is the identity service which is governs all the security issues happen in the disaster and how it manages the all cloud data. It identifies the all rights of all kinds of users of cloud computing. In this article, we see all the results in real time devices we apply different constraints and find out how we can protect the data with the help of cloud computing. Keywords: Anti-fragile, disaster management, Keystone
1. Introduction Along with the creation of human, the disaster is the part of human being life .Natural disaster in different in nature. They all affect the human being life and destroy all the infrastructure of life. By the passing of time, human makes progress in every field of life and become civilized. But the natural disaster affects the human being in every field of life. Disaster disturbs the human life in every field like medical, defense, etc. But the most important field that is disturbed by disaster is “IT-Field” which is connected all the fields. When the disaster is come, it destroyed our IT infrastructure and our all data. If we see the previous history of computer science, we used various technologies during the passage of time. For example we used client-server architecture, N-computing and
202
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
like this other technologies. But these entire infrastructures are destroyed when any natural disaster is come. After the passage of time, human make interest and used high performance for the better way to handle disaster management. In previous research, Wireless Mesh Network (WMN) is used for the disaster management. It is also called Swan Mesh [1] which is used for emergency and recovery of disaster management. Swan Mesh is good approach but it is not a good for to take emergency action for the recovery of disaster management. In this research paper, we proposed an infrastructure which is anti-fragile and resilient for the recovery of disaster management; that is “Cloud Computing”. There are many issues in previous research like they are not anti-frijole, anti-resinous and they could not have emergency back to handle the different issues in disaster management. Cloud computing is an advanced technology of networks which serves different issues like storage service, image service and identity service etc. It stored data in large data centers .The basic issue in disaster management security of data in different situations. In this paper, we defines the important service of the cloud computing and which governs all identity services like assigns the roles, access create users to uses the data like tenant users etc. That service is recognized as “Keystone Service” which is used in open stack platform. Identity service (Keystone) is used to govern all the cloud computing interfaces and secure users. Cloud computing is an anti-fragile network because if the disaster is occurred then all the IT-infrastructure is destroyed then at the same while the cloud computing technology create another machine for the disaster management. . In order evaluate the performance of the proposed scheme for identity service (Keystone); we have implemented a Cloud infrastructure using RedHat (CentOS) OpenStack cloud that will hold the servers in virtual forms integrated with messaging brokers ActiveMQ. Different Identity service are implemented and gathered different results for different scenarios For example if the IT-infrastructure is damaged during disaster or any other way then keystone send a message to the ActiveMQ(Messaging Broker) to active the nearby machine to activate the backup on emergency. ActiveMQ is send a request to the nearby cloud to create and assigns the users roles to make the same data cloud. The advantage is that there is no loss of time or data and keystone governs all king of governs like previous machine. Keystone is identified all the services in the cloud computing .Keystone plays a very important role for the recovery of disaster management.
2. Literature Review The term of cloud is initiate when the world of telecommunications is begun to use virtual private network [2].If we see the history of the cloud computing , John McCarthy said that one day computation is become the public utility in back 1960s.After the six
203
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
year later in 1966 , Douglas Parkhill explored the characteristics of the cloud computing in his book” Challenge of the Computer Utility” first time ever [3]. Cloud computing is a very important technology which deals with the storage services, computational services and it does not use any end-user location or configuration of the physical machines. Cloud computing is the a technology which moves computations away from the desktop in large data centers which is interconnected to each other to provide different kind of services [4].Cloud computing is model which is convenient and enables the end users to access on demand services like storage services and network services, enables to get the shared pool of management resources in a minimum effort and get to work [5]. The goal of the cloud computing are: a) Use of distributed resources b) Combine all the resources for higher throughput c) To handle large scale computations Virtualization, scalability, interoperability, QoS and other cloud models names private, public and hybrid; according all these aspects cloud computing is the major resource to handle these.
2.1
Characteristics of Cloud computing
There are many characteristics which are very prominent some of them are giver below; i)
ii) iii) iv) v) vi)
2.2.
Users can access data or any king of service which user wants to use with the help of a browers.IT involves a third party infrastructure to access these services that is called “Internet”. Cloud computing required less IT-skill to use it. It is reliable which is suitable for business community and disaster recovery.[6] Maintenance of the cloud is easy. Allows pay per use facility Security is very good as compare to the traditional networks [7,8]
Cloud computing architecture
Cloud computing is dived into two parts [9] a) Front End b) Back End Both are connected to each other with a network is known as internet. Front end deals with users and the second end deals with the cloud system.
204
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
Architecture of the cloud computing Cloud computing architecture organized in following layers: Client Application Platform Infrastructure Server A) Client A cloud client comprise of computer hardware and software which done on cloud computing for application with respect to cloud services [10]. B) Application Cloud application is responsible of “Software as a Service (SaaS)” over internet. It eliminates the installation of any application on the user system. C) Platform Platform services are responsible to provide the computing platform from cloud computing infrastructure. It is also known as Platform as a Service (PaaS). D) Infrastructure Cloud computing environment is also provides the whole infrastructure as a service (IaaS).for examples GoGrid , Mosso/Rackspace and jayent etc.
Figure 1 Infrastructure of Cloud Computing
2.3
Deployment of Cloud computing
The major task is to deploy the cloud computing service .The type of the cloud which is implemented depending on the needs of the cloud usage. There are following types of cloud deployment;
205
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
Private Cloud
Public Cloud
Cloud Computing Deployment Types
Hybrid Cloud
Community Cloud
Figure 2 Types of Cloud Computing
2.4
Advantages of Cloud computing
There are some important advantages of cloud computing which is mentioned below: i)
ii)
iii)
iv)
v)
Easy to manage The basic advantage is that the management of the cloud computing is very easy. An IT professional is required less knowledge to operate the cloud computing service.[13] Cost effective Another advantage of cloud computing is that it is cost effective. It requires low cost machines to operate. Most of the work is done on the cloud computing servers and required less hardware like storage etc. Continuous service Cloud provides the uninterrupted services to his user which is a big advantage of the cloud computing. Green Computing The old architecture requires the a lot of light consumption which emitted a lot of heat that are harmful for human. This problem is solved by cloud computing that it emits less heat because it required less light .In other words cloud computing preserving the environment. [12] Disaster management Disaster is a very big headache for the human being special regarding IT field. But cloud computing solved this problem very efficiently. It provides offset backups which is helpful. Cloud computing is the anti-fragile and resilient system which is the very important property for disaster management.
206
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
There are many other properties of the cloud computing and it provides many king of services like storage services , data management services and the very important service is security of your machines which is created in clouds computing. This property is very crucial now-a-days. This property is used for the management of the disaster. We have a look in cloud computing OpenStack services in disaster management.
3. Problem Statement Cloud computing has a lot of advantages which we discuss above. A lot of work is being done at large scale in very field of life like software based Networking , virtualization etc. The important problem is now-a-days is to security of the system in disaster on different .We are proposing a system which is provides the security to all the system. We proposed a system which assigns some roles and governs the all type of users which is connect to the cloud computing It is helpful to access the offset backups when any type of disaster is come with help of message broker .Message broker is sends an enquiry to set up an environment for disaster management with different clouds.. It has been observed that many attempts have been done so far to secure the cloud computing from unauthorized users or disaster management. Normally, congestion occurs at mobile users who try to access the important information.
3.1
Test Bed Description
We proposed keystone openstack service that will best suit in case of disasters and would provide all the necessary information in case of unauthorized users as well. It provides the security to all the data information of the users‟ data and if disaster occurs then it informs the nearby cloud computing server to send the request for offset backs with the help of message broker. Tests have been conducted using Rally in disaster management situation. Table-1: Hardware Used in Test Bed Item Server CPU RAM HDD NIC
Description Dell 710 2.6 Ghz Dual, Quad Core 16GB 2x1TB Gbic Dual
Table-2: Software Used in Test Bed Item Operating System
Description Linux Debian, CentOS and Ubuntu
207
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
Cloud Application OpenStack Juno Identity Service Keystone Messaging Server ActiveMQ Performance evaluation Rally Software Table 1 elaborates the hardware components, specifications and vendor information while Table 2 describes the software details. 4x Dell 710 Servers were installed with Linux CentOS 7 to become the part of a Cloud. . Table-2 illustrates the applications and software installed and used for rate adaptive streaming. We tested at different scenarios for the security of data for different types of users like tenant user with the help of Rally. OpenStack juno version was installed to work as cloud. Controller Node: Controller node have all configuration and controls the other physical machines in the cloud like network node and compute node. We also installed identity service (Keystone) for the whole cloud security and governing. Network Node: Network node is used to maintain the virtual networking in Cloud and legacy network for the connection of external network with internal network. Compute Node: Compute node becomes the part of controller node to create virtual machines in it. 2 x physical machines were given the role of compute node. Testing Node: Testing node contains the different scenarios for testing and gives us results of these scenarios.
Diagram “A” shows the cloud computing Infrastructure
In the diagram “A” we defined the overall physical structure of the cloud computing to elaborate in the disaster management.
208
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
Diagram “B” shows the all cloud computing virtual infrastructure In the diagram “B” we explain the virtual infrastructure of the cloud computing and explain how the identity service controls all the communication in the disaster management.
209
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
3.2
Problem Flow Chat
Flow chart of the problem in Disaster management
4. Performance Results To begin the original results we create a test node which is mentioned above. There are many kind of tests which we test on our cloud .We choose two of them to test the cloud
210
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
keystone performance in disaster management. Here, we use benchmarking software that is called Rally that tests our cloud. There are two tests; Create ,add and remove the cloud computing user
4.1
Test
In this scenario, we assign some roles to different kind of keystone users and test that what is effect on our whole cloud. It takes some time and we notes these time duration and gathered some results in following forms: Load duration: 49.075 s Full duration: 73.449 s Iterations: 100 Failures: 0
Figure 3 Create, add and remove keystone Users Figure 3 show that when we add, creates and remove then it generates different kind of results according to the given vale of the roles.
Figure 4 Charts of the each atomic action
211
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
Figure 4 shows the keystone atomicity when we create the keystone user„s role, add keystone user‟s role and when we remove the keystone user„s role.
Figure 5 shows the percentage to create .add and remove role Figure 5 shows the percentage to create the keystone user role, add role and remove the keystone user‟s role in our cloud.
Figure 6 Time duration to create the role Figure 6 shows the time duration which affects the cloud computing to create a role of the keystone user.
212
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
Figure 7 Time duration to add the role Figure 7 shows the time duration which affects the cloud computing to add a role of the keystone user.
Figure 8 Time duration to remove the role
Figure 8 shows the time duration which affects the cloud computing to remove a role of the keystone user.
5. Conclusion In this paper we tested and optimized different types of user‟s roles. Keystone open stack provides the security to the whole data in disaster management. If service from one server gets down, resilient and anti-fragile nature of the cloud computing will make
213
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
sure the delivery of content with the help of messaging brokers. Different anti fragile and resilient techniques were used which proves the better performance with the help of message brokers.
References: [1] Muddesar Iqbal, Xinheng Wang, David Wertheim, Xu Zhou SwanMesh: SwanMesh: A Multicast Enabled Dual-Radio Wireless Mesh Network for Emergency and Disaster Recovery Services. Journal of Communications, Vol 4, No 5 (2009), 298-306, Jun 2009 [2] John Harauz, Lorti M. Kaufinan. Bruce Potter, "Data Security in theWorld of Cloud Computing", IEEE Security & Privacy, Copublished by the IEEE Computer and Reliability Societies, July/August 2009. [3] http://en.wikipedia.orglwikilCloud_computing [4] Marios D. Dikaiakos, George Pall is, Dimitrios Katsaros, Pankaj Mehra, Athena Vakali, "Cloud computing : Distributed Internet Computing for IT and Scientific Research", IEEE Internet Computing, Published by the IEEE Computer Society, September/October 2009. [5] National Institute of Standards and Technology - Computer Security Resource Center - www.csrc.nist.gov [6] http://www.computerweekly.com/ArticlesI2009/02124/234988/googlemailcollapses.htm] [7] "Are security issues delaying adoption of cloud computing ?"Networkworld.com. http://www.networkworld.com/news/2010/022210-virtualization-c1oud-securitydebate.html [8] "Security of virtualization, cloud computing divides IT and security pros ... http://www.networkworld.com/newsI201 0/02221 O-virtualizationc1oud-securitydebate.html [9]Cloud Computing Architecture http://communication.howstuffworks.com/cloudcomputingl.html [10] Peeyush Mathur, Nikhil Nishchal, "Cloud Computing: New challenge to the entire computer industry", 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010). [11]Bhaskar Prasad Rimal, Eunmi Choi, "A taxonomy and survey of cloud computing systems", 2009 Fifth International Joint Conference on INC,IMS and IDC, published by IEEE Computer Society.
214
https://sites.google.com/site/ijcsis/ ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016
[12] Y Yang and M Ma (eds), Green Communications and Networks, 2012 [13] Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, Cloud Computing and Emerging IT Platforms, 2008
215
https://sites.google.com/site/ijcsis/ ISSN 1947-5500