Cloud Enterprise Architecture
Cloud Enterprise Architecture
Enterprise
Architecture
Pethuru Raj
Cloud
Enterprise
Architecture
Cloud
Enterprise
Architecture
Pethuru Raj
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2013 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information stor-
age or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a pho-
tocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
This book is dedicated to
vii
viii • Contents
Smart Enterprises...................................................................... 30
The Enabling Mechanisms of Smart Enterprises...................32
Service Computing................................................................33
Advanced Analytics..............................................................33
Event-Driven Architecture.................................................. 34
Big Data Computing............................................................ 34
In-Memory Computing........................................................35
Cloud Computing..................................................................36
Smarter Homes.................................................................36
Smarter Cars......................................................................38
Smarter Environments.....................................................38
Conclusion...................................................................................39
References....................................................................................39
Heterogeneous Clouds...................................................279
Restricted Access................................................................ 280
Dynamic Resources.............................................................281
Performance.........................................................................281
Cloud Integration: Methodologies and Life Cycle...............281
Cloud Integration Methodologies.................................... 282
Characteristics of Cloud Integration Solutions.............. 284
Data Integration Engineering Life Cycle......................... 285
Cloud Integration Products and Platforms......................... 286
Jitterbit.................................................................................. 287
Boomi Software................................................................... 288
Bungee Connect.................................................................. 289
OpSource Connect............................................................. 289
SnapLogic............................................................................. 290
Windows Azure AppFabric............................................... 290
Bluewolf.................................................................................291
Oracle SOA Suite 11g.......................................................... 292
Magic Software’s iBOLT.................................................... 292
WebSpan...............................................................................293
Adeptia Salesforce Integration Accelerator......................293
Online MQ...........................................................................293
CloudMQ............................................................................. 294
Linxter.................................................................................. 294
Microsoft ISB........................................................................295
Cloud Integration Appliances................................................295
Cast Iron Systems, Inc. ......................................................295
Cloud Interoperation Methods.............................................. 297
Unified Cloud Interface/Cloud Broker............................ 297
Enterprise Cloud Orchestration Platform....................... 298
Peer-to-Peer Approach for Cloud Integration................ 299
Benefits of Hybrid and p2p Cloud-Based ESB
Architecture......................................................................... 300
Cloud Integration Services......................................................301
Informatica On-Demand....................................................301
Businesses-to-Business Integration Services.................. 302
Cloud-Based Enterprise Mashup Integration
Services for B2B Scenarios................................................ 304
Enterprise Mashup Platforms and Tools......................... 306
Message Queue............................................................... 308
xvi • Contents
xxiii
xxiv • Foreword
Zaigham Mahmood
University of Derby, UK
xxv
xxvi • Preface
is, the massive and mesmerizing adoption and adaptation of SOA and
cloud computing greatly and gently could simplify and streamline the
full-fledged and fail-safe implementation of the ideas and ideals of EA. In
order words, SOA and cloud are the leading EA-enablement technologies.
They are assisting and affecting the EA field immeasurably and incred-
ibly. This book is all about articulating the distinctive, transformative, and
augmentative capabilities of cloud computing on EA.
We write about the venerable mission of precisely and concisely present-
ing the impacts and implications of the evolving enigmatic cloud concepts
on the EA. We have detailed the development of flexible and futuristic EA,
how cloud meets, mingles with and molds EA, and how the convergence
of cloud with EA is to bring bigger turnarounds and makeovers on small,
medium, and large-scale enterprises. There are architectural frameworks
such as TOGAF for facilitating the design of next-generation EA.
In this book, we have visualized all the noteworthy shifts due to the
blending of cloud concepts with the traditional EA and written about the
cloud-instigated enterprise integration, security, and management archi-
tectures. The first chapter is all about the salient and spectacular contri-
butions of a number of powerful and potential technologies including
the service and the cloud paradigms, for establishing smart enterprises.
Leading IT players are extensively advertising and articulating smart
enterprise technologies these days. Business intelligence, service orienta-
tion, mobility, machine-to-machine (M2M) integration, cloud, big data,
and in-memory computing models are being prescribed as the fulfilling
and failsafe mechanisms and methods for the forthcoming era of smart
businesses.
The second and third chapters describe the transitions that the busi-
ness and IT domains are going through with the stability and maturity of
cloud concepts. The various limitations of IT and the glut of underutilized
and unutilized IT infrastructures have laid the foundation for the break-
through cloud idea, and this praiseworthy advancement in the IT field has
resulted in a series of delectable and decisive ramifications on the business
side. Several business models have been unearthed and published since
then, and global enterprises (small, medium, and large) have instantly
jumped on the cloud bandwagon in order to reap all the indicated and
instinctive advantages of the cloud movement.
The fourth chapter describes what EA is, how EA enables enterprises to
be adaptive to meet business changes and challenges, how EA guides the
goal of attaining and retaining a tight alignment between business and IT,
xxviii • Preface
and so on. This chapter explains several promising and potential archi-
tectural frameworks, platforms, and tools for facilitating the design of EA
in a systematic and simplified manner. With the seamless amalgamation
of cloud concepts into an enterprise, the traditional EA is bound to be
expansively modified to absorb and accommodate the cloud idea. We have
named the resultant concept cloud enterprise architecture (CEA).
The fifth chapter is on cloud application architecture (CAA). Cloud
business architecture (CBA) has to be taken toward its logical and physical
conclusion using a suite of application, data, and technology architectures.
In this chapter, we have talked about some of the prominent and domi-
nant application-level architectures such as service-oriented architec-
ture (SOA), event-driven architecture (EDA), model-driven architecture
(MDA), service component architecture (SCA), mesh architecture, web-
oriented architecture (WOA), and so on. There are processes, practices,
patterns, products, and platforms for constructing service-oriented cloud
applications (SOCAs) or cloud-based service applications (CBSAs).
In the sixth chapter, we describe cloud data architecture (CDA).
Exquisite and elegant data models and schemas are very important for
next-generation cloud enterprises. As clouds are being revitalized for
accomplishing bigger and better things and requirements, such as for par-
allel and distributed data-crunching tasks to perform behavioral analytics,
quick and cost-effective investigation of process and data-intensive appli-
cations, real-time business intelligence needs, and so on, the relevance of
CDA is climbing sharply. Increasingly, nonrelational databases are built
and posited in clouds to perform a plethora of emerging necessities. Clouds
are being positioned for big data computing, which is being recognized as
the futuristic computing model. New types of databases are emerging for
cloud environments and cloud storage is a new shining domain. All of
these clearly illustrate the power and value addition of CDA.
In the seventh chapter, we talk about cloud technology architecture
(CTA). IT infrastructures are in transition phase. In fact, underutilized
and unutilized computing machines are collected from different loca-
tions, consolidated and centralized in one place to provide optimal and
managed resource provisioning, monitoring, and management services.
IT infrastructures are steadily virtualized to be decomposed and com-
posed as the situation warrants. Partitioning, provisioning, and deprovi-
sioning are fully automated to enable resource sharing. With the addition
of a series of novel mechanisms, resource availability is guaranteed in any
circumstance. Elasticity is being ensured through the runtime creation
Preface • xxix
of new cloud resources and once the job is over, all the resources can be
put back. That is, runtime expansion and contraction is being realistically
and readily provided to users. Self-service is one of the key differentia-
tors of cloud infrastructures. A number of automated software solutions
are introduced into any cloud environment in order to fulfill a number
of manual operations that are becoming completely automated. Capacity
planning is a vital research topic to achieve dynamic capacity planning.
Load balancing, job scheduling, and so on are programmatically auto-
mated by competent software solutions. Cloud governance is another pro-
spectus for cloud researchers.
In the eighth chapter, we discuss cloud integration architecture (CIA). As
there are convincing reports from reputed and renowned market watch-
ers and analysts on the huge market for cloud brokerages (CBs) with the
increased migration, deployment, and delivery of services and applications
by third-party clouds, the factors such as cloud connectivity, interoper-
ability, integration, composition, and collaboration have gained immense
traction. There is a range of broker software in order to establish linkage
between different, distributed, and decentralized clouds (private, public,
and hybrid). Cloud service aggregation, intermediation, arbitration, dis-
semination, mashups, and so on are some of the new-generation processes
that ultimately lead to sophisticated and smart composite services, which
in turn enable building and supplying cloud-based, people-centric ser-
vices. Next-generation supply chain involves a kind of need-based inte-
gration of diverse and geographically distributed cloud services.
In the ninth chapter, we concentrate on the significance of cloud man-
agement architecture (CMA). With the unprecedented adoption of cloud
computing, effective management, and governance of cloud resources
(servers, virtual machines [VMs], applications, networks, services, and
data) are paramount in order to readily get what was preached and pro-
nounced earlier. Creation of new VMs and their optimized usage go a long
way in realizing the stated business benefits out of the cloud idea. Every
interaction happening in a cloud environment has to be closely monitored
and acted upon. There are management platforms for cloud infrastruc-
tures emerging and evolving at a fast pace. Infrastructure software solu-
tions providers, IT powerhouses, and behemoths are working overtime for
producing standards-based cloud management software. Corporates and
service organizations are buying, installing, and invoking an appropriate
cloud management solution in their green and lean cloud centers to sup-
port and sustain business operations.
xxx • Preface
The tenth chapter is exclusively allocated to supply all the security infor-
mation so that a well-intended security strategy is in place in order to ward
off any kind of internal or external security threats, vulnerabilities, and
risks. As widely reported, the security aspect is the main stumbling block
for the glorified cloud movement. Providers and researchers are work-
ing in unison in order to arrive at and articulate wider kinds of security
solutions (software as well as hardware). The cloud security architecture
(CSA) leads to effective security strategy that in turn boosts the sliding
and shrinking confidence of people.
The eleventh chapter explains the need for governance mechanisms for
cloud environments wherein a variety of IT resources roam. We have sup-
plied details regarding how policy comes handy in automatically enforc-
ing only authorized interactions among cloud components.
The final chapter is about key onboarding services. This chapter explains
all the mandatory requirements before adopting the cloud idea. The
migration methodology is described in detail for the benefit of the reader.
There is a set of best practices for arriving at a modernization and migra-
tion plan for any enterprise pondering the ways and means of switching
over to the cloud infrastructures. There are innumerable legacy as well
as modernized IT applications, platforms, and infrastructures. The main
motto of this chapter lies in the pragmatic empowerment of them to be
cloud-ready so that the target and task of cloud onboarding is smoothly
nurtured and nourished.
xxxi
xxxii • Acknowledgments
xxxiii
CEA Book Audience
and Key Takeaways
Enterprise architecture (EA) has been an important ingredient for any
growing enterprise to support and sustain its ordained journey toward
the envisioned target. EA’s capabilities and contributions are paramount
and pioneering for smoothening and streamlining the rough and tough
route. EA brings out a holistic and shared view of the current business
and IT landscapes. EA insightfully facilitates in unearthing the right
and relevant nuances and niceties for effectively planning, control-
ling, strengthening, and innovating the business transition process and
path toward its future and envisaged state. The other prominent advan-
tage is to establish a tighter alignment and association between IT and
business. That is, all kinds of business changes and challenges can be
instantly and intelligently taken care of if the underlying IT resources,
products, and processes are appropriately business aware and aligned.
Precisely speaking, EA directly contributes to business agility, auton-
omy, and affordability. EA’s success delightfully determines the success
of a business.
Further, EA extracts and exposes business-critical and actionable infor-
mation to business executives and visionaries to cognitively contemplate
and justify tactical and strategic decisions. The decisions, being sound and
sharp, enable and empower chief executives to plunge into the initiation
and implementation mode straight away. The informed and timely analy-
sis and actions will ultimately prove to be disruptive, inventive, and trans-
formative for the whole enterprise to trek along to reach greater heights
in less time. Further, EA participates in realizing an implementable road
map for intelligently exploiting IT architectural building blocks, plat-
forms, and infrastructures to achieve business augmentation and trans-
formation with ease. There are several core and peripheral technologies
emerging in order to realize the goals, methods, and processes of EA.
Some have vanished with the speed they arrived and some are persisting
with sheer power. Service orientation (SO) and cloud computing are the
top two technologies showing immense potential and promise in tack-
ling a variety of prickling and perpetual IT challenges. Also, these are
xxxv
xxxvi • CEA Book Audience and Key Takeaways
INTRODUCTION
Enterprises are steadily and strategically undergoing a number of note-
worthy transformations due to constant and consistent shifts occurring in
many of the business-related aspects. Enterprises are increasingly infor-
mation technology (IT)-driven and solely and squarely depend on the IT
improvisations and innovations to surge ahead in meeting the varying
and vast needs of their customers, clients, and consumers. The associa-
tion and alignment between business and IT is tending to be tighter. That
means any shift in the IT domain and discipline has immediate and intrin-
sic impacts and bearings on business operations, outlooks, and offerings.
Newer and nimbler technologies are emerging and evolving; business pro-
cesses are being integrated and innovated; new products, platforms, pat-
terns, practices, and procedures are being unearthed; and so on.
In the past, businesses were forced to leverage and manage with what-
ever technologies were available at that point in time, but today the wide-
spread scenario is quite contrary. That is, we come across a deluge of
business-centric technologies these days. In other words, the gap between
IT and business is being eliminated, and therefore IT is more tuned and
turned toward business. Recent technologies are more business enabling
and empowering. Any change or challenge within a business situation gets
immediately noticed and attended to with the smart usage and leverage of
these business-aware technologies.
Apart from these constructive and contributive technologies, flexible and
futuristic architectures, epoch-making business models, facilitating frame-
works, and proven methodologies are being frequently unfolded to prop up
the envisaged business mission and subsequent strategy making, as well
as their best-in-class realization. Business augmentation, acceleration, and
1
2 • Cloud Enterprise Architecture
automation are being closely linked up with the simplicity, success, and
sensitivity of information and communication technologies. Process engi-
neering has become another active area of focus for IT professionals. Service
orientation (SO) has become the most common architectural principle, para-
digm, and pattern for designing and delivering enterprise-scale applications.
Composition is the most pragmatic and purposeful idea propelling the
whole IT world today. Composites are emerging as the amenable, affable, and
affordable building blocks for next-generation IT systems. Composite pro-
cesses, interfaces, services, and applications are the ultimate result of the
composition process. Composition containers, techniques, tools, languages,
and standards are flourishing. IT infrastructures are going through a series
of far-reaching transitions. We read and use the well-consolidated, central-
ized and converged, virtualized, automated, and sharable infrastructures
very frequently. Standards-compliant and open platforms for application
design, development, debugging, deployment, and delivery are hitting the
market. Management and governance modules are increasingly produced
and marketed in order to moderate the rising application complexity.
Multitenancy is a highly talked-about feature being inherently incorpo-
rated in IT servers, applications, platforms, databases, and services. Due to
the extreme heterogeneity and multiplicity, the value and demand for multi-
faceted middleware backbones, containers, engines, hubs, buses, and fabrics
is on the climb. That is, the reflective middleware is being made available
for simplifying and streamlining the rough and tough integration, inter-
mediation, aggregation, and arbitration requirements among application
components in highly heterogeneous and complex IT environments. Other
contributive components include software frameworks, design patterns
and metrics, best practices based on experiences, and key guidelines out of
expertise gained. These components individually as well as collectively are
aiming to speed up and strengthen enterprise IT so that it can be furiously
fast, supple, and sound in meeting next-generation business requirements.
There are a number of spectacular shifts in the hot and happening IT space.
Transformative, augmentative, and disruptive technologies are emerging
and evolving steadily. In this section, we will discuss some of the pioneer-
ing and prominent technologies sweeping the IT discipline.
Miniaturization technologies are well received across the IT industry.
Every hardware component is shrinking, whereas its power, usage, and
value are on the climb. From the age-old mainframe era to today’s personal
and professional tablets, palmtops, and laptops, the aspect of miniaturiza-
tion has been gaining a lot of traction and attraction. We read about invis-
ible, disappearing, infinitesimal, and calm modules, tags, labels, stickers,
chips, and pads collectively forming highly pervasive and persuasive com-
puters, communicators, sensors, and actuators. Slim and sleek handy and
trendy handhelds, wearables, implantables, portables, nomadic and wire-
less devices, industry machines, medical instruments, consumer electron-
ics, web and information appliances, kitchen utensils, displays, gadgets,
and gizmos are very dominant and prominent in our daily work and walk
environments. Nanotechnology, system-on-a-chip (SoC), microelectro-
mechanical systems (MEMS), and so on, are some of the eye-capturing
and elegant miniaturization technologies.
Integration technologies are clearly occupying a top position. All kinds
of siloed, legacy, closed, inflexible, and monolithic systems are accordingly
4 • Cloud Enterprise Architecture
becoming scarce and expensive. The colossal IT centers are also dissipat-
ing a lot of heat into our living environment. Thus, it is absolutely clear
that IT is one of the major culprits for environmental degradation. On the
other hand, professionals and professors are overwhelmingly in unison on
the overall view that IT-based technological advancements come in handy
in effective energy preservation. That is, the emergence of IT-based energy
harvesting and conservation technologies and methodologies is widely
being given a warm welcome. For example, smart monitoring and meter-
ing of the electric grid and its subsystems (named as smart grid) is emerg-
ing as the frontrunner for energy efficiency in the energy-starved world.
Thus, green computing is all about a bevy of computing techniques, tips,
and tools for ensuring and enabling greener environments.
Biology-inspired computing models are fast emerging as a way out for solv
ing computationally and intellectually challenging business, social, and sci-
entific problems in our everyday lives. High-data and process-intensive
applications are being tackled through a series of interdisciplinary efforts. DNA
computing, quantum computing, optical computing, and so on are some of
the maturing models creating waves and buzzes in the struggling IT industry.
Service computing is definitely a paradigm shift in the IT industry. Hordes
of modernization, transformation, and optimization tasks are being read-
ily achieved with the perfect and pragmatic usage of amazing service con-
cepts. Every entity and element in IT is being expressed and exposed as a
service. This clearly signals the vision of “IT as a Service” being established
and sustained. In subsequent chapters, there will be detailed descriptions
on this highly successful, sizzling, and succulent paradigm. This service
enablement will ultimately land in the era of shared and virtual computing.
Smart computing is the latest in the annals of the expanding and enchant-
ing computing world. Data-to-information transition is being sped up with a
spate of path-breaking schemes and mechanisms. Subsequently, knowledge
extraction and engineering disciplines are going through a slew of positive and
progressive shifts with the rise of robust and resilient technologies in the fields
of artificial intelligence, ambient intelligence (AmI), and swarm intelligence.
There has been continuous empowerment of IT infrastructures, processes,
and applications to be anticipative, adaptive, and articulate in their opera-
tions, offerings, and outlooks. The self-awareness and surroundings aware-
ness go a long way in deriving and deploying next-generation IT solutions.
The perfect and precise understanding of the changing needs of users enables
advanced and adroit IT systems to be proactive, preemptive, and prompt to
conceive and deliver multifaceted applications and services to users.
8 • Cloud Enterprise Architecture
the realization of not only our information and transaction services but
also our physical needs. The trickling trend is to enable seamless linkage
between the physical and the cyber worlds. Sensors and actuators are the
eyes and ears of next-generation IT.
Our daily articles, utensils, tools, and products can be transformed into
smart objects and artifacts by attaching them with infinitesimal, invisible
yet intelligent computers, communicators, codes, chips, controllers, sensors,
tags, stickers, displays, and so on. That is, ordinary items become extraor-
dinary. For example, our coffee cups, dinner plates, medicinal tablets,
clothes, and other common, casual, and cheap things will be empowered to
act smart in their interpretations and interactions with other entities in the
vicinity, with remote IT systems, and with their owners. The overall pro-
cess is highlighted here. First, all the tangible, worthy, and everyday things
in our personal, professional, and social environments need to be quietly
and quickly transitioned into sentient and digital artifacts. Secondly, they
should be able to find and bind with one another seamlessly and spontane-
ously. In other words, the first is instrumentation and the second is service
enablement. That is, every single entity becomes a service consuming, bro-
kering, and/or providing element. The service enablement empowers them
to talk through messaging. From there, the digitalized or smart objects and
devices could compose and collaborate to be contributive and constructive
for crafting sophisticated and situation-aware IT solutions. Service integra-
tion (direct or indirect) leads to adaptive and aware services. Outwardly,
the service-exposing devices are strengthened to form resourceful and
multipurpose device ensembles that are cognitive and context aware; ulti-
mately, smart environments get formed and sustained.
This kind of fascinating, fabulous integration among all kinds of every-
day things, such as implantable, mobile, wearable, handheld, portable, fixed
and nomadic devices, kitchen vessels, medicine cabinets, manufacturing
machines, vehicles on the move, robots, and consumer electronics at the
ground level with local as well as distant IT applications (Web 1.0 [simple
web], Web 2.0 [social web], Web 3.0 [semantic web], Web 4.0 [smart web],
enterprise, and cloud-based software as a service [SaaS], etc.) will result in
the Internet of THings (IoTs). Hence, there is no doubt that future generations
will experience and realize complete and compact technology-sponsored
and splurged living. The impacts and implications of information and com-
munication technology (ICT) in our lives become bigger, deeper, brighter,
yet calmer as days go by. The technology-inspired precision and perfection
will be common, yet decisive and decision enabling. The disciplines such as
10 • Cloud Enterprise Architecture
Dynamic Enterprises
Fujitsu’s Triole (http://www.fujitsu.com/global/services/solutions/triole/
index.html) is one such initiative for building and maintaining dynamic
IT capability. Triole is a compelling architecture and product strategy to
support and streamline complicated IT operations and management. It is
a learned and refined process to create industrialized IT infrastructure.
It is all about the optimal management of IT infrastructures and services
through the two core technologies: virtualization and automation.
Adaptive Enterprises
The white paper authored by Kerry Main, senior solutions architect, HP
Canada, quotes the famous statement of Charles Darwin that “it is not the
strongest of the species that survives nor the most intelligent, but the most
responsive to change.”
In an adaptive enterprise, business and IT are synchronized well to
capitalize on all kinds of changes (business and technology). IT breaks
away from the inflexible, closed, and silo-like systems of the past to cre-
ate open and forward-looking systems that deliver more value and vigor
to the business. The major gains being achieved by an adaptive enterprise
include adding partners to supply chain system in hours rather than
weeks or months, doubling the pace of product introduction without sac-
rificing the quality attributes, shifting IT investment from infrastructure
maintenance to core competencies, and so on. The inherent capabilities of
an adaptive enterprise include heightened business availability and con-
tinuity, enhanced IT consolidation and simplified services management,
dynamic collaboration to maximize productivity through sharing and
optimal utilization of IT resources, and so on.
According to SAP reports, this vision stands on business model inno-
vations that can be pursued along three dimensions: customer-centric
innovation, supply-chain-centric innovation, and organizational process
innovation. It is argued that there is unmatched growth power based on
business model innovation. It is difficult for competitors to reproduce the
business model innovation. New business models are much harder for
other companies and corporations to imitate since they are dependent on
organization-specific competencies. The key gains include the facilitation of
changes while retaining the successful business models, empowerment of
people toward new realities, establishment of collaboration among all the
constituents and participants, inspiration for cross-functional thinking in
order to spur innovation, focused indulgence on process innovation, explo-
ration and experimentation of newer avenues for fresh revenues, and so on.
Cloud-Enabled Smart Enterprises! • 13
On-Demand Enterprises
Businesses are bracing themselves for the on-demand era by improving effi-
ciency and cutting costs, understanding and serving customers better, reduc-
ing risks, and improving agility in the marketplace through accelerating
process integration and transformation. In the era of e-business on-demand,
the ways in which technology changes business and business changes tech-
nology will continue to evolve. The technology environment needed to
achieve on-demand business has to be integrated, open, virtualized, and
automatic. Service-oriented architecture (SOA) is being touted as the best
course of action as far as achieving on-demand business is concerned.
Liquid Enterprises
BEA Systems Ltd., which was acquired by Oracle, introduced a new com-
puting paradigm, “liquid computing,” which builds upon SOA with the
objective of aligning enterprise interactions with real-time business goals
to help companies become service-driven enterprises, ultimately achieving
enterprise compatibility, active adaptability, and breakthrough productiv-
ity. Today’s enterprises are constrained by multiple application and data
silos resulting in integration problems. Current integration approaches
also lead to explosive costs and rigid infrastructures. As a way of alleviat-
ing these recurring issues, BEA had postulated this vision and had built a
next-generation integration platform that promises to help enterprises to
efficiently build, deploy, integrate, and manage applications and services.
With BEA’s takeover by Oracle, there is very little information available
about the state of liquid computing concepts.
Proactive Enterprises
It is a well-known fact that IT is the real enabler of businesses. IT has become
part and parcel of every enterprising initiative and implementation. The
inventory of IT-supported business services and solutions is seeing rapid
growth. Distribution has become the popular trend these days across the
continents. Distributed services, applications, data, infrastructures, and
workforce are set to grow noticeably in the years to come; hence, the chal-
lenges of provisioning and managing them become grimmer. M2M commu-
nication is going to replace user-to-machine interactions and transactions.
Business processes are going through a number of path-breaking transfor-
mations. Process-based inter- and intraenterprise integration scenarios have
taken solid ground. Communication-enabled business processes (CEBPs)
are seeing a neat and nice reality. Analytics-attached business processes are
another strategic trend. For enhanced agility and productivity, a robust, flex-
ible information and communication infrastructure is the need of the hour.
The challenges for today’s chief information officers (CIOs) are to manage
the total cost of ownership (TCO), reduce operating costs, promote innova-
tion through stable introduction of new services, and grow infrastructure
Cloud-Enabled Smart Enterprises! • 15
Connected Enterprises
Fresh network topologies and technologies are coming out of research labs
and centers of excellence (COEs) frequently these days. Communication
technologies, infrastructures and services besides standards-compliant
and open connectivity solutions are being manufactured to make com-
munication and collaboration pervasive. Communication is becoming
ambient, autonomic, and unified. Enterprise Internet Protocol (IP) tele-
phony and unified communication technologies have become popular.
Multiservice networks combining enterprise voice, video, and data over a
single IP-based infrastructure open up boundless possibilities to stream-
line enterprise communication processes.
IP telephony forms a unified communication network, and manages a
set of available phone numbers, a set of specific services, and the avail-
ability of IP telephony service for users regardless of their current location
(this goes beyond just a main office and may be at a corporate branch, at
someone’s home, or even when someone is on a trip). Corporate or regional
branches are naturally integrated into an IP telephony network as soon as
such a branch gets connected to a corporate IP network. Unified com-
munications are a set of applications at the junction between the world of
computers and the world of phones. The main purpose of unified commu-
nications is to speed up and functionally enrich interaction among com-
pany employees, the company, and its clients. The technological backbone
of unified communications is IP telephony.
In summary, information technologies and infrastructures are the
key for envisioning and enabling new capabilities and competencies
to enterprise IT that in turn help in pondering about, prescribing, and
promoting novel enterprise types to keep customers, consumers, and cli-
ents happy. All the leading technology creators and infrastructure pro-
viders have come out with new adjectives such as real time, connected,
optimal, lean, extended, adaptive, proactive, on-demand, integrated,
and so on through their historic and practical experiences and expertise
for building responsive, resilient, and real-time IT infrastructures and
enterprises.
16 • Cloud Enterprise Architecture
SERVICE-ORIENTED ENTERPRISES
It is clear that the service paradigm has brought in scores of tectonic
and trend-setting shifts in enterprise IT [1,3–5,9]. Predominantly, all the
futuristic enterprises and their IT infrastructures are service driven and
therefore self-driven. The prominent forces to be considered very deeply
and diligently for the next-generation enterprises are
• Service-centric processes
• Service-enabled infrastructures and platforms
• Service-oriented practices and patterns
LCS schema
Financial service
Update Car search Car purchase
Car insurence
Change
management
Life cycle
Establish
relations Composition Dissolve
Monitor Terminate
Planning Establish enterprise
relations Orchestration
Business requirements and
regulations
Concrete
services
FS
CS CP
Modify CI
FIGURE 1.1
A car brokerage enterprise scenario.
Cloud-Enabled Smart Enterprises! • 17
purchasing cars, and applying for loans. During the planning phase, the
following virtual services are identified: car search (CS), car purchase (CP),
financial service (FS), and car insurance (CI). Second, the entrepreneur
develops a specification for EC listing the services it will compose. The
third step is the orchestration of EC, where it selects and invokes the
member services that match the virtual service description. We assume
the CS, CP, FS, and CI services are selected and orchestrated. Finally, EC
may disband and gracefully terminate all partnerships, or wait for another
orchestration request. This is the ideal sequence of events in EC’s lifecycle.
Thus, a service-centric business is flexible enough to accommodate busi-
ness, market, process, and technology changes.
Service-Oriented Architecture
SOA is being portrayed as the resilient and rewarding architectural pat-
tern, principle, and paradigm for enterprise IT. It is the mesmerizing
buzzword in the IT industry and academic circles today. There is a pal-
pable sense of anticipation and articulation about its potential and prom-
ise as SOA is consciously and consistently being unfolded and utilized
by business behemoths as well as IT powerhouses. It is a hugely debated,
discoursed, and deliberated, extensively written about, and widely pre-
sented design technique in worldwide forums. While white papers and
weblogs on SOA are ceaselessly accumulating in the private and the public
web, vendors of SOA infrastructures are merrily announcing the avail-
ability of a number of versatile platforms and products for enabling SOA
design, development, debugging, deployment, and delivery. Researchers
are painstakingly coming out with a growing array of best practices, pat-
terns (design, modernization, integration, and composition), key guide-
lines, prototypes, proof of concepts, evaluation and measurement criteria
and metrics, and so on.
SOA is proclaimed as the infallible and inspiring paradigm for enter-
prise modernization, integration, and composition. As far as legacy sys-
tems are concerned, it is the most practical renovation and rejuvenation
mechanism. It is the first and true business-driven technology and is being
projected as the foremost in comprehensively eliminating the widening
gap between business realities and technological evolutions. It also brings
relevant innovations to the domain of business processes, which are, of
course, the central nervous system for any growing enterprise.
SOA promises a set of unique advantages and fresh ideas such as busi-
ness agility and adaptivity, customer delight, productivity improvisa-
tions, new business and delivery models, real-time sense and respond
(S & R), dynamic and real-time collaboration, complexity mitigation and
Cloud-Enabled Smart Enterprises! • 19
Elucidating SOEs
Newer and nimbler business-centric technologies, business models, and
enabling methodologies are being unearthed to prop up business goals
and their realization [2]. Business augmentation and automation are being
closely linked up with the simplicity, sensitivity, and sustainability of a
stream of information technologies. Process engineering is another active
and well-articulated field in the sense that composite, yet lean and flex-
ible processes could see the light. And with the arrival of path-breaking
and self-evolvable technologies and the maturity of existing technolo-
gies, there is a noteworthy and praiseworthy turnaround. That is, hordes
of converged, virtualized, automated, and energy-efficient cloud infra-
structures are fast emerging. Robust, reflective, and resilient platforms for
development, mashup, execution, delivery, governance, and management
purposes are being produced by leading software vendors. Especially with
the disruptive and interruptive cloud paradigm undergoing overwhelm-
ing adoption, there have arisen a number of distinctive characteristics
gaining widespread interest and imagination. For example, multitenancy
is a highly talked-about attribute of present-day ICT platforms and prod-
ucts. Due to the extreme heterogeneity and multiplicity, the need for
introspective middleware backbones is on the climb. Other contribu-
tive components include standards-based frameworks, design patterns
and metrics, best practices based on experiences, and key guidelines based
on the expertise gleaned and gained. These collaboratively speed up and
streamline enterprise building, dynamism, openness, management, and
sustenance.
With the unprecedented maturity in SO concepts, there is a renewed
interest and inspiration in unfolding novel business, pricing, delivery, and
consumption models. Services have implicitly and intently become the
most sought-after abstraction unit and building block for efficient enter-
prise modernization, engineering, integration, and composition. Service
engineering is growing fast and being supported by a variety of technolo-
gies, techniques, tips, and toolsets. In Chapter 5, we will dig down and
dive deeper in order to extract and explain the key aspects of service ori-
entation, service-oriented IT infrastructures, service-centric processes,
the much-discussed closeness and coherence between services and pro-
cesses, and how these sparkling advancements together extensively con-
tribute toward the vision of engineering and establishing cloud-driven,
process-centric, service-oriented, and smart enterprises.
Cloud-Enabled Smart Enterprises! • 21
CLOUD ENTERPRISES
As the cloud theme has brought in scores of enlightenment and empower-
ment to IT infrastructures, the enterprise IT is steadily moving toward the
cloud IT by incorporating all the cloud concepts. Having understood the
significance of cloud embarkation, enterprises are busy in cloud assess-
ment, enablement, and on-boarding activities. We have extensively writ-
ten about the reverberations of the cloud idea on business as well as the IT
field in Chapters 2 and 3. Those who are new to cloud computing should
read through Chapters 2 through 4.
As a widely discoursed, dissected, and deliberated concept across the
world, cloud computing has brought in innumerable tectonic and trend-
setting shifts for both IT as well as business. Though it is an evolutionary
idea, it becomes extremely popular, penetrative, and pervasive because it
implicitly represents a seamless cluster and the convergence of a dazzling
array of proven, potential, and promising enterprise technologies. The
implications of the much-hyped and -hoped cloud computing are majorly
in two domains: business and IT.
On the business front, the cloud idea has enabled businesses to explore,
experiment, and espouse fresh avenues for more revenues. That is, a cornu-
copia of newer and nimbler application deployment, delivery, usage, pric-
ing, integration, collaboration, and management models have emerged
nowadays, and they are doing exceedingly well with the faster stability
of the cloud concepts and infrastructures. The traditional on-premise
engagement model has been replaced and substituted with a delivery
model that is efficient, centralized, monitored, managed, and maintained;
innovation breeding; on-demand and off-premise; and affordable. That is,
cloud-hosted and cared for applications and services are fast gaining the
unshakeable confidence of corporations, governments, and organizations
across the planet.
On the other hand, for IT, the irresistible cloud paradigm has ushered in
a stream of spectacular and sparkling advancements and accomplishments
especially in the discipline of IT infrastructures. That is, IT infrastructures
have become a dynamic pool of consolidated, centralized, virtualized,
automated, and shared entities. With these momentous transitions, IT
infrastructures are becoming converged, optimized, dynamic, real time,
on-demand, and autonomic. In other words, infrastructures are increas-
ingly and incredibly service enabled, sharable, scalable, and sustainable
22 • Cloud Enterprise Architecture
and thus highly elastic, available, lean, and utilizable for ensuring business
agility, autonomy, affordability, and continuity.
The cloud paradigm has greatly and graciously impacted every worth-
while enterprise these days. Enterprises are fast strategizing to absorb all
the augmentative and transformative traits and tenets of the fast perco-
lating and progressing cloud idea. The closer and tighter alignment and
association between business and IT is becoming substantial and strong
with the elegant embracement of cloud principles. The epoch-making
business models initiated and ingrained with the smart leverage of cloud
mechanisms have already started to bear fruits for companies. And the
seismic shift from stagnant, inefficient, rigid, redundant, and silo-like
infrastructures to business-aware, lean, self-provisioning, flexible, shar-
able, and virtual IT resources is bound to tactically as well as strategically
empower enterprises to be people centric, instant-on, nimble, resilient,
and versatile. In short, clinging to and capitalizing the cloud-induced
transformational features, functionalities, and facilities takes any enter-
prising individual, innovator, and institution to greater heights in their
outlooks and outcomes. Cloud enterprises are those that fully and firmly
ingrain the pioneering principles, practices, procedures, and patterns of
the cloud paradigm in order to be distinctively and decisively ahead of
their competitors.
A raft of new cloud types (generic as well as specific) have originated
and are doing well. We explain the potential and promising clouds in the
following sections.
Autonomic Clouds
This is the probable output of the seamless convergence of autonomic and
cloud computing models. As we all know, autonomic computing repre-
sents a paradigm shift. It is all about deeper empowerment and automation
through embedding and embodying of right and relevant knowledge and
wisdom into IT services, solutions, and systems to be self-monitoring, self-
diagnosing, self-configuring, self-healing, self-defending, self-managing,
self-organizing, self-optimizing, and so on. The instinctive and distinctive
properties of biological systems are smartly being assimilated into IT sys-
tems so they are adaptive in their outlooks, offerings, and outputs. Next-
generation IT products, platforms, and infrastructures are bound to be
autonomous, self-describing, self-serving, and smart. Knowledge engineer-
ing, policy-based interaction, instantaneous transaction and behavioral
analyses, event processing, semantics, real-time actuation, and so on are
the major necessities for producing and shepherding autonomic systems.
With clouds being positioned as the futuristic and flexible IT infrastruc-
ture across the world, there will be revolutionary opportunities and fresh
possibilities if these two computing styles (autonomic and cloud) com-
bine well. A number of use cases are being prescribed and propagated for
such a unique coexistence and coordination. Ad hoc, interoperable, and
dynamic cloud environments can be quickly established for supporting
emergency needs in war-ravaged, disaster-struck, and medical exigencies.
Sensors, robots, and devices integrated with IT applications, and self-
scaling clouds go a long way in accomplishing a bevy of people-centric
and physical services.
Automation is highly prevalent in any cloud environment today. Resource
and service provisioning and deprovisioning, workload and resource
management, job scheduling, and so on are already automated in clouds.
24 • Cloud Enterprise Architecture
Federated Clouds
A federation is simply a union of its member entities. The members,
while sharing their unique capabilities with one another, maintain their
individuality and integrity. In other words, the members get the benefits
accrued out of the union while retaining the unassailable control over
their internal affairs. In the case of technology infrastructure federa-
tion, the key benefits of the union are the lower cost and the lesser risks
associated with a pool of technology assets, which are available across a
diversified set of independent networks. In the world of financial asset
management, asset diversification is a common thing for mitigating and
managing risks. In the case of application assets, a lower risk profile for
any application could be achieved through the federation approach. By
diversifying the production applications and data across multiple net-
works, the owner of the applications and data could significantly reduce
the localized network performance problems that could lead to an unac-
ceptable customer service. This is the very essence of good discovery
practices. Yet with federation in place, disaster recovery can be smoothly
accomplished with a fraction of the cost of a wholly owned disaster recov-
ery mechanism.
Cloud service providers (CSPs) are instituting cloud centers in geo-
graphically distributed places across the continents to capture the ever-
increasing cloud market. Business and IT services and applications are
progressively finding their compact and cost-effective residence in local
Cloud-Enabled Smart Enterprises! • 25
and remote clouds. Reusable and composable cloud services are being
stocked in abundance for rapidly assembling people- and business-aligned
services. That is, composite services are being programmatically crafted
and served from competent cloud environments to worldwide subscrib-
ers. Today, there are many different CSPs available from industry icons
Amazon, Google, Microsoft, and so on. However, these clouds vary hugely
in a number of aspects such as technologies and platforms, and do not
support the required mechanisms and policies for dynamically coordinat-
ing load distribution among different cloud centers in order to determine
optimal location for hosting application services to achieve reasonable
QoS levels.
Further, the cloud providers are unable to predict geographic distribu-
tion of users consuming their services; hence, the load coordination must
happen automatically and distribution of services must change in response
to changes in the load. In short, the lack of compatibility and interoper-
ability among diverse cloud providers prevents providers and consumers
from getting all the originally envisaged benefits of the cloud comput-
ing. There is a greater possibility of vendor lock-in issue creeping into the
cloud domain. Collaboration is very limited in the cloud space today. As
the business environment is predictably unpredictable, cloud resources
and infrastructures need to be very open and trustworthy to mingle and
mashup to ensure business agility and resiliency.
Importantly, clouds are greatly positioned as the new-generation infra-
structure capable of elastically delivering extra capacity. That is, cloud
resources can be automatically increased or decreased in order to cost-
effectively fulfill agreed SLAs. Clouds could achieve more by subcon-
tracting additional resources from collaborating clouds. This sort of
interconnectivity for making use of internal as well as external cloud
resources in times of specific need is the foundation for federated clouds.
In summary, cloud federation is quite a new concept of service aggre-
gation characterized by interoperability features, which addresses the
economic problems of vendor lock-in. Furthermore, it approaches chal-
lenges like performance and disaster recovery through methods such as
co-location and geographic distribution. The concept of cloud federation
enables further reduction of costs due to partial outsourcing to more
cost-efficient regions, may satisfy security requirements through tech-
niques like fragmentation, and provides new prospects in terms of legal
aspects.
26 • Cloud Enterprise Architecture
The Intercloud
This is the vision of the cloud paradigm. This, in a way, represents the
cloud of clouds. The standards-based amalgamation and accumulation
of cloud resources spread across the world goes a long way in fulfilling
the unique idea behind the intercloud. All kinds of cloud environments
(infrastructure, platform, software, etc.) dynamically link up with one
another in order to share their functionalities, features, and facilities to
accomplish superior and sophisticated things. Applications in one cloud
can connect and access data in another cloud, which is situated in the
vicinity or in other parts of the world. Applications can leverage a cheaper
and more attuned infrastructure of different and distant clouds owned by
someone else. A notification emanated out of a service hosted in a cloud
can reach out to a host of applications that are in co-located and distrib-
uted clouds in real time. Thus, a kind of extreme connectivity and spon-
taneous integration among various cloud modules make the route toward
the intercloud smooth.
The proposed intercloud is perfectly capable of facilitating just-in-time,
opportunistic, and scalable provisioning of cloud services. All the internal
cloud modules are equally empowered to provide and perform the goal of
automated resource provisioning through competent software-based solu-
tions. Further on, the uninhibited linkage with external cloud resources
makes possible the process of provisioning toward the absolute fulfillment
of desired and decided SLAs. That means every single criterion quoted in
the SLAs and operation-level agreements (OLAs) can be fully met under
any anticipated and unanticipated circumstances including variations in
workload, user base, resource, and network conditions. The overall goal
is to create a lean computing environment that intrinsically supports
dynamic expansion or contraction of VM capabilities for handling unex-
pected variations in service demands and to make computing depend
able and ubiquitous. Consortiums are working in unison in order to come
out with a series of open and industry-strength standards for cloud infra-
structure, platform, and application developers and providers so that all
the semantic, syntactic, structural, and symbiotic differences among them
can be minimal.
Ambient Cloud
Hybrid and community clouds are being recommended for certain sce-
narios. There are open and industry-strength standards being deliberated
Cloud-Enabled Smart Enterprises! • 27
Instant-On Enterprises
IT is consistently changing for good and is being prescribed as the far-
reaching agent in business automation and transformation. Business
behemoths are supposed to provide IT-enabled business services and
solutions to their clients and customers whenever and wherever they
need them. Business organizations have to deliver their services cost-
effectively, securely, and quickly by operating their own IT divisions or
28 • Cloud Enterprise Architecture
Commercial vendor
Informal service
provider
Smart
house Coordination
center
Local coordinator
Access Doctor
(professional)
FIGURE 1.2
Smart enterprises will capitalize on the value of the cloud.
SMART ENTERPRISES
As we have indicated above, there is widespread interest in the smart planet
vision (http://www-935.ibm.com/services/us/en/cloud-enterprise/). Many
technologies have arrived, shone for some time, and then vanished into
thin air. However, the cloud movement is something special that cannot
be taken lightly. Its promise and potential are really outstanding. The cloud
idea is breeding innovation in the enterprise space as pointed out earlier
and is set to become the prominent and dominant technology for realiz-
ing the wide-ranging objectives and obligations behind smart enterprises.
Already the cloud principle is being touted as the preferred method and
means for enhancing the choice, care, convenience, and comfort of human
lives. There are advertisements galore in print as well as digital media for
instant transformation of an ordinary TV into a cloud-enabled smart
Internet TV. There is not an iota of doubt that cloud enablement contrib-
utes substantially in making things smart, enterprises smarter, and people
the smartest.
There are certain characteristics and criteria that stand out as the hall-
marks for smart enterprises. The pervasive and path-breaking cloud con-
cepts have brought in a series of improvisations and improvements that
can be smartly leveraged toward the conceptualization and concretization
Cloud-Enabled Smart Enterprises! • 31
Distribution
Suppliers
Shipping
Manufacturing
Consumer
Warehouses
FIGURE 1.3
The necessity of connected clouds.
• Service computing
• Advanced analytics
• Cloud computing
• Big data computing
• In-memory computing
Service Computing
Service computing is all about creating, assembling, and running a raft
of services for building service-centric web, mobile, social, enterprise,
and cloud applications. Services are the central and core building block
for futuristic software. Services are better in abstraction, encapsulation,
and articulation of software applications. Extensively using and reusing
third-party services goes a long way in shortening application develop-
ment and maintenance. SOA, the associated architectural pattern, is the
established means for classifying, connecting, and composing diverse and
distributed services to construct adaptive, on-demand, enterprise-grade,
and dynamic software systems.
Advanced Analytics
The quest for quicker and easier transition from data to information and
then to knowledge has been gaining greater traction nowadays with the
availability of competent technologies and methodologies (http://www
.greenplum.com). Nowadays, data volume has been growing exponen-
tially due to the surging popularity of social networking sites. With the
unprecedented explosion of electronic devices, the size of data being gen-
erated, gathered, transmitted, and stocked is becoming massive. Most of
the data are nonstructured and semistructured, and it is predicted that
the data growth in the days ahead will be mammoth. Hence, it is man-
datory for business establishments to invest their resources and energy
into unearthing potential and promising processes for quickly extracting
actionable insights out of data heaps in order to keep ahead of their com-
petitors. Big data and in-memory computing paradigms are the leading
models that help in mining and analyzing data in real time and also in
extracting practical knowledge.
34 • Cloud Enterprise Architecture
Event-Driven Architecture
EDA is emerging as the classic architectural style for building highly
automated, dynamic, and real-time enterprise applications (http://msdn
.microsoft.com/en-us/library/dd129913.aspx). The business landscape is
going to greatly benefit from this distinctive architecture. Events are per-
vasive, high in scale and significance, and critical for insightful business
automation. Millions of event messages are being generated and streamed
from geographically distributed places. IT infrastructures and platforms
are accordingly strengthened for receiving event messages, processing,
analyzing, mining, and extracting any actionable intelligence in real time
and subsequently alerting subscribers to ponder, decide, and activate the
next course of action. Event-driven service-centric applications are, there-
fore, well received across the industry spectrum.
Next-generation enterprises should be able to glean actionable intel-
ligence from different and distributed sources and resources. Not only
gaining useful and usable insights but also acting on them quickly is the
key differentiator in the knowledge-driven and cut-throat market. The IT
infrastructures are empowered to make enterprises adept to all kinds of
business changes and challenges such as market volatility and pressures;
recessionary or recovering economy; mergers and acquisitions; and chang-
ing mindsets, business partnerships, and so on. Similarly, technological
changes and technical challenges also come into the picture. Thus, correctly
visualizing the prevailing as well as the looming situations and scenarios
goes a long way in shaping up and strengthening enterprises to face any
kind of uncertainties and threats and to capitalize on fresh opportunities.
In-Memory Computing
IT is being consistently upgraded to transition from the age-old sentiment
of a cost center to the elegant and exemplary business enabler (http://www
.sap.com/solutions/technology/in-memory-computing-platform/index
.epx). That is, IT infrastructures, processes, and people are being empow-
ered accordingly to meet existing and emerging business requirements.
Besides business efficiency, of late, cost-efficiency is being given more
thrust by CIOs in order to augment the return of investment (ROI) and to
lessen the TCO. With the rates of memory modules continuously failing
down, the use of in-memory computing is growing substantially, espe-
cially for mission-critical and real-time applications. This price deprecia-
tion has led to a rethinking of how mass data should be stored and used.
Instead of using mechanical disk drives, it is now possible to store the
primary data copy of a database in silicon-based main memory result-
ing in heightened performance. This change in the way data is stored and
36 • Cloud Enterprise Architecture
Cloud Computing
Cloud infrastructures are being prescribed as the best solution for all the
ills of present-day stagnant, closed, inflexible, and costly infrastructures
[8–10,12,14]. Cloud IT is stuffed with a number of unique capabilities.
Virtualization is the leading one; job scheduling, workload management,
and so on are automated; provisioning and deprovisioning of computing
resources are smoothened; there are commercial-grade and open-source
solutions for simplifying and streamlining the creation, configuration,
and deleting VMs out of physical servers; cloud service and infrastructure
management solutions are thriving; and security and governance aspects
are being looked into sincerely and strenuously.
In short, cloud IT is opening up choices at cloud, physical server, and VM
levels in order to fulfill changing computing requirements. Specifically,
cloud infrastructures are renowned for effortlessly accomplishing non-
functional requirements such as scalability, elasticity, high performance,
availability, configurability, consumability, and so on. In short, the cloud
is the convergence of mainframes and web infrastructures. The intercon-
nectivity, integration, intermediation, aggregation, and arbitration capa-
bilities of cloud IT clearly indicate and insist that in the future IT is in
the safe, secure, and sustainable hands of the path-breaking and promis-
ing cloud paradigm. As mentioned above, the cloud breeds innovations.
A growing array of computing models such as mobile, social, enterprise,
and embedded computing is converging with cloud computing in order to
visualize a bunch of newer and nimbler applications. We have described
three distinct cloud-induced and people-centric systems as follows.
Smarter Homes
Homes are the liveliest and loveliest place for everyone to reflect and relax with
their loved ones. There are home automation and integration technologies sim-
plifying the establishment of smart homes. Micro- and nanoscale electronics
Cloud-Enabled Smart Enterprises! • 37
Embedded
space
FIGURE 1.4
The seamless linkage of cloud, enterprise, and embedded spaces.
38 • Cloud Enterprise Architecture
Smarter Cars
Smarter Environments
CONCLUSION
Due to various compelling reasons, the phrase “more with less” has gained
wider acceptance and has drawn broader attention. This narration and
notion has gained considerable clout these days due to the economic slump,
the subsequent slow recovery, and sliding into distress. Worldwide enter-
prises, down with the stuttering and sluggish economy, are hence keenly
looking out for trend-setting and nonlinear methods to be competitively
ahead in their service and solution offerings. Executives are frantically
seeking out pioneering technology-based solutions. Technical managers
and architects are on their toes in order to unearth out-of-the-box devel-
opment approaches and state-of-the-art ICT infrastructures for faster soft-
ware realization, integration, and modernization.
Service and cloud enablement is being prescribed as the best thing to
improve IT efficiency, which in turn sharply improves the efficiency of busi-
ness and people. In this chapter, we have exclusively focused on the unique
selling points (USPs) of the inventive and inspiring cloud idea, which has
laid the stimulating foundation for big data and in-memory computing
models. How the adoption of the cloud paradigm shapes up and sustains
the vision behind smart enterprises is also explained. With the massive
adaption across the spectrum, the era of virtual computing will dawn on
the world. Everything becomes virtualized so that all kinds of dependency-
imposed hitches and hurdles get decimated; the vision of creative collabo-
ration among all kinds of assets, articles, and artifacts in our environments
becomes a reality. The cloud idea will be positioned as core and central to
the future of virtual computing, which is very bright.
REFERENCES
1. Akram, S., A. Bouguettaya, X. Liu, A. Haller, F. Rosenberg, and X. Wu. 2010.
“A Change Management Framework for Service Oriented Enterprises.” International
Journal of Next-Generation Computing 1 (1): 1–25.
2. Assmann, M., and G. Engels. 2008. Transition to Service-Oriented Enterprise
Architecture. Berlin: Springer-Verlag.
3. Capgemini. 2005. “Service-Oriented Enterprise: How to Make Your Business, Fast,
Flexible and Responsive: A Briefing for CxO-Level Executives,” Capgemini, Bratislava,
Slovakia, http://www.sk.capgemini.com/m/sk/tl/Service-Oriented_Enterprise__How_
to_Make_Your_Business_Fast__Flexible_and_Responsive.pdf.
4. Chaari, S., K. Boukadi, C. B. Amar, F. Biennier, and J. Favrel. June 2008. “Developing
Service Oriented Enterprise by Composing Web Services Based on Context.”
International Journal of Computer Science and Network Security 8 (6): 79–92.
40 • Cloud Enterprise Architecture
INTRODUCTION
Businesses are seriously and sincerely contemplating having a small IT
center locally (on-site or on-premise) by smartly modernizing and migrat-
ing a large chunk of business and IT solutions to one or more infrastruc-
tures rented from one or more third-party and expertly managed public
clouds (online, on-demand, hosted, remote, and off-premise). This kind of
segregation accomplishes a lot for companies and corporations in various
aspects of their business. One is to facilitate the realignment of compa-
nies so they can reset their priorities in order to focus more deeply on
their core competencies. Also, there are other noteworthy benefits such as
the transition from capital to operational expenditures (Opex). The rich-
ness and reach of cloud-based applications are definitely awesome. The
objective of “more with less” will steadily see the light. The cloud idea is
elegantly enabling and empowering scores of innovations and improvisa-
tions in IT. The maturity and maneuverability of the cloud paradigm is
bound to confer more thrust on IT simplicity and sensitivity.
It is a known fact that, with the harvest and harmonization of myriad,
multifaceted technologies, IT is becoming more powerful and poised.
Cloud computing substantially expands the scope of IT and takes it to the
next level. Notably, newer facets and fronts are being opened up for IT to
close the gap between business and IT. The impacts and implications of
cloud technology on IT are definitely overwhelming. As it is disseminated
widely and wisely, cloud computing lays an invigorating foundation for a
deluge of novel and strategic IT models that inspire next-generation busi-
ness models. We have powerful, pragmatic, and cloud-inspired IT infra-
structures. That is, cloud infrastructures are the seamless combination of
41
42 • Cloud Enterprise Architecture
• SOA as the business enabler—In the recent past [14], SOA came
along and laid the sound and stimulating foundation for achiev-
ing a host of complete and compact automation of tasks such as
application composition, enterprise modernization, and business
integration. That is, services, the most flexible and futuristic build-
ing block for adaptive, on-demand, and dynamic IT systems, can
dynamically find one another, bind, and compose to generate smart
and sophisticated services that in turn could lead to intelligent pro-
cesses, novelty-packed mashups, and applications. Aspects like soft-
ware building-blocks, such as components, classes, and services,
Cloud-Inspired Enterprise Transformations! • 45
Cloud clients
Presentation layer
Example: browser, mobile devices
Cloud applications
Software as a service
Example: Google docs or calendar
Cloud services
Components as a service
Example: SOA via web service standards
Cloud infrastructure
Distributed multisite physical infrastructure
Note: Enabled by server virtualization
FIGURE 2.1
The cloud stack.
46 • Cloud Enterprise Architecture
Cloud Technologies
The much-hyped concept of cloud computing is heading toward greater
heights and insights due to the maturity of virtualization technology, which
is mainly used for comprehensively decoupling hardware and software
components. This loose coupling has done a lot of good for IT in bringing
much-needed elasticity, exuberance, and elegance. That is, the inhibiting
dependencies among various IT modules get decimated altogether to bring
in fresh thoughts, possibilities, and opportunities in tackling all sorts of
existing and emerging IT limitations and ills. Another differentiating fac-
tor is transparency. That is, location, technology, platform, and language
transparencies are being easily achieved with cloud computing. There are
other contributive technologies and tools such as
Cloud-Induced Innovations
Cloud computing lays the foundation for originating a number of
momentous and memorable business and technical innovations described
as follows:
Application Domains
Clouds will be an inseparable and insightful part of the hordes of automa-
tion initiatives that are being implemented across the spectrum of indus-
tries that include
• Manufacturing/process/factory/industrial automation
• Home and building automation
• Entertainment, education, and financial services
• Supply chain, energy, healthcare, retail, government, utilities, logis-
tics and transports, physical security, homeland security, and so on.
The Future
Any powerful and impactful technology has to be adaptive and accommo-
dative. The alluring cloud technology is not an exception and is converging
seamlessly and spontaneously with other enterprise-class technologies to
accomplish better and bigger things. The cloud idea has the innate power,
provision, and potential in abundance to be an all-encompassing, elegant,
and exceptional technology.
There are propositions and expositions abounding about a number
of new concepts germinating from the cloud seed. There are write-ups,
weblogs, and webinars on federated clouds. Companies are circulat-
ing this idea, which will encircle the IT industry soon. It is no exag-
geration to write that the simultaneous adoption and adaptation of the
cloud paradigm is on a fast track. This progressive and positive trend
has clearly forced many to become CSPs. The result is that there are
plenty of cloud infrastructures across the globe. The prickling and per-
petual issue here with this turnaround is that providers are going for
different locations and technologies. Businesses are swiftly moderniz-
ing and migrating their business services and applications onto cloud-
based platforms. Thus, the cloud movement and moment has definitely
arrived.
The Intercloud
There are both generic as well as specific cloud types. Public, private,
hybrid, and community clouds are the common ones occupying a lot of
space in print as well as electronic media. Then, for achieving specific pur-
poses, there came a number of domain- and service-specific clouds such as
52 • Cloud Enterprise Architecture
enter, explore, and espouse the untapped potential of the cloud principles
in order to arrive at highly sophisticated enterprise-wide architectures.
Architects have to take the cloud very sincerely before deciding,
devising, depicting, and dictating a comprehensive, futuristic, flexible,
and enterprise-wide architecture. A few visionaries across the world have
argued that as companies trudge and move to cloud computing, the overall
workload of enterprise architects goes down significantly. However, that
is not the case as the boundary of IT is being extended with the incep-
tion and incorporation of the cloud story. There are more things to be
taken into account, and to be probed and analyzed thoroughly, and hence
the workload is always bound to go up. There are exhortations for the
preference of private clouds over public clouds for some specific scenarios.
Shifting application and service portfolios to the cloud should make a
lot of behind-the-scene headaches easier [2,5]. However, it does not elimi-
nate the need for an effective enterprise strategy for putting together all
the people, processes, and pieces in place in order to maintain business
continuity and resiliency. Business has never really cared about what it was
running on and just cares about its efficiency, versatility, and throughput.
That means, even in cloud IT, the need for EA does not get diminished a
bit. If anything, this cloud assimilation further complicates things. Not
long ago, IT departments had the luxury of having full control of their
entire landscape, which was built on top of matured and stable software
packages. But, the emerging IT scene is presenting an altogether different
picture. The unravelling and incubating cloud space brings forth a grow-
ing array of spectacular surprises and challenges alike for architects. In
the sections to follow, we would like to focus on cloud-induced business
shifts. In the ensuing chapter, we will see what sorts of changes are being
enacted on IT environment by cloud technology.
ESTABLISHING A CLOUD-INCORPORATED
BUSINESS STRATEGY
EA can be majorly segmented into two pieces: business and IT strategies.
The business strategy mainly talks about the business objectives, processes,
practices, models, illustrations, narratives, and so on. The current state
and the ensuing state get clearly demarcated and highlighted so decision
makers can ponder about the best course of action in order to journey
Cloud-Inspired Enterprise Transformations! • 55
toward the envisaged business vision with a missionary zeal. The details
regarding business offerings, outlooks, operations, and outputs are to be
duly and diligently dissected and discussed with the concerned authori-
ties before arriving at an unquestionable business strategy.
A well-intended roadmap and implementation procedure has to be
crafted and articulated by architects without any ambiguity to successfully
and safely facilitate the strategy implementation.
Service-Oriented Processes
As the complexity and changes of enterprise IT are on the rise, technocrats
are focusing on advancing the discipline of process engineering. Processes
are the central nervous system for all kinds of IT systems and are being
approached as the soothing artifacts. Processes facilitate modular applica-
tion development, composition, and enhancement. With the widespread
adoption of SOA, services are directly related to the processes and their
subprocesses. A process model dictates which services are to be picked up
and the order in which they have to be used for implementation. In other
words, a process is composed by aggregating multiple services via orches-
tration and choreography methods. That is, composite services are used
for completing a whole or partial business process or task. Due to surging
popularity, plenty of process engineering, execution, and examination
tools, engines, and containers are embedded in the standard SOA suite of
leading SOA vendors. However, the traditional SOA processes face many
Cloud-Inspired Enterprise Transformations! • 57
services to their consumers, and customers. In short, events lay the foun-
dation for real-time enterprises. Business event processing (BEP) is a new
kind of method that allows businesses to be effective and efficient in creat-
ing and capitalizing newer opportunities.
There are containers capable of receiving millions of event messages
from distributed sources and directing them to the appropriate recipients.
Event-driven architecture (EDA) is an architectural style that is becom-
ing very popular, and it is being attached with SOA in order to guarantee
event-driven service-oriented enterprises. Processes are also accordingly
strengthened to incorporate events and their passages. As clouds are the
new vigorous and rigorous cyber systems and are centrally located and
managed, EDA is bound to play a very important role in cloud-centric
enterprises. Cloud processes are being strengthened to be dynamic, thor-
oughly automated, and real time with the incorporation of events and
their inspiring value.
Service Categorization
As widely emphasized, service enablement is the first step toward
cloud-centric enterprises. Services are the base and best unit for opti-
mized business integration, application modernization, and enterprise
Cloud-Inspired Enterprise Transformations! • 61
After the selection of the service and the CSP, an important issue is to
define the contract with the CSP to ensure superior business versatility,
robustness, and resiliency. A simple strategy is to find, select, and start
with those services that
• Do not have big interaction with other services and information bases
• Bring high value to the business
• Have lower security risks
The services that fulfill these attributes are the first candidates for
transformation.
future. On the technical side, agencies and consortiums are being insti-
tuted in order to attend to the integration conundrum quickly through
industry-strength standards.
Cloud Participants
Typically, there are CSPs and cloud service consumers (CSCs). However,
with the considerable adoption of the pioneering and path-breaking
cloud paradigm across the world, cloud service brokers (CSBs) are the
new important entities in the burgeoning and bewildering cloud space.
Cloud brokers are used for facilitating cloud integration, intermediation,
and arbitration purposes. Cloud brokers are the abstraction of common
middleware services from both cloud owners and users.
A cloud broker is an organization or entity that creates and maintains
relationships with multiple CSPs across the globe. This makes it pos-
sible for cloud consumers to choose the best CSP (based on cost, loca-
tion, QoS attributes, and so on) for particular service needs. Also, it is
possible to simultaneously leverage diverse services provided by multiple
providers for complex service requirements. That is, business-aware and
business-aligned composite services can be crafted out of numerous CSPs
via a cloud broker. CSPs are mandated to provide consistent and highly
configurable user interfaces in order to enhance user experience.
Cloud brokers provide additional services such as intermediation,
orchestration, and arbitration services. Client consumers and providers
are linked up via cloud brokers. A cloud broker might provide consoli-
dated billing, seamless switching between cloud computing services, or
simultaneous connection to different cloud computing services, as well as
federated identity management or other added services.
A cloud broker may also survey CSPs to understand their capabilities,
liabilities, business models, and costs. This does away with the activation
of multiple relationships and instead favors the forging of just one relation-
ship with a trustworthy and competent cloud broker who would under-
stand the client’s IT service requirements completely. The cloud broker
could, in turn, select the best cloud services for the client organization and
expertly monitor those services on its behalf. A cloud broker will provide
significant cost savings and enable every cloud user to better make use of
the tactical and strategic cloud advantages. Cloud auditors are third-party
CSPs exclusively for the public audit of CSPs.
1. Set in place a team in order to define and govern the EA across the
company and the cloud.
2. Define a strategy in order to accelerate the transformation, taking
into account both the trends of the market and the value for the
company.
CONCLUSION
In this chapter, we have discussed the distinct and decisive features of cloud
computing and incorporated a brief discussion about the turnarounds
that can be achieved out of any cloud-based EA initiative in any business
organization. Also, we have explained how next-generation enterprises can
leverage the stabilizing and sizzling concepts of the landmark cloud idea
toward better-prepared enterprises to take on all kinds of business and
technology-induced changes and challenges confidently. Going forward,
soaring consumers’ expectations can also be speedily, cleanly, and compactly
incorporated into ICT systems. In short, the forthcoming cloud IT is more
turned and tuned toward accomplishing people’s demands quite naturally.
In the minds of many, there were some lingering doubts about the cloud
paradigm as an assistive, assertive, and affective EA technology. This has
Cloud-Inspired Enterprise Transformations! • 69
REFERENCES
1. Harrington, E. February 9, 2011. “Enterprise Architecture, Cloud Computing
and the US Federal Government.” The Open Group San Diego Conference, San
Diego, CA, February 9, 2011, http://www.architecting-the-enterprise.com/pdf/
presentations/enterprise_architecture_cloud_computing_and_the_us_federal_
government.pdf.
2. Chahal, S. et al. June 2010. “An Enterprise Private Cloud Architecture and
Implementation Roadmap,” Intel Information Technology, Santa Clara, CA, http://
www.intel.com/content/dam/doc/guide/intel-it-enterprise-cloud-architecture-
roadmap-paper.pdf.
3. Cisco Systems. July 28, 2010. “Cloud Computing and the Economics of Enterprise
IT,” Cisco Systems, Inc., San Jose, CA.
4. Citrix Systems, Inc. 2010. “Is Your Load Balancer Cloud Ready? How
NetScaler Helps Enterprises Achieve Cloud Computing Benefits,” Citrix
Systems, Inc., Fort Lauderdale, FL, https://images01.insight.com/media/pdf/
0311Whitepaper2NetScalerIsYourLoadBalancerCloudReady.pdf.
5. Doddavula, S. K., and A. W. Gawande. 2009. “Adopting Cloud Computing: Enterprise
Private Clouds.” SETLabs Briefings 7 (7): 18.
6. Ebneter, D., S. G. Grivas, T. U. Kumar, and H. Wache. 2010. “Enterprise Architecture
Frameworks for Enabling Cloud Computing.” IEEE 3rd International Conference on
Cloud Computing, Olten, Switzerland, July 5–10, 2010.
7. Grigoriu, A. 2009. “The Cloud Enterprise,” BPTrends, Wokingham, http://www
.bptrends.com/publicationfiles/TWO_04-09-ART-The_Cloud_Enterprise-Grigoriu_
v1-final.pdf.
8. Herrell, E., R. Whiteley, and A. Crumb. 2010. “Enterprise Communications: The Next
Decade,” Forrester Research, Inc., Cambridge, MA.
9. Deloitte. 2010. “Deloitte Debates: Does Cloud Computing Make Enterprise
Architecture Irrelevant?”, Deloitte, New York, NY, http://www.deloitte.com/
assets/Dcom-UnitedStates/Local%20Assets/Documents/us_consulting_
CloudComputingDebate_092110.pdf.
70 • Cloud Enterprise Architecture
INTRODUCTION
Designing enterprise architecture (EA) presents a bigger challenge in the
cloud era. With the gripping cloud idea, the business and IT landscapes are
solidly expanding further and farther. Therefore, enterprise architects’ roles
and responsibilities are becoming diversified and complicated. To moderate
the rising complexity, EA is increasingly being splintered into a bunch of
smaller projects. That is, here too, the acts of decomposition and composition
gain prominence. Toward the end, the aggregate of all of them is created and
concluded. The impacts of the cloud in business goals, operations, service
offerings, processes, and partnerships need to be fully understood in order
to arrive at a comprehensive and convincing business strategy and architec-
ture. Secondly, the IT improvements need to be taken into acute and astute
consideration as it is being pronounced widely in world media that there are
several incisive and decisive advancements out of embracing the cloud.
There are a series of promising and potential optimizations on IT infra-
structure. Cloud infrastructures are being portrayed and presented as the
next-generation service, on-demand, autonomic, elastic, and utility com-
puting infrastructures. All kinds of development, deployment, testing,
production, and management platforms for futuristic enterprise IT are
also being incrementally laid on cloud infrastructures. Finally, all kinds
of personal and professional services and applications are being sent to
cloud platforms. Thus, with the aggressive adoption of the ever-shining
cloud across the industry, there is a palpable and strategic shift in any
IT environment. As discussed in Chapter 2, there are pioneering deploy-
ment, delivery, management, pricing, and consumption models emerg-
ing and evolving continuously. These business-centric models are being
supported with the corresponding empowerment in IT infrastructures.
71
72 • Cloud Enterprise Architecture
In short, the cloud idea bridges and blends the business and IT environ-
ments together to accomplish more and better things for humanity.
The domineering trend is that all sorts of IT products and solutions
are becoming cloud-based services to be provisioned to millions of users
simultaneously across the globe. In a nutshell, the stability of cloud facili-
tates the vision of “IT as a service.” Cloud computing has become such
a path-breaking and premium technology. All tangible modules of IT
are being touched upon in an exemplary fashion. If there is not a well-
intended and defined EA in place to spell out which cloud solution has to
be used, what technologies are required, how they have to be approached
and accomplished in the cloud context, and how it all fits into the big pic-
ture, eventually the enterprise is bound to suffer. The long-term perspec-
tive will be sorely missed.
The good news is that the shift to cloud services will actually simplify
and sensitize IT to operate more systematically and successfully. Whether
there is a different group of professionals responsible for managing and
overseeing it, or it is built into the group’s DNA, EA will be one of the
prime enablers and exponents of IT in this modern world. From the cloud’s
ongoing journey, it can be inferred that the versatile idea of the cloud is
to take enterprise architecture to the next level. That is, cloud architecture
is all set to become an inseparable and indistinguishable part of EA. As
cloud computing matures, it materially and mesmerizingly influences any
organization that is hell-bent on leveraging the cloud’s unique concepts
and capabilities. Cloud adoption is bound to bring in a number of sig-
nificant and delectable modifications in enterprise analysis, planning,
strategy, execution, and enhancement. It is obligatory to seamlessly enable
the smooth integration of enterprise procedures, processes, patterns,
platforms, and practices into the cloud paradigm. Prominently, there will
be several domains that get attracted and altered by the convergence of EA
with the exploding and expanding cloud domain. Ultimately, the brewing
IT trend is toward the realization of cloud-centric enterprises.
clouds of the future are federated clouds, which ultimately lead to the
intercloud. As a first step, enterprises are building their own cloud.
We are going to see how enterprise clouds are fully supporting vari-
ous business operations and offerings of enterprises. Before that, a brief
digression.
Businesses have been asking for a bevy of deft and d isruptive tech-
nologies to gain real-time connectivity and collaboration capabilities
for their workers to sharply enhance their productivity while fulfilling
real-time delivery within reasonable cost. The other critical segment is
end users, who aspire for context-aware services. Technology advance-
ments include innovative applications based on session initiation proto-
col (SIP), multimodal devices that displace landline phones, increased
adoption of open source software, widespread video usage, and mobile
business intelligence (BI) and UC for contextual collaboration. Social
networking sites supply more relevant content and information for
workers.
There is a rapid expansion of SIP for services and applications. Devices
will provide greater functionality to replace or coexist with desktop
phones. The growth of working remotely and telecommuting, which will
create demand for secure mobile applications, will be facilitated by SIP.
Video usage will become common and casual and promotes conversations
and collaboration across enterprise. Video-based surveillance, security,
and safety will get a strong boost in the days ahead. These changes will cre-
ate and sustain an integrated workplace environment that facilitates real-
time and purposeful collaboration to fulfill business goals and to assist in
forming and firming up aware and aligned processes. Videoconferencing
solutions will expand steadily and capture more market segments as they
are inexpensive, and will open up a number of not-yet-envisioned options.
Physical meetings will gradually become cyber as companies start to
embrace hugely cost-effective video solutions for internal meetings and
to engage with their customers over audio and video communication over
the web. Video solutions will expand upward into large telepresence con-
ference rooms and downward to individual desktops. The cost savings
achieved on the reduction of travel costs often support the business case
for video market expansion.
Other noteworthy trends include the much-maligned convergence in
the mobile space. Computers are becoming communicators, whereas
communicators tend to be computers. Cell phones are transitioning
to smartphones with the smooth synchronization of mobile phones
and personal digital assistant (PDA) functionalities. Miniaturization
technologies superbly contribute for very large scale integration of mul-
tiple digital modules that work cohesively together within a phone. This
terrific transformation helps mobile phones to be actively involved in
business transactions. Professionals on the move benefit exceedingly
76 • Cloud Enterprise Architecture
from this great evolution. Wireless and mobile devices seamlessly bring
together voice, the Internet, and video to support business communica-
tion. Integration with UC software allows workers to use their mobile
devices for contextual and content-based collaboration and enables access
to features that indicate a coworker’s availability and location. Mobile BI
and mobile-based commercial and financial transactions will flourish and
proceed at a feverish pace. There will be a huge precipitation in mobile
services. The mobile web will see a flurry of activity. Mobile governance,
retail, banking, commerce, ticketing, games, and so on will become sim-
pler and ubiquitous.
Communication as a Service
The transformational cloud technology permeates into the money-
spinning communication domain. Providing communication services
from the cloud will turn the current communication landscape upside
down. Communication as a service (CaaS), an offshoot of cloud enable-
ment of communication services, is being projected as the next-generation
communication method. Cloud empowerment brings the celebrated cen-
tralized service delivery into the communication landscape. Although
currently an emerging market, CaaS offers greater accessibility for UC
applications and services. Network service providers will offer commu-
nication and collaboration solutions to companies as a fee-based service
offering, which incorporates the Web 2.0 technology stack with solutions
from traditional premise-based providers.
78 • Cloud Enterprise Architecture
Ambient Cloud
This is the new buzzword in the cloud era. It is estimated that there will
be two billion PCs in the year 2015. That is going to be a giant reservoir
of unparalleled computing power as every new PC is being stuffed with
powerful processer(s), gigabytes (GBs) of memory, and terabytes (TBs) of
hard disk space. Each processor in turn comprises several cores (multicore
computing). The prediction for smaller cousins such as laptops, tablets,
and smartphones is still more fascinating. It is plausible to assume that the
total number of mobile phones in use today will be roughly equivalent to
the number of people on the earth. Smartphones are roughly half of that
Cloud-Instigated IT Transformations! • 81
number at this point in time and are projected to grow faster than any
other computational devices on the planet.
Typically, smartphones come out with 1 GHz processor, 512 MB
RAM, and 32 GB storage capacities. As per the trend, smartphones will
soon catch up with PCs. As days go by, smartphones will be powered
with multicore processors. More cores means more computing power.
Therein lies a lot of opportunity. Memory size will be truly stunning.
Smartphones will become the universal and unified instrument for
computing, communication, sensing the surroundings and situation,
controlling all kinds of electronic devices in the vicinity, even remote
monitoring and management of household items, delivering people-
centric service unobtrusively, knowledge exchange, formation of digital
communities, social networking, and so on. The possibilities are really
staggering.
But all the exciting computing power in the world is of little use if the
devices do not connect and collaborate with one another. Networking
(wired as well as wireless) has to be seamless, and the data transfer
has to occur at furious speeds. Zero latency has to be aimed at and
achieved. We have 3G mobile connectivity these days and in the near
future, and 4G communication based on Long Term Evolution (LTE)
will become common. The research on 5G communication has already
begun.
Within data centers using high bandwidth 1–100 Gbps interconnects,
the latency is less than 1 ms within a rack and less than 5 ms across a data
center. Between data centers, the bandwidth is far less at 10 Mbps–1 Gbps,
and latency is in the hundreds of milliseconds realm. Current bandwidth
rates and latencies for cell networks might not be sufficient to build and
operate clouds. However, with faster evolution and the occasional revolu-
tion in the communication space, future clouds will definitely be based
out of smartphones.
True high-performance computing (HPC) and low-latency-intercon-
nect applications will not find a cell-based cloud attractive at all. But
for applications that need to be highly parallel and manageable with
short latencies, cell-based clouds present a very appealing phenomenon.
Energy efficiency is another challenging arena for the device world.
Besides device clouds, the sensor clouds will become ubiquitous. With
these advancements, there will be mind-boggling real-world and real-
time applications. The way we work, decide, interact, and so on will
dramatically change.
82 • Cloud Enterprise Architecture
SERVICE INFRASTRUCTURES
We need robust, resilient, and reliable infrastructures and platforms for
dependably hosting, delivering, monitoring, regulating, substituting, and
retiring new-generation cloud services and applications. When the service
paradigm was sweeping the entire IT industry, there was a push for switch-
ing over to SOI. That is, every tangible IT resource gets service enabled so
that they can find one another dynamically, and interact toward business
goals. Service enablement is the leading cause for achieving higher infra-
structure flexibility, utility, usability, and visibility. Public discoverabil-
ity, network accessibility, remote manageability and serviceability, and so
on are the key business and technical cases for enterprises to join in the
service bandwagon. Thus, a wider variety of service infrastructures and
platforms have been conceived and brought out in plenty by open source
communities as well as by leading IT vendors. In short, the service sci-
ence, engineering, and management disciplines have been receiving a lot
of attention.
There is informative and inspiring literature on service platforms and
their features and functionalities. Recently, there is a new product cat-
egory called the service delivery platform (SDP). The telecommunication
industry first incorporated the SDP as the foremost infrastructural ele-
ment for facilitating service delivery, and today there is a greater aware-
ness and articulation across industries about the significance of SDPs.
Cloud-Instigated IT Transformations! • 83
Internet
DATA DATA
DATA DATA
Mainframe Mainframe
FIGURE 3.1
An enterprise-scale service infrastructure.
CLOUD INFRASTRUCTURES
Cloud computing is all about consolidation, centralization, optimization,
higher utilization, smart delivery, and flexibility. In a way, sharing ser-
vices, computation, and data from a highly modular server farm is the key
differentiator. Services and data, made available in a cloud, can be more
easily and ubiquitously found, bound, and accessed, often at a much lower
cost. This shift solidly increases the monitored usage and leverage of IT
resources as opportunities for enhanced collaboration, integration, and
analysis on a shared common platform abound appreciably. A reference
architecture for a cloud center is given in Figure 3.2.
Cloud-Instigated IT Transformations! • 85
Physical resources
FIGURE 3.2
Next-generation dynamic data center.
• The IaaS services advertised and articulated are fully compatible and
competent to support their applications.
• The underlying cloud infrastructures are totally optimized and have
reached a certain level of stability and maturity.
• The infrastructure should be strictly standards based. The infrastruc-
tural components such as servers, switches, gateways, appliances, stor-
age networks, and so on have to be highly modular in order to support
flexibility and modifiability. Also, the infrastructure has to be sensitive
and simplified for configuration, customization, and consumption.
• CSPs have to have an extensive virtualization strategy as almost all
the tangible IT resources such as server, storage, database, applica-
tion, service, network, desktop, and so on are being virtualized. Lately,
there are microvisors to enable virtualization of embedded devices.
• The CSPs must have automated as many data center processes as
possible. This includes orchestration and provisioning; change and
configuration management; resource reallocation; service monitor-
ing; fault diagnosis; and software updates and maintenance.
Automated Management
Managing cloud infrastructure poses a number of unfathomable chal-
lenges due to consolidation, virtualization, and federation, which are the
Cloud-Instigated IT Transformations! • 89
Resource Provisioning
Self-service is the unique selling factor of cloud systems. That is, business
users can decide, create, and leverage their computational requirements.
If not needed anymore, they can let go of them right away. That is, new
resources can be realized easily and released instantaneously. In other
words, provisioning and deprovisioning of a variety of IT resources (appli-
cations, platforms, and infrastructures) is being significantly simplified in
order to attract people and to retain them. In short, IT is becoming simpler
and sensitive enough to be dictated by business managers and nontechnical
people. Another point is that computing is all set to become the fifth social
utility. Such a seismic shift is being made possible by cloud computing.
Cloud SDP
Cloud services deployment and execution containers, cloud service man-
agement platforms, cloud service security solutions, and so on are the
leading software infrastructure solutions for cloud-based service appli-
cations (CBSAs). SDPs are gaining much ground these days as services
are centrally placed and provided to global users with much clarity and
without any performance degradation. Presentation, rendering, aggrega-
tion, transformation, and mediation engines are the chief modules of any
standard SDP. Cloud service bus (CSB) is the introspective middleware
being utilized to route (content as well as context based) service messages
to their rightful owner(s), to broker among services with varying capabili-
ties and contracts, and to aggregate outputs of participating services that
are situated in different VMs, physical nodes, and clouds. SDP is the front
end for all the backend resources including the CSB. A service portal is the
UI part of any SDP. A mashup editor is a well-known module in the cloud
service platform.
1. Applications and services will further evolve from being monolithic and
static toward being composite and dynamic. This in turn increases the
reliance on network performance as well as the power of cloud center.
2. IT infrastructure will continue to shift from physical to virtual,
complicating IT orchestration with more moving parts.
3. As infrastructure performance management becomes complicated,
the operational domains of control will move from single to multiple
entities.
4. Business models move from per-instance licensing to pay-as-you-go
licensing, which will require better project financial management
and exploration into chargeback methods.
94 • Cloud Enterprise Architecture
The cloud style has brought forth a fresh set of ills and issues that cannot
be taken lightly as their compact resolution leads to greater acceptance. As
far as the third-party, external, commercial-grade, and public clouds are
concerned, the major problem areas blocking the widespread adoption of
the cloud style are listed as follows:
Private clouds [4] are solving most of the problem areas of public clouds.
However, the much-anticipated utility model gets missed out on in private
clouds, which are catering to the needs of a limited set of users. For energy and
cost efficiency, and for vertical applications, community clouds are being rec-
ommended. All kinds of underutilized and unutilized computing machines
are being networked, clustered, and virtualized to act as community clouds
that are capable of effortlessly tackling the specific needs of a particular com-
munity. Then, hybrid clouds are being suggested for enabling a seamless
connectivity between private and public clouds through the cloud-bursting
technique. This arrangement helps in times of greater needs of computing.
An overwhelming majority of users has voted and voiced that security
is the main stumbling block; hence, CSPs and academic researchers are
working overtime on minimizing the malevolent security threats and
risks, thereby reversing the sagging and sluggish image of third-party
clouds. Newer security holes via VMs have come to light. As the access
for the public cloud is mainly through the Internet, all kinds of cloud
sources and resources are very much liable for intensive and intimidating
intrusion, hacking, and transgression. Therefore, myriad intercontinental
initiatives are being expedited to unearth impenetrable and unbreakable
security algorithms and solutions. There are security-specific best prac-
tices, key guidelines, and metrics. The currently used security mecha-
nisms are also being strengthened for utilization with cloud systems. IaaS
providers are lately open to providing more controllability, third-party
auditability, flexibility, modifiability, and so on. Other drawbacks are also
being attended to seriously. In summary, establishing private clouds is the
logical step until there is a complete reliance on public clouds.
Cloud-Instigated IT Transformations! • 95
Enterprise cloud
Automation
protection compliance ∙ Intrusion detection
Application layer
system
∙ High availability and ∙ Load balancing ∙ Virtual machine ∙ Aggregation ∙ Resource
disaster recovery ∙ Multitenancy isolation ∙ Quality of ∙ Security provisioning ∙ Business intelligence
service intelligence ∙ Complex event
Virtual layer ∙ Workload processing
∙ Virtual network ∙ Virtual storage ∙ Virtual compute ∙ Software archestration ∙ and so on
platform and
Hardware layer infrastructure ∙ Service
∙ Firmware ∙ Server ∙ Network security integration
∙ Hardware ∙ Storage
FIGURE 3.3
The architectural stack of an enterprise cloud.
Affordability
There are expert ways and means to achieve huge cost reductions in set-
ting up and sustaining enterprise clouds.
Automated Tools
Use of a single-pane management console gives IT administrators a con-
sistent and common view for each step in a technology life cycle: configu-
ration, provisioning, compliance, management, and monitoring across
platforms. These management tools let administrators set up and run
Cloud-Instigated IT Transformations! • 99
CONCLUSION
Being an impactful technology, the cloud has brought forth a number of
delectable innovations and renovations to both business and IT domains.
Both business executives and IT professionals are equally ecstatic about
the potential and promise of the cloud paradigm.
On the IT front, the major rejuvenation and restoration happens on IT
infrastructures. Anytime, anywhere, and any device access of web-based
content, components, services and data has been there. However, with
the cloud eruption, application platforms and runtimes; service contain-
ers; integration backbones; orchestration and rule engines; management
applications; software infrastructure solutions such as application servers,
100 • Cloud Enterprise Architecture
REFERENCES
1. Vishwanath, K.V., and N. Nagappan. 2010. “Characterizing Cloud Computing
Hardware Reliability.” SoCC’10 Proceedings of the 1st ACM Symposium on Cloud
Computing, Indianapolis, IN, June 10–11, 2010, http://research.microsoft.com/
pubs/120439/socc088-vishwanath.pdf.
2. SNIA, and Open Grid Forum. September 2009. “Cloud Storage for Cloud
Computing,” Storage Networking Industry Association, San Francisco, CA, and
the Open Grid Forum, Muncie, IN, http://ogf.org/Resources/documents/
CloudStorageForCloudComputing.pdf.
3. Demchenko, Y. July 16, 2011. “Defining InterCloud Architecture (for Cloud Based
Infrastructure Services Provisioned On-Demand) and Cloud Security Infra
structure,” Cloud Federation Workshop at Open Grid Forum’s OGF32, Salt Lake City,
UT, July 15–17, 2011, http://www.ogf.org/OGF32/materials/2314/ogf32-cloudfed-
intercloud-security-v01.pdf.
4. VMware. 2012. “Cloud Infrastructure Architecture Case Study,” VMware, Palo Alto,
CA, http://www.vmware.com/files/pdf/techpaper/cloud-infrastructure-achitecture-
case-study.pdf.
5. Harris, R. 2009. “Building a scalable shared file infrastructure,” StorageMojo, http://
www.cloudstoragestrategy.com/scalable_NFS_infrastructure.pdf.
6. CERN, and ESA. 2011. “Strategic Plan for a Scientific Cloud Computing Infrastructure
for Europe,” The European Organization for Nuclear Research (CERN), Geneva,
Switzerland, and the European Space Agency, cdsweb.cern.ch/record/1374172/files/
CERN-OPEN-2011-036.pdf.
7. Ashton, Metzler, & Associates. 2010. “Optimizing the Cloud Infrastructure for
Enterprise Applications,” Ashton, Metzler, & Associates, Sanibel, FL, http://www
.navisite.com/Collateral/Documents/English-US/Ashton-Metzler-Associates-cloud-
computing-white-paper.pdf.
Cloud-Instigated IT Transformations! • 101
8. Yee, T.-T., and Naing, T.T. 2011. “PC-Cluster Based Storage System Architecture for
Cloud Storage.” International Journal on Cloud Computing: Services and Architectures
1 (3), http://airccse.org/journal/ijccsa/papers/1311ccsa09.pdf.
9. Jones, T. November 30, 2010. “Anatomy of a cloud storage infrastructure: Models, fea-
tures, and internals,” IBM developerWorks, http://www.ibm.com/developerworks/
cloud/library/cl-cloudstorage/cl-cloudstorage-pdf.pdf.
10. Brasen, S. August 3, 2010. “Designing a Responsible Cloud Infrastructure,” Enterprise
Management Associates, Boulder, CO, http://www.enterprisemanagement.com/
research/asset.php/1810/Designing-a-Responsible-Cloud-Infrastructure.
11. U.S. GAO. 2010. “Organizational Transformation: A Framework for Assessing
and Improving Enterprise Architecture Management (Version 2.0),” United States
Government Accountability Office, http://www.gao.gov/assets/80/77233.pdf.
12. Sundara Rajan, S. November 19, 2010. “Cloud Enterprise Architecture and TOGAF–A
Top-Down Approach to Building New Cloud Applications,” SYS-CON Media, Inc,
Woodcliff Lake, NJ.
13. Tang, L., J. Dong, Y. Zhao, and L.-J. Zhang. 2010. “Enterprise Cloud Service
Architecture.” IEEE 3rd International Conference on Cloud Computing, Richardson,
TX, July 5–10, 2010.
14. Tsai, W.-T., X. Sun, and J. Balasooriya. 2010. “Service-Oriented Cloud Computing
Architecture.” New Generations (ITNG) Seventh International Conference on
Information Technology, Las Vegas, NV, April 12–14, 2010.
15. Verizon, 2010. “Solutions Briefs: Next-Generation Identity Management for
Cloud-Enabled Ecosystems,” Verizon, http://www.verizonbusiness.com/resources/
solutionbriefs/sb_next-generation-identity-management-for-cloud-enabled-
ecosystems_en_xg.pdf.
16. Alcatel-Lucent and HP. 2011. “Cloud Ready Service Infrastructure for Commu
nications Service Providers,” Alcatel-Lucent and HP, http://www.telecoms.com/wp-
content/blogs.dir/1/files/2011/10/HP_ALU_Cloud_WhitePaper110613-3 .pdf.
17. Cashman, G. 2012. “Impact of Cloud Computing on Communication Infrastructure
and Service Providers.”, COMPTEL PLUS Convention & EXPO, San Francisco, CA,
April 15–18, 2012, http://www.comptelplus.org/Files/pastshows/2012Spring/GSC_
Comptel_Presentation_2012%20CEO%20Breakfast.pdf.
18. Dialogic, Inc. 2011. “LTE Drives Opportunities for Cloud-Based Mobile Video Services,
Operators, and Providers,” Dialogic, Inc., Milpitas, CA, http://www.dialogic.com/en/
solutions/cloud-communications/~/media/6211CCA1A34F4C109D84406F7F5C4BD6.pdf.
19. Siemens Enterprise Communications. 2011. “Competitive Advantage in the
Cloud: Demonstrating the Value of Cloud Communications,” Siemens Enter
prise Communications, Reston, VA, http://www.siemens-enterprise.com/~/media/
internet%202010/Documents/products/cloud-communication/06_Competitive_
Advantage_in_the_Cloud_Siemens.pdf.
4
Cloud EA: Frameworks and Platforms
INTRODUCTION
Information technology is trekking and moving steadily toward much-
promised agility, autonomy, and affordability. In business forums, media
circles, and boardroom meetings, IT is being presented and pitched as
the elegant, exclusive, and enviable enabler of business. The optimization,
precision, speed, simplicity, and sensitivity power of IT is growing expo-
nentially these days. In other words, IT is going to gain a strategically
powerful affinity for and grip on every single business endeavor hereaf-
ter. Commoditization and industrialization of IT are on the upswing and
digitalization is gripping every industry segment as never before.
However, businesses have outpaced and outclassed IT on several accounts
and aspects and, hence, there is a noticeable gap between business and IT.
Businesses are automated using available technologies, that is, IT-driven
businesses are the reality today. Lately, however, there is a glimmer of hope
for business-driven technologies such as SOA. Thereby, better alignment
between business and IT can now be accomplished smoothly and swiftly.
As IT and business are becoming intertwined very tightly these days, all
kinds of advancements and accomplishments of IT are being expediently
and easily replicated in business for much-needed business augmentation,
transformation, and optimization. Several enabling technologies, tech-
niques, and tools are emerging and evolving very fast in order to close
down the inhibiting gap between IT and business.
Enterprise architecture (EA) is the proven architectural approach being
overwhelmingly undertaken and applied for systematic, sustainable and
strategic growth of enterprises. EA directly and decisively deals with all
the relevant enterprise elements and provides a pragmatic and pioneer-
ing way to successfully steer the enterprise toward its drafted and defined
103
104 • Cloud Enterprise Architecture
SIMPLIFYING EA DEVELOPMENT
Why EA is the Preferred Approach
There is no doubt that the venerable and viable approach for establishing
efficient enterprises is definitely a well-defined and designed EA imple-
mentation. The venerable approach for establishing efficient enterprises
is the EA. For decades, corporate executives and project managers have
been complaining about the frequent budget overruns and schedule delays
of multifaceted and transformational IT projects. In many cases, projects
initiated with much fanfare could not meet the envisaged business objec-
tives and, thereby, there is a wide gap between expectation and supply. The
most plausible causes include increasing complexities of modern orga-
nizations; the intricacy, multiplicity, heterogeneity, and size of applica-
tions; as well as the convoluted technology landscape. Further, it is being
insisted that miscommunication between business, operational, and IT
experts who each speak their own jargon is another underlying cause.
Businesses and technologies are growing fast in different directions and
paces, and there is a complicated mismatch between their growth stories.
Embarking on the EA mission is being touted and termed the surest and
purest way to suppress and surmount all these common obstacles. As a
business-driven approach, this perspective encompasses broader relation-
ships between business strategy and processes, as well as the supporting
information systems, data, and IT infrastructure.
Leading IT vendors view EA as an enabling discipline that translates
business vision and strategy into reality. By creating, communicating,
and improving key principles, guidelines, techniques, and models that
methodically describe a desired future state, EA sets the path straight and
106 • Cloud Enterprise Architecture
by the architect and generally not by the owner. The architect’s plans
serve as the basis for negotiation with the general contractor who will
build the building. The general contractor draws his or her own plans,
the contractor’s view, for negotiating with subcontractors. Each subcon-
tractor draws his or her own plans for their specific purpose. They are
part of the subcontractor’s view. The last view, the enterprise view, is the
building itself.
These perspectives are complemented with types of description, that
is, the kind of questions that can be asked about a given view. Zachman
prescribes three types of description: (1) data, (2) function, and (3) net-
work. These types of descriptions are answers to the questions what,
how, and where. The orthogonal dimensions form a “six by three”
information system architecture (ISA) matrix in which the rows rep-
resent the six perspectives and the columns represent the three types
of description. Zachman and Sowa add three more types of descrip-
tions: (1) people, (2) time, and (3) motivation. They correspond to the
questions who, when, and why. The result is the complete “six by six”
ISA matrix.
Despite the prominent position of the framework, there is little informa-
tion publicly available to help designers create exact models that fit each
other. Alain Wegmann and his team have proposed a conceptualization
based on general systems theory (GST). The conceptualization provides
concrete guidelines for creating models required by the framework and
establishes a better understanding of the models and their relationships.
This facilitates the creation and interpretation of models. It also improves
the traceability between them.
• It avoids the initial panic and pandemonium that breaks out when
the scale of a task becomes apparent.
• The use of TOGAF is systematic: It is “codified common sense.”
• It captures what others have found to work in real life.
• There is a baseline set of resources for reuse in TOGAF.
• The framework defines two RAs in the enterprise continuum.
The unique selling point (USP) of TOGAF lies with its choice of four dif-
ferent yet interdependent architectural types for sharpening and stream-
lining EA engineering, that is, TOGAF primarily targets development of
the four architectures presented in a tabular form here. It is widely recog-
nized that these four architectures form the substantial portion in any EA
and, therefore, the TOGAF brand value across industries is consistently
on the rise:
Preliminary
framework and
principles
A
Architecture
vision
H
B
Architecture
Business
change
architecture
management
C
G Information
Implementation Requirements
system
governance management
architectures
F D
Migration Technology
planning architecture
E
Opportunities
and solutions
FIGURE 4.1
Architecture development method (ADM) life cycle.
112 • Cloud Enterprise Architecture
A Content Model
The ACF is based on a standard content metamodel, which provides a def-
inition for all types of building blocks that exist within the architecture.
The metamodel illustrates how such building blocks can be described
and how they relate to one another. When creating and managing archi-
tectures, it is necessary to consider various concerns such as business
services, actors, applications, data entities, and technology. The content
114 • Cloud Enterprise Architecture
Architecture Repository
In a typical enterprise, multiple architectures would exist at any point in time.
Some architectures would address specific needs, whereas others would be
more general in application. Similarly, there would be many solutions in use or
being prescribed to meet the emerging needs of the enterprise. Architectures
that describe particular solution approaches, best practices, or patterns can be
developed, or acquired and shared across the enterprise as reference models.
In this context, ADM can be regarded as describing a process life cycle
that operates at multiple levels within an organization, operating within a
holistic governance framework and producing aligned outputs that reside
in an architecture repository (AR). The enterprise continuum provides a
valuable context for understanding architectural models: It shows build-
ing blocks and their relationships to each other and the constraints and
requirements on a cycle of architecture development. The major compo-
nents within an AR are illustrated in Figure 4.2.
Supporting the enterprise continuum is the concept of an AR, which
can be used to store different classes of architectural output at different
levels of abstraction, created by an ADM. In this way, TOGAF facilitates
Architecture repository
Architecture metamodel
Artifacts in the
landscape are
structured according Best practice
creates Reference
to the metamodel
reference models
architecture adopted by
the enterprise External
Reference library reference
The reference
Adopted
library is models
by the
governed
enterprise Standards have
Architecture
reference
landscape implementations
Standards Standards
are complied adopted by
with Standards the enterprise External
information base standards
Best
practice
creates
The landscape standards Compliance is
is governed governed Visibility and
escalation
Governance log
The architecture
board steers and
Architecture
manages the board
Architecture capability capability
FIGURE 4.2
The TOGAF Architecture Repository Modules.
116 • Cloud Enterprise Architecture
To keep an EA coherent during its full life cycle, frameworks alone are
not sufficient. The relationships between the relevant types of domains,
views, and layers of the architecture must remain clear and any change
should be methodically carried out in all of them to ensure consistency.
For this purpose, a number of methods and tools are available to assist
architects in all the phases of the architecture life cycle. This is where
TOGAF distinguishes itself from other frameworks in the industry today.
Moreover, TOGAF is being supported by a large community of practitio-
ners and is an open standard, unlike various vendor- and domain-specific
EA frameworks.
In conclusion, TOGAF is the combined work of many dedicated, disci-
plined, and determined professionals and pundits across the globe under the
direction, guidance, and governance of the Open Group. Based on their wide
education, experience, and expertise, these professionals are collectively and
collaboratively elucidating and empowering this architecture framework to
meet existing and evolving concerns and challenges of worldwide business
houses. This best-in-class framework has solidly captured and captivated
architects to smartly utilize it in order to define and defend EAs as well as
domain-specific architectures. Out-of-the-box thinking has been calmly
and cognitively embedded into this tool. With the arrival and acceptance
of cutting-edge technologies and state-of-the-art infrastructures, the future
for TOGAF in establishing process-centric, service-oriented, cloud-based,
model-driven, and event-driven enterprises is definitely great.
Architectural analysis: Define a simple and concise vision for the seg-
ment and relate it back to the organizational plan.
Architectural definition: Define the desired architectural state of the
segment; document performance goals; consider design alternatives;
and develop an EA for the segment including business, data, ser-
vices, and technology architectures.
Investment and funding strategy: Consider how the project must be
funded.
Program management plan and execution of projects: Create a plan for
managing and executing the project, including milestones and per-
formance measures that will assess project success.
• Architectural completion
• Architectural use
• Architectural results
There are more relevant and refined details on each of these categories in
FEA documents. In a nutshell, the best parts of previous EA frameworks
are aggregated to derive this successful EA framework that quickens the
process of building competent EAs for governments.
120 • Cloud Enterprise Architecture
To further increase the value of OEAF, Oracle has also tailored prebuilt
RAs that define future state architectures. These proven RAs are drilled down
from logical components (e.g., functional capabilities) to physical compo-
nents (e.g., Oracle technologies and products) that complement a customer’s
existing environment and can be used to minimize implementation risks.
The major components of OEAF are illustrated in Figure 4.3.
Business architecture
Application architecture
EA governance
People, process,
and tools
Information architecture
Technology architecture
EA repository
FIGURE 4.3
The Major Components of Oracle Enterprise Architecture Framework.
122 • Cloud Enterprise Architecture
Application Architecture
This part of an EA provides an application- and service-centric view of an
organization. Application architecture typically ties business functions to
application processes and services to create or assemble application com-
ponents in alignment with the application strategy. The application archi-
tecture’s scope, strategy, and standards are a consequence of BA. The key
components of application architecture are as follows:
Information Architecture
Information architecture provides information- and data-centric views
of an organization, focusing on key information assets that are used to
support critical business functions. It describes all the moving pieces and
parts for managing information across the enterprise and sharing that
information with the right people at the right time to realize the business
objectives stated in the BA. The key components for describing informa-
tion architecture are as follows:
Technology Architecture
Technology architecture describes how the infrastructure underlying the
business, application, and information architectures is organized. The
principal components are as follows:
Architecture
vision
Current
Business state
case architecture
EA
repository
EA Future
governance state
architecture
Strategic
road map
FIGURE 4.4
Oracle Architecture Development Process.
126 • Cloud Enterprise Architecture
From the base OADP process, Oracle creates tailored OADP processes
that target specific segments, domains, and/or solution architectures
such as application portfolio rationalization and IT optimization. These
tailored OADP processes use the basic structure and phases of the base
OADP process. However, they are further streamlined by emphasizing
the critical path for a given architecture engagement and by providing
prescriptive guidance, case studies, sample artifacts, applicable refer-
ence models, and so on for executing the critical tasks and creating key
artifacts.
In conclusion, the framework’s practical approach allows architects
to focus on the architecture and not be bogged down with excessive
processes and artifacts or creating their own processes. The agile nature
of OEAF enables continuous improvements to adjust to changing busi-
ness conditions and new technologies. The OEAF uses industry EA
concepts and terminology and leverages the best of other frameworks.
Access to a set of best practices, tool sets, RAs, and tailored architec-
ture processes around specific problems (applications rationalization,
IT optimization, and more) will significantly reduce the time required
to develop enterprise-wide and enterprise-grade architectures.
IBM’S ACTIONABLE EA
The IBM has come out with a rectified and refined EA framework (named
“actionable EA”) in order to significantly mitigate EA developmental com-
plexity. There are four categories of reusable EA elements:
The authors have thrown more light on each of these layers in their
papers. Enterprise-wide modeling is a crucial cog in realizing adaptive
EAs. Although modeling languages contribute lavishly to the realiza-
tion of EAs, their main drawback lies in capturing the dependencies
between different domains of an enterprise. ArchiMate is an artis-
tic attempt at extracting and expressing the relationships concretely
between domains.
The IBM Rational System Architect addresses EA enablement needs by
providing a repository-based graphical modeling and analysis solution
that facilitates the collection and analysis of information about enterprise
elements. The use of shared enterprise element repositories provides a line
of sight from strategic enterprise plans to the operations, information,
applications, and infrastructure needed to implement these plans opti-
mally. The powerful system architect business intelligence (BI) reports
powered by an embedded IBM Cognos reporting engine expands EA vis-
ibility by providing business and IT decision makers the information they
need to consolidate resources, implement successful projects, and propose
new projects.
Cloud EA: Frameworks and Platforms • 131
why they differ. The importance of this work lies in the fact that harmo-
nizing processes is the key to harmonizing systems. Information sys-
tem functions form the link between business processes and IT systems
by describing a system in terms of its functionality. This allows these
systems to be reused in business processes to document the IT system
functionality required by a specific business function. An impact analy-
sis then provides an easy way of establishing the extent to which an IT
system is embedded in business processes and whether some IT systems
duplicate the same functionality. Similarly, the ARIS EA solution serves
as a helping hand in engineering other architectural styles (application,
information, and infrastructure) and connecting them with business
processes.
Benefits of the ARIS EA solution include the ability to identify which
critical business processes at which locations are affected and will
therefore need to be part of the migration project when replacing an
IT system. Planners and IT managers can navigate the entire EA, fol-
lowing object relationships, and make informed decisions based on a
holistic view of the company and a shared methodology. Users can com-
pare the IT standards and target architectures defined in the repository
with the actual situation and create a road map for future development.
Importantly, ARIS Business Architect facilitates organization-wide EA
management by supporting distributed teams. The resulting architec-
ture information can be documented with the help of ARIS Business
Publisher, a dynamic publishing tool, in a way that meets the needs of
specific groups. The bringing together of business process design and
IT architectures allows coordinated management of these two areas,
enabling the kind of integrative approach that is particularly important
for successful EA management given the interdependency of processes
and IT structures.
In conclusion, by creating a seamless interconnection between IT and
process architecture in a single repository from strategy level to infra-
structure level, the ARIS EA solution makes it possible to fully align IT
systems with business needs.
Sparx Systems’ Enterprise Architect is a visual platform for designing
and constructing software systems, for business process modeling, and for
more generalized modeling purposes. The Enterprise Architect is a pro-
gressive tool that covers all aspects of the development cycle, providing
full traceability from the initial design phase to deployment, maintenance,
testing, and change control phases.
Cloud EA: Frameworks and Platforms • 133
CONCLUSION
The essence of an EA initiative is to establish an organization-wide road
map to achieve the organization’s mission through optimal performance
of its core business processes within an efficient and adaptive IT environ-
ment. Simply stated, EAs are the blueprints for systematically defining
an organization’s current (baseline) or desired (target) environment. The
EAs are essential for evolving information systems and developing new
systems that optimize their mission value. This is accomplished in logi-
cal or business terms (e.g., business goals, business functions, informa-
tion flows, and systems environments) and technical terms (e.g., software,
hardware, communications) and includes a validated and verified plan for
transitioning from the baseline environment to the target environment. If
defined, maintained, and implemented effectively, these blueprints assist
in optimizing the interdependencies and interrelationships among the
business operations of the enterprise and the underlying IT that automate
such operations. In the absence of a sound EA program and an empow-
ered department for diligently overseeing the EA road map, enterprises
run the risk of buying and building systems that are duplicative, incom-
patible, and unnecessarily costly to maintain and interface.
In this chapter, we discussed the leading EA frameworks, tools, plat-
forms, and languages that play a vital role in swift and successful EA devel-
opment. Even with the emergence of the powerful cloud technology, the
relevance of meticulously working toward EA initiative and implementa-
tion does not diminish a bit. Instead, enterprise architects are mandated to
consider more possibilities, opportunities, and even risks to arrive at cloud-
compliant EAs. As implementation of cloud technology ultimately leads
to heightened IT resource utilization, the scope, visibility, and vivacity of
cloud-mediated EAs grow sharply. Current EA tools and other utilities are
accordingly modernized to work successfully in the imminent cloud era.
Hopefully, EA frameworks will undergo a series of shifts to incorporate the
features of cloud technology that will augment and accelerate IT processes.
REFERENCES
1. Zachman International, Inc. 2012. “Zachman Framework,” http://www.zachman
.com.
2. Sessions, R. 2007. “A Comparison of the Top Four Enterprise-Architecture Methodo
logies,” ObjectWatch, http://msdn.microsoft.com/en-us/library/bb466232.aspx.
134 • Cloud Enterprise Architecture
3. Singer, W. 2007. “The Origins and Purpose of the Zachman Enterprise Framework,”
Cambridge Technical Communicators, Cambridge, UK, http://www.tud.ttu.ee/
material/enn/IDU0080_2011/12ProcessMeasurement/zachman_framework.pdf.
4. Covington, R., and H. Jahangir. 2009. “The Oracle Enterprise Architecture
Framework,” Oracle Corporation, Redwood Shores, CA, http://www.oracle.com/
technetwork/topics/entarch/oea-framework-133702.pdf.
5. Sparx Systems. 2012. “Enterprise Architect,” Sparx Systems Pty Ltd., Victoria,
Australia, http://www.sparxsystems.com.
6. Visual Paradigm. 2011. “Enterprise Architecture (EA) Tools,” Visual Paradigm, Hong
Kong, China, http://www.visual-paradigm.com.
7. IFEAD. 2011. “Enterprise Architecture Tools Overview,” Institute for Enterprise
Architecture Developments, http://www.enterprise-architecture.info/EA_Tools.htm.
8. Troux Technologies, Inc. 2012. “Enterprise Portfolio Management (EPM) Solution,”
Troux Technologies, Inc., Austin, TX, http://www.troux.com.
9. Casewise Ltd. 2012. “Business Process Analysis (BPA), Business Process Management
(BPM), Enterprise Architecture and Governance, Risk & Compliance,” Casewise
Ltd., Stamford, CT, http://www.casewise.com.
10. Innis, W., ed. “System Architect Information—The Enterprise Architecture Tool,”
IBM developerWorks, http://www.ibm.com/developerworks/rational/products/
systemarchitect/enterprisearchitecturetips.html.
11. MEGA International. 2012. “EA Tools,” MEGA International, London, UK, http://
www.mega.com/en.
12. IFEAD. 2012. “Information Exchange Area of the Institute For Enterprise Architecture
Developments,” Institute for Enterprise Architecture Developments, http://www
.enterprise-architecture.info.
13. Orbus. 2012. “Orbus website,” Orbus Software, Washington, D.C., http://www
.orbussoftware.com.
14. The Open Group. 2012. “Welcome to TOGAF® Version 9.1 ‘Enterprise Edition’,” The
Open Group, Berkshire, UK, http://www.opengroup.org/togaf.
15. The Open Group. 2012. “ArchiMate®,” The Open Group, Berkshire, UK, http://www3
.opengroup.org/subjectareas/enterprise/archimate.
16. IFEAD. 2012. “Enterprise Architecture Tool Selection Guide,” Institute for Enterprise
Architecture Developments, http://www.enterprise-architecture.info.
5
Cloud Application Architecture
INTRODUCTION
“Any sufficiently sophisticated technology is nearly indistinguishable from
magic” is a palatable and pampering quote made by many technocrats and
industry icons. This is definitely a magical and mesmerizing world, and
we are overwhelmingly surrounded and supported by a stream of people-
centric technologies in all walks of our daily life. Technologies are indis-
pensable for not only growing business enterprises but also the teeming
population all over the world. The service oriented architecture (SOA) is
certainly being established as a disruptive and transformative business tech-
nology for the booming ICT domain. The distinct and decisive factors and
facets of SOA are that it is extremely simple, supple, extensible and, above
all, aligned to business. Due to its extreme flexibility and adaptivity, several
business behemoths and IT powerhouses create, demonstrate, and sustain
their own service oriented architectures, frameworks, programming mod-
els, and tools. For example, Cisco Systems, Inc., San Jose, California, has
successfully formulated service-oriented networking architecture (SONA)
to closely and compactly acquaint and associate their products, skills, and
services with the blooming service orientation (SO) concepts. For the device
world it is service-oriented device architecture (SODA), whereas for enter-
prises it is SOE architecture (SOEA). For the cloud era, it can be service
oriented cloud architecture (SOCA). However, there are some incredible
gaps between what is expected out of SOA by business executives and what
is being currently supplied by SOA; hence, there are focused efforts toward
the empowerment of SOA in order to close the identified gaps between the
enterprise IT landscape and the constantly evolving business realities.
Having grasped the tactical as well as strategic weaknesses of current
SOA implementations, software infrastructure providers and market
135
136 • Cloud Enterprise Architecture
database servers for data persistence and management. On the data side,
for realizing information visualization, data mining and analysis, action-
able insights extraction, and decision-enablement, advancements such as
BI servers and data marts, cubes, and warehouses are being accomplished .
With distribution and integration requirements going up, the complexity
of the business layer is bound to climb further. Due to the deeper penetration
of IT into every conceivable domain these days, a cornucopia of business
automation, acceleration, and augmentation packages such as ERP, supply
chain management (SCM), CRM, sales force automation (SFA), and knowl-
edge management (KM) has come to the forefront. Due to the long-term
advantages of indirect connectivity, a number of integration backbones,
brokers, buses, hubs, and fabrics have also come up. Security management
is another crucial requirement. In a nutshell, the business layer is an aggre-
gation of several local as well as remote modules. As described in succeed-
ing sections of this chapter, services are the key application building blocks
and SOA is the next-generation application development method.
FIGURE 5.1
Evolution of software building blocks.
Cloud Application Architecture • 139
well as professional applications. The origin and the growth story of SOA
are incredibly and inspiringly phenomenal.
Finally, SOA has the wherewithal to provide unbelievably enormous
amounts of assistance and assurance for cloud technology and, ultimately,
for realizing the promised knowledge era. The service revelation is catch-
ing up and, as a striking consequence, the new subject of service science
(SS) is spreading its wings wider. Service engineering is another intriguing
discipline undergoing a meteoric rise in importance among students and
scholars. The service orientation (SO) paradigm has brought in a dazzling
array of innovations and improvisations in forming and formulating nim-
ble business models especially in the areas of deployment, delivery, con-
sumption, and pricing. The growing service community has unleashed an
abundance of best practices, design metrics, key guidelines, proved meth-
odologies, and tool sets to make the service idea more pragmatic and people
centric. The fast-growing SaaS model (all varieties of software are centrally
and remotely hosted, managed, and delivered as services to global users
over any network), which is a direct derivative of SOA, rekindles a sense of
hope and buoyancy among industry veterans and newcomers alike.
EXEMPLARY ENHANCEMENTS IN
THE SERVICE PARADIGM
Since its inception, the service paradigm has been undergoing a number
of notable corrections and incredible value additions. In the following sub-
sections, we discuss the leading transformations that have occurred in this
paradigm.
and respond (S&R) systems. For that to fructify, patentable and process-
level technological solutions need to be devised. The SOA inherently guar-
antees extreme flexibility by bringing in a number of indirection layers, and
this way of thinking has clearly alleviated problems arising from unwanted
dependencies. Precisely speaking, there is no tight coupling between differ-
ent elements in the SOA stack. For example, process description, process
flow, implementation logic, business rule, and so on, are cleanly segregated
and they work together at runtime on a need basis. Separation of concerns
is a mainstream software engineering technique, and the AOP paradigm has
successfully adopted it in order to support inversion of control (IoC, alterna-
tively termed dependency injection) concepts to neatly isolate repeated con-
cerns. Services leverage aspects for some specific purposes. Another beauty
of the SOA paradigm is that it enables perfect abstraction and encapsulation
of business capabilities. Service virtualization is becoming very common.
One of the most distinguishable points of SOA is its process centricity,
that is, there is a closer tie-up between processes and services in SOA.
Business process modeling, control, engineering, and innovation are tak-
ing an altogether new perspective due to the massive adoption of SOA.
First, process models are being made machine readable, persistent, and
processable. Second, the process models are more open in the sense that
they are even attached with details regarding implementing services, run-
time platforms, and other interacting peripherals. Due to the astound-
ing popularity of EDA, event-generating and event-consuming agents are
also glued to process models (event-driven business processes). In short,
process models are becoming formal, comprehensive, and consolidated
so that they can be persisted, manipulated, and reused at a later point in
time. In short, all kinds of next-generation requirements, such as alacrity,
real-time response, adaptivity, and extensibility, can be attached to models
at the process level itself. Another dimension is that business processes
are made lean through optimizations. This process improvisation has a
definite and direct impact on SOA.
Several important SOA attributes are highlighted in the literature. The
foremost one is that in an SOA, business rules can be abstracted from
the underlying implementation code. Traditional enterprise applications
are monolithic, feeble, and tightly packaged. They try to be as all-
encompassing as possible and to keep all the business and support func-
tionalities together. The often-changing process details are embedded for
delivering value to users. However, this containment makes it difficult to
bring in desired changes. Embedded processes (tightly integrated logic
146 • Cloud Enterprise Architecture
Service Service
provider provider
Events Events
Service Service
provider provider
Service
consumer
FIGURE 5.2
Implementing composite services using events. (From Boris Lublinsky, “Service
Composition,” Jul 26, 2007 an article on http://www.infoq.com.)
150 • Cloud Enterprise Architecture
Service Service
provider provider
Service
mediator;
orchestration
engine
Service Service
provider provider
FIGURE 5.3
Implementing composite services using an orchestration engine.
Service-Oriented BI
Information is power and the strategic asset for any corporation to predict
the near future. Transitioning information into knowledge and wisdom
is an imposing challenge for IT specialists. Data integration technologies
and tools are hence very much in demand. In the beginning, data integra-
tion was handled by the well-known process of extract, transform, and
load (ETL), which is a batch-driven process focused on integrating data
during the nighttime. In today’s connected marketplace, businesses do
Cloud Application Architecture • 151
not have a quiet time for this process to occur. The corporate data pool
is being constantly diversified with novel initiatives and this has resulted
in a variety of new data files and types. Another trend is that there are
millions of business events happening every day that encapsulate mission-
critical data. Real-time data sharing and notification is expected by man-
agers, sales teams, and end-users. Unfortunately, the current ETL process
is not designed to handle such expectations, that is, there is a need for
incorporating real-time data integration facility with the batch integra-
tion process. This has caused visionaries to focus on SOA for real-time
data integration. Within a service solution, these events are readily routed,
consumed, and integrated as part of an EDA process. For real-time data
integration, researchers have come out with different options including the
popular data mashup and EII-based information as a service. Enterprises
are increasingly incorporating a data middleware (termed an enterprise
data bus [EDB]), which is a collection of versatile and composite data ser-
vices and adapters that seamlessly integrate dissimilar and distributed
data sources in real time.
Data integration is the major contributor to the success of BI and cor-
porate performance management (CPM). Therefore, industries are very
optimistic about the much-trumpeted service-oriented, collaborative,
semantic, real-time, dynamic, and operational BI (which is connoted as BI
2.0) [14]. As SOA is the intellectual fountainhead of technologies realizing
BI 2.0, service-oriented BI (SOBI), the new jargon, has become very popu-
lar and BI services are being used to seamlessly connect and aggregate
data for extraction and dissemination of actionable insights in real time.
presents the interfaces of both the offered service and the service reference
it depends on. A composite creator (assembler) wires the component ref-
erences to either services offered by other components or some external
services.
Every functionality piece can be implemented in the language most
suited to it and run in the best runtime. The idea is that all the pieces
are integrated together in a simple and standardized way to build service-
oriented applications. The promise given by SCA is that developers can
use various languages running on different runtime engines to implement
different parts of an application. For example, BPEL, Java, C++, another
SCA composite application, a rule engine, a workflow engine, and technol-
ogy adapters to interact with databases, queues, and file systems all work
toward the ultimate goal of establishing a composite application and real-
izing its sustainability. Each such part of the application is called a service
component. Each service component publishes a contract that describes
its interface through a web service development language (WSDL) docu-
ment. The developers just specify the functional link between different
parts of the application and it is the prerogative of the SCA container or
runtime engine to use the best communication protocol (native or binary)
among the components.
The service components are loosely coupled and can work together
without any knowledge about each other’s implementation. This feature
ensures flexibility and allows replacement of one service component with
another. The SCA also specifies how the behavior of an application can be
made configurable to allow administrators to apply respective changes in
behavior without redeployment of the application. Service location can be
changed at runtime without any impact on the availability of the applica-
tion. The QoS aspects such as security and reliability can be configured
accordingly, that is, configuration-centric implementation is realized. The
SCA composite application can be assembled from a collection of SCA
composites, which are then turned into deployable units.
In a nutshell, SCA is a service-based composition model for creating
easily deployable and maintainable business solutions. The SCA provides
special capabilities to noninvasively reengineer existing business function-
alities into new, value-added, and process-centric solutions. It comes with
a proven mechanism to build coarse-grained components as assemblies of
fine-grained components. The SCA eventually relieves programmers from
the drudgery of traditional middleware programming by abstracting the
code for discovery, connectivity, and intermediation from business logic.
Cloud Application Architecture • 153
XM
Lt
h
HT roug
TP h
Application WS Package X
A client
Service
Service component
A A
Application Y
FIGURE 5.4
Composites generated from distributed service components and exposed to client appli-
cations and agents.
• The WSDL and XSD files that describe the interfaces (contracts)
of the application as a whole (the services it exposes), as well as the
service components running inside the application.
154 • Cloud Enterprise Architecture
• Files that are programs to run in BPEL and mediator engines or that
define the human task to be performed by an end user.
• Files that describe how the SCA components are wired together to
exchange XML messages to be processed at runtime.
• Definitions for how XML messages are to be transformed en route
from one component to the next.
• Some XML files provide configuration details for adapters that can
be used by the composite application to communicate with external
technology platforms, such as databases, file systems, e-mail servers,
and message queues.
Service Composition
Services are endowed with several significant capabilities that can decimate
most of the known constrictions of enterprise software engineering. Services
are generally business-aligned, state-of-the-art, and modular functional
units. The intrinsic interoperability feature guarantees smooth and studi-
ous integration of distributed and diverse service components that could
have been carved out of legacy assets through modernization. Or the com-
ponents could even be freshly crafted by utilizing the latest technologies.
Cloud Application Architecture • 159
formed over the web for greater initiation and interaction. Rich Internet
applications (RIAs) are being built for multifaceted environments. Hence,
there is no doubt that services join in this web-sponsored collaboration
toward greater and better service utility and usability.
Due to the unprecedented penetration of Internet infrastructures across
continents, various phenomena such as global-scale distribution, resource
sharing, electronic data interchange (EDI), and multisite enterprise appli-
cations have become buzzwords today. Another trend is that in order to
significantly reduce complexity, systems are segmented and sliced into
cooperative components (modularization). The interoperability of these
modules enable business integration as the modules can proactively dis-
cover and discern other modules and conduct dialogs with one another
(locally and remotely) at runtime in order to understand and accomplish
situation-specific needs of users intelligently and resiliently. Stricter com-
pliance to emerging open standards does bring in seamless interoper-
ability that in turn leads to cool coordination, coexistence, and runtime
substitution.
Collaboration enables effective resource sharing among various partici-
pants in any environment; the much-acclaimed shared model of comput-
ing resources and services is set to gain greater hold with the increasing
availability of groupware along with connectivity, conferencing, and
collaboration-enabling software. Device clusters, grids, and ensembles are
fine examples of incredible resource collaboration and sharing. Services
must be collaborative for them to be found, bound, and used at runtime. In
short, collaboration and composition happens uninhibitedly and thrives
in any integrated environment.
Modernization is the biggest challenge for Fortune 500 companies today
as they have a lot of application and data silos loaded in monolithic and
legacy mainframes, which are famous for their high TCO, high through-
put, less flexibility, and deep complexity. However, rewriting or replacing
legacy systems is not a viable option due to time, cost, and compatibility
constraints and, hence, modernization is being touted as the best way out.
Modernization not only joins such legacy systems to mainstream comput-
ing but also maintains the greatness and exactness of mainframe systems.
Concepts such as web, service, grid, cluster, cloud, and mesh-enablement
are being recommended to meet the goal of standardized migration and
modernization. It is noted that SOA is all about service-enabling software
artifacts and assets (in a noninvasive fashion) so that they can find each
Cloud Application Architecture • 161
Service registry
Dynamic interfaces and integrated views
and Knowledge base
repository
Adaptive processes
FIGURE 5.5
Reference architecture for SOA 2.0.
other and fuse with one another to construct and consolidate required
business functionality and contribute to the quick evolution of business
strategies.
These developments ease the realization of NG-SOA, which is policy
based, goal aware, event driven, process centric, self-governed, applicable
in real time, and adaptive. Figure 5.5 vividly illustrates the reference archi-
tecture for SOA 2.0.
Service Composites
With SOA set to become disruptive, enterprises have zeroed in on services
and their emphatic derivatives such as composites. Composites will be the
stylish and smart building blocks for next-generation business systems.
As is widely known and understood, decomposition helps to mitigate the
burgeoning complexity of software, whereas composition supports deriv-
ing sophisticated software libraries and packages rapidly and effortlessly
through configuration and maneuvering of already implemented and sus-
tained services. Composition is projected to occur at each layer of the SOA
stack. That is, composite views, processes, applications, services, and data
will be the pioneering faces of IT tomorrow. This phenomenon will defi-
nitely evolve further and a suite of implementation patterns, platforms,
procedures, practices, and so on, will rise together to take the futuristic
composite oriented architecture (COA) forward.
162 • Cloud Enterprise Architecture
Service Meshes
As experts all over the world are pondering the ways and means of achiev-
ing the vision of IoS and IoT, several things are falling in place concur-
rently and coincidently. The IoT idea is the most logical one for the future
Internet. We already have the Internet of computers and, nowadays, we are
experiencing the Internet of electronic devices, handhelds, smartphones,
and so on. In other words, the web-enablement functionality has been a
blessing and boon for people to have information and service access from
any device, anytime, and anywhere. The next assignment is to empower
our daily and tangible objects to become digital artifacts/smart objects
(embedding computation, communication, sensing, and actuation capa-
bilities on common and everyday articles and assets; wrapping such arti-
cles with one or more standardized service interfaces to enable deep and
extreme connectivity and integration with other smart objects in a net-
work, etc.). Local as well as web integration of smart objects enables them
to spontaneously participate in and contribute to the enhancement of
comfort, convenience, choice, and care of human beings. In other words,
every single artifact is cognition-enabled to know itself and to understand
its whereabouts, surroundings, owners, users and historical interactions,
transactions, and so on. Awareness of self, surroundings, and situations is
the strategic goal.
The much-acclaimed integration supports establishing smart environ-
ments (e.g., smart homes, hotels, hospitals, and offices) and realizing the
vision of the glowing concept of AmI. Another twist is that all kinds of
physical systems at our working and walking environments are becom-
ing integrated (directly or indirectly) with remote cyber systems through
a deluge of middleware packages. Thereby, the discipline of cyber physical
systems (CPS) is receiving a lot of attention these days. Leading product
companies give different terminologies for the paradigm of smart environ-
ments. Cisco concentrates on connected cities, IBM focuses on the smart
planet, HP insists on adaptive enterprises, university scholars do research
Cloud Application Architecture • 163
on intelligent homes, and nations such as Japan are turning toward smart
railway stations. In short, smart objects and service-oriented cloud infra-
structures all team up and synergize to create and sustain generic as well as
specific active, aware, and articulate spaces [18].
The gist of the service paradigm is the compact meshing of services
as per the changing context in producing intelligent service meshes to
produce and deliver people-centric services. Services are capable of min-
gling and meshing with one another in a network as semantics are being
increasingly attached with services, policies are being incorporated at
runtime, decision-making abilities are being supplied internally and
externally through knowledge bases, and so on. It is noted that the service
idea is tending toward making every single element a service-consuming,
service-providing, or service-brokering entity. Thus, it is obvious that ser-
vice meshing will be the primary key for future IT.
As articulated earlier in this section, the service paradigm brings in
some delectable and desired changes for the total IT landscape. Every tan-
gible thing (hardware as well as software) is being expressed and exposed
as a service. In other words, not only high-end servers in data centers and
server farms but also every wearable, portable, implantable, nomadic,
mobile, fixed, and handheld device on the user side is becoming a service-
emitting electronic gadget. With digitalization penetrating into ordinary
articles, every commonly and casually found item in our surroundings
becomes digitally empowered to participate and fructify the vision of
AmI. In a nutshell, every tangible thing is viewed as a contributive object
enabling the production of exotic services and applications for the ensuing
knowledge era.
Services have come as viable virtualization elements for all kinds of IT
resources. With the embedded virtualization field set to grow fast, virtual
devices will be created on demand, using the disruptive service idea. That
is, services could virtualize devices quite easily. In other words, devices
hide behind service interfaces. This SOA-sponsored advancement plays
a vital role in building highly competent and cognitive device ensembles
and meshes that are the chief modules for setting up and sustaining smart
environments.
Service meshes are very much constructive and contributive for not only
the embedded space but also the enterprise space. The service model leads
to on-demand and dynamic collaboration among a family of spatially dis-
tributed and decentralized services (atomic as well as composite) to result
in cost-effective and QoS-compliant business services and solutions.
164 • Cloud Enterprise Architecture
Service Mashups
Mashup is a new buzzword in the Web 2.0 world. Key drivers that facili-
tated the growth of mashups are first, the zooming growth of the web as
the world’s largest digital library and cheapest business application plat-
form, and second, the emergence of several key implementation technol-
ogies. Incidentally, Web 2.0 technologies have been nurtured decisively
in order to guarantee enhanced user participation and collaboration
within the web. With techniques for automated discovery, linking, syn-
chronization, syndication, and presentation attaining marked maturity,
A C
B
A B
A C D
D C D
FIGURE 5.6
Meshing of composites.
Cloud Application Architecture • 165
the applicability rate for the raging mashup concept increases with the
consistent unearthing of newer web contents such as widgets, services,
agents, beans, and portlets. Mashup platforms find, corroborate, and cor-
relate such web contents to form integrated and intelligent applications
with dynamic and rich views.
A mashup literally represents a smart blending of different resources
from distributed sources to create a new, purposeful, and integrated
application. The most telling advantage is the ease of construction,
deployment, and use of a mashup. Even subject-matter experts (SMEs)
and business analysts can create business-aligned mashups. Primarily,
there are data and service mashups. Service concepts have mingled
nicely with the mashup paradigm, and this seamless union will acceler-
ate generation and use of mashups in the days to come. Service mashup,
a special kind of composite service, is defined as a design-time or run-
time aggregate of heterogeneous services owned by different people. As
the service era unfolds, we will definitely be bombarded with a growing
array of services. Network services can be identified, matched up for their
compatibilities and capabilities, and mashed up (Figure 5.7) to construct
value-added and business-aligned composites. With the overwhelming
acceptance of SaaS in IT, even mashup is empowered and exposed as
a service (mashup as a service [MaaS]). Mashups, being business-aware
composites, can be remotely found and linked to form business applica-
tions quickly.
Shipping services
Mashup
CRM
services Inventory
services
FIGURE 5.7
Service mashups.
166 • Cloud Enterprise Architecture
Service Grids
It is a well-known fact that ESB is the most prevalent and central-
ized integration platform for distributed services. In order to meet
Cloud Application Architecture • 167
SOA Fabrics
Fabric architecture is a resilient method in several scenarios. Products
complying with fabric structure and behavior are therefore definitely
popular. This is the primary motivation for constructing fabric-compliant
SOA products to achieve affordability and affability. When SOA received
much attention and coverage in the press and amongst other interested
parties, most of the EAI vendors quickly jumped on the SOA bandwagon
and upgraded their products to be compatible with SOA principles.
Basically, ESB is an extended messaging infrastructure leveraging bus
168 • Cloud Enterprise Architecture
A B B
A C
D C
D
Service grid
B
A B
A C
B D
D C D
FIGURE 5.8
Centrality of the service grid in next-generation service systems.
Smart Hospital
Creating and sustaining smart environments and enterprises is the ulti-
mate vision of next-generation IT [12]. Researchers are unfolding a suite of
SOA
Collaboration
Composition
Reusability
lity
abi
Modernization Governance per
ntero
I
Integration
Software as services
Service grids AJAX
Applications as platforms
RSS
Autonomy Unintended uses
A
Portlets
WO
2.0
Openness Visually rich
Web
Recombinant
Real time
software
Desktop experience
Asynchronous
Mashups
FIGURE 5.9
Convergence of Web 2.0 and SOA for realizing WOA.
combination of Web 2.0 technologies and SOA leads to the era of rich
enterprise applications (REAs). Synchronization, richness, dynamic com-
position, real-time interaction, and so on will become the norm.
CONCLUSION
Every incredible and distinguishable technology, process, and product is
invariably given adjectives such as next generation, futuristic, and smart
these days. Some have even gone to the extent of adjoining numerical
adjectives such as 2.0 for marking and marketing new-generation evolving
technologies. We are stepping into the era of Computer Science 2.0, which
Cloud Application Architecture • 181
REFERENCES
1. Andy, M., R. Daniels, and T. Hall. 2008. “The Cloud and SOA—Creating an
Architecture for Today and for the Future,” Capgemini and HP, http://www.hp.com/
hpinfo/analystrelations/wp_cloudcomputing_soa_capgemini_hp.pdf.
2. IBM Corporation. November 2007. “Smart SOA: Best practices for agile innovation
and optimization,” IBM Corporation, ftp://ftp.software.ibm.com/software/solutions/
soa/pdfs/WSW14001-USEN-00_smart_soa_FINAL.pdf.
3. Ter Beck, M. H., A. Bucchiarone, and S. Gnesi. 2007. “Web Service Composition
Approaches: From Industrial Standards to Formal Methods.” Second International
Conference on Internet and Web Applications and Services (ICIW’07), Mauritius, May
13–14, 2007, http://fmt.isti.cnr.it/WEBPAPER/final-ICIW07.pdf.
4. van Hoof, J. February 2007. “SOA and EDA: Using Events to Bridge Decoupled
Service Boundaries.” SOA Magazine, Issue IV.
5. Bajwa, I. S., R. Kazmi, S. Mumtaz, M. A. Choudhary, and M. S. Naweed. 2008.
“SOA and BPM Partnership: A Paradigm for Dynamic and Flexible Process and
I.T. Management,” World Academy of Science, Engineering and Technology 45, http://
www.waset.org/journals/waset/v45/v45-4.pdf.
6. Wikes, L., and R. Veryard. 2007. “Extending SOA with Web 2.0,” Everware-CBDI,
Inc., ftp://public.dhe.ibm.com/software/solutions/soa/pdfs/CBDI_IBM_SOA_and_
Web_20.pdf.
7. OASIS. 2012. “SCA: Support for Composing Existing Applications in an SOA
Solution,” OASIS Open CSA, http://www.osoa.org.
8. Leutenmayr, S. 2007. “Selected Languages for Web Services Composition: Survey, Chal
lenges, Outlook.” PhD Thesis, http://www.pms.ifi.lmu.de/publikationen/diplomarbeiten/
Stephan.Leutenmayr/Diplomarbeit%20Stephan%20Leutenmayr.pdf.
182 • Cloud Enterprise Architecture
9. Wang, W., W. Yu, Q. Li, W. Wang, and X. Liu. 2008. “Service-Oriented High Level
Architecture,” Simulation Interoperability Standards Organization, Edinburgh,
Scotland, http://arxiv.org/ftp/arxiv/papers/0907/0907.3983.pdf.
10. Lublinsky, B. July 26, 2007. “Service Composition,” http://www.infoq.com/articles/
lublinsky-soa-composition.
11. Arcitura Education, Inc. 2012. “Service Technology Magazine”, Arcitura Education,
Inc., http://www.soamag.com.
12. Trifa, V. M., C. M. Cianci, and D. Guinard. 2008. “Dynamic Control of a Robotic
Swarm Using a Service-Oriented Architecture,” http://www.im.ethz.ch/publications/
180__Trifa_paper.pdf.
13. TIBCO. 2012. Service-Oriented Architecture (SOA) Resource Center, TIBCO
Software, http://www.tibco.com/solutions/soa/default.jsp.
14. Anicic, D., M. Brodie, J. de Bruijn, D. Fensel et al. 2006. “A Semantically Enabled
Service Oriented Architecture,” http://www.heppnetz.de/files/wimbi2006.pdf.
15. “Service Oriented Architecture—SOA,” IBM, http://www-306.ibm.com/software/
solutions/soa.
16. Raj, P. “Information Technology Portal,” http://www.peterindia.net.
17. Karimi, O., and N. Modiri. September 2011. “Enterprise Integration Using Service
Oriented Architecture.” Advanced Computing: An International Journal 2 (5): 41–7.
18. IBM Global Technology Services. 2008. “How Service-Oriented Architecture
(SOA) Impacts Your IT Infrastructure: Satisfying the Demands of Dynamic
Business Processes,” IBM Global Technology Services, http://www.majorcities.eu/
generaldocuments/pdf/ibm_soa_satisfying_the_demands_of_dynamic_business_
processes.pdf.
6
Cloud Data Architecture
INTRODUCTION
Business and IT environments are becoming very dynamic as there are
incredible changes taking place and challenges rising up in the market-
place as a result of the tottering economy, ever-changing government rules
and regulations, and ever-increasing expectations and specific preferences
of customers. Promising technologies with much potential; production
of standards-compliant IT infrastructures; mass availability of slim and
sleek devices; speedy evolution of the pervasive web; purpose-specific
handy and trendy appliances; infinitesimal and invisible tags, labels, and
stickers; productivity-enhancing solutions; and connectivity products are
completely redefining the IT landscape. In such a constantly changing
environment, executives need to take insightful yet timely decisions to
steer their enterprises in the right direction on the chosen paths. In other
words, delivering actionable insights to decision makers goes a long way
in arriving at the right decision at the right time. It is very clear that every
aspiring industry is therefore leaning toward agile and adaptive BI sys-
tems, which are in place to precisely and perfectly anticipate, augment,
and advance its journey. Next-generation BI systems are concisely descrip-
tive, creatively prescriptive, and cognitively predictive in establishing
smart enterprises.
The pressure on IT to deliver the right information at the right time
is on the rise. This is achieved by using a combination of historical data
found in data warehouses and data marts, low-latency data found in
operational data stores, and real-time data obtained from operational sys-
tems. In other words, there is a strong need for elegant and exemplary
data integration platforms, practices, and procedures in order to pro-
vide an integrated and insightful view of data to various stakeholders.
183
184 • Cloud Enterprise Architecture
residence in the clouds. Especially on the data level, there are plenty of
cloud-based databases, master data management (MDM) systems, pre-
dictive analytics modules, data marts, cubes and warehouses, decision
making systems, business intelligence (BI) tools, database management
systems, data integration containers, engines, platforms, brokers, buses,
fabrics, and so on. Aside from remedied and rejuvenated techniques and
tips, practices, processes, and patterns are being experimented with and
explained in order to simplify and streamline cloud analytics. In this
chapter, we discuss and detail all the data-related systems and how they
interrelate to perfectly accomplish what was originally intended as the
cloud vision.
Data are flowing in torrents into every area of the global economy.
Companies churn out a burgeoning volume of transactional data,
capturing trillions of bytes of information on their customers, sup-
pliers, and operations; millions of networked sensors are being
embedded in the physical world in devices such as mobile phones,
smart energy meters, automobiles, and industrial machines that
sense, create, and communicate data in this age of IoT. Indeed, as
companies and organizations go about their business and inter-
act with individuals, they generate tremendous amounts of digital
“exhaust data,” that is, data created as a byproduct of other activities.
Social media sites, smartphones, and other consumer devices includ-
ing PCs and laptops have allowed billions of individuals around the
world to contribute to the amount of big data available. The growing
volume of multimedia content plays a major role in the exponential
growth of the amount of big data. Each second of high-definition
video, for example, generates more than 2000 times the number of
bytes required to store a single page of text. In a digitized world, con-
sumers in their day-to-day life—communicating, browsing, buying,
sharing, searching—create their own enormous trails of data.
The McKinsey Global Institute (2011) Report on Big Data.
the past five decades. Now, with the eruption of big data and its enabling
platforms, corporate houses and consumers are yearning for better and
bigger value derivation. Indeed, big-data computing breeds innovations
that realize robust and resilient productivity-enhancing methods, means,
and models for sustaining business value. The hidden treasures of big data
are being technologically exploited to the fullest extent by businesses in
order to zoom ahead of their competitors. Big data–inspired technology
clusters facilitate new business acceleration and automation mechanisms.
In a nutshell, the scale and scope of big data is to bring forth numerous
noteworthy transformations.
For governments, the big-data journey ensures a bright and blissful oppor-
tunity to boost their efficiency in delivering citizen services. With the use of
big data, IT spending comes down while IT-based automation is enhanced.
There are research results enforcing the view that the public sector can boost
its productivity significantly through the effective use of big data.
When big data is dissected, distilled, and analyzed in combination with
traditional enterprise data, corporate IT can gain a more comprehensive
and insightful understanding of its business, which can lead to enhanced
productivity, a stronger competitive position in the marketplace, and an
enabling atmosphere for greater and grandiose innovations. All these will
have a momentous impact on the bottom line.
For people, big data delivers a growing array of incredible benefits. For
example, the use of in-home and in-body monitoring devices such as
implantable sensors, wearables, fixed and portable actuators, robots, com-
puting devices, LED displays, and smartphones having ad hoc networking
capabilities to accurately measure vital body parameters and monitor prog-
ress continuously is a futuristic way to drastically improve the health of
patients. In other words, sensors act as the eyes and ears of new-generation
IT and their contribution spans from environmental monitoring to body-
health monitoring. These kinds of creative and catalytic advancements
happen to be a breeding ground for crafting elegant and exotic services.
Sellers and shoppers can gain much from communication devices and
information appliances. The proliferation of smartphones and other
global positioning system (GPS) devices offers advertisers an opportunity
to target consumers when they are in close proximity to a store, coffee
shop, or restaurant. This opens up uncharted avenues of fresh revenue
for service providers and businesses. The market share and mind share of
such proactive businesses is bound to grow by leaps and bounds. Retailers
can make use of social computing sites to understand people’s preferences
Cloud Data Architecture • 189
and preoccupations to smartly spread out their reach. The hidden facts
and patterns elicited in this manner can enable them to execute much
more effective microcustomer segmentation and targeted marketing cam-
paigns. Further, they come in handy when one is eliminating supply chain
disturbances and deficiencies.
data that were previously inaccessible to BI. Discovery also comes from
mixing data of various types from various sources. HDFS and MapReduce
together enable exploration of this eclectic mix of big data. There are several
infrastructural components being released and recommended to this end.
The most dominant and prominent ones are NoSQL databases, NewSQL
databases, and the MapReduce-compliant Hadoop software suite.
NoSQL Databases
There are some serious flaws on the part of relational databases that come
in the way of meeting the unique requirements of modern-day social appli-
cations, which are gradually moving to reside in cloud infrastructures
[1,3–5,7–9]. Another noteworthy fact is that data analysis for BI is increas-
ingly happening in clouds. In other words, cloud analytics is emerging
as a hot topic worthy of diligent and deep study and investigation. There
are some interested groups in academic as well as industry circles that are
stretching further and striving hard to achieve the necessary advance-
ments in order to support and sustain traditional databases to cope with
the evolving requirements of social networking applications. However,
new breeds of versatile, vivacious, and venerable database solutions such as
NoSQL and NewSQL are coming up, capturing the imagination of many.
The business need to leverage complex and connected data is driving
the adoption of scalable and high-performance NoSQL databases. This
new entrant to the market evokes and sharply enhances data management
strategies of various businesses. Several variants of NoSQL databases have
emerged over the past decade in order to handsomely handle the tera-
bytes and petabytes of data generated by enterprises and consumers. They
are specifically capable of processing multiple data types. In other words,
NoSQL databases contain different data types such as text, audio, video,
social network feeds, weblogs, and many more that cannot be handled
by traditional databases. These data types are highly complex and deeply
interrelated. Therefore, the demand is to unravel the truth hidden behind
these huge yet diverse data assets. Understanding insights and acting on
them enable businesses to plan ahead.
Having understood the changing scenario, web-based businesses have
been crafting their own custom NoSQL databases to elegantly manage
the ever-increasing data volume and diversity. Amazon’s Dynamo and
Google’s BigTable are the shining examples of homegrown databases that
can store lots of data. These NoSQL databases were designed for handling
Cloud Data Architecture • 191
End-to-End Transactions
Traditional databases are famous for “all or nothing” transactions, whereas
NoSQL databases are given a kind of leeway on this crucial property. This
is because the prime reason for the emergence and evolution of NoSQL
databases was that they can process massive volumes of data quickly to
produce actionable inputs. In other words, traditional databases are for
enterprise applications, whereas NoSQL databases are for social applica-
tions. Specifically, the consistency aspect of ACID transactions is not rig-
idly insisted upon in NoSQL databases. It does not matter much when one
operation fails here and there in a social application. For instance, there
are billions of short messages being tweeted every day and Twitter will
survive if a single tweet is lost. But online banking applications relying on
traditional databases have to ensure very tight consistency in order to be
meaningful. This does not mean that NoSQL databases are off the ACID
hook. Instead, they are supposed to support ACID transactions includ-
ing XA-compliant distributed two-phase commit protocol. The connec-
tions between data should be stored on a disk in a structure designed for
high-performance retrieval of connected data sets while enforcing strict
transaction management. This design delivers significantly better perfor-
mance for connected data than that offered by relational databases.
Enterprise-Grade Durability
Every NoSQL database for an enterprise needs to have the enterprise-
class quality of durability. In other words, a transaction committed to the
Cloud Data Architecture • 193
database will not be lost at any cost under any circumstance. If a flight
ticket is reserved and the system crashes due to an internal or external
problem, the allotted seat must be there even after the system is retrieved.
The durability feature is predominantly ensured through the use of data-
base backups and transaction logs that facilitate the restoration of com-
mitted transactions, despite the occurrence of any software or hardware
hitch. Relational databases have successfully used the replication method
for years to guarantee enterprise-class durability.
Key-Value Stores
A key-value data model is quiet simple. It stores data in key and value pairs
where each key maps to a value. It can scale across many machines but
cannot support other data types. Key-value data stores use a data model
similar to the popular memcached distributed in-memory cache, with a
single key-value index for all the data. Unlike memcached, these systems
generally provide a persistence mechanism and additional functionalities,
such as replication, versioning, locking, transactions, sorting, and other
features. The client interface provides options for data insertions, dele-
tions, and index lookups. Similar to memcached, none of these systems
offer secondary indices or keys. A key-value store is ideal for applications
that require storage of massive amounts of simple data, such as sensor
data, or for data that change rapidly, such as stock quotes. Key-value stores
support massive data sets of very primitive data. Amazon’s Dynamo was
built as a key-value store.
data but often sacrifices the consistency attribute for ensuring the availabil-
ity attribute. Column family databases can accommodate huge amounts
of data and they help to sift through the data very fast. Database writes
are much faster than reads, so one natural niche is real-time data analysis.
Logging real-time events is a perfect use case. Another use case is random
and real-time read/write access to big data. Google’s BigTable was built on
a column family database. Apache Cassandra, the Facebook database, is
another example that was developed to store billions of columns per row.
However, it is unable to support unstructured data types or query end-to-
end transactions.
Document Databases
Graph Databases
goes down, what web services are affected?” and thereby query the graph.
Using traversals, you can easily conduct end-to-end transactions that
represent real user actions.
Cloud Databases
Hadoop is not just for new analytic applications; it can revamp old ones,
too. For example, analytics for risk and fraud that are based on statistical
analysis or data mining benefit from the much larger data samples that
HDFS and MapReduce can extract from diverse big data. Further, most
360° customer views include hundreds of customer attributes. Hadoop
can provide insight and data to bump that up to thousands of attributes,
which in turn provide greater detail and precision for customer-base seg-
mentation and other customer analytics.
In summary, Hadoop is a futuristic technology that allows large data
volumes to be organized and processed while keeping the data on the
original data storage cluster. HDFS is the associated file system.
between the entities, these simple structures often contain just a major
key to identify the data point and a content container to hold the rel-
evant data. This extremely simple and nimble structure allows changes
to take place without any costly reorganization at the storage layer.
INFORMATION-ORIENTED ARCHITECTURE
FOR CLOUD ENVIRONMENTS
There is a comprehensive report on information-oriented architecture
(IOA) authored by Robin Bloor (2011) [24]. This document discusses
the significance of information architecture for cloud enterprises,
describes the best practices on crafting well-defined information
architectures, and specifies the role and responsibility of IOA in shap-
ing futuristic enterprise-scale BI applications.
Software architects tend to adhere to one of two distinctive views of
software: (1) process-centric view and (2) data-centric view. The data-
centric view visualizes a useful collection of well-defined simple and
compound data items that are transformed by various processes into
usable forms for the greater good of the data consumer. The relational
database movement is fundamentally data centric, and software appli-
cations orbit around a database. The applications built using relational
databases are very often data centric. Indeed, with referential integrity,
cascade deletions, database constraints, and stored procedures, the
database does its best to subsume processes.
The process-centric view is the opposite of data-centric view. In other
words, software applications are a set of complex transformations that
are carried out in order to fulfill user needs and, to this end, are fed with
the appropriate data. The object-oriented (OO) movement was actually
process oriented. Objects were collections of processes to which data
could be assigned. Data was something that either persisted, if it were
to be used again, or could be disposed of once used. Both component-
based assembly and service-oriented programming (SOP) are process
centric. As per the service-oriented paradigm, services are the build-
ing blocks for enterprise-class applications and the abstraction unit for
application integration and modernization. For service mashup and
composition, services are the appropriate encapsulation entity. In the
cloud era, services are the delivery unit. Further, services are the imple-
mentation and orchestration unit of business processes, that is, process
tasks are programmatically implemented by services. Services can be
discovered, compared, and combined differently in order to embark on
not only process implementation but also innovation. Precisely speak-
ing, the newer concept of service orientation (SO) establishes a flexible
and futuristic linkage among distributed and dissimilar IT resources
Cloud Data Architecture • 201
Characteristics of IOA
A well-intended information architecture is necessary to establish a
truly agile BI for any enterprise or cloud environment (Figure 6.1). The
first and foremost quality required for an IOA is that it must be com-
plete. The information architecture must accommodate every kind of
BI application used by organizations and every kind of available data
store. It must deliver any information service that any user or program
might require.
1. The BI applications
2. The BI application infrastructures including BI middleware
202 • Cloud Enterprise Architecture
Data management
This space
intentionally
left blank Operational systems
App App
O
V Bloor group
FIGURE 6.1
The information-oriented architecture.
Leading BI Applications
There is a need for new kinds of data stores because the existing rela-
tional databases do not cater well to multidimensional tables. As far as
structured data are concerned, there are four types of storage infrastruc-
tures: (1) the OLAP cubes, (2) data marts, (3) data warehouses, and (4)
operational data stores (ODSs). These are all data stores that are populated
with data from different sources with the use of extensive ETL and data-
cleansing processes. Originally, data warehouses were envisioned to act
as comprehensive corporate data stores to be used by BI applications so
that corporate data could be made available to everyone at the click of a
button. However, there was a huge amount of traffic to data warehouses
and, hence, data warehouses were slow, with latencies ranging from days
to weeks. Professionals and specialists explored and expounded two other
viable and valuable options: One is a data mart, which is specific for a busi-
ness division; as a result of this, traffic is comparatively less and there is
quick rendering of answers.
The second one is none other than the ODS. Practically, ODS does not
hold all corporate structured data and excludes some time-consuming
processes such as data-cleansing activities in order to provide data that
are almost current. All the data that were fed in the last 15–30 minutes
are made available through the ODS. The event processing applications
provide the most recent data; they normally manage their own data feeds
206 • Cloud Enterprise Architecture
but may retain the data in a data mart for subsequent use. The OLAP
cubes are very specific ways of storing structured data so that they meet
the requirements of the OLAP BI applications that touch them. Structured
data have metadata that simplify the understanding of what they mean.
There is no equivalent mechanism for unstructured data. Consequently,
analyzing it is more difficult. These necessities have resulted in a stream of
versatile solutions. In other words, there are a lot of positive and progres-
sive advancements such as NoSQL and NewSQL databases, the Hadoop
software that is the implementation of the popular MapReduce algorithm,
and so on, for effortlessly tackling unstructured data as enumerated in the
beginning of this chapter. In short, big-data computing is emerging as a
hot computing paradigm with the collection, classification, and commin-
gling of social and enterprise data.
The BI Middleware
In the recent past, several new types of data formats emerged with the fast
proliferation of social applications and personal devices. This forced many
vendors to come up with new kinds of databases. Software infrastructure
vendors and business software providers have kept pace by delivering com-
petent database management solutions. Further, groundbreaking BI data
stores are being unearthed and sustained as BI applications are becom-
ing increasingly complex and contributive in a number of ways, including
complexities in querying, performance requirements, client devices, and
the type of data being analyzed. The ultimate goal is to empower BI appli-
cations to connect any data store (physical and virtual, local and remote,
homogeneous and heterogeneous, etc.) without inhibitions to extract and
supply relevant information which in turn produce actionable insights.
However, this target is beset with numerous challenges (business, tech-
nology, process, etc.). In other words, we need standardized software
solutions that do much more than just facilitate connectivity. A layer of
indirection has to be incorporated. Although the addition of new lay-
ers affects performance, flexibility is a much more important trade-off
in a distributed, divergent, and decentralized environment. All kinds of
middleware operations such as connectivity, discovery, extraction, media-
tion, aggregation, dissemination, and delivery must be performed by BI
middleware solutions. The three prominent activities of BI middleware
are as follows:
Cloud Data Architecture • 207
1. Mapping
2. Doing performance management (PM)
3. Data integration
Mapping
Ultimately, a map of some kind describing the available data resources in a
useful way must be made available to IT users and applications. There are
three prominent components of a map:
1. The IOA registry is like an SOA registry in that it openly declares and
describes the available data services. It is a catalog of all the regis-
tered data services for public consumption. The registry can be easily
discovered and accessed for any BI tool.
2. Master data management (MDM) is a recent phenomenon in
enterprise IT. The main goal of MDM is to achieve data consistency as
MDM ultimately facilitates knowledge extraction and engineering for
BI. The MDM tries to arrive at a single, consistent, and unambiguous
definition of the data of an organization. Usually, multiple potentially
damaging definitions of data likely remain in use in operational sys-
tems. There may be no single version of the truth in some areas. The
MDM is the best way forward since new data stores and data records
are being defined all the time. For some organizations, mergers and
acquisitions are more prevalent and can be rather disruptive to any
MDM effort that is in progress. Certainly, an effective IOA requires a
reliable and usable map of corporate data and MDM is the best hope
for creating such a map. This in turn offers additional value in BPM.
3. A semantic data map is used to complement an MDM map. The MDM
mostly targets structured data. Structured data has metadata, which
describes the meaning of structured data to some degree, although
without a great deal of sophistication. Above and beyond such meta-
data, there is a kind of business vocabulary that expresses some basic
truths about an organization. As a simple example, a data record
that describes an insurance policy will list many of the important
attributes of the policy—objects insured, the term of the policy, and
so on—but it will not tell what insurance actually is. Also, it is not
easy to deduce the full range of valid insurance claims that might be
made from the simple data record. In other words, the systems either
do not hold this information at all or do not hold it in a convenient
208 • Cloud Enterprise Architecture
Data Integration
Data integration is attracting a lot of attention in the BI community.
In the following section, there is an in-depth explanation of existing and
emerging data integration trends, techniques, technologies, and tips.
corporate data volume increases, its value also shoots up if it is leveraged pro-
actively and positively through time-tested processes and tools. Information
derived from the data being generated, extracted, created, buffered, and
mined is potentially powerful and, hence, companies are going that extra
mile to entice and enable customers, partners, and decision makers to derive
maximum value from all their corporate data. Due to the significance of
data integration in business transformation, several vendors have entered
the scene to produce new-generation and high-performing data integration
technologies, products, and platforms. Data integration is a critical piece of
work for adaptive, on-demand, and real-time BI infrastructure.
With the deeper penetration and pervasiveness of messaging middle
ware, SOA-aware ESB, CEP engines, EII, EAI, composite data services,
and mashup server infrastructures, “near-real-time” and real-time data
integration services and solutions are being realized these days. The term
near real time is used to describe target data that has a low latency of a few
minutes or maybe a few hours. Data with zero latency is known as real-time
data. Notification has to be given in real time and only then can businesses
initiate countermeasures quickly. End users also demand real-time response
for their queries and requests. Hence, IT pundits and pupils are sincerely
plotting ways and means for realizing real-time IT technologies, processes,
and infrastructures. Batch data integration is the prominent technique at this
point in time and will continue to be in the future, according to industry stal-
warts and visionaries, due to the surging popularity of real-time data integra-
tion. Data integration techniques (Figure 6.2) are technology-independent
approaches for performing data integration. A wide range of technologies are
available for implementing data integration techniques.
“Data consolidation” processes capture data from multiple sources and
integrate them into a single persistent data store. With data consolidation,
there is usually a delay, or latency, between the time at which updates occur
in source systems and the time at which these updates appear in the target
store. Depending on business needs, this latency may be a few seconds (low
latency), several hours, or many days (high latency). Target data stores that
contain high-latency data are built using batch data integration applications
that pull data from sources at scheduled intervals. Low-latency target data
stores are updated by online data integration applications that continuously
capture and push data changes to the target store from source systems. This
push approach requires the data consolidation application to identify the
changed/updated or newly inserted data. In other words, the changed-data
capture (CDC) technique is essential for data consolidation applications to
210 • Cloud Enterprise Architecture
Database
Application
FIGURE 6.2
Physical data integration architecture.
packages, XML files, weblogs, EAI sources, web services, and unstructured
data and consolidate them into a data warehouse. Similarly, ETL tools
can consolidate data into EAI targets and web services. The most recent
ETL solutions are empowered with distinct capabilities such as metadata
management, error recovery, job scheduling and tracking, data profiling,
user-defined exits, data quality management, and support for standard
programming languages. Finally, improved usability, better performance
(parallel processing, load balancing, caching, support for native DBMS
application, and data load interfaces), and enhanced security extend the
use of ETL products beyond consolidation of data for DW to realize a wide
range of other enterprise data integration projects.
“Data federation” provides a virtual view of one or more source data
files. When a business application issues a query against this virtual view,
a data federation engine retrieves data from appropriate data sources,
integrates it to match the virtual view and query definition, and sends the
results to the client application. Data federation pulls data from disparate
and distributed sources on demand. Any required transformation is
done on the data as it is being plucked out of source files. One of the key
elements of a federated system is the metadata used by a federation engine
to access the source data. In some cases, this metadata may consist solely
of a virtual view definition that is mapped to the source files. In more
advanced solutions, the metadata may also contain detailed information
about the amount of data that exists in the source systems and the access
paths that can be used to access it. This more extensive information helps
the federated solution to optimize access to source systems.
The main advantages of a federated approach are that it provides access to
current data and removes the need to consolidate source data into another
intermediate data store. Data federation is not well-suited to retrieving
and reconciling large amounts of data or for applications in which there
are significant data quality problems in the source data. Another consid-
eration is the potential performance impact and overhead of accessing
multiple data sources at runtime. Data federation is an excellent fit if the
cost of data consolidation is huge. Operational query and reporting is an
example. Data federation can be beneficial when data security policies and
license restrictions prevent the copying of source data. Syndicated data
usually falls into this category. Data federation is a good option for a short-
term data integration solution following a company merger or acquisition.
EII supports the data federation technique for data integration. The
objective of EII is to enable applications to see dispersed data as though it
212 • Cloud Enterprise Architecture
ETL can transform not only data from different departments but also data
from different sources. For example, order details from an ERP system
and service history from a CRM application can be consolidated into a
central data hub for a single view of the customer. Although ETL technol-
ogy is still heavily used for DW and BI initiatives, data and knowledge
management professionals are increasingly demanding additional data
integration capabilities from their ETL vendors to support complex data
integration challenges.
Data Synchronization
There are many ways to extract data from a DBMS, including queries,
replication, table dumps, storage snapshots, and calls to application pro-
gramming interfaces (APIs) of an application that sits over the database.
The CDC technique is an emerging data extraction method; it enables data
integration to operate closer to real time. The CDC can be applied to most
database brands, including relational, legacy, mainframe, and file-based
DBMSs. A simple example of CDC is as follows: Two separate data sources
for a web storefront (one for customer data and one for order data) are
consolidated into a single data warehouse. To simply update order details
in real time, only the delta (or set of orders and new customer informa-
tion) needs to be propagated across to the data warehouse. This does not
require moving all the data for both systems.
Data replication is another key component of synchronization technol-
ogy that is required in any effective core data integration offering. It is
a distinct requirement of CDC in that it is often needed in deployment
considerations for mirroring or maintaining identical data across data
centers. The CDC is required for synchronizing data across heterogeneous
data sources, whereas data replication technology is often embedded in
database tools or DW tools.
Data Quality
The demand for trusted data continues to increase due to the emergence of
a bunch of new-generation enterprise applications such as corporate per-
formance management and actionable BI. Strategic IT initiatives such as
MDM and CDI also add to the pressure. Further complicating the matter,
regulatory compliance initiatives require one to trace the source of data
used in financial reports, as well as examine, track (through snapshots),
and certify the state and quality of business data. Data profiling is a data
investigation and data quality–monitoring mechanism that allows busi-
ness users to evaluate data quality using metrics, discover or infer rules
based on this data, and monitor the evolution of data quality over time.
Cloud Data Architecture • 219
Data Management
Data Governance
DATA SERVICES
Data services have transformational influence and effect on enterprise
data-centric architectures. Data services are the foundation of many SOA
deployments and are needed to bridge gaps between processes and the
core application infrastructure. Data access services are the most com-
mon data service, and there are three important scenarios in which data
can be exposed as reusable access services:
governance offerings for data services. In the long term, data services
will most likely be a part of overall data integration and data manage-
ment strategies.
Hardware Components
Oracle Big Data Appliance comes in a full rack configuration with 18
Sun servers for a total storage capacity of 432 TB. Every server in the
rack has 2 CPUs, each with 6 cores for a total of 216 cores per full rack.
Each server has 48-GB memory for a total of 864 GB of memory for a
full rack.
HDFS Hadoop
(MapReduce)
In-database
analytics
FIGURE 6.3
The big data analytic methodology.
Cloud Data Architecture • 223
Software Components
Oracle NoSQL database is a distributed, highly scalable key-value
database delivering a general-purpose, enterprise-class key-value store
by incorporating an intelligent driver on top of a distributed Berkeley
DB. This intelligent driver keeps track of the underlying storage topol-
ogy, shards the data, and knows where data can be placed with the lowest
latency. The primary use cases for Oracle NoSQL database are low-latency-
data capture and fast querying of this data, typically by key lookup.
The communication between Oracle Big Data Appliance and Oracle
Exadata happens via InfiniBand, enabling high-speed data transfer for
batch as well as query workloads. Oracle Big Data Appliance, in conjunc-
tion with Oracle Exadata Database Machine and the new Oracle Exalytics
Business Intelligence Machine, delivers everything that customers need
to acquire, organize, analyze, and maximize the value of big data within
their enterprises.
CLOUD ANALYTICS
Cloud technology is widely touted the next big thing in IT. It ensures
extremely high flexibility for organizations in adapting to their chang-
ing needs. Cloud computing extensively relies on virtualization, which
includes virtualization of physical servers into virtual servers; virtualiza-
tion of storage and networking; and virtualization of applications, ser-
vices, and data. Virtual desktop infrastructure (VDI) is attracting a lot of
attention these days as desktop virtualization technologies are flourish-
ing. Further, embedded virtualization is picking up steam. In particular,
mobile virtualization is empowering the trendy and handy smartphones
to use all operating systems, including Google Android, Apple iOS,
BlackBerry OS, and Windows Phone OS. In short, virtualization is turning
out to be immeasurably impactful in making every tangible IT resource
virtual, and the stage is set for virtual computing.
The surging popularity of cloud technology is due to the fact that it
makes IT infrastructures globally available to individuals and businesses
for a small fee as a service over the pervasive Internet. This transformation
is more efficient than transformations based on fixed infrastructure, which
is expensive, rigid, insensitive, and so on. Through service enablement of
all IT resources (applications, data, platforms, and infrastructures), the
224 • Cloud Enterprise Architecture
the vision of IT simplicity and sensitivity will see a neat and nice reality.
Self-service is the key mission in the era of making computing a social
utility. In other words, clouds are being positioned and presented as a con-
verged, dynamic, and optimized service infrastructure. What does this
mean? In the near future, analytics will be perceived as a service first and
then provided from connected and federated clouds.
Without an iota of doubt, BI occupies the top spot in any data manage-
ment strategy that causes enterprises to grow and glow. Businesses are
spending a sizeable amount of money in maintaining their BI systems and
services to meet the varying requirements and expectations of consumers
and clients. With the exponential growth of data and data formats, BI as
a field of study and research must evolve in order to sustain its lead posi-
tion in data management strategies as gaps between BI offerings and busi-
ness expectations are widening. Hence, next-generation BI must include
real-time, dynamic, service-oriented, cloud-based, and event-driven tech-
nologies and must supply actionable insights in order to make real-time
informed decisions. In short, BI systems must be sophisticated, smart, and
mission-critical systems for the survival and sustenance of enterprises in
this recessionary and reactive period. Clouds are emerging as a compact,
cheap, and catalytic environment for BI systems, and current opportuni-
ties for performing cloud analytics are definitely and decisively manifold.
SUMMARY
Enterprises depend solely on a variety of data for their day-to-day
functioning. Both historical and operational data have to be religiously
gleaned from different and disparate sources, cleaned, synchronized, and
analyzed in totality to derive actionable insights that in turn empower
enterprises to stay ahead of their competitors. In the recent past, social
computing applications have brought out a cornucopia of people’s data.
The current need is for enterprise data to seamlessly and spontaneously
link with social data in order to make organizations more proactive, pre-
emptive, and people centric in their decisions, discretions, and dealings.
Data stores, bases, warehouses, marts, cubes, and so on are flourishing;
they congregate and compactly store different data. There are several stan-
dardized and simplified tools and platforms for meeting data analysis
Cloud Data Architecture • 225
needs. There are also dashboards, visual report generators, business activ-
ity monitoring (BAM) systems, and PM modules to deliver information
and knowledge to authorized persons on request.
Data integration is an indispensable part of the long and com-
plex process of transitioning data into information and knowledge.
However, data integration is not always easy and rosy. There are pat-
terns, products, processes, platforms, and practices galore that help
in meeting the data integration goal. In this chapter, we describe the
importance of information architecture in realizing next-generation
cloud applications.
REFERENCES
1. Orend, K. 2010. “Analysis and Classification of NoSQL Databases and Evaluation
of their Ability to Replace an Object-Relational Persistence Layer,” Master Thesis,
Technische Universität München, Munich, Germany.
2. Sasirekha, R. 2010. “NoSQL: The Database for the Cloud,” Tata Consultancy Services,
http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Consulting_
Whitepaper_No-SQL-Database-For-The-Cloud_04_2011.pdf.
3. Oracle. September 2011. “Oracle NoSQL Database,” Oracle, http://www.oracle.com/
technetwork/database/nosqldb/learnmore/nosql-database-498041.pdf.
4. Harrison, G. August 26, 2010. “10 Things You Should Know about NoSQL
Databases,” TechRepublic, http://i.techrepublic.com.com/downloads/Gilbert/dl_10_
things_nosql.pdf.
5. Tweed, R., and G. James. 2010. “A Universal NoSQL Engine, Using a Tried and Tested
Technology,” M/Gateway Developments Ltd, http://www.mgateway.com/docs/
universalNoSQL.pdf.
6. Oracle. February 2011. “Hadoop and NoSQL Technologies and the Oracle Data-
base,” Oracle, http://www.oracle.com/technetwork/database/hadoop-nosql-oracle-
twp-398488.pdf.
7. Burd, G. 2011. “NoSQL.” ;login: 36 (5): 5–12, http://static.usenix.org/publications/
login/2011-10/openpdfs/Burd.pdf.
8. Weber, S. 2011. “NoSQL Databases,” http://wiki.hsr.ch/Datenbanken/files/Weber_
NoSQL_Paper.pdf.
9. Pokorny, J. 2011. “NoSQL Databases: A Step to Database Scalability in Web
Environment,” The 13th International Conference on Information Integration and Web-
based Applications & Services (iiWAS2011), Ho Chi Minh City, Vietnam, December
5–7, 2011.
10. Hogan, M. 2009. “Database Virtualization and the Cloud: How Database Virtu
alization, Cloud Computing and Other Advances Will Reshape the Database
Landscape,” Scale DB Inc., http://www.scaledb.com/pdfs/Cloud_Databases_
WhitePaper2.pdf.
11. Brantner, M., D. D. Florescu, D. Graf, D. Kossmann, and T. Kraska. 2009. “Building a
Database in the Cloud,” http://www.dbis.ethz.ch/research/publications/dbs3.pdf.
226 • Cloud Enterprise Architecture
12. Michel, D. 2010. “Databases in the Cloud,” HSR University of Applied Science
Rapperswil, http://wiki.hsr.ch/Datenbanken/files/CloudDatabases.pdf.
13. Curino, C., E. P. C. Jones, R. A. Popa, N. Malviya et al. 2011. “Relational Cloud: A
Database-as-a-Service for the Cloud,” 5th Biennial Conference on Innovative Data
Systems Research (CIDR 2011), Asilomar, CA, January 9–12, 2011. http://www
.cidrdb.org/cidr2011/Papers/CIDR11_Paper33.pdf.
14. Abounlnaga, A., K. Salem, A. A. Soror, U. F. Minhas, P. Kokosielis, and S. Kamath.
2009. “Deploying Database Appliances in the Cloud,” Bulletin of the IEEE Computer
Society Technical Committee on Data Engineering, http://sites.computer.org/debull/
A09mar/aboulnaga.pdf.
15. Ion, M., G. Russello, and B. Crispo. 2011. “Enforcing Multi-user Access Policies to
Encrypted Cloud Databases,” 2011 IEEE International Symposium on Policies for
Distributed Systems and Networks, Piza, Italy, June 6–8, 2011. http://www.computer.org/
csdl/proceedings/policy/2011/4330/00/4330a175-abs.html.
16. Dory, T. 2011. “Study and Comparison of Elastic Cloud Databases: Myth or Reality?”,
Master Thesis, Computer Engineering Department, Université Catholique de
Louvain, http://www.info.ucl.ac.be/~pvr/MemoireThibaultDory.pdf.
17. Tiwari, A. 2011. “Distributed Aggregation in Cloud Databases,” Indiana University
Bloomington, IN, http://salsahpc.indiana.edu/b534projects/sites/default/files/public/5_
Distributed%20Aggregation%20in%20Cloud%20Databases_Tiwari,%20Aparna.pdf.
18. Mathur, A., M. Mathur, and P. Upadhyay. June 2011. “Cloud Based Distributed
Databases: The Future Ahead.” International Journal on Computer Science and
Engineering 3 (6): 2477–81, http://www.enggjournals.com/ijcse/doc/IJCSE11-03-06-
115.pdf.
19. Dory, T., B. Mejías, P. V. Roy, and N.-T. Tran. 2011. “Comparative Elasticity and
Scalability Measurements of Cloud Databases,” http://www.nosqlbenchmarking.com/
wp-content/uploads/2011/05/paper.pdf.
20. Manyika, J., M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, and A. H. Byers.
May 2011. “Big Data: The Next Frontier for Innovation, Competition, and Produc
tivity,” McKinsey Global Institute.
21. Neo Technology. November 2011. “NoSQL for the Enterprise,” Neo Technology.
22. 2011. “Big Data for the Enterprise,” Oracle.
23. Russom, P. 2011. “Hadoop: Revealing Its True Value for Business Intelligence,” TDWI
International, http://www.tdwi.org.
24. Bloor, R. 2011. “Enabling the Agile Business with an Information-Oriented
Architecture,” The Bloor Group, http://www.insideanalysis.com/wp-content/uploads/
2012/04/TheIOA-WP-Final-0419.pdf.
7
Cloud Technology Architecture
INTRODUCTION
Transition is an inseparable factor and force of the expanding IT land-
scape. Once in a while, transformational and trendsetting technolo-
gies erupt and energize IT service organizations, product vendors, and
consultants to provide technology-sponsored business simplification,
augmentation, and optimization solutions. Cloud technology is not an
exception to this predominant and perpetual trend. Enterprises are in
the thick of actions with the largesse of improvements, improvisations,
and innovations being supplied and sustained by the indomitable spirit
of the cloud paradigm. The elegant and exciting history of IT goes back
to the era of monolithic and centralized mainframes. They were followed
by client-server (CS) programming and multitier distributed comput-
ing, which are dominating the IT scene these days. Tiered and layered
approaches are making it easier for designers, architects, and developers
to build a bank of business services and applications and, hence, they
are still in the limelight. Simplicity and sensitivity are the gist and crux
of these paradigms. In short, as IT has been drifting toward distribu-
tion and decentralization methods, the much-maligned centralization
has come to the forefront again with the unprecedented adoption of
cloud concepts and ultrahigh broadband communication technologies.
Enterprise IT is bound to leverage scores of consolidated, virtualized,
and shared servers. This centralization concept simplifies centralized
monitoring, management, and maintenance. It is noteworthy that this
tectonic shift is being enunciated and edified by the lively cloud concept.
In a nutshell, one can think of IT as a pendulum that swings between
two extremes, centralization and distribution. As the Internet is being
utilized as the most affordable, pervasive, and open communication
227
228 • Cloud Enterprise Architecture
Public Cloud
A public cloud is a massive server infrastructure (consolidated, centralized,
virtualized, and automated) for remotely providing compute, storage, and
other specialized infrastructures and instruments to global users over the
Internet communication infrastructure. This is the modernized version of
the huge data centers and server farms of yesterday. In other words, cloud-
inspired standardization, augmentation, and optimization techniques are
applied liberally across all the computing, network, and storage systems to
achieve affordability, greenness, leanness, manageability, and sustainability;
that is, a cloud center is a dynamic pool of converged and federated IT infra-
structures for guaranteeing key nonfunctional requirements such as seam-
less and real-time elasticity, high availability, high performance, and high
assurance. Centralized monitoring, which gives sufficient control and deep
visibility into systems’ operations, is the praiseworthy hallmark of cloud
centers. Any individual or company in any part of the world at any point in
232 • Cloud Enterprise Architecture
time can avail this facility for a small fee or sometimes at no cost. Any device
with Internet connectivity can connect and make use of personal as well as
professional services that are hosted and managed in clouds.
Examples of public cloud providers are Amazon AWS, Microsoft Azure,
and Google App Engine. Public cloud providers are offering new services
gradually. As an example, Amazon AWS initially offered only Amazon
EC2 and S3 but has since then been releasing a new product every few
months; some are listed here:
give rise to attractive and affordable cost models, such as the pay-per-use
pricing model that allows consumers to pay only for their consumption.
Ultimately, this transition helps users to negate the need for up-front
expenditure in compute and storage infrastructures. There is a gradual
shift from personal IT toward shared IT; but this does not mean that the
days of dedicated servers for some specific IT needs are over.
A public cloud is inherently not very secure as it allows multiple companies
to share a common pool of IT resources. In addition, the open Internet, being
the communication infrastructure for clouds, is a temptation for hackers and
evildoers. Also, VMs carved out of physical servers are susceptible to security
threats and vulnerabilities. There could be at least one or two untrustworthy
subscribers in the same cloud facility. For example, virtualized servers oper-
ating in a multitenant environment are subject to cartography and side chan-
nel attacks, whereby hackers, who can be users of another public cloud, make
use of details such as timing information and power consumption to exploit
security holes. It is not possible for one person to know another person’s pro-
files and intents; hence, public cloud providers are expected to use a series
of advanced security mechanisms and industry-strength standardizations at
different levels and layers to boost users’ confidence in clouds.
Private Cloud
A private cloud is alternatively referred to as a “local cloud” or an “enter-
prise cloud.” Every corporation has its own cloud in order to ensure that
the cloud-based data, services, applications, and processes are accessed
and leveraged by its designated owner only (an individual, institution, or
innovator). Private cloud offerings are not for public consumption. In a
company environment, the employees, executives, partners, retailers, sup-
pliers, and other important stakeholders of the company can access its
cloud infrastructures. Private clouds are established and sustained primar-
ily for retaining control and ensuring security, and for deep and real-time
visibility. Any company can modernize existing data centers by applying
cloud technologies, tools, and best practices or build its own cloud cen-
ter from the ground up for fulfilling its IT requirements. It is owned by
and operated solely for an organization, may be managed by the organiza-
tion itself or a third party, and may exist on-premises or off-premises. For
example, an organization may use Google Apps (public cloud) for corpo-
rate e-mail, whereas its human resource and customer applications may
234 • Cloud Enterprise Architecture
Community Cloud
A community cloud is a cloud infrastructure shared across several orga-
nizations and people with common interests, that is, it supports a specific
community of people that has common requirements and shared con-
cerns (e.g., mission and security requirements, and policy and compliance
considerations) [1]. The members of the community can access the data
and applications made available in the cloud. For example, a community
related to health care may have very strict policies toward maintaining the
confidentiality of patient records; therefore, such a community cloud may
have additional requirements for data security such as encryption of data
compliant to certain standards. The key advantage of having a community
cloud is that all cloud users can benefit from the technologies established
by the community. A community of reasonable size benefits from a vast
range of cloud services tailored for that community and is likely to benefit
from stricter governance and compliance to standards.
There are a number of potential pitfalls for the community cloud. In
particular, managing a community cloud is beset with issues since there is
no clarity on the leadership as well as the government body that runs and
regulates a community. Who formulates policies, who makes decisions
and enforces policies, and who is responsible for any governance paralysis
are some pertinent questions as far as the concept of community cloud is
concerned. Similar to a public cloud, a community cloud is shared among
multiple parties within a community. Therefore, security is a little prob-
lematic and users in a community cloud are not as trustworthy as users
in a private cloud. However, community cloud users have greater visibility
and control over their resources than users of public clouds and, hence, the
level of trust for a community cloud is higher than that for a public cloud.
A community cloud may be managed by the concerned organizations or
a third party, and it may exist on-premises or off-premises. This cloud is
also built by networking the underutilized and unutilized computers of its
Cloud Technology Architecture • 235
members. Voluntary and virtual computing models are the main motiva-
tors for setting up a community cloud.
Hybrid Cloud
A hybrid cloud (Figure 7.1) is a connected and converged cloud infrastruc-
ture originated and operated by a composition of two or more clouds (pri-
vate, community, or public clouds) that remain unique entities, although
they are bound together by standardized or proprietary technologies
for sharing and synergizing their own capabilities and competencies.
Standards-based interactions and resource (data and application) portabil-
ity are the key advantages of this model. Further, if there is any additional
computing power/storage needed, the seamless connectivity between dif-
ferent, distributed, and decentralized clouds comes to the rescue. There are
competent techniques that enable such kinds of ad hoc, dynamic, real-time
empowerment (e.g., cloud bursting for load balancing between clouds). In
this model, users typically outsource non-business-critical information
and processing to the public cloud while keeping business-critical services
and data under their control. Figure 7.1 describes the utility and usabil-
ity of hybrid clouds in enriching private and public clouds toward accom-
plishing better and bigger things for worldwide business establishments.
SME
Public cloud
Public cloud
SME
Connectivity
Hybrid cloud
(network access)
Enterprise
Enterprise Private cloud
Private cloud
SME
FIGURE 7.1
Formation of hybrid clouds linking private and public clouds.
236 • Cloud Enterprise Architecture
applications and data can migrate back and forth between clouds is the
driving force behind connected clouds.
Another popular use case for connected clouds is leveraging its ability to
syndicate special contents from public clouds. As a prime example, Google
Cloud has stored a huge amount of geographic maps, location and direction
details, social networking and exchange information, business data, and
so on. Maintaining such a growing and glowing base of decision-enabling
and actionable insights in a private cloud is highly prohibitive. Personal
as well as professional applications that need such crucial information
from public sites must leverage the cloud bursting technique for enabling
data and information integration among private as well as public clouds
dynamically. Quick creation and crafting of competent mashups, along
with composite applications and services, across a wide variety of diverse
clouds by even nontechnical people is the principal differentiator for con-
nected clouds. Cloud integration brokers, mashup editors, hubs, and buses
are emerging in order to streamline the integration, composition, and col-
laboration of processes, applications, services, and data available in a wide
variety of cloud, enterprise, embedded, and personal systems.
Public clouds that are generally massive in size and have a global out-
look can also be used to provide efficient and cost-effective backup for
data managed in private clouds. This helps businesses immensely at times
to recover quickly from any kind of natural or human-made disasters in
order to guarantee the vital aspects of business efficiency, continuity, and
resiliency. As we know, any slowdown or breakdown of IT operations
comes as a rude shock and costly letdown to providers as well as sub-
scribers. Messages comprising confidential corporate data are subjected
to strong encryption not only during their transit but also in their per-
sistence. It is noted that virtual private networks (VPNs) are established
among different cloud providers to stop any kind of hacking, peeking, and
breaking in by unauthorized individuals. Once the security requirement,
which is being projected as the most vital concern and complication for
the blooming and booming cloud computing paradigm, is ensured, this
hybrid architecture brings to the table many notable benefits by nullify-
ing all identified and unidentified limitations and barriers: First, by using
completely separate infrastructures for primary data management and
secondary data backup, it enables a neat separation of concerns. Second,
the affordability factor becomes important with the emergence of several
online low-cost storage providers. Data integrity and availability can be
ensured with such hybrid clouds.
238 • Cloud Enterprise Architecture
Finally, whereas data backup can be done internally, data archival can
be done at the location of public storage providers. This ensures a clean
division between backup and archival. With petabytes of storage avail-
able on-demand from services such as Amazon S3, regular and real-time
snapshots of all data managed by private clouds can be archived on public
clouds at nominal costs.
In summary, we have discussed a number of mainstream cloud types.
We know that there are delivery models (infrastructure cloud, and
platform and software clouds) and deployment models (public, private,
hybrid, and community clouds). Clouds, being a generic technology,
mingle and mix with a number of different domains, whereby newer
and nimbler cloud types continue to emerge. Today, the trend is that
each domain has its own cloud. In other words, besides generic clouds,
there are innumerable specific cloud models gaining momentum in the
competing yet calculative marketplace. With the convergence aspect
gaining much traction, there are domain-specific clouds (science, mobile,
data, device, storage, service, knowledge, and high-performance clouds).
Nonfunctional attributes are synonymous and tied with the cloud idea
and, hence, we hear more about context-aware, cognitive, instant-on,
on-demand, and ambient clouds these days.
Public cloud
Cloud service
Cloud middleware broker (CSB)
Private cloud
FIGURE 7.2
CSB integrates public and private clouds.
Application 1 Application 2
CSB
Cloud 1 Cloud 2
CSB B
Company A SaaS
System 1 System 2
System 1
Mediate
System 3 System 2
Translate
Manage
FIGURE 7.3
Enterprise applications accessing cloud-based SaaS applications through a CSB.
Cloud Technology Architecture • 241
from any client can pierce through and reach the cloud server, however,
messages originating from a cloud server could not reach cloud clients
that sit behind a firewall. This threatening obstacle has induced and
inspired researchers worldwide to ponder innovative mechanisms such as
http-tunneling so that cloud applications penetrate through the blockade
to reach enterprise applications and access data at the private cloud and
vice versa.
Cloud Orchestration
Figure 7.4 explains how cloud services are orchestrated using a central-
ized orchestration layer to bring forth composite services [2; http://www
.squarehoop.com].
7. Execute 3. Register
5. Execute service 3
service 1 service 3
6. Execute 2. Register
service 2 service 2
Orchestration
layer
1. Register
service 1 4. Execute
business process
Client
FIGURE 7.4
Working of a cloud orchestration engine.
242 • Cloud Enterprise Architecture
Distribution Shipping
department department
Cloud
Consumer Supplier
middleware
Manufacturing
Warehouses
unit
FIGURE 7.5
Cloud collaboration.
Cloud Collaboration
Scenarios
Cloud provider 1
FIGURE 7.6
Cloud broker serving as the intermediary for clients in exposing a common interface by
encapsulating all the nitty-gritty of cloud providers [6–7].
Cloud Technology Architecture • 245
Cloud provider
Cloud Cloud
consumer broker
Operational
support
Service
Business intermediation
Cloud SaaS
PaaS support Provisioning/
auditor IaaS configuration
Security Service
assessment aggregation
Portability/
Platform architecture interoperability
Security
certification Virtualized infrastructure Service
Security arbitrage
Hardware
Security
accreditation
Facility
Cloud carrier
FIGURE 7.7
The reference cloud architecture. Adapted from http://www.nist.gov/itl/cloud/index
.cfm.
8. Operate
across clouds
2. Manage a
single cloud 7. Work with a
selected cloud
4. Migrate 3. Interface
1. Deploy to a cloud to a cloud
to a cloud
Enterprise systems
FIGURE 7.8
Scenarios for a cloud management broker.
246 • Cloud Enterprise Architecture
a set of high-level generic scenarios are defined to clarify the scope of the
study. The scenarios are listed as follows and vividly illustrated in Figure 7.8:
Single cloud
Scenario 1: Deployment on a single cloud
Scenario 2: Manage resources on a single cloud
Scenario 3: Interface enterprise systems to a single cloud
Scenario 4: Enterprise systems migrated or replaced on a single cloud
Multiple clouds
Scenario 5: Migration between clouds
Scenario 6: Interface across multiple clouds
Scenario 7: Work with selected clouds
Scenario 8: Operate across multiple clouds
The role of a cloud broker in these scenarios is to provide portability across
different clouds for applications, data, and tools [3–5]. Specifically, the impact
of replacing one cloud infrastructure provider with another should be guaran-
teed as a way of minimizing any vendor lock-in issue. The next step is to con-
sider scenario 5 (migration between clouds) and scenario 6 (interface across
multiple clouds). In future architectures, a cloud broker could support dynamic
cloud selection for scenario 7 (work with selected clouds) and interoperability
for scenario 8 (operate across multiple clouds). Some more detailed technical
use cases for cloud infrastructure deployments are as follows [2]:
1. Creating, accessing, updating, and deleting data objects in clouds
2. Moving VMs and virtual appliances between clouds
3. Selecting the best infrastructure vendor for private externally hosted
clouds
4. Tools for monitoring and managing multiple clouds
5. Moving data between clouds
6. Single sign-on access to multiple clouds
7. Orchestrated processes across clouds
8. Discovering cloud resources
9. Evaluating SLAs and penalties
10. Auditing clouds
In summary, CM is the essential intermediary that gives clarity and
completeness to the increasingly complicated cloud landscape. Cloud bro-
kers, orchestrators, composers, integrators, routers, mediators, and so on,
are being annotated and articulated as CM solutions, and their contribu-
tions are enormous and immensely appreciated.
Cloud Technology Architecture • 247
were initially planned and agreed upon in all interactions among the
various participants and constituents in order to preemptively nip in
the bud and nullify any kind of wrong move.
Hub-and-Spoke Style
With the emergence of EAI hubs, enterprises moved away from the inflex-
ible, complicated, and closed P2P model to a more brokered, centrally
monitored and managed interaction model named the “hub-and-spoke”
(H&S) architecture. A number of traditional ESB platforms are essentially
rebranded EAI solutions and, hence, they have inherited the same hub
deployment architecture as the EAI solutions. The classic EAI architec-
ture model is characterized by a centralized hub that connects distrib-
uted and dissimilar applications at the edges with spokes or connectors.
The hub in the middle is the focal point of this architecture; it receives
Cloud Technology Architecture • 249
App
Connector
Connector
App
FIGURE 7.9
The EAI hub architecture.
250 • Cloud Enterprise Architecture
(where each application is situated). That is, the hub is the core and central
point in any integrated environment. Centralized administration, moni-
toring, diagnosis, and management of message traffic is a double benefit
and treat for small-to-medium organizations.
However, nothing in life is free and, as it turns out, there are several
problems with the hub approach, which are listed as follows:
Single point of failure: A single centralized hub for managing all message
traffic between different end points is often a scalability bottleneck.
With an increase in the volume of message traffic, the hub gets bogged
down leading to poor performance and possible SLA breaches. A sin-
gle central point of control is also a single point of failure. All applica-
tions effectively grind to a halt if the hub suffers a failure.
Otherwise, the rising complexity thickens: Over time, as more and more
integration logic around routing and transformation is built into the
hub, applications become more tightly coupled with the middleware
infrastructure and boundaries between application logic and inte-
gration logic become increasingly difficult to enforce.
Extra baggage: When applications use identical data models and/or for-
mats, transformation from and to canonical models and formats is
an unnecessary performance penalty to pay for drawing the benefits
of centralized mediation infrastructure.
Lack of controllability: In large organizations, centralized adminis-
tration, management, and monitoring actually turn out to be an
impediment as business units no longer have any control over
administration of their applications and instead have to coordinate
application maintenance, upgrades, and so on, with a centrally man-
aged EAI team.
For many ESBs, the core service bus is a service-oriented extension of the
implementation of the message bus pattern [14–16,20]. A message bus, at
its core, is a distributed messaging-channel infrastructure where applica-
tions communicate with each other by producing and consuming mes-
sages from a common channel (e.g., JMS-compliant queues or MSMQ
queue) that forms the integration backbone for the entire application
landscape. The service bus pattern embraced the fundamentally distrib-
uted nature of the message bus but shifted the focus of integration from
message level to service level. In other words, instead of hosting messag-
ing end points, ESBs are containers of standards-based service end points
and event subscribers (Figure 7.10). Further, the mediation functional-
ities of classic EAI solutions are clubbed together in the ESB in the form
of support for protocol bridging, service routing, and data structure and
format transformation.
There are some noteworthy differences between enterprise hubs and
service buses. The key difference originates from the fact that the con-
stituents of a service bus are highly distributed and modular. A ser-
vice bus, in contrast to a hub, is not a monolithic container deployed
on a single physical node. The components of a service bus are able to
work together as a logical entity even though they could be physically
deployed on separate nodes. This isolated model of separately deploy-
able and scalable service containers and messaging infrastructures in
Service
WSDL
Bus
WSDL
Service
FIGURE 7.10
Conceptual architecture of an ESB.
252 • Cloud Enterprise Architecture
Service Service
Protocol
bridging Bus
Routing
Transformation
Queuing
Service
FIGURE 7.11
Modularity of an ESB.
Cloud Technology Architecture • 253
ESB ESB
FIGURE 7.12
Different methods of deploying ESBs.
254 • Cloud Enterprise Architecture
ESB
JAX-
JNDI WS JPA ‥‥
JVM
FIGURE 7.13
An ESB sitting on a JEE-compliant application server.
Bus
FIGURE 7.14
The OSGi-based modular ESB.
256 • Cloud Enterprise Architecture
Service Service
Agent Agent
ESB ESB
Service Service
Agent Agent
ESB ESB
FIGURE 7.15
The p2p ESB.
• As opposed to the hub and bus models where every message flows
through a physically separate service broker, thereby incurring a cer-
tain performance overhead, the ESB in the end point model elimi-
nates the extra hops and performs well.
• Smart end points can avoid unnecessary protocol bridging or data
transformations when there are no or very few differences to mediate.
If an application needs to talk to other applications using the same
data model and format the messages, it does not have to go through
unnecessary transformation to a canonical model or format.
• A p2p ESB may work well in the network topology of a single depart-
ment or division but may not scale very well to span the boundar-
ies of multiple, autonomous divisions where service governance is
managed by different teams, and it becomes difficult to agree on the
separation of brokering responsibilities between service end points.
Web
REST Portal/CMS E-mail
services
Mule ESB
Websphere
JDBC JMS File/FTP SAP Mainframe
MQ
FIGURE 7.16
Mule ESB architecture.
258 • Cloud Enterprise Architecture
Deployment Challenges
Many issues related to deployment [1] must be addressed before creating a
database appliance that can be easily deployed in a cloud and obtaining an
easily accessible and usable database instance from this appliance. How to get
the best database system performance in this environment is critical. Cloud
providers are interested in two related performance objectives: (1) maxi-
mizing the utilization of cloud resources and (2) minimizing the resources
required to satisfy users’ demands. Users are interested in minimizing appli-
cation response time and maximizing application throughput. Deploying
database appliances in a cloud and tuning the database and virtualization
parameters to optimize performance introduces some interesting research
challenges.
Localization
When we start a VM from a copy of a database appliance, we need to give
this new VM and the database system running on it a distinct “identity.”
Cloud Technology Architecture • 259
Routing
In addition to giving every VM and database instance a distinct identity, we
must be able to route application requests to a VM and a database instance.
This includes the IP-level routing of packets to the VM; it also includes mak-
ing sure that database requests are routed to the correct port and not blocked
by any firewall, the display is routed back to the client console if needed, I/O
requests are routed to the correct virtual storage device if the “compute”
machines of the IaaS cloud are different from the storage machines, and so on.
Authentication
The VM must be aware of the credentials of all clients that need to connect
to it, independent of where it is run in the cloud.
Cloud computing represents an exciting opportunity to bring on-
demand applications to customers in an environment of reduced risk and
enhanced reliability. However, it is important to understand that exist-
ing applications cannot be unleashed on the cloud as they are. Careful
attention to design helps to ensure successful deployment and delivery of
applications. In particular, cloud-based applications should be deployed
as virtual appliances so that they contain all the components needed to
operate, update, and manage the applications.
and, hence, a sound strategy must be in place to make the chosen path
smooth, risk-free, and devoid of any rough edges. Cloud deployment,
being a critical process in any cloud-sponsored transformation and opti-
mization initiative, has to be taken very seriously in order to attain the
intended goals. Cloud deployment is a tedious and tough affair; it is beset
with a number of tricky concerns and challenges. Feasibility and risk
assessment is very much needed before plunging into the cloud deploy-
ment process to understand the possible loopholes that must be faced
at different levels and layers. Therefore, deployment is a risky as well as
rewarding process. This is followed by devising effective mechanisms to
combat or mitigate the dangerous and draining effects of any identified
and even unidentified risk factors. As a first tangible step, any CSP needs
to draw and create a deployment topology, which comes in handy when
establishing an implementable and insightful strategy to proceed with
the deployment activity.
When organizations move their IT assets to cloud environments (local
or remote or both) in order to reap the pronounced advantages of cloud
computing, architects and decision makers must consider a number of
things for successful cloud adoption. It is all about getting the macro-
level picture before deciding on the resources and the subsystems that
must be modified and modernized so that they are cloud-ready and can
be migrated, deployed, and managed in the chosen cloud environment.
Precisely speaking, the people in charge of such a strategic transforma-
tion have to first understand (map) the network, classify information
assets, identify which deployment models and services align with the
company’s IT and security strategy, and then vet the solution providers to
ensure they can meet the company’s particular tactic as well as long-term
requirements.
TABLE 7.1
Identification of Gaps between the Offered and the Desired
Cloud model
Presentation Presentation Find the gaps!
modality platform
APIs
Security control model
Applications SDLC, binary analysis, scanners,
Applications
webapp firewalls, transactional sec. Compliance model
Data Metadata Content
DLP, CMF database activity
Information
monitoring, encryption PCI
Integration and middleware Firewalls
GRC, IAM, VA/VM, patch management, Code review
Management configuration management, monitoring WAF
Encryption
APIs Unique user IDs
Anti-virus
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Monitoring/IDS/IPS
Core connectivity NIDS/NIPS, firewalls, DPI, Patch/vulnerability management
and delivery Network Anti-DDoS, QoS, DNSSEC, OAuth Physical access control
Two-factor authentication
THE FUTURE
Cloud computing has created a number of fresh opportunities and pos-
sibilities for IT solutions providers. Its impact is exponentially growing
across the industry and the market value and mind share are zooming
ahead at an astronomical rate. Trendsetting and trailblazing use cases and
applications based on the cloud idea are being proposed and publicly pre-
sented. There is no doubt in the minds of visionaries and pundits that
the cloud is set to become the core of future IT. Not only enterprises, but
also the vast and varied embedded space is very enthusiastic and optimis-
tic about cloud infrastructures and cloud-induced deployment and con-
sumption models in creating and sustaining scores of smart environments
such as smart homes, offices, hospitals, hotels, and buildings. Not only
electronic devices, but also physical objects are being digitally and cogni-
tively empowered to become computational, communicative, connected,
analytic, articulative, and sensitive. The stability and success of cloud
technologies provides renewed vigor to smart traffic management, supply
chain, industry automation, intelligent health care, and smart commerce.
The prevailing trend is that our everyday environments (personal as well
as professional) are being stuffed and saturated with a number of disappear-
ing embedded systems such as sensors, actuators, displays, controllers, and
robots. Slim and sleek devices are being produced in huge numbers. Device
connectivity and integration standards and technologies are emerging to
provide extended care, choice, comfort, and convenience to human users.
All kinds of events (social, physical, informational, etc.) are being proac-
tively captured, processed, and analyzed thoroughly in real time to extract
actionable insights in the form of alerts, tips, trends, patterns, and hidden
associations. The resulting intelligence is utilized for intelligent decision
making and contemplating appropriate countermeasures. The technology-
sponsored convergence of the physical world and cyberspace is gathering
momentum. This is the main reason why several multidisciplinary subjects
such as AmI, cyber physical systems (CPS), the Internet of Things (IoT),
and ubiquitous computing have become the cynosure of many.
Now, every tangible software and hardware component is seamlessly and
spontaneously interfaced and integrated with cloud platforms and infra-
structures directly or indirectly. Environmental and user data are collec-
tively aggregated and subjected to knowledge extraction and engineering
that helps in accurately understanding users’ requirements. Clouds are the
264 • Cloud Enterprise Architecture
CONCLUSION
Countless symposiums, workshops, and other confluences are being held
these days on cloud computing; debates, discourses, and deliberations are
also ongoing as to how cloud computing is going to revolutionize the way
we do business. Cloud computing is not exactly a new paradigm; it is the
grand result of an amalgamation of several proven technologies. In short,
it can be termed as a convergence or cluster of matured and stabilized
information technologies. Researchers and practitioners are cooperatively
working to make the cloud paradigm pervasive and persuasive. Enabling
frameworks, cloud-inspired enterprise-scale architectures, a variety of
tool sets and platforms, best practices and strategies, migration and on-
boarding methodologies, and so on, are being made available in order to
take this fast-evolving cloud principle to greater heights.
Deployment models and methods contribute very much to the success
of cloud computing. A bevy of deployment scenarios are being explained,
deployment strategies are being formulated, and so on. In short, optimized
deployment plays a very unique role in shaping the evolution and establish-
ment of clouds and cloud-induced business, operational, aggregation, and
consumption models. This chapter is an eye-opener on the relevance of
focusing more diligently and decisively on the aspects of cloud deployment.
REFERENCES
1. Henneberger, M., and A. Luhn. 2010. “Community Clouds–Supporting Business
Ecosystems with Cloud Computin ,” Siemens IT Solutions and Services, http://
www.sourcingfocus.com/uploaded/documents/Siemens_Community_Clouds_
Whitepaper.pdf.
2. Parameswaran, A. V., and A. Chaddha. 2009. “Cloud Interoperability and
Standardization,” SETLabs Briefings 7 (7): 19–27.
3. Kundra, V. 2011. “Federal Cloud Computing Strategy,” U.S. CIO and the Federal CIO
Councils, http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf.
Cloud Technology Architecture • 265
INTRODUCTION
The trendsetting cloud paradigm actually represents the cool conglom-
eration of a number of proven and promising enterprise technologies.
Although the cloud idea is not conceptually new, it has caused myriad tec-
tonic shifts for the whole ICT industry. The cloud concepts progressively
and perceptibly impact the IT and business domains with respect to several
critical aspects. Cloud computing has brought in a series of novelty-packed
deployment, delivery, consumption, and pricing models, whereas the ser-
vice orientation (SO) paradigm prescribes a modular (loosely coupled and
highly cohesive) application design mechanism. The noteworthy contribu-
tion of the much-discoursed and -deliberated cloud computing paradigm
to IT is the fast realization and proliferation of dynamic, converged, adap-
tive, on-demand, and online computing infrastructure, which is the key
requirement for future IT. The delightful distinctions here are that clouds
guarantee most of the nonfunctional requirements (QoS attributes) such
as availability, high performance, on-demand scalability, elasticity, afford-
ability, global-scale accessibility and usability, and energy efficiency.
Having understood the exceptional properties of cloud infrastructures
(hereafter, they will be referred to as just “clouds”), most global enterprises
(small, medium, and even large) are steadily moving their IT offerings such
as business services and applications, software infrastructure and platform
solutions, and IT management systems to clouds. This transition facilitates
a higher and deeper reach and richness in application delivery and con-
sumability. Product vendors, having found that the cloud style is a unique
proposition and phenomenon, are modifying and moving their platforms,
databases, and middleware to clouds to be exposed and delivered as services.
267
268 • Cloud Enterprise Architecture
Integration as a Service
Integration as a service (IaaS) is a budding and distinctive capability of
clouds that helps in fulfilling internal as well as external business integration
requirements. Increasingly, business applications are deployed in clouds to
reap the manifold business and technical benefits of using clouds. On the
other hand, innumerable mission-critical applications and data sources still
remain locally stationed and sustained primarily due to the expressed secu-
rity concerns associated with hosting them in clouds. The question here is
how to create seamless data flow between hosted and on-premise applications
so that they work together. The IaaS overcomes these challenges by smartly
utilizing the time-tested B2B integration technology as the value-added
bridge between SaaS solutions and in-house business applications.
270 • Cloud Enterprise Architecture
The B2B systems are capable of driving this new on-demand integration
model because they are traditionally used to automate business processes
between manufacturers and their trading partners. This means they pro-
vide application-to-application connectivity along with the functionality
that is crucial for linking internal and external software securely. Unlike
the conventional EAI solutions designed only for internal data sharing,
B2B platforms have the ability to encrypt files for safe passage across the
public network, manage large data volumes, transfer batch files, con-
vert disparate file formats, and guarantee data delivery across multiple
enterprises. The IaaS just imitates this established communication and
collaboration model to create reliable and durable linkage for ensuring
smooth data passage between traditional and cloud systems over the web
infrastructure.
The use of hub-and-spoke (H&S) architecture further simplifies the
implementation and avoids placing an excessive processing burden on the
customer side. The hub is installed at the SaaS provider’s cloud center to
do the heavy lifting, such as reformatting of files. A spoke unit at each user
site typically acts as a basic data transfer utility. With these pieces in place,
SaaS providers can offer integration services under the same subscription/
usage-based pricing model as their core offerings. As IT resources are
becoming more distributed and decentralized every day, linking and
leveraging them for multiple purposes need a multifaceted infrastructure.
Clouds, being web-based infrastructures, are the best fit for hosting scores
of unified and utility-like platforms to take care of all sorts of brokering
needs among connected ICT systems.
1. Controllability
2. Visibility and flexibility
Cloud Integration Architecture • 271
Integration Approaches
There are three prominent layers and levels (data, application, and UI) on
which the integration process can be initiated and implemented [1]:
For any relocated application to provide the promised value for busi
nesses and users, the minimum requirement is the interoperability between
SaaS applications and on-premise enterprise packages. As SaaS applica-
tions were not originally designed keeping in mind the interoperability
requirement, the integration process has become a tough assignment.
There are other obstructions in the way of smoothly routing messages
between on-demand applications and on-premise resources. Message,
data, and protocol translations must happen at the end points or at the
middleware layer in order to decimate the blockade that inhibits spontane-
ous sharing and purposeful collaboration among the assorted participants.
As applications and data are diverse and distributed, versatile integration
technologies and methods are essential for making the integration process
smooth. Reflective middleware is an important necessity for generating a
real-time and synchronized view of KPIs to brief and benefit executives,
decision makers, as well as users. Data integrity, confidentiality, quality,
and value need to be carefully maintained as data, services, and applica-
tions become increasingly interlinked and saddled to work together.
SaaS clouds
PaaS, laaS,
federated
clouds
Private cloud
(on-premise)
FIGURE 8.1
Connectivity and integration across disparate and distributed clouds.
For instance, consider a small company that is tied up with the Salesforce
.com CRM. The company currently leverages an on-premise custom sys
tem that uses an Oracle database to track its inventory and sales. The use
of the Salesforce.com system provides the company with significant value
in terms of customer and sales management. However, the information
that persists within the Salesforce.com system is somewhat redundant
with the information stored within the on-premise legacy system (e.g.,
customer data). Thus, the “as is” state is in a fuzzy state and suffers from
all kinds of costly inefficiencies including the need to enter and maintain
data in two different locations, which ultimately costs more for the com-
pany. Another irritation is the loss of data quality, which is endemic when
considering this kind of dual operation. This includes data integrity issues,
which are a natural phenomenon when data is being updated using differ-
ent procedures and there is no active synchronization between the SaaS
and on-premise systems.
Once the “to be” state is understood and defined, data synchroniza-
tion technology is proposed as the best fit between the source system
(Salesforce.com) and the target system (the existing legacy system that
leverages Oracle). This technology is able to provide automatic mediation
of differences between the two systems, including differences in applica-
tion semantics, security, interfaces, protocols, and native data formats. The
end result is that information within the SaaS system and the legacy sys-
tem is completely and compactly synchronized. In other words, the data
entered into the CRM system would also exist in the legacy systems and
vice versa along with other operational data such as inventory, items sold,
and so on. The “to be” state thereby removes the data quality and integ-
rity issues totally. This directly and indirectly paves the way for saving
thousands of dollars per month and for producing a quick ROI from the
applied integration technology.
Integration has been a prominent subject of study and research among
academic students and scholars for years, as it brings a sense of order to
the mess created by heterogeneous compute nodes, network devices, stor-
age servers, and business services. Integration technologies, tools, tips,
best practices, guidelines, metrics, patterns, and platforms are varied and
vast. Integration is not easy to implement as successful untangling from
the knotty situation is riddled with a lot of practical difficulties. The web
of application and data silos makes the integration task really difficult and,
hence, choosing a best-in-class scheme for flexible and futuristic integra-
tion is a frequent demand. First of all, we need to gain insights on the
278 • Cloud Enterprise Architecture
Homogeneous Clouds
Heterogeneous Clouds
FIGURE 8.2
Integration within a public cloud.
280 • Cloud Enterprise Architecture
Cloud 2
Cloud 1 CSB
FIGURE 8.3
Integration across homogeneous clouds.
Public cloud
CSB
Private cloud
FIGURE 8.4
Integration across heterogeneous clouds.
Restricted Access
Access to cloud resources (SaaS, PaaS, and the infrastructures) is definitely
more limited than access to local applications. Accessing local applications
is quite simple and fast. Embedding integration points in local as well as
custom applications is easy. Even with commercial applications, it is always
possible to slip in database triggers to raise events and provide hooks for
integration access. Applications for cloud deployment should be designed
to support integration because there is no longer a low level of access.
Enterprises putting their applications in a cloud and subscribers of cloud-
based business services depend on the vendor to provide the integration
hooks and APIs. For example, the SalesForce.com web services API does
Cloud Integration Architecture • 281
Dynamic Resources
Cloud resources are intrinsically virtualized, automated, and service orien
ted. In other words, everything is expressed and exposed as a service to the
outside world for publicly discovering, accessing, and using them for a small
fee. Due to the dynamism factor that is sweeping the whole cloud ecosys-
tem, application versioning and platforms are liable to undergo frequent
changes. These clearly have an impact on the integration model. That is, in
a cloud environment, the tightly coupled integration fails, falls, falters, and
fumbles. It is clear that low-level interfaces ought to follow the representa-
tional state transfer (REST) route, which is a simple architectural style that
subscribes to the standard methods of the ubiquitous HTTP protocol.
Performance
Clouds support application scalability and resource elasticity. However,
network distances between elements in a cloud are not under our control.
Bandwidth is not a limiting factor in most integration scenarios, although
round-trip latency is an issue that cannot be sidestepped. Because of latency
aggravation, cloud integration performance is bound to slow down. Thus,
cloud-based integration solutions and services need to be chosen carefully.
With the emergence and solidification of the cloud space, the integra-
tion scope has grown a lot; hence, people are looking for robust and resil-
ient solutions and services that speed up and simplify the whole process
of integration.
284 • Cloud Enterprise Architecture
method must leverage the native security systems of the source and
target systems, mediate the differences, and provide the ability to
transport information safely between connected systems.
• Data integrity means data is complete and consistent. Thus, integ-
rity must be guaranteed when data is mapped and maintained dur-
ing integration operations, such as data synchronization between
on-premise and SaaS-based systems.
• Governance refers to system processes, policies, and technologies
that control how a system is accessed and leveraged. Within the
integration perspective, governance is all about managing changes
to core information resources, including data semantics, structure,
and interfaces.
These are the prominent qualities that ought to be carefully and critically
analyzed when selecting cloud/SaaS integration providers.
mapping one schema from the source to the schema of the target.
This defines how the data is to be extracted from one system or sys-
tems, transformed to appear native, and updated in the target system
or systems. There are visual and simplified data-mapping tools. In
addition, there is a need to consider both security and governance
concepts within the design of the data integration solution.
4. Implementation refers to actually implementing the data integration
solution within the selected technology. This means connecting the
source and the target systems, implementing the integration flows as
designed in the previous step, and then performing the other steps
required for getting the data integration solution up and running.
5. Testing refers to ensuring that the integration solution is properly
designed and implemented and that data is synchronized properly
between the involved systems. This means looking at known test
data within the source system and monitoring how the information
flows to the target system. We need to ensure that data mediation
mechanisms function correctly. In addition, QoS attributes such as
overall performance, durability, security, modifiability, and sustain-
ability of the integrated systems need to be reviewed in order to meet
any kind of functional as well as nonfunctional integration needs.
But as days go by, there will be a huge market for application and service
integration. Interoperability will become the most fundamental thing.
Composition and collaboration will become critical for the mass adoption of
clouds, which are being prescribed and proclaimed as the next-generation
infrastructure for creating, deploying, managing, and delivering hordes
of ambient, artistic, adaptive, and agile services. Cloud interoperability is
the prime demand for creating cloud peers, clusters, fabrics, and grids.
Realizing federated clouds and the intercloud is the ultimate goal so that
the envisioned goals of IoS are completely met (Figure 8.5).
Jitterbit
Force.com is a highly visible and valuable PaaS, enabling developers to
create, deploy, and deliver any kind of on-demand business application.
Salesforce.com is an on-demand CRM suite that runs on this cloud-based
Force.com platform. However, in order to take advantage of this break-
through in cloud technology, there is a need for a flexible and robust
integration solution to synchronize Salesforce.com with any on-demand
or on-premise enterprise applications, databases, and legacy systems.
Integration is a daunting task that requires too much time, investment,
and expertise.
Salesforce
.com
Google Microsoft
The cloud
Zoho Amazon
Yahoo
FIGURE 8.5
Smooth and spontaneous cloud interaction using open clouds.
288 • Cloud Enterprise Architecture
Boomi Software
Boomi Software has come out with an exciting and elegant SaaS integra-
tion product. It promises to fulfill the vision of “integration on demand.”
Although the popularity of SaaS applications is rising dramatically, the
integration task is the Achilles’ heel of the SaaS mechanism. The integration
Problem Solution
Manufacturing
Manufacturing Consumer Consumer
Sales
Sales
R&D Marketing
R&D Marketing
Jitterbit
FIGURE 8.6
Linkage of on-premise and cloud-hosted applications using Jitterbit.
Cloud Integration Architecture • 289
Bungee Connect
For professional developers, Bungee Connect (http://www.bungeeconnect
.com) enables cloud computing by offering an application development
and deployment platform that guarantees highly interactive applications
integrating multiple data sources and facilitating instant deployment. Built
specifically for cloud development, Bungee Connect reduces the efforts
required to integrate (mashup) multiple web services into a single applica-
tion remarkably. Bungee automates the development of rich UI and eases
the difficulty of deployment to multiple web browsers. Bungee Connect
leverages the cloud paradigm to bring additional value to organizations
committed to building applications for the cloud.
OpSource Connect
OpSource Connect expands the functionality of the OpSource Services
Bus by providing the pertinent infrastructure for two-way web services
interactions, allowing customers to consume and publish applications
across a common web services infrastructure. OpSource Connect also
addresses the problems of SaaS integration by unifying different SaaS
applications in a cloud as well as legacy applications running behind cor-
porate firewalls. By providing a platform to drive web services adoption
290 • Cloud Enterprise Architecture
SnapLogic
SnapLogic (http://www.snaplogic.com) is a capable, clean, and unclut-
tered solution for data integration that can be deployed in an enterprise
as well as a cloud landscape. The free community edition can be used for
the most common point-to-point data integration tasks, giving a huge
productivity boost beyond custom code. SnapLogic professional edi-
tion is a seamless upgrade that extends the power of this solution with
production-management, increased-capacity, and multiuser features at
a price that does not drain the budget, which is shrinking owing to the
economic slump across the globe. Even the much-expected “V” mode
recovery did not happen, and there is a view among economists that the
world economy is tending to the “W” mode double-dip recession and
recovery. With the shoestring budgetary allocation, the appropriation
of SaaS solutions is on the climb. The web, SaaS applications repertoire,
mobile devices, and cloud platforms have profoundly changed the require-
ments imposed on data integration technology.
1. IaaS for both hosted and on-premises applications and data sources
2. Packaged turnkey integration
3. Integration that supports every integration scenario
4. Connectivity to hundreds of different applications and data sources
Bluewolf
Bluewolf (http://www.bluewolf.com) has announced its expanded IaaS solu-
tion; it is the first to offer ongoing support for integration projects guarantee-
ing successful integration between diverse SaaS solutions, such as Salesforce
.com, BigMachines, eAutomate, OpenAir, and back-office systems (e.g.,
Oracle, SAP, Great Plains, SQL Service, and MySQL). The solution is called the
Integrator; it includes proactive monitoring and consulting services to ensure
Management
Schedule Events e-Commerce Users
Load balancer and
Resources
message queues
Engine queue Engine queue Engine queue Engine queue Engine queue
listener listener listener listener listener
Scalable
computing
cluster
SaaS
SaaS
application
application
Customer
Customer
FIGURE 8.7
Pervasive Integrator connecting different resources.
292 • Cloud Enterprise Architecture
WebSpan
WebSpan (http://www.hubspan.com/webspan) is a single-instance multi
tenant SaaS integration platform that enables organizations to more cost-
effectively integrate their business processes and data flow across internal
and external communities. In essence, WebSpan represents a “middle-
ware-in-the-cloud” solution that eliminates the need for costly hardware,
software, and staff resources to deploy, maintain, and support cross-entity
integration. Companies can utilize the WebSpan integration platform
to connect their applications, customers, or suppliers regardless of data
models or existing EAI technologies without worrying about compromis-
ing the security of systems. WebSpan provides a single and transparent
connection to link enterprises internally or externally without forcing
them to change their systems or processes as it mediates various data for-
mats, validation methodologies, security protocols, routing systems, and
business rules.
Online MQ
Online MQ (http://www.onlinemq.com) is an Internet-based queuing
system. It is a complete and secure online messaging solution for sending
Customer
Accounting
F
I
R
Internet E ERP
W Adeptia
A Automate integration
L
L
Automate biz process Data
Data replication warehouse
One-time migration
FIGURE 8.8
The linkage between on-premise and off-premise applications.
294 • Cloud Enterprise Architecture
CloudMQ
CloudMQ leverages the power of Amazon Cloud to provide enterprise-
grade message-queuing capabilities on demand. Messaging allows
breaking up a single process into several parts, which are then executed
asynchronously. The parts can be executed within different threads, or
even on different machines, and they communicate with each other by
exchanging messages. The messaging framework (http://www.cloudmq
.com) guarantees that messages get delivered to the right recipient and the
appropriate thread wakes up when a message arrives.
Linxter
Linxter is a cloud messaging framework for connecting all kinds of appli-
cations, devices, and systems. Linxter is a behind-the-scenes, message-
oriented, cloud-based middleware technology. It smoothly automates the
complex tasks that developers find difficult when creating communication-
based products and services. With the Internet-enablement of personal
devices, clothing, toasters, and so on, Linxter’s solution (http://linxter.com)
securely, easily, and dynamically connects all of them to consolidate, expose,
and share their distinct capabilities. Systems connected to the Internet can
connect to each other through Linxter’s dynamic communication chan-
nels. These channels move data between any number of end points and the
data can be reconfigured on the fly, simplifying the creation of communi-
cation-based products and services.
Online MQ, CloudMQ, and Linxter solutions all accomplish message-
based application and service integration. As these suites are hosted in
clouds, messaging is provided as a service to hundreds of distributed and
enterprise applications using the much-maligned multitenancy property.
“Messaging middleware as a service” (MMaaS) is the grand derivative of
the SaaS paradigm. It is noted that message-based integration is gaining
a lot of ground. Messages are the unifying factor. Data, documents, and
events are the prime constituents of messages. In other words, IaaS is being
accomplished in the form of “messaging as a service.” Data-mapping tools
come in handy when linking different applications and databases that
Cloud Integration Architecture • 295
Microsoft ISB
Azure (http://www.microsoft.com/azure/servicebus.mspx) is the cloud OS
from Microsoft. It makes developing, depositing, and delivering web and
Microsoft Windows applications on cloud centers easier and cost-effective.
Developers’ productivity shoots up drastically, customers’ preferences are
looked after, and the enterprise goal of more with less is achieved with
Azure. Azure is being projected as the comprehensive yet compact cloud
framework that comprises a wide variety of enabling tools for a slew of
tasks and a growing library of cloud services. Microsoft ISB is the middle-
ware suite for enabling services and applications to link with each other
and produce sophisticated applications.
being positioned as the flexible and futuristic solution for enabling seam-
less and spontaneous interactions among remote and heterogeneous cloud
platforms, services, identities, data, applications, and networks. Having
a common set of cloud definitions is an important factor that enables
vendors to exchange management information between distant cloud
providers (CSPs).
Orchestration
1. Register layer
service 1
4. Execute business
process
Client
FIGURE 8.9
Cloud service orchestration.
Cloud Integration Architecture • 299
Salesforce
force.com Amazon EC2
CRM
NetSuite ERP (VMforce)
WS
Peer Peer Windows
WS Azure
Google Apps Peer
Google
WS Peer App Engine
Peer
Microsoft
online services Integration as a Service
WS
Firewall
On-premise world
Peer
On-premise systems
FIGURE 8.10
Involving cloud users via p2p hybrid integration. WS = web services.
hosted within the enterprise, whereas data flows directly between peers.
The platform thus incorporates all the administrative benefits of a central-
broker architecture while preventing the inefficiencies of the hub from
becoming a data bottleneck.
Informatica On-Demand
Informatica (http://www.informaticaondemand.com) offers a set of innova-
tive on-demand data integration solutions called Informatica On-Demand
302 • Cloud Enterprise Architecture
very less investment and maintenance costs. The cloud concept and ideals
lay a strong and stimulating foundation for cost-effective, highly available,
and highly scalable B2Bi.
There are several proven integration solutions in the expanding B2Bi
space that can be captured and capitalized for achieving quicker success,
better return, and enhanced value in the evolving IaaS landscape. The
B2Bi systems are good candidates for IaaS as they are traditionally
used to automate business processes among manufacturers and their
external trading and channel partners such as retail, distributor, ware-
housing, transport, and inventory systems. This means they provide
application-to-application (A2A) connectivity along with functionality,
which is crucial to linking internal and external software seamlessly. In
other words, in ensuring secure data exchange across corporate firewalls
without any semantic ambiguity or syntactic differences, the B2Bi back-
bone is the key mediator. Unlike pure EAI solutions designed only for
internal data sharing, B2Bi platforms have the ability to encrypt files for
safe passage across the public network; manage large volumes of data;
transfer batch files; convert disparate file formats; and guarantee data
accuracy, integrity, confidentiality, and delivery. These abilities not only
ensure smooth communication between manufacturers and their exter-
nal suppliers or customers but also enable reliable interchange between
hosted and installed applications.
The IaaS model also leverages the adapter libraries developed by B2Bi
vendors to provide rapid integration with various business systems.
Because the B2Bi partners have the necessary expertise and experience,
they can supply prebuilt connectors to major ERP, CRM, SCM, and other
packaged business applications as well as legacy systems from AS400 to
MVS and mainframes. The use of an H&S centralized architecture fur-
ther simplifies the implementation and provides good control and grip on
system management; finally, it avoids placing an excessive processing bur-
den on the customer side. The hub is installed at the SaaS provider’s cloud
center to perform heavy lifting such as reformatting of files. A spoke unit,
typically consisting of a small downloadable Java client, is then deployed
at each user site to handle basic tasks such as data transfer. This also elimi-
nates the need for an expensive server-based solution and performing data
mapping and other tasks at the customer location. As the Internet is the
principal communication infrastructure, enterprises can leverage cloud-
based integration services to be in sync with their partners across conti-
nents to facilitate smart and systematic collaboration.
304 • Cloud Enterprise Architecture
Company A Company B
R R
REST REST
Mashup
integration Integration service logic
services
platform
(i.e., Google
App Engine)
Routing engine
Identity
management
Error handling Translation Persistent Message
and monitoring engine storage queue
Organization Semantic Infrastructure
R R R R
R
Cloud-based
OpenID/Oauth
services
Amazon SQS
Amazon S3
on-demand
on-demand
(Google)
Mule
Mule
FIGURE 8.11
Cloud-based enterprise mashup integration platform architecture.
To use the services, users have to identify themselves against the user-
access control service. This service is connected to a user management
service, which controls the users and their settings. The user management
service is connected via an API to allow the use of external services, for
example, a corporate user database. All data coming from users go through
a translation engine that unifies the data objects and protocols, so that
different mashup platforms can be integrated. The translation engine has
an interface that allows connections to other external translation engines,
which adds support for additional protocol and data standards. The trans-
lated data is forwarded to the routing engine, which is the core of mashup
308 • Cloud Enterprise Architecture
Message Queue
The message queue is realized by using Amazon’s SQS. The SQS is a web
service that provides a queue for messages and stores them until they can
be processed. The mashup integration services, especially the routing
engine, can put messages into the queue and recall them when they are
needed.
Persistent Storage
Amazon Simple Storage Service (S3) is a web service. The routing engine
can use this service to store large files.
Translation Engine
receiving a message from an enterprise mashup tool via an API, the inte-
gration services first check the access rights of the message sender against
an external service. An incoming message is processed only if the message
sender is authorized, that is, if he or she has the right credentials to deliver
the message to the recipient and use the mashup integration services. If he
or she is not properly authorized, processing stops and an error message is
created and logged. The error log message is written to a log file, which can
reside on Amazon’s S3. If the message is accepted, it is put in the message
queue in Amazon’s SQS service. If required, the message is translated into
another format, which can be done by an external cloud-based service.
After this, the services begin trying to deliver the message to the recipient.
Evaluation of recipients of a message is based on rules stored in the routing
engine, which are previously configured by a user. Finally, the successful
delivery of the message can be logged or an error message appears.
Thus, it is very clear that next-generation services with the massive
adoption of clouds will be extremely people centric, composite, and col-
laborative. Newer service platforms are being built every day to deploy
these specialized and sophisticated services in next-generation clouds.
Social network
of doctors for Environmental Urban traffic Other data
monitoring data analysis prediction analysis or
patient and sharing and analysis social network
health care for portal network
virus infection
WSN 1 1 1 1 1
Gateway
3
System
Application-specific 2 manager 3 Provisioning
services (SaaS) 3 manager
3 Monitoring 4
Actuator Gateway 2
4 and metering 4
Sensor
Pub-sub broker Servers
Event Registry Mediator Service
WSN 2 Gateway monitoring
and Analyzer registry
processing
Disse-
3 minator
Policy
repository
Sensor
Actuator Gateway Collaborator
Sensor agent
FIGURE 8.12
Framework architecture of sensor-cloud integration.
Registry Component
Different SaaS applications register to the pub-sub broker for various sen-
sor data required by the community user. For each application, a registry
component (RC) stores user subscriptions of that particular application
and the sensor data types (temperature, light, pressure, etc.) in which the
application is interested in. Also, it sends all user subscriptions along with
the application ID to the disseminator component (DC) for event delivery.
Analyzer Component
When sensor data or events come to the pub-sub broker, the analyzer
component (AC) determines the applications to which they belong and
whether they need periodic or emergency delivery. The events are then
passed to the DC, which delivers them to the appropriate users through
SaaS applications.
The DC
Each SaaS application disseminates sensor data or events to subscribed
users using an event-matching algorithm. It utilizes the cloud’s parallel
execution framework for faster delivery.
The workflow of pub-sub components in the framework is as follows:
Users register their information to get a subscription to various SaaS
applications, which transfer all the information to the pub-sub broker reg-
istry. When sensor data reaches the system from the gateways, the event
monitoring and processing component or SMPC in the pub-sub broker
determines whether the just received data need to be processed, stored
for a while, or delivered immediately. If sensor data needs periodic and
emergency delivery, the analyzer determines to which SaaS applications
the events belong and then passes the events to the disseminator along
with the application IDs. The disseminator, using the event-matching
algorithm, finds appropriate subscribers for each application and delivers
the events for use.
Besides the pub-sub broker, the authors propose the inclusion of three
other components, mediator, policy repository (PR), and collaborator
agent (CA), along with components such as system manager, provision-
ing manager, monitoring and metering agent, and service registry in the
sensor-cloud framework to enable VO-based dynamic collaboration of
314 • Cloud Enterprise Architecture
primary CSPs with other CSPs in case of any SLA violations. These three
components collectively act as a gateway for a given CSP in the creation of
a new VO.
Mediator
The (resource) mediator is a policy-driven entity within a VO, which
ensures that the participating entities are able to adapt to changing cir-
cumstances and achieve their objectives in a dynamic and uncertain envi-
ronment. Once a VO is established, the mediator decides which resources
of collaborating CSPs must be used, controls how this decision is made,
and determines which policies should be used. When performing auto-
mated collaboration, the mediator will also direct any decision making
during negotiations, policy management, and scheduling. A mediator
holds the initial policies for VO creation and works in conjunction with its
local CA to discover external resources and to negotiate with other CSPs.
The PR
The PR virtualizes all the policies within a VO. It includes mediator
policies and VO creation policies along with any policies for resources
delegated to the VO as a result of a collaborating arrangement. These poli-
cies form a set of rules to administer, manage, and control access to VO
resources. They provide a way of managing the components when using
complicated technologies.
The CA
The CA is a policy-driven resource discovery module for VO creation and
it is used as a conduit by the mediator to exchange policy and resource
information with other CSPs. It is used by a primary CSP to discover the
(external) resources of collaborating CSPs, as well as to let them know
about local policies and service requirements prior to the commencement
of actual negotiation by the mediator.
In conclusion, to deliver published sensor data or events to appropriate
users of cloud applications, an efficient and scalable event-matching algo-
rithm called “statistical group index matching (SGIM)” is leveraged. The
authors also evaluated the algorithm’s performance and compared it with
existing algorithms in a cloud-based ubiquitous health-care application
Cloud Integration Architecture • 315
scenario. The authors clearly enunciate that this algorithm in sync with
the foundational and fruitful cloud framework enables sensor-cloud con-
nectivity to utilize sensor data for various community-centric sensing and
responsive applications on the cloud. It can be seen that the computational
tools needed to launch this exploration is more appropriately built from
the data center cloud computing model than traditional HPC approaches
or grid approaches. Based on this creative work, it is possible for many to
visualize new-generation cloud-sensor platforms and applications.
CONCLUSION
The SaaS in sync with cloud computing brings in strategic shifts for busi-
nesses as well as IT industries. Increasingly, SaaS applications are being
hosted in cloud infrastructures and the open Internet is becoming the
primary communication infrastructure. These combinations of game-
changing concepts and infrastructures are a blessing especially now that
the world is going through an economic slump and instability. The goal
of “more with less” is being met with the maturity and stability of the
freshly plucked and published advancements emanating out of the cloud
technology landscape. Applications are studiously and strategically being
moved to clouds and are being exposed as services. In other words, ser-
vice delivery happens over the Internet to user agents and human beings.
Service consumption occurs through a host of browsers (desktop as well as
mobile), specific client-side applications, contact and call centers, special
instruments put up at public places, and so on.
The unprecedented adoption of cloud technology instigates and instills
a number of innovations; already there is a lot of buzz on newer expo-
sition, consumability, modifiability, and accessibility models. Ubiquity
and utility will soon become common connotations. Value-added busi-
ness transformation and optimization along with on-demand IT will be
the ultimate output. In the midst of all this enthusiasm and optimism,
there are some restricting factors that need to be precisely factored out
and comprehensively resolved in order to create an extended ecosystem
for intelligent collaboration. Integration is one such issue and hence a
number of approaches are being articulated by professionals. Product
vendors and consulting and service organizations are mulling over and
coming out with integration platforms, patterns, processes, and best
316 • Cloud Enterprise Architecture
practices. There are generic as well as specific (niche) solutions. Pure SaaS
middleware as well as stand-alone middleware solutions are being stud-
ied and prescribed based on the “as-is” situation and the “to-be” aspira-
tion. Business and technical cases of cloud middleware suites are steadily
evolving and expanding; the realization of Internet-scale ESB is being
touted the next big thing in the exotic and exciting cloud space. In this
chapter, we elaborated upon the need for an on-demand, adaptive, and
converging integration backbone that streamlines and simplifies integra-
tion among cloud, enterprise, and people environments.
REFERENCES
1. Linthicum, D. S. 2009. Data Services—The Right Way to Integrate Data for Application
Integration. David S. Linthicum, LLC. http://www.informatica.com/downloads/7041_
datasvcs_linthicum_wp_web.pdf.
2. June 2011. Collaborative Data Integration: Self-Service Bridges the Gap between the
Business and IT. Informatica. http://www.informatica.com/downloads/7066_INFA_
Bus_IT_Collab_wp_web.pdf.
3. October 2010. The Power of the Platform: The Informatica Platform Fuels the Data-
Driven Enterprise. Informatica. http://www.informatica.com/Images/09107_6959-
power-of-the-platform.pdf.
4. Hassan, M. M., B. Song, and E.-N. Huh. 2009. “A Framework of Sensor-Cloud
Integration Opportunities and Challenges.” In Proceedings of the 3rd International
Conference on Ubiquitous Information Management and Communication, New York:
ACM, 618–626. http://dl.acm.org/citation.cfm?id=1516350.
5. 2010. Rethinking Data Integration in the Cloud: A Revolutionary Approach. Kapow
Software.
6. Hubspan Business Integration Platform. Hubspan. http://hubspansitefiles.s3.amazonaws
.com/wp-content/uploads/2009/08/hubspan-integration-platform.pdf.
7. Siebeck, R. G. et al. 2009. “Cloud-Based Enterprise Mashup Integration Services for
B2B Scenarios,” MEM2009 Workshop, Spain.
8. 2010. Cloud-Based Integration and SOA Architecture: The Benefits of a Peer-to-Peer
Approach. Fiorano Software Ltd. http://www.fiorano.com.
9. Thor, A. and E. Rahm. April 21, 2011. CloudFuice: A Flexible Cloud-Based Data
Integration System. http://dbs.uni-leipzig.de/file/CloudFuice_techreport.pdf.
9
Cloud Management Architecture
INTRODUCTION
The success of applications solely determines the business value of IT; hence,
the effective development, deployment, management, and enhancement of
applications are the highest priorities of IT. Further, application performance,
availability, scalability, and security are paramount to continue adding to the
value of IT. A number of technology-sponsored augmentations, accelerations,
and automations are taking place in the IT field. The SOA is one such tidal and
tectonic shift that simplifies and streamlines application design and develop-
ment. Software is built using a dynamic collection of services. Incorporation
of service characteristics such as discoverability, reusability, and composabil-
ity in software came as a big relief to the software engineering community.
Now with the arrival of clouds, there is an unprecedented transition on
the service-enablement front. The SOA paradigm introduced software ser-
vices; with clouds it is possible to have network-accessible hardware ser-
vices. In other words, every IT resource (virtual and physical IT modules)
can be expressed and exposed as a service. The service view has signifi-
cantly reduced IT complexity (design, development, articulation, man-
agement and, finally, use) through the logical separation of interface and
implementation. As a result, all kinds of technological heterogeneities are
wiped out in one stroke. The restraining and constricting dependencies of
software vanish and, thereby, a series of incisive and incredible innovations
in the form of service patterns, platforms, practices, prescriptions, and
processes flourish in an open and uncontaminated environment. A stream
of novel service providers have cropped up across industry segments with
the overwhelming adoption and adaption of the venerable service idea.
Clouds are the converged, dynamic, and adaptive infrastructure for
next-generation service building, delivery, and consumption. The seamless
317
318 • Cloud Enterprise Architecture
IT Service Management
As mentioned in the previous section, in the cloud era everything is viewed
as an approachable, autidable, and active service. Therefore, the best prac-
tices and prescriptions of IT service management (ITSM) can be appropri-
ately refined to elegantly fit the evolving needs of cloud service management
(CSM). It is noted that ITSM is mainly concerned with delivering and sup-
porting IT services that are appropriate to the business requirements of
an organization [6]. The ITSM is process oriented as opposed to IT man-
agement, which is more technology oriented. Due to its process-oriented
nature, ITSM shares commonalities with the process improvement frame-
works such as total quality management (TQM), Six Sigma, BPM, and
capability maturity model integration (CMMI). The key concerns for man-
agers regarding IT services are increasing demands for better returns from
IT investments, regulatory requirements for IT control, optimization of
costs, and the ability to assess performance against standards.
In order to provide these requirements, ITSM has to have a common vocab-
ulary, a set of management principles, and an approach to ensure the pro-
liferation of best-in-class, portable, and resilient ITSM platforms. Factually,
ITIL v2 typically reflects the process-based view of ITSM, whereas the new
ITIL v3 focuses on the larger view of the entire life cycle of IT services.
The ITSM part of ITIL v2 is divided into two parts: (1) service support and
(2) service delivery. In addition, ITIL outlines other operational guidance
aspects including ICT infrastructure management, security management,
the business perspective, application management, software asset manage-
ment, and plans to implement service management. However, ITIL v3 has a
322 • Cloud Enterprise Architecture
Continual service
improvement Service
transition
Service
strategy
Service Service
design operation
FIGURE 9.1
The ITIL life cycle core stages.
life cycle perspective (Figure 9.1) including service strategy, service design,
service transition, service operation, and continual service improvement.
In the service strategy life cycle phase, a number of strategic decisions
toward developing a service are made, that is, decisions such as which ser-
vice should be provided for which customer or what kind of new services a
company has to build and supply. In the service design life cycle phase, the
trend is to design new services or to design changes in existing services to
increase their quality. The processes necessary to transport services from
the service design phase to operation are provided by the service transition
phase. Within the service operation phase, services run to produce added
value for customers. This life cycle phase provides a bevy of processes such
as incident management or a process for handling service requests. There
is a special life cycle phase that deals with the continuous improvement
of services. This phase is responsible for increasing the efficiency of the
services provided. Table 9.1 shows which life cycle is primarily responsible
for which processes.
TABLE 9.1
Service Management Life Cycle Phases [6]
Life Cycle Processes
Service strategy Service strategy process, service portfolio management, demand
management, and financial management
Service design Service level management, service catalog management, availability
management, information security management, supplier
management, capacity management, and IT service continuity
management
Service transition Change management, service asset and configuration management,
release and deployment management, knowledge management,
transition planning and support, service validation, and testing
and evaluation
Service operation Incident management, problem management, event management,
request fulfilment, and access management
Continual service Seven-step improvement process, service reporting, and service
improvement measuring
Financial Management
Financial management is one of the aspects of the service strategy to cal-
culate the return on investment (RoI) of providing services. However,
often services are delivered on a fixed-price model, that is, services are
measured and charged over a period of time by predicting service levels
and number of users. Organizations need to move to the pricing model
based on use or subscription. One of the key functionalities of the cloud is
to perform complete metering and charging of services that are delivered.
If the goals of self-servicing, flexible access to IT resources, and tighter
alignment with business expectations are to be met, then the adoption of
cloud computing is inevitable. The paradigm may start small, but it is des-
tined to grow fast to support and sustain mission-critical workloads over
time. Whether embarking on the wholesale transformation of IT or on
a measured and stepwise approach, forward-thinking IT groups need to
craft their plans with the end goals in mind. Some choose to begin with a
small pilot project, whereas others jump into architecting the end solution
straightaway. However, it has to be noted that architecture and design must
deliver against business needs and IT efficiency goals in the years to come.
In cloud environments, it is paramount that services are able to con-
nect and communicate securely with internal IT services and other public
services. Service value chain management mandates that resource use and
consumption is monitored and managed to support strategically sound
decisions. By understanding exactly who is using a service, along with
when and how the service is being used, service providers can determine
the intrinsic value that the service provides to a business. The IT depart-
ment can also use this information to compute the RoI and TCO for its
cloud initiatives and related services.
A Sample Scenario
To fully comprehend the necessity of holistically managing cloud centers,
we can consider the following scenario: An office worker in a remote branch
reports a slow application. There could be one or more causes for the slow-
ing down of an application. Is the application really overloading the host, or
is the database server not responding fast enough? Is there another appli-
cation on the same server that is competing for system resources? Is the
storage network between the database server and the storage all right? Are
the supporting network infrastructure services such as the domain naming
service (DNS) servers functioning properly? Did someone recently make a
change to network devices, applications, or databases? Is the virtualization
server in the process of moving the virtual host containing the application
or the database server from one physical machine to another? Are there
known unpatched security vulnerabilities in the server? If the application
slowdown is caused by one or more security vulnerabilities, the questions
to be asked are how did they get into the network, who is the attacker, and
who else is affected? Is another user downloading a large file or watching
streaming media that is clogging up a shared router interface? The chal-
lenge lies in rapidly identifying the exact reason for the sudden slowdown
and taking corresponding countermeasures to maintain the agreed on ser-
vice levels.
it hard to check if all the assigned VMs are actually needed by the busi-
ness. They are not sure whether those VM resources should be reassigned
to other workloads. This situation results in inefficient use of resources
and drives unnecessary purchases of additional physical servers. It also
forces IT staff to continue to support VMs and workloads that are no lon-
ger contributing copiously.
In addition to virtualization management challenges, multihypervi-
sor environments experience the same issues that affect heterogeneous
physical environments. Each vendor’s hypervisor has its own set of APIs,
performance monitors, and VM provisioning and migration technologies
that need to be integrated into consistent, standardized workflows and
automated provisioning profiles. This added layer of complexity makes it
even more challenging for IT teams to operate effectively. In short, siloed
IT management tools are not sufficiently empowered to correlate data
effectively and quickly and, hence, the real problem of inferring the root
cause is often left to the user. Even after the root cause is identified, get-
ting the true identity and current location of the offending user or host is
another tough nut to crack since this information is spread across different
management domains, for example, OS logs, router configurations, and
VPN logs. This deficiency of real-time visibility affects the organization’s
capacity to keep an IT infrastructure healthy with minimal service-level
disruption and degradation.
CSM PROCESSES
Cloud computing has significantly impacted how companies deploy, deliver,
and support applications. On the positive side, the cloud idea increases
end-user productivity and reduces infrastructure costs. But on the other
hand, IT operation and support teams are forced to manage and maintain
increasingly complex application and system infrastructures. A number of
factors such as the move from centralized to federated computing styles and
the inevitable transition from physical to virtual infrastructures have con-
tributed to the unwanted growth of IT complexity. Traditionally, growth
in complexity leads to greater risks and higher costs due to an increase in
the number of components that must be taken care of. Because of this, IT
infrastructure managers must first determine which IT processes need to
be implemented in a cloud environment. The IT best practices and pro-
cesses have been well documented in ITIL and ITIL version 3 is the most
recent version of this widely accepted and used framework.
Earlier, companies mostly relied on change management and problem
management to reduce risk and costs. This means that service manage-
ment was largely reactive as it only scheduled software changes whenever
necessary and fixed problems as they occurred. Now with the introduc-
tion of the ITIL framework, companies have recognized the need to tran-
scend simple change and problem management to address the growing
complexity of its infrastructure. In response to this urgent need, there
is a focus on release management to control software releases. With the
Internet emerging as the open, public, and cheap medium for data com-
munication, the new and centralized service delivery model “application
Cloud Management Architecture • 329
service provider” (ASP) has become popular. This transition has laid the
foundation for formalized capacity management, service level manage-
ment, and service continuity management concepts. Taken together, the
seven systems management processes, detailed in the following seven sec-
tions, provide worldwide corporations enough ammunition and immu-
nity with the right and relevant framework to successfully and securely
plan and operate in the ensuing cloud era.
Change Management
Change management is a fundamental management aspect in the IT indus-
try. Changes are very common and casual, yet they need to be given prime
importance in order to zoom ahead of the competition. Change manage-
ment deals with changes explicitly and defines what type of changes are
required on an application to reach an assigned goal. It also involves exe-
cuting the right change workflow for the type of change and remedying
the change if it does not work out as expected. With the introduction and
incorporation of multitier application architectures in IT environments,
multiple IT application and infrastructure groups are forced to articulate
and apply changes to an application in a production environment and to
coordinate changes across geographically distributed teams. The second
step is to create a separate quality assurance (QA) environment that paral-
lels the production environment to test the recommended changes. This
directly increases the chance that changes get reliably implemented in the
application. By tying up an MSP that offers cloud capabilities, the orga-
nization is able to implement change management processes much more
cost-effectively. Since cloud service provider (CSP) use more advanced and
automated systems, the organization squarely depends on the provider
to build consistently standardized and identical platforms. In addition,
because the provider also uses a configuration database that provides a
clear view into infrastructure dependencies, the organization could refo-
cus its developers’ attention and competencies on application changes and
reallocate the infrastructure support resources to other viable projects.
In summary, the core focus of service management is to support busi-
ness and IT when it comes to outages and changes. A CSP must ensure
that all outages or exceptions to normal operations are resolved as quickly
as possible while capturing all relevant details for the actions that were
taken. Moreover, change management becomes critical for a CSP whose
revenue depends on the delivery of highly impactful, insightful, and
330 • Cloud Enterprise Architecture
Problem Management
The objective of problem management is to minimize the adverse impact
of application errors and bugs. The goal is to completely prevent the recur-
rence of incidents caused by the errors. Problem management encompasses
two key processes: (1) addressing one or more incidents as they occur and
(2) eliminating recurring errors for which root causes have already been
identified. An organization first implements problem management to track
the number of bugs in each release of its own software products. It also
uses root cause analysis of incidents to identify problem patterns. Fixing
the sources of recurring problems empowers the organization to improve
its software release process by incorporating tests during QA. However,
with the pervasiveness of the Internet, the number and types of problems
have increased manifold due to the running of applications by a wider vari-
ety of application infrastructures and end-user workstations. To address
these problems, the organization takes three steps: (1) It standardizes
the types of infrastructure components on which its software is deployed.
(2) It increases its control over application and infrastructure changes by
bundling all changes into a single packaged release. (3) Finally, it specifies
the types of laptops and desktops that can be used as client machines.
Initially, these actions significantly reduce the problems that customers
face with the application. By standardizing server builds, the development
teams can depend on a well-understood production environment. This in
turn enables them to package multiple application changes into fewer and
larger releases that are more thoroughly tested in the QA environment.
However, the growing variety of available end-user workstations prevents
the organization from limiting the ones customers can use. Once this is
realized, the organization can change its application’s interaction with cli-
ent hardware to use only standard programming interfaces.
Finally, the organization switches over to a cloud infrastructure and is
able to leverage the advertised benefits of configuration automation by
taking a just-in-time approach to QA. By creating and operating system
integration and production testing QA environments only as needed, the
costs can be dramatically reduced. In addition, the provider’s use of pro-
visioning automation reduces the number and variety of problems that
Cloud Management Architecture • 331
Release Management
Software release is a continuous affair. Release management primarily
governs both hardware and software additions and changes to the produc-
tion environment by having clear-cut deployment plans in place. In other
words, release packages can be built, installed, tested, and deployed; sub-
sequently, a knowledge transfer session happens with prospective users
and operation teams to optimize service use. Postinstallation technical
support is also considered here.
When an organization first creates and releases new products, applica-
tion development managers only consider bundling all the related changes
for major software releases. When the Internet emerged as the principal
communication infrastructure for service delivery, additional quality con-
trols were imposed for product redesign and marketing. The organization
introduced a formal release management process to govern all hardware
and software changes, and developers could no longer view changes in
isolation since release management forces development teams to consider
what would be impacted by each change.
Within the cloud infrastructure, this well-structured release manage-
ment process helps to rapidly create standard testing environments that
match production infrastructure when needed and release resources when
testing has been completed. This cloud feature allows testing each release
332 • Cloud Enterprise Architecture
for completeness and stability before promoting the bundle to its produc-
tion environment.
Security Management
The perpetual security issue is a prominent topic for deep study, analysis,
and research across the globe. The security discipline occupies the top slot
in every endeavor these days. Creative security practices, frameworks, and
solutions are therefore given due recognition in enterprise IT. Anticipating
security threats, vulnerabilities, and risks is necessary to preemptively
and proactively provide utmost security and safety for expensive IT infra-
structures, platforms, information assets, and applications. Access control
through a user ID and a password is one proven mechanism for safeguard-
ing application data. Standards-compliant single sign-on (SSO) solutions
are bought and attached to ensure stringent application security while pro-
viding easy accessibility to global users. However, when offering a SaaS
solution, the organization has to sharply enhance its security level through
additional layers such as a perimeter defense to limit general access to its
applications. It also introduces a security prescription between each pair
of layers in the three-tiered architecture to limit any unauthorized access
between layers. Finally, the organization moves its SaaS offering to a third-
party CSP and achieves enhanced security for its application assets at a
lesser cost. The cloud service provider (CSP) takes the seminal responsibil-
ity for patching and protecting system and application infrastructures.
Capacity Management
Capacity planning is a critical and crucial activity in enterprise IT. If
capacity is rightly visualized, supplied, and utilized, then a lot of infra-
structure costs can be easily saved. It is important to ensure a neat bal-
ance between demand and supply. If supply and demand are out of sync,
then service delivery is greatly affected. To perform capacity planning
and management effectively, organizations need to monitor application
infrastructures, end-user experience, and infrastructure utilization over a
period of time to correctly judge and gauge the exact requirement that can
sufficiently meet SLA requirements.
When an application is reengineered for a three-tiered infrastructure,
customers can do a small capacity addition to address user demand.
Cloud Management Architecture • 333
However, this is problematic with the ASP model since each customer
requires his or her own isolated infrastructure and data. The answer is to
create a multitenant solution, which isolates customer data in the database
and virtualizes the web and application tiers. The fallout is that multiple
customers can run on fewer servers. When the application gets migrated
into the cloud, cost reduction is enormous. Capacity planning is dynamic
and simple in clouds since a host of innovative measures and automated
tools are used for this purpose, so that any spike in user base as well as
workloads is smartly managed without affecting service delivery. Resource
expansion and contraction is completely automated in clouds and, hence,
capacity management in clouds is simple and cheap.
• Self-service IT
• Faster time to market
• Greater experimentation and discovery
• Access to new business models and markets
These service blueprints ensure that users are getting the right cloud ser-
vices to meet their specific needs while maintaining tight administrative
controls. Administrators are able to design and configure service blue-
prints and manage the cloud environment within the cloud administrator
portal. Similarly, users are presented with their choices through a self-
service request and management portal.
To deliver the most flexible service stacks for users, BMC cloud life cycle
management supports a very flexible provisioning capability. This is accom-
plished by marrying the service blueprints with automated full-stack provi-
sioning, which allocates physical resources and an OS in the environment,
provisions and configures network containers for multitenant support, and
layers middleware and applications into the cloud service. BMC cloud life
cycle management can even layer compliance rules and monitoring tools into
each service delivered. In other words, it provides users precisely the right stack
while maintaining tight control on the complex IT environment. Intelligent
placement of the cloud service is driven by the BMC solution’s unique service
governor functionality, according to the following set of factors:
Once provisioned, the service enters its operational phase, where BMC
solutions manage the normal day-to-day activities of performance and
capacity management, as well as patching and configuration management.
BMC cloud life cycle management supports a variety of underlying plat-
forms across hypervisors, servers, storage, and networks. Further, BMC
works with public CSPs to support the provisioning of those resources
in a hybrid model. For ensuring security, a unique feature of BMC cloud
life cycle management called the “network container functionality” cre-
ates isolated and secure virtualized network zones within the cloud.
Network containers are often used by organizations to separate cloud
services from one another in a comingled and multitenant environment.
The container creates isolated networking environments that can include
security zones, firewalls, and load-balancers. Once created, cloud services
can be provisioned within their deployment and execution containers.
340 • Cloud Enterprise Architecture
Cloud application
management Software as a service “SaaS”
Cloud (infrastructure)
management Platform as a service “PaaS”
Hypervisors
FIGURE 9.2
Cloud application and infrastructure management solutions providers.
vCloud-powered Independent
Secure private cloud public clouds
public clouds
End-user computing
View Thin app Zimbra SaaS Other SaaS
applications providers
Application access
Application portabiliy
Application mobility
VMware vSphere: Foundation for cloud computing
FIGURE 9.3
Cloud infrastructure management stack.
• Elastic scalability
• Secure multitenancy
• Rapid provisioning
• Storage efficiency
• Provision of chargeback
• Integrated data protection and high availability
• Unified storage
Figure 9.3 highlights the right products for automating cloud infra-
structure management activities.
User
requests
VMware vCloud Director
VMware vSphere
BMC cloud
life cycle Hardware
management
Private cloud
VMware vCloud Director
Public cloud
VMware vSphere
Hardware
FIGURE 9.4
A cloud management solution.
Cloud Management Architecture • 343
Cloud
management
offerings
Maintain • Ongoing administration of your environment: user management,
profiles, roles, etc.
Business
services E-mail WWW CRM ERP SAP UC
Business alignment
CxO Operational Service-level Governance Capacity
and intelligence agreements and compliance planning
directors
Reporting
Operational oversight
Change and configuration Application performance Identity, access, and Security and
management (CMBD) management location monitoring behavior
monitoring
Asset Service to Root cause
Operations management application mapping analysis
and
engineering
Discovery, correlation, consolidation,
and event monitoring
Incoming
data Network Security Applications Users Servers Other
FIGURE 9.5
AccelOps data center and cloud service management platform architecture.
Cloud Management Architecture • 345
Directory
FIGURE 9.6
The Jamcracker unified services management solution architecture.
Data Integration
Data diversity is a common phenomenon in data centers. The obligatory
need for data integration can therefore be achieved through a standards-
based integration of data originating from various infrastructure compo-
nents. This capability is a definite success if integration is able to proceed
with the orchestration of subsequent actions as an insightful response to
events such as user requests or alarms. Many layers play an important role
and, hence, there is a large set of provider APIs ranging from storage to
application levels. The situation becomes trickier when products from dif-
ferent vendors coexist in the same data center. The products differ vastly
in syntax and semantics from the data supplied and functionality offered
through APIs.
Semantic technologies have been acquiring strategic significance in all
kinds of heterogeneous scenarios. The authors have used RDF as a data
model for semantically integrating heterogeneous information sources in
order to get a complete picture across the entire data center, both horizon-
tally across different product versions and vendors and vertically across
storage, compute units, network, OSs, and applications. The RDF-based
integration offers the flexibility needed to integrate new sources in the
presence of heterogeneity in data centers.
front end
Browser
Intelligence Edition
Presentation
layer
Visualization Navigation Collaboration
widgets widgets widgets
Virtual landscape management
information access
Collaboration
Data management
Semantic data store
Search and
Self-service
support
layer
Provider content User-generated content
Wiki
pages
Data integration
layer
EMC storage Virtual center JMX Rel. DB
provider provider provider provider
VLM
VLM VLM
VL VM VL VL
VM
Application layer
VM
Data center resources
VM
Business resources
VM
VM VM VM VM VM
VM VM
Virtualization layer
Customer
Netw.-att. Network Computing resources database
storage
Hardware layer
Server Superdome Egenera
FIGURE 9.7
eCloudManager architecture.
that extracts data from a single physical or logical resource (e.g., an EMC
storage device, a VMware Virtual Center, or a relational database), con-
verts it into RDF, and integrates the resulting RDF data into the central
repository, which is at the data management layer. Technically, it is real-
ized as a Sesame triple store that adheres to a predefined (yet extendable)
web ontology language (OWL) ontology. In addition to the repository, the
layer provides components for search- and semantics-based information
access. A central component of this layer is a collection of semantic wiki
pages that are associated with resources contained in the repository; they
offer an entry point to eCloudManager users, allowing one to add new and
complement existing information.
The uppermost layer in the Intelligence Edition is the presentation layer.
Located on top of the data management layer, it comes with a predefined
set of widgets with varying functional focus, for example, offering support
Cloud Management Architecture • 351
to display wiki pages, visualizing the underlying data using charts and dia-
grams, navigating through the underlying RDF graph, and collaboratively
annotating resources in the database using both semantic annotations
and free-text documentation.
+ customer *
* + volume * + host
Volume + technicalCoach + projectCoach
Host * + host
SystemInstance * *
size : long power : string Person
sizeUsed : long cpuUsage : float status : string
1
memoryAvailable : long + host
memoryUsed : long
* + lun
* + lun
Lun
VM Physicalhost
size : long *
sizeUsed : long + vm
FIGURE 9.8
An overview of the eCloudManager ontology.
352 • Cloud Enterprise Architecture
CONCLUSION
Laudable innovations in virtualization and distributed computing meth-
ods as well as improved access to high-speed Internet have set the course
for cloud computing. As enterprises strategize to move their business-
critical and enterprise-class applications, platforms, and infrastructures
to the cloud environment, these cloud services have to be taken care of in
their new environments. This enforces the view that there must be verified
and validated processes, products, and practices in place to effectively mea-
sure, manage, and maintain such services. With the surging popularity
of the cloud concept, process-compliant, business-aware, model-driven,
people-centric, and cloud-based services are emerging and evolving fast
to tackle diversifying business needs. As the cloud era steadily unfurls, all
the cloud-induced innovation and flexibility factors have to be immacu-
lately recognized and preserved to prosper. Otherwise, there is no point in
contemplating this transition, which is being proclaimed the most strate-
gic and significant movement since the advent of the Internet.
Cloud resources require more purposeful, preemptive, and proactive
management and maintenance methods and tools. Due to the increasing
complicity associated with coexisting and commingling heterogeneous
elements, the fast-growing and multidimensional cloud landscape brings
in a different set of management challenges. Considering the trendsetting
cloud differentiators, processes of dynamically managing, tracking, moni-
toring, maintaining, substituting, and even cloud services that are being
retired have to be fully automated in order to reap all their promised ben-
efits. Myriad cloud management software solutions are available for appli-
cations and infrastructures. Some are only enhanced versions of existing
solutions, whereas others are being built from scratch with the cloud para-
digm in mind. A host of pioneering techniques and algorithms are being
recommended by scholars and scientists for constructing next-generation
management software suites that would take care of all kinds of cloud
Cloud Management Architecture • 353
resources smartly and successfully so that the cloud concept prevails and
proceeds toward its envisaged destination without a hitch.
REFERENCES
1. 2010. Enabling Datacenter and Cloud Service Management for Mid-Tier
Enterprises. AccelOps, Inc. http://www.accelops.net.cn/pdf/AccelOps_
DataCenterITServiceMgmt0110.pdf.
2. June 2011. The Changing Role of Network Management—Keeping Pace with the
New Demands of Virtualization and Cloud. EMA and EMC. http://www.emc.com/
collateral/software/white-papers/changing-role-network-management.pdf.
3. 2011. Appirio Cloud Management Datasheet. Appirio Inc. http://www.appirio.com/
company/pdf/AppirioCloudMgmt.pdf.
4. Escapa, C. August 6, 2010. Cloud Management Guide. http://www.abiquo.com/files/
white_paper_cloud_management_guide.pdf.
5. Turner, M. J. April 2011. Effective Management of Heterogeneous Datacenters and
Multi-hypervisor Environments. IDC. http://i.dell.com/sites/content/shared-content/
solutions/en/Documents/managing-datacenters-multiple-hypervisors.pdf.
6. Jansen, M. 2011. “What Does IT Service Management Look Like in the Cloud? An
ITIL Based Approach.” In Proceedings of the 2011 International Conference on Applied,
Numerical and Computational Mathematics and Proceedings of the 2011 International
Conference on Computers, Digital Communications and Computing, World Scientific
and Engineering Academy and Society, Stevens Point, WI, September 15–17,
2011: 87–92. http://www.wseas.us/e-library/conferences/2011/Barcelona/ICICIC/
ICICIC-14.pdf.
7. Nothern, D. 2010. Key Service Management Processes for Cloud Infrastructures.
Savvis, Inc. http://www.savvis.com/en-us/info_center/documents/hos-whitepaper-
keyservicemanagementprocessesforcloudinfrastructures.pdf.
8. Turner, M. J. April 2011. Effective Management of Heterogeneous Data centers and
Multi-hypervisor Environments. IDC.
9. Haase, P. et al. 2010. Semantic Technologies for Enterprise Cloud Management. http://
www.informatik.uni-freiburg.de/~mschmidt/docs/iswc10.pdf.
10
Cloud Security Architecture (CSA)
INTRODUCTION
According to the U.S. National Institute of Standards and Technology (NIST),
“Cloud computing is an enabling model for people to have on-demand net-
work access to a dynamic and shared pool of IT infrastructure, platform,
and software assets that can be rapidly and dynamically provisioned and
deprovisioned as per changing needs.” The much-discussed cloud comput-
ing paradigm looks to deliver IT infrastructure and platform services via
the Internet to anyone from any corner of the world. Cloud resources can
be subscribed to on-the-fly to support specific short-term project needs or
they can be leveraged on a long-term basis to add capability to an existing
IT infrastructure. Some companies fully team up with one or more third-
party cloud providers to fulfill all of their IT requirements.
We have indicated elsewhere that the advent of cloud technology is a
definite plus for the ravaged IT industry and this transformative and dis-
ruptive paradigm is set to lead the industry on a strategic and success-
ful journey befitting and benefiting every single IT-run business segment
immensely in the years to come. In short, the promising cloud techno
logy has the innate wherewithal to unleash a series of decisive innovations
and optimizations on all kinds of industries aiming to keep up with the
changes (technology, government rules and regulations, social, market,
and so on) happening around the world. The proofs, pilots, and prototypes
thus far clearly illustrate and illuminate the path toward the originally
envisaged cloud-inspired destination.
The cloud paradigm, a relatively new entrant into IT, is growing fast with
a number of crucial and critical contributions from different sets of people.
The results are in the form of cloud-specific standards, design patterns,
assessment, migration and on-boarding strategies, modernization and devel-
opment methodologies, key guidelines and evaluation metrics, technology
355
356 • Cloud Enterprise Architecture
solutions for cloud concerns and challenges, and usage scenarios. In this fluc-
tuating situation, it is pertinent for cloud users to diligently weigh and ana-
lyze the benefits (tactical as well as strategic), the risks involved, and the costs
of operational risk transference from on-site servers to off-site, on-demand,
and online cloud servers. The brand value, the willingness for third-party
auditability, and the compliance with security and regulatory standards by
CSPs are also of prime importance when deciding how and when to migrate
resources. There are myriad use, business, and technical cases for cloud
enablement. The recessionary and receding world economy and the associ-
ated uncertainty have encouraged worldwide corporations and companies
to embrace the cloud paradigm enthusiastically to bring in new features and
functions on a shoestring budget. In short, with the establishment of interop-
erable cloud centers across the globe, the long-standing cost center view of IT
is to change forever. In this chapter, we would like to present the key techno-
logical solutions for efficiently combating the security problem in cloud IT.
The ensuing cloud era represents the overwhelming involvement of a
number of different and geographically distributed cloud service providers
(CSPs), delivering a variety of IT-enabled resources to consumers as value-
added services over the open Internet. There are industry pundits and mar-
ket analysts claiming that by 2015, the fast-maturing and stabilizing cloud
technology will have a solid and stimulating footprint in every kind of busi-
ness across the world. At the front end are the client devices and user agents
looking forward to access to remote and reliable clouds and their distinc-
tive capabilities. At the back end are a pool of consolidated, converged,
centralized, and federated servers, network appliances, and storage sys-
tems that host, deliver, and manage a growing array of professional as well
as personal services. Because every single IT resource is being presented
and provided as a network-discoverable and accessible service, the goodwill
generated is that users need not have the knowledge or expertise about the
underlying technologies, platforms, infrastructures, and connectivity solu-
tions that make up CSPs. That is, cloud accessibility, consumability, maneu-
verability, and serviceability are made remarkably simpler through a host of
software solutions. However, there are some valid concerns and challenges
today that are hijacking the massive adoption of the powerful and pioneer-
ing cloud concepts. The chief among them is cloud dependability, which in
turn includes cloud security, privacy, availability, reliability, performance,
and so on. The lack or loss of absolute controllability, auditability, and visi-
bility factors, especially in public clouds, creates consternation in the minds
and hearts of many. In this chapter, we describe in detail for our readers
Cloud Security Architecture (CSA) • 357
the perennial security problem, the most important constriction of the fast-
moving cloud idea, and the viable deterrence approaches.
There are several obstacles in the way of the unbridled growth of cloud
computing. The prominent pains and plagues include availability of cloud
services, elasticity, vendor lock-in, data security, data transfer bottlenecks,
performance unpredictability, network outage, system malfunctioning,
scalable storage, and so on. In public clouds, the lack or loss of control-
lability and visibility of data is being quoted as the key concern.
1. He can alter the data for the service connection point accessed by his
customers to access another cloud system.
2. The provider can act as a proxy between his customers and the other
provider.
Cloud Security Architecture (CSA) • 365
Security-Enablement Approaches
Robust and resilient security solutions and services are the need of the
hour to sustain the continuous penetration of the pioneering cloud model
into newer arenas. The security-imposed barriers need to be eliminated
totally through a host of technological solutions. Best practices, processes,
protocols, products, and patterns need to be collaboratively unearthed to
address cloud security needs. In this section, we will see a set of diverse
approaches and answers to the pestering security puzzles. Primarily, there
are four critical elements: infrastructure, information, devices, and iden-
tity (as mentioned in a joint white paper by Symantec and VMware on
cloud security).
SSL/IPSec
SSL is a very prominent security protocol ensuring encrypted connectiv-
ity between users and cloud applications. Because all data are encrypted
from the user’s machine to the cloud application, there is little chance of
data exposure. If hackers did intercept the data, it would be useless for
them in its encrypted form. SSL helps solve some of the most crucial and
critical security needs of cloud computing. First, SSL encryption keeps
prying eyes from reading private data as it is transmitted from server to
server and between server and browser. The second benefit is that an SSL
certificate can authenticate that a specific server and domain do belong
to the person or organization that it claims to represent. This benefit
requires that the hosting provider use SSL from a third-party certificate
authority.
Another effective means to securely use cloud infrastructures is IPSec
connections between the cloud and the user’s machine. In essence, IPSec
is a virtual private tunnel through the public Internet. It may offer greater
security and more flexibility in maintaining segregated access to data. Yet
SSL is easier to implement and is more portable than IPSec. Each has their
roles to play in public and private cloud infrastructures.
Cloud Security Architecture (CSA) • 369
Virtual LAN
Network virtualization is an important advancement in providing a full
isolation for shielding and segregating data from other network users.
A virtual LAN (VLAN) switching implementation is definitely more
secure than a non-VLAN network switch environment. Because admin-
istrators can easily restrict network packet broadcasts to specified VLAN
segments, the VLAN configuration prevents customers from accessing
data from other LANs. That is, each VLAN is a network by itself com-
pletely isolated from unauthorized LAN users. Using this strategy, cloud
vendors can accommodate a number of customers on one network, yet
maintain secure network segmentation between the businesses.
Firewall
A bidirectional, stateful firewall, deployed on individual VMs, can pro-
vide centralized management of server firewall policy. It should include
predefined templates for common enterprise server types and enable the
following:
• VM isolation
• Fine-grained filtering (source and destination addresses, ports)
• Coverage of all IP-based protocols (TCP, UDP, ICMP, etc.)
370 • Cloud Enterprise Architecture
Integrity Monitoring
Integrity monitoring of critical OS and application files (files, directories,
registry keys and values, etc.) is necessary for detecting malicious and
unexpected changes that could signal compromise of cloud computing
resources. Integrity monitoring software must be applied at the VM level.
Log inspection collects and analyzes OS and application logs for secu-
rity events. Log inspection rules optimize the identification of important
security events buried in multiple log entries. These events can be sent to
a stand-alone security system, but contribute to maximum visibility when
forwarded to a security information and event management (SIEM) sys-
tem or centralized logging server for correlation, reporting, and archiving.
Virtualization-aware malware protection leverages hypervisor intro-
spection APIs to secure both active and dormant VMs. Layered protection
uses dedicated scanning VMs coordinated with real-time agents within
each VM. This ensures that VMs are secure when dormant and ready to go
with the latest pattern updates whenever activated. Virtualization-aware
malware protection can also preserve performance profile of virtual serv-
ers by running resource-intensive operations such as full system scans
from a separate scanning VM.
Information Security
for protecting data while in transit and in rest. Governments, too, man-
date using high-end encryption algorithms for information security. Both
cloud users and providers have the responsibility of protecting against any
data loss, leakage, and theft. Cloud customers expect strong data encryp-
tion services for their sensitive data from their SPs.
Not only should we have an efficient process for generating keys to
encrypt and decrypt data, but we also need robust and resilient key man-
agement solutions. Cryptography is a double-edged sword. Strong encryp-
tion will prevent anyone from being able to see data including the owner, if
the keys are in any way lost or corrupted. Proper key management is criti-
cal. If it gets botched, there is a risk that users will not want to activate the
cryptography. Keys should also be securely held so that no one can obtain
that key to access the data. Key storage, discovery, retrieval, and usage
are very vital for unbreakable and impenetrable data security. That is, the
encryption provides resource protection while key management enables
controlled access to protected resources.
As such, clouds are predominantly shared environments through the
much-maligned multitenancy facility and hence SPs often store their cus-
tomers’ data together (in a neatly isolated fashion) in a common database
platform. Also for quick DR, discovery, scalability, and fault-tolerance
through redundancy and resiliency, data are being stored in various geo-
graphical locations. Due to the rapid growth of cloud providers, cloud
connectivity, integration, and collaboration schemes are taking shape
through a host of industry-strength and open standards. Cloud federation
and ultimately the vision of the intercloud are instigating a lot of collab-
orative activities such as the drafting and deriving of standard specifica-
tions for cloud portability and interoperability. In short, the cloud is very
dynamic and breeds innovation.
As mentioned earlier, cloud services are shared by many tenants and the
SPs have the privileged access to data in their custody. Thus, confidential
data hosted in a cloud must be protected using a combination of secu-
rity methods such as access control, contractual liability, and encryption.
Encrypting data on a disk or in a live production database has value, as it
can protect against a malicious cloud provider or an unscrupulous cote-
nant. For long-term archival storage, smart customers encrypt their own
data and then send it as cipher text to a cloud data storage vendor. The
customer keeps the cryptographic keys on his premises and uses the key
to decrypt the cloud data whenever necessary.
372 • Cloud Enterprise Architecture
Encryption Technologies
The field of cryptography has seen enormous growth due to its unassail-
able competency and capability in data protection. The RSA algorithm
and elliptic curve cryptography (ECC) are the two leading crypto-
graphic mechanisms in usage. There are key generation aspects based
on finite ring and field theories too. Security providers are formulat-
ing a raft of key strengthening schemes. Security solution vendors con-
sider simplicity and sensitivity as the two prime parameters for gaining
market share.
File Encryption
This is by far the most flexible encryption within cloud environments.
Encryption is applied at the source and managed by customers or third-
party providers that act as reliable “proxies” for key management and
encryption policy application. Quality cloud security is actually policy-
based encryption for all VMs, with the VMs maintaining their encryption
when moved through a cloud provider’s environment. All key manage-
ment and role-based access are defined locally before moving to the cloud.
This greatly simplifies the migration of VMs across cloud environments.
Cloud security appliances are forthcoming and they provide encryption,
key management, tokenization, and user monitoring functionality, among
other features.
Tokenization Technology
This is a highly popular method guaranteeing enterprise customers of a
cloud provider the distinct ability to store, retrieve, and delete data based
on the keys that the enterprise holds. Tokenization is actually the process
of substituting original data with randomly generated alphanumeric values
(tokens). Although structurally similar to the original data, these tokens
have no mathematical relationship with the original data. The mapping
between the original data and tokens is stored in a secure token database
and access to this database is required to reverse the process and retrieve
the original data. By retaining original data within the concerned jurisdic-
tion and storing tokens in cloud applications, data residency challenges
can be eliminated. Through this mechanism, neither the cotenant nor the
cloud administrator can gain access to that data because the keys are with
the concerned customer. Precisely, the data-handling tasks such as storage,
retrieval, and deletion can only be accomplished by the keys held by the
customer through encryption and decryption.
Cloud Security Architecture (CSA) • 373
Identity Provisioning
One of the major challenges for organizations adopting cloud services is
the secure and timely management of on-boarding (provisioning) and off-
boarding (deprovisioning) of users in the cloud. Furthermore, the enter-
prises that have invested in user management processes within an enterprise
will seek to extend those processes and practices to cloud services.
Authentication
When organizations start to utilize cloud services, authenticating
users in a trustworthy and manageable manner is a vital requirement.
Organizations must address authentication-related challenges such as cre-
dential management, strong authentication (typically defined as multifac-
tor authentication), delegated authentication, and managing trust across
all types of cloud services.
Federation
In a cloud environment, federated identity management plays a vital role
in enabling organizations to authenticate the users of their cloud services
Cloud Security Architecture (CSA) • 375
Federated Identity
Identity federation builds a trust relationship between the applications that
reflect business affiliations so that employees can remotely access applica-
tions with an SSO, regardless of whether or not the applications are locally
or remotely located. Identity federation also protects an employee’s private
information. As a first step toward the cloud initiative, it is recommended
to use the identity federation solution using an open standard solution,
such as Security Assertion Markup Language (SAML), to ensure interop-
erability in a hybrid cloud environment while extending the internal IAM
systems into the cloud. SAML addresses one of the key challenges in how
to integrate all cloud resources with internal enterprise resources in order
to deliver a unified service to employees and customers anywhere and
anytime while still maintaining a secure environment.
Identity federation is based on two important concepts:
this means that they have a contracted mutual trust in each other’s user
authentication. Initially, the traveler can self-identify as a customer for
booking the flight and then this identity can be transferred to hotel res-
ervations. The ultimate goal of identity federation is to enable users of one
domain to securely access data or systems of another domain seamlessly,
without requiring redundant user administration. The goal requires that all
participating systems use the same protocol to be interoperable. Public cloud
computing SPs such as Google, Amazon, and Salesforce.com offer their own
IAM interface, which by default is not capable of SSO. Private cloud comput-
ing SPs may recommend different IAM practices than enterprise customers.
To integrate cloud service into an enterprise’s access portal with SSO, it is
recommended that an identity federation open standard such as SAML is
used. The SAML protocol decouples both the SAML identity provider and
the SAML SP. This enables the enterprise to have a centralized IDP that
can support many other SPs in a distributed fashion. The SAML identity
provider focuses on identity management, access policy management, and
security token generation, while SAML SPs receive the remote security
token, retrieve credential data, and reinforce user access policies locally.
Any discussions of cloud security normally focus on the service itself as well
as the provider’s security-guaranteeing capabilities. But failure to evaluate
the entire service chain from beginning to end can introduce flaws and
flops in service design and delivery. Generally, cloud services begin and
end on any one of the devices such as a laptop, tablet, or smartphone. In
the recent past, there was a plethora of praiseworthy advancements in the
device space. Today, there are a variety of simple to smart devices facilitat-
ing the access and usage of IT services (local as well as global). Devices vary
in size, scope, structure, smartness, and style. They are increasingly wire-
less and mobile. That is, they could be fixed, portable, wearable, implant-
able, pocketable, and so on. Web, enterprise, and cloud applications are
appropriately enabled so that all kinds of handy and trendy gadgets and
gizmos can be able to access them. Mobile enablement is a very fast-paced
activity in the IT space. That is, end-users’ choice, convenience, and com-
fort with IT access are progressively enhanced. In other words, anywhere,
anytime, any device, and any channel access is being provided. There
are scores of embedded system technologies (OSs, mark-up languages,
development frameworks, emulators, microvisors, and so on) fueling the
Cloud Security Architecture (CSA) • 377
Policy as a Service
Policies have emerged as the most viable and venerable tool for runtime
automation and management of software systems. Policies provide right
and relevant insights for enabling adaptive systems dynamically. With the
powerful emergence of the SaaS delivery model, the concept of “policy as
a service” is slated to grow further decisively for next-generation applica-
tions. In particular, policy configurations are provided as a cloud-based
service to application development and deployment tools at runtime. That
is, cloud application deployment and runtime platforms are empowered
to have functionalities and features such as automated policy generation/
update, enforcement, monitoring, and so on.
Offering specification, maintenance, and update of policy models
as a cloud service to corporations has a number of significant bene-
fits. That is, instead of owning and maintaining the policy models for
accomplishing the highly unbreakable MDS solutions, the application
developers and security specialists of the corporations can now sim-
ply subscribe to the kinds of policy feeds they require without needing
to know the inside details of the models. The policy SP takes care of
the policy modeling, maintenance, and update activities. All kinds of
improvisations in policy models are being taken care of automatically
at the cloud front and the corporate executives need not bother about
any new releases, patches, editions, and so on. The up-front cost hurdle
is also greatly minimized thanks to the cloud-inspired subscription
model.
Data Dependability
Data Location
There must be an explicit assurance that the data, including all of its copies
and backups, is stored only in geographic locations permitted by contract,
SLA, and/or regulation.
Data Isolation
Data must be available all the time and data backup and recovery methods
must be in place in order to prevent any data loss, unwanted data over-
write, and destruction. Data restoration has to be guaranteed.
Data Discovery
Data Abolition
When users vacate a cloud, all the data have to be completely eliminated
and the cloud provider should not keep any remnant data that could be
misused or shared at a later point in time. All the data storage (primary as
well as secondary) and backups (local as well as distant) have to be double-
checked to erase any data that is left over and there has to be an automated
mechanism in place to guarantee that what the provider says about data
obliteration is absolutely true.
The data security life cycle, which is quite different from the information
life cycle, consists of six phases and extra efforts need to be taken as far as
data residing in the cloud.
TCG has defined the specification for the Trusted Platform Module
(TPM), which will provide stronger security than what software alone can
provide. The TPM is a hardware security component that is an international
standard and is being built into many computers and computer-based
products. The TPM includes capabilities such as machine authentica-
tion, hardware encryption, signing, secure key storage, and attestation.
Encryption and signing are well-known techniques, but the TPM makes
them stronger by storing keys in protected hardware storage. Machine
authentication is a core principle that allows clouds to authenticate to a
known machine to provide this machine and user a higher level of ser-
vice as the machine is known and authenticated. When the attestation
feature is used, the TPM monitors software as it is loaded and provides
secure reports on exactly what is running on the machine. This moni-
toring and reporting are especially important in the cloud environment
where viruses and worms can hide in many places. The TPM provides a
strong security foundation for other TCG specifications including Trusted
Network Connect (TNC) and Trusted Storage.
The TNC architecture provides an industry standard approach to net-
work security and network access control (NAC). The TNC standards
enable administrators to control network access based on user identity
and device health while monitoring network behavior and responding
immediately to problems as they occur.
The TCG’s Trusted Storage specification provides a manageable and
enterprise-wide means for implementing full-disk encryption using hard-
ware included right in the drive. These drives, known as self-encrypting
drives, simplify the enterprise encryption process for handling sensitive
data, since all data, applications, and drivers are encrypted internal to the
drive and key management is an integral part of the design. The hardware-
based encryption can take advantage of the TPM if desired and does not
require user intervention or impact system performance, unlike tradi-
tional software-only encryption schemes that require cycle time from the
main processor. With a self-encrypting drive, when a drive is removed for
any reason (maintenance, end of life, or even theft), the data is completely
useless to criminals since they do not know the encryption key.
Hard drive manufacturers are now shipping self-encrypting drives that
implement the TCG’s Trusted Storage standards. Self-encrypting drives
build encryption hardware into the drive, providing automated encryption
with minimal cost or performance impact. The TPM can easily provide
stronger authentication than username and passwords. TCG’s IF-MAP
Cloud Security Architecture (CSA) • 385
Security Gateways
The gateway manages the attack surface for the cloud’s entry and exit
points. The attack surface comprises the data, methods, and channels that
are integrated via the cloud. So, the gateway must have visibility across
these layers, including data and application methods, and not merely into
the communication channel, as network firewalls do. The gateway acts as a
proxy for communication between the enterprise and the cloud. Gateways
mediate all communication to and from cloud services, enabling more
granular control of cloud use. A service gateway lets an enterprise grace-
fully lose some but not all of its control over its security policy when it
moves to the cloud. The gateway security architecture responsibilities fall
into five main categories:
• Subject-claim mapping
• Policy-based map requests and responses to tokens
• Policy-based route and transform requests and responses
• Policy-based payload access
In this case, the SP STS must know about the managed objects such
as Java Naming and Directory Interface (JNDI) trees, JDBC, databases,
and Web service methods. In cloud scenarios, either deployment type
is appropriate. On the SP-initiated side, the capabilities are similar to
access management—defining and enforcing access control policies.
On the IDP-initiated side, the capabilities are similar to an identity
management suite. To enable the STS trust fabric, a federated identity
has to be agreed upon. The role of STS is to support, validate, issue,
and exchange tokens. But the enterprise gains a composite security
protocol.
In the security policy life cycle, the security architect must create, enforce,
and manage policy. But in cloud architectures, these policy decisions are
often dynamic. PEPs enable fine-grained and decentralized security policy
decisions through languages such as Extensible Access Control Markup
Language (XACML). These languages associate subject and object policy
targets with rules specifying authorized conditions and actions. The secu-
rity policy manager bundles these decisions into standards-based XML
documents that can be transported and consumed across many disparate
parts in the system. This lets a PEP query PDPs to make authorization
decisions in a highly distributed way.
In summary, in a cloud environment, the infrastructure is outsourced
and inherently not trustable. The infostructure is responsible for verifying
what it receives, and the metastructure defines where and how to perform
the verification.
Cloud Security Architecture (CSA) • 389
long way in convincing the users about the capacities and capabilities
of the cloud installations. There are specific standards being prescribed
for data centers. Users always like to know about the well-being of their
data, the standards which are complied with, the security strategy in
place, the DR mechanism, any information about any kind of outages,
and so on. That is, vendors need to be more accommodative for assuag-
ing clients’ concerns. Third-party auditability has to be allowed to boost
the clients’ confidence. Cloud providers have to be very proactive and
prompt in implementing the right and relevant security solutions and
best practices in order to guarantee utmost security for customers’ data.
Security Compliance
Managing and maintaining compliance status within our own environ-
ment is by far simpler and sustainable than ensuring that the compli-
ance is satisfactorily met in cloud environments. When IT resources
are under the control of the organization, ensuring compliance through
governance is pretty straightforward. Roles and responsibilities are
clearly defined, and compliance controls are designed and implemented
with management approval while the audit of compliance status can
easily be tracked and measured. The moment services are migrated
to cloud, an organization effectively loses control on how compliance
has to be implemented and maintained at the cloud site. There has to
be a thorough investigation and a detailed gap analysis before moving
mission-critical assets to the cloud if there is a slight fear of an asset
being dismantled and deprived.
Hypervisor security is the process of ensuring the hypervisor (alter-
natively termed as VMM) is secure throughout its life cycle. The hyper-
visor is the core software for creating, provisioning, deprovisioning, and
management of VMs. It is also responsible for the security of all the VM
assets that are functioning in the physical server. The VM-to-VM com-
munication is also enabled by the hypervisor. Similarly, any communi-
cation between a VM and one or more external entities is facilitated by
the VMM. In short, the hypervisor is the most crucial component for
providing security in virtual zones. As indicated earlier, the VM-to-VM
communication does not traverse the network infrastructure and every-
thing happens inside the physical server and hence the traditional
network security firewalls cannot be a right answer for traffic inspec-
tion. It is highly recommended to go for a virtual security appliance to
Cloud Security Architecture (CSA) • 391
Affordability
The survival of every organization hinges on its ability to deliver value
for its customers at lesser costs. Due to the uncertainty prevailing in the
world economy, IT budgets are being pruned down. This forces the IT
divisions of business behemoths to look out for new models that involve
less cost and risks for the solid IT enablement of their business opera-
tions, outlooks, and offerings. In other words, the current IT model is very
capital intensive and hence executives and experts are moving toward a
pragmatic strategy of employing the utility-like, subscription-based, and
usage-centric cost model for IT services. The hot “as a service” model pro-
vides an excellent alternative. That is, apart from cutting down the costs, it
enables organizations to focus on their core and competency areas. Thus,
instead of wasting their money on IT maintenance, this new SaaS model
helps them to insightfully spend their hard-earned money on springing
forth a series of innovations (Figure 10.1).
Business Continuity
Disasters can strike anywhere and can be nature induced and human-
made. Fires, floods, hurricanes, earthquakes, terrorism, and so on can
be the prime cause for massive disasters. Power and network outages can
knock down IT centers totally. Hence, it is essential to plan ahead to ensure
quick DR and BC. This highlights the need for redundancy and resiliency
in IT systems. Having backups is absolutely mandatory. DR facility for
strengthening BC cannot be compromised.
Fortunately, the SaaS model is the perfect solution. Multitenant SaaS
services are normally hosted in highly reliable data centers with built-in
redundancy. DR centers come to the rescue if there is damage in the pri-
mary cloud center. Redundancy in the communication path is built into
this model due to the Internet’s capability to send information via a large
394 • Cloud Enterprise Architecture
Anti-virus
Anti-spyware
Anti-phishing
Application blocking
Policy enforcement
URL filtering
Corporate network
Internet at HQ
Anti-virus
Anti-spyware
Anti-phishing
Application blocking
Policy enforcement Management reporting
URL filtering
dashboard for audit
FIGURE 10.1
Security as a service model.
number of routes. Even if a wired network fails, there are wireless options.
In the SaaS model, there is no need of any special computing machines or
software to operate a physical security application. That is, any thin cli-
ent device with Internet connectivity is more than enough to plunge into
action in case of any emergency.
Global Coverage
Reach and richness are two important parameters for industries to grow
and glow in their specialties. Organizations often put their branch and
sales offices in new territories in order to capture and retain greater mar-
ket and mind share. However, any expansion comes with significant chal-
lenges, risks, and expenses. Solutions that provide good results in one
Cloud Security Architecture (CSA) • 395
SmartMachine Security
Like other virtual OSs, the Joyent SmartOS allocates CPU, memory,
disk, and network I/O for customers to run their applications with
SmartMachines. However, Joyent SmartMachines offer virtual computing
396 • Cloud Enterprise Architecture
Security Gateways
Because of the co-location of multiple VMs in a cloud, it is important
to combat the threat of malicious activities spreading fast into the VMs.
Segmentation in a physical environment prevents this; but in a virtualized
environment, there is no such facility. Policy enactment and enforcement is
the most desired mechanism as it helps to apply the same critical rules, log-
ins, and access privileges. A Virtual Security Gateway of the type developed
by Clavister (http://www.clavister.com) is a firewall that runs inside virtual
infrastructure and ensures that security policies are enforced for all com-
munications inside the virtual environment. VMs are not allowed to talk
to each other unless they go through the security gateway. The Gateway
uses VPN encryption (as illustrated in Figure 10.2) to secure communica-
tion between VMs. Since the Virtual Security Gateway can be run inside
the virtual infrastructure, security auditing can be achieved and thus reg-
ulatory compliance requirements can be met. Users have the scalability to
simply deploy new security gateways as they expand their environment.
Also, since the virtual security gateway is part of the virtual infrastructure,
it becomes easier to create lab/test environments, which decreases the com-
plexity of security tests and, in turn, improves the overall security.
Cloud Security Architecture (CSA) • 397
Internal cloud
Your cloud hosted virtual machines and
e.g., VMware VSphere
resources
FIGURE 10.2
Security gateway.
enterprise can use VPS to modify security policies to ensure that all
sensitive data are protected to the extent required by the company’s
needs and by regulatory mandate.
• The uniqueness of VPS encryption is that even while sensitive com-
pany data is undecipherable when stored in the SaaS provider’s
database, full application functionality is retained. Supported func-
tionality includes searching, sorting, report generation, and field
validation. This is accomplished through a unique set of patent-
pending encryption methods, based on NIST-standard encryption
algorithms. All VPS operations are completely transparent to both
the end users and the SaaS application itself.
• VPS is a “universal on-ramp” to the cloud, allowing enterprises to
safely use one or more SaaS applications with a single device. VPS
can be configured to apply the desired levels of security/encryption
to individual data fields in each SaaS application independently.
• VPS is shipped with preconfigured encryption policies for selected
SaaS applications, allowing easy and out-of-the-box implementa-
tion. The enterprise may further customize the types of encryption
applied to each data field of each SaaS application.
Enterprise
information
systems
SaaS
provider
Identity
and access
management POP
PaaS
Intel SOA expressway
provider
Enterprise
event
monitoring
IaaS
provider Enternal user
Enterprise
end user
FIGURE 10.3
Intel service gateway.
CONCLUSION
It is a fact that the much-published security problem stands in the way of
widespread adoption of cloud infrastructures, platforms, and services by
worldwide users as envisaged and expounded originally. Security profes-
sionals and university professors have come out with a series of cloud-
specific security risks. Cloud computing is being presented and projected
by many as the flexible and futuristic computing model. It is capable of
strategically and significantly empowering and enhancing the sagging and
sliding value and verve of web, enterprise, and embedded systems. Having
Cloud Security Architecture (CSA) • 401
REFERENCES
1. Microsoft Global Foundation Services. May 2009. “Securing Microsoft’s Cloud
Infrastructure,” Microsoft Global Foundation Services, https://cloudsecurityalliance
.org/securing-the-MS-Cloud.pdf.
2. Sheikh, S. 2011. “A Holistic Security Approach to Cloud Computing,” DTS Solution,
http://www.dts-solution.com/wp-content/uploads/2011/10/A-Holistic-Security-
Approach-to-Cloud-Computing-v1.0.pdf.
3. Cattedu, D., and G. Hoben, eds. November 2009. “Benefits, Risks and Recommen
dations for Information Security,” The European Network and Information Security
Agency (ENISA).
4. Securosis. 2012. “Welcome to Securosis Research,” Securosis, https://securosis.com/
research.
5. Tsai, H., M. Siebenhaar, A. Miede, Y. Huang, and R. Steinmetz. 2012. “Threat as a Ser
vice? Virtualization’s Impact on Cloud Security.” IT Professional Magazine 14 (1): 32–37.
6. Owens, K. 2009. “Securing Virtual Compute Infrastructure in the Cloud,”
Savvis, Inc., http://www.savvis.com/en-us/info_center/documents/hos-whitepaper-
securingvirutalcomputeinfrastructureinthecloud.pdf.
7. Cloud Security Alliance. 2012. Cloud Security Alliance, https://cloudsecurityalliance.org.
8. Trend Micro, Inc. August 2009. “Making Virtual Machines Cloud-Ready,” Trend Micro,
Inc., http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_
cloud-computing-security.pdf.
402 • Cloud Enterprise Architecture
9. Jasti, A., P. Shah, R. Nagaraj, and R. Pendse. 2010. “Security in Multi-Tenancy Cloud.”
2010 IEEE International Carnahan Conference on Security Technology (ICCST),
Wichita, KS, October 5–8, 2010, http://ieeexplore.ieee.org/xpl/articleDetails.jsp?
arnumber=5678682.
10. Kretzschmar, M., M. Golling, and S. Hanigk. 2011. “Security Management Areas in
the Inter-Cloud,” IEEE 4th International Conference on Cloud Computing, Munchen,
Germany, July 4–9, 2011.
11. Subashini, S., and V. Kavitha. 2010. “A Survey on Security Issues in Service Delivery
Models of Cloud Computing.” Journal of Network and Computer Applications 34 (1):
15–11.
12. Takabi, H., J. B. D. Joshi, and G.-J. Ahn. 2010. “SecureCloud: Towards a Compre
hensive Security Framework for Cloud Computing Environments.” IEEE 34th
Annual Computer Software and Application Conference Workshops, Pittsburgh, PA,
July 19–23, 2010.
11
Cloud Governance Architecture
INTRODUCTION
The cloud paradigm has brought several innovations and improvements
to IT, which is at the forefront of successfully fulfilling the fast-changing
needs of global business. Several enterprise-scale and empowered tech-
nologies gel well to create and sustain the cloud paradigm, which is turn-
ing out to be strategically and significantly transformative and disruptive
not only for technocrats but also for business executives. There have been
some fabulous ideas such as “separation of concerns,” abstraction, and
encapsulation, which have been contributing consistently and immensely
to moderating and minimizing the growing complexity of IT. In a way,
IT can be subtly and succinctly touted as the adroit usage of two perva-
sive and persuasive mechanisms: (1) decomposition and (2) composition.
Further, componentization and modularization using coupling, granu-
larity, and cohesiveness techniques could resolve diverse IT challenges.
Cloud computing is being viewed as the complexity-mitigation technique
for overhauling and overcoming several IT issues and ills and fulfilling the
unique goals behind the elastic IT.
The much-hyped cloud computing concept is reaching greater heights
due to the maturity of virtualization technology, which mainly deals with
completely decoupling hardware and software components. This loose-
coupling facility has done a lot of good for IT in bringing much-needed
suppleness and maneuverability to the table. In other words, the inhibiting
dependencies, rigidity, and stickiness of various IT modules are eliminated
completely to bring in fresh possibilities and newer opportunities in easily
tracking and tackling existing and emerging IT challenges. Another
noteworthy factor is transparency. Location, technology, platform, and
language transparency goals are being achieved with cloud computing.
403
404 • Cloud Enterprise Architecture
With cloud computing in place, any future changes and challenges could
be inherently taken care of in next-generation IT infrastructures.
The cloud, being an enterprise-scale technology, must guarantee several
quality attributes in its offerings. Simplistically, a cloud is an advanced
IT infrastructure comprised of a server, and storage and networking sys
tems, and hence, the service and operation-level parameters are of the
utmost importance. Incidentally, several enterprise-level qualities are
being realized with the adept leverage and use of flourishing cloud tech-
nologies. Newer deployment and delivery models are being developed
and rendered comfortably and conveniently with the adroit adoption of
clouds. Further, the potential of clouds to cut capital expenditure and rein
in operating costs is so compelling that chief information officers (CIOs)
are pushing and pitching aggressively for cloud adoption. However, good
managers understand that cost savings is not the only variable to consider
when evaluating whether to go for cloud IT. Cloud computing enables a
tremendous amount of flexibility and scalability in deploying and manag-
ing IT services and applications. With this flexibility comes a list of items
that have to be managed more closely compared to traditional systems.
Availability, security, serviceability, and controllability of cloud services
and strict compliance to local and governmental rules and regulations
need to be guaranteed by cloud infrastructures. These expectations have
to be effectively monitored and managed.
As far as service providers are concerned, they always want to have highly
optimized, dynamic, converged, and on-demand cloud infrastructures.
To achieve the goal of a lean and open cloud, they seek to optimize the use
and management of resources and assets in their IT environment, from
servers to storage to software licenses. Service providers are also required
to strictly comply with security and governance policies. For this reason,
the final activity to consider in a mature and stabilized cloud infrastruc-
ture is cloud governance. With cloud governance in place, cloud service
providers are in a position to not only deliver superior value through cloud
infrastructures and cloud-instigated business models, but also prove that
their use of resources is responsible, reasonable, and aligned with the
requirements of the business.
Information Technology (IT) is trekking steadily and safely toward much-
envisaged agility and autonomy. As IT and business domains become tightly
intertwined, all kinds of advancements and advantages of IT are being expe-
diently and elegantly replicated for business augmentation, transformation,
and optimization. In the recent past, service oriented architecture (SOA)
Cloud Governance Architecture • 405
came along and laid the strategic and sustainable foundation for achieving a
host of complete and compact automation in service composition, enterprise
modernization, and business integration. That is, services dynamically find
one another, bind, and compose to generate smart and sophisticated services
that in turn lead to adaptive processes and applications. Mashups, in the form
of integrated user interfaces, are fast gaining momentum with the emergence
of mashup editors. Other aspects and agents also contribute immeasurably
to the much-anticipated and articulated self-adaptation in personal as well
as professional applications. Autonomic computing is a strategic initia-
tive for bringing tangible and perceptible autonomy (self-management) to
enterprise-scale compute infrastructures.
Therefore, every noteworthy aspect in IT is becoming automated with
competent and catalytic technologies and their solutions. The recent
and the most resilient paradigm is nonetheless the cloud, which is being
positioned as the prominent and dominant contributor and contender
in the ongoing battle for IT accessibility, availability, and affordability.
The cloud paradigm brings several value-added qualities to IT, such as
elasticity/scalability, performance, flexibility, agility, adaptability, and
so on. However, in the fast emerging and evolving cloud environment,
issues such as the lack of controllability, accountability, auditability,
security, privacy, and visibility have emerged as a barrier and dampener
for massive-scale adoption of the brewing cloud idea. Therefore, in an
increasingly automated, active, malleable, and production environment,
there is an insatiable need for automated monitoring and governability/
oversight through policy enablement and enforcement, in order to guar-
antee service and operational level agreements to retain the loyalty of and
the earned brand value among clients, customers, and consumers. In this
chapter, we explain exactly what cloud governance is and its various types,
the need for governing the expanding array of cloud infrastructures and
resources, the short- and long-term consequences of governance mecha-
nisms and platforms, and finally, how policies play a vital role in effective
and runtime governance of clouds.
EAs can find and use these application-level services over the web,
which is the open, public, and cheap communication infrastructure
to build sophisticated systems. Not only business applications but
also RIAs, B2B, and even multienterprise applications can be real-
ized quickly and easily by smartly utilizing such services over the
web. The EDA, which is being touted as the next-generation scheme
to arrive at dynamic, real-time, and adaptive systems, will benefit
immensely and immeasurably from these application services.
• As cloud applications are typically multitenant ones in order to
enable access and use by many concurrent users, these contributive
and constructive services are also made compliant with and com-
patible to the “multitenancy” tenet. Customization and configura-
tion features are the leading ingredients of multitenant systems.
Cloud services can be composed manually or programmatically to
craft highly consumable and usable mashups and business-aware
composites. Finally, these services assist in creating and sustaining
cloud brokerage services by establishing smart connectivity across
services that are posted in geographically distributed, diverse, and
decentralized clouds.
• “Information services” offer search services or other mechanisms to
provide access to external data or content. Unlike other cloud ser-
vice categories, information services do not require the consumer to
move any of their data or business process logic into the cloud. The
information service simply delivers information that already exists
in the cloud. Information services are most typically accessed using
a simple web-based API or delivered as feeds using really simple syn-
dication (RSS)/Atom.
• “Application infrastructure services” represent application design,
development, testing, and execution platform services. There are
also other infrastructure services such as connectivity, access, secu-
rity, identity, directory, intermediation, and concierge services and
several IDEs and rapid application development (RAD) tools in the
enterprise space that speed up and streamline application concep-
tualization, concretization, compilation, and correction. For differ-
ent services to interact with one another, middleware is classified as
the most sought-after software. These days, with the unprecedented
adoption of the cloud paradigm, cloud middleware, brokers, ser-
vice buses, and orchestration engines are being implemented for inte-
gration, composition, and collaboration of services and applications
Cloud Governance Architecture • 409
SOA Governance
SOA is a very distinct design paradigm, principle, and pattern that is gain-
ing significant traction these days. It is being touted as the most elegant
412 • Cloud Enterprise Architecture
Create SOA
strategy
or
A iz a
g
lig ti
an
n on
Manage
service
levels
Manage
service
portfolio
En
po force
lic
ies
Control service
life cycle
FIGURE 11.1
The SOA governance life cycle.
business executives and managers also. As policies and services are loosely
coupled, policy changes can be done without impacting the service under
production. Policy creation, representation, and persistence languages are
emerging, and policy engines are the latest addition to the growing soft-
ware infrastructure family. When the subject of knowledge engineering
gets sufficiently stabilized, knowledge bases too can be attached with the
service system and, thus, not only agility and autonomy but also adapt-
ability is supported in service environments. Figure 11.2 indicates the
growing importance of SOA governance within IT and corporate gover-
nance modules.
Data Governance
Data is always essential for any enterprise; there is a need for an enterprise
to innovate in order to surge ahead of its competitors by extracting all
the right and relevant insights and intelligence from its data heap. BI is
an important component in any growing business. For any business to
be ready for the future, data-driven intelligence is very much required.
For setting a financial target, the past data of an enterprise is vital for
416 • Cloud Enterprise Architecture
Today SOA
governance
Corporate
governance IT governance
Corporate
IT
overlap
Tomorrow
Corporate
SOA governance governance
adoption and execution
IT governance
SOA
governance
FIGURE 11.2
The growing importance of SOA governance in service-oriented enterprises.
Some of the data management functions that are included by any gover-
nance program are as follows:
and monitoring of such assets being the second. This often leads to
early purchases of registry/repository solutions that have little practical
use because they never integrate well with enforcement and monitoring
systems. In contrast, in the cloud space, enforcement and monitoring
tasks come first, whereas asset management is a secondary affair. Service
deployment, delivery, consumption, monitoring, tracking, and billing are
the most important assignments in a cloud. Also, users and customers lose
their controllability and visibility in a cloud. Therefore, cloud governance
primarily focuses more on the latter part of the service life cycle.
Policy Engineering
During the design and development stage, it is important to establish
rules and policies that clearly specify how the various participating ser-
vices in a cloud are going to be monitored and managed. The attributes
(QoS) of the underlying cloud infrastructure must be ensured, whereas
SLAs of both the platforms and the applications must be monitored and
tracked. Additionally, defining a variety of policies for authorizing and
424 • Cloud Enterprise Architecture
Policy Enforcement
One of the main attractive features of the cloud is its ability to reduce
the “time to market” significantly. Cloud gives businesses the ability to
roll out changes to applications almost instantaneously compared to the
traditional onsite models. This distinct capability comes with its own set
of issues around versioning, upgrades, and compatibilities of services.
Well-defined and well-enforced policies are a must to ensure robustness
and trustworthiness of cloud-based applications. Policies can be enforced
through the following mechanisms:
offers a viable and veritable means to assert control over both internal and
external applications and data.
Policy
decision Service
point (PDP) host
Policy
enforcement
point (PEP)
Message
FIGURE 11.3
Policy enforcement and monitoring services.
426 • Cloud Enterprise Architecture
TABLE 11.1
The Common Functional Features of PEPs
Authentication: Interfacing with Audit: Collection of information related to events
most identity and access and transaction processing on the PEP.
management systems.
Authorization: Fine-grained Alerts or events: Synchronous or asynchronous
authorization management events that are raised as a result of conditions
including attribute- and role-based being met on the PEP, such as reaching a
authorization models. transaction threshold or exceeding a memory
consumption threshold.
Confidentiality: Acting as an SLA: Enforcement and/or alerting of various
encryptor/decryptor for all thresholds relevant to business. An example
information streams (i.e., data and might be to redirect traffic to a secondary service
services). cluster when the primary is overloaded.
Integrity: Ensuring communications Monitoring: Collecting rich data sets describing
are not altered in transit. both individual transaction data and aggregate
counters, and generation of graphs and reports to
summarize these.
Routing: Directing messages to Adaptation/transformation: Alteration of the
different destinations based on physical data stream in flight. Can be used to
policy decisions. provide interface versioning or to produce
entirely new aggregate services that combine
results from several individual service calls.
accesses a new SaaS service using their credit card. Further, we need to stop
an unsanctioned use of PaaS components by well-meaning developers and
we need to regulate the use of IaaS technology. Policy access profiles allow
continuous monitoring of authorized cloud service activity and provide a
customer view of use that is critical to discovering vendor billing discrepan-
cies or identifying SLA violations. Outgoing policy enforcement allows us
to measure the value we are deriving from each of our partners and suppli-
ers and every third-party organization with whom we engage electronically.
Firew
all
Z
M
D
PEP
aff l
st rna
te
In
m ise
IT
re pr
ise
-p ter
on En
FIGURE 11.4
Policy enforcement on outgoing traffic.
Clo
ud
ap
pli
cat
ion
Z
DM
PEP
eh l
ic a
t
os
rv ern
se Int
m ise
IT
re pr
i se
-p ter
on En
FIGURE 11.5
Policy enforcement on incoming traffic.
428 • Cloud Enterprise Architecture
not moving into the cloud soon. How can IT publish an interface to the
mainframe that ensures only authorized cloud services can access it, that
protects the mainframe from attacks originating in the Internet, and that
audits all access for chargeback purposes and forensic investigation? A
PEP installed in the DMZ can offer all these functions and even more.
Policy is not just a way of articulating and enforcing security require-
ments; it is the integration glue between systems. A rich policy language
meets the demands of business and IT, offering both high-level contracts
such as SLAs and billing and low-level details such as dynamic routing,
failover, and data transformation.
Clo
ud
app
lica
tion
Virtual PEP
Z
M
D
PEP
eh l
ic na
t
os
rv er
se Int
m ise
IT
re pr
i se
-p ter
on En
FIGURE 11.6
Policy enforcement on cloud services.
take care of unique obstacles faced in achieving secure, safe, reliable, and
smart clouds. A well-defined cloud governance strategy that can factor
out possible and probable risks and eliminate them in the commencement
period must be framed to build and sustain dependable cloud systems.
All the phases of the cloud governance methodology play a vital role in
revitalizing and safeguarding cloud environments for all the transforma-
tions guaranteed by cloud IT.
Assess data: Take an inventory of all the data assets in the organization.
Categorize these data into the following governance groupings:
• Data resides in an existing data center. This may be for security
or compliance reasons. Take note of special challenges such as
the data being locked up in a legacy mainframe application.
• Data resides in a private cloud. Companies that have acquired a
good amount of cloud knowledge have started having their own
private clouds in order to safely and securely stock their applica-
tions and data, which may be highly confidential; their integrity
has to be preserved at any cost.
• Data resides in a public cloud. The data could be deposited in a
public cloud; but this option is not taking off as desired due to the
lack of security and privacy, noncompliance to third-party audit-
ing, reduced controllability and visibility, and so on.
Assess applications and services: Increasingly, a whole lot of on-premise
applications and services are calculatedly being moved to private,
public, hybrid, and even community clouds in order to realize the pro-
fessed benefits. Thus, it is mandatory for CSPs to access each of the ser-
vices and applications very carefully. Services may have some dodging
loopholes, bottlenecks, or even security holes. Services may also have
some special restrictions that mandate that they be hosted on-premise
due to a variety of reasons. Analysis of these implicit or even explicit
reasons in order to get an idea of the overall service ecosystem is vital.
By SLA: This is often about uptime and response time, but there are
other factors to consider. What is their backup policy, and how fast
can they recover from a catastrophic data loss? Can one request the
retrieval of old copies of data? How far back, and how often, are
432 • Cloud Enterprise Architecture
snapshots taken? What is the data retention policy? Does the data
stay on their backup media after the relationship gets terminated?
How about their BC and DR capabilities?
By security capability: Cloud clients have to carefully take note of the
security and privacy capabilities of cloud providers. Security is the
number one issue with clouds as of now. Enterprises are reluctant to
transfer their confidential and corporate data to public clouds con-
sidering the extreme gravity of security implications. As clouds turn
to virtualization technology extensively, a fresh security hole arises,
as per a recent research report: The VMs can be easily pierced so
that the integrity and confidentiality of resources are in grave danger.
These looming threats must be considered, and any provider has to
be weighed accordingly.
By trust: Trust is the most plausible concept for ensuring complete and
compact security. Trust is considered a viable and valuable aspect
for cloud security and privacy. How a trust mechanism is imple-
mented by cloud providers must be analyzed before formulating the
migration scheme.
This is the single most important piece of infrastructure for cloud gover-
nance. Traditional SOA governance advocates starting with the heavy-
weight registry and repository infrastructure. In contrast, the current
cloud and modern SOA governance schemes start with effective enforce-
ment and monitoring tools. This technology layer of management and
monitoring remains the cornerstone of futuristic cloud governance. An
additional layer of indirection enables flexibility so that all kinds of future
governance needs can be easily inserted.
Start by protecting the resources that are already in place. Placing PEPs in
the DMZ allows strict management of access to internal resources.
Cloud Governance Architecture • 433
Modern PEPs provide all the functionality a provider needs for a gov-
ernance story, including local persistence and life cycle management of
all-important assets such as policy and service descriptions. As the usage
scope expands, providers have to look for centralized management prod-
ucts that integrate seamlessly with PEPs. This might also be a good cloud
service.
suites, applications, processes, services and data, research test beds, tools
and utilities, and so on, enable the realization of the goals of cloud com-
puting. Virtualization, automated management, resource provisioning,
load balancing, and job scheduling software are the dominant and prom-
inent components vouching for the success of cloud computing. In this
section, we dig deeper in order to understand why governance solutions
are essential for the transformative, augmentative and disruptive cloud
technology.
As per worldwide press reports and online blogs, there are many suc-
cess stories in the exploding cloud space that one can be proud of. Both
small and big cloud infrastructure, platform, and service providers are
jumping on the cloud bandwagon and, hence, press coverage about this
trendsetting IT paradigm is steadily on the climb. Both IT professionals
and university professors are consciously concentrating on understanding
the inhibiting drawbacks, bottlenecks, and challenges of the pioneering
cloud technology in order to come out with robust and resilient solutions
for identified issues and limitations. Explorations, experimentations, and
expositions are very much visible in this new field.
Yet the usage of the cloud is still in its nascent stage on the enter-
prise side because of an increasing number of concerns being voiced
about the appropriate and accurate use of cloud resources. Cloud avail-
ability, performance, and controllability; erosion of security, confi-
dentiality and integrity of cloud resources; and data replication and
consistency are the most prevalent problems putting barriers on lever-
aging the promising cloud approach. There is no cloud interoperability
method, which is mandatory for achieving open, smart, and interoper-
able clouds. The irresistible intercloud idea is hence becoming more
popular and the delta cloud is one such initiative aimed at overcoming
cloud diversity.
It is being proclaimed and projected in the industry arena that we need
to have fertile and futuristic cloud governance solutions and systems in
place to support the adoption of cloud technology and to identify and
arrest any kind of risk, which is unfortunately and unexpectedly sag-
ging due to colossal misunderstandings. The success of clouds solely
depends on the success of cloud governance practices, processes, prod-
ucts, platforms, and patterns. In short, cloud governance is for the mas-
sive cloud adoption across industry segments. Other factors underlining
the need for elegant governance solutions are discussed in the following
subsections.
Cloud Governance Architecture • 435
Guaranteeing Reliability
People have started to realize the necessity of effective governance, because
they know what the penalty is when IT fails. People do not want to con-
sume stuff from a cloud or put stuff into a cloud and risk the fact that the
cloud may not be available or the service of the cloud may not be available.
They need to have contingency plans, but IT contingency plans are a form
of governance. Clouds have to be made more dependable and trustwor-
thy. Governance is undoubtedly the key for realizing the goal of cloud
dependability.
Managing Scale
With the deeper acceptance and adoption of cloud concepts, a number of
innovations and inventions are happening in this field. Newer business,
pricing, delivery, and operational models in IT are emerging and being
leveraged extensively across the globe. Clouds clearly enable wider rec-
ognition and result in a bevy of ramifications. That is, the total business
and IT ecosystems are bound to grow further and farther toward the
greater mandate of articulating and accommodating more IT resources,
user bases, and business entities. Business-to-consumer (B2C), B2B,
436 • Cloud Enterprise Architecture
computing, even with its significant and strategic benefits, introduces new
risks and dangers if there is no sound management and governance in place
to set them right; this is where best practices and key guidelines are critical
and gladly welcome to continuously support and sustain the cloud jour-
ney. To correctly manage distributed, hosted, on-demand, off-premises,
and online cloud-connected services, IT must focus on the QoS attributes
being delivered, the veracity and validity of transactions, the privacy of the
information being handled, and the agreed-on basis for calculating cost.
This is where service management plays a critical role.
Process Innovation
Cloud governance can be a potent weapon and pivotal element only if an
organization is entitled and empowered to be governed. This empower-
ment cannot be realized just because organizational structures such
as steering committees and review boards are in place. Competent and
composite processes, besides the structures, have to be modeled, devel-
oped, simulated, validated, and refined. Processes need to be analyzed
and altered accordingly to suit the underlying behavior and culture of
the organization. A cloud strategy and road map have to be taken into
consideration when bringing into effect the relevant and right changes in
cloud processes. Cloud migration is no joke. Processes need to go through
a lot of renovation and innovation to keep up the momentum of mov-
ing to the cloud. The cloud model establishes a tactical as well as strategic
relationship between IT users and service providers, thereby prescribing
a collaborative linkage. A service management strategy enables every sin-
gle organization to attain success in sync with the progressive and path-
breaking cloud technology. The secret of delivering services within a cloud
environment can be summarized as follows: “Develop the processes first,
measure the throughput, and fine-tune based on the learning and under-
standing gained.” Process engineering, control, integration, management,
and enhancement are the important stages toward process innovation.
Building Trust
A critical success factor for addressing the need for trust and thereby
enabling effective cloud governance is how well an organization can bring
about a shift along two key dimensions: (1) trust and (2) pride. Trust is a
complex interpersonal and organizational construct. Trust occurs when
parties holding certain favorable perceptions of each other reach expected
outcomes without worry and without the need to monitor each other’s
440 • Cloud Enterprise Architecture
Best practices as usual give some valuable tips for attaining quick success
with any new initiative. Here too, you can find some vital practices for
effective and elegant cloud governance.
Cloud Governance Architecture • 441
These are all the most prevalent features to be deeply and diligently con-
templated before choosing an appropriate cloud governance solution. In
the near future, there may be additions to this list and fresh guidelines
will emerge for enabling decision making before committing to a gover-
nance solution from a particular vendor. With the fast proliferation and
utilization of cloud services and applications, a governance solution will
soon become a mandatory asset. As users and service developers lose
control and visibility, cloud governance solutions come as a solace for
deprived souls.
VORDEL CSB
Besides formulating and firming up processes and policies (business,
management, usage, cultural, and technical), there is a need for automated
tools such as a policy manager and a runtime container. The Vordel CSB is
a kind of middleware for proactively managing the perfect and preferred
usage of all kinds of cloud resources and for moderating and mediating
interactions among the resources. In a nutshell, this CSB from Vordel
allows organizations to add and apply a layer of trust into their cloud ser-
vices and applications. It adaptively brokers the connection to the cloud
infrastructure by applying governance controls for service usage and ser-
vice uptime. The broker sits between the organization and the CSP. It can
be deployed as software or as an edge device for brokering connections to
the distant cloud. Additionally, it may also be deployed in a cloud as an
Amazon EC2 instance.
444 • Cloud Enterprise Architecture
Third-party
Caching
services
Traffic Event
throttling Cloud alerting
services
Service-level broker Protocol
agreement mediation
Data
Analytics transform-
ation
FIGURE 11.7
Cloud service broker capabilities.
Cloud Governance Architecture • 445
Content Analysis
Data sent to third-party cloud providers should not contain sensitive data,
such as data that would identify a customer or, in the case of health care,
a patient. All content sent to cloud services must be analyzed for leaked
data in order to enable data loss prevention (DLP). In addition, content-
level threats must be detected and blocked. This includes application-level
attacks at the API and payload levels. Content analysis is also important so
that organizations can meet compliance regulations.
Caching
The broker provides caching for two broad reasons: (1) Caching protects
the enterprise from the latency associated with connecting to a cloud ser-
vice. When the response is fetched from the broker’s cache, this is sig-
nificantly faster than connecting to the cloud service itself. (2) The broker
cache saves an organization’s money by allowing some requests to be ser-
viced by the broker itself, removing the need for a billed connection to the
cloud provider.
Monitoring SLA
Cloud infrastructure is often a mission-critical factor, and organizations
must ensure that if a cloud connection is not responding as required, then
an alert is raised. The broker includes comprehensive SLA monitoring,
which monitors not only the response time of a cloud service but also
the entire transaction throughput time. In this way, the user of a cloud
service can understand exactly where a slowdown is happening and take
remedial action. This augments the monitoring provided by cloud provid-
ers themselves, by providing a trusted internal solution for cloud service
monitoring.
Traffic Throttling
Throttling is the surge protector of clouds. If an application makes a high
number of calls to a cloud service, then this broker can deflect a portion of
the calls to a newly provisioned application instance. In this way, elasticity
is provided. This broker makes use of proven traffic management function-
ality. Throttling also allows different levels of service to be guaranteed to
different customers. In this way, the premium model is enabled: Nonpaying
users receive one level of service, whereas paying users receive another.
446 • Cloud Enterprise Architecture
Event Alerting
There must be alerts for events such as cloud outages so that corrective
measures can be taken. For example, if a connection to a CSP is lost due
to a local ISP problem, then the CSP will not raise an alert since its service
is still running as normal. However, this ISP outage affects local users of
the cloud service. A local broker will detect the outage and raise an alert.
Besides the governance-related features, more traditional broker ser-
vices are also enabled by this broker.
CONCLUSION
Once in a while, a truly disruptive technology comes along with the poten-
tial of changing completely the way we do business. Cloud computing is
such a technology that has already started and will continue to create
massive and memorable shifts for end users, employees, executives, and
entrepreneurs. As the cloud environment is becoming highly distributed,
federated, decentralized, and dynamic, a strong governance/oversight
solution has to be installed and integrated in order to optimally utilize all
448 • Cloud Enterprise Architecture
REFERENCES
1.Oltsik, J. January 20, 2003. “IT Governance Allows You to Do More IT with Less
Money,” TechRepublic, http://www.techrepublic.com/article/it-governance-allows-
you-to-do-more-it-with-less-money/1054749.
2.Modi, T. November 23, 2009. “Avoiding the Storms: Why We Need Cloud
Governance,” ebizQ, http://www.ebizq.net/topics/cloud_computing/features/11934
.html?page=2.
3. Dodani, M. H. 2006. “Change Happens!.” Journal of Object Technology 5 (1): 39–44,
http://www.jot.fm/issues/issue_2006_01/column4/.
4. Shaw, K. A. and B. Carlson. August 8, 2006. “Change Governance for the Agile
Enterprise—a Service Oriented Architecture (SOA) Perspective,” Serena Software,
Inc., http://www.serena.com/docs/repository/solutions/soa%20and%20agility.pdf.
5. Potter, D. June 28, 2007. “The Truth about SOA Governance,” WebLayers, Inc., http://
www.weblayers.com/wl2/rc/collateral/WebLayers_Truth_About_SOA_Governance.pdf
6. April 2007. “Managing Data as a Corporate Asset: Three Action Steps toward
Successful Data Governance,” Hewlett-Packard Development Company, L.P., http://
www.safekidsnystate.org/My%20Downloads/Data-Governance-White-Paper-HP-
standard-April-2007.pdf.
7. Walker, G. May 31, 2012. “Inside the Hybrid Cloud, Part 4: Implementation
Considerations,” IBM developerWorks, http://www.ibm.com/developerworks/cloud/
library/cl-hybridcloud4/cl-hybridcloud4-pdf.pdf.
8. Layer 7 Technologies, Inc. 2010. Steer Safely into the Clouds: Why You Must Have
Cloud Governance Before You Move Your Apps, Layer 7 Technologies, Inc., http://
www.layer7tech.com/main/images/Steer%20Safely%20into%20the%20Clouds%
20v3.0.pdf.
Cloud Governance Solutions and Resources
9. http://www.oracle.com/us/technologies/soa/soa-governance/index.html
Cloud Governance Architecture • 449
10. http://www-01.ibm.com/software/solutions/soa/gov/
11. http://web.progress.com/en/Product-Capabilities/soa-governance.html
12. http://petalsmaster.ow2.org
13. http://www.weblayers.com
14. http://www.layer7tech.com
15. http://www.vodel.com
16. http://www.boozallen.com/consulting-services/information-technology/cloud-
computing
17. http://www.opstera.com
12
Cloud Onboarding Best Practices
INTRODUCTION
Clouds are emerging as the consolidated, virtualized, automated, and
shared IT environment for efficiently hosting, managing, and delivering
scores of service-centric and enterprise-scale applications, platforms, and
infrastructures as services to worldwide users through the pervasive and
public Internet, which is being touted as a cheap communication infra-
structure. In other words, as the knowledge-driven service era sets in and
stabilizes, the utility and ubiquity of the cloud as the pathbreaking service
deployment and delivery container will increase further.
The main benefit of adopting the pioneering cloud concept is that
clouds enable IT agility, affordability, and autonomy. The goals of making
IT simple and sensitive are realized with the adoption of novelty-packed
cloud concepts. As a result, IT resource utilization goes up significantly;
IT resource elasticity and application scalability are all set to soar with the
emergence of lean, green, and optimal infrastructures; and the goal of self-
servicing of clouds is nearing realization due to numerous enhancements,
such as enhancements in the extensibility, malleability, usability, and con-
sumability of IT module at different layers and levels of the enterprise IT
stack. The increase in IT efficiency translates to overall business efficiency
and has the potential to result in new innovations and opportunities. On
the operational side, an increase in the manageability, performance, main-
tainability, and simplicity of IT modules through the separation of con-
cerns is the prominent reason why businesses are very optimistic about
cloud computing. By delegating the management of infrastructure and
software platforms to a team of skilled professionals employed by CSPs,
customers can offload operational responsibilities to CSPs.
451
452 • Cloud Enterprise Architecture
1. A database server that logs and archives the data coming in from
the offshore assets into a database. A tape drive is used to take daily
backups of the database, and the tapes are stored off-site.
2. An application server that hosts a number of data-reporting and
-monitoring applications. The end users at company C access these
applications using a remote desktop client over the Internet.
FIGURE 12.1
Overview of a system having two servers, a database server and an application server.
Company A Offshore
oil rig
Company B Amazon’s
cloud
Company C
FIGURE 12.2
System deployed in a cloud.
There are legacy (siloed, massive, and monolithic), web, enterprise, and
embedded applications that are prime candidates to be carefully considered
for cloud-enablement so that they can be ported to cloud environments with-
out any compatibility issues and provided as a publicly discoverable, accessi-
ble, and leveraged service over the web for subscription and a usage-based fee.
1. Evaluate
2. Select
3. Migrate
Cloud Onboarding Best Practices • 457
4. Optimize
5. Operate
and then to identify what other applications are dependent on the applica-
tion’s dependencies. For example, if both application A and application B
are using the same database server, this needs to be identified so that the
migration plan can include a combined move or can include steps to split
the dependencies.
Application profiling is used to measure and collect real usage data of
an application before it is migrated. This data can help to size applica-
tion deployment in a cloud. Ideally, application data should be collected
for at least 10–15 days to allow capture of variances in daily and weekly
usage patterns. For each node on which the application runs, the following
data should be collected:
The node-level data can be used to estimate how many and what type of
machines will be necessary when the application is migrated.
In addition to node-level statistics, it is also important to profile user
activity, such as the total number of connected users, request and transac-
tion rates, and request latencies. The usage data can also be used to build
automated tests for the application to ensure the same or an improved
level of service after the application is migrated.
The node data, along with application usage data, can also provide an
initial estimate of the costs of cloud resources.
CONCLUSION
With the adoption of clouds, promising novel business models that
include next-generation delivery, pricing, subscription, deployment,
and consumption models have come to the forefront; hence, there is an
Cloud Onboarding Best Practices • 469
REFERENCES
1. Rosenthal, B. E., ed. 2010. “How Outsourcing Service Providers Enable Business
Growth through IT Infrastructure Transformation,” Outsourcing Center, http://
www.outsourcing-center.com/2010-09-how-outsourcing-service-providers-enable-
business-growth-through-it-infrastructure-transformation-article-39870.html.
2. Hiller, A. September 13, 2011. “The Importance of Policy in Cloud Migration,” Data
Center Knowledge, http://www.datacenterknowledge.com/archives/2011/09/13/the-
importance-of-policy-in-cloud-migration/.
3. Khajeh-Hosseini, A., D. Greenwood, and I. Sommerville. 2010. “Cloud Migration: A
Case Study of Migrating an Enterprise IT System to IaaS,” 2010 IEEE 3rd International
Conference on Cloud Computing (CLOUD), St. Andrews, UK, July 5–10, 2010,
http://arxiv.org/ftp/arxiv/papers/1002/1002.3492.pdf.
4. Holland, R. March 2011. “Ten Steps to Successful Cloud Migration,” Eagle Genomics
Ltd., Cambridge, UK, http://www.eaglegenomics.com/download-files/whitepaper/
CloudWhitePaper.pdf.
5. CloudOps. 2012. “Step Two: Balancing On-Premise and On-Demand,” CloudOps,
http://www.cloudops.com/cloud-migration-services/balancing-on-premise-and-on-
demand/.
6. Cisco Systems. 2010. “Planning the Migration of Enterprise Applications to the
Cloud,” Cisco Systems, Inc., http://www.cisco.com/en/US/services/ps2961/ps10364/
ps10370/ps11104/Migration_of_Enterprise_Apps_to_Cloud_White_Paper.pdf.
7. Claybrook, B. June 2011. “Resolving Cloud Application Migration Issues,” TechTarget,
http://searchcloudcomputing.techtarget.com/tutorial/Resolving-cloud-application-
migration-issues.
Information Technology / Software Engineering & Systems Development
Discussing the implications of the Cloud paradigm on EA, the book details
the perceptible and positive changes that will affect EA design, governance,
strategy, management, and sustenance. The author ties these topics together with
chapters on Cloud integration and composition architecture. He also examines the
Enterprise Cloud, Federated Clouds, and the vision to establish the InterCloud.
Laying out a comprehensive strategy for planning and executing Cloud-inspired
transformations, the book:
• Explains how the Cloud affects and changes enterprise architecture
design, governance, strategy, management, and sustenance
• Presents helpful information on next-generation Cloud computing
• Describes additional architectural types such as enterprise-scale
integration, security, management, and governance architectures
This book is an ideal resource for enterprise architects, Cloud evangelists and
enthusiasts, and Cloud application and service architects. Cloud center adminis-
trators, Cloud business executives, managers, and analysts will also find the book
helpful and inspirational while formulating appropriate mechanisms and schemes
for sound modernization and migration of traditional applications to Cloud
infrastructures and platforms.
K14431
ISBN: 978-1-4665-0232-1
90000
www.crcpress.co m
9 781466 502321
www.auerbach-publications.com