PlanetLab’s focus on wide-area networks is suboptimal for cloud
platform research, unfortunately, and the same holds true for other
similar resources. A handful of test beds appropriate for cloud
research have made their debut recently, including Open Cirrus from
HP, Intel and Yahoo!, and the Open Cloud Testbed. We encourage
other players to participate and contribute resources to cloud
research, with the goal of providing a standard test bed with open-access, at least for academia, including researchers from underrepresented universities. Who will create the future “CloudLab”?
How to Get Involved
Students and researchers who are interested in shaping cloud computing should consider participating in the LADIS ( www.cs.cornell.edu/
projects/ladis2010) or HotCloud ( www.usenix.org/events/hotcloud10)
workshops, or the upcoming Symposium on Cloud Computing (SoCC:
Large industry players are currently driving the research bandwagon
for cloud computing, but the journey is only beginning. A concerted
multi-disciplinary effort is needed to turn the cloud computing promise into a success.
Dr. Ymir Vigfusson is a postdoctoral researcher with the Distributed
Middleware group at the IBM Research Haifa Labs. His research is focused around distributed systems, specifically, real-world problems
that embody deep trade-offs. He holds a PhD from Cornell University.
Dr. Gregory Chockler is a research staff member in the Distributed Middleware group at the IBM Research Haifa Labs. His research interests span
a wide range of topics in the area of large-scale distributed computing
and cloud computing. He is one of the founders and organizers of the
ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS). He holds a PhD from the Hebrew University of Jerusalem.
1. Ahamad, M., Hutto, P. W., Neiger, G., Burns, J. E., and Kohli, P. 1995.
Causal memory: Definitions, implementations and programming.
Distributed Comput. 9. 37-49.
2. Brewer, E. 2000. Towards robust distributed systems. In Proceedings of
Principles of Distributed Computing (PODC).
3. Burrows, M. 2006. The Chubby lock service for loosely-coupled
distributed systems. In Proceedings of the 70th USENIX Symposium on
Operating Systems Design and Implementation (OSDI’06). USENIX Association. 335-350
4. Danga Interactive. memcached: A distributed memory object caching
5. DeCandia, G., Hastorun, D., Jampani, et al. 2007. Dynamo: Amazon’s
highly available key-value store. In Proceedings of the 21st ACM SIGOPS
Symposium on Operating Systems Principles (SOSP’07 ). Association for
Computing Machinery. 205-220.
6. Cavoukian, A. 2008. Privacy in the clouds. White Paper on Privacy and
Digital Identity: Implications for the Internet.
7. Cooper, B., Ramakrishnan, R., et al. 2008. PNUTS: Yahoo!’s hosted data
serving platform. Proc. VLDB Endow. 1, 2. 1,277-1,288.
8. Dean, J. and Ghemawat, S. 2008. MapReduce: Simplified data processing
on large clusters. Comm. ACM 51, 1. 107-113.
9. Ganesh, L., Weatherspoon, H., Balakrishnan, M., and Birman K. 2007.
Optimizing power consumption in large-scale storage systems. In
Proceedings of HotOS.
10. Gentry, C. 2009. Fully homomorphic encryption using ideal lattices. In
Proceedings of the ACM Symposium on Theory of Computing (STOC’09).
11. Gray, J., and Reuter, A. 1993. Isolation concepts. In Transaction Processing: Concepts and Techniques, chap. 7. Morgan Kaufmann.
12. Hoelzle, U. and Weihl, B. 2006. High-efficiency power supplies for home
computers and servers. Google Inc.
13. Khuller, S., Li, J., and Saha, B. 2010. Energy efficient scheduling via partial shutdown. In Proceedings of ACM-SIAM Symposium on Discrete Algorithms (SODA).
14. Narayanan, D., Donnelly, A., Thereska, E., Elnikety, S., and Rowstron, A.
2009. Migrating server storage to SSDs: Analysis of tradeoffs. In
Proceedings of EuroSys.
15. Ramakrishnan, R. 2009. Data management challenges in the cloud. In
Proceedings of ACM SIGOPS LADIS. http://www.cs.cornell.
16. Reed B. and Junqueira, F. P. 2008. A simple totally ordered broadcast pro-tocol. In Proceedings of the 2nd Workshop on Large-Scale Distributed
Systems and Middleware (LADIS’08). ACM.
17. Smith, G. 2007. Principles of secure information flow analysis. In
Malware Detection, Christodorescu, M., et al. Eds., Springer-Verlag.
Chap. 13, 291-307.
18. Vogels, W. 2008. Eventually consistent. ACM Queue 6, 6.
19. Wenliang, D. and Atallah, M. J. 2001. Secure multi-party computation
problems and their applications: a review and open problems. In
Proceedings of the Workshop on New Security Paradigms.
Spring 2010/ Vol. 16, No. 3