OVERCAST SKIES - What Cloud Computing Should Be?

Mark Wallis, Frans Henskens, Michael Hannaford

2011

Abstract

From an consumer perspective the Cloud is opaque. Online storage and the rise of web applications are changing the way users work. There continues though to be no distinction from a user experience point of view between accessing a Cloud-based application and accessing a web application deployed on a classic server. We propose a new paradigm for online application development which takes the best from web applications, thick client applications and the new ”application store” market. This approach expands the cloud to encompass all resources that belong to a user; be it local client resources or server-farm resources procured using a traditional cloud model. By implementing these concepts we can bring the benefits of cloud computing directly to the end user while breaking developers out of the confines of the web browser.

References

  1. and Sons. G., Malladi, P., Quan, D., Legregni, L., and Hall, H. (2007). Cloud computing.
  2. and Sons. G., Malladi, P., Quan, D., Legregni, L., and Hall, H. (2007). Cloud computing.
  3. http://download.boulder.ibm.com/ibmdl/pub/software /dw/wes/hipods/Cloud computing wp final 8Oct.
  4. http://download.boulder.ibm.com/ibmdl/pub/software /dw/wes/hipods/Cloud computing wp final 8Oct.
  5. Brandel, M. (2009). The trouble with cloud: Vendor lockin. CIO.com.
  6. Brandel, M. (2009). The trouble with cloud: Vendor lockin. CIO.com.
  7. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and Brandic, I. (2009). Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599 - 616.
  8. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and Brandic, I. (2009). Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599 - 616.
  9. Coursey, D. (2009). Html5 could be the os killer. PCWorld Business Centre.
  10. Coursey, D. (2009). Html5 could be the os killer. PCWorld Business Centre.
  11. Deering, S. and Hinden, R. (1998). Rfc 2460 - internet protocol, version 6. Technical report, Network Working Group.
  12. Deering, S. and Hinden, R. (1998). Rfc 2460 - internet protocol, version 6. Technical report, Network Working Group.
  13. Gilbertson, S. (2007). Jakob nielsen on web 2.0: ”glossy, but useless”. Wired Magazine.
  14. Gilbertson, S. (2007). Jakob nielsen on web 2.0: ”glossy, but useless”. Wired Magazine.
  15. Henskens, F. A. and Ashton, M. G. (2007). Graph-based optimistic transaction management. Journal of Object Technology, 6(6):131-148.
  16. Henskens, F. A. and Ashton, M. G. (2007). Graph-based optimistic transaction management. Journal of Object Technology, 6(6):131-148.
  17. Kaneshige, T. (2010). Apple iphone kill switch: Can cios trust apple ? cio.com.
  18. Kaneshige, T. (2010). Apple iphone kill switch: Can cios trust apple ? cio.com.
  19. Krill, P. (2010). W3c: Hold off on deployment html5 in websites. InfoWorld.
  20. Krill, P. (2010). W3c: Hold off on deployment html5 in websites. InfoWorld.
  21. Microsoft (2009). Microsoft azure. http://www.microsoft. com/windowsazure/.
  22. Microsoft (2009). Microsoft azure. http://www.microsoft. com/windowsazure/.
  23. Newman, H. (2009). Why cloud storage use could be limited in enterprises. Enterprise Storage Forum.
  24. Newman, H. (2009). Why cloud storage use could be limited in enterprises. Enterprise Storage Forum.
  25. OASIS (2007). Security assertion markup language (saml) v2.0 technical overview. Technical report, Working Group.
  26. OASIS (2007). Security assertion markup language (saml) v2.0 technical overview. Technical report, Working Group.
  27. Object Management Group (2004). Common Object Request Broker Architecture: Core Specification.
  28. Object Management Group (2004). Common Object Request Broker Architecture: Core Specification.
  29. Szyperski, C. (1997). Component Software: Beyond Object-Oriented Programming. Addison-Wesley Professional.
  30. Szyperski, C. (1997). Component Software: Beyond Object-Oriented Programming. Addison-Wesley Professional.
  31. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2007). A system for robust peer-to-peer communication with dynamic protocol selection. The 8th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).
  32. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2007). A system for robust peer-to-peer communication with dynamic protocol selection. The 8th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).
  33. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2010a). A distributed content storage model for web applications. In The Second International Conference on Evolving Internet (INTERNET-2010).
  34. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2010a). A distributed content storage model for web applications. In The Second International Conference on Evolving Internet (INTERNET-2010).
  35. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2010b). Expanding the cloud: A component-based architecture to application deployment on the internet. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid).
  36. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2010b). Expanding the cloud: A component-based architecture to application deployment on the internet. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid).
  37. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2010c). Publish/subscribe model for personal data on the internet. In 6th International Conference on Web Information Systems and Technologies (WEBIST-2010). INSTICC.
  38. Wallis, M., Henskens, F. A., and Hannaford, M. R. (2010c). Publish/subscribe model for personal data on the internet. In 6th International Conference on Web Information Systems and Technologies (WEBIST-2010). INSTICC.
  39. WebDevout (2009). Web browser security statistics, http://www.webdevout.net/browser-security. WebDevout.
  40. WebDevout (2009). Web browser security statistics, http://www.webdevout.net/browser-security. WebDevout.
Download


Paper Citation


in Harvard Style

Wallis M., Henskens F. and Hannaford M. (2011). OVERCAST SKIES - What Cloud Computing Should Be? . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 73-78. DOI: 10.5220/0003390900730078


in Harvard Style

Wallis M., Henskens F. and Hannaford M. (2011). OVERCAST SKIES - What Cloud Computing Should Be? . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 73-78. DOI: 10.5220/0003390900730078


in Bibtex Style

@conference{closer11,
author={Mark Wallis and Frans Henskens and Michael Hannaford},
title={OVERCAST SKIES - What Cloud Computing Should Be?},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={73-78},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003390900730078},
isbn={978-989-8425-52-2},
}


in Bibtex Style

@conference{closer11,
author={Mark Wallis and Frans Henskens and Michael Hannaford},
title={OVERCAST SKIES - What Cloud Computing Should Be?},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={73-78},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003390900730078},
isbn={978-989-8425-52-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - OVERCAST SKIES - What Cloud Computing Should Be?
SN - 978-989-8425-52-2
AU - Wallis M.
AU - Henskens F.
AU - Hannaford M.
PY - 2011
SP - 73
EP - 78
DO - 10.5220/0003390900730078


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - OVERCAST SKIES - What Cloud Computing Should Be?
SN - 978-989-8425-52-2
AU - Wallis M.
AU - Henskens F.
AU - Hannaford M.
PY - 2011
SP - 73
EP - 78
DO - 10.5220/0003390900730078