SlideShare une entreprise Scribd logo
1  sur  28
A Multi-tenant Architecture for Business Process Executions MilindaPathirage, Srinath Perera, Indika Kumara, SanjivaWeerawarana WSO2 Inc.
Cloud Computing ,[object Object]
For more details read “A View of Cloud Computing, Communications of the ACM, 2010”,[object Object]
Cloud Offerings
Why PaaS? IaaS only provides limited saving to someone who needs to outsource their IT functions SaaS is great when they can be used  They are usually very specific (e.g. email, CRM ..) If they match, then great, but if they are not, not much choice for the user.  PaaS stays in the middle ground  Framework to host your apps Hopefully you can move your apps as it is (well not the case with Azure or App Engine, but it is possible).
Supporting SOA in PaaS SOA is a primary technology in the Enterprise Many users already have SOA artifacts  Moving them to the Cloud without need for changing will be a great advantage  We want to see Cloud as yet another deployment model Write and test applications locally Even deploy it locally if needed When you need it, you can deploy the same artifacts in the cloud. Multi-tenancy plays a major role. Which brings us to our Topic. photo by MikkoTarvainenon Flickr, http://www.flickr.com/photos/mtarvainen/5131983246/, Licensed under CC
 What is Multi-tenancy ? ,[object Object],[object Object]
Multi-tenancy vs. Virtual Machines Multi-tenancy provides much fine grained sharing by many applications sharing the same server.  Say there are 100k accounts, but 10k active users at a time. VM based model needs 100k VMs, which means there is a cost incurred per account.  With Multi-tenancy one server can handle many accounts, and by mixing and matching heavy and light users, Multi-tenancy can operate with much less number of servers.  photo by hans s on Flickr, http://www.flickr.com/photos/archeon/2359334908/
Our Earlier Works on Multi-tenancy  We provide a SOA PaaS offering called Stratos. Some of the features Web Service Hosting as a Service  Web Application Hosting as a Service Message Mediation Execution as a Service (ESB) Governance as a Service  Earlier publications on the topic  A. Azeez and S. Perera et al., WSO2 Stratos: An Industrial Stack to Support Cloud Computing, IT: Methods and Applications of Informatics and Information Technology Journal, the special Issue on Cloud Computing, 2011. AfkhamAzeez, Srinath Perera, DimuthuGamage, Ruwan Linton, PrabathSiriwardana, DimuthuLeelaratne, SanjivaWeerawarana, Paul Fremantle, "Multi-Tenant SOA Middleware for Cloud Computing" 3rd International Conference on Cloud Computing, Florida, 2010
Today’s Topic: Workflow Hosting as a Service Key part of the SOA puzzle  Workflows provide interoperable means of composing services together.  Still workflow technology is mostly limited to large scale organizations Goals Enable users to deploy the same workflows that they run on local machines in the Cloud without any changes and supporting the monitoring and other features in the same way.  Supporting Multi-tenancy  Scalability  photo by Michael Coté on Flickr, http://www.flickr.com/photos/cote/460253143/, Licensed under CC
Motivating Usecases
E-Science Gateways Scientific workflows has been identified as enabling technology for E-Science.  Idea is to let scientists visually compose workflows and run them.  There are many gateways that do this.  However, the cost of running gateways for different domains has been high. Workflow hosting service together with Service and Web application hosting service will enable multiple science gateways to share the same infrastructure thus reducing the maintenance cost and resource sharing .  photo by Image Editor on Flickr, http://www.flickr.com/photos/11304375@N07/2769519295/, Licensed under CC
SMBs (Small and Medium size Business)  Most SMBs can not afforded to run their own workflow technologies.  This stops them from goes to the next level.  Workflow, Service and Web hosting services can enable multiple SMBs to share the same infrastructure.  This will lower the bar of workflow use, and enable SMBs to move to the next level.  photo by Olaf on Flickr http://www.flickr.com/photos/okreitz/3073783437/, Licensed under CC
Goals of Multi-tenancy  Sharing – maximize the resource sharing across multiple tenants.  Isolation – hide the fact other other are also in the same server.  Execution – enforce security. Make sure one tenant can’t call other  tenants executable logic.  Data – make sure one tenant can’t see other data  Performance  - make sure performance is not affected by existence of other tenants.  Scale Server is distributed and it can handle larger load by adding more nodes.  photo by John TrainoronFlickr http://www.flickr.com/photos/trainor/2902023575/, Licensed under CC
Related works  Mitezner [5] and Shi et al.[6] introduced application templates where the system lets users customize a template workflow. Mitezneret al. introduced a tenant context to hold execution data and isolate  executions. We also use a similar concept.  Cai, Wang, and Zhou [8] have used tenant context to support multi-tenancy in Web Applications.  Anstett et al. [9] discuss challenges of bring BPEL processes to cloud.  Need changes to BPEL engine Configuration data isolation Avoid giving access to DBs Securing the Data in the communication
BPS Multi-tenancy Architecture
Achieving Service Execution Isolation ,[object Object]
Axis2 have stateless executions and keep all state in a Context.
So if we create different context for each tenant, they are isolated.
See Azeez et al. “Multi-Tenant SOA Middleware for Cloud Computing” for details    ,[object Object]
BPS Multi-tenancy Architecture (Contd.) Extends Apache ODE Has a single tenant Apache ODE Engine as the core and added Multi-tenancy by adding a Multi-tenant process store and adding isolation at the message reception.  Parts of the architecture  A Process store per tenant, which only allows calls from that tenant Parent process store that provides a single process store view across all tenant stores (to Apache ODE).
BPS Multi-tenancy Architecture (Contd.) When a workflow is deployed by T1, it is stored in T1’s process store. Also, a service is created for the workflow and deployed within T1’s space.  When a workflow received a message, the service that receives the message perform access control and then injects it to ODE with tenant ID as a correlation property.  A implicit correlation rule together with other correlation rules routes the messages to a workflow instance.  When workflow instance access the process store, it is routed to the T1’s  tenant process store.
Isolation Data isolation is provided by the process store per tenant, which stores data in the multi-tenant registry.  Execution isolation is provided by Service isolation which enforces security on any external calls before a message is injected in to the workflow engine. After entry, isolation is provided by data isolation and workflow engine.  Workflow engine creates a new version when a process is redeployed, and each version is isolated. So multiple users can have workflows with the same name in the workflow engine.  photo  Kevin Rushton by on Flickr, http://www.geograph.org.uk/photo/643153
Isolation (Contd.)  Performance isolation is a challenging issue.  We currently relay on monitoring and auditing where we can kill CPU hogging processes We are exploring the possibility of changing the priority of CPU hogging processes in the work queue.   photo  Fortes by on Flickr, http://www.fotopedia.com/items/flickr-3193056200
Scaling  Run multiple BPS nodes in a cluster Tenants are partitioned across BPS nodes Fronted by a load-balancer which is aware of tenants and processes
Performance  Setup Multi-tenant and non-multi-tenant versions  Run 200 workflows from each client Overhead is minimal MT supports only add few additional lookups and checks Java Security does not come in to play as we do not run user provided code.
How does it make a difference? Supporting Workflow Hosting as a Service Bringing down the cost of using workflows Increasing the sharing in the cloud   Multi-tenant BPS in private Cloud to support multiple departments for improve resource sharing.  As a test environment and an education medium  Super tenant workflows  Workflow store model (like App Store) to sell workflows.  Photo by Madhan on Flickr, http://www.flickr.com/photos/flickcoolpix/3566848458/
Conclusion We proposed an architecture for supporting Multi-tenant  Business Process Engine  We layered this on top of our earlier works on Service Multi-tenancy and Data Multi-tenancy.  We discussed data and execution isolation.  We have realized the architecture on top of WSO2 BPS, which is an extension of Apache ODE Multi-tenant business process engine enables end-users to deploy their current BPEL workflows running on their machine without any changes.  It only introduced a minimal overhead  It is currently available for free from cloud.wso2.com

Contenu connexe

Tendances

Multi-tenancy in Private Clouds
Multi-tenancy in Private CloudsMulti-tenancy in Private Clouds
Multi-tenancy in Private CloudsPatrick Nicolas
 
CLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICECLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICEijdms
 
Application server vs Web Server
Application server vs Web ServerApplication server vs Web Server
Application server vs Web ServerGagandeep Singh
 
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSBuilding Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSSameera Jayasoma
 
Real World Azure - Dev
Real World Azure - DevReal World Azure - Dev
Real World Azure - DevClint Edmonson
 
Data Management Gateway - Deep Dive
Data Management Gateway - Deep DiveData Management Gateway - Deep Dive
Data Management Gateway - Deep DiveJean-Pierre Riehl
 
Microsoft And Cloud Computing
Microsoft And Cloud ComputingMicrosoft And Cloud Computing
Microsoft And Cloud ComputingDavid Chou
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure PlatformSoumow Dollon
 
Private Cloud vs. VPS
Private Cloud vs. VPSPrivate Cloud vs. VPS
Private Cloud vs. VPSHTS Hosting
 
Microsoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For TechiesMicrosoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For TechiesAidan Finn
 
Understanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudUnderstanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudJohn Treadway
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 

Tendances (20)

Multi-tenancy in Private Clouds
Multi-tenancy in Private CloudsMulti-tenancy in Private Clouds
Multi-tenancy in Private Clouds
 
CLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICECLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICE
 
Azure services
Azure servicesAzure services
Azure services
 
Application server vs Web Server
Application server vs Web ServerApplication server vs Web Server
Application server vs Web Server
 
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSBuilding Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
 
Real World Azure - Dev
Real World Azure - DevReal World Azure - Dev
Real World Azure - Dev
 
Multi-Tenancy
Multi-TenancyMulti-Tenancy
Multi-Tenancy
 
Cloud database
Cloud databaseCloud database
Cloud database
 
Data Management Gateway - Deep Dive
Data Management Gateway - Deep DiveData Management Gateway - Deep Dive
Data Management Gateway - Deep Dive
 
Microsoft And Cloud Computing
Microsoft And Cloud ComputingMicrosoft And Cloud Computing
Microsoft And Cloud Computing
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
04 Azure IAAS 101
04 Azure IAAS 10104 Azure IAAS 101
04 Azure IAAS 101
 
Private Cloud vs. VPS
Private Cloud vs. VPSPrivate Cloud vs. VPS
Private Cloud vs. VPS
 
Microsoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For TechiesMicrosoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For Techies
 
Understanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudUnderstanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design Cloud
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Serverless Architecture
Serverless ArchitectureServerless Architecture
Serverless Architecture
 

Similaire à A Multi-tenant Architecture for Business Process Executions

Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingSrinath Perera
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesEueung Mulyana
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computingkevnikool
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxssuserddf612
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Introduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalIntroduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalBeantsingh
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 

Similaire à A Multi-tenant Architecture for Business Process Executions (20)

Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud Computing
 
UNIT - I.docx
UNIT - I.docxUNIT - I.docx
UNIT - I.docx
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cad
CadCad
Cad
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Introduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalIntroduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh Duggal
 
Unit 1
Unit 1Unit 1
Unit 1
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 

Plus de Srinath Perera

Book: Software Architecture and Decision-Making
Book: Software Architecture and Decision-MakingBook: Software Architecture and Decision-Making
Book: Software Architecture and Decision-MakingSrinath Perera
 
Data science Applications in the Enterprise
Data science Applications in the EnterpriseData science Applications in the Enterprise
Data science Applications in the EnterpriseSrinath Perera
 
An Introduction to APIs
An Introduction to APIs An Introduction to APIs
An Introduction to APIs Srinath Perera
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsSrinath Perera
 
AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?Srinath Perera
 
Healthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & ChallengesHealthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & ChallengesSrinath Perera
 
How would AI shape Future Integrations?
How would AI shape Future Integrations?How would AI shape Future Integrations?
How would AI shape Future Integrations?Srinath Perera
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsSrinath Perera
 
Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going? Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going? Srinath Perera
 
Few thoughts about Future of Blockchain
Few thoughts about Future of BlockchainFew thoughts about Future of Blockchain
Few thoughts about Future of BlockchainSrinath Perera
 
A Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New TechnologiesA Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New TechnologiesSrinath Perera
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata EraSrinath Perera
 
Blockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and RisksBlockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and RisksSrinath Perera
 
Today's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology LandscapeToday's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology LandscapeSrinath Perera
 
An Emerging Technologies Timeline
An Emerging Technologies TimelineAn Emerging Technologies Timeline
An Emerging Technologies TimelineSrinath Perera
 
The Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming ApplicationsThe Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming ApplicationsSrinath Perera
 
Analytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the UglyAnalytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the UglySrinath Perera
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through AnalyticsSrinath Perera
 
SoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySrinath Perera
 

Plus de Srinath Perera (20)

Book: Software Architecture and Decision-Making
Book: Software Architecture and Decision-MakingBook: Software Architecture and Decision-Making
Book: Software Architecture and Decision-Making
 
Data science Applications in the Enterprise
Data science Applications in the EnterpriseData science Applications in the Enterprise
Data science Applications in the Enterprise
 
An Introduction to APIs
An Introduction to APIs An Introduction to APIs
An Introduction to APIs
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance Professionals
 
AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?AI in the Real World: Challenges, and Risks and how to handle them?
AI in the Real World: Challenges, and Risks and how to handle them?
 
Healthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & ChallengesHealthcare + AI: Use cases & Challenges
Healthcare + AI: Use cases & Challenges
 
How would AI shape Future Integrations?
How would AI shape Future Integrations?How would AI shape Future Integrations?
How would AI shape Future Integrations?
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future Integrations
 
Future of Serverless
Future of ServerlessFuture of Serverless
Future of Serverless
 
Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going? Blockchain: Where are we? Where are we going?
Blockchain: Where are we? Where are we going?
 
Few thoughts about Future of Blockchain
Few thoughts about Future of BlockchainFew thoughts about Future of Blockchain
Few thoughts about Future of Blockchain
 
A Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New TechnologiesA Visual Canvas for Judging New Technologies
A Visual Canvas for Judging New Technologies
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
 
Blockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and RisksBlockchain, Impact, Challenges, and Risks
Blockchain, Impact, Challenges, and Risks
 
Today's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology LandscapeToday's Technology and Emerging Technology Landscape
Today's Technology and Emerging Technology Landscape
 
An Emerging Technologies Timeline
An Emerging Technologies TimelineAn Emerging Technologies Timeline
An Emerging Technologies Timeline
 
The Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming ApplicationsThe Rise of Streaming SQL and Evolution of Streaming Applications
The Rise of Streaming SQL and Evolution of Streaming Applications
 
Analytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the UglyAnalytics and AI: The Good, the Bad and the Ugly
Analytics and AI: The Good, the Bad and the Ugly
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through Analytics
 
SoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration Technology
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

A Multi-tenant Architecture for Business Process Executions

  • 1. A Multi-tenant Architecture for Business Process Executions MilindaPathirage, Srinath Perera, Indika Kumara, SanjivaWeerawarana WSO2 Inc.
  • 2.
  • 3.
  • 5. Why PaaS? IaaS only provides limited saving to someone who needs to outsource their IT functions SaaS is great when they can be used They are usually very specific (e.g. email, CRM ..) If they match, then great, but if they are not, not much choice for the user. PaaS stays in the middle ground Framework to host your apps Hopefully you can move your apps as it is (well not the case with Azure or App Engine, but it is possible).
  • 6. Supporting SOA in PaaS SOA is a primary technology in the Enterprise Many users already have SOA artifacts Moving them to the Cloud without need for changing will be a great advantage We want to see Cloud as yet another deployment model Write and test applications locally Even deploy it locally if needed When you need it, you can deploy the same artifacts in the cloud. Multi-tenancy plays a major role. Which brings us to our Topic. photo by MikkoTarvainenon Flickr, http://www.flickr.com/photos/mtarvainen/5131983246/, Licensed under CC
  • 7.
  • 8. Multi-tenancy vs. Virtual Machines Multi-tenancy provides much fine grained sharing by many applications sharing the same server. Say there are 100k accounts, but 10k active users at a time. VM based model needs 100k VMs, which means there is a cost incurred per account. With Multi-tenancy one server can handle many accounts, and by mixing and matching heavy and light users, Multi-tenancy can operate with much less number of servers. photo by hans s on Flickr, http://www.flickr.com/photos/archeon/2359334908/
  • 9. Our Earlier Works on Multi-tenancy We provide a SOA PaaS offering called Stratos. Some of the features Web Service Hosting as a Service Web Application Hosting as a Service Message Mediation Execution as a Service (ESB) Governance as a Service Earlier publications on the topic A. Azeez and S. Perera et al., WSO2 Stratos: An Industrial Stack to Support Cloud Computing, IT: Methods and Applications of Informatics and Information Technology Journal, the special Issue on Cloud Computing, 2011. AfkhamAzeez, Srinath Perera, DimuthuGamage, Ruwan Linton, PrabathSiriwardana, DimuthuLeelaratne, SanjivaWeerawarana, Paul Fremantle, "Multi-Tenant SOA Middleware for Cloud Computing" 3rd International Conference on Cloud Computing, Florida, 2010
  • 10. Today’s Topic: Workflow Hosting as a Service Key part of the SOA puzzle Workflows provide interoperable means of composing services together. Still workflow technology is mostly limited to large scale organizations Goals Enable users to deploy the same workflows that they run on local machines in the Cloud without any changes and supporting the monitoring and other features in the same way. Supporting Multi-tenancy Scalability photo by Michael Coté on Flickr, http://www.flickr.com/photos/cote/460253143/, Licensed under CC
  • 12. E-Science Gateways Scientific workflows has been identified as enabling technology for E-Science. Idea is to let scientists visually compose workflows and run them. There are many gateways that do this. However, the cost of running gateways for different domains has been high. Workflow hosting service together with Service and Web application hosting service will enable multiple science gateways to share the same infrastructure thus reducing the maintenance cost and resource sharing . photo by Image Editor on Flickr, http://www.flickr.com/photos/11304375@N07/2769519295/, Licensed under CC
  • 13. SMBs (Small and Medium size Business) Most SMBs can not afforded to run their own workflow technologies. This stops them from goes to the next level. Workflow, Service and Web hosting services can enable multiple SMBs to share the same infrastructure. This will lower the bar of workflow use, and enable SMBs to move to the next level. photo by Olaf on Flickr http://www.flickr.com/photos/okreitz/3073783437/, Licensed under CC
  • 14. Goals of Multi-tenancy Sharing – maximize the resource sharing across multiple tenants. Isolation – hide the fact other other are also in the same server. Execution – enforce security. Make sure one tenant can’t call other tenants executable logic. Data – make sure one tenant can’t see other data Performance - make sure performance is not affected by existence of other tenants. Scale Server is distributed and it can handle larger load by adding more nodes. photo by John TrainoronFlickr http://www.flickr.com/photos/trainor/2902023575/, Licensed under CC
  • 15. Related works Mitezner [5] and Shi et al.[6] introduced application templates where the system lets users customize a template workflow. Mitezneret al. introduced a tenant context to hold execution data and isolate executions. We also use a similar concept. Cai, Wang, and Zhou [8] have used tenant context to support multi-tenancy in Web Applications. Anstett et al. [9] discuss challenges of bring BPEL processes to cloud. Need changes to BPEL engine Configuration data isolation Avoid giving access to DBs Securing the Data in the communication
  • 17.
  • 18. Axis2 have stateless executions and keep all state in a Context.
  • 19. So if we create different context for each tenant, they are isolated.
  • 20.
  • 21. BPS Multi-tenancy Architecture (Contd.) Extends Apache ODE Has a single tenant Apache ODE Engine as the core and added Multi-tenancy by adding a Multi-tenant process store and adding isolation at the message reception. Parts of the architecture A Process store per tenant, which only allows calls from that tenant Parent process store that provides a single process store view across all tenant stores (to Apache ODE).
  • 22. BPS Multi-tenancy Architecture (Contd.) When a workflow is deployed by T1, it is stored in T1’s process store. Also, a service is created for the workflow and deployed within T1’s space. When a workflow received a message, the service that receives the message perform access control and then injects it to ODE with tenant ID as a correlation property. A implicit correlation rule together with other correlation rules routes the messages to a workflow instance. When workflow instance access the process store, it is routed to the T1’s tenant process store.
  • 23. Isolation Data isolation is provided by the process store per tenant, which stores data in the multi-tenant registry. Execution isolation is provided by Service isolation which enforces security on any external calls before a message is injected in to the workflow engine. After entry, isolation is provided by data isolation and workflow engine. Workflow engine creates a new version when a process is redeployed, and each version is isolated. So multiple users can have workflows with the same name in the workflow engine. photo Kevin Rushton by on Flickr, http://www.geograph.org.uk/photo/643153
  • 24. Isolation (Contd.) Performance isolation is a challenging issue. We currently relay on monitoring and auditing where we can kill CPU hogging processes We are exploring the possibility of changing the priority of CPU hogging processes in the work queue. photo Fortes by on Flickr, http://www.fotopedia.com/items/flickr-3193056200
  • 25. Scaling Run multiple BPS nodes in a cluster Tenants are partitioned across BPS nodes Fronted by a load-balancer which is aware of tenants and processes
  • 26. Performance Setup Multi-tenant and non-multi-tenant versions Run 200 workflows from each client Overhead is minimal MT supports only add few additional lookups and checks Java Security does not come in to play as we do not run user provided code.
  • 27. How does it make a difference? Supporting Workflow Hosting as a Service Bringing down the cost of using workflows Increasing the sharing in the cloud Multi-tenant BPS in private Cloud to support multiple departments for improve resource sharing. As a test environment and an education medium Super tenant workflows Workflow store model (like App Store) to sell workflows. Photo by Madhan on Flickr, http://www.flickr.com/photos/flickcoolpix/3566848458/
  • 28. Conclusion We proposed an architecture for supporting Multi-tenant Business Process Engine We layered this on top of our earlier works on Service Multi-tenancy and Data Multi-tenancy. We discussed data and execution isolation. We have realized the architecture on top of WSO2 BPS, which is an extension of Apache ODE Multi-tenant business process engine enables end-users to deploy their current BPEL workflows running on their machine without any changes. It only introduced a minimal overhead It is currently available for free from cloud.wso2.com