Distributed application provisioning over Ethereum-based private and permissioned blockchain: availability modeling, capacity, and costs planning

被引:12
作者
Melo, Carlos [1 ]
Dantas, Jamilson [1 ]
Pereira, Paulo [1 ]
Maciel, Paulo [1 ]
机构
[1] Univ Fed Pernambuco, Ctr Informat, Recife, PE, Brazil
关键词
System’ s availability; Capacity-oriented availability; Blockchain; Distributed application; Ethereum; Cloud computing; Cost evaluation;
D O I
10.1007/s11227-020-03617-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain and cloud computing are two of the main topics related to the distributed computing paradigm, and in the last decade, they have seen exponential growth in their adoption. Cloud computing has long been established as the main mechanism to test, develop, and deliver new applications and services in a distributed manner across the World Wide Web. Large data centers host many services and store petabytes of user data. Infrastructure and services owners rule the access to data and may even be able to change contents and attest to its veracity. Blockchain is a step towards a future where the user's data are considered safer, besides being public. Advances in blockchain-based technologies, now, support service provisioning over permissioned and private infrastructures. Therefore, organizations or groups of individuals may share information, service even if they do not trust each other, besides supporting infrastructure management tasks. This paper presents and evaluates models for assessing the availability and capacity-oriented availability of cloud computing infrastructures. It aims at running blockchain's distributed applications based on the Ethereum blockchain platform and the required expenses to perform service delivery in public and private infrastructures. Most of the obtained results also apply to other blockchains-based platforms.
引用
收藏
页码:9615 / 9641
页数:27
相关论文
共 41 条
[1]  
Amazon, 2020, WHAT IS CLOUD COMP
[2]   A Prototype Evaluation of a Tamper-resistant High Performance Blockchain-based Transaction Log for a Distributed Database [J].
Aniello, Leonardo ;
Baldoni, Roberto ;
Gaetani, Edoardo ;
Lombardi, Federico ;
Margheri, Andrea ;
Sassone, Vladimiro .
2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, :151-154
[3]  
[Anonymous], 2001, TECHNICAL REPORT SER
[4]  
Arundel J., 2019, Cloud Native DevOps with Kubernetes: building, deploying, and scaling modern applications in the Cloud
[5]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[6]  
Buterin V, 2013, GITHUB REPOSITORY, V1, P22
[7]  
Dantas J, 2013, THESIS U FEDERAL PER
[8]  
Frank P.M., 1978, Introduction to sensitivity analysis
[9]  
Garg S, 1995, SIXTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, P180, DOI 10.1109/ISSRE.1995.497656
[10]  
Gupta Manav., 2017, Blockchain for dummies