Cloud computing
-
Upload
ripal-ranpara -
Category
Education
-
view
32 -
download
0
Transcript of Cloud computing
![Page 1: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/1.jpg)
Cloud Computing
Ms.Ripal RanparaAssistant Professor,
Department of Computer Science & Information TechnologyShree M.N. Virani Science College Rajkot
Shree Manibhai Virani and Smt. Navalben Virani Science
College, Rajkot (Autonomous)
Affiliated to Saurashtra University, Rajkot
05/02/23 1
Module:1.1
Overview of Computing Paradigm
![Page 2: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/2.jpg)
What is Computing
• The process of utilizing computer technology to complete a task. Computing may involve computer hardware and/or software, but must involve some form of a computer system.
• Computing includes• designing,• developing and • building hardware and software systems;• processing,• structuring, and managing various kinds of information; • doing scientific research on and with computers; • entertainment media.
![Page 3: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/3.jpg)
Grid computing
• Grid computing involves connecting geographically remote computers into a single network to create a virtual supercomputer by combining the computational power of all computers on grid.
![Page 4: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/4.jpg)
• "the Grid"links together computing resources (PCs, workstations, servers, storage elements) and provides the mechanism needed to access them.
• By implementing our proposed Intranet Grid it is very easy to download multiple files very fast
• No need to worry about the security as we are authenticating each and every step taking place in our Grid
• In particular user to access the database. Further implementations could be carried out in the nearest future
Grid computing
![Page 5: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/5.jpg)
WHY GRID COMPUTING?
40%Mainframes are idle 90%Unix servers are idle 95%PC servers are idle 0-15%Mainframes are idle in peak-hour 70%PC servers are idle in peak-hour
![Page 6: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/6.jpg)
• Cluster computing is a form of computing in which a group of computers are linked together so they can act like a single entity.
• It is the technique of linking two or more computers into a network(Usually through a local area network)in order to take advantage of the parallel processing power of those computers.
Cluster Computing
![Page 7: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/7.jpg)
Cluster Application
• Google Search Engine• Earthquake Simulation Software• Image Rendering• Weather Forecasting
Application Benefits• High processing power• Cost Efficient• High Availability • Fault Tolerance
![Page 8: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/8.jpg)
![Page 9: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/9.jpg)
Distributed Computing
• It’s the solution to the problem where your RAM is too small and your data are too big and/or too CPU-intensive to be processed on a single machine.
• It split a big task into smaller tasks and execute them on multiple machines
![Page 10: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/10.jpg)
Advantages Of Distributed Computing System
• Inherently Distributed applications: several applications are inherently distributed in nature and require distributed
computing system for their realization • Information Sharing among Distributed Users: In a distributed computing system, information generated by one of the users can
be easily and efficiently shared by the users working at other nodes of the system .The use of distributed computing systems by a group of users to work cooperatively is known as computer-supported cooperative working (CSCW), or groupware .
• Resource Sharing: Information is not the only thing that can be shared in a distributed computing
system. Sharing of software resources such as software libraries and databases as well as hardware resources such as printers, hard disks, and plotters can also be done in a very effective way among all the computers and the users of a single distributed computing system.
![Page 11: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/11.jpg)
Utility Computing
• Utility computing is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate.
• Like other types of on-demand computing (such as grid computing), the utility model seeks to maximize the efficient use of resources and/or minimize associated costs.
![Page 12: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/12.jpg)
![Page 13: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/13.jpg)
![Page 14: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/14.jpg)
Evaluation of Cloud Computing
![Page 15: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/15.jpg)
Evolution of Cloud Computing
• Solving large problems with parallel computing
• Network-based subscriptions to applications• Offering computing
resources as a metered service
• Anytime, anywhere access to virtualized IT resources delivered dynamically as a service.
Software as a Service
Utility Computing
Cloud Computing
Grid Computing
Abstraction –> Simplification -> Capability Aggregation
![Page 16: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/16.jpg)
Business Drivers for CloudBusiness growth• Business growth is one of the top benefits organisations realise as a result of cloud adoption,
with 52% of enterprises reporting increased growth since going cloud (2015 Cloud Enterprise Report).
2. Efficiency• Efficiency is an extremely common cloud driver, with 71% of organisations worldwide
ranking it a top area they hope to approve through cloud technology (2015 Cloud Enterprise Report).
3. Experience• Next among the business drivers is improving the quality of the customer experience, which
45% of enterprises worldwide rank as a top cloud driver (although that number jumps to 61% looking at only organisations in the UK and Australia).
4. Assurance• Finally, there is assurance, which is the idea that data will be more secure in the cloud and the
user will attain better uptime because its solutions are maintained by providers that have built their businesses around these competencies.
![Page 17: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/17.jpg)
05/02/23 17
![Page 18: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/18.jpg)
![Page 19: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/19.jpg)
05/02/23 19
![Page 20: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/20.jpg)
05/02/23 20
![Page 21: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/21.jpg)
Cloud Computing
Ms.Ripal RanparaAssistant Professor,
Department of Computer Science & Information TechnologyShree M.N. Virani Science College Rajkot
Shree Manibhai Virani and Smt. Navalben Virani Science
College, Rajkot (Autonomous)
Affiliated to Saurashtra University, Rajkot
05/02/23 21
Module:1.2
Introduction to Cloud Computing
![Page 22: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/22.jpg)
Cloud Computing
• Cloud computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common Internet protocols and networking standards.
• Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. The use of the word “cloud” makes reference to the two essential concepts:
![Page 23: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/23.jpg)
Cloud Computing
• Abstraction: Cloud computing abstracts the details of system implementation from users and developers. Applications run on physical systems that aren't specified, data is stored in locations that are unknown, administration of systems is outsourced to others, and access by users is ubiquitous.
• Virtualization: Cloud computing virtualizes systems by pooling and sharing resources. Systems and storage can be provisioned as needed from a centralized infrastructure, costs are assessed on a metered basis, multi-tenancy is enabled, and resources are scalable with agility.
![Page 24: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/24.jpg)
05/02/23 24
![Page 25: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/25.jpg)
Cloud Computing Architecture Cloud Computing Architecture
![Page 26: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/26.jpg)
Basic ConceptsBasic Concepts
There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:
1. Deployment Models 1. Deployment Models
2. Service Models 2. Service Models
![Page 27: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/27.jpg)
Deployment Models Deployment Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access:
•Public, •Private, •Hybrid and •Community.
![Page 28: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/28.jpg)
05/02/23 28
![Page 29: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/29.jpg)
05/02/23 29
PUBLIC CLOUD PUBLIC CLOUD : The Public Cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness, e.g., e-mail.
PRIVATE CLOUD PRIVATE CLOUD : The Private Cloud allows systems and services to be accessible within an organization. It offers increased security because of its private nature.
PUBLIC CLOUD & PRIVATE CLOUD PUBLIC CLOUD & PRIVATE CLOUD :
![Page 30: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/30.jpg)
05/02/23 30
COMMUNITY CLOUD COMMUNITY CLOUD : The Community Cloud allows systems and services to be accessible by group of organizations.
HYBRID CLOUD HYBRID CLOUD : The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud.
COMMUNITY CLOUD & HYBRID CLOUD COMMUNITY CLOUD & HYBRID CLOUD
![Page 31: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/31.jpg)
![Page 32: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/32.jpg)
The NIST model
• The United States government is a major consumer of computer services and, therefore, one of the major users of cloud computing networks.
• The NIST model originally did not require a cloud to use virtualization to pool resources, nor did it absolutely require that a cloud support multi-tenancy in the earliest definitions of cloud computing.Multi-tenancy is the sharing of resources among two or more clients
05/02/23 32
![Page 33: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/33.jpg)
05/02/23 33
![Page 34: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/34.jpg)
05/02/23 34
History of Cloud Computing
![Page 35: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/35.jpg)
05/02/23 35
![Page 36: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/36.jpg)
05/02/23 36
![Page 37: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/37.jpg)
05/02/23 37
![Page 38: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/38.jpg)
05/02/23 38
![Page 39: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/39.jpg)
05/02/23 39
![Page 40: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/40.jpg)
05/02/23 40
![Page 41: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/41.jpg)
05/02/23 41
![Page 42: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/42.jpg)
05/02/23 42
![Page 43: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/43.jpg)
Characteristics of Cloud Computing
• Have access to low cost power• Leverage renewable power source• Be near abundant water• Be sited where high-speed network backbone connections
can be made• Keep land costs modest and occupation unobtrusive Obtain
tax breaks• Optimize the overall system latency
05/02/23 43
![Page 44: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/44.jpg)
Benefits of cloud computing
• On-demand self-service• Broad network access• Resource pooling• Rapid elasticity• Measured service• Lower costs• Ease of utilization• Quality of Service• Reliability
05/02/23 44
• Outsourced IT management
• Simplified maintenance and upgrade
• Low Barrier to Entry
![Page 45: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/45.jpg)
05/02/23 45
![Page 46: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/46.jpg)
05/02/23 46
![Page 47: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/47.jpg)
Communication Protocols
• Cloud computing arises from services available over the Internet communicating using the standard Internet protocol suite underpinned by the HTTP and HTTPS transfer protocols.
• In order to engage in inter process communication (IPC) processes, many client/server protocols have been applied to distributed networking over the years. Various forms of RPC (Remote Procedure Call) implementations (including DCOM, Java RMI, and CORBA)
05/02/23 47
![Page 48: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/48.jpg)
Assessing the Role of Open Standards
• The cloud computing industry is working with these architectural standards:
• Platform virtualization of resources
• Service-oriented architecture
•Deployment of open-source software•Standardized Web services•Autonomic systems•Grid computing•Web-application frameworks
•These standards help to enable different business models that cloud computing vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility computing.
•These businesses require open standards so that data is both portable and universally accessible.
![Page 49: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/49.jpg)
![Page 50: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/50.jpg)
Infrastructure as a Service (IaaS)
• Infrastructure as a Service (IaaS) is a way of delivering Cloud Computing infrastructure – servers, storage, network and operating systems – as an on-demand service. Rather than purchasing servers, software, datacenter space or network equipment, clients instead buy those resources as a fully outsourced service on demand Iaas provides the following● Servers- compute, machines● Storage● Network● Operating system
05/02/23 50
![Page 51: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/51.jpg)
05/02/23 51
![Page 52: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/52.jpg)
Introduction to virtualization
• Virtualization is a technology to run multiple same or different operating systems which is completely isolated from each other.
• Ex: Run both Windows and Linux on the same machine
05/02/23 52
![Page 53: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/53.jpg)
Run multiple virtual computers on one physical box.• Desktop• Server• Data Center• Cloud
05/02/23 53
![Page 54: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/54.jpg)
How it is different from dual boot?
• Both OSes run simultaneously
05/02/23 54
![Page 55: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/55.jpg)
Types of Virtualization
• Server Virtualization• Desktop Virtualization • Application Virtualization • Memory• Storage• Data• Network05/02/23 55
![Page 56: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/56.jpg)
What is Hypervisor
• Hypervisor is a software layer sits between Hardware and OSes which will interact with hardware and resources and provide an interface to share the available resources to Virtual containers
05/02/23 56
![Page 57: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/57.jpg)
Virtualization Benefits
• Redundancy • Legacy hardware (Inheritance) • Migration • Centralized management
05/02/23 57
![Page 58: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/58.jpg)
virtual machine (VM)
• A virtual machine (VM) is an operating system (OS) or application environment that is installed on software, which imitates dedicated hardware. The end user has the same experience on a virtual machine as they would have on dedicated hardware.
• Specialized software, called a hypervisor, emulates the PC client or server's CPU, memory, hard disk, network and other hardware resources completely, enabling virtual machines to share the resources.
05/02/23 58
![Page 59: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/59.jpg)
Storage as a service• Online file storage centers or cloud storage
providers allow you to safely upload your files to the Internet.
iCloud is a service provided by Apple• 5GB storage space is free of cost• Once the iCloud is used you can share your
stored data on any of your different Apple devices
• Aceess to all files, music, calendar, email• Only iOS 5 has iCloud installed
05/02/23 59
![Page 60: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/60.jpg)
05/02/23 60
![Page 61: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/61.jpg)
Free storage Options
![Page 62: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/62.jpg)
Business Benefits
• With cloud storage, there's no need for CDs, external hard drives, or localized servers
• Data is quickly and automatically updated in the cloud and available for your retrieval whenever you need it
• With no need for physical, on-site storage space, you can have a smaller workspace, less equipment to buy, and fewer IT employees to maintain your equipment and manage your data
• IT staff's can spend more time to focusing on other important tasks to help your business growth.
05/02/23 62
![Page 63: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/63.jpg)
Eucalyptus Open-Source Private Cloud
• Eucalyptus is a Linux-based open-source software architecture that implements efficiency-enhancing private and hybrid clouds within an enterprise’s existing IT infrastructure.
Eucalyptus is an acronym for “Elastic Utility Computing Architecture for Linking Your Programs to Useful Systems.”
A Eucalyptus private cloud is deployed across an enterprise’s “on premise” data center infrastructure and is accessed by users over enterprise intranet. Thus, sensitive data remains entirely secure from external intrusion behind the enterprise firewall.
05/02/23 63
![Page 64: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/64.jpg)
Infrastructure Security
• 1.Network Level security• 2.Host level security• 3.Application level security
05/02/23 64
![Page 65: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/65.jpg)
Infrastructure Security - The Network Level
• There are four significant risk factors in this use case: • 1.Ensuring the confidentiality and integrity of organization's data-in-
transit to and from a public cloud provider;• 2. Ensuring proper access control (authentication, authorization, and
auditing) to whatever resources are used at the public cloud provider;• 3. Ensuring the availability of the Internet-facing resources in a public
cloud that are being used by an organization, or have been assigned to an organization by public cloud providers;
• 4.Replacing the established model of network zones and tiers with domains.
05/02/23 65
![Page 66: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/66.jpg)
Infrastructure Security - The Host Level
• The host security responsibilities in SaaS and PaaS services are transferred to the provider of cloud services. IaaS customers are primarily responsible for securing the hosts provisioned in the cloud (virtualization software security, customer guest OS or virtual server security).
05/02/23 66
![Page 67: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/67.jpg)
Infrastructure Security - The Application Level
• The level is responsible for managing• Application-level security threats;• End user security;• SaaS application security;• PaaS application security;• Customer-deployed application security• IaaS application security• Public cloud security limitations
05/02/23 67
![Page 68: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/68.jpg)
05/02/23 68
![Page 69: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/69.jpg)
Understanding Cloud Security
• Your risks in any cloud deployment are dependent upon the particular cloud service model chosen and the type of cloud on which you deploy your applications.
• In order to evaluate your risks, you need to perform the following analysis:
• 1. Determine which resources (data, services, or applications) you are planning to move to the cloud.
• 2. Determine the sensitivity of the resource to risk.• 3. Determine the risk associated with the particular cloud type for a
resource.05/02/23 69
![Page 70: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/70.jpg)
05/02/23 70
![Page 71: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/71.jpg)
05/02/23 71
![Page 72: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/72.jpg)
Securing Data and Data piracy
Securing data sent to, received from, and stored in the cloud is the single largest security concern that most organizations should have with cloud computing.
As with any WAN traffic, you must assume that any data can be intercepted and modified. That's why, as a matter of course, traffic to a cloud service provider and stored off-premises is encrypted.
•These are the key mechanisms for protecting data mechanisms:Access control
AuditingAuthenticationAuthorization
05/02/23 72
![Page 73: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/73.jpg)
Cloud Computing Landscape Applications
Storage
Computing
Development platform
Gartner predicts revenue of USD 131billion in 2013
![Page 74: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/74.jpg)
Who uses cloud computing?
![Page 75: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/75.jpg)
Why do customers use the cloud?
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
![Page 76: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/76.jpg)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
![Page 77: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/77.jpg)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
![Page 78: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/78.jpg)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
![Page 79: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/79.jpg)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
![Page 80: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/80.jpg)
Control and jurisdictional issuesOn premise
App
VM
Server
Storage
Network
On premise (hosted)
App
VM
Server
Storage
Network
IaaS
App
VM
Server
Storage
Network
PaaS
App
Services
Server
Storage
Network
SaaS
App
Services
Server
Storage
Network
Organization has control
Organization shares control with vendor
Vendor has control
Image reproduced from Cloud security and privacy, 2009, Mather et al.
![Page 81: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/81.jpg)
CLOUD COMPUTING SECURITY AND PRIVACY ISSUES
• There are numerous security issues for cloud computing as it encompasses many technologies including
• networks, • databases,• operating systems, • virtualization, • resource scheduling,• transaction management, • load balancing,• concurrency control and memory management.
05/02/23 81
![Page 82: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/82.jpg)
Access management & Access Control
• there are six specific areas of the cloud computing environment where equipment and software require substantial security attention
These six areas are:• (1) security of data at rest,• (2) security of data in transit, • (3) authentication of users/applications/ processes, • (4) robust separation between data belonging to different customers, • (5)cloud legal and regulatory issues, and (6) incident response.
05/02/23 82
![Page 83: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/83.jpg)
Launch an Application with AWS Elastic Beanstalk
05/02/23 83
![Page 84: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/84.jpg)
05/02/23 84
![Page 85: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/85.jpg)
05/02/23 85
![Page 86: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/86.jpg)
05/02/23 86
![Page 87: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/87.jpg)
05/02/23 87
![Page 88: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/88.jpg)
05/02/23 88
![Page 89: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/89.jpg)
05/02/23 89
![Page 90: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/90.jpg)
05/02/23 90
![Page 91: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/91.jpg)
05/02/23 91
![Page 92: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/92.jpg)
05/02/23 92
![Page 93: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/93.jpg)
05/02/23 93
![Page 94: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/94.jpg)
05/02/23 94
![Page 95: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/95.jpg)
CLOUD CONTRACTING MODELS
• Licensing Agreements Versus Services Agreements– Summary of Terms of a License Agreement– Summary of Terms o– Value of Using a Service Agreement in Cloud Arrangement s
a Service Agreement.• On-Line Agreements Versus Standard Contracts• The Importance of Privacy Policies Terms and Conditions• Risk Allocation and Limitations of Liability
05/02/23 95
![Page 96: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/96.jpg)
96Cloud Computing Represented as a Stack of Service Offering Categories1
![Page 97: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/97.jpg)
05/02/23 97
![Page 98: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/98.jpg)
Cloud and SOA
• SOA is an approach to architecture that is intended to promote flexibility and scalability.
• SOA is defined by what a service is. Services are defined by the following characteristics
• ● Explicit, implementation-independent interfaces• ● Loosely bound• ● Invoked through communication protocol• ● encapsulate reusable business functions
05/02/23 98
![Page 99: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/99.jpg)
SOA ARCHITECTURE
• Cloud Infrastructure has many service components.
• Services can be divided into four domains• Application Services• Information Services• Common IT services• Infrastructure Services
05/02/23 99
![Page 100: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/100.jpg)
Cloud and SOA-SOA Life Cycle
• SOA lifecycle resembles “traditional” application lifecycle, but introduces new terminology.
• SOA in terms of life cycle requires a start in the SOA model Phase by gathering business requirement and designing their business processes.
• Once they have been optimized the business processes, they implement it by combining new and existing services.
• These assets are then deployed into a secure and integrated environment for integrating people , processes and information
05/02/23
100
![Page 101: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/101.jpg)
SOA based Cloud Infrastructure Steps
• Enterprises that intend to harness cloud computing must consider the following steps
• ● Analysis and Strategy• ● Planning• ● Implementation• ● Value-driven(Feedback)
05/02/23 101
![Page 102: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/102.jpg)
Cloud Computing
And Management
![Page 103: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/103.jpg)
Cloud Computing
Internet-based computing, where different services(servers, storage and applications) are delivered to an organization's computers and devices through the Internet.
![Page 104: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/104.jpg)
How Cloud Computing Works ??
Clouds use a network layer to connect users’ end point devices, like computers or smart phones, to resources that are centralized in a data centre.
Users access the data centre via a company network or the internet or both. Clouds can also be accessed from any location, allowing mobile workers to access their business systems on demand.
![Page 105: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/105.jpg)
![Page 106: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/106.jpg)
Cloud Management
Management of cloud computing products and services.
Software and technologies designed for operating and monitoring applications, data and services residing in the cloud.
![Page 107: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/107.jpg)
![Page 108: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/108.jpg)
Cloud Computing Services
Software as a Service(SaaS) Platform as a service(PaaS) Infrastructure as a Service(IaaS)
![Page 109: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/109.jpg)
Cloud Computing Deployment Models
Public (Services provided to general public)
Private (for single organization or any third party,maintenace cost is high)
Hybrid (mix of public and private cloud services,gives businesses greater flexibility and more data depolyment options)
![Page 110: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/110.jpg)
Benefits of Cloud Management
Global management Remote office and distributed storage management Information Access for disaster recovery Cost reduction Real time reporting Easy Upgrades Encrypted information Compliance management Ease of implementation
![Page 111: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/111.jpg)
What is Virtualization?
• Multiple OSes on a single machine– Giving an illusion that each OS is running on real HW– Virtual Machine Monitor (VMM)
• Another layer of kernel to virtualize multiple OSes• Also called “hypervisor”
– An OS as a supervisor is no more HW-dictator!
111/30
![Page 112: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/112.jpg)
05/02/23 112
![Page 113: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/113.jpg)
Why Virtualization? (2/6)
• Flexible VM relocation– “Live VM migration”
• Flexible VM relocation with near-zero downtime– Flexible load balancing
VMVM
VM
CPU
CPU
CPU
CPU
113/30
![Page 114: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/114.jpg)
Why Virtualization? (3/6)
• Flexible VM relocation– “Live VM migration”
• Flexible VM relocation with near-zero downtime– High availability VM
SW or HW maintenance(upgrade or fix)
114/30
![Page 115: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/115.jpg)
Why Virtualization? (6/6)
• Other benefits– Strong security monitoring
• Security monitoring outside OSes– Ease of deployment
• Virtual appliance– A bundle of OS and applications
– Flexible testing and debugging• Building distributed environments on a single machine• Kernel development and debugging• VM-based recording and replaying
115/30
![Page 116: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/116.jpg)
Virtualization & Cloud Computing
• Virtualized data centersVirtualization 1.x: Near termVirtualization 2.0: EmergingVirtualization 3.0: Future
Virtualization 3.0The fully virtualized datacenterfor cloud services
2013+
Virtualization 1.x
Virtualization 2.0
2009
출처 : IDC 2010 report116/30
![Page 117: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/117.jpg)
IBM – Cloud Transformation
Bluemix is a cloud platform as a service (PaaS) developed by IBM for building, running, and managing apps and services.
SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world
![Page 118: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/118.jpg)
Case Study
Need:
A company wanted to help diabetes patients more easily by sharing accurate, up-to-date medical information with physicians .
![Page 119: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/119.jpg)
SolutionWorking with IBM,the company created
a mobile app, supported by IBM Bluemix and
SoftLayer technologies, that captures and aggregates data directly from other medical devices and health tools.
![Page 120: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/120.jpg)
Benefit
The virtualized IBM architecture cuts ongoing operational costs by 30 percent with a flexible platform, while physicians and diabetics have clearer insight into patient health, encouraging better care options.
![Page 121: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/121.jpg)
yy
• ggf
![Page 122: Cloud computing](https://reader035.fdocuments.us/reader035/viewer/2022070519/58f2a9031a28ab50718b45ad/html5/thumbnails/122.jpg)
yy
• ggf