Cloud Unit II

download Cloud Unit II

of 25

Transcript of Cloud Unit II

  • 7/30/2019 Cloud Unit II

    1/25

    by

    B. Hari Prasad, Asst.Prof,CSE Dept. Faculty

    Gopallapuram, Renigunta-Srikalahasti road, Tirupati

  • 7/30/2019 Cloud Unit II

    2/25

    Cloud Computing

  • 7/30/2019 Cloud Unit II

    3/25

    Meaning of the terms cloud and cloud computing

    Cloud based service offerings

    Grid Computing vs Cloud computing

    Benefits of Cloud model

    Limitations

    Legal Issues

    Key Characteristics of Cloud Computing

    Challenges for the cloud

    The evolution of Cloud Computing

  • 7/30/2019 Cloud Unit II

    4/25

    What is Cloud and Cloud Computing

    The word cloud is used as a metaphor for the Internet

    Cloud-like shape to denote a network on telephony schematics and later

    to depict the Internet in computer network diagrams

    The cloud symbol was used to represent the Internet as early as 1994.

    Cloud computing is the use of delivering

    hosted services over the internet.

    Information is provided to the computers

    involved on demand

  • 7/30/2019 Cloud Unit II

    5/25

    The cloud can manage multiple

    infrastructures and ties all resources

    needed together and will give access toservices when needed which prevents

    services from running when they arent

    needed which can save valuable

    resources.

    Many cloud computing infrastructures are

    data centers that deliver the different on

    demand services

    Many companies are nowinvesting in cloud computing and research

    groups are researching new ways to put it

    to good use. Some experts say cloud

    computing is the way of the future and

    predict that it will be widely used in the

    near future

  • 7/30/2019 Cloud Unit II

    6/25

    History of Cloud Computing

    Cloud computing first came into concept back in the 1960s - John

    McCarthy proposed that computers may some day be organized in amethod that would involve it acting as a public utility.

    Telecommunication companies began offering VPN (Virtual Private

    Network) services during the 90s, low cost, point-to-point data circuits that

    provided their services.

    The cloud symbol represents the difference between the users and

    providers responsibilities.

    In 2007, major companies such as IBM, Google, Amazon and different

    school universities created a huge cloud computing research projectwhich allowed many to see the prospects of cloud computing and the

    positive effects it could have on IT users and those who sell IT services.

    Cloud computing has been predicted to be put to use by nearly 80

    percent of fortune 500 companies by the year 2012 and will continue to

    grow in use as the years go by.

  • 7/30/2019 Cloud Unit II

    7/25

    Cloud Based Service Offerings

    Cloud computing may be viewed as a resource available as a

    service for virtual data centers, but cloud computing and virtual datacenters are not the same.

    Amazon.com has played a vital role in the development of cloud

    computing.

    Amazon S3 provides a simple web services interface that can be used

    to store and retrieve any amount of data, at any time, from anywhere

    on the web with the same highly scalable, reliable, fast, inexpensive

    data storage infrastructure that Amazon uses to run its own global

    network of web sites

    Cloud computing providers offer their services according to three

    fundamental models: Infrastructure as a service (IaaS),

    Platform as a service (PaaS),

    Software as a service (SaaS)

  • 7/30/2019 Cloud Unit II

    8/25

    SaaS is a type of cloud computing that

    delivers applications through a browser

    to thousands of customers using a

    multiuser architecture

    Cloud providers install and operate

    application software in the cloud and cloud

    users access the software from cloud

    clients.

    Software as a service (SaaS)

    Salesforce.com is by far the best-known example of SaaS computing

    among enterprise applications. Salesforce.com was founded in 1999

    by former Oracle executive Marc Benioff, delivering enterprise

    applications via a simple web site

    Examples of SaaS include: Google Apps, Microsoft Office 365, and Onlive.

    http://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Onlivehttp://en.wikipedia.org/wiki/Onlivehttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clients
  • 7/30/2019 Cloud Unit II

    9/25

  • 7/30/2019 Cloud Unit II

    10/25

    Cloud providers deliver a computing platform typically including

    operating system, programming language execution environment,

    database, and web server. Application developers can develop and run

    their software solutions on a cloud platform without the cost and

    complexity of buying and managing the underlying hardware and

    software layers.

    Platform as a service (PaaS)

    PaaS is closely related to SaaS but delivers a platform from which

    to work rather than an application to work with

    Delivers development environments to programmers, analysts, and

    software engineers as a service

    Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry,

    Heroku, Force.com, EngineYard, Mendix, Google App Engine, Windows

    Azure Compute and OrangeScape.

    http://en.wikipedia.org/wiki/Herokuhttp://en.wikipedia.org/wiki/Engine_Yardhttp://en.wikipedia.org/wiki/Mendixhttp://en.wikipedia.org/wiki/OrangeScapehttp://en.wikipedia.org/wiki/OrangeScapehttp://en.wikipedia.org/wiki/Mendixhttp://en.wikipedia.org/wiki/Engine_Yardhttp://en.wikipedia.org/wiki/Heroku
  • 7/30/2019 Cloud Unit II

    11/25

  • 7/30/2019 Cloud Unit II

    12/25

    The Google App Engine environment includes the following features

    Dynamic web serving, with full support for common web technologies

    Persistent storage with queries, sorting, and transactions

    Automatic scaling and load balancing

    APIs for authenticating users and sending email using Google

    Accounts

    A fully featured local development environment that simulates

    Google App Engine on your computer

  • 7/30/2019 Cloud Unit II

    13/25

    IaaS providers offer computers, as physical or more often as virtualmachines, and other resources. The virtual machines are run as guests

    by a hypervisor, such as Xen orKVM. Pools of hypervisors within the

    cloud operational support system support large numbers of virtual

    machines and the ability to scale services up and down according to

    customers' varying requirements

    cloud users install operating system images and their application

    software on the cloud infrastructure. In this model, it is the cloud user

    who is responsible for patching and maintaining the operating systems

    and application software.

    Examples of IaaS providers include Amazon CloudFormation,Amazon

    EC2, Windows Azure Virtual Machines, DynDNS, Google Compute

    Engine, HP Cloud, Joyent, Rackspace Cloud, ReadySpace Cloud

    Services, and Terremark.

    Infrastructure as a service (IaaS)

    http://en.wikipedia.org/wiki/Hypervisorhttp://en.wikipedia.org/wiki/Xenhttp://en.wikipedia.org/wiki/Kernel-based_Virtual_Machinehttp://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Azure_Services_Platformhttp://en.wikipedia.org/wiki/DynDNShttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/HP_Cloud_Serviceshttp://en.wikipedia.org/wiki/Joyenthttp://en.wikipedia.org/wiki/Rackspace_Cloudhttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/Terremarkhttp://en.wikipedia.org/wiki/Terremarkhttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/Rackspace_Cloudhttp://en.wikipedia.org/wiki/Joyenthttp://en.wikipedia.org/wiki/HP_Cloud_Serviceshttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/DynDNShttp://en.wikipedia.org/wiki/Azure_Services_Platformhttp://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Kernel-based_Virtual_Machinehttp://en.wikipedia.org/wiki/Xenhttp://en.wikipedia.org/wiki/Hypervisor
  • 7/30/2019 Cloud Unit II

    14/25

    Is typically an information technology (IT) services provider that

    manages and assumes responsibility for providing a defined set of

    services to their clients either proactively or as they (not the client)

    determine that the services are needed.

    A managed services provider (MSP)

    http://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Information_technology
  • 7/30/2019 Cloud Unit II

    15/25

    Grid Computing vs Cloud computing

    Grid computing is often confused with cloud computing.

    Cloud computing evolves from grid computing and provides on-demandresource provisioning

    Both computing types involve multitenancy and multitask,

    Cloud computing and grid computing are scalable

    The only differentiating factor between the two is

    In grid computing, a single big task is split into multiple smaller tasks

    which are further distributed to different computing machines

    In cloud computing architecture is intended to enable users to use difference

    services without the need for investment in the underlying architecture

    Grid computing requires the use of software that can divide and farm out

    pieces of a program as one large system image to several thousand

    computers

    In Cloud the consumer does not own the infrastructure, software, or platform

    in the cloud. He has lower upfront costs, capital expenses, and operating

    expenses.

  • 7/30/2019 Cloud Unit II

    16/25

    Benefits of cloud model

    Removal / reduction of capital expenditure

    Reduced administration costs

    Improved resource utilisation

    Scalability on demand

    Quick and easy implementation

    Quality of service Guaranteed uptime, SLAs

    Anywhere Access

    Disaster recovery / backup

    There are many reasons why organisations of all sizes and types are

    adopting this model of IT

  • 7/30/2019 Cloud Unit II

    17/25

    Limitations of Cloud Computing

    Network connection

    Control of data security

    Additional costs

    Peripherals

    Generic

    Integration

  • 7/30/2019 Cloud Unit II

    18/25

    Key Characteristics of Cloud Computing

    Cloud computing exhibits the following key characteristics:

    Ability.

    Application programming interface (API)

    Cost

    Device and location independence

    VirtualizationMultitenancy :

    Centralization

    Peak-load capacity

    Utilization and efficiency]

    Reliability

    Scalability and elasticity

    Performance

    Security

    Maintenance

    http://en.wikipedia.org/wiki/Cloud_computinghttp://en.wikipedia.org/wiki/Cloud_computing
  • 7/30/2019 Cloud Unit II

    19/25

    Legal Issues

    StatesEuropean Union Safe Harbor Act provides a seven-point framework of

    requirements for U.S. companies that may use data from other parts of the world,namely, the European Union

    Notify individuals about the purposes for which information is collected

    and used.

    Give individuals the choice of whether their information can bedisclosed to a third party.

    Ensure that if it transfers personal information to a third party,that third

    party also provides the same level of privacy protection.

    Allow individuals access to their personal information.

    Take reasonable security precautions to protect collected data from loss,

    misuse, or disclosure.

    Take reasonable steps to ensure the integrity of the data collected.;

    Have in place an adequate enforcement mechanism.

  • 7/30/2019 Cloud Unit II

    20/25

    Major service providers such as Amazon Web Services cater to a global

    marketplace, typically the United States, Japan, and the European Union,

    by deploying local infrastructure at those locales and allowing customers to

    select availability zones.

    The USA PATRIOT (Uniting and Strengthening America by Providing

    Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001

    (Public Law P.L. 107-56))Act, more commonly known as the Patriot Act, is a

    controversial Act of Congress thatU.S. President George W. Bush signedinto law on October 26, 2001

    The Electronic Communications Privacy Acts Stored Communications

    Act is defined in the U.S. Code, Title 18, Part I, Chapter 121, 2701,

    Unlawful Access to Stored Communications.

  • 7/30/2019 Cloud Unit II

    21/25

    Before entrusting your data to a cloud provider you need to have a veryclose read of their terms and conditions , and that you cannot eliminate

    all the risks you are responsible for

    Terms and conditions

    The terms and conditions are non-negotiable, and not necessarily

    favourable to the customer

    The Data Protection Principles

    The Data Protection Act is based on eight legally-binding Principles. Of

    these two are particularly relevant to cloud computing:

    Principle 7, which says you must have appropriate security, andPrinciple 8, which controls transfers of data abroad

    All the Principles are aimed firstly at preventing harm to individuals and

    secondly at ensuring that they are treated fairly whenever their data is

    used.

    http://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspxhttp://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspxhttp://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspxhttp://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspx
  • 7/30/2019 Cloud Unit II

    22/25

    Security is one of the most important safeguards from harm. The Principle

    says that you must take appropriate steps to prevent:

    Unauthorised access

    Accidental loss or damage

    Security

    Cloud providers typically stress the degree to which they take security

    seriously, and it is often claimed that their security is likely to be considerably

    tighter than in most small organisations. This is probably true, but cloud

    providers are also a more tempting target, and breaches undoubtedly do

    occur.

    Organisations that have close dealings with government agencies may also

    want to review the cloud providers offering against the HMG Security

    Framework, which is substantially based on ISO 27000.

    Many US organisations rely on SAS (Statement on Auditing Standards) 70

    compliance. This is not a security standard but an auditing process which

    checks that the company is meeting its own stated objectives.

  • 7/30/2019 Cloud Unit II

    23/25

    Transfers abroad

    Under Principle 8, transfers of data outside the European Economic Areaare allowed if:

    The jurisdiction it is going to has an acceptable law; or

    The recipient in the USA is signed up to Safe Harbor; or

    One of a set of conditions is met.

    Transfers include storing data on a cloud providers systemabroad, even if the data is not intended to be used anywhere outside the

    UK.

    Almost all European countries are OK, one way or another, but

    almost no others. Australia and Hong Kong, for example, have Data

    Protection laws but these are not deemed adequate

  • 7/30/2019 Cloud Unit II

    24/25

    Challenges for the cloud

    The biggest challenges these companies face are secure datastorage, highspeed access to the Internet, and standardization.

    Storing large amounts of data that is oriented around user privacy,

    identity, and application-specific preferences in centralized locations

    raises many concerns about data protection.

    Another challenge to the cloud computing model is the fact that

    broadband. Cloud computing is untenable without highspeed,

    connections (both wired and wireless). Unless broadband speeds

    are available, cloud computing services cannot be made widely

    accessible.

    technical standards used for implementation of the various computer

    systems and applications necessary to make cloud computing work

    have still not been completely defined, publicly reviewed, and ratified

    by an oversight body.

  • 7/30/2019 Cloud Unit II

    25/25