Cloud Unit II
-
Upload
bhariprasadmsc -
Category
Documents
-
view
221 -
download
0
Transcript of Cloud Unit II
-
7/30/2019 Cloud Unit II
1/25
by
B. Hari Prasad, Asst.Prof,CSE Dept. Faculty
Gopallapuram, Renigunta-Srikalahasti road, Tirupati
-
7/30/2019 Cloud Unit II
2/25
Cloud Computing
-
7/30/2019 Cloud Unit II
3/25
Meaning of the terms cloud and cloud computing
Cloud based service offerings
Grid Computing vs Cloud computing
Benefits of Cloud model
Limitations
Legal Issues
Key Characteristics of Cloud Computing
Challenges for the cloud
The evolution of Cloud Computing
-
7/30/2019 Cloud Unit II
4/25
What is Cloud and Cloud Computing
The word cloud is used as a metaphor for the Internet
Cloud-like shape to denote a network on telephony schematics and later
to depict the Internet in computer network diagrams
The cloud symbol was used to represent the Internet as early as 1994.
Cloud computing is the use of delivering
hosted services over the internet.
Information is provided to the computers
involved on demand
-
7/30/2019 Cloud Unit II
5/25
The cloud can manage multiple
infrastructures and ties all resources
needed together and will give access toservices when needed which prevents
services from running when they arent
needed which can save valuable
resources.
Many cloud computing infrastructures are
data centers that deliver the different on
demand services
Many companies are nowinvesting in cloud computing and research
groups are researching new ways to put it
to good use. Some experts say cloud
computing is the way of the future and
predict that it will be widely used in the
near future
-
7/30/2019 Cloud Unit II
6/25
History of Cloud Computing
Cloud computing first came into concept back in the 1960s - John
McCarthy proposed that computers may some day be organized in amethod that would involve it acting as a public utility.
Telecommunication companies began offering VPN (Virtual Private
Network) services during the 90s, low cost, point-to-point data circuits that
provided their services.
The cloud symbol represents the difference between the users and
providers responsibilities.
In 2007, major companies such as IBM, Google, Amazon and different
school universities created a huge cloud computing research projectwhich allowed many to see the prospects of cloud computing and the
positive effects it could have on IT users and those who sell IT services.
Cloud computing has been predicted to be put to use by nearly 80
percent of fortune 500 companies by the year 2012 and will continue to
grow in use as the years go by.
-
7/30/2019 Cloud Unit II
7/25
Cloud Based Service Offerings
Cloud computing may be viewed as a resource available as a
service for virtual data centers, but cloud computing and virtual datacenters are not the same.
Amazon.com has played a vital role in the development of cloud
computing.
Amazon S3 provides a simple web services interface that can be used
to store and retrieve any amount of data, at any time, from anywhere
on the web with the same highly scalable, reliable, fast, inexpensive
data storage infrastructure that Amazon uses to run its own global
network of web sites
Cloud computing providers offer their services according to three
fundamental models: Infrastructure as a service (IaaS),
Platform as a service (PaaS),
Software as a service (SaaS)
-
7/30/2019 Cloud Unit II
8/25
SaaS is a type of cloud computing that
delivers applications through a browser
to thousands of customers using a
multiuser architecture
Cloud providers install and operate
application software in the cloud and cloud
users access the software from cloud
clients.
Software as a service (SaaS)
Salesforce.com is by far the best-known example of SaaS computing
among enterprise applications. Salesforce.com was founded in 1999
by former Oracle executive Marc Benioff, delivering enterprise
applications via a simple web site
Examples of SaaS include: Google Apps, Microsoft Office 365, and Onlive.
http://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Onlivehttp://en.wikipedia.org/wiki/Onlivehttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clients -
7/30/2019 Cloud Unit II
9/25
-
7/30/2019 Cloud Unit II
10/25
Cloud providers deliver a computing platform typically including
operating system, programming language execution environment,
database, and web server. Application developers can develop and run
their software solutions on a cloud platform without the cost and
complexity of buying and managing the underlying hardware and
software layers.
Platform as a service (PaaS)
PaaS is closely related to SaaS but delivers a platform from which
to work rather than an application to work with
Delivers development environments to programmers, analysts, and
software engineers as a service
Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry,
Heroku, Force.com, EngineYard, Mendix, Google App Engine, Windows
Azure Compute and OrangeScape.
http://en.wikipedia.org/wiki/Herokuhttp://en.wikipedia.org/wiki/Engine_Yardhttp://en.wikipedia.org/wiki/Mendixhttp://en.wikipedia.org/wiki/OrangeScapehttp://en.wikipedia.org/wiki/OrangeScapehttp://en.wikipedia.org/wiki/Mendixhttp://en.wikipedia.org/wiki/Engine_Yardhttp://en.wikipedia.org/wiki/Heroku -
7/30/2019 Cloud Unit II
11/25
-
7/30/2019 Cloud Unit II
12/25
The Google App Engine environment includes the following features
Dynamic web serving, with full support for common web technologies
Persistent storage with queries, sorting, and transactions
Automatic scaling and load balancing
APIs for authenticating users and sending email using Google
Accounts
A fully featured local development environment that simulates
Google App Engine on your computer
-
7/30/2019 Cloud Unit II
13/25
IaaS providers offer computers, as physical or more often as virtualmachines, and other resources. The virtual machines are run as guests
by a hypervisor, such as Xen orKVM. Pools of hypervisors within the
cloud operational support system support large numbers of virtual
machines and the ability to scale services up and down according to
customers' varying requirements
cloud users install operating system images and their application
software on the cloud infrastructure. In this model, it is the cloud user
who is responsible for patching and maintaining the operating systems
and application software.
Examples of IaaS providers include Amazon CloudFormation,Amazon
EC2, Windows Azure Virtual Machines, DynDNS, Google Compute
Engine, HP Cloud, Joyent, Rackspace Cloud, ReadySpace Cloud
Services, and Terremark.
Infrastructure as a service (IaaS)
http://en.wikipedia.org/wiki/Hypervisorhttp://en.wikipedia.org/wiki/Xenhttp://en.wikipedia.org/wiki/Kernel-based_Virtual_Machinehttp://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Azure_Services_Platformhttp://en.wikipedia.org/wiki/DynDNShttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/HP_Cloud_Serviceshttp://en.wikipedia.org/wiki/Joyenthttp://en.wikipedia.org/wiki/Rackspace_Cloudhttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/Terremarkhttp://en.wikipedia.org/wiki/Terremarkhttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/ReadySpace_Cloud_Serviceshttp://en.wikipedia.org/wiki/Rackspace_Cloudhttp://en.wikipedia.org/wiki/Joyenthttp://en.wikipedia.org/wiki/HP_Cloud_Serviceshttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/Google_Compute_Enginehttp://en.wikipedia.org/wiki/DynDNShttp://en.wikipedia.org/wiki/Azure_Services_Platformhttp://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Amazon_EC2http://en.wikipedia.org/wiki/Kernel-based_Virtual_Machinehttp://en.wikipedia.org/wiki/Xenhttp://en.wikipedia.org/wiki/Hypervisor -
7/30/2019 Cloud Unit II
14/25
Is typically an information technology (IT) services provider that
manages and assumes responsibility for providing a defined set of
services to their clients either proactively or as they (not the client)
determine that the services are needed.
A managed services provider (MSP)
http://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Information_technology -
7/30/2019 Cloud Unit II
15/25
Grid Computing vs Cloud computing
Grid computing is often confused with cloud computing.
Cloud computing evolves from grid computing and provides on-demandresource provisioning
Both computing types involve multitenancy and multitask,
Cloud computing and grid computing are scalable
The only differentiating factor between the two is
In grid computing, a single big task is split into multiple smaller tasks
which are further distributed to different computing machines
In cloud computing architecture is intended to enable users to use difference
services without the need for investment in the underlying architecture
Grid computing requires the use of software that can divide and farm out
pieces of a program as one large system image to several thousand
computers
In Cloud the consumer does not own the infrastructure, software, or platform
in the cloud. He has lower upfront costs, capital expenses, and operating
expenses.
-
7/30/2019 Cloud Unit II
16/25
Benefits of cloud model
Removal / reduction of capital expenditure
Reduced administration costs
Improved resource utilisation
Scalability on demand
Quick and easy implementation
Quality of service Guaranteed uptime, SLAs
Anywhere Access
Disaster recovery / backup
There are many reasons why organisations of all sizes and types are
adopting this model of IT
-
7/30/2019 Cloud Unit II
17/25
Limitations of Cloud Computing
Network connection
Control of data security
Additional costs
Peripherals
Generic
Integration
-
7/30/2019 Cloud Unit II
18/25
Key Characteristics of Cloud Computing
Cloud computing exhibits the following key characteristics:
Ability.
Application programming interface (API)
Cost
Device and location independence
VirtualizationMultitenancy :
Centralization
Peak-load capacity
Utilization and efficiency]
Reliability
Scalability and elasticity
Performance
Security
Maintenance
http://en.wikipedia.org/wiki/Cloud_computinghttp://en.wikipedia.org/wiki/Cloud_computing -
7/30/2019 Cloud Unit II
19/25
Legal Issues
StatesEuropean Union Safe Harbor Act provides a seven-point framework of
requirements for U.S. companies that may use data from other parts of the world,namely, the European Union
Notify individuals about the purposes for which information is collected
and used.
Give individuals the choice of whether their information can bedisclosed to a third party.
Ensure that if it transfers personal information to a third party,that third
party also provides the same level of privacy protection.
Allow individuals access to their personal information.
Take reasonable security precautions to protect collected data from loss,
misuse, or disclosure.
Take reasonable steps to ensure the integrity of the data collected.;
Have in place an adequate enforcement mechanism.
-
7/30/2019 Cloud Unit II
20/25
Major service providers such as Amazon Web Services cater to a global
marketplace, typically the United States, Japan, and the European Union,
by deploying local infrastructure at those locales and allowing customers to
select availability zones.
The USA PATRIOT (Uniting and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
(Public Law P.L. 107-56))Act, more commonly known as the Patriot Act, is a
controversial Act of Congress thatU.S. President George W. Bush signedinto law on October 26, 2001
The Electronic Communications Privacy Acts Stored Communications
Act is defined in the U.S. Code, Title 18, Part I, Chapter 121, 2701,
Unlawful Access to Stored Communications.
-
7/30/2019 Cloud Unit II
21/25
Before entrusting your data to a cloud provider you need to have a veryclose read of their terms and conditions , and that you cannot eliminate
all the risks you are responsible for
Terms and conditions
The terms and conditions are non-negotiable, and not necessarily
favourable to the customer
The Data Protection Principles
The Data Protection Act is based on eight legally-binding Principles. Of
these two are particularly relevant to cloud computing:
Principle 7, which says you must have appropriate security, andPrinciple 8, which controls transfers of data abroad
All the Principles are aimed firstly at preventing harm to individuals and
secondly at ensuring that they are treated fairly whenever their data is
used.
http://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspxhttp://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspxhttp://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspxhttp://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspx -
7/30/2019 Cloud Unit II
22/25
Security is one of the most important safeguards from harm. The Principle
says that you must take appropriate steps to prevent:
Unauthorised access
Accidental loss or damage
Security
Cloud providers typically stress the degree to which they take security
seriously, and it is often claimed that their security is likely to be considerably
tighter than in most small organisations. This is probably true, but cloud
providers are also a more tempting target, and breaches undoubtedly do
occur.
Organisations that have close dealings with government agencies may also
want to review the cloud providers offering against the HMG Security
Framework, which is substantially based on ISO 27000.
Many US organisations rely on SAS (Statement on Auditing Standards) 70
compliance. This is not a security standard but an auditing process which
checks that the company is meeting its own stated objectives.
-
7/30/2019 Cloud Unit II
23/25
Transfers abroad
Under Principle 8, transfers of data outside the European Economic Areaare allowed if:
The jurisdiction it is going to has an acceptable law; or
The recipient in the USA is signed up to Safe Harbor; or
One of a set of conditions is met.
Transfers include storing data on a cloud providers systemabroad, even if the data is not intended to be used anywhere outside the
UK.
Almost all European countries are OK, one way or another, but
almost no others. Australia and Hong Kong, for example, have Data
Protection laws but these are not deemed adequate
-
7/30/2019 Cloud Unit II
24/25
Challenges for the cloud
The biggest challenges these companies face are secure datastorage, highspeed access to the Internet, and standardization.
Storing large amounts of data that is oriented around user privacy,
identity, and application-specific preferences in centralized locations
raises many concerns about data protection.
Another challenge to the cloud computing model is the fact that
broadband. Cloud computing is untenable without highspeed,
connections (both wired and wireless). Unless broadband speeds
are available, cloud computing services cannot be made widely
accessible.
technical standards used for implementation of the various computer
systems and applications necessary to make cloud computing work
have still not been completely defined, publicly reviewed, and ratified
by an oversight body.
-
7/30/2019 Cloud Unit II
25/25