Virtualization for University Students
Virtualization for University Students
Virtualization
CHAPTER 3
*******************************************"*******""**************"***************** 3-17
3.9 Questions.
Descriptive *************************** *********************************************************************** * um .3-17
Chapter Ends.. 3-17
1 r
Cloud Computing (SPPU-SEM 7-E&TC) (Virtualization)..Page no. (3
Virtualization
VM
Physical Hardware
O Hypervisor
VM
host machine, which could be a single computer or a network of servers that are all connected to each
other. This allows user limit the number of servers that are active, use less power, and manage
resources.
(2) Isolation: The self-contained VMs that come with virtualization software give guest users (a term that
includes not only people but also applications, operating systems, and devices) a separate online
environment. This separation keeps private information safe while allowing guests stay connected.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) 5Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC) (Virtuallz.atlon)..Poge no. (3-3)
(3) Availability: Virtualization soflwaro offors various
eharactoristics not available with physical servOrs
that boost uptimo, avnilability, fault toloraneo, nnd more, hneo nssinting usors in avoiding downtime
that impedes usor productivity and raisos Bocurity risks.
(4) Aggrogation: Virtualization allows multiplo dovicos to sharoa ainglo mnchine's resources, but t can
also be used to intograte multiplo dovicos into a singlo, poworful hoBt.
Aggregation nocessitates clusuer
management software, which connects n numbor
of idontienl computora or sorvers to form a unified
resource center.
(5) Relinbility: Currently, virtualizntion tochnologios provido
continuous uptime by automated load
balancing, which runs multiple sorvors on
distinct host machinos to provont disruptions. Consequently,
hardware failures are a minor inconvenionco. If downtimo is
a primo concorn, you may need to invest in
backup hardware.
3. Cloud computing is high scalable. Virtualization is low scalable i.e., Virtual machine
configuration limits its scalability.
8. Cloud computing requires many dedicated In virtualization, single dedicated hardware can
hardware. do a great job in it.
9. Cloud computing provides unlimited| Storage space depends on physical server capacity
storage space. in virtualization.
(SPPU-New Syllabus w.e.f academic year 22-23)MP7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(Virtualization)..Pago no.
Cloud Computing (SPPU:SEM 7-E&TC) (3-4)
10. Cloud computing is of two typos Public Virtualization is of two typOs Hardware
cloud and Private cloud. virtualization nnd Application virtualization.
14 Easy to integrate existing solutions, | Easily integrate with public and private clouds,
wvith
many providers support integrations and IoT devices, and databases. If integrating with
to unify
Ais. May require a data integration legacy equipment, integration software
solution to prevent data silos. data is needed
resources to groups of users for a variety | specific users for a specifie purpose
of purposes
It is the abstraction of computing resources from the software that uses cloud resources.
It involves embedding virtual machine software into the server's hardware components.
That software is called the hypervisor. The hypervisor manages the shared physical hardware
resources between the guest OS & the host Os.
The abstracted hardware is represented as actual hardware.
Virtualization means abstraction & hardware virtualization is achieved by abstracting the physieal
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventur
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualzation)..Page no. (3-5)
After hardware virtualization is done,
different operating systems can be installed, and vanou
applications can run on it.
Hardware virtualization, when done for
server platforms, is also called server virtualization.
.Hardware virtualization is of threo kinds:
(i) Full Virtualization: Hore,
the hardware architecture is completely simulated. Uuest
software doesn't need any modification
to run any applications.
(ii) Emulation Virtualization : Here, the virtual
machine simulates the hardware& 13
independent. Furthermore, the guest
OS doesn't require any modification.
Gii) Para-Virtualization: Here, the hardware is not simulated; instead,
its isolated system. the guest software runs
2. Software Virtualization
Software virtualization is a technique that
allows one computer server to work with more than one
virtual system.
The primary function of software
virtualization is to develop virtual Software and make the woT
easier.
It is capable of abstracting the software
installation procedure and building virtual software
installations.
Software virtualization will build a virtual environment
and allows the user to use mnore than one
Operating System.
Software virtualization is of three kinds:
i) OS Virtualization: In OS Virtualization, more than the Operating system wants to woTk
individually to complete the task without affecting others. Thus, a particular Operating
system can perform its specified job.
5. Storage Virtualization
storage that is available in various devices and
Storage virtualization basically combines/pools the
keeps it as single storage.
software and aggregates them to
Identification of the available storage is done by leveraging the
use it in a virtual system/environment.
requests. from any virtualphysical
The software actually constantly monitors the various I/0
intercepts them and sends it to the appropriate location where the combined
system, and it
storages are maintained in a virtual environment.
for any recovery or backup or
This technique of storage virtualization helps the administrator
time than the
archival of data in an effective and efficient manner by taking comparatively less
usual.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-ESTC) (Virtualizatlon)....Pagono,
(3-1h
Virtualization.
GUOst OSS
QuostOS VM
VM
Hardwaro
Guest OS Guest OS
VM VM
Host os
Hardware
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventue
Cloud Computing (SPPU-SEM 7-E&TO)
(Virtualization)...Page no. (3-11)
3.5.3 Implementation Levels of Virtuallzation
Appllcatlon Level
JVM/.NET CLA
Library Level
WINE/vCUDA
(SPPU-New syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC) (Virtualization)...Page no.
(3-
IBAM had first implemented this on the IBM VM/370 back in 1960. It is more usable for cloud-bas
intrastructure. Xen hypervisors are using HAL to run Linux and other OS on x86 based machines
3. Operating System Level
4. Library Level
Programs written in high-level languages and compiled for an application-level virtual machine can
run fluently here.
(SPPU-New Syilabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualizatlon)....Pago no. (3-13)
3.6 VIRTUALIZATION SOFTWARE
2. VMware Fusion
This software is for Mac users where one can run Windows, Linux, Unix and any other operating
system on their Mac using this software.
VMware Fusion also supports cloud-based platforms for virtualization.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(Virtualization)..Page no. (3.1a
Cloud Computing (SPPU-SEM 7-E&TC)
=
integration of different development toola
The VMware fusion pro version provides the facility of
with it.
demonstration for diferent software
res
This software is very simple to use and can support roal-time
and applications.
a rollback point wlhere can save the last proper working versions of
the O and can g
It also
has
back to it whenever required.
proper
The only drawback as of now for this tool is that the drag and drop functionality is not and
needs improvement.
3. Parallels Desktop
This software is also for the Mac users to use windows and another operating system.
This supports windows 10 and Mac OS High Sierra
They provide lots of different tools which are very useful for daily day to day tasks. r
The view for this software is very good and it requires no reboot while installation.
The performance for the application inside the virtual OS is also very fast and easily usable without
any lag.
4. Virtual Box
This virtual box comes from Oracle and the best part of them is its very user friendly.
This software is used in windows to run different operating systems:
At a time, it can host up to 4 operating system.
It supports drag and drops feature and the window can be minimized and resized.
5. VMware Workstation
6. QEMU d ei irl
This software is used for hardware virtualization.
This is also an open-source free software.
a
There is no restriction for the host OS that means this software can run in mac as well as
windows system.
But the only con in this is it's not at all user-friendly. orogeut pei
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualization)..Page no. (3-15)
7. Windows Virtual PC
This software comes with the windows
operating system.
This is only for windows users
and it is very much user-friendly.
One can use the print option
from inside the virtual box
simultaneously. and can run multiple virtual macnines
--------
GQ Explain virtual clustering. Compare it with physical clustering
---------*-*** * ***
Virtual cluster is a many-to-one virtualization
technology, which can form a routing system from
multiple common devices connected through a switehing network, while performing the same as a
single logical router to all external appearances.
In cloud computing, a virtual cluster is a group of virtual machines (VMs) that are deployed as a single
logical unit. They share the same virtualization software and hardware, and they appear as a single
unit to the end-user.
Virtual clusters provide the ability to scale operations easily. You can add or remove VMs to meet
changing demands, and you can move VMs to optimize the use of hardware. You can leverage a virtual
clustering solution to reduce data center costs, increase efficiency, and increase scalability.
Clusters provide the computational power through the use of parallel programming, a technique for
coordinating the use of many processors for a single problem.
(SPPU-New Syllabus we.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualization).Pagono,(3-16
A cluster of virtual sorvera will bo used to hont the norvicos to Bupport high availability and ren
utilization.
Virtunl clustors also provido floxibility in adding moro servicos in tho futuro, vith minimal code and
configuration changos. An additional standby virtual cluster is also used.
Virtual clusters worlk by onhancing tho servor utilization.
Virtual machine clusters work by protocting tho physteal machino from any hardware and software
failures. When a physical nodo fails, the virtual machino can accoss another node, with no time lag. And
thus, virtual machine clustering provides a dynamic backup process.
2. Physical clusters are connected by network cables Virtual clusters are connected by a virtual
and are managed with a single system console. network and are managed with multiple user
consoles.
3. Physical clusters are created on different systems, Virtual clusters are created on a single system,
and they have different hardware. and they share the same virtualization
software and hardware.
Even though physical clusters are more reliable than virtual ones, VMs are more secure because they
are not linked to the hardware. Data security is an important issue for virtual elusters, and there are
several ways to secure data.
Virtual clusters are highly scalable, so you can add or remove VMs to meet changing demands, and you
can move VMs to optimize the use of hardware.
Virtual clusters are easy to manage and provide a higher level of flexibility.
Virtual clusters minimize dependencies on hardware and are more reliable during failover and failback
operat1ons.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualizatlon)...Pago no. (3-172
3.8 APPLICATIONS OF VIRTUALIZATION
Recent technologies have used virtualization to create portable workspaces on devices like iPods and
USB memory sticks.
bebulb q6
UNIT IV Service Oriented
CHAPTER 4
Architecture and
Cloud Security
Cloud Securlty: Cloud CIA security model (Confidentiality, Integrity and Availability), Cloud computing
security architecture, Service provider security issues, Cloud Security Issues and challenges, Security
issues in virtualization, Host Security, Data Security, Firewalls
**************************************************
4.5.2 Key Points to CSA Model. ************
***
4.5.3 Soparate Access to Data. ************************4s***** s*********************** ***
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications-A SACHIN SHAH Vent
Cloud Computing (SPPU-SEM 7-E&TC)
Sorvice Orientod Architecturo and Cloud Security)... Page no. (4)
Intemet3
Application
Service
Runtime Cloud
Back End
Storage
infrastructure
Architecture of cloud computing is the combination of both SOA (Service Oriented Architecture) and
EDA Event Driven Architecture)
(SPPU-New Syllabus we.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Compuling (SPPU-SEM 7-E&TC) (Servico Orlonted Architecture and Cloud Security)...Page no
infrastructure, management
Client infrastructure, application, service, runtime cloud, storage, ATA
1. Frontend
Frontend of the cloud architecture refers to the client side of cloud computing systern. Means
contains all the user interfaces and applications which are used by the client to access the cl
computing services/resources. For example, use of a web browser to access the cloud platform. I
contains client-side interfaces and applications that are required to access the cloud computing
platforms.
The front end includes web servers (including Chrome, Firefox, internet explorer, etc), thin & fat
clients, tablets, and mobile devices.
Client Infrastrueture Client Infrastructure is a part of the frontend component. It contains the
applications and user interfaces which are required to access the cloud platform.
In other words, it provides a GUI (Graphical User Interface) to interact vith the cloud.
2. Backend
Backend refers to the cloud itself which is used by the service provider. It contains the resources as
well as manages the resources and provides security mechanisms.
Along with this, it includes huge storage, virtual applications, virtual machines, traffic control
mechanisms, deployment models, etc.
Application
Application in backend refers to a software or platform to which client accesses. Means it provides the
service in backend as per the client requirement.
Service
Service in backend refers to the major three types of cloud-based services like SaaS, PaaS and laaS.
Also manages which type of service the user accesses.
Runtime Cloud
Runtime cloud in backend provides the execution and Runtime platform/environment to the Virtual
machine.
Storage
Storage in backend provides flexible and scalable storage service and management of stored data.
Infrastructure
Cloud Infrastructure in backend refers to the hardware and software components of cloud like i
includes servers, storage, network devices, virtualization software etc.
(SPPU-New Sylabus wef aademic year 22-23)NP7-129) Tech-Neo Publications.A SACHIN SHAH Vent
Cloud Computing (SPPU-SEM
7-E&TC)
CIOu
Sorvlco Orlonted Architecturo and Cloud Security)... Page no. (4-5)
Management
Management în bacKend relers to
management of backend components
runtime cloud, storage, inirastructure, and like application, serVie
other security mochanisms otc.
Security
Security in backend refers to
implementation of different
secure cloud resources, sy'stems, files, security mechanisms in the backend 10r
and infrastructure to ond-users.
Internet
Internet connection acts as the medium
or a bridge between frontend and
interaction and communication between backend and establishes the
frontend and backend.
.Benefits of Cloud Computing Architecture:
Makes overall cloud computing system
simpler.
Improves data processing requirements.
Helps in providing high security.
Makes it more modularized.
Results in better disaster recovery.
Gives good user accessibility.
Reduces IT operating costs.
Cloud Computing is the booming industry of the present time and will continue to grow
by many folds
in the near future.
Nowadays, it's really hard to find a safe, secure, and yet cost-effective place to store your data and
business-critical ideas. But, with the rise of cloud computing, this problem is vanishing exponentially.
Cloud provides us with a place where your data can not only be stored but can also be accessed easily
over the internet. Using Cloud Computing you can also host and manage your applications.
G Why we need cloud ComputingSolution
By using Cloud Computing Solution, we get various benefits, some of which are as follows
Improved software and hardware performance: Through cloud computing solution one can easily
make out what will be the best software and hardware specification for the better performance of the
application running on the cloud.
Flexibility and affordability: Cloud Computing provides its users with a wide variety of deployment
models and functions through which they can choose the best options for their applications. Cloud
services are much more affordable.
Inereased uptime and availability: It is highly available and has a great uptime which haelpsin
managing more amount of traffic at a particular tim0.
Better collaboration with real-time sharing -cloud computing has great real-time Bharing
0 Create such a cloud platform, it talkes a long number of steps and dedicated time. Let's now look a
the steps involved or the lifecycle of cloud computing solutions.
Step 1:Define the Purpose
The first and foremost step is to define the purpose for which you want to create a cloud. For
this, you
have first to understand your business requirement
and what type of application you want to run on the
cloud. After this, you have to decide whether you want your cloud
to be public, private, or hybrid.
Step 2: Define the Hardware
Deciding what type of hardware, you will need is the most
thought after the process. One needs to be
very precise in making the decision. For
this, you will have to choose the compute service that will
provide the right support when you resize your compute
capacity to maintain your application running.
Step 3: Define
the Storage
Every applicationneeds a good amount of storage where it's data can be stored safely. For any
application storage type that should be chosen carefully for this one should choose the storage service
where they can back up and archive their data over the internet.
Step 4: Define the Network
Networking is the key that' will deliver your data to the end-users. So, the netvwork must be configured
sincerely and should be flawless so that intruders cannot break into the network. One should define the
network that securely delivers data, videos, and applications with low lateney and high transfer speed.
Step 5:Define the Security
Security is a, key aspect of any application. Set up your security service which enables services for user
authentication or limiting access to a certain set of users on your resources.
Step 6: Define the Management Process and Tools
The developer should have complete control over there resource. and to configure these you should
define some management tools which monitor your cloud environment, resourees used, and the
customer application running on i
Step 7: Testing the Process
Testing is yet another important thing in the life cycle of deploying any application. All the faults can
figure out only through the testing process involved in it. During testing, you should verify your
application using various developer tools where you build, test, and deploy your.code quickly.
(SPPU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventue
Cloud Computing (SPPU-SEM 7-E&TC)
Service Orionted Architecturo and Cloud Security)..Page no.
Step 8:Analytics (4
Finally, analyse auid ViSuanze data using analytics sorvico
and get results then and there only,, Once whoro you can start querying data instanuy
you deploying.
analysing is dono completo, your application
becomes reauy
Advantages
Service-Oriented Terminologies
Let's see some important service-oriented terminologies
Service-Oriented Architecture (SOA) is a stage in the evolution of application development and/or
integration. It defines a way to make software components reusable using the interfaces.
(SPPU-New Syllabus w.e.f academic year 22-23)P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Cloud Security)..Pado.
(Service Orlented Archltecture and
Cloud Computlng (SPPU-SEM
7-E&TC)
available
make use of services available
.
Formally, SOA is an architectural approach in which applications
network. In this architocture, services aro provided to form
applications, through a network callo
cal
in
t
streamline theBer
the internet. It uses common communication standards to speed up and gervia
integrations in applications.
a
business function in itself. The services are published such Way
Each service in SOA is a complete in
that it makes it easy for the developo to assemble their apps using those services. Note that SOAOAa
different from microservice architecturo.
SOA allows users to combine a large number of facilities from existing services to form applications,
SOA enconmpasses a set of design principles that structure eystem development and provide means fo
integrating components into a coherent and decentralized system.
SOA-based computing packages functionalitioa into a set of intoroperable services, which can b
integrated into different software systems belonging to separate business domains.
There are two major roles within Service-oriented Architecture:
.Service provider :The service provider is the maintainer of the service and the organization that
makes available one or more services for others to use. To advertise services, the provider can
publish them in a registry, together with a service contraet that specifies the nature of the service,
how to use it, the requirements for the service, and the fees charged.
2. Service consumer The service consumer can locate the service metadata in the registry and
:
develop the required client components to bind and use the service.
Services might aggregate information and data retrieved from other services or create workflows of
services to satisfy the request of a given service consumer. This practice is known as service
orchestration.
Another important interaction pattern is service choreography, which is the coordinated interaction of
services without a single point of control.
Standardized service contract :Speciffed through one or more service description documents.
Loose coupling: Services are designed as self-contained components, maintain relationships that
minimize dependencies on other services.
Abstraction : A service is completely defined by service contracts and description documents. They
hide their logic, which is encapsulated within their implementation.
Reusability : Designed as components, services can be reused more effectively, thus reducing
development time and the associated costs.
Autonomy : Services have control over the logic they encapsulate and, from a service consumer point
view, there is no need to know about their implementation.
Discoverability: Services are defined by desceription documents that constitute supplementd
metadata through which they can be effectively discovered. Service discovery provides an effectie
means for utilizing third-party resources.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventue
7-E&TC
Cloud Computing (SPPU-SEM
Sorvco Orlentod Architocturo and Cloud Socurity)..Pago no. (4-59
Composnbility *
Using
services as building
plemented. Service oreliestration
imple
block8, BOphisticated and complex operations n be
and choroography provide solid support
and achieving business goals. a for compog ices
Advantages of SOA
2. Basy maintenance : As
services aro independent
easily without affecting other of ench other they can bo updated and moaiiea
services.
3. Platform independent: SOA allows making
a complex application by combining services picked iron
different sources, independent
of tho platform.
4. Availability: S0Afacilities are
easily available to anyone on request
5. Reliability: SOA applications are
more reliable because it is easy to debug small services rather tnan
huge codes
6. Scalability:
Services can run on different servers within
an environment, this increases scalability
Disadvantages of SOA
L. High overhead: A validation of input parameters of services is
done whenever services interact this
decreases performance as it increases load
and response time.
2. High investment: A huge initial investment
is required for SOA.
Complex service management: When services
interact, they exchange messages to tasks. the number of
messages may go in millions. It becomes a cumbersome task to
handle a large number of messages.
Practical applications of SOA: SOA is used in many ways
around us whether it is mentioned or not.
SOA infrastructure is used by many armies and air forces to deploy
situational awareness systems.
Applcatlon or Servlces Services
Service Service
Consumer Locator
Service
Broker
Service
Provider
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
urity)....Page
Cloud Security)..Page
(Servico Orionted Architecture and no.
no
(4-1h
Cloud Computng (SPPU-SEM 7-E&TC)
more published interfaces.
Services : The services are the logical entities defined by one or
Service provider: It is a softwaro entity that implemonts a service specification.
a provider. A Beri.
Service consumer: It can be callod as a roquestor or cliont that calls service rvice
Service broker : It is a service providor that pass sorvice requests to one or more additional service
providers.
Service Communication Protocol: It allows the service provider and the service consumer to
communicate with each other.
Service Description : It describes the service and data required to invoke it.
Service : It is an actual service.
Business Process: It represents the group of services called in a particular sequence associated with
the particular rules to meet the business requirements.
Service Registry: It contains the description of data which is used by service providers to publish
their services.
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications.A SACHIN SHAH Veture
Cloud Computing (SPPU-SEM 7-E&TCI
sorvico Oriontod Architecturo and Cloud Secunty)..Page
nP The quality of servica aspects no.(411
contalns
Policy: It represents the set of protocols
services to consumers. accordins to which a service provider
make and pr the
Security : It represonts the sot of protocols requirod
for idontifieation and authorization.
Transaction: It provides the
surety of consistont
complete a business function, result. This means, if we use the group ot services
oithor all must complete
Management: It defines tho of or nono of the complete.
sot attributes used to
manago the services.
SFAdvantages of OA in terms of
quality
sOA has thhe following advantages
1. Easy to integrate: In a servico-oriented architecture,
provides implementation transparency. the integration is a service specification that
Data must not be changed in transit, and stops must be taken to ensure data cannot be altered by
with each letter representing a foundational principle in cyber security, the importance of the CIA triad
security model speaks for itself.
Contidentiality, integrity and availability together are considered the three most important concepts
within information security.
Considering these three principles together within the, framework of the "triad" can help guide the
development of security policies for organizations. When evaluating needs and use cases for potential
new products and technologies, the triad helps organizations ask focused questions about how value is
being provided in those three key areas.
Thinking of the CIA triad's three concepts together as an interconnected system, rather than as
independent concepts, can help organizations understand the relationships between the three.
Here are examples of the various management practices and technologies that comprise the CIA triad
While many CIA triad cyber security strategies implement these technologies and practices, this list is by no
means exhaustive.
Confidentiality
Sometimes safeguarding data confidentiality involves special training for those privy to sensitive
documents. Training can help familiarize authorized people with risk factors and how to guard against
them.
Further aspects of training may include strong passwords and password-related best practices and
information about social engineering methods to prevent users from bending data-handling rules with
good intentions and potentially disastrous results.
Data eneryption 18 another common method of onsuring confidontiality, User IDs and passwords
constitute a standard proceduro; two-factor authontication (2FA) is bocoming the norm. Other options
include Biometric verification and socurity tolkons, koy fobs or soft tokens.
In addition, users can take procautions to minimzo the numbor of placos where information appears
and the number of timcs it is netunlly transmittod to comploto a required tranaaction.
Extra measures might be talken in tho case of oxtromely sonsitivo documents, such as storing only on
air-gapped computers, disconnected storage device or, for highly sonsitive information, in hard-copy
form only.
Integrity
These measures include file permissions and user access controls. Version control may be used t
prevent eroneous changes or accidental deletion by authorized users from becoming a problem.
.In addition, organizations must put in some means to detect any changes in data that might occur as a
result of non-human-caused events such as an electromagnetie pulse (EMP) or server crash.
Data might include checksums, even cryptographic checksums, for verification of integrity. Backups or
redundancies must be available to restore the affected data to its correct state.
Furthermore, digital signmatures can be used to provide effective no repudiation measures, meaning
evidence of logins, messages sent, electronic doeument viewing and sending cannot be denied.
DAvailability
This is best ensured by rigorously maintaining all hardware, performing hardware repairs immediately
when needed and maintaining a properly functioning operating system (0S) environment that is free of
software conflicts. It's also important to keep current with all necessary system upgrades.
Providing adequate communication bandwidth and preventing the occurrence of bottlenecks are equally
important tactics. Redundancy, failover, RAID -- even high-availability clusters can mitigate serious
--
.Fast and adaptive disaster recovery is essential for the worst-case scenarios; that capacity relies on the
existence of a comprehensive DR plan.
Safeguards against data loss or interruptions in connections must, include unpredictable events such as
occurrences, a backup copy may be stored in a
natural disasters and fire. To prevent data loss from such
geographically isolated location, perhaps even in a fireproof, waterproof safe.
and proxy servers can guard against downtimne
Extra security equipment or software such as firewalls
malicious denial-of-service (DoS) attacks and network intrusions.
and unreachable data blocked by
Big data posos challenges to the CIA paradigm bocause of the sheer volume of information
tha
organizations neod snfeguardod, tho multiplicity of sourcos that data comes from and the variet
formats in which it oxists.
Duplhento data sets and disnstor recovory plans can multiply the already-high costs. Furthermor
because the main coneorn of big data is collecting and making some kind of useful interpretation of a
,
this information, responsiblo data ovorsight is ofton
lacking.
Whistle-blowor Edward Snowdon brought
that problem to the public forum when he reported on the
National Security Agency's collection of massivo volumes
of American citizens' personal data.
Internet of things privacy protects the information of individuals from
exposure in an Ior environment,
Almost any physical or logical entity or object
can b0 given a unique identifier and the ability to
communicate autonomously over the internet or a similar network.
The data transmitted by a given endpoint
might not cause any privacy issues on its own. However,
when even fragmented data from multiple
endpoints is gathered, collated and analysed, it can yield
sensitive information.
Lnternet of things security is also challenging because IoT consists of so many internet-enabled devices
other than computers, which often go unpatched and are often configured with default or weak
passwords.
In implementing the CIA triad, an organization should follow a general set of best practices. Some
best
practices, divided by each of the three subjects, include:
Confidentiality
1. Data should be handled based on the organization's required privacy.
2. Data should be encrypted using 2FA.
3. Keep access control lists and other file permissions up to date.
4. Integrity
5. Ensure employees are knowledgeable about compliance and regulatory requirements to minimize
human error.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) ATech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
orvico Orlontod Architocturo and Cloud Socurity)...Pago no.
Availability (4-1)
1. Use preventive measures such as
redundancy, failovor
updated. and RAID. Ensuro systoms and applications
The risk in cloud deployment mainly depends upon the service models and cloud types.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) LTech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&T (Servlce Oriented Architecture and Cloud Security)..Page
y no.(4
The following diagram shows the CSA stack model:
SaaS socurily
*******-**.---------***-**** -**-********T
boundary
Prosontatlon MobllyProsontatlon Platorm
Appllcntlons
Hardwae
Faclitles
Taas is the most basic level of service, with PaaS and SaaS next two above levels of services. Moving
upwards, each service inherits the capabilities and security concerns of the model beneath.
Iaas provides the infrastructure, PaaS provides the platform development environment, and
Saas
provides the operating environment.
JaaS has the lowest integrated functionality and security level, while SaaS has the highest. This model
describes the security boundaries at which cloud service providers' responsibilities end and customers
responsibilities begin.
Any protection mechanism below the security limit must be built into the system and maintained by the
customer. Although each service model has a security mechanism, security requirements also depend on
where these services are located, private, public, hybrid, or community coud.
T Understanding data security
Since all data is transferred using the Internet, data security in the cloud is a major, concern. Here are
the key mechanisms to protect the data.
access control
audit trail1
certification
authority
The service model should include security mechanisms working in all of the above areas.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventures
Cloud Computing (SPPU-SEM
7-E&TC)
Sorvice Oriented Architecture and Cloud Securit)..Page no. (-1
4.5.3 Separate Access to Data
Internet
Web
Cloud
Cloud Storage
ne ditterence between "cloud security" and "cloud security architecture" is that the former 15 built fron
problem-specific measures while the
latter is built from threats.
A dloud security architecture can
reduce or eliminate the holes in Security that point-of-solution
approaches are almost certainly about to leave.
lt does this
building down defining threats starting with the users, moving to
by the cloud
environment and service provider, and then to the applications.
The security and security architectures for the cloud are not single-player processes.
Most enterprises will keep a large portion of their I'T workilow within their data centres, local networks,
and VPNs.
The cloud adds additional players, so the cloud security architecture should be part of a broader shared
responsibility model.
separate funetion or component of the application is mapped to the appropriate layer depending
on who i
provides it. The contract form then describes how each party responds.
to the general security concerns that affect anyone who uses IT technology or connects
addition
n ad
the Internet, the community of service providers has its own set of security-related issues to deal vth
cO. What are the security issues in cloud service providers?
.Attacking Border Gateway Protocol (BGP) routing and injecting faulty BGP routes for traffic redirection
is one technique that attackers are using to obtain the "interesting" traffic.
Domain Name System (DNS) information is sometimes used to redirect Internet traffic to serve the
needs of people with criminal intent.
Device compromise means breaking into vital components of the infrastructure and modifying their
configuration.
These threats are correlated with the following factors specific to service provider networks:
The size of the network. Service providers must be able to rapidly implement security
measures against
a large number of parties that may be involved in the attack, and deploy these tools and
techniques on a
large number of devices, usually network entry points.
In the enterprise world, the number of devices to take care of is typically considerably smaller than in
the service provider space. (Although some enterprises have huge networks, this
is still an exception).
Size is one of the significant differences between the service provider and enterprise security paradigm.
in the service provider
The number of possible targets of and entry points for an attack is also higher
space than it is in the enterprise world, where typically a smaller number of clearly identified assets
frequently enjoy the highest level of protection possible.
Accordingly, service providers must be able to defend multiple targets from multiple parallel attacks.
Securing the transit paths and the infrastructure carrying them and not necessarily securing the
endpoints brings its own set of challenges.
PPU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Cloud Security)..Page
Cloud Computing (SPPU-SEM 7-E&TC) (Servico Orlented Architocturo and
applicablo in the enterprise world aro
Many of the standard urity moasuros that are no
applicable in the sorvico providor socurity paradigm.
provention systom (Ds/IPS) do.
A primary differonco is that firowalls and intrusion dotoction and ovice
STORAGE
(Database)
Computer Server
Networks
Services
SERVICE PROVIDER
(SPPU-New Syllabus w.efacademic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ven
ting (SPPU-SEM
7-E&TC)
ud Copu Sorvice Oriontod Architocturo and Cloud Socurity)...Pago DO
CO Need of Cloud Computing
4.7.1 Ne
a
Before using
Cloud Computing, most of
Bet tho largo as
us woll
woll as Bmall IT companies use traditional methods
data in Serve comf
ov store
they Server, and thoy need a
ie. soparato Sorvor room for that.
Server Room, there should bo a
that database sorvor, mail sorvor, firowalls, routors, modems, higa
sed devices, ete. For that IT
speed
net companios have to spond
lots of money.
reduce aall
In order
to ce the problems with cost Cloud
computing come into existence and most com
shift to this technology. i
Security Issues in Cloud Computing
4.7.2
a
There. is no doubt that Cloud Computing provides various Advantagos but there are also some Becur
issuesos in cloud
computing. Below are some following Security Issues in Cloud Computing as follows.
Data Loss
Data Loss is one of the isSues faced in Cloud Computing. This is also known as Data Leakage. As we
kn0w that our
sensitive data is in the hands of Somebody else, and we don't have full control over our
atabase. So, if the security of cloud service is to break by hackers then it may be possible that hackers vwill
date
get access to our sensitive data or personal files.
As we know if we are talking about the cloud and its services it means we are talking about the
Internet. Also, we know that the easiest way to communicate with Cloud is using APL So, it is
important to protect the Interface's and APf's which are used by an external user. But also, in cloud
computing, few services are available in the public domain.
An is the vulnerable part of Cloud Computing because it may be possible that these services are
Rcceased by some third parties. So, it may be possible that with the help of these services hackers can
easily hack or harm our data.
User Account Hijacking
Account Hijacking is the most serious security issue in Cloud Computing. If somehow the Account of
User or an Organization is hijacked by Hacker. Then the hacker has full authority to perform Unauthorized
Activities.
EST
Changing Service Provider
Lack of Skill
to use a Ieature, ete. are
working, shifting sorvico provider, need an extra feature, how
While o another So it requires a led persn
skilled
havo skilled Employee.
the main problems caused in IT npany who doesn't
to work with cloud Computing.
industry. As a result, we have found that the gap between academia and industry has become very
small in this feld, and more importance should be given to elient and service provider responsibiliy
awareness.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) 9Tech-Neo Publications..A SACHIN SHAH Venture
(S
ing (SPPU-SEM 7-E&TC)
ComDuting
Sorvico Oriontod
Architocturo and Cloud Socurity)...
Cloud sibility: Post virtuaizauon,
Lack organizations
struggle to visualizo
BUrugglo to perform
ve monitoring and munagemont.
eflective visunlize their virtual aseets
thoir virtuat
i
ation of virtual assets means cstablishing
yisunting the guest and host onvironment, visibility on the virtunl layer of IT architecture
positioning the virtual
physical T asset environment etc. servers and desktops within the
Mici
rtraffic: If no due diligenco is carried out to
virtualizat undorstand
dorstand the changes network
netvi will undergo due
ation, then the trattic of physical IT
to assots and virtualized environment
get nizu
other.
The mixing
g
of trafiic results in inelfective
monitoring of virtualized
perspective. assets from both an 1 aand a
security
ic data exposures: 1n a virtualized IT environment is
machines. it an arduous task to scan data files resident
on virtual
izations are impiementing security capabilities that can
discover and classity ens
nation hosted on virtual machine thus reducing
informat
the number of data leakage scenarios.
swiftly identifying sensitive data exposures,
these security capabilities reduce the risks ot n
eompliance,
co such as reputational damage due to data leakage incidents.
Some of the other Securiuy cnallenges are insecure provisioning in which device and user-based
provisioning becomes ditficult to implement because of elevated
access given to provide flezibility in
perations and business demanding deployment of varied mobile devices to enhance productivity oI tne
oper
workforce in a virtualized environment.
HOST-SECURITY
4.9
GQ What is Host Security ?
Host security describes how your server is set up for the following tasks:
1. Preventing attacks.
2. Minimizing the impact of a successful attack on the overall system.
3. Responding to attacks when they occur.
It always helps to have software with no security holes. Good luck with that! In the real world, the best
approach for preventing attacks is to assume your sofbware has security holes. As I noted earlier in this
chapter, each service you run on a host presents a distinct attack vector into the host.
The more attack vectors, the more likely an attacker will find one with a security exploit. You must
therefore minimize the different kinds of software running on a server.
Given the assumption that your services are vulnerable, your most significant tool in preventing
attackers from exploiting a vulnerability once it becomes known is the rapid rollout of security patches.
Here's where the dynamic nature of the cloud realy alters what you can do from a security perspective.
SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Archltooturo and Cloud
curlty)...Pago no.(4
Cloud Computing (SPPU-SEM 7-E&TO) (Sorvloo Orlontod
infruntruct
ucturo in
socurity patchos ncross an entiro tim
In a traditional data contor, rolling out
consuming and rislky.
In the cloud, rolling out a patch acrose tho infrastructuro
takos throo Bimplo steps:
Users
Cambridge
Analytics
Trump
Campalgn
but
controlled to an extentI by many means
be
will be secured ?
How data
firewalls.
Use
systems.
.
Use encrypted
VPN.
Use
parties.
.Nevergive authorization to external
, Use strong passwords and change them often.
Pablic networks should be avoided as much as we can like WiFi on metros, airports.
Access Controls
critical systems
This type of data security measures includes limiting both physical and digital access to
and data. This includes making sure all computers and devices are protected with mandatory login entry,
and that physical spaces can only be entered by authorized personnel.
Authentication
Similar to access controls, authentication refers specifically to accurately identifying users before they
have access to
data. This usually includes things Hike passwords, PIN numbers, security tokens, swipe
cards, or biometrics.
oFPU-New Syllabus
w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Architecture and Cioud Secunty)...Page no (4-26
(Service Oriented
Cloud Computing (SPPU-SEM 7-E&TC)
Data Erasuree
You'll want to dispose of data properly and on a regular basis.
and is more sen.
completely overwrite data on any storage device
Data erasure employs software to
data is unrecoverable and therefore won'tfal
than standard data wiping. Data erasure verifies that the
into the wrong hands.
Data Masking
pron
obscuring letters and numoers win
Dy using data masking software, information is hidden by
unauthorized party gains access to it.
characters. This effectively maslks key information even if an
receives it.
The data changes back to its original form only when an authorized user
US Data Resiliency
recover from failures.
Comprehensive data security means that your systems can endure or
events like power outages or natur
5uilding resiliency into your hardware and software means that
disasters won't compromise security.
Encryption
format via encryption keys.
A computer algorithm transforms text characters into an unreadable
Only authorized users with the proper corresponding keys can
unlock and access the information.
should- be encrYpted to some
Everything from files and a database to email communications can and
extent.
Afirewall is a eyber security tool that flters network traffic and helps users block malicious software
from accessing the Internet in infected computers.
Firewall
and counter-attackg
irewalls are designed in such a way that they can react quickly to detect
aroughout the network. They can work with rules configured to protect the
network and pertorm quick
controller,
assessments to find any suspicious activity. In short, we can point to the firewall as a traffic
Some of the important risks ofnot having a firewall are:
Open Accesss
This means that
a computer is running without a firewall, it is giving open access to other networks.
it is accepting every kind of connection that comes through someone.
In this case, it is not possible to detect threats or attacks coming through
our network. Without a
sources.
hrewall, we make our devices vulnerable to malicious users and other unwanted
Network Crashes
In the absence ofa firewall, anyone could access our network and shut it down. It may lead us to
invest
our valuable time and money to get our network working again.
Therefore, it is essential to use firewalls and keep our network, computer, and datá safe and secure
from unwanted sources.
Firewalls have been the first and most reliable component of defense in network security for over 30
years. Firewalls first came into existence in the late 1980s. They were initially designed as packe
filters. These packet filters were nothing but a setup of networks between computers.
The primary function of these packet fltering firewalls was to check for packets or bytes transfered
between different computers.
Firewalls have become more advanced due to continuous development, although such packet filter
firewalls are still in use in legacy systems.
Gil Shwed from Check
As the technology emerged, Point Technologies introduced the first statefu
inspection firewall in 1993. It was named as FireWall-1.
22-23)(P7-129)
(SPPU-New Syllabus w.e.f academic year
enture
Tech-Neo Publications..A SACHIN SN
(SPPU-SEM 7-E&TC
tng
Beckin
2000, Netscre
2000 reen came up with
its
Service
Orionted Architecture
and Cloud Security)...Page no (4-29)
within enterprises because purpose-built firowall 'Appliance'.
adophon ithin of increased internet gained popularity and
It gair
enst. The turn ot the
st lower century Baw a
new
speed, less latency, ana put
"
sta
id-2010.
approach to firowall implementation a the
firewall system
A all
system analyzes nebwork traffie based
on pre-defined rules. It then filters the trattic and
prerents any such traffic coming from unreliable or suspicious
ces. It only allows incoming traffic
sources.
to accept.
that is configured
nically,
Typical firewalls intercept
nebwork trafitic at a computer's entry
point, known as a port.
rewalls perform this task by allowing or blocking specific data packets (units of communication
neferred over a digital network) based on pre-defined
security rules.
eeming traffic is allowed only through trusted IP addresses,
or sources.
Public Network
Modem
Network
Firewall
Dustbin
Secure Private Local Area Network
V= Specified Traffic Allowed
X= Restricted Unknown Traffic
Fig. 4.11.2: Working of Firewall
W Syllabus wef academic year 22-23(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Security).. pa
Architecturo and Cloud
Cloud Secuny)FEge no. (a.
(Sorvico Orlentod
Cloud Compuling (SPPU-SEM 7-E&TC) computer system and other network
betweon tho
Since the firewall acts as a barrier or filtor
traflic controller.
.e, the public Internot), we can consider it as a rolling
iniormation by control r
limitations
o Firewalls cannot stop users from accesing malicious websites, making it vulnerable to intenal
threats or attacks.
o Firewalls cannot protect against the transfer of virus-infected files or software.
o Firewalls cannot prevent misuse of passwords.
Firewalls cannot protect if security rules are misconfigured.
Firewalls cannot protect against non-technical security risks, such as social engineering
Firewalle cannot stop or prevent attackers with modems from dialing in to or out of the internal
network.
Firewalls cannot secure the system which is already infected.
year 22-23)(P7-129)
(SPPU-New Syllabus w.e.f academic ech-Neo Publications...A SACHIN SHAH Venu
(SPPU-SEM7-E&TC)
outing VICO Olentod Architecturo and Cloud Security)...Page no.
is recommende to keop all Intornet-onabled dovices
refore, it updatod. This includes the latest
tems, web browsors, applications, and other Becurity irus).
software (such as an
he security v
the ocurity of wireless
routers should be anothor
practico.
Besides
protecting a router may include options such anging the router's
nan
as ropoatedly
revieui.
ewing security settings, and
password, croating a guost network for visitors.
and
Firewall
Types of
4.1.3 5
Fnlist Different
types ot Firewall
5.1
Cloud Platfoms.. ********************************************* ****s
5-2
n***** ********"
****
*********"********
**********************
What are the Cloud Plattoms Explain any 3 platforms
***** **rss
5.6 Amazon Web Services Architecture and Core Concepts. ********************************************************* **** 13 4*******
and frameworks.
COnputing applications develops by leveraging platforms application.
infrastructure to customize-able ions
Various types of services are provided from the bare metal
serving specific purposes.
GQ What are the Cloud Platforms Explain any 3 platfoms ?
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(SPPU. 7-E&TC)
uting (SPPU-SEM
Gompuuing
Gioud Environment
d completio
tion of development, and Application Dovolopment)..Pago no
On Developers
can oasily move
quotas to containing tho cost their applici
blications to App-Engine, set
generatod, and
corted programming
supported mako it available to the world. Curren
languages aro Python, the
Java, and CGo.
Microsoft Azure
rosoft
Micros Azure 1s a loud operating
systom and a
platform in which u8or can
applications in the cloud. Generally,
a scalable runtime ave the
distributed applications is provided. ronment for web applications and
environ
Streaming video and audio, embedding information into activities, and providing applications on
demand on a global scale are all possibilities.
Simply stated, cloud computing is the distribution of computing services over the Internet ("the cloud)
in order to provide quicker innovation, more versatile resources, and economies of scale.
We usually only pay for the cloud services that we use, which helps us to cut costs, operate our
.
infrastructure more effectively; and scale as our company grows.
(SPPU-New syllabus we.f academic year 22-23 P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
na
(SPp
(SPPU-SEM 7-E&TC)
pUung oud Envronmont and Application Development)...Page no.
CdS.1.2 Top Bene of Cloud Computlng
owing
followi are BOven or tne most popular roasons
The why businesseB are moving to cloud compa
ervices:
Cost
rage reduces the upront costs of purchasing
storage
Cloud hardware and software, as well as the cos of
up and
and operating on-site datacenters-8orvor racks, round-the-clock
ing power and cooling, and
onals to manage the infrastructure. It quickly adds
prolessi up.
Global scale
2.
to scale elastically 1s one of the advantages of cloud
The. ability computing services. In other words,
means that we can decide the processing speed, location
simply means of the data center where data is to be storcdy
and even the bandwidth for cour process and
storage data.
3.
Performance
The most popular cloud computng services are hosted on a global network of protected datacenters that
are updated on a regular basis with the latest generation of fast and powerful computing hardware.
4. Security
providers have a comprebensive colletion of polidies, technologies, and controls to help us
Many cloud
o enhance our overal seeurity posture and protect our data, applications, and infrastructure from threats.
5. Speed
It means that the huge amount of calculation and the huge data retrieval as in download and upload
can happen just within the blink of an eye, obviously depending on the configuration.
6. Rellability
Since data can be replicated at several redundant locations on the cloud provider's network, cloud
storage makes data backup, disaster recovery, and business continuity simpler and less costly.
'Google App Engine is a fully managed serverless platform for developing and hosting web applications
at a scale.
Sers can choose from several popular languages, libraries, and frameworks to develop their
applications and then App Engine takes care of provisioning servers and sealing app instances based on
demand. It is a PaaS for building scalable applications.
DrPU-New Syllabus
w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Application
Pageno.
Development)...Pac
Cloud Computing (SPPU-SEM 7-E&TC) (Cloud Environment and 5
environmnent
Engine, one is a standard
Google Cloud provides 2 onvironmonts to uso App
such as Python, Go, node.js.
constrained onvironments and support for languages such as
more freedom such
Plexiblo Environment where developers have
ability to nstallrunni
install
n response timcout, and cus
dockor, longer roquest &
S Using
dopendencios/softwaro, and SSH into tho virtual machine.
1. Standard Environment
It provides users "with he
thefac,
facl
It is based on the container which runs on the Google infrastructure. unt
i load and a ing°
of data
cuSy build and deploy an application that runs under hoavy
and
,
G
upports the following languages:Python, JAVA, Node.js, Ruby,
Fentures of Standard Environment
Persistent storage with queries, sorting, and transactions.
Automatic scaling and load balancing
scope of a request.
Asynchronous task queues for performing work outside the
specific time intervals.
oneduled tasks for triggering events at regular intervals or
Integration with other Google cloud services and APIs.
2. Flexible Environment
concentrate on writing code.
App Engine Flexible Environment allows users to
with
Based on Google Compute Engine, it automatically scales
the app up and down and along
also balances the load. It allows users to customize their
runtime and the operating system of th
virtual machines using Docker files.
Features of Flexible Environment
are Compute Eng
Infrastructure Customization: App Engine flexible environment instances
virtual machines, which implies that users can take advantage
of custom ibraries, use SSH
debugging, and deploy their own Docker containers.
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications-A SACHIN SHAH Vent
7-E&TO
(SPP
SPPU-SEM OUd Envronment and Applicatlon Dovelopment)...Pago no. (
dConDug Engine protects from security
throats using firewal capabilities, IAM rules, iand
ne
de : App
Just. TTLS
SSL/ certificates 80 that it helps uscers to writo code without any underlying
nanaged
infrastructure,
wha
what you use : t naturally scales rolying upon tho application traftic ana cpe
only for is running.
Pay sst when the code
just
resources
Eeatures of
Features Google App Engine
of Goo
5.2.1
Engine
features of Google App
-
COMPUTE SERVICES
5.3
--
GQ Explain
In cloud computing,
Compute Services ?
the
*
AWS Compute services offer the broadest and deepest functionality for compute. Key benefits of using
AWS Computeinclude:
) Right compute for your workloads
Amazon Ec2 (Amazon Elastic Compute Cloud) offers granular control for managing application
With AWS compute you pay only for the instance or resource you need, for as long as you use it, without
requiring long-term contracts or complex licensing.
TV Flexibility
AWS provides multiple ways to build, deploy, and get applications to
market quickly.
To
determine which, AWS Compute servico
Touch with our toam of experts is beat suited to gro
grow your business, don't hesitate to
Get in or sign-up for
a Free AWS Accour
ount today.
STOR GE SERVICES
5.4
Storage a service that allows to
Cloud savo data on offsito
accessible by a web services API. storago ystem
syst managed by third-party
nade
mac
andis
device
Storage Aevices can be broadly classified into two categories:
Block Storage Devices
1
File Storage Devices
2
Storage Devices: The block storage devices offerraw
1. Bl storage to the clients. These raw storB
to create volumes.
are partitioned
le Storage Devices: The ile Storage Devices offer storage to clients
in the form of files, maintaining
n file system. This storage is in the form of Network Attached
Storage (NAS).
HTTP
CIFS NFS
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventue
(SPPU-SEM 7-E&TC)
Computing
ing
(CloudEnvironmont
MUNICATION SERVICES and Application Dovelopment)...Page no.
oud (5-11)2
CO
5.5
mmunication Service
Comn
Provlder
What is (cSP)?
anication service
refers to the communi providers. They
CSP provido us ser
different fields ofcommunication media. Bervices in different means or 1n
There are many types of service providers, all the different service providers are listed below:
1.
Telecommunication services provide : These are the service providers who are responsible for
landline or wireless connections. this type of provider is having its different branches like cable
providers,satellite transmission is included in this category of service providers. Also, mobile
companies that provide devices to users and also internet service provider (ISP) comes to TSP.
2 Entertainment service providers: These providers help in Tv transmissions like the different
niches of channels which are running on the tv or theaters comes to the category of entertainment
service provider music industries and video games industry also comes to this category.
For example: motion pictures, theaters.
3. Media/web services: These providers provide services related to the web shows, media, series, movies
on the internet over a web platform, known as media or web services.
Transportation
Transportation is concerned with the transport of goods and raw materials. However, transportation is
not only the freight but all the auxiliary services associated with them.
The main function of transportation is to overcome the barrier of place
The goods will be made available to the end consumer no matter where they are located in the word
They will be transported from their place of production to their place of consumption.
To keep up with an expanding business, transportation services must also keep up. One main factor is
the infrastructure of the country.
Roads, railways, ports ete must be taken care of. It is both the responsibility of the industries and the
government.
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications.A SACHIN SHA Venture
ting(SPPU-SEM 7-E&TC)
ComPUting.
Environment and Application Development)...Page no. (
Warehousing
Coud
euch warehousing facilities. The owner of a public warehouse is expected to take reasonably Eoou
care of the goods.
3.
Ronded Warehouse: These are warehouses for imported goods. The goods will be in storage
the facility till the importer pays his custom duty and other such taxes. So the goods are said to be
in a bond.
SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
.
Page no.
Environmont and Application Dovolopmont)... 5-14)
Cloud Computing (SPPU-sEM 7-E&TC) (Cloud
man.
Lino Intorfaco (CLD is a unified tool to anage
AWS Command Lino Intorfnco: The AWS Command you can conurol multiple Aws
to downlond and configure,
yoir AWs sorvicos.11 With just ono tool
through scripts.
servicos fhom tho command lino und automato them
simplify using AWS services in
Dovclopmont Kits (SDKs)
.
Compute secu
(Amazon EC2) is a web service that provides
Amaron EC2 Amazon Elastic Computo
: Cloud
computing easier to
computo capacity in tho cloud. It is designed to make web-scale
esizablo
developers.
capacity with minimal
you to obtain and configure
The Amazon EC2 simplo wob servico intorface allows
computing resources and lets you run n
friction. It provides you with complete control of your
Amazon's proven computing environment.
Service (ECS) is a highly scalable, high.
Amazon EC2 Container Service: Amazon EC2 Container
containers. It allows you to easily run
performanco container management service that supports Docker
applications on a managed cluster of Amazons EC2 instances.
(ECR) is a fully-managed Docke
Amazon EC2 Container Registry: Amazon EC2 Container Registry
manage, and deploy Docker container
container registry that makes it easy for developers to store,
images.
(ECS), simplifying your development to
Amazon ECR is integrated with Amazon EC2 Container Service
production workflow
storage
object storage with a simple web
Amazon S3: Amazon Simple Storage Service (Amazon S3) is an
anywhere on the web.
service interface to store and retrieve any amount of data from
(Amazon EBS) provides persistent block
Amazon Elastie Block Store :Amazon Elastic Block Store
AWS Cloud.
storage volumes for use with Amazon EC2 instances in the
provides simple, scalable
Amazon Elastic File System : Amazon Elastic File System (Amazon EFS)
file storage for use with Amazon EC2 instances in the AWS Cloud
low-cost storage service for data
Amazon Glacier: Amazon Glacier is a secure, durable, and extremely
archiving and long-term backup
rDatabase
engine
Amazon Aurora: Amazon Aurora is a MySQL and PostgreSQL compatible relational database
combines the speed and availability of high-end commercial databases with the simplicity and cose
that
effectiveness of open source databases atr
Venture
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) LTech-Neo Publications..A SACHIN SHAH
Comouting(Sp
(SPPU-SEM
g
7-E&TC)
Cloud Envitonment
and Application Doveloprnent).Pago (5-15)
avd nRDS: Amazon Relational Database
Sorvice Amnzon
relational database in tho rate,
le cloud NDS) makes it easy to set up,
EC2 Elastic IP
Instance Upload to $3 bucket
System and application ogs
Storage
EBS
volume
snapshot
Fig. 5.6.1: AWS Architecture
Load Balancing
Toad balancing simply means to hardware or software load over web servers, that improver's the
Hardware load balancer is a very common network appliance used in traditional web application
architectures.
. AWS provides the lastic Load Balancing service, it distributes the traffic to EC2 instances across
multiple available sources, and dynamic addition and removal of Amazon EC2 hosts from the load
balancing rotation.
Elastic Load Balancing can dynamically grow and shrink the load-balancing capacity to adjust to trafic
demands and also support sticky sessions to address more advanced routing needs.
Amazon Cloud-front
.It is responsible for content delivery, ie. used to deliver website. It may contain dynanmic, static, and
streaming content using a global network of edge locations. Requests for content at the user's end are
automatically routed to the nearest edge location, which improves the performance.
Amazon Cloud-front is optimized to work with other Amazon Web Services, like Amazon $3 and
Amazon EC2. It also works fine with any non-AWS origin server and stores the original files in a
similar manner.
In Amazon Web Services, there are no contracts or monthly commitments. We pay only for as much or
as little content as we deliver through the service.
U-New Sylabus wef academic year 22-23)(P7-129) Tech-Neo PublicationsA SACHIN SHAH Venture
Applicalion Doveopmont)... Pagono.
no (5-18
Cloud Computing (SPPU-SEM 7-E&TC) (Cloud Environment and
Security Management
called security groups, which is similar to a
Amazon's Elastic Compute Cloud (EC2) provides a feature
source IP ranges that
specify the protocols, ports, and
inbound network firewall, in which we have to
are allowed to reach your EC2 instances.
groups, each of which routes the appropriate
Each EC2 instance can be assigned one or more security or P addresses whieh
configured using specific subnets
traffic to each instance. Security groups can be
limits acess to EC2 instances.
Elastic Caches
memory cache in the cloud.
Amazon Elastic Cache is a web service that manages the
role and helps to reduce the load on the
services,
In memory management, cache has a very important
frequently used information.
improves performance and scalability on the database tier by caching
the
Amazon RDS
access as that of MysQL, Oracle, or
Amazon RDS (Relational Database Service) provides a similar
Microsoft SQL Server database engine.
Amazon RDS.
The same queries, applications, and tools can be used with
manages backups as per the user's instruction. It
It automatically patches the database software and
also supports point-in-time recovery. There are no up-front investments
required, and we pay only for
the resources we use.
Amazon EBS volumes can be maximized up to 1 TB, and these volumes can be striped for larger
volumes and increased performance.
Provisioned IOPS volumes are designed to meet the needs of database workloads that are sensitive to
storage performance and consistency.
Amazon EBS currently supports up to 1,000 1OPS per volume. We can stripe multiple volumes together
to deliver thousands of IOPS per instance to an application.
Auto Scaling
The differenco between AWS cloud architecture and the traditional hosting model is that AWS can
dynamically scale the web application fleet on demand to handle changes in traffc.
In the traditional hosting model, traffic forecasting models are generally used to provision hosts ahead
of projected traffic.
In AWS, instances can be provisioned on the fly according to a set of triggers for scaling the fleet out
and back in.
Amazon Auto Scaling can create capacity groups of servers that can grow or shrink on demand.
in AWS
A5.6.1 Key Considerations for Web Hosting
Folowing are some of the key considerations for web hosting-
No sacurlty concerns
lhost ia lockod down.
AVS providon a moro Becurod nodol, in wlhich ovory
tho architecture, and aa 1
doslgnod for onch typo of host in larg
Aazon EC2, aoeurity groupH aro acce88 amon
onablo minimum
bo crontod to hota
Varioty of simplo andd tiorod aocurity modola ean
within your architocturo ns por roquiromont.
Using Cloud Computing you can also host and manage your applications.
Improvod software and har vare performance : Through cloud computing solution one can easily
mako out what will bo the bost software and hardware specification for the better performance of te
application running on the cloud.
Flexibility and affordability : Cloud Computing provides its users with a wide variety of deploymet
modols and functions through which they can chooso the best options for their applications. Clovd
sorvices aro much more affordable.
Incrensed uptime and availability: It is highly available and has a great uptime which help's
managing more amount of traffic at a particular time.
Better collaboration with real-time sharing: Cloud computing has great real-time sharing.
Cloud Computing is available for every kind of users who want to deploy their applications onto
cloud service.
aquireio
Stony
ALM
Application
Lifecycle
tew
Management
cer
pue Stories
pejewon
p ackI
Mar
ueuuebeueyN
peje/beui
te an
I
aa)wou
uJoInU) 9
JuQwdoje
SPPU-N
New Syllabus wef academic year 22-23)MP7-129)
Tech-Neo Publications..A SACHIN SHAH Venture
Development)...Page
Application no.20)
Cloud Computing (SPPU-SEM 7-E&TC) (Cloud Environment and
DAdvantages
hardwa
to save substantial capital costs as it does not need any physical re
1. Cost Saving: It helps you
investments.
your service quickly in fewer clicks.
High Speed: computing allows you to deploy
QCloud
2
cloud computing.
3. Backup and restore of data: Backup and restore of data is easy in
4. Reliability : It is highly reliable to use cloud computing solutions.
Disadvantages
internet
1. Performance can vary: Its performance depends on the speed and quality of the
2. Downtime: Cloud Computing Solutions has a great span of downtime.
Cost estimation simply means a technique that is used to find out the cost estimates.
n
The cost estimate is the financial spend that is done on the efforts to develop and test software
Software Engineering.
Cost estimation models are some mathematical algorithms or parametric equations that are used to0
97estimate the cost of a product or a project. d 1i en
d sitsb iiot
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
(Cloud Environmont
models
odels and Appllcation Dovoloprmont)...Pago
chniques or are availablo for on Devolopment)... no. (5-21)
Vario
ous cost estimation,
below; nlso know Cost Estimation Models
shown
5 Cost Estimatlon
Modols
Empirical Houristic
Estlmatlon Techniquo
Techniquo Analylical
Estimatlon Technique
Fig. 5.8.1:CostEstination
Model
In technique, the relationship among different project parameters is expressed using mathematical
thise
equations
The popular heuristic techníque is given by Constructive Cost Model (COcOMO). This technique is also
used to increase or speed up the analysis and investment decisions.
Second, if the standard time is available from some other source, then these sources are applied to each
element or component of work.
Third, if there is no sueh time available, then the work is estimated based on the experience of the
Work.
FU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Development).
Application ge ( no.
(Cloud
Environment and
Cloud Computing (SPPU-SEM 7-E&TC) oject.Hence,
about the project
basic assumpt10ns
making cortain the
In this technique, results are derived by
analytical estimation techniquo has some scientific bas nodel.
analytical estimation nou
alstend's software scionce is based on an
AZURE CORE
CONGEFS
MICROSOFT AZURE CLOUD SERVICES
A
7
GQ What is Microsoft Azure Cloud Services
or services that wa
provides a wide variety can u
Client
sQL database
Load
balancer
DocumentDB
Cluster
Load management
DevOps
balancer Storage blob
Virtual
***************. neiwot.....
Fig. 5.9.1: Microsoft Azure
enture
(SPPU-New Sylabus wef academic year 22-23)(P7-129) Tech-Neo Publications.A SACHIN SHAH
SPPU-SEM 7-E&TC)
(SPA
omputing loud Environment and Application Devoloprnent)..Pago
Services
ces
o.(
fAzure
Compute
eervices It includes the Microsoft Azure
Cloud Services, Azuro Virtual Machines, re
and Mobile Services,
bsite,and.Azure which processes the data
on the cloud with the help of prmerD
processors
s: This
rvices: This service is used to store data over
the cloud
that can be Bcaled according o u
Data.
onts. It includes Microsoft Azure Storage (Blob, Queue Table,
and Azure File services), Azure
Database, and the Redis Cache
sOL
lication services: It includes services, which help us to build and operate our application, like the
:
MicrosoftAzure is one of the biggest worldwide cloud computi platforms. It has the prestige and
majesty that Microsoft products deserve.
Azure,
Aaure,with a countless number of services, is really a great cloud platform that should be explored by
any developer entering the
cloud arena.
From basic mobile app hosting to full virtualized networks and AI databases, Azure has a wide breadth
of uses for development teams. It empowers organizations to meet current and future business
challenges. For many, it bridges the gaps between what is possible in science fiction to the real world,
bringing "smart" technology to businesses and software development firms.
. Microsoft Azure has so many features and use cases, that it can be difficult to fuly diseuss them in such
a small forum, such as this article. However, this will not stop us from going ahead and trying to take a
deep dive into Azure's countless technology oceans.
Azure Cloud currently includes more than 100 services, most of which mainly fall in these services
categories:
Compute Services: Cloud computing vith a special focus on Virtual Machines, Containers, and
Serverless Computing that you can scale on-demand and on a pay-as-you-go basis
Networking : Private and public networks; connect on-prime networks with Azure. VPNs and
load balance features.
Storage : Either by disks, file, Blob, or archive. Attach to VM and database. Also, expand and
shrink per needs.
oMobileApps : Create and deploy native mobile apps across Azure platforms with the help of
gnitive and AI services.
Databases : Choice ofvarious types of databases, including MysQL, MariaDB, PostgreSQL, and
COSmos DB. Developers can build a new database or migrate existing databases.
New Syllabus
w.e.f academic year 22-23)P7-129) Tech-Neo PublicationsA SACHIN SHAH Venture
Application Der
Development)..Pa no.(5-2A
Environmont and
(Cloud applications with additio
Cloud Computing (SPPU-SEM 7-E&TO) web
deploy wobsites and special
Cloud Web Hosting: Create and
you store and
nd analyze
features.
of data, Azure heips tha
amount
51g :
Data yourontorprise has a hugo
data for botter decision-making. on a managed platform
and deploy applicatiOns
Hosting and DevOps : Dovolop, run,
APP deploy disi
cluding SAP and SQL. sorvices and uOdes
d
prebuilt cognitive
: Throw
Al and Machine Learning
to monitor.
applications.
smart devices and manago them with lol Azure hubs im
0Tintegrate sensors and
assets. strate workloma
to orchestrate
connect with applications
Wo
services, and
lategration: Deploy logic apps andparadigms like Mixed Reality.
managema.
tor business. Also, try new software Alongside Azure identity ent for
Included in the Azure infrastructure and services.
Seeurity :
account management.
better control, including centralized
ARRLIANGE
WINDOWS AZURE PLATFORM
5.10
GQ. What is Windows Azure Platform
data centers and
Azure platform can also be deployed as an appliance on third-party
The Windows
physical servers of the datacenter.
constitutes the cloud infrastructure governing the
Microsoft-specifed
Appliance includes Windows Azure, SQL Azure, and
The Windows Azure Platform
configuration of network, storage, and server hardware.
The appliance is a solution that targets governments
and service providers who want to have their owm
cloud computing infrastructure.
Windows Azure
( O-
SCompute Storage
Blots, Table, Queues
Fabric controller
N
nunication between Azure internal compononts aro always protocted with SSIL and vía
Communica mutual
authentication.
Toassure data confidentiality, Azure provides isolation at difforont lovela: hyporvisor, root 0S, guest
VM, and fabric controller.
Customer access infrastructure is also logically isolated from customor applications and ntorage.
.
,
Criticalinternal stored or transmitted data can be encrypted with the NET Cryptographic Service
Providers (CSPs) provided by the Azure SsDK. Azuro's storago Bubeyatom provides data deletion
a
operations for customers. If the execution of data delete operation is auccoRful, all the refereneesto
that associated data item are removed and the data will not be accossible via tho storago APIs.
Chapter Ends
O00
bobulbal 0e96 HA (
UNIT VI
Distributed
CHAPTER 6 Computing
and
Internet of Things
Universlty
Prescrlbedsyllabus
Distnbuted Computing.
Q.. **********************************************s************s
61
6.1.1 Distributed Computing Definition... n**oiu*ocesse*************
6-2
************* ****s********************.****************************
GQ. What is Distributed Cloud ?.. ******e*********************************************************************** ***** 5-2
6.1.2 How Does Distributed Computing Work
?..******************************************************** *******
6.1.3 What Are the Advantages of Distributed Cloud **********
Computing ?.
6.1.4 Four Types of Distributed Systems. *********************
.6-3
*****************************************************
*****************************************
&-8
6.3.1 Wireless Sensor Network (WSN).
******************************************************************************
6.3.2 Cloud Computing. ****** 6-8
*************************************************************************************************************
6.3.3 Big Data ***** coe 6-9
Analytics.... ******************************************
6.3.4 Communications Protocols.************************************************
*****a************44a*a*******************.
****** .6-10
****************************************************** 6-10
6.3.5 Embedded Systems.
0.4 Innovative Applications of the Internet of 1
hings ******************************************************************************as
6-11
GQ. What are the different innovative application of loT ?..****************************************************
6.4.1
6.4.2
What is loT ?.. **********************e***********************************ssssnssssss**ssssasnanss**ssssssese***********s
Innovative Applications of loT..
. .6-11
6-13
03 Online Social * s***********************sssnsaannee
*
6-13
6-
and Professional Networking.
a.What
4********************************* ************************a*
is Online Social and Professional Networking ? ..***s************************************************************+*
-17
6.5.1 The Social Network and Cloud Computing..
.6-17
***************** *** ** ***
**
*************+t**ne -17
6.5.2 The
need for Professional Networking. ** *******""*******************************************************. mms 18
6.5.3
Where canl build my Network Online 7... ************sssssssnsses***ssassssee**sssssnasa***********
**assuuun 6-199
6.5.4
6.5.5
What are the benefits of Online Networking over Traditional Notworking ? . ***** -200
Tips for Online Professional Networking.
6-20
Chapter Ends.ssuanesssnananesaan m. 6-21
Internot.of Things)...Pag no.
Computingand (8-2
(Distributod
Cloud Computing (SPPU-SEM 7-E&TC)
What doesn't
What works
functionalities
Fig.6.1.1: Distributed Computing working
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) e Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
Compouth
outing
(Dlstrbutod
Coud Computing
How Does Distributed Computing andIntornetof Thingo). Paga no. (6-3)
s.1.2 Work ?
omputing
Distributed computin connects hardware
and softwaro
laboration to achie
collaboration achievo a singlo roRourcos to do many
Work in goal through thinga, including
optional resource
e access rights per the authority lovel sharing
Mana of users;
reso os. e.g., distributed computing
Keep software, open
currency that lets for further development;
Achieve concurrency multiplo machines
work on tho same
computing resource
resources procoBs;
Ensure alll
computing are scalable and
oporate faster
when multiple machines work
and handle errors in connected components
Detect and,
together
of the distributed
doesn'tfail.and stays fault-tolere network o that the network
distributed
Advanced distr systems have automated
processes and APls
to help them perform
the customizati
tion perspective, distributed better
From clouds are a boon
for businesses.
Clo service
Maasd providers can Connect on-premises systems to
can tran
transform the cloud computing stack so that
enterprises
es their entire IT infrastructure
without discarding old setups. Instead, theg
can extend existing infrastructure through comparatively fewermodifications.
UItimate Scalability
Al nodes or components ofthe distributed network are independent computers. Together, they form a
distributed computing cluster.
You can easily add or remove systems from the network without resource straining or downtime.
Scaling with distributed computing services providers is easy.
Distributed clouds allow multiple machines to work on the same process, improving the performance of
Such systems by a factor of two or more.
Client-Server Model
directly then formats the data and renders it for
Inthis model, the client fetches data from the server
directly submit their edits back to the server.
the end-user. To modify this data, end-users can
. For example, companies like Amazon that store customer information. When'
a customer updates their
address or phone number, the client sends this to the server, where the server updates the
information
in the database.
server is
Task
O Likely Data Sink
Task server
Request Request-
Response
Response-
Interaction- Interactlon
Computin9 Computing Computing
Node Node Node Computing nodes are
data source and sinks 97
O
Interactlon-
o w2m21oise 2av0qt.00Fig. 6.1.2: Distributed Computing
Nodes n 2 ib o ba
Peer-to-Peer Model
server model, this model comprises peers. Each peer can act as a
client and
.Tnlike the hierarchical
elient or server, depending upon the
request it is processing. These peers share their computing power,
decision-making power, and capabilities to work better in collaboration.
collaboratively work to make decisions regarding adding, deleting, and
.For example, block chain nodes
updating data in the network.
.
Ttis classified intó 4 different types such as
1. Public Cloud 2. Private Cloud
Community Cloud 4. Hybrid Cloud
Tech-Neo Publications.A SACHIN SHAH Venture
*New Syllabus we.f academic year 22-23)(P7-129)
of Things)...
.
...Pagono.
Cloud Computing (SPPU-SEM Computing and Internot (6-6
(Distributod
7-E&TC)
6.2.2 Distributed Computing
autonomous computers
distributod and they
Distributod computing rofors to solve a problom ovor techniquo allows to
which allows multipla
computing
communicato botwoon thom overa notwork. It is a
computors to communicato and work to solve a singlo probio a 8inglo computan
computational tasks fastor than using a8 it
Dis holps to achiovo
Computing
takes a lot of timo. computo
distributinga singio a5 mong ers
of distributod computing aro thod Invocation
n characteristics Mothod for distribt
ibutod
Procoduro calls and Romoto
progress the work at samo timo, Romoto
computations.
It is classified into 3 different types such ns
1. Distributed Computing Systems
deup ab 0 ir
2. Distributed Information Systems
3. Distributed Pervasive Systems
Computing and Distributed Computing
.2.3 Tabular Difference between Cloud
Distributed computing
Sr. Cloud computing
No.
Distributed computing refers to solve a problem
1 Cloud computing refers to providing on |
over distributed autonomous computers and tha
demand IT resources/services like server,
communicate between them over a network.
storage, database, networking, analytics, |
software etc. over internet.
can be saidas
2. In simple cloud computing can be said as a In simple distributed computing
which allows to multiple
technique
computing technique that delivers hosted computing
over the internet to its
computers to communicate and work to solve a
services
users/customers. single problem.
There are many benefits of cloud computing There are many benefits of distributed
computing
4
|
like cost effective, elasticity and reliable, like flexibility, reliability, improved performance
economies of Scale, access to the global etc.
market etc.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC) Oistributed Computing and Intemet of Things).... Page no.
(6-7)
Computing
ting
Coud Cloud computing
Distributod computing
Definition Cloud computing defines a new way of | Distributed computing contains muliple
nputing based on the network technology. software components from multiple
Cloud computing takes place over the different computers which work together
common network like internet. It usually | as a single system. Cloud computing can
comprises of a collection of integrated and be referred as a virtualization achieved
networked hardware, software and internet| from distributed computing.
infrastructure resources.
Goals Reduced Initial Investment and Resource Sharing
Proportional Costs Openness
Increased Scalability Transparency
Increased Availability Scalability
gr
Increased Reliability
ypes
Public Clouds Distributed Computing Systems
Hybrid Clouds
.
SPPLU-Ne
Syllabus
wef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Things)...p
Internet ofThings).Page no. (6-8
Computing and
(Distributod
Cloud Computing (SPPU-SEM 7-E&TC) Distributed Computing
Cloud Computing distributed amongst
A task is
nfigurablo machines for
different the
Charactoristics It provides a shared pool of computation job at the same
time
computing resource8.
modol is usod
to Tochnologies such as Remote
An on-domand notwork
Proceduro calls and Remote Mothod
provido nccess to congh.
provisioned by the Invocation are used
Tho clouds are distributed
computations.
Service Providors.
notwork access.
It provides brond of nodesthan
Higher level of failure
less control parallel machine.
Disadvantages More elasticity means a dedicated
clouds.
especially in the case of public Few of the
algorithms are not able to
services may networks.
Restrictions on available match with slow
cloud
faced, as it depends upon the computing job may
be Nature of the
provider. overhead.
present to0 much
THTN
INTERNET OF THINGS
ENABLING TECHNOLoGIES FOR THE
6.3
Aling Techn
What are the 1OT Enabling Technologi
GQ **
and to each other.
the concept of connecting devices to the internet
Internet of Things (IoT) is people, all of which
to the giant network of connected things and
First coined in 1999, the term refers
share data amongst each other.
smartphones to automobiles and
everything in between.
Today, IoT objects have come to include
IoT devices capture each day are
processed into actionable
data points that billions of
The innumerable known,
analytics. While the reciprocity between AI and IoT is relatively well
insights with the help of
enable the Internet of Things.
there are other technologies at play that
technologies are
IoT (internet of things) enabling
1. Wireless Sensor Network 2. Cloud Computing
5. Embedded System
A WSN comprises distributed devices with sensors which are used to monitor the environmental anu
physical conditions.
.A wireless sensor network consists of end nodes, routers and coordinators. End nodes have several
sensors attached to them where the data is passed to a coordinator with the help of routers.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
ongUting
ding (Distributed Compu
sO acts as the
the gateway and Intemet of Things)..Page no.
ordinator also gateu
that connects WSN (5)
dThecoord to the internet.
Bxample:
her monitoring system
l
moisture monitor system
Surveillance system
Health monitoring sy
Cloud Computing
.3.2
dos us the means by which we can access applications
mee
provides as utilities over the internet. Cloud means
,It ething which is presenti in remote locations.
someth
Characteristics
Broad network
access 2. On demand self-services
1.
3.
Rapid scalability 4. Measured service 5. Pay-per-use
Provides different services, such as Iaas (Infrastructure as a service) Infrastructure as a service
provides online services stuch as physical machines, virtual imachines, servers, networking, storage and
data center space on a pay per use basis.
. Major IaaS providers are Google Compute Engine, Amazon Web Services and Microsoft Azure ete.
Ex: Web Hosting, Virtual Machine etc.
.Paas (Platform as a service) Provides a cloud-based environment with a very thing required to support
the cost
the cómplete life cycle of building and delivering West web based (cloud) applications without
and complexity of buying and managing underlying hardware, sofbware provisioning and hosting.
Computing plattorms such as hardware, operating systems and libraries ete. Basically, it provides a
platform to develop applications.
(SPPU-New
Syllabus w.e.f academic year 22-23)(P7-129)
a
Tech-Neo Publications..A SACHIN SHAH Venture
Things)....Paac
Computing and
Internetor
Cloud Computing (SPPU-SEM 7-E&TC) (Distributod
Woarabio
Home technolcoy
Music ghtlng
Smart
phones
Online
ntene
shopping thinge
Home and
applicatlon
In fiight
Servces
Persorna
Computer
(Analytics
SPPU-New
Syllabus w.e.fi academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Things)....Parn
Intarnot of Pagono. (6-12)
Cormputing and
(Distributed idontifiors
ers and people's nbilit
a
internction ity to
Cloud Computing (SPPU-SEM 7-EATC) unique
doevices, or human-to-computer
The Internot of Things providen oljecta, computing
human-to-htumane or nccidents and
congestion, nci
transfor data ncros8 n network without the flic weathe,
monitorn trn
camera
A traffic camera is nn intelligent devico. The traffie.
raffic
city'a monitoring
cOnditions and can accoss it to n common entranco. informntion to the
transmita
cameras and
his gateway recoives dnta from such
system.
15.
Netwotk
gateway
City wldo
monitorin9
system
Traffic
camera Management S)ystem.
Fig. 6.4.2 : Smart Tralic
COnnected to the nationa!
mal
to repair a road that 15
has decided 1s sent to the tra.
rafñe
or example, the municipal corporation the national highway. The insight
congestion to
ghway. It may cause traffic
monitoring system information to oth
estimate their impact, and relay
situation, devices and
ne intelligent system analyzes the live instructions to drivers by Smart
highway. It generates
Cities connected to the same
radio channels.
City B
City school
City A
TSmart Home
100%
2 Wearables
63%
3Smart City
34%
Smart grid
5Industrial
28%
Internet 25%
6onnected
Car 15%
Connected
7 6%
Health ttaldn
8 Smart Retail
2%
Smart Supply
T 1 Chain
2%
3 9924 Fig. 6.4.4:Internet of Things Applications
1. Wearables
.Wearable technology is the hallmark of loT applications and one of the earliest industries to deploy
IoT. We have fit bits, heart rate monitors and smartwatches these days.
Guardian glucose monitoring device has been developed to help people with diabetes. It detects
glucose levels in our body, uses a small electrode called the glucose sensor under the skin, and
relates it to a radiofrequency monitoring device.
2. Smart Home Applications
.The smart home is probably the first thing when we talk about the IoT application.
see the AI home automation is employed by Mark Zuckerborg.
The example we
Alan Pan's home automation system, where a string of musical notes uses in-house functions.
3. Health care
.IoT applications can transform reactive medical-based aystems into activo wellneas-bascd eystoms
rese arch lack important roal-world information. It usos
Resources that are used in current medical
volunteers for clinical trials.
controlled environments, leftover data, and
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Things)....
Pao no. (6-1
Intornot ofThings)..Pago
(Dlotributod
Computing and 14)
availabili
ability. IoT focuses
Cloud Computing (SPPU-SEM7-E&TC) precision und on
dovico's power, works.
tornet of Things improvcs tho loT-onablod care device
Hero'a how tho
systoms rathor than just toola,
g
Remote Smart
dovice
Connectlon Cloud Signal
Caro Care
Gateway
Devices Sensors
Scnsor Network
Fig. 6.4.5: liealth Care
4. Smart Cities
smart city.
Most of you have heard about the term
services.
Smart city uses technology to provide social services, promoting
stability andnd
improving transportation and
The smart city includes
giving voice to their citizens.
Delhi. Even global issues, such as an
clean
very different from
The problems faced by Mumbai are occur in varying intensit
declining quality, and increasing urban density,
drinking water, air
cities. Therefore, they affect every city. town and
Internet of Things to analyze the complex tactors of nd
Governments and engineers use the
waste control and emergencies.
each city. IoT applications help in the area
of water management,
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) TeTech-Neo Publicatiations..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
(Distributed
1Conpu
ting
Alto,
.San Francisco,
the firet city to acquire
s
Computing
and Intornot of
Things).Pago no (6-15)
Palo und the same 1block on the streots the traffic approach. Ho
of parking spots.I
in seurch realized that most cars
oa ction in the city. Thus, tho sensors
traf
pass Occupancy statu to the cloud of
were installed
at all
It is the primary cause of
parking areas in the«city. These
t
sensor each spot. the
lution involves
volves the use of sonsor
arrays
This that collects data
and usos it for manypurpoBes
Agrlculture
year2050,
050, the world's growing population
,By the arge population, is estimated to
agriculture needs to have reached about 10 billion. 10
feed such. marry technology
possibilities in this area. One and get the best results. TherTe
are many of them is Smart
Greenhouse.
taa techniques grow crops by environmental
Farming
parameters. However,
nduction losses, energy losses and labor
costs, making it less
manual handling results
in p effective.
reenhouse makes it easy to monitor and enables
The gre to control the climate
Implements Control
inside it.
Acton
Remote
Commands
Connection Sendors Controls
gateway and
Actuators andSWITchgear
On/off a.cic.srt
Monitor
Display
Smartphone
used as
remote control
Inside the greenhouse
Fig.64.7:Smart Agriculture System
6.
Industrial Automation
It is one of theareas where the quality of products is an essential factor for a more significant
investment return.
Aanyone can re-engineer products and their packaging to provide superior performance in cost and
customer experience with IoT applications. IoT will prove as a game-changor.
n industrial automation, IoT is used in the following areas
Product flow monitoring
oFactory digitization
Inventory management
Safety and security
SPPU-New
Syllabus
w.ef academic year (P7-129) eTech-Neo Publications..A SACHIN SHAH Venture
Pagen
Internet of Things)...
and Intemetot ng
(Distributed Computing
Cloud Computing (SPPU-SEM 7-E&TC)
Logistics and Supply Chain Optimizntion
Quality control
Packnging customization
Industrial Automation
loT Applications in
Product Ouality testing9
in various stages of
Creatos digltal manufacturing cycle
factories
Improvos Lino-of Packaging optimization
work
Monitors in near
Command In
unlis real-time through
out tho supply
Smart tracking for chaln
products in-transit
o Notifies users on
Provides cross
channel visibility
deviations in delivery
into Inventories
plans
Automation.
Fig. 6.4.8 :Smart Industrial
7. Hacked Car
WAN network.
connected car is a technology-driven car with Internet access anda
A
benefits such as in-car infotainment, advanced navigation and
The technology offers the user some
fuel eficiency.
8. Healthcare
gathers and transfers health
real-time monitoring with the help of smart devices. It
Healthcare do
levels, weight, oxygen, and ECG.
data such as blood pressure, blood sugar
mobile application in case of any emergency.
The patient can contact the doctor by the smart
9. Smart Retail
IoT applications in retail give shoppers a new
experience.
checkout system can read the tags of the
Customers do not have to stand in long queues as the help.
customer's payment app with IoT applications'
u products and deduct the total amount from the
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventu
Cloud Computing (SPPU-SEM 7-E&TCI
(Distributed Computing and Intenot of Things)....Page no.(6-17)
Internet-connected
devices go from
6 million to billions
Business Insider Intelligonce in just one year
ostimatos 24 billion loT
300 billion in revenue devices will install and generate more una
in the future.
cO.
- --
What is Online Social and
- Professional Networking
?
Social networkin8, as
shown by the massive
many people. user groups, has become an everyday
part of the ves o
Some groups als0 Surpass
the population of large
Facebook, for example. nations, with more than 400 million
active users on
Social networks offer a
medium to promote
real world. For example, user contact and sharing, thus modeling
there is a multitude of relationships in ne
the Facebook credentials of integrated applications and some organizations
a user for authentication now use
networking has now expanded rather than requiring their credentials. Social
beyond contact between
friends.
Via storing heavy multimedia
content in cloud storage systems,
usability. social networks help improves
Internet
The most popular material on
social media is videos
to them. For all of their resource and images, which utilize the entire space
needs, they have the potential available
to slow down applications and serverss.
Vendors of cloud computing,
such as Salesforce and Amazon,
including Customer currently provide numerous services,
Backup costs and data recovery ts have been significantly reduced by cloud
storage. When data is
processed in one location, there is a high probability of losing
the data in times of catastrophe.
It
becomes next to impossible to recover missing data. With cloud computing,
however, the data is stored
on remote servers and remains available throughout the world. This allows
social networking websites
to store their users' private information that they cannot afford to misplace
under any circumstances.
3 ti.i
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Intornot of Things)..Pago
Cloud Computing (SPPU-SEM 7-E&Tc) (Distributod Computing and 6-18)
6.5.1 The Social Network and Cloud Computing
yoars ineiude cloud computing and
DOme or the most controvorsially dobated tochnologios in recont
social networking sites.
througn ho wo 1 DT 28 a potontinl
ne potential for tho uso of poworful on-domand computing tools
catalyst for the growth of tho world economy.
The cloud is a fact and will continue to be tho most
distinguishod tochnical advancoment, changing #
way business is conducted.
computer science
-to-peor computing. It is a field of
Social cloud computing is also referred to as peor-to
loasing ot computer resources
that generalizes cloud computing to include the sharing, bartering, and
system to owners and operators,. It
through peers who are checked by a social network or roputation
economy of cloud
extends cloud computing to include those interested in engaging in the sharing
services outside the boundaries of formal commercial data centers run by cloud providers.
n turn, this leads to more choices, higher economies of scale, while offering additional benefits for
hosting information and computing resources closer to the edge where they might be most needed.
There are many applications for cloud computing, and some of them are still being 10und, for example-
Social networks can be hosted in a cloud environment, and scalable apps can be used. Via storing heavy
multimedia content in cloud storage systems, social networks help improves Internet usability.
Vendors of cloud computing, such as Salesforce and Amazon, currently provide numerous services,
including Customer Relationship Management (CRM and Enterprise Resource Planning (ERP). When
they deliver these items through cloud storage, without buying standalone software or hardware,
consumers can use the simplicity and scalability of the system.
Cloud storage is useful in the event of a catastrophe by reducing the expense of data backup and
recovery.
Social networks and messaging applications such as Snapchat rely on anonymity and will potentially
use these tools to provide their users with a more reliable and faster service. For data analytics, social
networks use cloud computing.
"Networking" has been a business buzzword since the 1970s, and it remains a fundamental element of
the modern business world. However, what networking looks like has changed significantly since then.
These days, you don't necessarily need to get in the room with people you want to connect with. You can
build your network online instead.
(SPPU-New Syllabus wef academic year 22-23(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventur
Cloud Computing (SPPU:SEM 7-E&TC
ioributod Computing and Intomet of Things).. Pago no. (6-19)
Another advantage ofa strong business
notwork ia that it ompowora you to build your protile. IOu
become a well-known name in your
fiold, Bomoone who
influences others and can make a real lnpae
a in
their area of interest.
When you know and are known
by chango-makers more
ikely to hear about exciting and poworful people in your industry, you
opportunities.
You might be the first to be
informod about à new
position, or you may even be specilicauy app d
to participate a
in project.
If the benefits are the same,
what makes online networking different? Well, you can now
connections and access opportunities
on an international level without leaving your own
ainake
none
The growth of online networking
LinkedIn is the obvious choice for social media for business purposes; it was designed with networking
in mind. However, there may be other options to explore. It's also possible to
build a dedicated following
on platforms such as Instagram and Tik-Tok Creative industries have especially
flourished there.
If you want to speak about specific issues, you might consider attending online conferences. We
are
more adept at using online oonferencing sofbware than ever, so don't assume that youll just be listening
to presentations. It's also possible to take part in "fireside discussions" with smaller groups of fellow
You can build deeper relations. with a select group of people if you join an online mastermind. This
involves meeting regularly to discuss pre-arranged topics over a set period of time.
One purpose of a masterind is to problem-solve collectively. You can ask others for their perspective
on issues affecting your career. hois gru th yt t.on 0 929te un .i w
(SPPU-New syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..ASACHIN SHAH Venture
Intenet s)..Page no.
ot Ihings)...Page (6.2
no. (6-20)
(Distributed Computing and
Cloud Computing (SPPU-SEM 7-E&TC) or
Traditional Networking
Networking over
0.5.4 What are the benefits of Online
sities or th pandemic, there are
boom was drivon by tho necessities
Although the recent online networking
reasons to prefer it over traditional marketing:
2. It's more convenient. same connections
conferences, you can stay at home and make he
ather than spend time traveling to too.
parts of a conference are relevant to your business goals,
LES easier to pick and choose which
97
4. It's low-cost. over
place dinner and
. conferences can be expensive. At these events, networking often takes
Events and
you network online, you
don't need to pay for this or for
drinks, which can incur additional costs. When
travel.
6. You can expand your range.
to events in your immediate area.
Online
7. With traditional networking, you're usually limited
networking allows you to build connections all around
the world. As business becomes more
international, it makes sense that networking follows suit.
8. The internet is democratizing.
For example, access to
9. During traditional networking events, a hierarchy was often easily observable.,
everyone online has equal
the most influential people in the room may have been restricted. However,
status, at least in theory.
10. It's less intimidating.
70V i
11. When you're a newcomer to your industry, the prospect of approaching seasoned professionals in person
can be daunting With online networking, you don't have to walk across the room, strike up a
conversation, and introduce yourself in the same way. The dynamies can be very different.iat
4 The only way to stand out online is to show your unique personality. However, you shouldnt Suy
5.
anything that could endanger your career. Be wary of using shock tactics to get attentioni.
Respond to other people's requests.
e
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
ConpUling
aa
(Distributod
Cormputlng
lationships havo to and Internot of Things)..Page
no. 21)
coud
Remember be mutually
oftor
Jea often asking for support boneficial.
you're People will
but novor be less inclined to join y
networkif offering it.
your connections,
Connect
can be helpful to those in your
way you network is by
introducing them
similari .atorests into small groups to stimulate
One le
to one another. su pr
more focuaed
wath
i boundariesa and take it slow.
conversations.
ect
desperate to add someone to your
ay be network, but desperation
Youi people'scues If oy're not responding off-putting. Be attentive
can be off
other right now, circle bnck a
to in a while. Don't haras8 anyone or
force relat
lationships too quiclly.
tryto
aline connections.
Deepen your
LAB Manual
Study 1
Casestorage in private cloud.
statement: Data security
TODlem
wherein resourcos and appiication plattorms are
computing
lOud Computing is a form of distributed bas18.
and pay on utilization
distributed over the Internet through on domand companies/organizations to
centres are provided to the
a Storage is main feature that cloud data ready to use cloud technology
due to lack of
are not
preserve huge data. But still few organizations challenges, advantages and
techniques along with few security
security. Here we describe the different security issues and privacy
protection affairs
analysis of data
also disadvantages. It also provides the from-unauthorized users, managing sensitive
by preventing data access
related to cloud computing
stored.,
data, providing accuracy and consistency of data
Owner/
consumer
Token
Data Data
verifier generato
Processor
Fig. 1
It is model that
services to network through internet.
Cloud refers to the network that provides
pay-as-you-use-service. National
enables the characteristics like on demand self-service,
on-demand
defines cloud computing as a convenient,
Institute of Standards and Technology (NIST)
computing resources for storage services.
access to the cloud like public, private, hybrid and
Deployment models define purpose, applications and
community.
Platform-as-
models like Infrastructure-as-Service (TaaS),
Service models are categorized into the three
a-Service (PaaS) and Software-as-Service (SaaS).
which includes Data Storage. It is managed by a cloud
Cloud is an enormóus shared computing resource
service provider on cloud data servers built on virtualization
techniques known as utility storage.
(SPPU-New syllabus wef academic year 22-23)(P7-129) 9Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC) (Lab Manual)..Pago no. (L-2)
Dven though there are many advantagoa of cloud storage, fow companics are still in dilemma to use the
benefits of cloud computing technologien for not having proper security.
The main objective of tho cloud storage is to store the data safely in the free space and fetch the data
whenover requested by the cliont.
Security and Privacy are tho distinguishod mothods used to
secure the information from attackers.
Third party is used as sorvice providers to grasp the
data sont by owner by, offline .mode 1n cloua
environment.
Sometimes cloud may reveal tho data by accidentally for
unauthorized purpose which strikes the
results of privacy and confidentiality. Whon there is no direct
link between clients and servers, master
server comes into picture.
Chunking operation is used for storing duplicate records to give data
backup from improvements.
Clients performs dynamic data operations to
store data as tokens in master server and the records are
filed in slave servers using token generation and
merging algorithms.
Cloud storage service often provides applications,
services to users to access the storage capacity. lt is
hosted by Storage Service Provider (SSP) [along with the
combination of Storage Servers. This SSP is
plotted on storage virtualization architecture.
SSP provides, manages the storage infrastructure to store the data of third party and is arranged as ann
online storage service provider, virtual storage
service provider or cloud storage service provider.
SSP has a facility that provides large storage
infrastructure i.e., Storage Area Network (SAN) and it is
distributed between the users/enterprises.
A SSP provides aspecific storage capacity that can be scaled depending upon user
requirements, It may
"be usedfor various purposes such as data backup, data recovery,
sharing and collaboration of various
consumer/businesses well as with other applications.
Multiple-Replica Provable. Data Possession (MR-PDP) solves the
assumption that multiple copies of
data are stored instead of single copy.
To overcome this assumption a protocol
is used called a challenge-response protocol to verify the
number of replicas ofe4the file. MR-PDP is more efficient for storing replicas
than a single replica PDP
scheme.
292lizio a7sve d 213i en
storage
Data retrieval Oze3
Trusted third
elzzna'} bi? o otii Ergments
party Encryption
Fles
Data Owner Authorised
1 users
Fig. 2
(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(Lab Manual). ..Pag no.(L-3)
Cloud Computing (SPPU-SEM 7-E&TC)
ed on clou
Case Study / Ubiquitous based
2 cloud.
IoT
Problem Statement: Appllcation of onablod tho attonti.
attention toward the
paradigm has supervision. f
continual atients
The introduction of porvasivo hoalthearo clinical
noodfor rogular
indepondent residing of oldorly pcoplo und tho
undorsorvod locationB nade available thr
through
Or habitants at romoto, isolatod or requirod to be made a
sorvicos aro
olectronic henltheare
OXt, advancod
network anytimo, whorovor and to anybody. pervasive and ubios:
concorns tho utilization or
onvironmont howover
881stive circumstano
technologies for delivering the above sorvices. data about a patient's to
transmission of clinical conditiong.
CSS technologies enable the roal time can detect certain
available that improvement
crCgavers, numerous portable devices
are
a user's stomach. But this and
so on from
leval, and
rate, blood pressure, breath alcohol
management througn nOD
deployment of health information attention coward
paradigm has enabled the
tom
pervasive healthcare
ntroduction The introduction of the clinical supervision of continualaual
people and the need for regular
the independent residing of elderly
underserved locations.
patients or habitants at remote, isolated or available throuoh. a
healthcare services are required to be made
ln this context, advanced electronic
network anytime, wherever and to anybody. ubiquitou
however concerns the utilization of pervasive and
A medical assistive environment
technologies for delivering the above services. circumstance t
transmission of data about a patient's
Wireless technologies enable the real time
caregivers
certain clinical conditions pulse rate, blood
Numerous portable devices are available that can detect
stomach. But this improvement and deployment
pressure, breath alcohol level, and so on from a user's
of health information management through mobile
devices introduces several challenges : data storage
and management (e.g., physical storage issues, availability and
maintenance), interoperability and
(e.g, permission control,
availability of heterogeneous resources, safety and privacy
data anonymity, etc.), unified and ubiquitous access are a few to mention.
One potential solution for addressing all aforementioned issues is the introduction of Cloud Computing
concept in digital healthcare systems.
Cloud Computing provides the facility to access shared resources and common infrastructure in a
ubiquitous and transparent manner, offering services on-demand, over the network, and performing
operations that meet changing desires.
Case Study 3
Problem Statement: Tools for building private cloud
Having cloud storage these days have become a requirement, and we are spoilt for choice with what is
available out there to help backup our important data, e.g. Dropbox, Google Drive, Box ete. However,
they all share one major drawback.
They have limited storage space and at the end of the day, they are still a third party you have to trust
with your (sometimes sensitive) data.
Why compromise when there is an apparent solution? Thanks to a growing contingent of developers, we
can now make our own cloud storage. These solutions forgo the use of a third-party server, ensuring
that your data is for your eyes only.
We have here five tools to create your own eloud - all offer unlimited storage, and a few other features
third-party cloud storage lack.
Do note that some of them require you to be familiar with setting up your own server. As you go down
the list, the installation process will get trickier.
Set Up Local Server with AMPPs
Set Up Local Server with AMPPS
MAMP is one of the most popular application in OSX to run local server; for Windows users,
WAMP..Read more
(SPPU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(Lab Manual)...Pago no. (L-5)
Cloud Conmputlng(SPPU.SEM
7-ESTC)
Bittorrent Sync
Biggor is Better
tun r Sync and Shar
UNLIMITEO SECURE
SYNC.
EASY AND
FREE.
Fig.3
a way
to transfer largo filos anonymously but did you
Weve introduced Bittorront Sync proviously as
porsonal Cloud?
know that you can also uso it to croato your
you can sync all your files on all your
to act as a drop-0fl point s0
All you need to do is configuro a foldor
devices running Bittorrent Sync.
FrcoBSD, i0S, Android, Windows Phone,
Kindle
Bittorrent Sync supports: Windows, macOS, Linux,
Firo.
Own-Cloud
An incredibly versatile tool, own-Cloud is a free, open source application that
lets you build more than a
You can get Own-Cloud installed with the instructions found hero.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) LE Tech-Neo Publications...A SACHIN SHAH Venture
(Lab Marnua).Page ro
Cloud Computing (SPPU-SEM
7-E&TC) (L5
Nove es
Demo Code
C vta9ind
DemoCode C
Deno tnage-eee
Fig. 4
OwnCloud supports: Clients available for Windows, macOS, Linux, i0S, Android. Server software
installed using web installer.
Seafile
Librares Discussion W*i Flees Members Admin
Add a dscsson.
jgkiifíng 2013-24-04
helo
Shua Ln 2023-0404
Yeah, Seackud.cet
-
Add a tepy
Fig.5
JJ
MES COE
*** KaNTACYS
CALENDAR
Interaa
O
UTCScast Toces
teliiani
Fig. 6
22-23)(P7-129)
(SPPU-New Syllabus w.e.f academic year Tech-Neo Publications..A SACHIN SHAH Ventuie
Cloud Computing (SPPU.-SEM 7-E&TOC)
(Lab Manua)..Page no. (L8)
SparkleShare
Sparkleshare setup
soto4Btb.nr
Junanelproject
Fig. 7
Sparkle Share uses git in order to maintain all your data. This means that you will get full version
history of your files as well as the other good stuff that comes with git.
This is an excellent solution if you have documents that require going through a lot of changes. It may
not do so well with very large files though.
Sparkle Share supports: Client available for Windows, macOS, Linux. Relies on a Git server for data
storage.
Case Study 4
Problem Statement Creating an EPM Cloud Instance
An Oracle Enterprise Performance Management Cloud subscription entitles you to one instance
comprising two environments; one to host the tost version of a business process and the other to host
the production version. When you create an instance, Oracle Fusion Cloud Enterprise Performance
Management automatically creates these environments.
You require the Cloud Account Administrator role to create an EPM Cloud instance.
a
eseciet10
To create an instance there are flowing 8 steps.baor A 3no1A. bl t srati Id
wo1.o Complete a step: f ail313)93 r ublss w orr eina nid, 4
2. Click Create Instance(s) in the email that you received after activating the service and sign in.
EAccess My Services (OC). See Accessing My Services (OC).
(SPPU-New syllabus w.e.f academic year 22-23)P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(Lab Manual)....Page no. (Lc
Cloud Computing (SPPU-SEM 7-E&TC)
3. Click Create Instance.
In Creatoe Instance, click Crento in tho EPM tilo.
Dashboard
Atagd Accoat
reate tas tae
Create Instance
Active AppilcationS want to activate.
Select the Cloud Service you
tdentiyCou All Services Filter..
Featured Services
Create Create
ldentity Cloud
EPM
Subscription ld 6553913241
Subscription Id: 653848380
Fig. 8
more information.
7. Click Review.
8. Click Complete to submit the request to create the environment.
This process may take a few minutes to complete after which you should receive an email from
oraclecloudadmin_ww@oracle.com titled Action Required: Your new Oracle Enterprise Performance
Management instance in Cloud Account xxxx is ready. 195 "ofl cneissyhs1a8trs an. rs
The EPM application tile is now added to the My Services (OCI). Cliek the name of the tile to view
instance and environments detalls a:
harrisoer
Manual Enis
vi Lab
9i10i