[go: up one dir, main page]

0% found this document useful (0 votes)
1 views64 pages

Unit 1 PPt Final

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 64

Subject: Elective-II 314454C

Cloud Computing
Unit 1
Fundamentals of Cloud Computing

CO1: Describe the main concepts, key technologies and fundamentals of cloud
computing

References:
Chapter 3, 4 from Thomas, Cloud Computing: Concepts, Technology &
Architecture
Chapter 1 from Anthony T. Velte, Cloud Computing: A Practical Approach

Prepared by
Prof. A.R.Halmare
Agenda
• Origins and Influences,
• Basic Concepts and Terminology,
• Goals and Benefits,
• Risks and Challenges,
• Roles and Boundaries,
• Cloud Characteristics,
• Cloud Delivery Models,
• Cloud Deployment Models,
• Federated Cloud/Inter-cloud,
• Types of Clouds.
ORIGIN AND INFLUENCES
• The term “cloud computing” itself was coined in 1996 within a Compaq internal document.
• The term “cloud” was originally linked to the concept of distributed computing, which went
mainstream at Apple-spawned General Magic in the early 1990s, with even earlier mentions in
academic work before that.
The Technological Influences on Cloud Computing:
 Lack of license fees and no need to pay for updates/upgrades.
 Use of open file formats.
 Open and accessible source code.
 Easy adoption and low barriers for new users.
 New applications can be easily developed and integrated.
 Software that can be modified and redistributed.
ORIGIN AND INFLUENCES
• Cloud Computing referred as the accessing and storing of
data and provide services related to computing over the
internet. It simply referred as it remote services on the
internet manage and access data online rather than any
local drives. The data can be anything like images, videos,
auCloud Computing Service Provider’s
• Cloud computing is in huge demand so, big organization
providing the service like Amazon AWS, Microsoft Azure,
Google Cloud, Alibaba cloud etc. are some Cloud
Computing servicedios, documents, files etc.
ORIGIN AND INFLUENCES
• Before Computing was come into existence, client Server Architecture was used where all the data and
control of client resides in Server side.If a single user want to access some data, firstly user need to
connect to the server and after that user will get appropriate access. But it has many disadvantages. So,
After Client Server computing, Distributed Computing was come into existence, in this type of
computing all computers are networked together with the help of this, user can share their resources
when needed. It also has certain limitations. So in order to remove limitations faced in distributed system,
cloud computing was emerged.
• During 1961, John MacCharty delivered his speech at MIT that “Computing Can be sold as a Utility,
like Water and Electricity.” According to John MacCharty it was a brilliant idea. But people at that time
don’t want to adopt this technology. They thought the technology they are using efficient enough for
them. So, this concept of computing was not appreciated much so and very less will research on it. But
as the time fleet the technology caught the idea after few years this idea is implemented. So, this is
implemented by Salesforce.com in 1999.
• This company started delivering an enterprise application over the internet and this way the boom of
Cloud Computing was started.
• In 2002, Amazon started Amazon Web Services (AWS), Amazon will provide storage, computation over
the internet. In 2006 Amazon will launch Elastic Compute Cloud Commercial Service which is open for
Everybody to use.
• After that in 2009, Google Play also started providing Cloud Computing Enterprise Application as other
companies will see the emergence of cloud Computing they also started providing their cloud services.
Thus, in 2009, Microsoft launch Microsoft Azure and after that other companies like Alibaba, IBM,
Oracle, HP also introduces their Cloud Services. In today the Cloud Computing become very popular and
important skill.
BASIC CONCEPTS AND TERMINOLOGY

• ‘CLOUD COMPUTING’ is a type of computing service which provides various types of functions
like storage, database, servers networking etc.
• Through the internet, an individual can connect to the cloud and make use of all these services.
There are companies who offer cloud services and they are called Cloud Service Providers who
charge for cloud-related services based on what type of service you have selected.
• Companies spend a fortune to maintain their data but cloud service charges an individual based on
the resources consumed. Not all organizations can afford to spend high cost on IT infrastructure
and maintaining hardware and databases and so cloud computing is an ideal choice for them
because it is a cheap solution.
• Earlier companies weren’t so sure about this technology but as years have gone by, they have
started seeing the real benefits of cloud service and how profitable it can be for their business.
Organizations have different motives and use for the data they generate on daily basis and so many
companies are turning to cloud services.
BASIC CONCEPTS AND TERMINOLOGY
ADVANTAGES
1. Opportunity to grow-
With cloud computing, businesses no longer need to spend on building datacenters or managing it with dozens
of IT personnel’s which take up almost half of their IT budget. Cloud services allow organizations to reduce the
data center footprint altogether by shifting to the cloud. A lot of money can be saved through this transition and
organizations can focus on their core business functions.
2. Total flexibility in costing-Cloud
models have an option of pay-per-consume which is based on charging only for the resources which are
consumed by a customer rather the overall resources allotted. The traditional computing charges for the
resources allotted and not only for the resources which are consumed. Thus the cloud is very cost effective as it
does not charge any extra amount for the resources which were not used.
3. Always available-
Cloud services are up at all times due to the fact the servers are always available and functioning because of
continuous monitoring and management. Cloud service providers promise 99% uptime guarantee throughout the
year which is a good service so that the business never stops. When the internet is connected to a cloud service,
a customer is able to access every type of service with the lowest of downtime.
4. Remote functions-
GOALS AND BENEFITS
The goal of cloud computing is to provide easy, scalable access to computing
resources and IT services. Cloud infrastructure involves the hardware and software
components required for proper implementation of a cloud computing model.

There are various benefits of cloud computing which are:


1. No maintenance of any type of hardware from client’s side
2. Low IT costs for clients
3. Improved and faster performance
4. Constant software updates
5. Higher data security
6. Great performance and scalability
Benefits of Cloud Computing
GOALS AND BENEFITS
• Faster time to market- You can spin up new instances or retire them in seconds, allowing developers to accelerate
development with quick deployments. Cloud computing supports new innovations by making it easy to test new ideas
and design new applications without hardware limitations or slow procurement processes.
• Scalability and flexibility-Cloud computing gives your business more flexibility. You can quickly scale resources and
storage up to meet business demands without having to invest in physical infrastructure.
• Cost savings-Whatever cloud service model you choose, you only pay for the resources you actually use. This helps you
avoid overbuilding and overprovisioning your data center and gives your IT teams back valuable time to focus on more
strategic work.
• Better collaboration-Cloud storage enables you to make data available anywhere you are, anytime you need it. Instead of
being tied to a location or specific device, people can access data from anywhere in the world from any device—as long
as they have an internet connection.
• Advanced security-Despite popular perceptions, cloud computing can actually strengthen your security posture because
of the depth and breadth of security features, automatic maintenance, and centralized management.Reputable cloud
providers also hire top security experts and employ the most advanced solutions, providing more robust protection.
• Data loss prevention-Cloud providers offer backup and disaster recovery features. Storing data in the cloud rather than
locally can help prevent data loss in the event of an emergency, such as hardware malfunction, malicious threats, or even
simple user error.
RISK AND CHALLENGES

CHALLENGES: • Multiple Cloud Management


• Security • Creating a private cloud
• Password Security • Performance
• Cost Management • Migration
• Lack of expertise • Interoperability and Portability
• Internet Connectivity • Reliability and High Availability
• Control or Governance • Hybrid-Cloud Complexity
• Compliance
1. Security
The topmost concern in investing in cloud services is security issues in cloud computing.
It is because your data gets stored and processed by a third-party vendor and you cannot
see it. Every day or the other, you get informed about broken authentication,
compromised credentials, account hacking, data breaches, etc. in a particular
organization. It makes you a little more skeptical.
Fortunately, cloud providers, these days have started to put efforts to improve security
capabilities. You can be cautious as well by verifying if the provider implements a safe
user identity management system and access control procedures. Also, ensure it
implements database security and privacy protocols.

2. Password Security
As large numbers of people access your cloud account, it becomes vulnerable. Anybody
who knows your password or hacks into your cloud will be able to access your
confidential information.
Here the organization should use a multiple level authentication and ensure that the
passwords remain protected. Also, the passwords should be modified regularly,
especially when a particular employee resigns and leave the organization. Access rights
to usernames and passwords should be given judiciously.
3. Cost Management
Cloud computing enables you to access application software over a fast internet connection and lets
you save on investing in costly computer hardware, software, management, and maintenance. This
makes it affordable. But what is challenging and expensive is tuning the organization’s needs on the
third-party platform.
Another costly affair is the cost of transferring data to a public cloud, especially for a small business or
project.

4. Lack of expertise
With the increasing workload on cloud technologies and continuously improving cloud tools,
management has become difficult. There has been a consistent demand for a trained workforce who can
deal with cloud computing tools and services. Hence, firms need to train their IT staff to minimize this
challenge.

5. Internet Connectivity
Cloud services are dependent on a high-speed internet connection. So businesses that are relatively
small and face connectivity issues should ideally first invest in a good internet connection so that no
downtime happens. It is because internet downtime might incur vast business losses.
6. Control or Governance
Another ethical issue in cloud computing is maintaining proper control over asset management and
maintenance. There should be a dedicated team to ensure that the assets used to implement cloud services
are used according to agreed policies and dedicated procedures. There should be proper maintenance and
the assets are used to meet your organization’s goals successfully.

7. Compliance
Another major risk of cloud computing is maintaining compliance. By compliance we mean, a set of rules
about what data is allowed to be moved and what should be kept in-house to maintain compliance. The
organizations must follow and respect the compliance rules set by various government bodies.

8. Multiple Cloud Management


Companies have started to invest in multiple public clouds, multiple private clouds or a combination of
both called the hybrid cloud. This has grown rapidly in recent times. So it has become important to list the
challenges faced by such organizations and find solutions to grow with the trend.

9. Creating a private cloud


Implementing an internal cloud is advantageous. This is because all the data remains secure in-house. But
the challenge here is that the IT team has to build and fix everything by themselves. Also, the team needs to
ensure the smooth functioning of the cloud. They need to automate maximum manual tasks. The execution
of tasks should be in the correct order.
10. Performance
When your business applications move to a cloud or a third-party vendor, so your business
performance starts to depend on your provider as well. Another major problem in cloud computing is
investing in the right cloud service provider.
Before investing, you should look for providers with innovative technologies. The performance of the
BI’s and other cloud-based systems are linked to the provider’s systems as well. Be cautious about
choosing the provider and investigate whether they have protocols to mitigate issues that arise in real-
time.

11. Migration
Migration is nothing but moving a new application or an existing application to a cloud. In the case of
a new application, the process is pretty straightforward. But if it is an age-old company application, it
becomes tedious.
Velostrata conducted a survey recently, wherein 95% of organizations are moving their applications to
the cloud. The survey showed that most organizations are finding it a nightmare. Some notable issues
faced here are slow data migrations, security challenges in cloud computing, extensive
troubleshooting, application downtime, migration agents, and cutover complexity.
12. Interoperability and Portability
Another challenge of cloud computing is that applications need to be easily migrated between cloud
providers without being locked for a set period. There is a lack of flexibility in moving from one cloud
provider to another because of the complexity involved. Changing cloud inventions bring a slew of new
challenges like managing data movement and establishing a secure network from scratch. Another challenge
is that customers can’t access it from everywhere, but this can be fixed by the cloud provider so that the
customer can securely access the cloud from anywhere.

13. Reliability and High Availability


Some of the most pressing issues in cloud computing is the need for high availability (HA) and reliability.
Reliability refers to the likelihood that a system will be up and running at any given point in time, whereas
availability refers to how likely it is that the system will be up and running at any given point in time.
Because most businesses are now reliant on third-party services, cloud systems must be dependable and
robust. Cloud providers continue to lack round-the-clock service, resulting in frequent outages. It is critical
to use internal or third-party tools to monitor the service being provided. It is critical to have plans in place to
monitor SLAs, usage, robustness, performance, and business reliance on these services.

14. Hybrid-Cloud Complexity


For any company, a hybrid cloud environment is often a messy mix of multiple cloud application
development and cloud service providers, as well as private and public clouds, all operating at once. A
common user interface, consistent data, and analytical benefits for businesses are all missing from these
RISK
When deciding whether to transition to cloud computing, there are numerous security risks of cloud
computing to take into account. Here are the top dangers of cloud computing that your company needs
to be aware of:
1. Loss or Theft of Intellectual Property
• Sensitive data is being stored on the cloud by more businesses. According to a McAfee investigation,
21% of the files uploaded to cloud-based file sharing platforms contain sensitive data, such as
intellectual property. When a cloud service is compromised, cybercriminals can access this private
information. Certain services may even constitute a risk in the absence of a breach if their terms and
conditions state that they own the data you upload.
2. Hacked Interfaces and Insecure APIs
• Customers can control and communicate with cloud services via a set of application programming
interfaces (APIs) that CSPs expose. These APIs are used by organizations to provision, administer,
orchestrate, and watch over their users and assets. These APIs may have the same software flaws as
those found in the operating system, library, etc. APIs. The CSP APIs are accessible via the Internet,
making them more vulnerable to exploitation than management APIs for on-premises
computing.Threat actors scan management APIs for weaknesses. Cloud assets owned by the firm may
be affected if these vulnerabilities were to be found. From there, attackers can carry out additional
attacks against CSP clients using the resources of the business.
3. Data Breach
Data leakage is a major concern for businesses; more than 60% of them rank it as their top
cloud security worry. As was already established, enterprises must cede some control to the
CSP to use cloud computing. This could indicate that someone outside of your IT department
may now be in charge of protecting some of the most important data in your company.
Your company will not only lose its data and intellectual property if the cloud service provider
is breached or attacked, but it will also be held liable for any losses.

3. Vendor Lock-in: Lack of Control over Performance and Quality


When a company considers switching its assets or operations from one CSP to another,
vendor lock-in becomes a problem. The company learns that the migration would cost more,
take more time, and require more effort than originally anticipated because of things like non-
standard data formats, non-standard APIs, and dependency on one CSP's proprietary tools and
special APIs.

In service models where the CSP assumes greater responsibility, this problem gets worse. The
amount of exposure to a CSP's distinctive implementations rises when an agency utilizes
additional features, services, or APIs. When a capability is transferred to a different CSP,
adjustments are necessary due to these special implementations. A significant issue arises if a
chosen CSP closes its doors since data may be lost or may not be able to be promptly moved
4. Increased Complexity Strains IT Staff
IT operations may become more complicated after a cloud migration. It might be necessary for the agency's
existing IT employees to learn a new model to manage, integrate, and operate in the cloud. Along with their
present duties for on-premises IT, IT staff members also need the capability and skill set necessary to
manage, integrate, and sustain the migration of assets and data to the cloud.In the cloud, key management
and encryption services are more complicated. The complexity is further increased because different CSPs
often offer different services, methodologies, and tools for logging and monitoring cloud services. Due to
the complexity of the technology, rules, and implementation techniques, there may potentially be emergent
risks of using cloud computing installations.

5. Spectre & Meltdown


The security flaws Spectre and Meltdown, which affect almost every contemporary device with a CPU—
not just computers, servers, and smartphones, but also Internet of Things (IoT) gadgets like routers and
smart TVs—allow hostile actors to get around system security safeguards. Utilizing the pair enables access
to passwords, encryption keys, and other private data stored in protected system memory.
The implementation of speculative execution, instruction pipelining, and out-of-order execution in
contemporary CPUs is based on hardware design defects exemplified by the representative "transient
execution" attacks mentioned above. The implementations of these three are crucial to the performance
enhancements built into modern CPUs, but they differ between CPU vendors and microarchitectures; not
all Spectre and Meltdown variants are exploitable on all microarchitectures.
6. Denial of Service (DoS) Attacks
Since everything in the cloud is in virtual form, attackers and hackers flood the network with attack packets
that are difficult to recognize. The DDoS (Distributed Denial of Service) attack is unique to the cloud and
involves several machines attacking a user by delivering packets with a lot of data overhead. These attacks
flood the network with unsolicited traffic, rendering the resources inaccessible to the user.

7. Account Hijacking
The hijacking of an account or a service still poses a severe security risk related to cloud computing. When a
criminal obtains your personal information, they can use it to access your accounts through account
hijacking. The account hijacker frequently employs one or more methods to obtain your personal
information.
For instance, the attackers frequently employ malicious software called Spyware to gather username,
password, or bank information and send it to the fraudster. They may also use phishing via fake emails or
websites to store credentials.

8. Compliance Violations and Regulatory Actions


Nowadays, most businesses operate under some kind of regulatory control over their information, whether it
be HIPAA for protected student records or FERPA for private health information. Companies are required by
these regulations to understand where their data is, who can access it, and how it is protected. Each of these
principles is frequently broken by BYOC, which places the business in non-compliance and can have
detrimental effects.
9. Loss of Control Over End-user Actions
When employers are unaware of their employees' use of cloud services, those employees are free to engage
in a variety of activities without repercussions until it is too late. For instance, a salesperson ready to leave
her job could obtain a list of all customer contacts, upload the information to a personal cloud storage
service, and then access that information once she starts working for a rival company. Actually, one of the
more prevalent insider risks in use today is the one just mentioned.

10. Diminished Customer Trust


Customers will unavoidably feel uneasy following concerns about data breaches at your company.
Numerous data storage facilities have had significant security breaches that led to the loss of millions of
client credit and debit card details.
Customers' confidence in the security of their data is eroded by the data security risks in cloud computing.
An organization's income will ultimately suffer if there is a data breach since customers would inevitably
leave
.
11. Revenue Losses: Impact on Business Return on Investment (ROI)
During the busy holiday shopping season, many customers avoided Target stores after hearing about the
Target data breach, which resulted in a 46% decline in the company's quarterly profit. The business
predicted that the hack would ultimately cost $148 million. The CIO and CEO resigned as a result, and
many people are now requesting that the board of directors have more control over cyber security
ROLES AND BOUNDARIES

• Organizations and humans can assume different types of pre-defined roles


depending on how they relate to and/or interact with a cloud and its hosted IT
resources.
• Each of the upcoming roles participates in and carries out responsibilities in
relation to cloud-based activity. The following sections define these roles and
identify their main interactions.
Cloud Provider
The organization that provides cloud-based IT resources is the cloud provider. When assuming the role of cloud
provider, an organization is responsible for making cloud services available to cloud consumers, as per agreed upon
SLA guarantees. The cloud provider is further tasked with any required management and administrative duties to
ensure the on-going operation of the overall cloud infrastructure. Cloud providers normally own the IT resources
that are made available for lease by cloud consumers; however, some cloud providers also “resell” IT resources
leased from other cloud providers.
Cloud Consumer
A cloud consumer is an organization (or a human) that has a formal contract or arrangement with a cloud provider
to use IT resources made available by the cloud provider. Specifically, the cloud consumer uses a cloud service
consumer to access a cloud service
Cloud Service Owner
The person or organization that legally owns a cloud service is called a cloud service
owner. The cloud service owner can be the cloud consumer, or the cloud provider that owns
the cloud within which the cloud service resides. For example, either the cloud consumer
of Cloud X or the cloud provider of Cloud X could own Cloud Service A
Note that a cloud consumer that owns a cloud service hosted by a third-party cloud does not
necessarily need to be the user (or consumer) of the cloud service. Several cloud consumer
organizations develop and deploy cloud services in clouds owned by other parties for the purpose of
making the cloud services available to the general public.
The reason a cloud service owner is not called a cloud resource owner is because the cloud service
owner role only applies to cloud services
Cloud Resource Administrator
A cloud resource administrator is the person or organization responsible for administering a cloud-
based IT resource (including cloud services). The cloud resource administrator can be (or belong to)
the cloud consumer or cloud provider of the cloud within which the cloud service resides.
Alternatively, it can be (or belong to) a third-party organization contracted to administer the cloud-
based IT resource.
For example, a cloud service owner can contract a cloud resource administrator to administer a cloud
service
The reason a cloud resource administrator is not referred to as a “cloud service administrator”
is because this role may be responsible for administering cloud-based IT resources that don’t
exist as cloud services. For example, if the cloud resource administrator belongs to (or is
contracted by) the cloud provider, IT resources not made remotely
accessible may be administered by this role
Additional Roles
The NIST Cloud Computing Reference Architecture defines the following supplementary
roles:
• Cloud Auditor – A third-party (often accredited) that conducts independent assessments of
cloud environments assumes the role of the cloud auditor. The typical responsibilities
associated with this role include the evaluation of security controls, privacy impacts, and
performance. The main purpose of the cloud auditor role is to provide an unbiased
assessment (and possible endorsement) of a cloud environment to help strengthen the trust
relationship between cloud consumers and cloud providers.

• Cloud Broker – This role is assumed by a party that assumes the responsibility of
managing and negotiating the usage of cloud services between cloud consumers and cloud
providers. Mediation services provided by cloud brokers include service intermediation,
aggregation, and arbitrage.

• Cloud Carrier – The party responsible for providing the wire-level connectivity between
cloud consumers and cloud providers assumes the role of the cloud carrier. This role is
often assumed by network and telecommunication providers.
While each is legitimate, most architectural scenarios covered in this book do not include
these roles.
BOUNDARIES
• Organizational Boundary
An organizational boundary represents the physical perimeter that surrounds a set of IT resources
that are owned and governed by an organization. The organizational boundary does not represent the
boundary of an actual organization, only an organizational set of IT assets and IT resources.
Similarly, clouds have an organizational boundary
BOUNDARIES
• Trust Boundary
When an organization assumes the role of cloud consumer to access cloud-based IT resources, it needs to
extend its trust beyond the physical boundary of the organization to include parts of the cloud
environment.
A trust boundary is a logical perimeter that typically spans beyond physical boundaries to represent the
extent to which IT resources are trusted . When analyzing cloud environments, the trust boundary is most
frequently associated with the trust issued by the organization acting as the cloud consumer.
CLOUD CHARACTERISTICS
• An IT environment requires a specific set of characteristics to enable the remote provisioning of
scalable and measured IT resources in an effective manner. These characteristics need to exist to a
meaningful extent for the IT environment to be considered an effective cloud.
• The following six specific characteristics are common to the majority of cloud environments:
 on-demand usage
 ubiquitous access
 multitenancy (and resource pooling)
 elasticity
 measured usage
 resiliency

• Cloud providers and cloud consumers can assess these characteristics individually and collectively to
measure the value offering of a given cloud platform. Although cloud-based services and IT resources
will inherit and exhibit individual characteristics to varying extents, usually the greater the degree to
which they are supported and utilized, the greater the resulting value proposition.
On-Demand Usage
A cloud consumer can unilaterally access cloud-based IT resources giving the cloud consumer the
freedom to self-provision these IT resources. Once configured, usage of the self-provisioned IT resources
can be automated, requiring no further human involvement by the cloud consumer or cloud provider. This
results in an on-demand usage environment. Also known as “on-demand self-service usage,” this
characteristic enables the service-based and usage-driven features found in mainstream clouds.
Ubiquitous Access
Ubiquitous access represents the ability for a cloud service to be widely accessible. Establishing
ubiquitous access for a cloud service can require support for a range of devices, transport protocols,
interfaces, and security technologies. To enable this level of access generally requires that the cloud
service architecture be tailored to the particular needs of different cloud service consumers.
Multitenancy (and Resource Pooling)
The characteristic of a software program that enables an instance of the program to serve different
consumers (tenants) whereby each is isolated from the other, is referred to as multitenancy. A cloud
provider pools its IT resources to serve multiple cloud service consumers by using multitenancy models
that frequently rely on the use of virtualization technologies. Through the use of multitenancy technology,
IT resources can be dynamically assigned and reassigned, according to cloud service consumer demands.
Resource pooling allows cloud providers to pool large-scale IT resources to serve multiple cloud
consumers. Different physical and virtual IT resources are dynamically assigned and reassigned according
to cloud consumer demand, typically followed by execution through statistical multiplexing. Resource
pooling is commonly achieved through multitenancy technology, and therefore encompassed by this
Elasticity
Elasticity is the automated ability of a cloud to transparently scale IT resources, as required in response to runtime
conditions or as pre-determined by the cloud consumer or cloud provider. Elasticity is often considered a core
justification for the adoption of cloud computing, primarily due to the fact that it is closely associated with the
Reduced Investment and Proportional Costs benefit. Cloud providers with vast IT resources can offer the greatest
range of elasticity.
Measured Usage
The measured usage characteristic represents the ability of a cloud platform to keep track of the usage of its IT
resources, primarily by cloud consumers. Based on what is measured, the cloud provider can charge a cloud
consumer only for the IT resources actually used and/or for the timeframe during which access to the IT resources
was granted. In this context, measured usage is closely related to the on-demand characteristic.
Measured usage is not limited to tracking statistics for billing purposes. It also encompasses the general
monitoring of IT resources and related usage reporting (for both cloud provider and cloud consumers). Therefore,
measured usage is also relevant to clouds that do not charge for usage
Resiliency
Resilient computing is a form of failover that distributes redundant implementations of IT resources across
physical locations. IT resources can be pre-configured so that if one becomes deficient, processing is
automatically handed over to another redundant implementation. Within cloud computing, the characteristic of
resiliency can refer to redundant IT resources within the same cloud (but in different physical locations) or across
multiple clouds. Cloud consumers can increase both the reliability and availability of their applications by
CLOUD DELIVERY MODELS
• A cloud delivery model represents a specific, pre-packaged combination of IT resources offered by
a cloud provider.

• Three common cloud delivery models have become widely established and formalized:
 Infrastructure-as-a-Service (IaaS)
 Platform-as-a-Service (PaaS)
 Software-as-a-Service (SaaS)

• These three models are interrelated in how the scope of one can encompass that of another
Infrastructure-as-a-Service (IaaS)
The IaaS delivery model represents a self-contained IT environment comprised
of infrastructure-centric IT resources that can be accessed and managed via cloud
service-based interfaces and tools. This environment can include hardware,
network, connectivity, operating systems, and other “raw” IT resources. In
contrast to traditional hosting or outsourcing environments, with IaaS, IT
resources are typically virtualized and packaged into bundles that simplify up-
front runtime scaling and customization of the infrastructure.
The general purpose of an IaaS environment is to provide cloud consumers with
a high level of control and responsibility over its
configuration and utilization. The IT resources provided by IaaS are generally
not pre-configured, placing the administrative responsibility directly upon the
cloud consumer. This model is therefore used by cloud consumers that require a
high level of control over the cloud-based environment they intend to create.
Sometimes cloud providers will contract IaaS offerings from other cloud
providers in order to scale their own cloud environments. The types and brands
of the IT resources provided by IaaS products offered by different cloud
providers can vary. IT resources available through IaaS environments are
generally offered as freshly initialized virtual instances. A central and primary IT
resource within a typical IaaS environment is the virtual server. Virtual servers
are leased by specifying server hardware requirements, such as processor
capacity, memory, and local storage space,
Platform-as-a-Service (PaaS)
PaaS delivery model represents a pre-defined “ready-to-use”
vironment typically comprised of already deployed and configured PaaS products are available with different
resources. Specifically, PaaS relies on (and is primarily defined by) development stacks. For example, Google App
usage of a ready-made environment that establishes a set of pre- Engine offers a Java and Python-based
ckaged products and tools used to support the entire delivery environment.
ecycle of custom applications.
mmon reasons a cloud consumer would use and invest in a PaaS
vironment include: The cloud consumer wants to extend on-
premise environments into cloud for scalability and economic
purposes.
The cloud consumer uses the ready-made environment to entirely
bstitute an on-premise environment.
he cloud consumer wants to become a cloud provider and deploys
own cloud services to be made available to other external cloud
nsumers.
working within a ready-made platform, the cloud consumer is
the administrative burden of setting up and maintaining the re
infrastructure IT resources provided via the IaaS model.
nversely, the cloud consumer is granted a lower level of control
er the underlying IT resources that host and provision the platform
Software-as-a-Service (SaaS)
A software program positioned as a
shared cloud service and made available
as a “product” or generic utility
represents the typical profile of a SaaS
offering. The SaaS delivery model is
typically used to make a reusable cloud
service widely available (often
commercially) to a range of cloud
consumers. An entire marketplace exists
around SaaS products that can be leased
and used for different purposes and via
different terms

A cloud consumer is generally granted very limited administrative control over a SaaS implementation. It is most
often provisioned by the cloud provider, but it can be legally owned by whichever entity assumes the cloud service
owner role. For example, an organization acting as a cloud consumer while using and working with a PaaS
environment can build a cloud service that it decides to deploy in that same environment as a SaaS offering. The
same organization then effectively assumes the cloud provider role as the SaaS-based cloud service is made available
to other organizations that act as cloud consumers when using that cloud service.
CLOUD DEPLOYMENT MODELS
• A cloud deployment model represents a specific type of cloud environment, primarily distinguished
by ownership, size, and access.
• There are four common cloud deployment models:
 Public cloud
 Community cloud
 Private cloud
 Hybrid cloud
Other Cloud Deployment Models
Additional variations of the four base cloud deployment models can exist. Examples include:
• Virtual Private Cloud – Also known as a “dedicated cloud” or “hosted cloud,” this model results in a
self-contained cloud environment hosted and managed by a public cloud provider, and made available
to a cloud consumer.
• Inter-Cloud – This model is based on an architecture comprised of two or more inter-connected
clouds.
FEDERATED CLOUD/INTERCLOUD

• Cloud Federation, also known as Federated Cloud is the deployment and


management of several external and internal cloud computing services to match
business needs. It is a multi-national cloud system that integrates private,
community, and public clouds into scalable computing platforms. Federated cloud
is created by connecting the cloud environment of different cloud providers using
a common standard.
Architecture of Federated Cloud
The architecture of Federated Cloud consists of three basic
components:
1. Cloud Exchange
The Cloud Exchange acts as a mediator between cloud coordinator
and cloud broker. The demands of the cloud broker are mapped by
the cloud exchange to the available services provided by the cloud
coordinator. The cloud exchange has a track record of what is the
present cost, demand patterns, and available cloud providers, and
this information is periodically reformed by the cloud coordinator

2. Cloud Coordinator
The cloud coordinator assigns the resources of the cloud to the
remote users based on the quality of service they demand and the
credits they have in the cloud bank. The cloud enterprises and their
membership are managed by the cloud controller.
3. Cloud Broker
The cloud broker interacts with the cloud coordinator, analyzes the Federal Cloud Architecture
Service-level agreement and the resources offered by several cloud
Properties of Federated Cloud
 In the federated cloud, the users can interact with the architecture either centrally or in a decentralized
manner. In centralized interaction, the user interacts with a broker to mediate between them and the
organization. Decentralized interaction permits the user to interact directly with the clouds in the federation.

 Federated cloud can be practiced with various niches like commercial and non-commercial.

 The visibility of a federated cloud assists the user to interpret the organization of several clouds in the
federated environment.

 Federated cloud can be monitored in two ways. MaaS (Monitoring as a Service) provides information that
aids in tracking contracted services to the user. Global monitoring aids in maintaining the federated cloud.

 The providers who participate in the federation publish their offers to a central entity. The user interacts with
this central entity to verify the prices and propose an offer.

 The marketing objects like infrastructure, software, and platform have to pass through federation when
consumed in the federated cloud.
Benefits of Federated Cloud:
 It minimizes the consumption of energy.
 It increases reliability.
 It minimizes the time and cost of providers due to dynamic scalability.
 It connects various cloud service providers globally. The providers may buy and sell services
on demand.
 It provides easy scaling up of resources.

Challenges in Federated Cloud:


 In cloud federation, it is common to have more than one provider for processing the
incoming demands. In such cases, there must be a scheme needed to distribute the incoming
demands equally among the cloud service providers.
 The increasing requests in cloud federation have resulted in more heterogeneous
infrastructure, making interoperability an area of concern. It becomes a challenge for cloud
users to select relevant cloud service providers and therefore, it ties them to a particular cloud
service provider.
 A federated cloud means constructing a seamless cloud environment that can interact with
people, different devices, several application interfaces, and other entities.
Federated Cloud technologies
The technologies that aid the cloud federation and cloud services are:

1. OpenNebula
It is a cloud computing platform for managing heterogeneous distributed data center infrastructures. It
can use the resources of its interoperability, leveraging existing information technology assets,
protecting the deals, and adding the application programming interface (API).

2. Aneka coordinator
The Aneka coordinator is a proposition of the Aneka services and Aneka peer components (network
architectures) which give the cloud ability and performance to interact with other cloud services.

3. Eucalyptus
Eucalyptus defines the pooling computational, storage, and network resources that can be measured
scaled up or down as application workloads change in the utilization of the software. It is an open-
source framework that performs the storage, network, and many other computational resources to
access the cloud environment.
Intercloud Federation Framework for Multi-provider Cloud Services
Integration
TYPES OF CLOUDS
cloud computing is “ Internet-based computing in which a shared pool of resources
is available over broad network access, these resources can be provisioned or
released with minimum management efforts and service-provider interaction.”
• Public cloud
• Private cloud
• Hybrid cloud
• Community cloud
• Multi cloud
Public cloud
• Public clouds are managed by third parties which provide cloud services
over the internet to the public, these services are available as pay-as-you-go
billing models.
• They offer solutions for minimizing IT infrastructure costs and become a
good option for handling peak loads on the local infrastructure.
• Public clouds are the go-to option for small enterprises, which can start
their businesses without large upfront investments by completely relying on
public infrastructure for their IT needs.
• The fundamental characteristics of public clouds are multitenancy.
• A public cloud is meant to serve multiple users, not a single customer.
• A user requires a virtual computing environment that is separated, and most
likely isolated, from other users.
Public cloud
Public Cloud

Advantages Disadvantages
1. High Scalability 1. Loss of control over data
2. Cost Reduction 2. Data security and privacy
3. Reliability and flexibility 3. Limited Visibility
4. Disaster Recovery 4. Unpredictable cost
Private cloud

• Private clouds are distributed systems that work on private


infrastructure and provide the users with dynamic provisioning of
computing resources.
• Instead of a pay-as-you-go model in private clouds, there could be
other schemes that manage the usage of the cloud and proportionally
billing of the different departments or sections of an enterprise
• . Private cloud providers are HP Data Centers, Ubuntu, Elastic-Private
cloud, Microsoft, etc.
Private cloud
Private Cloud

Advantages Disadvantages
1. Customer information protection: In the
private cloud security concerns are less since 1. The restricted area of
customer data and other sensitive information operations: Private cloud is accessible
do not flow out of private infrastructure. within a particular area. So the area of
2. Infrastructure ensuring SLAs: Private cloud accessibility is restricted.
provides specific operations such as
appropriate clustering, data replication, system
monitoring, and maintenance, disaster 2. Expertise requires: In the private
recovery, and other uptime services. cloud security concerns are less since
3. Compliance with standard procedures and customer data and other sensitive
operations: Specific procedures have to be
put in place when deploying and executing information do not flow out of private
applications according to third-party infrastructure. Hence skilled people
compliance standards. This is not b
case are required to manage & operate
cloud services.
Hybrid cloud

• A hybrid cloud is a heterogeneous distributed system formed by


combining facilities of the public cloud and private cloud. For this
reason, they are also called heterogeneous clouds.
• A major drawback of private deployments is the inability to scale on-
demand and efficiently address peak loads.
• Here public clouds are needed. Hence, a hybrid cloud takes advantage
of both public and private clouds.
Hybrid cloud
Hybrid cloud

Advantages Disadvantages
1. It’s possible that businesses lack the internal
• 1) Cost: Available at a cheap cost than knowledge necessary to create such a hybrid
other clouds because it is formed by a environment. Managing security may also be
more challenging. Different access levels and
distributed system. security considerations may apply in each
environment.
• 2) Speed: It is efficiently fast with
2. Managing a hybrid cloud may be more
lower cost, It reduces the latency of difficult. With all of the alternatives and
the data transfer process. choices available today, not to mention the
new PaaS components and technologies that
• 3) Security: Most important thing is will be released every day going forward,
public cloud and migration to public cloud are
security. A hybrid cloud is totally safe already complicated enough. It could just feel
and secure because it works on the like a step too far to include hybrid.
distributed system network.
Community cloud

• Community clouds are distributed systems created by integrating the


services of different clouds to address the specific needs of an
industry, a community, or a business sector. But sharing
responsibilities among the organizations is difficult.
• In the community cloud, the infrastructure is shared between
organizations that have shared concerns or tasks. An organization or a
third party may manage the cloud.
Community cloud
Sectors that use community clouds are:
1. Media industry: Media companies are looking for quick, simple, low-cost ways for
increasing the efficiency of content generation. Most media productions involve an
extended ecosystem of partners. In particular, the creation of digital content is the
outcome of a collaborative process that includes the movement of large data, massive
compute-intensive rendering tasks, and complex workflow executions.
2. Healthcare industry: In the healthcare industry community clouds are used to share
information and knowledge on the global level with sensitive data in the private
infrastructure.
3. Energy and core industry: In these sectors, the community cloud is used to cluster
a set of solution which collectively addresses the management, deployment, and
orchestration of services and operations.
4. Scientific research: In this organization with common interests in science share a
large distributed infrastructure for scientific computing.
Community cloud

Advantages Disadvantages
1. Because the entire cloud is shared by 1. Not all businesses should choose community
numerous enterprises or a community, cloud.
community clouds are cost-effective.
2. Because it works with every user, the 2. gradual adoption of data
community cloud is adaptable and scalable.
Users can alter the documents according to 3. It’s challenging for corporations to share
their needs and requirements. duties.
3. Public cloud is less secure than the
community cloud, which is more secure than
private cloud.
4. Thanks to community clouds, we may share
cloud resources, infrastructure, and other
capabilities between different enterprises.
Multi cloud

• Multicloud is the use of multiple cloud computing services from


different providers, which allows organizations to use the best-suited
services for their specific needs and avoid vendor lock-in.
• This allows organizations to take advantage of the different features
and capabilities offered by different cloud providers.
Multi cloud
Advantages Disadvantages

1. Flexibility: Using multiple cloud providers allows 1. Complexity: Managing multiple cloud providers
organizations to choose the best-suited services for and services can be complex and require
their specific needs, and avoid vendor lock-in. specialized knowledge and expertise.
2. Cost-effectiveness: Organizations can take 2. Increased costs: The cost of managing multiple
advantage of the cost savings and pricing benefits cloud providers and services can be higher than
offered by different cloud providers for different using a single provider.
services. 3. Compatibility issues: Different cloud providers may
3. Improved performance: By distributing workloads use different technologies and standards, which can
across multiple cloud providers, organizations can cause compatibility issues and require additional
improve the performance and availability of their resources to resolve.
applications and services. 4. Limited interoperability: Different cloud providers
4. Increased security: Organizations can increase the may not be able to interoperate seamlessly, which
security of their data and applications by spreading can limit the ability to move data and applications
them across multiple cloud providers and between them.
implementing different security strategies for each.

END OF Unit I

63

You might also like