Unit 1 PPt Final
Unit 1 PPt Final
Unit 1 PPt Final
Cloud Computing
Unit 1
Fundamentals of Cloud Computing
CO1: Describe the main concepts, key technologies and fundamentals of cloud
computing
References:
Chapter 3, 4 from Thomas, Cloud Computing: Concepts, Technology &
Architecture
Chapter 1 from Anthony T. Velte, Cloud Computing: A Practical Approach
Prepared by
Prof. A.R.Halmare
Agenda
• Origins and Influences,
• Basic Concepts and Terminology,
• Goals and Benefits,
• Risks and Challenges,
• Roles and Boundaries,
• Cloud Characteristics,
• Cloud Delivery Models,
• Cloud Deployment Models,
• Federated Cloud/Inter-cloud,
• Types of Clouds.
ORIGIN AND INFLUENCES
• The term “cloud computing” itself was coined in 1996 within a Compaq internal document.
• The term “cloud” was originally linked to the concept of distributed computing, which went
mainstream at Apple-spawned General Magic in the early 1990s, with even earlier mentions in
academic work before that.
The Technological Influences on Cloud Computing:
Lack of license fees and no need to pay for updates/upgrades.
Use of open file formats.
Open and accessible source code.
Easy adoption and low barriers for new users.
New applications can be easily developed and integrated.
Software that can be modified and redistributed.
ORIGIN AND INFLUENCES
• Cloud Computing referred as the accessing and storing of
data and provide services related to computing over the
internet. It simply referred as it remote services on the
internet manage and access data online rather than any
local drives. The data can be anything like images, videos,
auCloud Computing Service Provider’s
• Cloud computing is in huge demand so, big organization
providing the service like Amazon AWS, Microsoft Azure,
Google Cloud, Alibaba cloud etc. are some Cloud
Computing servicedios, documents, files etc.
ORIGIN AND INFLUENCES
• Before Computing was come into existence, client Server Architecture was used where all the data and
control of client resides in Server side.If a single user want to access some data, firstly user need to
connect to the server and after that user will get appropriate access. But it has many disadvantages. So,
After Client Server computing, Distributed Computing was come into existence, in this type of
computing all computers are networked together with the help of this, user can share their resources
when needed. It also has certain limitations. So in order to remove limitations faced in distributed system,
cloud computing was emerged.
• During 1961, John MacCharty delivered his speech at MIT that “Computing Can be sold as a Utility,
like Water and Electricity.” According to John MacCharty it was a brilliant idea. But people at that time
don’t want to adopt this technology. They thought the technology they are using efficient enough for
them. So, this concept of computing was not appreciated much so and very less will research on it. But
as the time fleet the technology caught the idea after few years this idea is implemented. So, this is
implemented by Salesforce.com in 1999.
• This company started delivering an enterprise application over the internet and this way the boom of
Cloud Computing was started.
• In 2002, Amazon started Amazon Web Services (AWS), Amazon will provide storage, computation over
the internet. In 2006 Amazon will launch Elastic Compute Cloud Commercial Service which is open for
Everybody to use.
• After that in 2009, Google Play also started providing Cloud Computing Enterprise Application as other
companies will see the emergence of cloud Computing they also started providing their cloud services.
Thus, in 2009, Microsoft launch Microsoft Azure and after that other companies like Alibaba, IBM,
Oracle, HP also introduces their Cloud Services. In today the Cloud Computing become very popular and
important skill.
BASIC CONCEPTS AND TERMINOLOGY
• ‘CLOUD COMPUTING’ is a type of computing service which provides various types of functions
like storage, database, servers networking etc.
• Through the internet, an individual can connect to the cloud and make use of all these services.
There are companies who offer cloud services and they are called Cloud Service Providers who
charge for cloud-related services based on what type of service you have selected.
• Companies spend a fortune to maintain their data but cloud service charges an individual based on
the resources consumed. Not all organizations can afford to spend high cost on IT infrastructure
and maintaining hardware and databases and so cloud computing is an ideal choice for them
because it is a cheap solution.
• Earlier companies weren’t so sure about this technology but as years have gone by, they have
started seeing the real benefits of cloud service and how profitable it can be for their business.
Organizations have different motives and use for the data they generate on daily basis and so many
companies are turning to cloud services.
BASIC CONCEPTS AND TERMINOLOGY
ADVANTAGES
1. Opportunity to grow-
With cloud computing, businesses no longer need to spend on building datacenters or managing it with dozens
of IT personnel’s which take up almost half of their IT budget. Cloud services allow organizations to reduce the
data center footprint altogether by shifting to the cloud. A lot of money can be saved through this transition and
organizations can focus on their core business functions.
2. Total flexibility in costing-Cloud
models have an option of pay-per-consume which is based on charging only for the resources which are
consumed by a customer rather the overall resources allotted. The traditional computing charges for the
resources allotted and not only for the resources which are consumed. Thus the cloud is very cost effective as it
does not charge any extra amount for the resources which were not used.
3. Always available-
Cloud services are up at all times due to the fact the servers are always available and functioning because of
continuous monitoring and management. Cloud service providers promise 99% uptime guarantee throughout the
year which is a good service so that the business never stops. When the internet is connected to a cloud service,
a customer is able to access every type of service with the lowest of downtime.
4. Remote functions-
GOALS AND BENEFITS
The goal of cloud computing is to provide easy, scalable access to computing
resources and IT services. Cloud infrastructure involves the hardware and software
components required for proper implementation of a cloud computing model.
2. Password Security
As large numbers of people access your cloud account, it becomes vulnerable. Anybody
who knows your password or hacks into your cloud will be able to access your
confidential information.
Here the organization should use a multiple level authentication and ensure that the
passwords remain protected. Also, the passwords should be modified regularly,
especially when a particular employee resigns and leave the organization. Access rights
to usernames and passwords should be given judiciously.
3. Cost Management
Cloud computing enables you to access application software over a fast internet connection and lets
you save on investing in costly computer hardware, software, management, and maintenance. This
makes it affordable. But what is challenging and expensive is tuning the organization’s needs on the
third-party platform.
Another costly affair is the cost of transferring data to a public cloud, especially for a small business or
project.
4. Lack of expertise
With the increasing workload on cloud technologies and continuously improving cloud tools,
management has become difficult. There has been a consistent demand for a trained workforce who can
deal with cloud computing tools and services. Hence, firms need to train their IT staff to minimize this
challenge.
5. Internet Connectivity
Cloud services are dependent on a high-speed internet connection. So businesses that are relatively
small and face connectivity issues should ideally first invest in a good internet connection so that no
downtime happens. It is because internet downtime might incur vast business losses.
6. Control or Governance
Another ethical issue in cloud computing is maintaining proper control over asset management and
maintenance. There should be a dedicated team to ensure that the assets used to implement cloud services
are used according to agreed policies and dedicated procedures. There should be proper maintenance and
the assets are used to meet your organization’s goals successfully.
7. Compliance
Another major risk of cloud computing is maintaining compliance. By compliance we mean, a set of rules
about what data is allowed to be moved and what should be kept in-house to maintain compliance. The
organizations must follow and respect the compliance rules set by various government bodies.
11. Migration
Migration is nothing but moving a new application or an existing application to a cloud. In the case of
a new application, the process is pretty straightforward. But if it is an age-old company application, it
becomes tedious.
Velostrata conducted a survey recently, wherein 95% of organizations are moving their applications to
the cloud. The survey showed that most organizations are finding it a nightmare. Some notable issues
faced here are slow data migrations, security challenges in cloud computing, extensive
troubleshooting, application downtime, migration agents, and cutover complexity.
12. Interoperability and Portability
Another challenge of cloud computing is that applications need to be easily migrated between cloud
providers without being locked for a set period. There is a lack of flexibility in moving from one cloud
provider to another because of the complexity involved. Changing cloud inventions bring a slew of new
challenges like managing data movement and establishing a secure network from scratch. Another challenge
is that customers can’t access it from everywhere, but this can be fixed by the cloud provider so that the
customer can securely access the cloud from anywhere.
In service models where the CSP assumes greater responsibility, this problem gets worse. The
amount of exposure to a CSP's distinctive implementations rises when an agency utilizes
additional features, services, or APIs. When a capability is transferred to a different CSP,
adjustments are necessary due to these special implementations. A significant issue arises if a
chosen CSP closes its doors since data may be lost or may not be able to be promptly moved
4. Increased Complexity Strains IT Staff
IT operations may become more complicated after a cloud migration. It might be necessary for the agency's
existing IT employees to learn a new model to manage, integrate, and operate in the cloud. Along with their
present duties for on-premises IT, IT staff members also need the capability and skill set necessary to
manage, integrate, and sustain the migration of assets and data to the cloud.In the cloud, key management
and encryption services are more complicated. The complexity is further increased because different CSPs
often offer different services, methodologies, and tools for logging and monitoring cloud services. Due to
the complexity of the technology, rules, and implementation techniques, there may potentially be emergent
risks of using cloud computing installations.
7. Account Hijacking
The hijacking of an account or a service still poses a severe security risk related to cloud computing. When a
criminal obtains your personal information, they can use it to access your accounts through account
hijacking. The account hijacker frequently employs one or more methods to obtain your personal
information.
For instance, the attackers frequently employ malicious software called Spyware to gather username,
password, or bank information and send it to the fraudster. They may also use phishing via fake emails or
websites to store credentials.
• Cloud Broker – This role is assumed by a party that assumes the responsibility of
managing and negotiating the usage of cloud services between cloud consumers and cloud
providers. Mediation services provided by cloud brokers include service intermediation,
aggregation, and arbitrage.
• Cloud Carrier – The party responsible for providing the wire-level connectivity between
cloud consumers and cloud providers assumes the role of the cloud carrier. This role is
often assumed by network and telecommunication providers.
While each is legitimate, most architectural scenarios covered in this book do not include
these roles.
BOUNDARIES
• Organizational Boundary
An organizational boundary represents the physical perimeter that surrounds a set of IT resources
that are owned and governed by an organization. The organizational boundary does not represent the
boundary of an actual organization, only an organizational set of IT assets and IT resources.
Similarly, clouds have an organizational boundary
BOUNDARIES
• Trust Boundary
When an organization assumes the role of cloud consumer to access cloud-based IT resources, it needs to
extend its trust beyond the physical boundary of the organization to include parts of the cloud
environment.
A trust boundary is a logical perimeter that typically spans beyond physical boundaries to represent the
extent to which IT resources are trusted . When analyzing cloud environments, the trust boundary is most
frequently associated with the trust issued by the organization acting as the cloud consumer.
CLOUD CHARACTERISTICS
• An IT environment requires a specific set of characteristics to enable the remote provisioning of
scalable and measured IT resources in an effective manner. These characteristics need to exist to a
meaningful extent for the IT environment to be considered an effective cloud.
• The following six specific characteristics are common to the majority of cloud environments:
on-demand usage
ubiquitous access
multitenancy (and resource pooling)
elasticity
measured usage
resiliency
• Cloud providers and cloud consumers can assess these characteristics individually and collectively to
measure the value offering of a given cloud platform. Although cloud-based services and IT resources
will inherit and exhibit individual characteristics to varying extents, usually the greater the degree to
which they are supported and utilized, the greater the resulting value proposition.
On-Demand Usage
A cloud consumer can unilaterally access cloud-based IT resources giving the cloud consumer the
freedom to self-provision these IT resources. Once configured, usage of the self-provisioned IT resources
can be automated, requiring no further human involvement by the cloud consumer or cloud provider. This
results in an on-demand usage environment. Also known as “on-demand self-service usage,” this
characteristic enables the service-based and usage-driven features found in mainstream clouds.
Ubiquitous Access
Ubiquitous access represents the ability for a cloud service to be widely accessible. Establishing
ubiquitous access for a cloud service can require support for a range of devices, transport protocols,
interfaces, and security technologies. To enable this level of access generally requires that the cloud
service architecture be tailored to the particular needs of different cloud service consumers.
Multitenancy (and Resource Pooling)
The characteristic of a software program that enables an instance of the program to serve different
consumers (tenants) whereby each is isolated from the other, is referred to as multitenancy. A cloud
provider pools its IT resources to serve multiple cloud service consumers by using multitenancy models
that frequently rely on the use of virtualization technologies. Through the use of multitenancy technology,
IT resources can be dynamically assigned and reassigned, according to cloud service consumer demands.
Resource pooling allows cloud providers to pool large-scale IT resources to serve multiple cloud
consumers. Different physical and virtual IT resources are dynamically assigned and reassigned according
to cloud consumer demand, typically followed by execution through statistical multiplexing. Resource
pooling is commonly achieved through multitenancy technology, and therefore encompassed by this
Elasticity
Elasticity is the automated ability of a cloud to transparently scale IT resources, as required in response to runtime
conditions or as pre-determined by the cloud consumer or cloud provider. Elasticity is often considered a core
justification for the adoption of cloud computing, primarily due to the fact that it is closely associated with the
Reduced Investment and Proportional Costs benefit. Cloud providers with vast IT resources can offer the greatest
range of elasticity.
Measured Usage
The measured usage characteristic represents the ability of a cloud platform to keep track of the usage of its IT
resources, primarily by cloud consumers. Based on what is measured, the cloud provider can charge a cloud
consumer only for the IT resources actually used and/or for the timeframe during which access to the IT resources
was granted. In this context, measured usage is closely related to the on-demand characteristic.
Measured usage is not limited to tracking statistics for billing purposes. It also encompasses the general
monitoring of IT resources and related usage reporting (for both cloud provider and cloud consumers). Therefore,
measured usage is also relevant to clouds that do not charge for usage
Resiliency
Resilient computing is a form of failover that distributes redundant implementations of IT resources across
physical locations. IT resources can be pre-configured so that if one becomes deficient, processing is
automatically handed over to another redundant implementation. Within cloud computing, the characteristic of
resiliency can refer to redundant IT resources within the same cloud (but in different physical locations) or across
multiple clouds. Cloud consumers can increase both the reliability and availability of their applications by
CLOUD DELIVERY MODELS
• A cloud delivery model represents a specific, pre-packaged combination of IT resources offered by
a cloud provider.
• Three common cloud delivery models have become widely established and formalized:
Infrastructure-as-a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
• These three models are interrelated in how the scope of one can encompass that of another
Infrastructure-as-a-Service (IaaS)
The IaaS delivery model represents a self-contained IT environment comprised
of infrastructure-centric IT resources that can be accessed and managed via cloud
service-based interfaces and tools. This environment can include hardware,
network, connectivity, operating systems, and other “raw” IT resources. In
contrast to traditional hosting or outsourcing environments, with IaaS, IT
resources are typically virtualized and packaged into bundles that simplify up-
front runtime scaling and customization of the infrastructure.
The general purpose of an IaaS environment is to provide cloud consumers with
a high level of control and responsibility over its
configuration and utilization. The IT resources provided by IaaS are generally
not pre-configured, placing the administrative responsibility directly upon the
cloud consumer. This model is therefore used by cloud consumers that require a
high level of control over the cloud-based environment they intend to create.
Sometimes cloud providers will contract IaaS offerings from other cloud
providers in order to scale their own cloud environments. The types and brands
of the IT resources provided by IaaS products offered by different cloud
providers can vary. IT resources available through IaaS environments are
generally offered as freshly initialized virtual instances. A central and primary IT
resource within a typical IaaS environment is the virtual server. Virtual servers
are leased by specifying server hardware requirements, such as processor
capacity, memory, and local storage space,
Platform-as-a-Service (PaaS)
PaaS delivery model represents a pre-defined “ready-to-use”
vironment typically comprised of already deployed and configured PaaS products are available with different
resources. Specifically, PaaS relies on (and is primarily defined by) development stacks. For example, Google App
usage of a ready-made environment that establishes a set of pre- Engine offers a Java and Python-based
ckaged products and tools used to support the entire delivery environment.
ecycle of custom applications.
mmon reasons a cloud consumer would use and invest in a PaaS
vironment include: The cloud consumer wants to extend on-
premise environments into cloud for scalability and economic
purposes.
The cloud consumer uses the ready-made environment to entirely
bstitute an on-premise environment.
he cloud consumer wants to become a cloud provider and deploys
own cloud services to be made available to other external cloud
nsumers.
working within a ready-made platform, the cloud consumer is
the administrative burden of setting up and maintaining the re
infrastructure IT resources provided via the IaaS model.
nversely, the cloud consumer is granted a lower level of control
er the underlying IT resources that host and provision the platform
Software-as-a-Service (SaaS)
A software program positioned as a
shared cloud service and made available
as a “product” or generic utility
represents the typical profile of a SaaS
offering. The SaaS delivery model is
typically used to make a reusable cloud
service widely available (often
commercially) to a range of cloud
consumers. An entire marketplace exists
around SaaS products that can be leased
and used for different purposes and via
different terms
A cloud consumer is generally granted very limited administrative control over a SaaS implementation. It is most
often provisioned by the cloud provider, but it can be legally owned by whichever entity assumes the cloud service
owner role. For example, an organization acting as a cloud consumer while using and working with a PaaS
environment can build a cloud service that it decides to deploy in that same environment as a SaaS offering. The
same organization then effectively assumes the cloud provider role as the SaaS-based cloud service is made available
to other organizations that act as cloud consumers when using that cloud service.
CLOUD DEPLOYMENT MODELS
• A cloud deployment model represents a specific type of cloud environment, primarily distinguished
by ownership, size, and access.
• There are four common cloud deployment models:
Public cloud
Community cloud
Private cloud
Hybrid cloud
Other Cloud Deployment Models
Additional variations of the four base cloud deployment models can exist. Examples include:
• Virtual Private Cloud – Also known as a “dedicated cloud” or “hosted cloud,” this model results in a
self-contained cloud environment hosted and managed by a public cloud provider, and made available
to a cloud consumer.
• Inter-Cloud – This model is based on an architecture comprised of two or more inter-connected
clouds.
FEDERATED CLOUD/INTERCLOUD
2. Cloud Coordinator
The cloud coordinator assigns the resources of the cloud to the
remote users based on the quality of service they demand and the
credits they have in the cloud bank. The cloud enterprises and their
membership are managed by the cloud controller.
3. Cloud Broker
The cloud broker interacts with the cloud coordinator, analyzes the Federal Cloud Architecture
Service-level agreement and the resources offered by several cloud
Properties of Federated Cloud
In the federated cloud, the users can interact with the architecture either centrally or in a decentralized
manner. In centralized interaction, the user interacts with a broker to mediate between them and the
organization. Decentralized interaction permits the user to interact directly with the clouds in the federation.
Federated cloud can be practiced with various niches like commercial and non-commercial.
The visibility of a federated cloud assists the user to interpret the organization of several clouds in the
federated environment.
Federated cloud can be monitored in two ways. MaaS (Monitoring as a Service) provides information that
aids in tracking contracted services to the user. Global monitoring aids in maintaining the federated cloud.
The providers who participate in the federation publish their offers to a central entity. The user interacts with
this central entity to verify the prices and propose an offer.
The marketing objects like infrastructure, software, and platform have to pass through federation when
consumed in the federated cloud.
Benefits of Federated Cloud:
It minimizes the consumption of energy.
It increases reliability.
It minimizes the time and cost of providers due to dynamic scalability.
It connects various cloud service providers globally. The providers may buy and sell services
on demand.
It provides easy scaling up of resources.
1. OpenNebula
It is a cloud computing platform for managing heterogeneous distributed data center infrastructures. It
can use the resources of its interoperability, leveraging existing information technology assets,
protecting the deals, and adding the application programming interface (API).
2. Aneka coordinator
The Aneka coordinator is a proposition of the Aneka services and Aneka peer components (network
architectures) which give the cloud ability and performance to interact with other cloud services.
3. Eucalyptus
Eucalyptus defines the pooling computational, storage, and network resources that can be measured
scaled up or down as application workloads change in the utilization of the software. It is an open-
source framework that performs the storage, network, and many other computational resources to
access the cloud environment.
Intercloud Federation Framework for Multi-provider Cloud Services
Integration
TYPES OF CLOUDS
cloud computing is “ Internet-based computing in which a shared pool of resources
is available over broad network access, these resources can be provisioned or
released with minimum management efforts and service-provider interaction.”
• Public cloud
• Private cloud
• Hybrid cloud
• Community cloud
• Multi cloud
Public cloud
• Public clouds are managed by third parties which provide cloud services
over the internet to the public, these services are available as pay-as-you-go
billing models.
• They offer solutions for minimizing IT infrastructure costs and become a
good option for handling peak loads on the local infrastructure.
• Public clouds are the go-to option for small enterprises, which can start
their businesses without large upfront investments by completely relying on
public infrastructure for their IT needs.
• The fundamental characteristics of public clouds are multitenancy.
• A public cloud is meant to serve multiple users, not a single customer.
• A user requires a virtual computing environment that is separated, and most
likely isolated, from other users.
Public cloud
Public Cloud
Advantages Disadvantages
1. High Scalability 1. Loss of control over data
2. Cost Reduction 2. Data security and privacy
3. Reliability and flexibility 3. Limited Visibility
4. Disaster Recovery 4. Unpredictable cost
Private cloud
Advantages Disadvantages
1. Customer information protection: In the
private cloud security concerns are less since 1. The restricted area of
customer data and other sensitive information operations: Private cloud is accessible
do not flow out of private infrastructure. within a particular area. So the area of
2. Infrastructure ensuring SLAs: Private cloud accessibility is restricted.
provides specific operations such as
appropriate clustering, data replication, system
monitoring, and maintenance, disaster 2. Expertise requires: In the private
recovery, and other uptime services. cloud security concerns are less since
3. Compliance with standard procedures and customer data and other sensitive
operations: Specific procedures have to be
put in place when deploying and executing information do not flow out of private
applications according to third-party infrastructure. Hence skilled people
compliance standards. This is not b
case are required to manage & operate
cloud services.
Hybrid cloud
Advantages Disadvantages
1. It’s possible that businesses lack the internal
• 1) Cost: Available at a cheap cost than knowledge necessary to create such a hybrid
other clouds because it is formed by a environment. Managing security may also be
more challenging. Different access levels and
distributed system. security considerations may apply in each
environment.
• 2) Speed: It is efficiently fast with
2. Managing a hybrid cloud may be more
lower cost, It reduces the latency of difficult. With all of the alternatives and
the data transfer process. choices available today, not to mention the
new PaaS components and technologies that
• 3) Security: Most important thing is will be released every day going forward,
public cloud and migration to public cloud are
security. A hybrid cloud is totally safe already complicated enough. It could just feel
and secure because it works on the like a step too far to include hybrid.
distributed system network.
Community cloud
Advantages Disadvantages
1. Because the entire cloud is shared by 1. Not all businesses should choose community
numerous enterprises or a community, cloud.
community clouds are cost-effective.
2. Because it works with every user, the 2. gradual adoption of data
community cloud is adaptable and scalable.
Users can alter the documents according to 3. It’s challenging for corporations to share
their needs and requirements. duties.
3. Public cloud is less secure than the
community cloud, which is more secure than
private cloud.
4. Thanks to community clouds, we may share
cloud resources, infrastructure, and other
capabilities between different enterprises.
Multi cloud
1. Flexibility: Using multiple cloud providers allows 1. Complexity: Managing multiple cloud providers
organizations to choose the best-suited services for and services can be complex and require
their specific needs, and avoid vendor lock-in. specialized knowledge and expertise.
2. Cost-effectiveness: Organizations can take 2. Increased costs: The cost of managing multiple
advantage of the cost savings and pricing benefits cloud providers and services can be higher than
offered by different cloud providers for different using a single provider.
services. 3. Compatibility issues: Different cloud providers may
3. Improved performance: By distributing workloads use different technologies and standards, which can
across multiple cloud providers, organizations can cause compatibility issues and require additional
improve the performance and availability of their resources to resolve.
applications and services. 4. Limited interoperability: Different cloud providers
4. Increased security: Organizations can increase the may not be able to interoperate seamlessly, which
security of their data and applications by spreading can limit the ability to move data and applications
them across multiple cloud providers and between them.
implementing different security strategies for each.
•
END OF Unit I
63