Module 1
Module 1
Cloud
A cloud refers to a distinct IT environment that is designed for the purpose of
remotely
provisioning scalable and measured IT resources. The term originated as a
metaphor
for the Internet, which is, in essence, a network of networks providing remote access
to a set of decentralized IT resources. This same symbol is now used to specifically
represent the boundary of a cloud environment, as shown in Figure 3.1.
As a specific environment used to remotely provision IT resources, a cloud has a
finite boundary. There are many individual clouds that are accessible via the
Internet.
The Internet provides open access to many Web-based IT resources, and a cloud
is typically privately owned and offers access to IT resources that are metered.
Much of the Internet is dedicated to the access of content-based IT resources
published via the World Wide Web.
IT resources provided by cloud environments, on the other hand, are dedicated to
supplying back-end processing capabilities and user-based access to these
capabilities. Another key distinction is that it is not necessary for clouds to be Web-
based, even if they are commonly based on Internet protocols and technologies.
Protocols refer to standards and methods that allow computers to communicate
with each other in a pre-defined and structured manner.
A cloud can be based on the use of any protocols that allow for the remote access to
its IT resources.
IT Resource
An IT resource is a physical or virtual IT-related artifact that can be either software-
based, such as a virtual server or a custom software program, or hardware-based, such
as as a physical server or a network device (Figure 3.2).
On-Premise
An IT resource that is hosted in a conventional IT enterprise within an organizational
boundary (that does not specifically represent a cloud) is considered to be located on the
premises of the IT enterprise, or on-premise for short.
In other words, the term “on-premise” is another way of stating “on the premises of a
controlled IT environment that is not cloud-based.”
This term is used to qualify an IT resource as an alternative to “cloud-based.”
• An on-premise IT resource can access and interact with a cloud-based IT resource.
• An on-premise IT resource can be moved to a cloud, thereby changing it to a cloud-based IT
resource.
• Redundant deployments of an IT resource can exist in both on-premise and cloudbased
environments.
Cloud Consumers and Cloud Providers
• The party that provides cloud-based IT resources is the cloud provider. The party
that uses cloud-based IT resources is the cloud consumer.
• These terms represent roles usually assumed by organizations in relation to clouds
and corresponding cloud provisioning contracts.
Scaling
Scaling, from an IT resource perspective, represents the ability of the IT resource to
handle increased or decreased usage demands.
The following are types of scaling:
• Horizontal Scaling – scaling out and scaling in
• Vertical Scaling – scaling up and scaling down
Horizontal Scaling
The allocating or releasing of IT resources that are of the same type is referred to as
horizontal scaling.
The horizontal allocation of resources is referred to as scaling out, and the horizontal
releasing of resources is referred to as scaling in.
Horizontal scaling is a common form of scaling within cloud environments.
Vertical Scaling
When an existing IT resource is replaced by another with a higher or lower capacity,
vertical scaling is considered to have occurred. Specifically, the replacing of an IT
resource with another that has a higher capacity is referred to as scaling up, and the
replacing an IT resource with another that has a lower capacity is considered scaling
down. Vertical scaling is less common in cloud environments due to the downtime
required while the replacement is taking place.
Cloud Service
Although a cloud is a remotely accessible environment, not all IT resources residing
within a cloud can be made available for remote access. For example, a database or a
physical server deployed within a cloud may only be accessible by other IT resources that
are within the same cloud. A software program with a published API may be deployed
specifically to enable access by remote clients.
• A cloud service is any IT resource that is made remotely accessible via a cloud.
• Unlike other IT fields that fall under the service technology umbrella, such as
service-oriented architecture, the term “service” within the context of cloud
computing is especially broad.
• A cloud service can exist as a simple Web-based software program with a technical
interface invoked via the use of a messaging protocol, or as a remote access point for
administrative tools or larger environments and other IT resources.
Cloud Service Consumer
The cloud service consumer is a temporary runtime role assumed by a software program
when it accesses a cloud service.
As shown in Figure 3.7, common types of cloud service consumers can include software
programs and services capable of remotely accessing cloud services with published
service contracts, as well as workstations, laptops, and mobile devices running software
capable of remotely accessing other IT resources positioned as cloud services.
Goals and Benefits
Reduced Investments and Proportional Costs
Similar to a product wholesaler that purchases goods in bulk for lower price points,
public cloud providers base their business model on the mass-acquisition of IT resources
that are then made available to cloud consumers via attractively priced leasing packages.
This opens the door for organizations to gain access to powerful infrastructure without
having to purchase it themselves.
The most common economic rationale for investing in cloud-based IT resources is in the
reduction or outright elimination of up-front IT investments, namely hardware and
software purchases and ownership costs.
A cloud’s Measured Usage characteristic represents a feature-set that allows measured
operational expenditures (directly related to business performance) to replace anticipated
capital expenditures. This is also referred to as proportional costs.
Cloud consumers are usually allotted a level of governance control that is lower
than that over on-premise IT resources.
This can introduce risks associated with how the cloud provider operates its cloud,
as well as the external connections that are required for communication between the
cloud and the cloud consumer.
3. Limited Portability Between Cloud Providers
Due to a lack of established industry standards within the cloud computing industry,
public clouds are commonly proprietary to various extents.
For cloud consumers that have custom-built solutions with dependencies on these
proprietary environments, it can be challenging to move from one cloud provider to
another.
Multi-Regional Compliance and Legal Issues
Third-party cloud providers will frequently establish data centers in affordable or
convenient geographical locations.
Cloud consumers will often not be aware of the physical location of their IT resources
and data when hosted by public clouds.
For some organizations, this can pose serious legal concerns pertaining to industry or
government regulations that specify data privacy and storage policies.
For example, some UK laws require personal data belonging to UK citizens to be kept
within the United Kingdom.
Another potential legal issue pertains to the accessibility and disclosure of data.
Countries have laws that require some types of data to be disclosed to certain
government agencies or to the subject of the data.
For example, a European cloud consumer’s data that is located in the U.S. can be
more easily accessed by government agencies (due to the U.S. Patriot Act) when
compared to data located in many European Union countries
Roles and Boundaries
Cloud Provider
The organization that provides cloud-based IT resources is the cloud provider.
When assuming the role of cloud provider, an organization is responsible for
making cloud services available to cloud consumers, as per agreed upon SLA
guarantees.
The cloud provider is further tasked with any required management and
administrative duties to ensure the on-going operation of the overall cloud
infrastructure.
Cloud providers normally own the IT resources that are made available for lease by
cloud consumers; however, some cloud providers also “resell” IT resources leased
Cloud Consumer
A cloud consumer is an organization (or a human) that has a formal contract or
arrangement with a cloud provider to use IT resources made available by the cloud
provider.
Specifically, the cloud consumer uses a cloud service consumer to access a cloud
service.
Cloud Service Owner
The person or organization that legally owns a cloud service is called a cloud service
owner. The cloud service owner can be the cloud consumer, or the cloud provider that
owns the cloud within which the cloud service resides.
Cloud Resource Administrator
A cloud resource administrator is the person or organization responsible for
administering a cloud-based IT resource (including cloud services).
The cloud resource administrator can be (or belong to) the cloud consumer or
cloud provider of the cloud within which the cloud service resides.
Alternatively, it can be (or belong to) a third-party organization contracted to
administer the cloud-based IT resource.
Additional Roles
• Cloud Auditor – A third-party (often accredited) that conducts independent
assessments of cloud environments assumes the role of the cloud auditor. The typical
responsibilities associated with this role include the evaluation of security controls,
privacy impacts, and performance. The main purpose of the cloud auditor role is to
provide an unbiased assessment (and possible endorsement) of a cloud environment to
help strengthen the trust relationship between cloud consumers and cloud providers.
• Cloud Broker – This role is assumed by a party that assumes the responsibility of
managing and negotiating the usage of cloud services between cloud consumers and
cloud providers. Mediation services provided by cloud brokers include service
intermediation, aggregation, and arbitrage.
• Cloud Carrier – The party responsible for providing the wire-level connectivity
between cloud consumers and cloud providers assumes the role of the cloud carrier.
This role is often assumed by network and telecommunication providers.
Organizational Boundary
• An organizational boundary represents the physical perimeter that surrounds a set of
IT resources that are owned and governed by an organization.
• The organizational boundary does not represent the boundary of an actual
organization, only an organizational set of IT assets and IT resources.
• Similarly, clouds have an organizational boundary
Trust Boundary
o When an organization assumes the role of cloud consumer to access cloud-based
IT resources, it needs to extend its trust beyond the physical boundary of the
organization to include parts of the cloud environment.
o A trust boundary is a logical perimeter that typically spans beyond physical
boundaries to represent the extent to which IT resources are trusted.
o When analyzing cloud environments, the trust boundary is most frequently
associated with the trust issued by the organization acting as the cloud consumer.
Cloud Characteristics
An IT environment requires a specific set of characteristics to enable the remote
provisioning of scalable and measured IT resources in an effective manner. The
following six specific characteristics are common to the majority of cloud
environments:
• on-demand usage
• ubiquitous access
• multitenancy (and resource pooling)
• elasticity
• measured usage
• resiliency
Cloud providers and cloud consumers can assess these characteristics individually and
collectively to measure the value offering of a given cloud platform. Although cloud-
based services and IT resources will inherit and exhibit individual characteristics to
varying extents, usually the greater the degree to which they are supported and utilized,
the greater the resulting value proposition.
On-Demand Usage
A cloud consumer can unilaterally access cloud-based IT resources, giving the cloud
consumer the freedom to self-provision these IT resources. Once configured, usage of the
self-provisioned IT resources can be automated, requiring no further human involvement
by the cloud consumer or cloud provider. This results in an on-demand usage
environment. Also known as “on-demand self-service usage,” this characteristic enables
the service-based and usage-driven features found in mainstream clouds.
Ubiquitous Access
Ubiquitous access represents the ability for a cloud service to be widely accessible.
Establishing ubiquitous access for a cloud service can require support for a range of
devices, transport protocols, interfaces, and security technologies. To enable this level
of access generally requires that the cloud service architecture be tailored to the
particular needs of different cloud service consumers.
Multitenancy (and Resource Pooling)
The characteristic of a software program that enables an instance of the program to
serve different consumers (tenants) whereby each is isolated from the other, is referred
to as multitenancy. A cloud provider pools its IT resources to serve multiple cloud
service consumers by using multitenancy models that frequently rely on the use of
virtualization technologies. Through the use of multitenancy technology, IT resources
can be dynamically assigned and reassigned according to cloud service consumer
demands.
Resource pooling allows cloud providers to pool large-scale IT resources to serve
multiple cloud consumers. Different physical and virtual IT resources are dynamically
assigned and reassigned according to cloud consumer demand, typically followed by
execution through statistical multiplexing. Resource pooling is commonly achieved
through multitenancy technology and therefore encompasses this multitenancy
characteristic.
Elasticity
Elasticity is the automated ability of a cloud to transparently scale IT resources, as
required in response to runtime conditions or as pre-determined by the cloud consumer
or cloud provider. Elasticity is often considered a core justification for the adoption of
cloud computing, primarily due to the fact that it is closely associated with the Reduced
Investment and Proportional Costs benefit. Cloud providers with vast IT resources can
offer the greatest range of elasticity.
Measured Usage
The measured usage characteristic represents the ability of a cloud platform to keep
track of the usage of its IT resources, primarily by cloud consumers. Based on what is
measured, the cloud provider can charge a cloud consumer only for the IT resources
actually used and/or for the timeframe during which access to the IT resources was
granted. In this context, measured usage is closely related to the on-demand
characteristic.
Measured usage is not limited to tracking statistics for billing purposes. It also
encompasses the general monitoring of IT resources and related usage reporting (for
both cloud providers and cloud consumers).
Resiliency
Resilient computing is a form of failover that distributes redundant implementations of
IT resources across physical locations. IT resources can be pre-configured so that if one
becomes deficient, processing is automatically handed over to another redundant
implementation. Within cloud computing, the characteristic of resiliency can refer to
redundant IT resources within the same cloud (but in different physical locations) or
across multiple clouds. Cloud consumers can increase both the reliability and availability
of their applications by leveraging the resiliency of cloud-based IT resources
Cloud Service Models
The cloud computing ecosystem is primarily structured around three core service models:
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a
Service(SaaS). Each model offers different levels of abstraction and management
responsibility, catering to diverse user needs and technical requirements
• IaaS is the cloud service model that offers a higher level of control compared with an
on-premises solution.
• PaaS makes the process of developing and deploying applications simpler and more
cost-effective.
• SaaS makes collaboration among teams and access to software applications easier.
PaaS benefits
Easy to use. Simple and cost-effective applications development, testing, and
deployment.
Productivity. Developers can build scalable and highly available customized
applications easily and with less code.
Agility. Faster innovation.
Collaboration. It enhances collaboration among teams spread across diverse
locations.
PaaS concerns
Data security.
Interoperability and vendor lock-in.
Integrations and compatibility.
Operational limitations.
Runtime.
SaaS (Software as a Service)
SaaS is a cloud service model that consists of delivering cloud-based applications to
users over the Internet.
Software is hosted online and made available to customers on a subscription basis or
for purchase.
SaaS cloud providers host applications in his network and users can access them
through a browser or app, from different devices.
Software as a Service is also known as “on-demand software” or “cloud application
services”.
SaaS providers are responsible for developing, hosting, maintaining and updating
the software.
Therefore, users only need to login and start using it online, without installing or
hosting any software locally.
As a result, IT staff do not need to waste time downloading and installing
applications on each employee’s computer.
However, this also entails that end users do not have much control over it. This lack
of control can be a handicap for some businesses.
Software as a Service is the most common cloud computing service. We all use some
SaaS products in our daily lives.
Some examples of SaaS are Google Workspace, Dropbox and Salesforce.
The SaaS market is expected to reach $702 billion by 2030 (approximately €689
billion), growing at a CAGR of 18.82% between 2021 and 2030.
SaaS benefits
Efficiency. It allows saving time and money by outsourcing the installation, management and
upgrade of software applications.
Time saving. IT staff are free to consecrate their time on more valuable, complex tasks.
Regular updates. Continuous upgrades and UX improvements.
Accessibility. Users can access the software from anywhere, using any supported device.
SaaS concerns
Data security.
Customization and feature limitations.
Interoperability and vendor lock-in.
Integration support.
Performance.
Comparing on-premises, IaaS, PaaS, and SaaS models
IaaS PaaS SaaS
Computing, storage and Development and
Cloud-based applications.
networking resources. deployment environments.
Accessed via a dashboard Accessed through a browser
Accessed via the web.
or API. or app.
Available for free, on a
Available on a pay-per-use Available on a pay-per-use
subscription basis or for
or pay-as-you-go basis. basis.
purchase.
Network architects and IT
Software developers. End users.
administrators.
Cloud Deployment Models
Cloud Computing has now become an essential part of modern businesses, offering
flexibility, scalability, and cost-effective solutions.
However, selecting the most appropriate cloud deployment model is essential to fully
utilize the potential of cloud services.
Whether you're a small business or a large enterprise, choosing the right cloud model
can affect your security, scalability, and operational efficiency.
A cloud deployment model fundamentally determines where the infrastructure for
your deployment exists and who owns and controls that infrastructure.
Public Cloud
The public cloud makes it possible for anybody to access systems and services. The
public cloud may be less secure as it is open to everyone. The public cloud is one in
which cloud infrastructure services are provided over the internet to the general people
or major industry groups. The infrastructure in this cloud model is owned by the entity
that delivers the cloud services, not by the consumer. It is a type of cloud hosting that
allows customers and users to easily access systems and services. This form of cloud
computing is an excellent example of cloud hosting, in which service providers supply
services to a variety of customers. In this arrangement, storage backup and retrieval
services are given for free, as a subscription, or on a per-user basis. For example,
Disadvantages of the Public Cloud Model
•Less secure: Public cloud is less secure as resources are public, so there is no
guarantee of high-level security.
•Low customization: It is accessed by many public, so it can't be customized according
to personal requirements.
Advantages of the Public Cloud Model
•Minimal Investment: Because it is a pay-per-use service, there is no substantial
upfront fee, making it excellent for enterprises that require immediate access to
resources.
•No setup cost: The entire infrastructure is fully subsidized by the cloud service
providers, thus there is no need to set up any hardware.
•Infrastructure Management is not required: Using the public cloud does not
necessitate infrastructure management.
•No maintenance: The maintenance work is done by the service provider (not users).
•Dynamic Scalability: To fulfill your company's needs, on-demand resources are
accessible.
Private Cloud
The private cloud deployment model is the exact opposite of the public cloud
deployment model. It's a one-on-one environment for a single user (customer). There is
no need to share your hardware with anyone else. The distinction between
private and public clouds is in how you handle all of the hardware. It is also called the
"internal cloud" & it refers to the ability to access systems and services within a given
border or organization. The cloud platform is implemented in a cloud-based secure
environment that is protected by powerful firewalls and under the supervision of an
organization's IT department. The private cloud gives greater flexibility of control over
cloud resources.
Disadvantages of the Private Cloud Model
•Less scalable: Private clouds are scaled within a certain range as there is less number
of clients.
•Costly: Private clouds are more costly as they provide personalized facilities.
Advantages of the Private Cloud Model
•Better Control: You are the sole owner of the property. You gain complete command
over service integration, IT operations, policies, and user behavior.
•Data Security and Privacy: It's suitable for storing corporate information to which
only authorized staff have access. By segmenting resources within the same
infrastructure, improved access and security can be achieved.
•Supports Legacy Systems: This approach is designed to work with legacy systems
that are unable to access the public cloud.