1 193 APPENDIX 1 CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS A Cost Savings The biggest reason for shifting to cloud computing is cost. Any company or enterprise has to face sizable costs for configuring, installing, upgrading and maintaining the IT infrastructure. Cloud computing replaces capital and ongoing costs with a fixed monthly fee, typically around one fifth of the current amount A Remote Working One of the biggest IT challenges that companies and enterprises have been facing is how to deliver applications and data remotely. Cloud computing does it permanently and securely. A Efficiency Organizations that adopt cloud computing work more efficiently because the task of maintaining and servicing an complicated IT infrastructure is removed, leaving them to concentrate on their core business and at the same time getting better response times and less down time.
2 194 A Flexibility No company or business can predict the future. Cloud computing brings flexibility to applications which can be turned on and off as required, making their cost a direct reflection of their value to the business. Also, infrastructure and servers can be scaled up or down as and when required based on business needs. A Future Proofing If businesses can increasingly shift their IT resources to the cloud, many cloud-based app stores can crowd source their future apps development, thereby reducing their need for large internal IT functions or expensive research tech shops to predict and produce their future IT services and apps. A Morale Boosting Internal IT functions don t exactly enjoy the IT maintenance, helpdesk, support, and operation functions. And the users are never really satisfied with the service. Outsourcing all these to cloud-based service providers could prove a morale booster.
3 195 A Resilience without Redundancy Buying a new server in case of failure and keeping an unused server idle is a cost-issue and also time consuming. Cloud computing service can deal with this redundancy requirement. A 1.2 CLOUD CHARACTERISTICS A On-demand Self-services Consumer can unilaterally provision the capabilities like server, storage etc., as needed automatically, requiring no human interaction. The on demand self-service has enabled the customers to use the services whenever required without the interaction of customer and provider. Amazon Web Services (AWS), Google, Salesforce.com, Microsoft, IBM are some of the cloud service providers who provide on demand selfservices. For example, if additional computing power is needed for an application to support heavy load, then the process normally has to follow few standard steps in an organization. Initially, a hardware vendor will be called and new machines are ordered. After receiving the prescribed hardware device(s), installation of operating system, network connections, firewall/proxy rules configuration, etc. are done. Later, installation of the application is performed and machines are added to the pool. This can be viewed as simple and routine process; but it requires lot of interactions between both internal and external teams. This burden of time and manual dependency had been promptly addressed through on demand self-service by cloud computing.
4 196 A Broad Network Access In general, cloud services are available on the Internet and their access is supported through a standard mechanism. Internet has been in use already for more than two decades and cloud has provided advances in the usage of Internet from heterogeneous clients like desktops, laptops, mobile phones and tablets, etc. A Resource Pooling Resource pooling allows providing both virtual and physical services by service providers through multi-tenant model. The customers have no knowledge about the location of the resources provided. The examples of such resources are services, memory, network bandwidth, storage, processing, virtual machines, etc. Resource pooling enables the cloud providers to achieve high resource utilization and application density. As a result, resource price falls. Resource pooling can be shifted easily. At times the customer can request resources from the pool and return it back to the pool after utilizing so that somebody else can use it. A Rapid Elasticity Cloud computing has ability of resource scalability or providing computing power as needed by the customers. Based on demand, one s resources can scale outward and inward. Capabilities are provisioned and released elastically. Provisioning capabilities appear unlimited to the customer. Elasticity is related to resource pooling and easy to expand and contract the application resources. The elasticity leads to save money
5 197 since it is automated for contraction and expansion. In traditional case the elasticity is achieved as follows: When the load increases, power up more machines and add to the server pool; when the load decreases remove servers from the pool and power off. It is more expensive to add and remove the servers from the pool. When the load is heavy it results in errors and the requests are dropped. But in cloud, resource adding and removing is easier because they are all virtualized and completely dynamic in nature. A Measured Service In cloud, services are provisioned to users as measured service by the cloud service provider; and based on the consumption individual customers are charged. This helps in improved capacity planning, resource optimization, access control and reduced billing. Cloud systems control the resources and they are optimized to the service type. Resource usage can be controlled, monitored and transparent to consumer of the utilized service. The resource usages are monitored and measured by the cloud service providers through which they can bill their customers. Measured service is considered to be important because it can assist in preparing the budget of each current application for future growth. It can also help in preparing budget for the upcoming projects with similar applications. Developers and application architects use it for lower utilization of the resource. Cloud service providers optimize resources of datacenter and have higher density for all hardware by using this service. But in the traditional approach it does not showcase the capacity utilization, network capacity and the storage.
6 198 A Dynamic Computing Infrastructure Dynamic computing infrastructure is required by cloud computing. The dynamic infrastructure consists of foundations like scalable, secure physical infrastructure and standardized. To ensure availability there should be redundancy levels. For running services, server virtualization is leveraged by virtualized environments. Through software automation these services are provisioned and de-provisioned. The workloads of these service are moved when the demands for capacity varies. At last the infrastructure is utilized whether provided by internal or external. When maintaining the security and reliability it looks critical for dynamic computing infrastructure to support the service provisioning and deprovisioning. But with the basement of integrated technological mix, cloud computing is balancing dynamic computing infrastructure to the greater extend as compared to early contestants. A IT Service-centric Approach Cloud computing performs IT service-centric approach. This is in contrast with system-centric models. The users of the cloud would prefer to access the instance of application quickly. The users can access the computing environments which are designed around the service by removing the server-centric view. The user adoption and business agility is enabled by IT Service Centric approach.
7 199 A Minimally or Self-managed Platform A self-managed technology platform should be used by the provider to provide a cloud efficiently for its constituents. Self-management is enabled by best-of-breed clouds through software automation, leveraging the capabilities as shown below: To deploy the services and to tear them down for reuse a provisioning engine is used. Reserving and scheduling mechanisms for resource capacity. Managing, configuring, reporting capabilities to ensure resources are allocated or reallocated to multiple users. These capabilities enable agility but also enacting critical administrative control. A Consumption-based Billing Based on consumption of the resources the customers are charged in cloud computing. The mechanisms that capture information for billing are provided by the cloud computing platforms. This helps the customer to keep their costs down. These characteristics are necessary to produce private cloud which reduces support costs, operating costs, increase business agility.
8 200 A Multi-tenancy Multi-tenancy enables cost and resource sharing which increases the capacity of load, utilization and efficiency for systems. Multi-tenancy refers to the need for service levels, governance, segmentation, isolation, policy-driven enforcement for constituencies of the consumer. The consumers from the same organization utilize the service offered by the provider. A Managed Metering Uses metering for managing and optimization of service and provide billing and reporting. During the billing period consumer services are billed for which they have used. It allows cloud computing for service deployment and sharing of services. Bill is provided to customer for the services which they have actually used. A 1.3 CLOUD SERVICE MODEL A Infrastructure as a Service The consumer has the ability to provision network, processing, storage, and other fundamental computing resources. In IaaS, the consumer can deploy and run arbitrary software which includes applications and operating systems. The consumer has control over storage, deployed applications, and operating systems but not the underlying cloud infrastructure.
9 201 IaaS reduces money and time required to install new hardware systems i.e. equipment is outsourced to support operations. This is a provision model in which service provider is responsible for the storage, running and maintenance of the equipment. A company can run its databases, operating systems, applications and other software on top of the selected infrastructure, and they have no direct access to those machines. The cloud infrastructure is managed by the cloud service provider and also the process of scaling up or down is done by the provider if needed. IaaS is similar in concept to a traditional dedicated hosting service, with two major differences: Organizations pay for only what s used on a utility basis and they tap into a highly scalable pool of resources. In other words, organizations can increase their productivity while eliminating underutilization costs.
10 202 Fig. A 1.1. IaaS Service Offerings. Challenges Out of the box IaaS only provides basic security (load balancing, perimeter firewall, etc.). Applications moving into the cloud need higher levels of security provided at the host. Security responsibilities of both the service provider and the consumer vary based on different CSP s. Amazon s Elastic Compute Cloud (EC2) includes vendor responsibility for security up to the hypervisor which means that they can only address security controls such as physical security, virtualization security and environmental security. IaaS solution provided by Amazon also has some limitations. One major problem with Amazon Web Services is its low level of abstraction. A Platform as a Service In cloud infrastructure, the customer has the capability to deploy consumer- acquired applications created using tools and programming languages that are supported by the provider. The consumer does not control the underlying cloud infrastructure including network, operating systems, storage or servers but has control over the applications deployed onto the cloud and possibly application hosting environment configurations.
11 203 Fig. A 1.2. PaaS Service Offerings. PaaS provides computational resources through the platform such as Operating System. PaaS is built upon the principles of Infrastructure as a Service by providing an environment where applications can be built and deployed in a secure, rapid and high quality manner. The business needs Information Technology to rapidly develop, deploy, and maintain new applications to remain competitive and PaaS helps organizations in the same. PaaS eliminates the capacity concerns and hardware dependency. It also provides a simplified deployment model.
12 204 Challenges In PaaS model the developers have been given control by the providers to build applications on top of the platform, whereas any security below the application level such as network and host intrusion prevention will be in the provider s scope. The provider needs to verify that the data remains inaccessible between applications. PaaS model offers developers a service that provides a complete software development lifecycle management. Everything else is abstracted away from the eyes of the developers. The disadvantage of PaaS is that this abstraction can be helpful for a hacker to leverage the PaaS cloud infrastructure for a malware command. A Software as a Service In SaaS, consumer has the capability to use applications provided by the cloud provider (CSP). Through various client devices, these applications can be accessed by using a thin client interface (e.g. web based e- mail).the consumer does not control the underlying cloud infrastructure including servers, network, operating systems, storage, or even individual application capabilities. Customer relationship management (CRM), IT service management, intrusion prevention, Spam filtering, , human resources management and calendaring are some of the common applications delivered as cloud software services.
13 205 Fig. A 1.3. SaaS Service Offerings. Challenges One of the main issues with SaaS applications is integration. SaaS applications provide services for business area like enterprise resource planning (ERP). As a result companies have to face serious problems with forecasting automated business processes and accurate data where functionality sharing and real time data is needed. Some SaaS providers have developed application programming interfaces (APIs) to overcome integration challenge. Due to API modifications and updates, accessing and managing data via an API requires coding and maintenance. Another challenge with SaaS application is data locality. In SaaS, consumers use the applications to process their business data. The problem is that the
14 206 customer will not be aware of where the data is getting stored. Due to data privacy laws and compliance in various countries, locality of data becomes very important in part of the enterprise architecture. A 1.4 CLOUD DEPLOYMENT MODELS Based on the implementation of cloud computing, the entire cloud can be divided into four. They are Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud . Fig. A 1.4. Deployment Model Outline. A Public Cloud or External Cloud This model of cloud implementation is known as true cloud hosting. In this hosting, the entire services, infrastructure and resources are provided
15 207 to various clients all over the world by a third-party provider. These resources are located at an offsite location. Through web application or web services the users can access and use the cloud resources. Some resources can be accessed only as per the pay-per-user license policy. Mostly the services are provided by a vendor free of charge. Generally this kind of deployment is used in the business grounds. The reason is that the user should have mechanism to manage load spikes, to host service based applications, to use the entire infrastructure efficiency for deployment and testing and also to manage the concurrent access of these applications from all over the world. The public cloud allows users to access the resources from anywhere they need in a cheaper price. For these reasons, the public cloud is considered as the best. The one and best advantage of this deployment model is that it is highly economical. A Private or Internal Cloud In private cloud deployment the hosting is built and managed only for a specific client. The hosting infrastructure can be at a third-party location or on-premises. In the security point of view private cloud has got tremendous value but not much in terms of economy. Here actually the consumer will be able to build and manage their own infrastructure. Here the resources are stored and accessed by a limited number of users in the vendors own datacenter which is monitored by a firewall. The private cloud has all the advantages of the public cloud. But only one limitation is that it is hosted inside a firewall. In security aspects, it provides a great advantage because it allows both the internal and external consumers to use the resources in a secure and well defined local environment. Due to this high value of security, this model is adopted by a number of organizations. Several SaaS applications provide options to their clients
16 208 to maintain their resources on their own premises to assure data privacy is managed and maintained according to the requirements of the particular business. A Hybrid Cloud This hybrid cloud deployment model combines the advantages of both private and public cloud such as secured applications and data hosting of private cloud and cost benefits and resource sharing of public cloud. The main advantage of hybrid cloud is that it supports cloud bursting. Cloud bursting refers a process where, when the existing cloud set up is not able to handle the network load it provides a fall back option to support the network load. There by the hybrid cloud migrate the workloads between the public and private hosting. This process will not provide any inconvenience to the users. A Community Cloud Here as the name implies, the cloud infrastructure is shared by a number of organizations who are following same policy and compliance considerations. Since it is shared by a large group it reduces the costs compared to private cloud. If a number of organizations want to access similar kind of data, then they can deploy such resources in community cloud, such that once permission has been granted to each organizations, they can access the updated data at anytime from anywhere. Example: Various state-level government departments requiring access to the same data relating to the local population or information related to
17 209 infrastructure, such as hospitals, roads, electrical stations, etc., can utilize a community cloud to manage applications and data. A 1.5 Types of Virtualization A Server (Hardware) Virtualization Server virtualization represents the technology of flexible construction of virtual servers with no hardware limitations and thus reduces the total cost of ownership, hence making it easier to use virtual servers in the changing business environment. Server virtualization offers the consolidation of many servers into one physical server. It provides Multitenancy i.e. one server can perform the job of multiple servers, as single server can be shared among multiple environments. The advantages of server virtualization are cost, less physical server requirement, and 70 to 80 percent utilization of existing. There are three ways for creating virtual servers. They are, Full Virtualization It is a type of server virtualization done by means of hypervisor. Here the direct interaction of CPU of physical server and disk space happens. This provides platform for the virtual servers and OS. The important aspect of this kind of virtualization is that the hypervisor will provide complete independence of each virtual server to other running on the same physical machine. Para-virtualization It is a light weighed type of virtualization. Here, virtualized servers can know each other. Each virtual server is dependent on other virtual server.the hypervisor is to manage guest
18 210 operating system that does not require resources of large computing, because every operating system get information about the requirement of other OS on same physical server they are hosted. OS Virtualization It is another way of virtualization, which is recognized as more effective and efficient. It performs virtualization at the operating system level. It does not need the use of a hypervisor. In the absence of hypervisor, the virtualization capabilities are monitored by the hosting operating system that carries out all the operations of the hypervisor in its virtualized form. One and important drawback of the process is that here all the guest servers must run on same operating system that is deployed. It may cause some performance issues. In this kind of virtualization the concept of homogeneous environment arises. Each server in its virtualized form remains independent of all other virtual servers. The reason is that the entire guest OS should be of the same kind, called homogeneous environment. A Client (Desktop) Virtualization Client virtualization is implemented with a workstation desktop or laptop which is generally specified as client. It will be a tough task for a system administrator to manage. The client virtualization can be of the following:
19 211 Remote (Server-Hosted) Desktop Virtualization This type of virtualization is implemented by hosting a working environment on a server in the data center there by giving access to the end users across the network based on their needs. Local Desktop Virtualization The local desktop virtualization model is configured in such a way that the operating environment runs locally above physical hardware and provides support for multiple client-side virtualization aspects. These activities can be monitored and given a thread of execution in the end user system. Storage Virtualization Storage virtualization is handled by system administrator who performs the separation between logical storage (virtualized partitions of stored data) and physical storage. Location independence is achieved by storage virtualization by separating the physical location of the data. Three categories of data storage are: o Direct-Attached Storage (DAS): Direct-Attached Storage is one of the traditional methods. In this method physical server is being attached with hard drives. o Network-Attached Storage (NAS): In Network-Attached Storage the administrator has a key machine that provides data storage to other machines and it is kept on the network. This method provides a single source of data, which is help full for supporting data backup. o Storage Area Network (SAN): Storage Area Network helps to transfer data on its high performance network by deploying specialized software and hardware.
20 212 A Data Virtualization Data Virtualization provides instant access to data. It integrates diverse data without any costly copies or added data management complexity. The advantages of data virtualization are, 1. Instant access to whole data 2. Multiple times faster when compared to traditional data integration 3. Quick start and successful scaling with easy-to-adopt overlay to existing infrastructure 4. Reduces complexity and saves money A Application Virtualization Virtualization in an application separates the OS from the application. Then the application will run on server or other remote computer rather than on computer in which it is deployed. The main benefit of application virtualization is that it is possible to run incompatible applications at same time. It is also possible by the user to run an application which is not designed for the computer s OS from which they are accessing it. A Network Virtualization Network Virtualization is the process of combining all of the resources within one network. It allows administrator of the network to share resources across all the users. The network is being divided into many
21 213 different channels, where each contains network s bandwidth. It makes it easier for the administrator to assign resources as the users need them. A 1.6 TYPES OF HYPERVISOR A Type 1 Hypervisor The hypervisor of this type is deployed as a bare-metal installation. The bare-metal installation refers that the first interface to be installed on a server as the operating system should be the hypervisor. By this the user can achieve the advantages that the hypervisor will be in touch directly with the underlying physical server hardware. Those resources then undergo Para-virtualization and are delivered to the running VMs. Type 1 hypervisor provides higher level of efficiency and security in virtualization. Figure A 1.5 shows one physical system with a type 1 hypervisor running directly on the system hardware, and three virtual systems using virtual resources provided by the hypervisor. [Image Source: Wikipedia]
22 214 Fig. A 1.5. Type 1 Hypervisor. A Type 2 Hypervisor Type II hypervisors are known as hosted hypervisor. In this type the software is not installed onto the bare-metal. The hypervisor is implemented on top of an already live operating system. Type II hypervisors provide virtualization services like I/O device support and memory management. The use of this kind of hypervisor is found to be greater in client systems that support very large range of I/O devices. Since the hypervisor is installed and run in a live operating system, there have been a lot of questions regarding the performance of this kind. Anyway it has been found that the latency is minimal and the hypervisor can still perform optimally.
23 215 Fig. A 1.6 shows one physical system with a type 2 hypervisor running on a host operating system and virtual systems using the virtual resources provided by the hypervisor. [Image Source: Wikipedia] Fig. A 1.6. Type 2 Hypervisor. A 1.7 CLOUD ARCHITECTURE A Front End Platforms The front end platforms are called clients or cloud clients. The cloud client includes servers, fat or thick clients, zero clients and mobile devices. These clients communicate with the cloud database through an application accessed through the web. Zero Clients These are clients that run via the network. The zero clients initialize the network. It also helps to gather required
24 216 configuration files and gives information about the storage of Operating System binaries. These clients are highly depend on the network quality. If it goes down, the client device becomes useless. Fat Clients Fat-client refers to a multi-tier client server in which the client application part always execute on the stand alone system and the server part of the application reside on a server along with the application code. A Back End Platforms Cloud Storage: In this back end, data is stored in users system and also in virtualized pools, so that different clients from the world can access it and use. The data is hosted in virtual pools by third parties. This cloud storage is generally owned by big hosting giants, so if a user or organization wants to host their resources they probably should buy or lease storage space from the hosting companies. The hosting companies virtualize the applications and resources in such a way the customers want and make them to be exposed as storage pools. In these storage pools, the customers store their data files and objects. These pools may span across multiple storage servers. The data security depends upon the hosting organizations.
25 217 A Cloud Based Delivery This architecture mainly specifies the services that are delivered by the cloud environment to the external world. The entire cloud services can be classified in to mainly five. They are as follows: Infrastructure as a Service (IaaS): The abilities to provide provision on applications and resources like hardware, storage, processors and other fundamentals. Through Virtualization, CSP s are able to split, assign and resize resources to build systems as demanded by consumers. Other services provided by IaaS are Operating System, Firewall, Router and Load Balancer. Service provider supply resources on-demand from their large pools mounted in data centers. Platform as a Service (PaaS): The ability to provide the entire infrastructure is being needed to run applications on Internet. It always has IaaS as a backbone. Basically PaaS is defined as delivery solution for a service and computing platform. The size of the hardware resources demanded by execution is made in a transparent manner. It includes operating system, programming language, and web server and database. Software as a Service (SaaS): The ability to provide software as a solution, also known as On Demand or Web Based or Line Software in this pre-made, along with required software, operating system and network are provided. The users have the freedom to run the software from their cloud clients via the network. It make unnecessary to have a software physical copy on your devices. It make easier to have same software in all devices without installation in each device. SaaS has PaaS as a backbone.
26 218 Network as a Service (NaaS): The ability to provide network/transport connectivity services or inter-cloud network connectivity services by optimizing the resource allocations and considering computing resources and network as a unified whole. Development as a Service (DaaS): It has the ability to provide development tools which are shared among communities. It seems to be equal to locally installed development tools. A Cloud Networking This architecture component refers to the connectivity aspects of cloud environment to the external world. The connectivity is established via networks like Internet, intranet and inter-cloud. The cloud networking offers: High bandwidth Agile network Network security Cloud provides efficient security mechanisms in connectivity. But when it comes with multi-tenancy it is impossible to maintain confidentiality because it always deals with the segregation of multiple customers.
27 219 A 1.8 ADVANTAGES OF CLOUD COMPUTING IN THE CURRENT SCENARIO A Cost Efficient Cloud computing reduces the cost for maintenance and upgradation. Traditional software costs more for companies in finance. For establishment it costs more for getting license. The cloud is cheaper than the traditional and significantly lowers the IT expenses. Managing and maintaining cost may reduce by moving to cloud computing. By using the service provider services rather than purchasing the systems for the business, the cost is reduced. It reduces the operating systems cost because, System upgradation cost, new software included. Need not to pay wages for expert staff. Reduce the cost of energy consumption. Few delay in time. A Flexibility of Work Practices In cloud computing the employees can work more flexibly. For example, the employees can access data on holiday or from home. When the employee is off-site then also employee can access data by connecting to virtual office easily. Network dependency means the Internet dependency and independence from office. Employees can able to access data without having wired servers. Cloud computing provides flexibility for workers and for changes implementation with low cost. Because hard-wired
28 220 infrastructure is not needed for organizations that cost more and experiment room. A Collaboration Efficiency Collaboration efficiency in a cloud environment gives the business ability to share and communicate. If the project works in different locations, cloud computing is useful to give third party access, employees and contractors. It is easy to share the records with advisors when using cloud computing. A Access to Automatic Updates Updates are automatically done for IT requirements that may include service fee. The systems are regularly updated with latest technology based on the cloud service provider. The versions are up-to-date in the software and processing power. A Reliability The reliability in cloud computing is to provide in-house systems. The vendor provides technical support for 24/7 and experienced staff for infrastructure support and the benefit reaches the entire client. In regards of organization which has on-site IT people it is more reliable.
29 221 A Scalability The business may scale up or down in operation and also need storage quickly. Based on these situation cloud allows flexibility as the needs change. The cloud provider will provide purchase or upgrade of the software. Using cloud it will reduce the time which definitely helps to run the business. A Business Continuity The business continuity planning protects the data and systems. When there occurs a natural disaster or a power failure the data stored in cloud is protected and backed up in safe location. Accessing data quickly allows to conduct the business, reduces the productivity loss. A Innovation Users pay attention to innovation process because users do not want to manage the resources manually. The phases like prototype and testing are quick development paced in cloud computing. A Multiple Users at One Time Cloud computing reduces the global waste. Multiple users can share the resources so it is environmental friendly. The time taken is decreased and the available resources are increased.
30 222 A Customize Settings The cloud computing allows the user to customize the applications. This is a great benefit because the online business is very competitive. A 1.9 PROBLEMS IN CLOUD COMPUTING A Data Integrity One of the major threats in storing the data in cloud is that it can be accessed from anywhere by anyone. Cloud does not differentiate a sensitive data from that of a common data. Hence there occurs a data integrity problem in cloud computing. A Data Theft Since it is cost effective and more flexible, most of the cloud vendors prefer leasing a server from third party cloud service providers instead of acquiring a server on their own. As customers are not well aware of those things, there is a high possibility of data being stolen from the external server by an unauthorized user. A Privacy Issues Customer s Personal information need to be protected from other operators. A vendor should make sure of who is accessing the data and
31 223 who is maintaining the server in order to secure the customer s personal information. A Infected Application Vendor should make sure that he/she is having the complete control over the server for monitoring and maintenance. This will prevent any malicious user from uploading any infected applications onto the cloud infrastructure. A Data Loss If there is a financial crisis, the vendor may be forced to close the cloud infrastructure which in turn will result in loss of data to the customers. Therefore customer will not be able to access his critical data stored in the cloud. Hence, data loss proves to be a major issue in cloud computing. A Data Location Customer is not aware of where his own data is stored in the cloud as nothing is transparent to him. Vendor does not reveal any information regarding the location of data to the customers. Data need not be stored in the same location where customer lives.
32 224 A Security on Vendor Level Vendor should make sure that server is well protected from the external malicious threats. A cloud infrastructure is good only when it is free from security threats. A Security on User Level Even though the vendor has provided a good security layer for the customer, the customer should make sure that because of its own action, there shouldn t be any loss of data or tampering of data for other users who are using the same cloud. Computing on the cloud requires vigilance about security, manageability, standards, governance, and compliance: Cloud Security: The same security principles that apply to onsite computing apply to cloud computing security. Identity Management: Managing personal identity information so that access to computer resources, applications, data, and services is controlled properly. Detection and Forensics: Separating legitimate from illegitimate activity. Encryption: Coding to protect one s information assets. Cloud Manageability: The consumer would need a consistent view across both on-premises and cloud-based environments. This includes managing the assets, provisioning as well as the quality of service (QOS) received from the service provider. Cloud Standards: A standard is an agreed-upon approach for doing something. Cloud standards ensure interoperability, so the
33 225 user can take tools, applications, virtual images, and more, and use them in another cloud environment without having to do any rework. Portability lets the user take one application or instance running on one vendor s implementation and deploy it on another vendor s implementation. Cloud Governance and Compliance: Governance defines who s responsible for what and the policies and procedures that the user or groups need to follow. Cloud governance requires governing the CSP s own infrastructure as well as infrastructure that they don t totally control. Cloud governance has two key components: understanding compliance and risk and business performance goals. Data in the Cloud: Managing data in the cloud requires data security and privacy, including controls for moving data from point A to point B. It also includes managing data storage and the resources for large-scale data processing.
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea firstname.lastname@example.org,
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Introduction to Cloud Computing Srinath Beldona email@example.com Agenda Pre-requisites Course objectives What you will learn in this tutorial? Brief history Is cloud computing new? Why cloud computing?
DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea firstname.lastname@example.org 2 Research Institute of
HRG Insight: Cloud Computing Keeping apprised of terminology in today s constantly changing IT landscape can be a fulltime job for IT decisionmakers. Some terms lend themselves to a fairly educated guess
Shaping Your IT Cloud Hybrid Cloud Models Enable Organizations to Leverage Existing Resources and Augment IT Services As dynamic business demands continue to place unprecedented burden on technology infrastructure,
Cloud Computing Terms: Advertising-based pricing model: A pricing model whereby services are offered to customers at low or no cost, with the service provider being compensated by advertisers whose ads
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
1 Introduction to Cloud Computing CERTIFICATION OBJECTIVES 1.01 Cloud Computing: Common Terms and Definitions 1.02 Cloud Computing and Virtualization 1.03 Early Examples of Cloud Computing 1.04 Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Introduction and Overview Klaus Gribi Senior Security Consultant email@example.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Certified Cloud Computing Professional Sample Material 1. INTRODUCTION Let us get flashback of few years back. Suppose you have some important files in a system at home but, you are away from your home.
Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC firstname.lastname@example.org
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
INTRODUCTION As technologies rapidly evolve, companies are responding with creative business models and exciting ways to reach new markets. But major technology shifts and the influx of information that
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 8 (2013), pp. 771-778 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: email@example.com ABSTRACT In this paper we discuss the
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are
INTRODUCING CLOUD POWER WHAT IF YOU COULD TAKE YOUR EXISTING IT INFRASTRUC- TURE AND MAKE IT MORE FLEXIBLE, MORE PRODUCTIVE, AND MORE POWERFUL ALL FOR LESS MONEY THAN YOU RE CUR- RENTLY SPENDING? Introducing
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Cloud Technologies and GIS Nathalie Smith firstname.lastname@example.org Agenda What is Cloud Computing? How does it work? Cloud and GIS applications Esri Offerings Lots of hype Cloud computing remains the latest, most
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
The Definitive Guide to the Cloud and Kentico CMS THOMAS ROBBINS Contents Introduction... 4 What is Cloud Computing?... 4 The Benefits of the Cloud... 6 Full Hardware Utilization... 6 Lower Power Costs...
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
Virtual computers and virtual data storage Alen Šimec, Ognjen Staničić Tehnical Polytehnic in Zagreb/Vrbik 8, 10000 Zagreb, Croatia email@example.com, firstname.lastname@example.org Abstract Virtual data storage represents
Moving from Legacy Systems to Cloud Computing A Tata Communications White Paper October, 2010 White Paper 2010 Tata Communications Table of Contents 1 Executive Summary... 4 2 Introduction... 5 2.1 Definition
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Kent State University ss Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology