What Cloud computing means in real life



Similar documents
Cloud Computing Standards: Overview and ITU-T positioning

Security Issues in Cloud Computing

Managing Cloud Computing Risk

Security Threats in Cloud Computing Environments 1

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud Computing; What is it, How long has it been here, and Where is it going?

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Proactively Secure Your Cloud Computing Platform

Lecture 02b Cloud Computing II

6 Cloud computing overview

Cloud-Security: Show-Stopper or Enabling Technology?

ITU-T X Security framework for cloud computing

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

CHAPTER 8 CLOUD COMPUTING

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

CLOUD COMPUTING OVERVIEW

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud Security Introduction and Overview

Cloud Computing Standards: Overview and first achievements in ITU-T SG13.

ITU-T. FG Cloud TR Version 1.0 (02/2012) Part 2: Functional requirements and reference architecture. Focus Group on Cloud Computing Technical Report

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

ITU-T. FG Cloud TR Version 1.0 (02/2012) Part 1: Introduction to the cloud ecosystem: definitions, taxonomies, use cases and highlevel

Delivering Managed Services Using Next Generation Branch Architectures

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Clinical Trials in the Cloud: A New Paradigm?

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Courses Description

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

BUSINESS MANAGEMENT SUPPORT

CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS

Cloud Courses Description

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Software AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

Private vs. Public Cloud Solutions

Assessing Risks in the Cloud

journey to a hybrid cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

How cloud computing can transform your business landscape

Introduction to Cloud Computing

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Architectural Implications of Cloud Computing

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

Keyword: Cloud computing, service model, deployment model, network layer security.

How cloud computing can transform your business landscape.

OVERVIEW Cloud Deployment Services

White Paper on CLOUD COMPUTING

Quick guide: Using the Cloud to support your business

Cloud Computing Security Issues And Methods to Overcome

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Computing. Bringing the Cloud into Focus

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

CLOUD COMPUTING. A Primer

Seeing Though the Clouds

SECURITY & DATA PROTECTION ON THE CLOUD. Evènement parallèle organisé par l ANSI 16 novembre 2015 Hammamet, Tunisie

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud computing: benefits, risks and recommendations for information security

Third Party Cloud Services Its Adoption in the New Age

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Services Overview

Hybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group

Cloud Computing Technology

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Security Issues in Cloud Computing

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Security: The Grand Challenge

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Securing the private cloud

Key Considerations of Regulatory Compliance in the Public Cloud

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Lecture 02a Cloud Computing I

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview...

How To Protect Your Cloud Computing Resources From Attack

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Avnet's Guide to Cloud Computing

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Kent State University s Cloud Strategy

IBM EXAM QUESTIONS & ANSWERS

Transcription:

ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt) Ltd. samanp@mobitel.lk

AGENDA 1. Quick Introduction 2. Why Standardization 3. Functional Requirements 4. Q&A

CLOUD Quick Introduction

Interesting Facts Cloud computing is not a one technology nor a one single architecture. Technology behind Cloud Computing is said to be the easy part and People factor is the Hardest. Virtualization is the biggest technology driver behind Cloud Computing. It is not a new technology and it has been in existence for over 4 decades in the IT industry. Virtualization is simply put as a logical abstraction of Hardware through a layer of Software. This technology (Virtualization) is used in Computing power, storage and networks in the form of VLAN for many years. Cloud Computing is essentially the next phase of innovations and adoption of platform for Computing, Storage and Networking technologies designed to provide rapid time to market and significant cost reductions.

Cloud Computing Definition Cloud Computing is a pay per use Model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing resources (e.g., Network, Servers, Storage, Applications and Services) that can be rapidly provisioned and released with minimal management effort or service provider interaction National Institute of Standards and Technology (NIST)

Characteristics of Clouds Broad Access Network On demand self service Resource pooling Measured service Rapid Elasticity Accessible via multiple devices computers, Mobile etc. Universal high bandwidth Low latency network Highly scalable and stable network access Ability to provision computing capabilities by CS user with minimal or no intervention of Service Provider Ability to do what user needs when he needs with relative reduction in costs, time, and effort needed in doing so Physical resource virtualization Multi Tenancy while using abstraction to mask the complexity of the process from the customer Data and computations are isolated from and inaccessible to one another Usage of pooled resources has to be monitored, measured and reported to the consumers of the cloud Making available and providing visibility in to the usage, consumers can plan for usage and associated costs Ability to quickly provision and deprovision of resources based on the customer demands which is critical for cost savings Ability to flatten the IT supply chain to provision applications in a matter of minutes instead of days or weeks

Cloud Service Models There are lot of emerging models and the following three are the most popular models 1. Software as a Services (SaaS) ability to use Application Software packages on someone else s infrastructure. E.g. Google s Gmail, CRM from Salesforce.com. 2. Platform as a Service (PaaS) Platform hosted in 3rd party infrastructure which provide all resources and facilities. Generally used for application development environments to quickly built, test and release software products. This is the fastest growing cloud model as of today due to increasing demand for mass scale smart phone application developments. 3. Infrastructure as a service (IaaS) The provision of hardware (Computing, Storage and Networking) required to run customer s application.

Deployment Models Private Cloud Community Cloud Public Cloud Hybrid Cloud Designed and built for a single customer to support a specific function critical for business success More than one group with common and specific needs share infrastructure. It could be on site or offsite This model of Cloud is most often thought of as real cloud environment Combination of two or more of the previously described cloud models Might or might not be hosted at customer premises. Management framework to make environments appear as single cloud considered a cloud as long as the five essential characteristics are satisfied Generally with stringent security and regulatory controls shared by government institutes Multi tenant capable environment shared by number of consumers who likely have nothing in common Demand exist where strong requirement for security or regulatory compliance with price and performance

Optimizing traditional IT Supply Chain Traditional IT supply chain Planning & Sizing Tendering Evaluation & procuring Delivering Installing Configuring Optimized by Cloud Planning & Sizing Configuring

Cloud Computing Ecosystem Cloud Service Partner CSN CSN 1 Content Providers CSN 2 Application Developers CSN 3 Other Service partners e.g. Application Providers, Application Integrators Cloud Service Provider CSP CSP 1 Provider of SaaS / CaaS / DaaS / PaaS / IaaS / NaaS XaaS Inter Cloud CSP 2 Provider of SaaS / CaaS / DSaaS / PaaS / IaaS / NaaS XaaS Cloud Service User CSU CSU 1 Consumer CSU 2 Consumer CSU 3 Enterprise Source: ITU T FG Cloud

Emerging Models for Cloud Service XaaS Anything as a Service New opportunities in almost any service Database as a Service Desktop as a Service Storage as a Service Identity as a Service Management as a Service Email as a Service Security as a Service

Why Cloud Pay per use On demand use Ubiquitous Access (Anytime, Anywhere) Elasticity (Scale up/down) Low TCO (due to economies of scale / reuse) Optimized resource/ Energy utilization (Green) Turn Key Operation (Time to Market Advantage)

Decision making on Cloud adoption Good understanding of your compute, storage and network requirements is essential Should know the Budgets and TCO expectations Have a very strong understanding of Business processes and goals Clear and in depth understanding of underlying application architecture Strong knowledge of critical data where it resides, how it is used for business critical decisions will enable making well informed choice about Cloud platform and solutions.

WHY Standardization

Threats to CSUs (Users) Responsibility ambiguity Loss of governance Privacy Issues (Loss of trust) Portability Issues (CSP lock in) Security Issues (Authentication/ Authorization) Lack of information (Asset management /Physical location of sensitive data) Reliability Issues (Performance / Service Availability) Data loss and leakage Source: ITU T FG Cloud Part 5: Cloud security

Threats to CSPs (Service Providers) Responsibility ambiguity Protection inconsistency (Identity inconsistencies among different CSPs) Evolutional risks (design time vs runtime vulnerability) Business discontinuity Portability Issues (Supplier lock in) License risks Legal Issues in different Jurisdictions (Bylaw conflict) Bad integration Security Issues (Insecure administration API) Shared environment Hypervisor isolation failure Service unavailability Data unreliability Abuse right of CSP (Malicious configuration / Insider Attack) Source: ITU T FG Cloud Part 5: Cloud security

Functional Requirements

Requirements for Cloud Computing Requirements for SaaS / CaaS / DaaS Requirements for IaaS Requirements for NaaS Requirements for PaaS Requirements for Inter Cloud Requirements for End to End Resource Management Requirements for Cloud Infrastructure Aspects of Security 2 3 4 5 6 7 8 1 General Requirements

1. General Functional Requirements Service life cycle management: automated service provisioning, modification and termination during the service life cycle. Regulatory aspects: Conformity / privacy protection. Security: protect the interests of all stakeholders and organizations involved in the cloud computing ecosystem. Accounting and charging: Efficient service deployment: efficient use of resources for service deployment. Interoperability: Compliance with appropriate specifications and/or standards for interworking with other CSPs Portability: portability of software assets and data of cloud service customers (CSCs) with minimum disruption Service access: consistent experience when accessing from different devices Service availability, service reliability and quality assurance: end to end QoS assurance, service level agreement (SLA) with the CSC Source: ITU T Y.3501 Recommendation : Cloud computing framework and high level requirements

2. Functional Requirements for NaaS User Layer Access Layer NaaS Service Layer Application Platform Connectivity Virtual Router Virtual CDN Virtual EPC Virtual Firewall Router Load Balancer Firewall Resource Layer (Physical/ Virtual) IP Bearer IP VPN Bandwidth on Demand Processing Storage Networking NaaS On demand network configuration Secure connectivity QoS guaranteed connectivity Heterogeneous networks compatibility Service chain isolation for tenants Elastically configurable Bandwidth Management Granular level traffic engineering, routing and firewalling Abstraction View and Control View of Network Resources Overlapping of private IPs Interwoking with different VPNs Source: Adapted from ITU T Y.3512 Functional Requirements of NaaS

3. Functional Requirements for IaaS User Layer Access Layer IaaS Service Layer Computing Storage Network Physical Lifecycle Management VM Sizing I/O Backup Snap shot Resource Layer (Physical/ Virtual) IP Address Load balance VLAN Firewall Processing Storage Networking IaaS Dynamic and Elastic Configuration, deployment and maintenance of resources Use and monitoring of resources SLA on Physical Hardware specifications such as CPU, no of cores memory etc. VM related services including specifications, migration, scaling, snapshot, clone, backup, image etc. Functions of storage: Reservation Size, I/O performance, migration, snapshot, backup, etc. Network: IP address, VLAN, policy migration, Firewall, Loadbalance, Gateway, QoS etc. Source: Adapted from ITU T Y.3513 Functional Requirements of IaaS

4. DaaS in real life

4. Functional Requirements for DaaS Resource & Network Layer Resource Pool User Layer DaaS Client Access Layer Connection Manager Service Layer Virtual Desktop Delivery Virtualization Infrastructure DaaS Configurability of the virtual environment DaaS Client Fast boot up time Support for BYOD (Bring Your Own Device) Connection Management User profile / Session Management Authentication, Authorization, Accounting (AAA) Virtual Desktop Lifecycle Management Virtual Desktop Delivery QoE In terms of running speed of applications, capability to select and run various applications Single sign on access control for all of DaaS functionality with security compliance Service availability and Continuity Audio and Video Support 3D GPU Acceleration etc. Source: ITU T Y.3514 Functional Requirements of DaaS

5. Requirements for Inter Cloud On demand assignment of cloud computing resources among CSPs: a trusted relationship between cooperating CSPs; agreement and means of exchanging data on cost, performance and other information for each resource agreed methodology for requesting, using and returning the resources of other CSPs. Resource and load distribution: widearea load distribution according to the required promptness, flexibility and cost. User environment adaptation: detect user environment changes, discover alternative resources, migrate smoothly with minimum impact based on the CSC's approval Inter cloud service intermediation: select the most suitable services, create new services by integrating services offered by other CSPs. Large scale migration: guarantee continuity of all the services by largescale service migration to other federated CSPs with minimum impact using a priority scheme Source: ITU T Y.3501 Recommendation : Cloud computing framework and high level requirements

6. & 7. Requirements for Resource management & Cloud Infrastructure End to End Resource Management Manageability for a single cloud service: ability to collect management, telemetry, diagnostics and/or status information from system components in various layers of cloud service implementation and report the information to the CSC Manageability for multiple cloud services: multiple CSPs work together to offer comprehensive status awareness and management information to expand across multiple cloud data centers Cloud Infrastructure Resource abstraction and control: resource abstraction and control capability to cloud services. Resource provisioning: Ability to provide collaboratively compute, storage, and network resources to cloud services and supporting functions. Source: ITU T Y.3501 Recommendation : Cloud computing framework and high level requirements

8. Security Aspects Security architecture/model and framework Security management and audit technology Business continuity planning (BCP) and disaster recovery (DR) Storage security Data and privacy protection Account/identity management Network monitoring and incident response Network security management Interoperability and portability security Virtualization security Source: ITU T FG Cloud Part 5: Cloud security

Q & A

Thank You Saman Perera samanp@mobitel.lk Senior General Manager Information Systems Mobitel (Pvt) Ltd.