Cloud Computing Unit 1
Cloud Computing Unit 1
ss
re
yP
sit
Shailendra Singh
er
Professor
Department of Computer Science and Engineering
iv
Published in India by
Oxford University Press
Ground Floor, 2/11, Ansari Road, Daryaganj, New Delhi 110002, India
ss
All rights reserved. No part of this publication may be reproduced, stored in
a retrieval system, or transmitted, in any form or by any means, without the
prior permission in writing of Oxford University Press, or as expressly permitted
re
by law, by licence, or under terms agreed with the appropriate reprographics
rights organization. Enquiries concerning reproduction outside the scope of the
yP
above should be sent to the Rights Department, Oxford University Press, at the
address above.
sit
You must not circulate this work in any other form
and you must impose this same condition on any acquirer.
er
ISBN-13: 978-0-19-947738-8
ISBN-10: 0-19-947738-8
iv
Oxford University Press disclaims any responsibility for the material contained therein.
xf
O
Learning Outcomes
Learning Outcomes
After completing this chapter, students will be able to: Each chapter starts with ‘Learning
comprehend online analytical processing (OLAP)
explain performance monitoring tools
discuss service-level agreement
describe various computing platforms
Outcomes’ that describe the
list quality of service (QoS) issues in cloud
computing
describe third-party technology
explain MapReduce in cloud computing
knowledge readers would acquire
describe sky computing comprehend Hadoop after going through that chapter’s
understand various cloud computing platforms like
Xen cloud platform content.
ss
re
yP
sit
Virtual servers Virtual servers
er
Figures
iv
Virtualization tool
All the chapters in the book include (Replication of
virtual server)
Un
Mu lt ip le -c h o ic e Qu e s t io n s
APPENDIX
B
APPENDIX
Abbreviations
APPENDIX
Appendices Study on Amazon Network
D
APPENDIX
The book comes with ‘Appendices
Microsoft’s Cloud
A-H’ covering important topics
such as study on Aneka, Amazon Study on Salesforce.com
E F
Network, Microsoft, etc.
APPENDIX
ss APPENDIX
G H
APPENDIX
Study of Hypervisors
re
APPENDIX
Study on Eucalyptus
yP
Study on Cloud Simulators
Study of Aneka
sit
er
Points to Remember Po i n t s t o R e m e m b e r
1. Six elements of the cloud environment are physical machine, network, hypervisor, image storage, and
Quick recapitulation of the topics cloud management software.
discussed is provided as ‘Points 2. Service oriented architecture (SOA) manages software systems and consists of various interacting
services.
to Remember’ at the end of each 3. Online analytical processing (OLAP) is a method that is used for answering multi-dimensional queries
in a computing environment.
chapter. 4. The financial and functioning features supported by cloud business intelligence (BI) comprise execution
and installment speed, elasticity, concentration on core power, lower overall charge of possession, and
on-demand accessibility.
Key Te r m s
CaaS Communications as a Service delivers a Session Initiated Protocol (SIP)-based audio collaboration
and on-net web conferencing over a virtual private network (VPN) using a hosted model. Key Terms
CcaaS Compute Capacity as a Service means that the resource runs applications with the assistance of
basic computing components. Compute basically consists of physical and logical components. By physical
components, we mean hardware devices, whereas logical refers to software and protocols used. Important ‘Terms’ used in each
Cloud Compliance as a Service This offers compliance collection and facilitates your cloud applications
as per corporate policies or organization requirements.
chapter are defined at the end of
the chapter.
ss
ABOUT THE BOOK
re
This book on ‘Cloud Computing’ explains the fundamentals of cloud computing, migration services,
yP
virtualization as also the various cloud security issues faced. It discusses the principles followed by
cloud service companies and platforms available in the market. Apart from the basics, various advanced
sit
technologies such as Big Table and IoT are also covered in this book.
The book follows a bottom-up approach with systematic flow of concepts covered in 12 chapters and
er
8 appendices. It is meant for the undergraduate computer science and information technology students
of all Indian universities for an introductory course on the subject.
iv
Un
KEY FEATURES
• Student friendly and easy to understand
d
chapters
• Provides a well-written points-to-remember section, review questions, key terms with explanation,
and multiple-choice questions at the end of every chapter.
• Includes appendices with study of Amazon network, Microsoft, Salesforce.com, Eucalyptus,
Aneka, and Hypervisors
• Comes with Model Question Papers from different universities
Chapter 2 explains the Factors Affecting Cloud Computing. It highlights various cloud data center
requirements and introduces architectural, technological, and operational influences on cloud comput-
ing. Topics such as issues in scalability of cloud architecture and applications, and influence of cloud
computing on business companies are also discussed.
Chapter 3 on Cloud Computing Architecture discusses cloud computing architecture on the basis of
load balancing, disk provisioning, storage management, hypervisor installed, migration, service reloca-
tion, cloud balancing, virtual switches of load balancing, and failure detection and recovery. Key design
aspects of cloud architecture, similarities and differences between grid and cloud computing, and char-
acteristics of cloud computing are also explained in this chapter.
Chapter 4 introduces the various Models of Cloud Computing. Software as a Service (SaaS), Platform
as a Service (PaaS), and Infrastructure as a Service (IaaS) are discussed in detail. This chapter also
covers four cloud deployment models—public clouds, private clouds, community clouds, and hybrid
clouds. Topics such as alternative deployment models, CloudStack, and cloud storage are also touched
ss
upon in this chapter.
Chapter 5 presents to its readers the Traditional Data Center and Cloud Data Center. It begins with the
re
core elements of traditional data center and then discusses storage network technologies used. Important
yP
topics such as cloud backup, cloud and disaster recovery, replication technologies, and cloud analytics
are also dealt with in this chapter. In the later part, traditional data center management is also discussed.
sit
Chapter 6 on Virtualization Technology (At Server) covers virtualization reference model, types of
virtualization, server/compute virtualization components, need of server/compute virtualization and its
er
advantages, and techniques used. Hypervisor taxonomy, resource management tools, and conversion
from physical machine to virtual machine (P2V) are also explained in this chapter.
iv
Chapter 7 deals with Virtualization Technology (At Network). It highlights tools used in network vir-
Un
tualization, its benefits, and components such as virtual switches and virtual LAN. Traffic management
and its techniques, and virtual machine migration services are also covered.
d
Chapter 8 describes Virtualization Technology (At Desktop and Application). It emphasizes on the
or
drivers used in virtualization, the techniques used such as remote desktop services and virtual desktop
infrastructure, and the components of desktop virtualization. Application virtualization, hardware vir-
xf
Chapter 9 explains Cloud Infrastructure Management and Migration. Cloud suppliers including
RightScale, Kaavo, Zeus, Scalr, and Morph are discussed in this chapter along with the components
that constitute the framework of cloud infrastructure. It also discusses unified management software,
processes involved in cloud service management, technique used to access cloud, and challenges in
migration to and from the cloud.
Chapter 10 makes readers understand the various Security Issues of Cloud Computing. Security threats
and vulnerabilities in cloud computing, cloud security design principles and objectives, and cloud secu-
rity services are explained in detail. Cloud testing and its requirements, secure development practices,
virtual machine security techniques, challenges faced, and legal issues involved in cloud computing are
also dealt with.
Chapter 11 Computing Platforms such as XCP, T-Platform, Force.com and Salesforce.com, Apache
VCL, Enomaly Elastic Computing Platform, MapReduce, Hadoop, OpenNebula, Nimbus, Google App
Engine, Microsoft Hyper-V, Microsoft Azure, AJAX, EMC, and NETAPP, are discussed in this chapter.
It also explains service level agreement, OLAP, ISVs, and Sky Computing.
ONLINE RESOURCES
To aid teachers and students, the book is accompanied with online resources that are available at
https://india.oup.com/orcs/9780199477388. The content for the online resources is as follows:
ss
Two Model Questions Papers
re
ACKNOWLEDGEMENT
yP
I wish to express my deepest gratitude to Dr C. Thangaraj, Director, National Institute of Technical
sit
Teachers’ Training and Research, Bhopal for his valuable guidance and support. Without his inspiration,
effort, and advice, this book would not have been possible. I am very grateful to my source of inspira-
er
tion, Prof. Sunil Kumar Gupta, Vice Chancellor Rajiv Gandhi Proudygiki, Vishwavidyalaya, Bhopal,
India for his motivation. I am very grateful to Dr Sanjay Silakari, former I/C Director, UIT, RGPV, Dr
iv
Geetam Singh Tomar, Director, THDC-IHET Tehri, Uttarakhand, Dr Sanjiv Sharma, Head School of IT,
Un
RGPV, Bhopal and Dr Ravindra Patel, Head, MCA, RGPV, Bhopal for motivating me to write this book.
I would like to give special thanks to my Ph.D scholar Mrs Sunita Gond who helped me in each and
every chapter of this book. She has supported me in every respect.
d
Technology, Ch Brahm Prakash Government Engineering College, Jaffarpur, New Delhi, for his
contribution to chapter 12 of the book.
xf
I would also like to thank other reviewers, Sudip Sahana, Department of CSE, Birla Institute of
O
Technology, Mesra, Ranchi; A. Dennis Ananth, Assistant Professor, Department of Information Tech-
nology, Bannari Amman Institute of Technology, Alathukombai, Tamil Nadu; U. A. Deshpande HOD,
CSE, NIT, Nagpur; Dr S. Mary Saira Bhanu, Associate Professor, Department of Computer Science
& Engg., National Institute of Technology, Tiruchirappalli; and S.D. Madhu Kumar, HOD, CSE, NIT,
Calicut.
I would like to express my heartiest thank to my beloved wife Dr Neelu Singh for her invaluable,
endless support. I owe thanks to my loving children, Navodita and Aryan, who were a constant support.
All suggestions for the improvement of the book are welcome and can be sent to ssingh@nitttrbpl.
ac.in
Shailendra Singh
ss
4. Models of Cloud Computing 72
re
5. Cloud Data Center 98
yP
6. Virtualization Technology (At Server) 119
7. Virtualization Technology (At Network) 143
sit
8. Virtualization Technology (At Desktop and Application) 160
er
Appendix-A 289
xf
Appendix-B 292
Appendix-C 296
O
Appendix-D 299
Appendix-E 302
Appendix-F 305
Appendix-G 308
Appendix-H 310
Model Question Papers 315
Index 321
About The Author 327
Related Titles 328
ss
1.3.3 Remote Access 6 1.8.6 Data Location 20
1.3.4 Disaster Relief 7 1.8.7 Deletion of Data 21
re
1.3.5 Ease of Implementation 7 1.8.8 Recovery and Backup 21
1.8.9 Offline Clouds 21
yP
1.3.6 Skilled Vendors 8
1.3.7 Response Time 8 1.8.10 Unpredictable
1.3.8 Easy to Customize 8 Performance 21
sit
1.3.9 Virtual Provisioning 8 1.9 How to Develop Cloud
1.3.10 Fully Automated Storage Infrastructure 21
er
ss
References 47
3.7.11 Elasticity and Scalability 66
Answers to Multiple-choice Questions 47
3.7.12 Standardized Interfaces 66
re
3. Cloud Computing Architecture 48 3.8 Cloud and Dynamic Infrastructure 66
yP
3.9 Impediments to Cloud Adoption 68
3.1 Introduction 48
3.2 Grid Framework Overview 48 Points to Remember 68
sit
3.3 Grid Architecture 49 Key Terms 69
3.3.1 Advantages of Grid Multiple-choice Questions 69
er
ss
6.4.1 Server/Compute
Points to Remember 94
Components 122
re
Key Terms 95
6.5 Need of Server/Compute
Multiple-choice Questions 95
yP
Virtualization 125
Review Questions 96
6.6 Virtual Clusters 126
References 97
6.7 Advantages of Server/Compute
sit
Answers to Multiple-choice Questions 97
Virtualization 127
er
5. Cloud Data Center 98 6.8 Techniques of Server/Compute
Virtualization 127
5.1 Introduction 98
iv
Components 128
5.2.1 Application 99
6.10 Hypervisor Taxonomy 129
5.2.2 Database Management
6.11 Resource Management and
Systems 99
d
Tools 129
5.2.3 Compute 100
or
ss
Key Terms 173
Workload—Hardware 150 Multiple-choice Questions 174
re
7.6.2 Technique 2: Balancing Client Review Questions 175
Workload—Software 150 References 175
yP
7.6.3 Technique 3: Storm Control 151 Answers to Multiple-choice Questions 175
7.6.4 Technique 4: NIC Teaming 152
sit
7.6.5 Technique 5: Limit and 9. Cloud Infrastructure Management
Share 152 and Migration 176
er
7.6.6 Technique 6: Traffic Shaping 152 9.1 Introduction 176
7.6.7 Proposed Load Balancing in 9.2 Administrating Clouds 176
iv
ss
10.1 Introduction 196 Response Team 216
10.2 Security Concerns of Cloud 10.15 Risk Issues 217
re
Computing 196 10.16 Physical Security of Systems 217
10.2.1 Threats to Infrastructure, Data, 10.17 Input Validation and Content
yP
and Access Control 198 Injection 218
10.3 Cloud Information Security 10.18 Database Integrity Issues 218
sit
Objectives 199 10.19 Regulatory Issues 218
10.3.1 Confidentiality 200 10.20 Legal Matters in Cloud
er
10.3.2 Cloud Computing Environment Computing 219
and Accessibility 200 10.21 Information Privacy and Laws 221
iv
10.3.5 Cloud Security Services 201 10.26 Session Hijacking Attacks 222
10.3.6 Integrity 201 10.27 Fragmentation Attacks 223
xf
10.4 Cloud Security Design 10.28 Cloud Access Control Issues 223
O
ss
11.21 Google App Engine 242 12.14 Workload Pattern for Clouds 268
12.15 Third-party Technology 270
re
11.22 Microsoft Hyper-V 243
11.23 Microsoft Azure 244 12.16 Intercloud 271
yP
11.24 AJAX 245 12.17 Azure Cloud Services 272
11.25 EMC 246 12.18 Bigtable 273
12.18.1 Chubby 275
sit
11.26 NETAPP 247
11.27 Cloud Service Suppliers and 12.18.2 Development of
er
Threats 247 Bigtable 276
11.28 Service Level Agreement 248 12.19 Cloud Usage for Big Data Analytics
iv
CHAPTER
Overview of
Cloud Computing
ss
Learning Outcomes
re
After completing this chapter, students will be able to:
define cloud computing understand limitations of cloud computing
yP
describe need of cloud computing explain elastic computing
describe history of cloud computing differentiate various vendors of cloud computing
explain historical evolution of cloud computing
sit distinguish traditional data center and cloud data
describe benefits of cloud computing center
er
iv
Un
1.1 INTRODUCTION
Cloud computing is a technology which utilizes the Internet and central isolated servers in order
d
to sustain applications and data. Users can access applications and data at any workstation through
or
the Internet. This technology permits much more proficient computing by consolidating bandwidth,
processing, and storage memory. Cloud offers robust memory administration, thus there is no necessity
xf
to sustain memory on a personal system. It alters the means by which the Internet and computer are
used.
O
In this chapter, we will discuss the fundamental techniques and components in cloud computing,
technologies from where cloud computing originated, and the various services provided by cloud
computing to its users. Later in the chapter, the limitations of cloud computing and the important
challenges, which prove to be obstacles in cloud computing, will be discussed. We will also discuss the
difference between traditional data center and cloud data center.
that can be rapidly provisioned and released with minimal management effort or service provider inter-
action. This cloud model is composed of five essential characteristics, three service models, and four
deployment models.”
Cloud computing offers services instead of a product, whereby shared software, information, and
resources are supplied to computers and other tools efficiently over a network. Cloud users should not
need to identify the site and other particulars such as infrastructure but cloud computing offers software
applications, computation, storage resources, and data access and data administration facility.
End users access cloud-based applications via diverse interfaces such as a light-weight desktop, a
web browser, or different mobile applications, whereas applications such as data and business software
are saved on servers at an isolated site. Cloud application suppliers attempt to provide enhanced
functioning and service than that provided if software programs were deployed locally on the end-user
or on detached computers.
Cloud computing performs tasks at a faster rate to meet the demands of users. It permits the data
center to allow enterprises to acquire applications and work on data quickly, and needs only simple
ss
administration and less upholding. Many unpredictable and uncertain company orders of IT resources,
re
such as networking and servers, are effortlessly met with the cloud computing technology. The basic
structure of cloud computing is shown in Fig. 1.1. As given in the figure, facilities and services are
yP
offered by cloud providers in a cloud computing environment and different users from various locations
and devices can request for specific services that are offered.
sit
Cloud provider
er
(offers facilities)
iv
Facilities
(PaaS + SaaS + IaaS) Cloud Computing
Un
ice or
d rv t f
se ues
or Re
q
Cloud user 3
xf
(using laptop)
Cloud user 1
O
As cloud computing is a recent technology, different people have different views about it. Cloud com-
puting actually meets the overall software and hardware demand of an organization, user, or company.
Cloud computing is a novel approach and an important innovation in how we operate applications
and save information. On the cloud, everything is hosted effortlessly. This is easier than managing data
and programs on a personal desktop computer. You can access every application and any record from
anywhere on the globe.
Associates working towards a similar goal may team up, irrespective of the positions they hold,
and work in parallel. Cloud computing works to lessen the capital expenses involved in storing data.
The IT division can concentrate on the actual coding and technical problems, rather than on maintaining
the data center. It reduces the total investment in hardware and software charges of a corporation. Some
of the benefits of cloud computing are given here:
1. It improves parallelism and allocation of resources for fast accessing
2. One may acquire software services, networked storage space, computer resources, and various
other services at a single place
3. An additional company hosts a set of applications, get software renewals (with no charge), and
so on
4. It improves monetary burden such as operational expenses, renewing charge, and capital expenses
Hotmail, Gmail, Yahoo email, etc., are all simple illustrations of cloud computing. You do not need a server
or software for using them. Customers would just require an Internet connection and then begin function-
ing with cloud services. The email administration software and server are on the cloud and are completely
controlled by the cloud service suppliers, Google and Yahoo, among many others. The customer may use
modernized software and have the advantages of cloud computing. Cloud computing is an array of net-
work, hardware, storage, interfaces, and services which facilitate the various services. We can also say that
ss
the term ‘cloud’ is a set of hardware, network, storage, services, and interfaces that facilitate the service.
re
In cloud architecture, there are generally five main components of cloud infrastructure.
• Front-end interface for users for simple access and for using cloud resources
yP
• Management for handling networking resources
• Storage for virtual machine
sit
• Constant storage tool that may be organized within working virtual machines
• Monitoring tools for initiating virtual machines on the cloud
er
2. The cloud service provider who has the liability of controlling the complete cloud environment and
Un
offer services to the consumer. One of the jobs of the supplier is safety, and it assures the consumers
the degree to which their data is protected. The cloud service supplier is also accountable for IT
resources, uploading, and other services offered to the user. Various services and resources are
d
provided to users by the cloud provider, as suggested and managed by the cloud administrator, in
or
s Cloud provider
fer
Of
O
Various cloud
services and Cloud computing
virtual resource
avaliable M
an
a
by ged
st
ue
q
Re
Cloud user 1
Cloud user 2
Fig. 1.2 Cloud resource management
Cloud computing gives users the option of accessing information from any place at any point of time.
To access the conventional computer system, you should be in a similar physical position as your data
storage tool. The cloud eradicates this barrier. Suppliers of clouds offer you the obligatory software and
hardware for operating your company or home applications.
It is required to pay for storage space, hardware, and software for a business or corporation if they
are using cloud resources provided by cloud providers. Small corporations as well may save their
information on the cloud, which will lessen the price of buying hardware and memory tools. They only
need to purchase a specific volume of storage space, as per the requirement.
You require an Internet connection to access the cloud. The benefit of this is that you can access
that record from anywhere, by any tool that can access the Internet. Workers at distinct sites can access
similar data on the cloud and any tool may be used (e.g., a laptop, desktop, mobile phone, or tablet).
Cloud computing involves a cloud consumer, cloud provider, cloud auditor, cloud broker, and cloud
carrier, as shown in Table 1.1.
ss
Cloud consumer An individual person or organization that sustains a business relationship with cloud
providers and avails the services offered by the provider
re
Cloud provider An individual person or organization who offers a service and is liable for the services
of cloud computing to the parties that demand it
yP
Cloud auditor A party that conducts evaluation of cloud services, such as performance, operation on
various systems, and security, among others
sit
Cloud broker The management between cloud providers and cloud consumers, like presentation and
delivery of various services
er
Cloud carrier The mediator responsible for connectivity and transport of cloud services from service
iv
Every corporation desires to provide workers with a comfortable platform for working. In a corporation,
or
there are top-level professionals who are always in the pursuit of more elasticity, heavier workload at
lower fees, and the use of information as a competitive benefit to recognize the most appropriate infor-
xf
mation and data for decision-making. IT corporations need to react to these changes by converting IT
into a domain with better business agility.
O
Cloud computing offers services to users for storing software and files distantly, instead of on a
server or a hard drive at their workplace. Every corporation must possess its own personal cloud that
may be adapted according to the users’ demands. Examples include video sites such as Facebook and
YouTube, web-based email such as Hotmail and Gmail, conversation support tools like Skype, and many
others. Certain cloud computing applications comprise Software as a Service (SaaS), file storage, and file
back-up, file synchronization, and consumer relationship management. There are many benefits of using
cloud computing for worldwide corporations. One of the key reasons is the elasticity provided by it.
Through the Internet, employees may access information from home, on the way, from a customer’s
office, or from a smartphone such as an iPhone or a BlackBerry. Employees may also jointly work on
documents and files, even when they are not physically all together. Everyone can work mutually even if
they are physically far from each other. Concurrently, documents can be seen and proofread even though
they are in remote areas.
Cloud computing may be extremely fast and simple to operate. Since downloading and deploying of
software needs time, clouds maintain everything up to date. Cloud computing is cheaper as well. There
is no requirement of purchasing and deploying costly software as it is already deployed online and you
operate it from there. Cloud computing provides agility and it may be easily and swiftly scaled up and
down as per the requirement.
One of the chief benefits of using cloud computing for various corporations is that it provides nearly
infinite storage, in contrast to a server, and takes into consideration the limits of a hard drive as it is
online. There is no requirement to pay for enormous disk space and devices. There are many challenges
associated with a conventional infrastructure:
Software licensing and support For every application and data center, licensing is needed. However,
in cloud computing, for allocated data centers, only a single licence is needed for the application.
Scalability Conventional infrastructure cannot extend easily at a particular instance of time, and scal-
ability requires variation with time. It has to regularly improve in order to face the challenges.
Accountability The application in conventional infrastructure never has vital liability and power.
ss
Modifiability When alteration is needed, the application constantly needs and sustains extra charge.
re
Physical security It is tough to uphold security, and therefore, security is still a serious issues related
to cloud computing.
yP
Cost-effective management To make the application significantly accessible, the replication of data is
required from time to time, which is very cost effective for a organization.
sit
After many years of data center augmentation and development of IT, various companies are left with
er
overgrown, complex computing platforms. Cloud computing is a new trend in computing due to its
many benefits, which are discussed in the following sections in detail:
iv
Un
ness application over the Internet, you need not deploy and set up any resource at your own risk or cost.
or
Cloud computing services can minimize the updating requirement of software and hardware because
expenses of maintenance and upgradation are handled by the cloud provider.
xf
Though outsourcing IT trade requires extra concentration, the cloud provider handles complexity
O
of technical proficiency, permitting users to concentrate on their main business. IT cloud computing
follows a pay-as-you-go approach, where only a low preliminary investment is needed. The main cause of
companies to use cloud computing is to save funds. The technology behind the cloud eliminates the
servers’ cost, maintenance fees, data center space, software licences, etc. Hence, asset expenses are
minimized and substituted by scalable and convenient operating costs.
Another aspect that should be taken into account while selecting the cloud is that customer
organizational support and maintenance expenses are minimized drastically as these costs are shifted
to the cloud supplier, comprising 24/7 support. The requirement for extremely trained and costly IT
recruits is minimized as well. In cloud computing, resources are used more effectively, resulting in
considerable support and saving of energy expenses.
In practice, it has been discovered that companies spend almost double on server energy expenses
than on hardware. An option has been provided by cloud computing for these costs. With cloud
computing, corporations need not purchase and deploy costly platforms and software in order to host
the software. Apart from many cloud computing applications being provided cost-free, end users are just
needed to subscribe to services desired by them, rather than purchasing necessary software. According
to requirements, you may scale up or down.
1.3.2 Scalability
With cloud technology, more information can be saved, when compared to personal computer systems
by companies. Some of the important advantages of scalability are as follows:
1. One of the biggest advantages of cloud computing is that a business pays only for the services
it avails. In a conventional infrastructure and technology, businesses should invest in advanced
storage tools and servers which normally occurs at fixed prices. Cloud computing is exclusively
scalable and flexible, functioning on the basis of usefulness and permitting businesses to pay as
per work and the resources they use.
2. Since cloud computing is based on virtualized technology, RAM space, storage, etc., are simple
and swift to use and append. The requirements of a business can be accomplished in hours rather
than days.
3. In a cloud environment, scalability is a benefit. With the expansion of the business, further resources
are included already to support the progress of the business. In association with SaaS, businesses have
to pay according to their demand, that is, pay more for more demand and less for less demand.
ss
4. As business requirements go up and down, instead of buying and making costly advances by
yourself, your cloud service supplier may deal with it for you. As this service frees up your time,
re
you may focus more on the functioning of your company.
yP
sit Virtual resources
er
Scaling system
iv
(for monitoring)
Un
Hypervisor
d
or
xf
O
Storage
Data server
Physical resource
As shown in Fig. 1.3, the scaling system in a cloud environment will maintain a record of the virtual
resource requirements of cloud users, and resources’ requirement can be kept up to date.
1.3.3 Remote Access
Through cloud computing, it becomes very easy to synchronize data access between international offices.
Once data is virtually stored, it can be shared effortlessly between offices that are far from each other through
isolated access. The advantages of isolated access are that any tool can be used, any time and at any place.
Anytime, access to Viewpoint V6 Software is offered by Viewpoint Cloud Computing and it is
the top incorporated comprehension software solution of the industry that can be accessible from any
place with an Internet connection.
Regardless of place, users would have access to their software, attributing the newest information and
data on any venture. Users can do the following:
1. Access project reports and data, alter orders, etc.
2. Sense the ‘always on’ benefit of being capable of giving up one zone and carry on even on your
smart cell phone.
3. Expand your trade and support your cell phone sales strength as everybody has 24 × 7 access to
the cloud any time, from any mobile tool or desktop.
The advantages of cloud computing and web-based business cooperation applications all emphasize on the
advantages of isolated access. Cooperating on shared records expands the speed upon which people may
complete complex jobs collectively. Accessing private files from any isolated desktop connection signifies
that a person is certainly not coupled to a machine or site in order to use software and files that are vital to
them, whether for personal or business use. Web and cloud computing are as good as the extent to which
they facilitate people to share and access; isolated access is the chief advantage of these technologies.
Isolated access functions in three fundamental methods. The first is the streaming of data from one
ss
machine to another; this occurs when a person online listens to a radio station or watches a movie.
re
The second one is when web applications exhibit an interface which permits the web user to interact
with an application such as an online store or a search engine. The third one is when files are made
yP
comprehensible on an isolated desktop computer through desktop sharing and isolated control software,
and are cloned to the PC of the end user to be controlled and cloned back to the initial site. For the
sit
third use, users download isolated PC access software, a petite yet precious piece of software for small
ventures and also for large- and middle-sized businesses.
er
Natural calamities such as earthquakes, floods, internal troubles, and wars might result not only in the
Un
loss of data of e-governance applications but also in unavailability of services. In a different geographi-
cal locality, multiple set-ups along with total backup and retrieval explanations should survive. Disaster
recovery control measures should be put in place and exercised from time to time. Data and applications
d
should be surplus and must be accessible at short notice to switch from one data center to another. Cloud
or
virtualization techniques permit restoration and backup. As compared to a conventional data center, it
provides flawless migration of applications.
xf
Over the last several years, cloud computing has become very popular, as now-a-days, workplaces and
homes have access to broadband Internet. Cloud computing has many benefits over other conventional
ways of hosting and networking. These benefits are particularly noticeable for small ventures which
require the strength of business services, but the finances are unavailable for purchasing computers,
paying workers, and executing the technology.
For those who do not have the knowledge of modern technology, executing cloud computing services
might tend to be a little inconvenient on home networks. However, this can be accomplished easily with
an Internet connection and a cloud computing host. With this benefit, it becomes easy for small-scale
company owners to set up services even if they are unaware of the execution of modern technology.
With the help of these benefits, anybody can get started on cloud computing. The benefits are
particularly useful for small enterprises; nevertheless big corporations may also benefit from cloud
computing. Cloud applications do not need to be upgraded, fixed, or downloaded. It is easy to learn and
use applications and several of these are accessible at a cost-free trial, to check if it suits some small
enterprises or not. For small enterprises, various cloud-based software and applications are offered,
which are beneficial for smooth running of businesses.
ss
Cloud computing has significantly lower costs than the equivalent user licences and desktop software.
re
The subscription services provide the best features and priority consumer support although they are paid
as per usage.
yP
Possessing such kind of productivity applications and storage ‘in the cloud’ facilitates access to
your files anywhere and anytime. It makes it easier to work on projects regardless of locality and time
sit
zones.
Industrial cloud service suppliers must have very strong data backup systems. Through cloud computing,
er
it is improbable that your data will be lost since service suppliers will usually have data retrieval systems
in place. Nevertheless, accessibility is a more common drawback. Round-the-clock access is one of the
iv
assurances of cloud computing, but the truth is that it is not possible every time. Even chief suppliers own
Un
services that can go offline owing to system maintenance or failures from time to time. You would require
steady Internet access at your end so as to ascertain your access to the existing services.
Box.net is an online workspace service meant for file grouping and sharing, and QuickBooks Online
d
Customization may be possible for easy access of resources to some degree, as per our need. Physical
O
servers or virtual servers may be customized to distinct schemes via a control panel.
Other than these, there are various other benefits of cloud hosting over isolated hosting:
1. Pre-configured operating system—A variety of famous Linux allocations (Debian, Red Hat,
Ubuntu, Arch, Fedora Enterprise Linux, and several editions of Windows-based servers)
2. Committed IP addresses for cloud servers
3. Conversion amid servers in the similar cloud, free of conversion expenses and at high speed
4. Allocation or replication over many remote sites
ss
Amazon Web Services was launched in 2002, which provided customized cloud-based services including
re
storage, computation, etc., to the cloud users. Another big invention in cloud computing was in 2009, as
Web 2.0 and Google services, through Google Apps.
yP
The following sections show the historical evolution of computing.
requires to operate a program or access precise data, he/she needs to connect to the server, to get suitable
Un
access and to perform various operations whilst renting the data or program from the server.
The client may request to be associated to the server, to which the server replies appropriately. This
is known as dumb terminal as it does not have high processing power, storage space, or memory. The
d
client is simply a tool which is associated with the user for facilitation.
or
xf
O
Client
Server
The user needs to obtain consent until and unless it does not get approval to access the processor. Due
to inadequate processing power, IT employees neither acquire instant access nor can two users access
similar data concurrently in client–server technology.
You are required to wait for your number, in case lots of populace is sharing a single computer, even
though that computer is an enormous processor. Thus, in a client server, instant access is not probable
all the time. Thus, the client server also has a centralized storage, divergent from cloud computing in
which it does not have a user-centric converge. Thin clients and fat clients are also used at times, which
is a little different from client–server technology.
Fat clients refer to a computer in a client–server technology that is independent of the central server for
performing various computations. Fat clients make periodic connections with the server, for performing large
functions. Without synchronous connections, it easily performs computations, when compared to thin clients.
A thin client is a computer that is used to create a virtual environment. It depends on the server for
performing computation. It shares a desktop, data, and file storage. The advantage of using thin clients
for hardware optimal utilization is to reduce software maintenance cost and maintain security of data.
Advantages of Client–Server Networks
Centralized control There is a centralized power used in the client-server model. Servers assist in control-
ss
ling the complete system. Access acceptance of distinct users and resource allotment is made by servers.
re
Administration managed File administration turns out to be trouble-free since every file is saved at a
yP
single place.
Replication for backup Since complete data is saved on the server, it is easy to create a back-up of it.
sit
During the time of recovering the missing data, it performs a vital role.
er
Easy updating possible Variations may be made simply by mere advancement of the server.
iv
Remote service Access of distant server is possible to accomplish the needs of consumers and support
distinct network.
Un
Secure and safe For any computing, safety is a vital feature. Safety convention and access privileges
may be termed at the time of association of server.
d
or
ss
Traffic redirected to
other servers
re
d)
yP
r e cte
(di User st Database server
Physical Physical ue
sit
Offers req
server 1 server 2
(Distributed facilities Cloud computing
er
computing) (PaaS + SaaS +
IaaS)
iv
Se ues
re
re end
nd t
t
q
es
Un
Send
S
qu
request
d
or
For highest consumption, free-time dispensation is occasionally uploaded in order to allocate a comput-
ing network and to unite with other PCs in the project. If sufficient computers are involved in the com-
puting process, it replicates the dispensation power of bigger supercomputers and processors.
Disadvantages of Distributed Computing
There are several problems regarding transfer and allocation of IT resources. They are as follows:
1. Growing computing power at every data center
2. Growing storage facility
3. Under-consumption of the resources in various scattered data centers
4. Rise in maintenance expenses of data centers
1.4.4 Evolution of Cloud Computing from Grid Computing
Grid computing utilizes a network or group of computers for making computing resources like super
computers, and performs large or complex operations and tasks over it. It is not necessary to have a
network of computers at one geographical location. Unused computing powers of many computers are
used to perform complex scientific problems using grid computing.
When computers are united mutually for an application, they may be tightly coupled or loosely
coupled. Tightly coupled systems via a system bus or some further speedy short-space network normally
share memory and other system resources, along with the processors. A geographic discrete system
is utilized in grid computing. Associates of grid computing communicate via networks; it does not
matter where the computers are actually placed. Grid applications are frequently intended to acquire
the benefits of unused CPU cycles accessible on every computer component. Grid computing is fairly
distinct from cloud computing. It uses the resources of various computers in a network to perform.
Grid computing is attractive for several reasons:
1. Computer resources are not appropriately utilized; as a result it is profitable to employ a known
sum of computer resources.
2. It accomplishes the need of high computing power.
3. The resources of various computers can be shared with an understanding, not requiring a single
ss
computer to have to organize it further.
re
Grid computing is accountable for cloud commencement up to a certain extent. There is a system of
parent and child procedures in grids or any distributed computing system. For a specific assignment, an
yP
initial evaluation, to ascertain if it can be broken into assignments of a smaller range, is conducted. If
it is feasible, distributed computing performs similar tasks and transfers the pieces of job into an addi-
sit
tional computer for completion of the assignment.
It is also beneficial for appropriate consumption of resources which remain unused. Figure 1.6
er
shows the typical forms of cluster grids where servers are connected with each other in an organization
iv
Un
Nodes
Communication Virtual
network server
d
or
Physical server
xf
O
Virtual
server
Grid with large
computation power
network; there is one administrator to control the servers and so, services are accessed by the clients on
the network.
There are numerous reasons as to why you could decide to perform an application on a grid instead of
a high performance computing (HPC). Additional savings or money, and data accessibility—both kinds
of resolution need enormous sums of computing strength.
Big crisis could be resolved Provided computing Beneficial in usage based An Internet based computing
with equivalent computing resources as metered payments to applications. offering services such as IaaS,
services (disburses as PaaS, and SaaS.
per usage)
Grid technology supports application-oriented inter domain business, so the purpose of grid security
infrastructure is to protect shared resources from unintended users and also support fundamental feature
of security like authentication and authorization. Authentication means that the entity has to prove that
it is really what it claims to be and authorization means access permission of shared resources under
ss
different conditions given to different users.
re
Authentication Infrastructure
yP
The generally used authentication infrastructure is public key infrastructure, which is based on pub-
lic key cryptography. A third-party mediator is involved for this authentication process, that issues
certificate to users as grid identity that allows users to use shared resource in the grid infrastructure.
sit
Another user authentication is done through Kerberos. Session key is issued to the users by the
authentication servers for accessing resources in the grid. Security key means special token issued to
er
the users.
iv
A different method, Athens, is also used, which maintains separate user account for each resource they
want to access and users’ accounts are managed centrally by an account server. One level authentication
Un
Akeni authorization infrastructure method issues users’ certificate to access a shared resource under dif-
ferent condition. A trusted entity is defined to gain access of shared resource. Use condition on resource
xf
is also defined for every stake holder, for keeping data safe and unreached from each other. Another
method is privilege and role management, in which for accessing resource, users have to present role-
O
based certificate that defines user role and attribute. One of the important methods is virtual organization
membership service that maintains all information about users centrally through a virtual organization
administrator. Certificate needs to be present for accessing a shared resource, and only after checking
the validity of certificate users are allowed to access resources.
Other method of access control of user identity is grid map files. A distinguished list is prepared for
shared resources used by particular user accounts and the list is shared on each resource. Generally, user
mechanisms of security in grid computing are authentication and authorization and these are termed as
hard security, whereas other method, trust management based system, is called as soft security.
Trust between two parties is a bidirectional relationship, which decides extent up to which one
party depends or relies on the other. Trust management consists of a trustor and a trustee. Mutual trust
relationship is of the following types:
1. Provision trust—It describes a user’s trust on a service provider or service.
2. Access trust—It describes service provider trust in the user access on provided resource.
3. Identity trust—It describes trust on identity claimed by the user.
4. Delegation trust—It describes trust on someone which acts and makes decision on behalf of some
other.
© Oxford University Press. All rights reserved.
14 Cloud Computing
Goal of trust model is to support decision making for various interactions. Trust values are calculated for
prediction of future possibilities. Depending upon application trust value, trust model is of three types:
1. Fuzzy logic model
2. Probability theory model
3. Mathematical method model
Fuzzy logic uses linguistic terms for calculating trust value that explains its believe on the other entity.
In probability based model, trust is calculated on the basis of previous experience that determines future
actions. In mathematical method, calculated index value determines the level of belief on the other entity.
ss
programmed, with orders given according to necessity, and evading user interference as per the need.
re
1.4.6 Platform Virtualization
yP
Virtualization is a base for clouds, irrespective of whether you are heading towards constructing a mini-
cloud in a prevailing data center or want to place your applications on a complete cloud.
sit
A virtual picture offers an undefined number of hardware resources for strengthening the accessibility
and functioning of an application; the choice on which resources to virtualize is normally handled
er
down to a query of the resources previously being utilized on a variety of accessible servers. Each user
acquires a service according to the requisites in virtualization.
iv
The unused time of a server is involved in waiting for output or input, or is devoted to an assignment,
Un
working for lesser consumption of CPU and rotating its computational power for new assignment to
be completed. Virtualization is a proficiency which conceals physical resources and emerges as virtual
resources for users. Organizations have to carry out many steps in order to accept cloud computing. In a
d
conventional data center, resources are devoted for every business application or entities. IBMS/360-67
or
supports up to four processors. It, in fact, supports dynamic address translation (DAT) to perform with
competent paging.
xf
Virtualization makes physical resources look like virtual resources in front of users. Virtualization is
O
founded on the perception of a virtual machine working on a physical computing platform. Virtualization
is managed by a Virtual Machine Monitor (VMM), called a hypervisor. An open-source hypervisor,
Xen, is broadly utilized for cloud computing.
ss
invoicing system. It is a computing enterprise module where the supplier possesses, works, and controls
re
the computing resources and infrastructure, and is accessed by subscribers as and when needed on a
metered and leasing basis.
yP
Utility computing is one among the most famous IT services’ modules, basically due to the economy
and elasticity offered by it. This module is based on the one used by traditional utilities such as gas,
sit
electricity, and telephonic services. The customer has access to a virtually infinite delivery of computing
resolutions over the virtual private network or the Internet that may be sourced; supply is managed by the
er
service providers. Utility computing may offer virtual software, virtual storage, virtual servers, and other
IT resolutions. Managed IT services, grid computing, and cloud computing are based on the idea of utility
iv
computing. Like other kinds of on-demand computing, for example, grid computing, the utility module
Un
looks to raise the effective use of resources or/and reduce related prices.
The word utility is used to create a likeness to other services like electrical power, which looks at
meeting the changeable demands of consumers, and to pay for the resources based on usage. This
d
approach is becoming even more usual in business computing and is occasionally used for the customer
or
Web 2.0 represents a change in technology in the world of the World Wide Web. It is usually designed
to increase data security and customization of application as per the requirement with improved func-
tionality.
Web-based service hosting, main social networking, sharing videos, etc., are important provisions
provided by Web 2.0. In Web 2.0, the world wide web (WWW) puts stress to generate content by the
user, and easy access and other operations on the content.
The important features of Web 2.0 are as follows:
1. Easy to access
2. User interaction and participation
3. Rich customization features
4. Easy communication through video chatting, instant messaging facilities, etc.
5. User-friendly writing tools and applications
6. Data management and analysis
7. Multimedia supporting tools
8. Web application and hosting
ss
3. Different processors are used to execute the instructions in parallel
re
4. Coordination method works behind parallel computing
Parallel computing supports applications that require processing of a large problem in a sophisticated
yP
way. Some of the examples are:
• Big data problem
sit
• Data mining
• Search engines
er
• Medical diagnosis
iv
• Virtual reality
• Multimedia
Un
Cloud computing technology is valuable to both end users and developers. Cloud computing offers the
or
developer an augmented quantity of storage and added strength. It is simple for them to operate the
application. It is a creative method for accessing information, and for processing and evaluating data.
xf
It unites resources and people from any place. Users are no more constrained by physical restrictions.
O
Cloud computing proposes various advantages to the user. An individual using a web-based application
is not physically compelled to one PC, network, or location. Users can record and applications can be
accessed from anywhere, at any time. There is no problem of losing data in case a computer collapses.
Records hosted on the cloud remain forever, so there is no issue even if something happens to the
machine of the user. If the machine of a user collapses, even then, the user may log in with an additional
machine and data can be accessed and stored. After that, there is the advantage of pool partnership.
Users from all around may group resources on similar projects, applications, and records, in actual
time.
Cloud computing proposes amenities at the lowest rate, since the cloud allows more competent
resource sharing than that of conventional network computing. Users do not have to be worried about
software or hardware installation or updating, as it is for the cloud provider. With cloud computing, the
hardware needs to be physically adjacent to an office of the data center or company. Cloud computing
infrastructure may be situated at any place. As extra cloud resources are forever ready, corporations need
not buy resources for irregular and rigorous computing assignments. Cloud resources are available on
a charge basis.
Cloud service providers propose a number of advantages over and above those provided by remote
hosting:
1. Accessibility of data all over
2. Physical servers or virtual servers
3. Servers’ interaction within similar clouds
4. Allocation or imitation of resources at numerous physical regions
5. Strength offered by different cloud storage capacities
Other services provided by cloud computing are discussed in the following sections.
1.5.1 Electronic Faxing
Secure faxes are transmitted to specific telephone number and are directed to an e-mail address as
PDF attachments. Outgoing messages are transmitted through e-mail and conveyed to fax machines all
around the world.
ss
1.5.2 Voice on Clouds
re
Cloud-founded Google Voice can deal with calls, in case the call is made by an user on a published
phone number. The call can be acknowledged from any telephone number associated to Google voice.
yP
1.5.3 Commerce on Clouds
Businesses can be tackled via clouds, for example, the sale and purchase of items. A few books are
sit
accessible for sale as downloadable e-books on websites. The numerous sites interrelate flawlessly.
er
Online buying, screening of items, and entire transactions may be handled effortlessly.
Godaddy.com is faultlessly hosted and provides services in this context. You might have utilized Rack
Un
The online banking system offers convenient banking, encompassing numerous characteristics such
as amount transfer and balance enquiry, among others. You might have applied on CapitalOne bank
xf
instead of Quickbooks; or NetSuite Small Business or other new excellent cloud-based alternatives.
Consecutively, the web-based, bill-paying application of banks is dealt by a different cloud-based dealer
O
which interfaces with the cloud-based Automated Clearing House (ACH) system for delivering and
disbursing dues.
The cloud provides complete safety of data in the bank. The complete SaaS application is accessible
to banks for invoice imbursement and similar services. Similarly, in many organizations, salaries are
is also accepted electronically as direct deposit payments. Cloud computing may be used not only for
business-to-personal communication, but also for business-to-business communication.
4. Through Force.com, you may construct a scalable business application on the cloud platform.
Both Google’s cloud and salesforce.com computing platforms are employed to generate business
and web applications.
5. Using online patterns for presentations, spreadsheets, and records
6. Functioning steady, safe, and quick Web apps
7. Easily and firmly distributing video in apps through Youtube for Google apps
ss
ing infrastructure and software for enabling the business activities of an organization. The revenue of the
business is then utilized to compensate over time for these costs. In case of hardware, it is always associated
re
with depreciable values. To make profit, the organizations have to also compensate this depreciation cre-
ated by time, thus reducing the net gain obtained from the revenue. In this way, cloud computing technol-
yP
ogy transforms IT infrastructure and software into utilities. Cloud computing offers the following benefits:
sit
Pay as per use On demand access to pay-as-you-go computing resources on a short-term basis and
ability to release these computing resources when they are no longer needed.
er
Reduced investment and proportional costs The product wholesaler purchases goods in bulk at a low
iv
price. Public cloud providers base their business model on the mass acquisition of IT resources that are
then made available to cloud consumers via attractive prices. This opens the door for organizations to
Un
IT investments, namely hardware and software purchases, and ownership costs. The cloud measures
or
Accessibility from anywhere Resources can be accessed from anywhere, irrespective of location and
device. This feature facilitates business continuity around the clock.
Increased scalability The business load can be handled with scalability of the respective resources
without much effort, time, and cost.
Increased availability and reliability Resources provided as services are available all the time. Even
if there is a failure in any of the components of a service, the provider immediately identifies, isolates,
and replaces the failed components without any performance degradations.
Dynamic provisioning It is the perception of having unlimited computing resources that are available
on demand, thereby reducing the need to prepare for provisioning.
beginners to end-users. Many cloud-based applications like Gmail have become very successful;
however, in the information technology departments of organizations and corporations, the decision
makers continue to refuse to use the cloud. Currently, companies mainly just contract applications
which comprise less confidential data. The ones which become ready to move to the cloud still insist on
third-party risk appraisal or enquire with cloud suppliers on the following:
1. By whom the applications and data will be accessed and how will that be scrutinized?
2. What security methods are used for storage and transmission of data?
3. How data and applications from diverse consumers are reserved separately?
4. Where will the data be stored in terms of geographical sites? Will the selection of the site influence us?
5. Can these details and channels be specified in a service-level contract?
Each of these consumer worries are the chief obstacles to the implementation and development of cloud
computing. Some of the limitations of cloud computing are discussed next.
ss
Consumer administration interfaces of public clouds are only possible through the Internet. As services
re
are a primary concern of consumers, they sometimes need to discard all the data from the cloud environ-
ment provided to them, while sometimes they may want to recover all the data. There is an augmented
yP
risk of disaster in this when compared to conventional services, as there are more ways to access the
application or information over cloud computing.
sit
1.8.2 Data Lock-in
er
SaaS permits the services to be interoperable on every cloud. However, shifting of data and applications
from one platform to another is a challenge to the cloud provider for a big organization handling high
iv
volumes of data. Google is the single cloud supplier to attain a more typical environment and they also
Un
have a scheme, known as Data Liberation Front, to support user shifting applications and data in and out
of their platform.
d
It is not simple to isolate cloud users from each other. A straight effect of the multitenant control mode,
where virtual machines of distinct consumers are co-located on a single server or data on single hard
xf
disks, is the main concern related to privacy. This set of risks comprises matters regarding the break-
O
ss
and in a multi-tenant environment, a single storage device is shared by more than one cloud user as
re
shown in Fig. 1.8. In the figure, there are two consumers 1 and 2, who are sharing a single shared
storage for storing data, so there is the risk of interchanging or risk related to mismatch of data if proper
yP
arrangement is not carried out.
sit
er
Cloud
iv
+ +
Shared
d
consumers
xf
O
suppliers will follow Amazon’s region option proposal as the site of data is a rising and significant
requirement of promising consumers.
ss
ous sites and the proposal should be referred in the service level contract.
re
1.8.9 Offline Clouds
yP
For several users who require an application to be accessible the whole time through, becoming entirely
dependent on the Internet could prove to be highly risky or unfeasible. This generates greater trouble in
case the user is shuffling and there is a change in the connection quality. Thus in several cases, trusting
sit
the Internet service supplier is not an alternative. At present, a web browser is a widely used software
application and all applications can be easily accessed through the interactive web browser. Locally, it is
er
not necessary to maintain a hard disk with a strong processor because customized services are available
iv
on the cloud.
Google launched Gears, a free-of-cost add-on for the browser, which allows data to be saved locally
Un
in a complete searchable database while surfing the Internet. Gears resolved the ‘offline problem’
permitting web applications to resume their working while offline and subsequently coordinating when
d
the link was accessible again. The latest edition of the HTML protocol tackles the offline matters with
a pair of constituents—database and AppCache.
or
1. Canavas—Offers an influential and clear-cut meaning to depict arbitrary graphics on a web page
xf
using Javascript
2. Video—Aims to assemble a simple video on a web page as it is to establish images nowadays
O
3. Web workers—A novel method to take on gear jobs which should hold up the web browser
Accessibility It is the major responsibility of every central origin that data is accessible, on order, to
users.
Functioning Optimal service and functioning should be offered by the data center.
Supple High-priority business needs may be under the control of the prevailing infrastructure, without
any disruption of accessibility and with the least charge and least variation.
Safety Data must be protected from illegal and malevolent users.
Manageability Corporations try to reduce IT expenses on the data center and increase the consump-
tion of prevailing resources.
In today’s competitive world, a corporation should be flexible and capable of reacting quickly, and this
should be achieved with the least investments in costs. Cloud computing is a completely automatic
request accomplishment procedure which is dedicated to flexibility, quicker access, and cost savings.
ss
For the development of cloud infrastructure, the following are needed:
1. Understanding the prevailing conventional data center
re
2. Computing resources that will be virtualized
yP
3. Installing service administration devices
An infrastructure must accomplish the necessary uniqueness to support cloud services. It may be assem-
sit
bled by using a shared group of computing resources such as network, storage, and compute so as to
accomplish cloud services. The infrastructure must be flexible for meeting the numerous demands of its
er
customers. It also permits them to provision resources on order over a network. Cloud services facilitate
optimization by managing and scrutinizing resource usage and by preservation of energy.
iv
Along with the virtualization feature in cloud computing, it is possible to offer flexible physical
Un
infrastructure to cloud users. Largely, virtualizations offer us the ability to give continuous services to
consumers. Cloud infrastructure may be built in several stages:
1. The first starts with thoroughly recognizing the prevailing physical infrastructure with its
d
2. The next step is to concentrate on accumulating the prevailing infrastructure resources by using
virtualization technologies. Therefore, the accessible resource allows centralized administration
xf
3. Then comes the step to install service administration devices, which allow mechanization of
procedures and administration to reduce human interference. Service administration devices
comprise purposeful services as well as those that permit utilization-based metering so that
customers have to pay for just what is utilized by them. Through service administration, on-order
provisioning of IT resources turns out to be livelier and permits IT to be sent as a service.
Core Components of Traditional Data Centers
A conventional data center is the prevailing infrastructure which processes data using IT resources. The
core components of a traditional data center are as follows:
Application Program employed to carry out numerous computing functions. It may be an operating
system, DBMS, and many more.
DBMS It is an administration system which offers the ability to save or get data from rationally pre-
pared tables.
Compute Resources which work numerous applications using various elements
Network It is the ability to communicate among systems. It assists us to share data and resources.
All the core elements of a traditional data center work together, to complete a task.
ss
Elastic Compute Cloud Elastic Compute Cloud (EC2) is a web service which permits resizable com-
re
puting ability on the cloud. The consumers may generate virtual machines (VMs), that is, server cases
known as Amazon Machine Image (AMI), on which the consumer may put in any software of his/her
yP
preference. A pay-by-the hour system is followed. sit
Simple Storage Service (S3) S3 offers a web service interface which may be used to regain and store
an infinite quantity of data, from any place, at any time, via the Internet.
er
Amazon SimpleDB is integrated for providing AWS services such as Amazon S3 and EC2, which
provide the infrastructure for creating various web applications.
iv
Un
languages. Up to a specific level, the resource-used App Engine is without any charge. Payment is
or
charged for further bandwidth, CPU cycles, and storage needed by the application. Software as a Service
(SaaS) provides business agreements and email. It is similar to conventional office suits, comprising
xf
In fact, the Google cloud is something which will entirely alter how people access data they look for.
The Google Cloud is powered by thousands, possibly millions of unique services and servers which
accommodate a surprising quantity of information. These are situated at various sites on the globe and
maintain many clones of the information which are available on the Internet. Relevant information of
the users is replicated on various servers.
Basically, Google Cloud is a ‘reference’ to the information which has been stored and made clear by
Google. Services of cloud computing may be used from any site to access information which has been
saved by Google. Services are provided by Search Docs, Google Maps, etc.
Windows Azure is a Microsoft Cloud computing platform used to develop, launch, and control
applications via a universal network of Microsoft-controlled data centers. Windows Azure permits
applications to be developed using various distinct languages, frameworks, or devices and makes
it potential for designers to amalgamate communal cloud applications within their accessible IT
environment. Windows Azure offers both IaaS and PaaS services and is categorized as the ‘public cloud’
in cloud computing policy of Microsoft, with its SaaS offering, Microsoft Online Services.
The following new characteristics were released by Windows Azure:
1. Websites permit designers to develop sites using PHP, Node.js, or ASP.NET and may be installed
using TFS, FTP, etc.
2. Virtual machines permit designers to drift infrastructure and applications without altering the
existing code and may operate both Linux virtual machines and the Windows Server.
3. Cloud services is a platform of Microsoft as a Service environment which is used to generate
scalable services and applications. Supports automated installations and multi-tier states.
4. Data management, an SQL database once recognized as SQL Azure Database, performs to gen-
ss
erate, scale, and expand applications into the cloud by using Microsoft SQL Server techniques.
It amalgamates with System Center and Active Directory.
re
5. Media service is a PaaS-based service that may be used for content security, encoding, analytics
and/or streaming.
yP
The Windows Azure platform, which became available in the market in 2010, offers an API devel-
sit
oped on XML, REST, and HTTP, which facilitates a designer to interrelate with the services offered
by Windows Azure. Microsoft also offers a consumer-side operated class library which summarizes
er
and customizes interrelating services as per user requirement. It also amalgamates with Eclipse,
GIT, and Microsoft Visual Studio as it may be used as the integrated development environment (IDE) to
iv
platform. The San Antonio-based vendor, which operates around more than thousand enterprises, offers
or
dedicated support to its consumers, athwart a variety of IT services, comprising cloud computing and
managed hosting. Their exclusive consumer service policy has benefited them in getting the faith of their
xf
customers. Rackspace has been identified by Bloomberg Business Week as a ‘Top Hundred Functioning
O
Technology Corporations’ and was highlighted in the list of Fortune. The corporation was also placed in
the Leaders for Cloud Infrastructure under Service and Web Hosting.
resources at the click of a mouse. The quantity of resources that may be sourced via cloud computing
integrates nearly all the aspects of computing from basic processing power to enormous storage space.
On a small scale, it can be done manually but for huge deployments, there is automatic scaling. For
instance, a better supplier of online videos might set up a system so that the number of web servers
online are scaled all through peak performance hours.
In cloud computing, elasticity is described as the level to which a system is capable of adapting
to workload variation by offering and taking back resources the autonomic way; at every point in
time the accessible resources meet the present need. It is a vital feature, which distinguishes it from
earlier computing paradigms, like grid computing. This dynamic difference, so as to meet an unreliable
workload, is known as elastic computing.
ss
clients, and customers. Social networking may be done for business purposes, social purposes, or both.
The programs show the connections among people and ease the ability of new links. Examples of social
re
networking include LinkedIn, Facebook, etc. A social networking website is an online podium which
yP
permits customers to build a public profile and interact with other users on the website. Generally, social
networking websites have a new record of people with whom they share a link and then permit the
people in the record to verify or reject the link. After the establishment, the new customers may explore
sit
the networks of their links for making further links.
Social networking sites have various rules for setting links, but they frequently permit customers
er
to examine the links of a confirmed link and even advise further links on the basis of an established
iv
network of a person. Some social networking websites like LinkedIn are used for creating professional
links, whereas sites such as Facebook are on both sides of the line (i.e., professional and private). There
Un
are also networks that are created for a particular customer base, like political or cultural groups within
a specified region or even dealers in economic markets.
d
or
Enterprise cloud computing is the process of using cloud computing for saving cost and for business
innovation by getting extraordinary speed and agility, and improved collaboration among customers and
O
Database
Server
Router 1
Host 3 Host 4 Cloud services
Enterprise provided by
(Working with cloud provider
cloud data)
Poin t s t o R e m e m be r
ss
re
1. Cloud computing is a technology which uses the Internet and central remote servers (data center) to
maintain data, software, storage, and applications. It offers the following:
yP
(a) On-demand self-sufficient services
(b) Omnipresent network access
sit
(c) Location-independent resource (access from anywhere)
(d) Speedy elasticity
er
2. Cloud application doesn’t need software or a server to use it and does not call for software updation.
3. Cloud computing allows users to use any application without installation and access their files at any
iv
4. Cloud computing is becoming a progressively more attractive alternative for many organizations.
5. Cloud computing promises to reduce operational and capital costs.
6. Peer-to-peer is a decentralized approach having no center server.
d
7. Cloud computing is essential as it helps in reducing costs; offers scalability, remote access, disaster
or
relief, ease of implementation, and better response time; and provides a virtual environment.
8. Grid is the application of multiple computers working on a single problem at the same time.
xf
Key Ter ms
Canavas It offers an influential and clear-cut means to depict arbitrary graphics on a web page using
Javascript.
Cloud computing Cloud computing is the dynamic delivery of information technology resources and capabili-
ties as a service over the Internet. Cloud computing is dynamically scalable and often transmits virtualized
resources over the Internet. It provides services such as Infrastructure as a Service (IaaS), Platform as a Service
(PaaS), and Software as a Service (SaaS).
DBMS A type of system of managing databases for providing facilities like storing or retrieving informa-
tion from organized tables.
Distributed computing A distributed system consists of multiple computers that communicate through a
computer network to achieve a common goal.
ss
Grid computing The application of the processing power of multiple networked computing resources to
solve a specific problem.
re
Hyper text markup language (HTML) A language mainly used for static web page designing
yP
IP addresses A unique address provided to each computer in a network
Lock in Cloud vendor lock-in is a problem without a villain, according to Tom Hughes-Croucher, a technical
sit
evangelist at Yahoo. It makes a customer dependent on a vendor for products and services, unable to use
another vendor without substantial switching costs.
er
Media services A PaaS offering that can be used for encoding, content protection, streaming, etc.
iv
Peer-to-peer A different type of architecture in which each computer in the network has equivalent
capabilities and responsibilities. It is not a centralized approach.
d
Remote access A distinct technology that allows logging into a system as an authentic user into a remote
or
location without being physically present at the system. This technology is commonly used on corporate
sectors but can also be utilized on home networks.
xf
Utility computing The packaging and delivery of computing resources to a customer who pays for the resources
as a metered-based service when needed. Customers have to pay on the basis of how much they have used.
Web workers A novel method to take on gear jobs which should hold up the web browser
1. Which of the following is an example of a (c) The cloud service provider who are
cloud computing application? responsible for IT assets and maintenance
(a) Facebook (d) All the above
(b) Twitter
7. The core elements of a traditional data center
(c) Skype
is/are_______________.
(d) Salesforce.com and Googleapp
(a) DBMS
(e) All the above
ss
(b) Compute
2. The logical partitioning of physical computing (c) Network
re
resources into multiple execution environ- (d) All the above
yP
ments is called:
8. Peer-to-peer is a ____________.
(a) Grid computing
(a) Decentralized approach
(b) Platform virtualization
sit (b) Centralized approach
(c) Distributed computing
(c) Distributed approach
(d) None of these
er
(d) None of these
3. The term used to describe a hypervisor running
9. The advantages of client server networks is/
iv
(a) Centralization
(b) Para virtualization
(b) Proper management
(c) Partial virtualization
(c) Backup and recovery possible
d
13. What is the prime concern about cloud comput- (a) Employee satisfaction
ing? (b) Cost reduction
(a) Security concerns (c) Sensitivity of information
(b) Too many platforms (d) All the above
(c) Accessibility 18. The challenges with traditional infrastructure
(d) Too expensive include:
14. Which of these is not the leader of cloud comp- (a) Software licensing and support
uting? (b) Scalability
(a) Google (c) Accountability and modifiability
(b) Amazon (d) All the above
(c) Blackboard 19. The advantage of cloud over remote hosting is
(d) Microsoft __________.
15. Which of the following is not a major cloud (a) Virtual servers or physical servers that can
computing platform? be customized to different plans through a
ss
(a) Google 101 control panel
(b) IBM Deep blue
re
(b) Dedicated IP addresses for cloud servers
(c) Microsoft (c) Replication or distribution over various
yP
(d) Azure distant locations
16. What represents the ‘cloud’ in cloud comput- (d) All the above
ing?
sit
(a) Wireless 20. Which of these are the challenges of cloud
(b) Wireless LAN computing?
er
Review Qu e s t i o ns
or
xf
19. What do you understand by customization? How can we use it in cloud computing?
20. What are the applications of utility computing with reference to cloud computing?
21. What is the need of elastic computing?
R e f e r e nc e s
1. Cloud Security A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz and Russell
Dean Vines, ISBN: 978-0-470-58987-8, Wiley Publication, 2010
2. Cloud Computing for Dummies, Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr Fern Halper,
ISBN-10: 0470484705, Wiley Publication, 1st edition, November 16, 2009
3. Cloud Computing Technologies and Strategies, Brian J.S. Chee and Curtis Franklin, Jr, ISBN
9781439806128, CRC Press, April 16, 2010
4. Cloud Computing: A Practical Approach, Anthony T. Velte, Toby J. Velte, Ph.D., Robert Elsenpeter,
ss
ISBN-10: 0071626948, McGraw-Hill, 1st edition, November 1, 2009
re
5. Grid and Cloud Computing, Katarina StanoevskaSlabeva, Thomas Wozniak, and Santi Ristol, ISBN-
10: 3642051928, Springer, 2010 edition, November 19, 2009
yP
6. Implementing and Developing Cloud Applications, David E.Y.Sarna, ISBN-10: 1439830827,
Auerbach Publications, November 26, 2010
7. Market-oriented Cloud computing: Vision, Hype, and Reality for Delivering It Services as Computing
sit
Utilities. In High Performance Computing and Communications, R. Buyya, C.S. Yeo, and
S. Venugopal., 2008. HPCC’08. 10th IEEE International Conference, pp. 4–13 IEEE, 2008
er
8. Mastering Cloud Computing, Rajkumar Buyya, Christian Vecchhiola, S. Thamarai Selvi, Tata
iv
An swer s t o Multi pl e - c ho i c e Qu e s t i o ns
1. (e) 5. (d) 9. (d) 13. (a) 17. (d)
2. (b) 6. (d) 10. (a) 14. (c) 18. (d)
3. (d) 7. (d) 11. (a) and (c) 15. (b) 19. (d)
4. (d) 8. (a) 12. (d) 16. (d) 20. (d)