Lecture 9
Lecture 9
system.
Type 2 hypervisor is a software interface that emulates the devices with which a system normally
interacts. Containers, KVM, Microsoft Hyper V, VMWare Fusion, Virtual Server 2005 R2, Windows Virtual
PC and VMWare workstation 6.0 are examples of Type 2 hypervisor. The following diagram shows the Type 2
hypervisor.
TUTORIALS POINT
Simply Easy Learning
Types of Hardware Virtualization
Here are the three types of hardware virtualization:
1. Full Virtualization
2. Emulation Virtualization
3. Paravirtualization
FULL VIRTUALIZATION
In Full Virtualization, the underlying hardware is completely simulated. Guest software does not require any
modification to run.
TUTORIALS POINT
Simply Easy Learning
EMULATION VIRTUALIZATION
In Emulation, the virtual machine simulates the hardware and hence become independent of the it. In this, the
guest operating system does not require modification.
TUTORIALS POINT
Simply Easy Learning
PARAVIRTUALIZATION
In Paravirtualization, the hardware is not simulated. The guest software run their own isolated domains.
TUTORIALS POINT
Simply Easy Learning
VMware vSphere is highly developed infrastructure that offers a management infrastructure framework for
virtualization. It virtualizes the system, storage and networking hardware.
TUTORIALS POINT
Simply Easy Learning
CHAPTER
18
Cloud Computing Security
S ecurity in cloud computing is a major concern. Data in cloud should be stored in encrypted form. To restrict
client from direct accessing the shared data, proxy and brokerage services should be employed.
Security Planning
Before deploying a particular resource to cloud, one should need to analyze several attributes about the resource
such as:
Select which resources he is going to move to cloud and analyze its sensitivity to risk.
Consider cloud service models such as IaaS, PaaS, and SaaS. These models require consumer to be
responsible for security at different levels of service.
Consider which cloud type such as public, private, community or hybrid.
Understand the cloud service provider's system that how data is transferred, where it is stored and how to
move data into and out of cloud.
Mainly the risk in cloud deployment depends upon the service models and cloud types.
TUTORIALS POINT
Simply Easy Learning
KEY POINTS TO CSA MODEL:
IaaS is the most basic level of service with PaaS and SaaS next two above levels of service.
Moving upwards each of the service inherits capabilities and security concerns of the model beneath.
IaaS provides the infrastructure, PaaS provides platform development environment and SaaS provides
operating environment.
IaaS has the least level of integrated functionalities and integrated security while SaaS has the most.
This model describes the security boundaries at which cloud service provider's responsibility ends and the
consumer's responsibilities begin.
Any security mechanism below the security boundary must be built into the system and above should me
maintained by the consumer.
Although each service model has security mechanism but security needs also depends upon where these services
are located, in private, public, hybrid or community cloud.
Access Control
TUTORIALS POINT
Simply Easy Learning
Auditing
Authentication
Authorization
All of the service models should incorporate security mechanism operating in all above-mentioned areas.
Brokered Cloud Storage Access is one of the approaches for isolating storage in cloud. In this approach, two
services are created:
A proxy with no access to storage but access to both client and broker.
TUTORIALS POINT
Simply Easy Learning
Encryption
Encryption helps to protect data from being compromised. It protects data that is being transferred as well as data
stored in the cloud. Although encryption helps to protect data from any unauthorized access, it does not prevent
from data loss.
TUTORIALS POINT
Simply Easy Learning
CHAPTER
19
Cloud Computing Operations
Overview
C loud Computing operation refers to delivering superior cloud service. Today, cloud computing operations
have become very popular and widely employed by many of the organizations just because it allows to perform all
business operations over the Internet.
These operations can be performed using a web application or mobile based applications. There are a number of
operations that are performed in cloud, some of them are shown in the following diagram:
TUTORIALS POINT
Simply Easy Learning
Always employ right tools and resources to perform any function in the cloud.
TUTORIALS POINT
Simply Easy Learning