Unit-5 Cloud Computing
Unit-5 Cloud Computing
What is SaaS?
Data Sensitivity: SaaS platforms often handle sensitive user data and business-critical
information.
Broad Access: Being accessible over the internet, these applications are potential targets for
cyber-attacks from anywhere in the world.
Multi-Tenancy: Multiple customers share the same software instance and infrastructure,
necessitating strict data isolation and tenant security.
Mitigations: Encryption at rest and in transit, regular backups, and robust access controls.
Risk: Weak authentication methods can allow attackers to bypass security controls.
Mitigations: Implement multi-factor authentication (MFA), single sign-on (SSO), and strict role-
based access control (RBAC).
Insecure APIs and Interfaces
Risk: SaaS applications expose APIs that, if not secured, can be exploited by attackers.
Mitigations: Secure APIs with proper authentication, input validation, and regular security testing.
Multi-Tenancy Issues
Risk: Isolation failure between tenants may lead to data leakage or unauthorized access to other
customers' information.
Mitigations: Use strong tenant isolation mechanisms, encryption, and monitoring to ensure proper
data segregation.
Risk: SaaS providers often operate across different legal jurisdictions, which may complicate
compliance with various data protection regulations (e.g., GDPR, HIPAA).
Mitigations: Incorporate compliance frameworks into the development and management process,
and provide transparency to customers about data handling practices.
Data Breaches
Mitigation: SaaS providers should implement encryption for data at rest and in transit, as well
as strong access controls.
Data Loss
Risk: Accidental deletion, malicious actions, or provider outages can cause data loss.
Mitigation: Regular backups, redundancy, and disaster recovery plans are critical.
Account Hijacking
Risk: Users' accounts can be compromised due to weak passwords, phishing attacks, or other
vulnerabilities.
Mitigation: Multi-Factor Authentication (MFA), strong password policies, and secure
authentication mechanisms can prevent account hijacking.
Insecure APIs
Risk: APIs exposed by SaaS applications can become targets for attackers if not properly secured.
Mitigation: Use strong authentication mechanisms, rate limiting, and API security standards
to protect APIs.
Misconfigurations
Risk: Improper setup by the provider or the client can lead to security holes (e.g., open storage
buckets, weak access controls).
Mitigation: SaaS providers should offer security configuration guidelines, and clients must
follow best practices for access control and monitoring.
Data Encryption: Both in transit (e.g., TLS/SSL) and at rest (e.g., AES) encryption should be
enforced to protect data from unauthorized access.
Encryption Keys: Customers should have control over encryption keys where possible.
Access Controls: Use Role-Based Access Control (RBAC) to limit user access based on their
role in the organization.
Single Sign-On (SSO): Integrate with SSO solutions to simplify and secure user authentication.
Data Residency: Organizations need to ensure that their data is stored within acceptable
jurisdictions, especially for industries with strict regulations (e.g., GDPR, HIPAA).
Compliance Certifications: SaaS providers should adhere to security standards like ISO 27001,
SOC 2, and CSA STAR to meet regulatory requirements.
Disaster Recovery: A well-defined disaster recovery plan should be in place to quickly recover
from outages or cyberattacks.
Security Monitoring: Continuous monitoring for unusual activities (e.g., unauthorized access,
data exhilaration) is essential.
Logging and Auditing: SaaS applications should maintain detailed logs of user activities and
security events to assist in post-event analysis.
Vetting: Ensure that third-party services integrated with the SaaS provider also follow proper
security practices.
Contractual Security Provisions: Ensure that contracts with the SaaS provider specify security
requirements, responsibilities, and breach notification terms.
Switching from one SaaS provider to another can be difficult due to proprietary tools and
data formats, making it harder to migrate securely.
As organizations grow, managing user access and maintaining security across a large
scale can become complex and expensive.
Encryption: Ensure that data is encrypted both during transit (using TLS/SSL) and at
rest.
Tokenization and Data Masking: Protect sensitive data elements by replacing them
with non-sensitive tokens.
Secure APIs: Regularly test and audit APIs to ensure they are free from vulnerabilities.
Web Application Firewalls (WAFs): Deploy WAFs to monitor and filter out malicious
traffic.
Intrusion Detection/Prevention Systems (IDPS): Monitor network traffic to detect and
prevent potential attacks.
Due Diligence: Organizations must assess the security posture of their SaaS providers
through audits, certifications (e.g., SOC 2, ISO/IEC 27001), and compliance reports.
Service Level Agreements (SLAs): Define security requirements and responsibilities in
the service contract.
Patch Management: Ensure that software and systems are regularly updated and
patched.
Security Training: Educate users on best practices and awareness to counter social
engineering and phishing attacks.
Incident Response Planning: Develop and test incident response plans to handle
security breaches efficiently.
The Open Cloud Consortium (OCC) is a non-profit organization that develops, supports, and
manages open cloud computing infrastructure and frameworks. It promotes collaboration
among industry, academia, and government to advance the adoption and standardization of cloud
computing.
Objectives of OCC
1. Promote Open Standards
o Encourage the use of interoperable and vendor-neutral cloud technologies.
o Facilitate the sharing and reuse of cloud resources through common interfaces and
protocols.
2. Support Scientific and Research Computing
o Enable large-scale data analysis and computing through shared cloud platforms.
o Support research projects in fields like climate science, genomics, and medical
imaging.
3. Provide Open Cloud Testbeds
o Offers real-world test environments for developing and testing cloud-based
applications and services.
4. Collaborate with Other Standards Bodies
o Works with organizations such as:
DMTF (Distributed Management Task Force)
OGF (Open Grid Forum)
SNIA (Storage Networking Industry Association)
5. Key Contributions of OCC
Area Description
Open Cloud Testbed A high-performance cloud infrastructure used for testing and
(OCT) benchmarking cloud applications.
Open Science Data Cloud A petabyte-scale infrastructure that supports research and data-
(OSDC) intensive science.
Promotes APIs and protocols that enable cloud services to work
Interoperability Standards
across different platforms.
Tools and frameworks to support data sharing, processing, and
Data Management Tools analysis in distributed environments.
o Goal: Ensure that different cloud platforms can interoperate and be managed in a
consistent way.
o In the cloud, CIM helps standardize how infrastructure components are described
and managed.
4. Redfish Standard:
o DMTF ensures that systems from different vendors can work together, which is
crucial in multi-cloud and hybrid cloud deployments.
Cloud Infrastructure
API for managing cloud infrastructure resources.
Management Interface DMTF
Useful for consistent backend services.
(CIMI)
3. Security Standards
OAuth 2.0 / OpenID For secure authentication and authorization IETF / OpenID
Connect between applications and cloud services. Foundation
Docker Image Open standard for container images to ensure Open Container
Specification / OCI portability across environments. Initiative
Kubernetes CRD & Standard APIs and custom resource definitions for
CNCF
API Standards deploying and managing cloud-native apps.
5. Data and API Standards
Standard Description
Organization
Open/Community
Widely used standards for API
REST/JSON,gRPC,
development and data
GraphQL
exchange in cloud-native apps.
AMQP, STOMP,
RabbitMQ Message broker that supports multiple protocols.
MQTT
Standard Description
OAuth 2.0 / JWT Used for secure message authorization and identity.
Standard Description
CSA Cloud Controls A cybersecurity control framework tailored for cloud Cloud Security
Matrix (CCM) providers and customers. Alliance
Identity verification in
OpenID Connect Authentication layer on top of OAuth 2.0.
cloud apps.
SAML (Security Assertion XML-based authentication for single Enterprise SSO in cloud
Markup Language) sign-on (SSO). services.
LDAP (Lightweight Protocol for accessing and maintaining Used in identity and
Directory Access Protocol) distributed directory info services. access management.
GDPR (General Data EU regulation on personal Required for cloud services handling
Protection Regulation) data protection. EU residents' data.
Remote Desktop /
Accessing a virtual machine or desktop Enterprise environments, secure
Virtual Desktop
hosted in the cloud. remote work.
(VDI)
Command Line Developers/admins use CLI tools to AWS CLI, Azure CLI, Google
Interface (CLI) interact with cloud platforms. Cloud SDK.
PaaS (Platform as a Developers access via web IDEs, APIs, and Deploying apps on
Service) CLIs. Heroku, Firebase.
Access Logging & Auditing: Monitor user actions for compliance and threat detection.
Trends in End User Access
1. Ubiquitous Access
o Users can access cloud-based services (like Google Drive, Office 365, Dropbox)
directly from their mobile devices.
o Mobile devices often act as thin clients, offloading processing and storage to the
cloud.
o The cloud handles computation, while the device focuses on the user interface.
3. Cloud-Backed Apps
o Many mobile apps rely on cloud backends for real-time updates, storage, push
notifications, and AI capabilities (e.g., chatbots, voice recognition).
Authentication
Cloud storage
Real-time databases
APIs
☁️ Cloud Services Used by Mobile Devices
PaaS /
Firebase, AWS Amplify Build and scale mobile apps
MBaaS
🔐 Security Considerations
Secure APIs: Protect mobile-cloud interactions with API gateways and rate limiting.
Device Management: MDM (Mobile Device Management) tools help secure enterprise
devices.
🔄 Real-World Applications
Social media apps: Use cloud for media storage and feed delivery.
Hadoop:
Hadoop in cloud computing refers to using the Apache Hadoop framework on cloud infrastructure
to perform distributed storage and processing of large datasets (big data). Cloud platforms like
AWS, Azure, and Google Cloud offer flexible environments to deploy and manage Hadoop
clusters, making big data processing more scalable and cost-effective.
📘 What is Hadoop?
Apache Hadoop is an open-source framework that enables the distributed processing of large data
sets across clusters of computers using simple programming models. It is designed to scale from
single servers to thousands of machines.
1. HDFS (Hadoop Distributed File System): Stores data across multiple machines.
3. YARN (Yet Another Resource Negotiator): Manages cluster resources and job scheduling.
Benefit Description
Amazon Web Amazon EMR (Elastic Managed Hadoop framework to process big data
Services (AWS) MapReduce) using Hadoop, Spark, Hive, etc.
Integrate with IAM (Identity & Access Management) from the cloud provider.
MapReduce:
MapReduce in cloud computing is a programming model and processing technique used for
analyzing and transforming large datasets in a distributed, parallelized manner. It's a core part of
the Apache Hadoop ecosystem and is often run in the cloud to take advantage of scalability,
elasticity, and lower infrastructure costs.
🧠 What is MapReduce?
1. Map Phase:
2. Reduce Phase:
o The system groups all intermediate values by key and processes them (e.g.,
summing, counting, aggregating).
Benefit Explanation
Cost-Effective Pay only for compute/storage used; no need to maintain on-premise clusters.
Elastic Resources Cloud platforms can dynamically add or remove resources based on job size.
Amazon Web Services Amazon Runs Hadoop MapReduce jobs on scalable EC2
(AWS) EMR clusters.
Google Cloud Platform Managed Hadoop and MapReduce services with fast
Dataproc
(GCP) start-up.
Cloud Platform Service Description
Log analysis
Web indexing
Recommendation systems
Virtual Box:
💻 What is VirtualBox?
Tool Purpose
Packer Builds VM images for VirtualBox and cloud platforms like AWS AMIs.
Not cloud-native (no built-in integration with cloud storage, IAM, etc.).
✅ Summary
VirtualBox is not a cloud platform itself, but it’s widely used in cloud development
workflows for:
App Engine lets you deploy code in several programming languages (Python, Java,
Node.js, Go, PHP, Ruby, etc.).
o Server provisioning
o Load balancing
o Auto-scaling
Versioning and Traffic Splitting Deploy multiple app versions and gradually roll out changes.
Supports Standard and Flexible Standard is sandboxed and fast; flexible gives more
Environments customization (e.g., custom Docker containers).
Apps with special dependencies or longer High (custom Docker images, SSH
Flexible
execution times access)
HTTPS/SSL by default
Go Go
PHP PHP
Node.js Node.js
Standard Environment Flexible Environment
Ruby Ruby
💡 The standard environment is optimized for performance and sandboxed execution, while the
flexible environment gives full control via Docker containers.
bash
You can integrate with other Google Cloud services using App Engine's built-in APIs:
Memorystore (Caching)
Task Queues / Pub/Sub (Async processing)