0% found this document useful (0 votes)
19 views133 pages

Unit 3 Cloud

The document discusses various aspects of cloud computing, including service models such as Public, Private, and Hybrid Clouds, and their respective benefits and challenges. It covers infrastructure models like IaaS, PaaS, and SaaS, as well as data-center design, interconnection networks, and architectural challenges. Additionally, it highlights the importance of cloud ecosystems and the role of major public cloud platforms like Google App Engine, Amazon Web Services, and Microsoft Azure.

Uploaded by

Priyanka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views133 pages

Unit 3 Cloud

The document discusses various aspects of cloud computing, including service models such as Public, Private, and Hybrid Clouds, and their respective benefits and challenges. It covers infrastructure models like IaaS, PaaS, and SaaS, as well as data-center design, interconnection networks, and architectural challenges. Additionally, it highlights the importance of cloud ecosystems and the role of major public cloud platforms like Google App Engine, Amazon Web Services, and Microsoft Azure.

Uploaded by

Priyanka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 133

Dr.

AMBEDKAR INSTITUTE OF TECHNOLOGY


OUTER RING ROAD,MALLATHALLI,BENGALURU
DEPARTMENT OF COMPUTER SCIECNE AND ENGINEERING

Cloud Computing –Kai Hwang

Unit 3
Cloud computing and Service models

https://drait.edu.in 1
Cloud Computing and Service Models: Public, Private, and Hybrid Clouds, Cloud Ecosystem
and Enabling Technologies, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS)
and Software-as-a-Service (SaaS), Data-Center Design and Interconnection Networks:
Warehouse-Scale Data-Center Design, Data-Center Interconnection Networks, Modular
Data Center in Shipping Containers, Interconnection of Modular Data Centers, Data-Center
Management Issues, Architectural Design of Compute and Storage Clouds: A Generic
Cloud Architecture Design, Layered Cloud Architectural Development, Virtualization
Support and Disaster Recovery, Architectural Design Challenges, Public Cloud Platforms:
GAE, AWS, AND AZURE: Public Clouds and Service Offerings, Google App Engine (GAE),
Amazon Web Services (AWS), Microsoft Windows Azure, Inter-Cloud Resource
Management: Extended Cloud Computing Services, Resource Provisioning and Platform
Deployment, , Virtual Machine Creation and Management, Global Exchange of Cloud
Resources, Cloud Security and Trust Management: Cloud Security Defense Strategies,
Distributed Intrusion/Anomaly Detection, Data and Software Protection Techniques.
Cloud Computing and Service Models

Public, Private, and Hybrid Clouds


Cloud Computing and Service Models :
share access to resources from anywhere
at any time through their connected devices.
avoids large data movement: Better network
bandwidth utilization.
 Machine virtualization : reduced the total cost.
 Significant benefit to IT companies by freeing them
from the low-level task of setting up the hardware
(servers) and managing the system software.
Centralized versus Distributed Computing

Commercial cloud providers Amazon,


Google, and Microsoft created their
platforms to be distributed geographically.
Public
Clouds
1.Built over the Internet and can be accessed by
any user who has paid for the service.
2.Public clouds are owned by service providers
and are accessible through a subscription.
3.Google App Engine (GAE), Amazon Web
Services (AWS), Microsoft Azure,IBM Blue Cloud,
and Salesforce.com’s Force.com.
4.Can share the same hardware, storage and network devices with other
organizations or cloud “tenants,”
5. Can access services and manage your account using a web browser.
Public Clouds

4.The providers offers services through remote


interface for creating and managing VM
instances within their proprietary infrastructure.
5.A public cloud delivers a selected set of
business processes.
6. The application and infrastructure services are
offered on a flexible price-per-use basis.
Google
Private Clouds

 Is built within the domain of an intranet owned


by a single organization.
 It is client owned and managed, and its access is
limited to the owning clients and their
partners.
 Was not meant to sell capacity over the
Internet through publicly accessible interfaces.
Private Clouds

flexible and agile private infrastructure to


run service workloads within their
administrative domains.
 A private cloud is supposed to deliver more
efficient and convenient cloud services.
 Retains standardization, while retaining
greater customization and
organizational control.
Hybrid Clouds
Private clouds support a hybrid cloud model by
supplementing local infrastructure with
computing capacity from an external public
cloud.
Ex: Research Compute Cloud (RC2).
Provides access to clients, the partner network,
and third parties.
summary

public clouds promote standardization, preserve


capital investment, and offer application
flexibility.
Private clouds attempt to achieve customization
and offer higher efficiency, resiliency, security,
and privacy.
Hybrid clouds operate in the middle, with many
compromises in terms of resource sharing
Google
Google
Data-Center Networking Structure

Server cluster (or VM cluster). Cluster nodes


are used as compute nodes and assigned to
user applications.
 control nodes are used to manage and monitor
cloud activities.
The gateway-> the access points of the service
and for security control of the cloud.
Data-Center Networking Structure
Cloud Development Trends
Private clouds-secure and more
trustworthy within a company or
organization.
Once private clouds become mature and
better secured, could be open or converted
to public clouds.
The boundary between public and
private clouds could be blurred in the
future.
Six design objectives for cloud computing:
1.Shifting computing from desktops to data
centers
2. Service provisioning and cloud economics signing
SLAs with consumers and end users.
3.Scalability in performance
4.Data privacy protection
5.High quality of cloud services.
6.New standards and interfaces
Cost Model
1. Traditional IT computing, users must acquire their own
computer and peripheral equipment as capital expenses.
2. Fixed cost is the main cost reduced slightly as the number
of users increases.
3. Operational costs may increase sharply with a larger
number of users.
4. Total cost escalates quickly with massive numbers of
users.
5. Cloud computing applies a pay-per-use business model, in
which user jobs are outsourced to data centers.
6. To use the cloud, one has no up-front cost in hardware
acquisitions.
7. Cloud computing will reduce computing costs significantly for
both small users and large enterprises.
Cloud Ecosystems
Cloud ecosystem represents the web of components that come
together to deliver cloud services. Cloud computing hardware and
software, cloud developers, consultants, integrators, collaborators, and
clients each contribute to this overall system in their own way.
Ex: Sotomayor, for building private clouds.
Four levels of ecosystem development
 At the user end: consumers demand a
flexible platform.
At the cloud management :cloud manager
provides virtualized resources over an IaaS
platform.
Cloud Ecosystems

At the virtual infrastructure (VI) management


level, the manager allocates VMs over multiple
server clusters.
VM managers handle VMs installed on individual
host machines.
An ecosystem of cloud tools attempts to span
both cloud management and VI management.
Cloud Ecosystems
Infrastructure-as-a-Service (IaaS)
Delivers infrastructure, platform, and
software (application) as services.
SLA for cloud computing is addressed in terms
of service availability, performance, and data
protection and security.
GoGrid, FlexiScale, and Aneka are good
examples.
1.Infrastructure as a Service

Users to use virtualized IT resources for


computing, storage, and networking by rented
cloud infrastructure.
 The user can deploy and run his applications over his
chosen OS environment.
 The user does not manage or control the underlying
cloud infrastructure, but has control over the OS,
storage, deployed applications, and possibly select
networking components.
This IaaS model encompasses storage as a service,
compute instances as a service, and communication
2.Platform as a Service
1.To be able
(PaaS)
to develop, deploy, and manage the
execution of applications using provisioned resources demands
a cloud platform with the proper software environment.
2. platform includes operating system and runtime
library support.
3. This has triggered the creation of the PaaS model to enable
users to develop and deploy their user applications.
4.PaaS model enables a collaborated software development
platform for users from different parts of the world.
5.This model also encourages third parties to provide software
management, integration, and service monitoring solutions
2.Platform as a Service (PaaS)
Google
3.Software as a Service (SaaS)
1.Browser-initiated application software over thousands of
cloud customers.
2.The SaaS model provides software applications as a
service.
3.The customer side: No upfront investment in servers or
software licensing.
4.The provider side: Costs are kept rather low, compared
with conventional hosting of user applications.
5. Google Gmail and docs, Microsoft SharePoint, and the CRM
software from Salesforce.com
DATA-CENTER DESIGN AND INTERCONNECTION
A data center is often built with aNETWORKS
large number of servers through a huge interconnection
network.
arehouse-Scale Data-Center Design
The cloud is built on massive datacenters.
 large as a shopping mall (11 times the size of
a football field) under one roof.
4,00,000 to 1 million servers.
 A small data center have 1,000 servers.
DATA-CENTER DESIGN AND INTERCONNECTION
A data center is often built with aNETWORKS
large number of servers through a huge interconnection
network.
arehouse-Scale Data-Center Design

larger the data center, lower the operational


cost.
Month cost for huge 400-server data center
 network cost $13/Mbps;
 storage cost $0.4/GB;
 administration costs.
Data-Center Construction Requirements
Multicore CPU and its internal cache hierarchy, local
shared and coherent DRAM, and a number of directly
attached disk drives.
 DRAM and disk resources within the rack are
accessible through first-level rack switches.
Consider a data center built with 2,000 servers,
each with 8 GB of DRAM and four 1 TB disk drives.
Each group of 40 servers is connected through a 1
Gbps link to a rack-level switch with additional eight 1
Gbps ports to the cluster-level switch
Cooling System of a Data-Center (computer room air conditioning (CRAC))
Room
Data-Center Interconnection
Networks
Basic requirements:
1.Low latency,
2.High bandwidth
3.Low cost
4.Message-passing interface (MPI) communication
support,
5.Fault tolerance.
Specific design considerations Data-Center
Interconnection

1.Application Traffic Support


2.Network Expandability
3.Fault Tolerance and Graceful Degradation
4.Switch-centric Data-Center Design
1.Application Traffic Support
1.The network topology should support all MPI
communication patterns.
2.Both point-to-point and collective MPI
communications must be supported.
3.The network should have high bisection
bandwidth to meet this requirement.
2.Network Expandability

1.The interconnection network should be


expandable.
2. The network topology should be
restructured for scalability.
3.Be designed to support load balancing and
data movement among the servers.
3.Fault Tolerance and Graceful Degradation
1. Interconnection network should tolerate link or switch
failures.
2. Fault tolerance of servers is achieved by replicating data
and computing among redundant servers.
3.Both software and hardware network
redundancy apply to cope with potential failures.
4. One the software side, the software layer should be
aware of network failures.
5.Packet forwarding should avoid using broken links.
6.In case of failures, the network structure should degrade gracefully amid
limited node failures.
4.Switch-centric Data-Center Design

1. Two approaches to building data-center-scale networks:


One
is switch centric and the other is server-
centric.
2. In a switch-centric network, the switches are used
to connect the server nodes.
3. The switch-centric design does not affect the server
side.No modifications to the servers are needed.
4. The server-centric design does modify the
operating system running on the servers.
Modular Data Center in Shipping
Housed in truck-towed containers.
Containers
Big shipping yard of container trucks.
Demand for lower power consumption, higher
computer density, and mobility to relocate data
centers
Sophisticated cooling
Both chilled air circulation and cold water are flowing
Container Data-Center Construction

SGI ICE Cube container can house 46,080 processing cores or 30 PB of storage per container.
Building a rack of 40 servers may take half a day.
Extending with multiple racks for 1,000 servers
need layout of the floor space with power,
networking, cooling, and complete testing.
 The container must be designed to be
weatherproof and easy to transport.
Data-Center Management Issues
Making common users happy
Controlled information flow
Multiuser manageability
Scalability to prepare for database growth
Reliability in virtualized infrastructure
 Low cost to both users and providers.
 Security enforcement and data protection
 Green information technology.
ARCHITECTURAL DESIGN OF COMPUTE AND STORAGE CLOUD

1.Cloud Platform Design Goals

Scalability, virtualization, efficiency, and


reliability
support Web 2.0 applications.
The cloud management software needs to
support both physical and virtual
machines.
Security
ARCHITECTURAL DESIGN OF COMPUTE AND STORAGE
CLOUDS
Enabling Technologies for Clouds
1.Fast Platform Deployment :
2.Virtual Clusters on Demand
3.Multitenant Techniques
4.Massive data processing
5.Web Scale Communication
6.Distributed Storage
7.Licensing and Billing Services
ARCHITECTURAL DESIGN OF COMPUTE AND STORAGE
CLOUDSTechnologies for Clouds
. Enabling
ARCHITECTURAL DESIGN OF COMPUTE AND STORAGE
CLOUDS
eneric Cloud Architecture
ARCHITECTURAL DESIGN OF COMPUTE AND STORAGE
Layered Cloud Architectural Development
CLOUDS
Virtualization Support and Disaster Recovery
ARCHITECTURAL DESIGN OF COMPUTE AND STORAGE
CLOUDS
Architectural Design Challenges
Challenge 1—Service Availability and Data Lock-in Problem
Challenge 2—Data Privacy and Security Concerns
Challenge 3—Unpredictable Performance and Bottlenecks
Challenge 4—Distributed Storage and Widespread Software Bugs
Challenge 5—Cloud Scalability, Interoperability, and
Standardization
Challenge 6—Software Licensing and Reputation Sharing
PUBLIC CLOUD PLATFORMS: GAE, AWS, AND AZURE
Public Clouds and Service Offerings
PUBLIC CLOUD PLATFORMS: GAE, AWS, AND
AZURE
Google App Engine (GAE)

The Google platform is based on its search engine


expertise
Use MapReduce
Google has hundreds of data centers and has
installed more than 460,000 servers worldwide.
Google App Engine (GAE)
1.Google Cloud Infrastructure

Google pioneered cloud services in Gmail,


Google Docs, and Google Earth, with HA.
Google File System (GFS), MapReduce, BigTable,
and Chubby.
 In 2008, Google announced the GAE web
application platform.
Google App Engine (GAE)

2. GAE Architecture.
 GFS => storing large amounts of data.
 MapReduce => application program development.
 Chubby=> distributed application lock services.
 BigTable => storage service for accessing structured
data.
 Interaction => Users can interact with Google
applications via web interface.
 Third-party application providers can use GAE to build
cloud applications for providing services.
 The applications all run in data centers under tight
management by Google engineers.
Google
Google App Engine (GAE)

3. Functional Modules of GAE

5 Major components

 Datastore - is a highly scalable NoSQL database for your web and mobile applications.
Application runtime environment:
 software development kit (SDK) :
 The administration console : users, create groups, manage
devices, configure billing, and manage security settings
 The GAE web service infrastructure
GAE Applications

 Google Search Engine, Google Docs, Google Earth, G-mail.


 To store application-specific data in the Google infrastructure.
 Facility for queries, sorting, and even transactions similar to
traditional database systems.
 Gmail account service: applications can use the Gmail account
directly.
Amazon Web Services (AWS)

A leader in providing public cloud services


(http://aws.amazon.com/).
Amazon applies the IaaS model in providing
its services.
Amazon Web Services (AWS)

EC2=>Provides virtualized platforms to the


host VMs where the cloud application can run.
S3 (Simple Storage Service):object-oriented
storage service for users. Data is stored as objects
within resources called “buckets”, and a single object can be
up to 5 terabytes in size.
 EBS (Elastic Block Service) :block storage
interface used to support traditional applications.
Amazon Web Services (AWS)

SQS (Simple Queue Service):reliable message


service between two processes.
The message can be kept reliably even when
the receiver processes are not running.
 Users can access their objects through SOAP
with either browsers
Microsoft Windows Azure

 In 2008, Microsoft launched a Windows Azure


 The platform is divided into three major
component platforms.
 Azure manages all servers, storage, and network
resources of the data center.
Azure services

I. Live service
II. .NET service
III. SQL Azure
IV. SharePoint service
V. Dynamic CRM service.
Azure services
I. Live service =>Users can visit Microsoft Live applications and apply the data
involved across multiple machines concurrently.
II. .NET service=> application development on local hosts and execution on cloud
machines.
III. SQL Azure => users to visit and use the relational database associated with the SQL
server in the cloud.
IV. SharePoint service=>users to develop their special business applications in
upgraded web services.
V. Dynamic CRM service=> provides software developers a business platform in
managing CRM applications in financing, marketing, and sales and promotions.
Microsoft SharePoint
Google
Extended Cloud Computing Services
Hardware as a Service (HaaS).
Network as a Service (NaaS). - Virtual LANs
(Cloudflare.com)
Location as a Service (LaaS)- Google Maps, Lyft, Uber, Waze,
WhatsApp, Airbnb, GasBuddy, Foursquare, Dark Sky, Pokémon Go,
Curbside,
Security as a Service (“SaaS”).
Data as a Service (DaaS) and Communication as a
Service (CaaS) –Skype,Facebook messenger,FaceTime
Laas: customers with floor space, power, cooling and connectivity
Resource Provisioning and Platform Deployment
Provisioning of Compute Resources (VMs)
SLAs with end users- sufficient resources such as
CPU, memory, and bandwidth
Cloud provisioning involves creating, preparing, and activating
the underlying infrastructure of a cloud environment.

Underprovisioning of resources will lead to


broken SLAs and penalties.
 Overprovisioning of resources will lead to
resource underutilization, a decrease in revenue for
the provider.
Resource Provisioning and Platform Deployment
2. Resource Provisioning Methods

Three resource-provisioning methods


 Demand-driven-Provides static resources and has been used in
grid computing
 Event-Driven driven-Based on predicted workload by time.
 Popularity-driven-Based on Internet traffic monitored
CLOUD SECURITY AND TRUST MANAGEMENT

Cloud Security Defense Strategies

A healthy cloud ecosystem is desired to free


users from abuses, violence, cheating, hacking, viruses,
rumors, spam, and privacy and copyright violations.
CLOUD SECURITY AND TRUST MANAGEMENT

Cloud Security Defense Strategies


Basic Cloud Security
On-site security year round.
 Biometric readers, CCTV (close-circuit TV),
motion detection, and man traps.
Firewalls, intrusion detection systems (IDSes),
and third-party vulnerability assessment.
 SSL and data decryption, strict password
policies, and system trust certification.
Basic cloud security
cloud components that demand special security
protection:

• Protection of servers from malicious software


attacks:worms, viruses, and malware
• Protection of hypervisors or VMM:software-based
attacks and vulnerabilities
• Protection of VMs and VMM:service disruption and
DoS attacks.
• Protection of data and information:theft, corruption,
and natural disasters
• Providing authenticated and authorized access:critical
Security Challenges in
VMs
hypervisor malware, guest hopping and
hijacking, or VM rootkits.
Man-in-the-middle attack for VM migrations.
Passive attacks => Sensitive data or
passwords.
Active attacks => manipulate kernel data
structures which will cause major damage to
Rootkits operate as malware that executes as a hypervisor controlling one or many virtual
cloud servers.
machines (VMs)
Security Challenges in VMs

An IDS can be a NIDS or a HIDS.


Defense technologies include using the
RIO(Reference Identifier Object)dynamic optimization
infrastructure, or VMware’s vSafe and
vShield tools, security compliance for
hypervisors, and Intel vPro technology.
hardened OS environment or use isolated
execution.
Cloud Defense Methods
Defense with Virtualization

VM is decoupled from the physical hardware.


 VM can be saved, cloned, encrypted, moved, or
restored with ease.
 Distributed intrusion detection systems
(DIDSes) and Multiple IDS .
Security policy conflicts must be resolved
periodically.
Privacy and Copyright Protection
With shared files and data sets, privacy, security,
and copyright data could be compromised in a
cloud computing environment.
Google’s : in-house software(IAM) .
 Amazon EC2: HMAC and X.509 certificates in
securing resources.
Hash-Based Message Authentication Code
Privacy and Copyright Protection
Dynamic web services with full support from
secure web technologies
Established trust between users and providers
through SLAs and reputation systems
Effective user identity management (IAM) and data-
access management
1.Privacy and Copyright Protection
Single sign-on and single sign-off
Auditing and copyright compliance
Shifting of control of data operations from the client
environment to cloud providers
Protection of sensitive and regulated information in
a shared environment
CLOUD SECURITY AND TRUST MANAGEMENT

Distributed Intrusion/Anomaly Detection

A DDoS defense
DDoS attacks come with widespread worms.
The flooding traffic is large enough to crash the victim server
by buffer overflow, disk exhaustion, or connection
saturation.
Distributed Intrusion/Anomaly Detection

stributed Defense against DDoS Flooding Attacks

 Hidden attack from many zombies toward a victim server at the


bottom router R0.
 The flooding traffic flows: a tree pattern.

 Solution : Anomaly pattern detects a DDoS attack


before the victim is overwhelmed
CLOUD SECURITY AND TRUST MANAGEMENT

Data and Software Protection Techniques

. Data Integrity and Privacy Protection


2.Data Coloring and Cloud Watermarking
3.Data Lock-in Problem and Proactive
Solutions
Data Integrity and Privacy Protection
Application software for MapReduce, BigTable, EC2, 3S, Hadoop, AWS, GAE, and WebSphere2, users need some
security and privacy protection software for using the cloud. Such software should offer the following features:

• Special APIs for authenticating users and sending e-mail


using commercial accounts
• Fine-grained access control to protect data integrity and
deter intruders or hackers
• Shared data sets protected from malicious alteration,
deletion, or copyright violation.
• Ability to secure the ISP or cloud service provider from
invading users’ privacy
Data and Software Protection Techniques

1.Data Integrity and Privacy


Protection

• Personal firewalls at user ends to keep shared data sets from


Java, JavaScript, and ActiveX applets.
• A privacy policy consistent with the cloud service provider’s
policy, to protect against identity theft, spyware, and web bugs
• VPN channels between resource sites to secure transmission of
critical data objects.
3. Data Lock-in Problem and Proactive Solutions

• Both the computation and the data to the server clusters.


• Once the data is moved into the cloud, users cannot easily extract
their data and programs from cloud servers to run on another
platform: Data Lock-in
 lack of interoperability: proprietary API limits users
to extract data once submitted;
 lack of application compatibility: clouds expect
users to write new applications from scratch, when they
switch cloud platforms
Solution :
solution to data lock-in is the use of standardized cloud APIs.
OVF(Open Virtualization Format): platform-independent, efficient,
extensible, and open format for VMs.
2.Data Coloring and Cloud Watermarking
CLOUD SECURITY AND TRUST MANAGEMENT

4.Reputation-Guided Protection of Data Centers


1.Reputation System Design Options
4.Reputation-Guided Protection of Data Centers
2 Reputation Systems for Clouds

Data consistency is checked across multiple databases.


Copyright protection secures wide-area content distributions.
CLOUD SECURITY AND TRUST MANAGEMENT

4.Reputation-Guided Protection of Data Centers


3. Trust Overlay Networks

Reputation: collective evaluation by users and resource


owners.
Trust overlay network to model trust relationships among
data-center modules.
 Distributed hash table (DHT) to achieve fast aggregation of
global reputations from a large number of local reputation
scores

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy