0% found this document useful (0 votes)
12 views

Unit1 Introduction to Cloud Computing-1

This document provides an introduction to cloud computing, covering its definition, service models (IaaS, PaaS, SaaS), deployment models (public, private, hybrid), and desired features such as self-service and elasticity. It discusses the advantages and challenges of cloud computing, including security, privacy, and data management issues. Additionally, it outlines various applications of cloud computing and emphasizes the importance of security measures like firewalls and encryption.

Uploaded by

avaniparekh2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Unit1 Introduction to Cloud Computing-1

This document provides an introduction to cloud computing, covering its definition, service models (IaaS, PaaS, SaaS), deployment models (public, private, hybrid), and desired features such as self-service and elasticity. It discusses the advantages and challenges of cloud computing, including security, privacy, and data management issues. Additionally, it outlines various applications of cloud computing and emphasizes the importance of security measures like firewalls and encryption.

Uploaded by

avaniparekh2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 45

Unit 1:Introduction

to Cloud
Computing
P R E PA R E D BY: C H A N D N I S H A H
LECTURER,
G OV E R N M E N T P O LY T E C H N I C F O R G I R L S , A H M E DA B A D
Course Outcome 1
Understand the concept of Cloud architecture and its model.
Contents
Defining Cloud Computing
Roots of Cloud Computing
The Cloud Service Models
Layers and Types of Clouds
Desired Features of a Cloud
Pros and Cons of Cloud computing
Applications of cloud computing
Security Aspects of cloud computing
Topic 1: Defining Cloud
Computing[2]
What is Cloud Computing?
Definition:
Cloud computing refers to the use of hosted
services, such as data storage, servers, databases,
networking, and software over the internet
The data is stored on physical servers, which are
maintained by a cloud service provider.
Computer system resources, especially data
storage and computing power, are available on-
demand, without direct management by the user
in cloud computing.
Instead of storing files on a storage device or hard
drive, a user can save them on cloud, making it
possible to access the files from anywhere, as long
as they have access to the web
What is Cloud Computing?
The services hosted on cloud can be broadly divided into
infrastructure-as-a-service (IaaS),
platform-as-a-service (PaaS), and
software-as-a-service (SaaS).

Based on the deployment model, cloud can also be classified as


public,
private, and
hybrid cloud
Topic 2: Roots of Cloud
Computing[1]
Roots of Cloud Computing
The roots of cloud computing has been evolved
by observing advancement in various
technologies as shown in diagram.
The convergence in technology of hardware,
internet, distributed computing and system
management has caused the development of
cloud computing.
From Mainframes to Cloud
Earlier mainframe computers that occupied entire rooms
were used to provide storage and computing power to
consumers.
These were difficult to manage and required specialized
manpower.
However the mainframe era collapsed once fast and
inexpensive microprocessors were introduced.
Also, fast fiber-optics technology has made it possible to
share computing power over large distances.
Consumers can attain reduction on IT-related costs by
choosing to obtain cheaper services from external
providers as opposed to heavily investing on IT
infrastructure and personnel hiring.
The “on-demand” component of this model allows
consumers to adapt their IT usage to rapidly increasing or
unpredictable computing needs.
SOA, Web Services, Web 2.0,
and Mashups
SOA
The SOA(Service Oriented Architecture), the software resources are packed as services that provide
standard business functionality and are independent of other services.
For e.g. GPS of your mobile. Any apps requiring location will use GPS service of your mobile. This is SOA
in mobile applications.
Web Services
Web services can glue together applications running on different messaging product platforms, enabling
information from one application to be made available to others, and enabling internal applications to
be made available over the Internet.
E.g. Email or cloud storage service provided by google
SOA, Web Services, Web 2.0,
and Mashups
Web Services 2.0 [3]
Web 1.0 was all about content browsing and finding information
However, Web 2.0 reflects the new age of the internet, which puts greater emphasis on social
networking, cloud computing, higher participation levels and sharing information between internet
users.
Mashup Services[4]
A Mashup (also known as web application hybrid), is a technique that websites use to provide
resources, functionalities, and services from multiple sources
They mostly use public APIs that are generally free to use and thus, create a new service from existing
ones.
E.g. Amazon e-commerce is a service that is used by many websites to view products and do cost
comparison
Many websites use google maps to know location
Grid Computing
Grid computing is a part of distributed computer where a virtual supercomputer is created by
combining power of various idle machines connected via ethernet or internet.
Such virtual supercomputer is capable of doing big tasks which is not possible for individual
machines. e.g. weather forecasting, SETI(Search for extra terrestrial intelligence) project.
Globus toolkit is a middleware that implements standard grid services
However there are several problems in grid computing due to diverse software configurations,
including disparate operating systems, libraries, compilers, runtime environments, and so forth
Consequently, a portability barrier has often been present on most grid infrastructures,
inhibiting users of adopting grids as utility computing environments
Utility Computing[5]
Utility computing is a service provisioning model in cloud computing that transforms how
businesses access and consume computing resources.
 It revolves around treating computing resources as a utility, similar to electricity or water.
Businesses can access and use resources on-demand, paying for only their consumption
Hardware Virtualization
Hardware Virtualization means creation of a virtual machine that act like real computer.
For example a computer running windows 7 might host virtual machine look like ubuntu
When the virtual machine software or virtual machine manager (VMM) or hypervisor software is
directly installed on the hardware system is known as hardware virtualization.
Examples of hypervisor software are VMWare ESXi, Xen, KVM etc
The main job of hypervisor is to control and monitoring the processor, memory
and other hardware resources.
After virtualization of hardware system we can install different operating system on
it and run different applications on those OS.
Advantage: Hardware virtualization is mainly done for the server platforms, because
controlling virtual machines is much easier than controlling a physical server
Hardware Virtualization

Hardware virtualization allows running multiple operating systems and software stacks on a single physical
platform.
As depicted in above figure, a software layer, the virtual machine monitor (VMM), also called a hypervisor,
mediates access to the physical hardware presenting to each guest operating system a virtual machine (VM),
which is a set of virtual platform interfaces
Autonomic Monitoring
A process to improve systems by decreasing human involvement .
In short creating systems that should manage themselves with high level guidance from
humans.
E.g IBM’s Autonomic computing
It should have following four properties
Self Configuration
Self Optimization
Self healing
Self protection
Data Centre Automation
The large data centers of cloud computing providers must be managed in an efficient way.
In this sense, the concepts of autonomic computing inspire software technologies for data
center automation, which may perform tasks such as:
management of service levels of running applications;
management of data center capacity; proactive disaster recovery; and
automation of VM provisioning
Topic 3: Cloud Service Models/Layers
of Cloud/
Types of Cloud[1]
Layers and Types of Cloud
Cloud computing services are divided into three classes, according to the abstraction level of
the capability provided and the service model of providers, namely:
1. Infrastructure as a Service,
2. Platform as a Service, and
3. Software as a Service
The figure in next slide shows layered organization of the cloud stack from physical
infrastructure to applications.
These abstraction levels can also be viewed as a layered architecture where services of a higher
layer can be composed from services of the underlying layer.
Layers and Types of Cloud

The Cloud computing Stack


Infrastructure as a Service
Offering virtualized resources (computation, storage, and communication) on demand is known
as Infrastructure as a Service (IaaS)
Infrastructure services are considered to be the bottom layer of cloud computing systems
E.g. Amazon Web Services
Users are given privileges to perform numerous activities to the server, such as:
• starting and stopping it,
• customizing it by installing software packages,
• attaching virtual disks to it,
• configuring access permissions and
• firewalls rules
Platform as a Service
A cloud platform offers an environment on which developers create and deploy applications
and do not necessarily need to know how many processors or how much memory that
applications will be using
In addition, multiple programming models and specialized services (e.g., data access,
authentication, and payments) are offered as building blocks to new applications
E.g. Google App Engine allows us to host web applications
Software as a Service
Software service provided can be used by end users through web portals.
So consumers are shifting from locally installed computer programs to on-line software
services
Traditional desktop applications such as word processing and spreadsheet can now be
accessed as a service in the Web. This model of delivering applications, known as Software as a
Service (SaaS) alleviates the burden of software maintenance for customers
E.g. Salesforce.com
Topic 4: Deployment Models [1]
Deployment Models
On basis of physical
location and distribution, a
cloud can be classified as
Public
Private
Community
Hybrid

Types of Clouds based on deployment models


Deployment Models
Public cloud as a “cloud made available in a pay-as-you-go manner to the general public”
Private cloud as “internal data center of a business or other organization, not made available to the
general public.”
 In most cases, establishing a private cloud means restructuring an existing infrastructure by adding
virtualization and cloud-like interfaces.
 This allows users to interact with the local data center while experiencing the same advantages of public
clouds, most notably self-service interface, privileged access to virtual servers, and per-usage metering and
billing.
A community cloud is “shared by several organizations and supports a specific community that has
shared concerns” (e.g., mission, security requirements, policy, and compliance considerations)
A hybrid cloud takes shape when a private cloud is supplemented with computing capacity from
public clouds.
The approach of temporarily renting capacity to handle spikes in load is known as “cloud-bursting”
Topic 5: Desired Features of a
Cloud[1]
Desired Features of cloud
Self-Service
Per-Usage Metering and Billing
Elasticity
Customization
Self Service
Consumers of cloud computing services expect on-demand, nearly instant access to resources.
To support this expectation, clouds must allow self-service access so that customers can
request, customize, pay, and use services without intervention of human operators
Per-Usage Metering and Billing
Billing should be on hour basis according to the need
Metering should be done accordingly for different types of service (e.g., storage, processing,
and bandwidth) and usage promptly reported, thus providing greater transparency
Elasticity
Cloud computing gives the illusion of infinite computing resources available on demand
Therefore users expect clouds to rapidly provide resources in any quantity at any time.
In particular, it is expected that the additional resources can be
(a) provisioned, possibly automatically, when an application load increases and
(b) released when load decreases (scale up and down)
Customization
Resources rented from the cloud must be highly customizable.
In the case of infrastructure services, customization means allowing users to deploy specialized
virtual appliances and to be given privileged (root) access to the virtual servers.
Other service classes (PaaS and SaaS) offer less flexibility and are not suitable for general-
purpose computing , but still are expected to provide a certain level of customization
Topic 6: Pros and Cons of Cloud
Computing
Pros(Advantages)[6]
Faster time to market
Hardware limitation is removed
You can easily test new ideas and speed up the development process

Scalability and flexibility


Provides flexibility as it is easy to scale up systems without investing in physical
infrastructure
Companies don’t need to pay for or build the infrastructure needed to support their
highest load levels.
Likewise, they can quickly scale down if resources aren’t being used.

Cost savings
Whatever cloud service model you choose, you only pay for the resources you
actually use.
This helps you avoid overbilling and overprovisioning your data center and gives
your IT teams back valuable time to focus on more strategic work.
Pros(Advantages)[6]
Better collaboration
 Cloud storage enables you to make data available anywhere you are, anytime you need
it.
 Instead of being tied to a location or specific device, people can access data from
anywhere in the world from any device—as long as they have an internet connection.
Advanced security
 Despite popular perceptions, cloud computing can actually strengthen your security
posture because of the depth and breadth of security features, automatic maintenance,
and centralized management.
 Reputable cloud providers also hire top security experts and employ the most advanced
solutions, providing more robust protection.
Data loss prevention
 Cloud providers offer backup and disaster recovery features.
 Storing data in the cloud rather than locally can help prevent data loss in the event of an
emergency, such as hardware malfunction, malicious threats, or even simple user error
Cons(Challenges and Risks)[1]
Security, Privacy, and Trust
 Current cloud offerings are essentially public ... exposing the system to more attacks.
 Trust plays the major issue as even critical data is stored on third party infrastructure
 Legal and regulatory issues also need attention. Different countries have different laws regarding their citizens
data. For e.g. patient’s health records need to be stored within local borders
Data Lock-In and Standardization
 As there is no standardization for storing data, user data is not portable. i.e. one cannot easily shift from one
service provider to other
 To deal with this issue, The Cloud Computing Interoperability Forum (CCIF) was formed by organizations such as
Intel, Sun, and Cisco in order to “enable a global cloud computing ecosystem whereby organizations are able to
seamlessly work together for the purposes for wider industry adoption of cloud computing technology
 The development of the Unified Cloud Interface (UCI) by CCIF aims at creating a standard programmatic point of
access to an entire cloud infrastructure.
 In the hardware virtualization sphere, the Open Virtual Format (OVF) aims at facilitating packing and distribution
of software to be run on VMs so that virtual appliances can be made portable—that is, seamlessly run on
hypervisor of different vendors
Cons(Challenges and Risks)[1]
Availability, Fault-Tolerance, and Disaster Recovery
Customers have certain expectations before moving to the cloud like availability, security and overall
performance.
SLAs(Service Level Agreements), which include Quality of Service(QoS) requirements, must be ideally
set up between customers and cloud computing providers to act as warranty.
Additionally, metrics must be agreed upon by all parties, and penalties for violating the expectations
must also be approved
Resource Management and Energy-Efficiency
One important challenge faced by providers of cloud computing services is the efficient management of
virtualized resource pools.
Physical resources such as CPU cores, disk space, and network bandwidth must be sliced and shared
among virtual machines running potentially heterogeneous workloads
Also operations like backup , load balancing and recovery are needed
Also, such cloud systems need cooling centers due to large amount of heat generated. Such cooling
systems effects on environment also needs to be monitored.
Topic 7: Applications of Cloud
Computing [7]
Applications of Cloud
Computing[7]
Online Data Storage
Backup and Recovery
Bigdata Analysis
Testing and development
Anti-Virus Applications
E-commerce Application
Cloud computing in education
E-Governance Application
Security Aspects of Cloud
Computing [8]
Firewall
security aspects of cloud computing are not just limited to encryption. A firewall is a very secure way of
keeping the data safe by creating an additional layer of protection.
It makes sure that all it blocks all the malicious attacks. Such malicious attacks are very frequent through
web traffic.
Cloud firewalls are hosted over the cloud, unlike traditional firewalls that were not efficient as they
stayed on-premises.
Security Aspects of Cloud
Computing [8]
Encryption
It is a technology that makes data being understood only by the concerned authority.
Its only motive is to make the format of the data that cannot be easily interpreted. Such technology or
process is termed encryption.
Cloud technology relies a lot on encryption to keep the data secured. Some data if unencrypted can be
a cause of great hazards to a company.
Security Aspects of Cloud
Computing [8]
Security Policies
 Aspects of data security in cloud computing knows no bounds.
Security policies are applied throughout the complete cloud infrastructure. For better cloud security,
there must be a proper configuration of security settings through strict security policies.
When a company does not take its security policies seriously then they end up going through data
breaches.
Security Aspects of Cloud
Computing [8]
Backup Plans-
Data security also asks for backup plans so that not a single bit of data is inside the realm of risk.
To avoid any kind of data loss, data should be backed either on-premises or on any other cloud.
There should be always a plan B to cover any losses that may occur during data loss.
To be more sure about data security, cloud technology has come up with multi-cloud and hybrid cloud
infrastructure
REFERENCES
1. Buyya, Rajkumar, James Broberg, and Andrzej M. Goscinski, eds. Cloud
computing: Principles and paradigms. John Wiley & Sons, 2010.
2. https://www.spiceworks.com/tech/cloud/articles/what-is-cloud-computing/
3. https://www.techtarget.com/whatis/definition/Web-20-or-Web-2
4. https://www.geeksforgeeks.org/what-is-a-mashup-in-web-technology/
5. https://www.redswitches.com/blog/cloud-computing-vs-utility-computing/#:~:text=Utilit
y%20computing%20is%20a%20service,paying%20for%20only%20their%20consum
ption
.
6. https://cloud.google.com/learn/advantages-of-cloud-computing
7. https://www.geeksforgeeks.org/real-world-applications-of-cloud-computing/
8. https://www.cloudoye.com/kb/cloud-security/what-are-the-security-aspects-provided-
with-cloud
Disclaimer
This material is prepared from various research papers , books and internet sources for teaching
learning purpose only. There is no claim for the content to be original

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy