Unit1 Introduction to Cloud Computing-1
Unit1 Introduction to Cloud Computing-1
to Cloud
Computing
P R E PA R E D BY: C H A N D N I S H A H
LECTURER,
G OV E R N M E N T P O LY T E C H N I C F O R G I R L S , A H M E DA B A D
Course Outcome 1
Understand the concept of Cloud architecture and its model.
Contents
Defining Cloud Computing
Roots of Cloud Computing
The Cloud Service Models
Layers and Types of Clouds
Desired Features of a Cloud
Pros and Cons of Cloud computing
Applications of cloud computing
Security Aspects of cloud computing
Topic 1: Defining Cloud
Computing[2]
What is Cloud Computing?
Definition:
Cloud computing refers to the use of hosted
services, such as data storage, servers, databases,
networking, and software over the internet
The data is stored on physical servers, which are
maintained by a cloud service provider.
Computer system resources, especially data
storage and computing power, are available on-
demand, without direct management by the user
in cloud computing.
Instead of storing files on a storage device or hard
drive, a user can save them on cloud, making it
possible to access the files from anywhere, as long
as they have access to the web
What is Cloud Computing?
The services hosted on cloud can be broadly divided into
infrastructure-as-a-service (IaaS),
platform-as-a-service (PaaS), and
software-as-a-service (SaaS).
Hardware virtualization allows running multiple operating systems and software stacks on a single physical
platform.
As depicted in above figure, a software layer, the virtual machine monitor (VMM), also called a hypervisor,
mediates access to the physical hardware presenting to each guest operating system a virtual machine (VM),
which is a set of virtual platform interfaces
Autonomic Monitoring
A process to improve systems by decreasing human involvement .
In short creating systems that should manage themselves with high level guidance from
humans.
E.g IBM’s Autonomic computing
It should have following four properties
Self Configuration
Self Optimization
Self healing
Self protection
Data Centre Automation
The large data centers of cloud computing providers must be managed in an efficient way.
In this sense, the concepts of autonomic computing inspire software technologies for data
center automation, which may perform tasks such as:
management of service levels of running applications;
management of data center capacity; proactive disaster recovery; and
automation of VM provisioning
Topic 3: Cloud Service Models/Layers
of Cloud/
Types of Cloud[1]
Layers and Types of Cloud
Cloud computing services are divided into three classes, according to the abstraction level of
the capability provided and the service model of providers, namely:
1. Infrastructure as a Service,
2. Platform as a Service, and
3. Software as a Service
The figure in next slide shows layered organization of the cloud stack from physical
infrastructure to applications.
These abstraction levels can also be viewed as a layered architecture where services of a higher
layer can be composed from services of the underlying layer.
Layers and Types of Cloud
Cost savings
Whatever cloud service model you choose, you only pay for the resources you
actually use.
This helps you avoid overbilling and overprovisioning your data center and gives
your IT teams back valuable time to focus on more strategic work.
Pros(Advantages)[6]
Better collaboration
Cloud storage enables you to make data available anywhere you are, anytime you need
it.
Instead of being tied to a location or specific device, people can access data from
anywhere in the world from any device—as long as they have an internet connection.
Advanced security
Despite popular perceptions, cloud computing can actually strengthen your security
posture because of the depth and breadth of security features, automatic maintenance,
and centralized management.
Reputable cloud providers also hire top security experts and employ the most advanced
solutions, providing more robust protection.
Data loss prevention
Cloud providers offer backup and disaster recovery features.
Storing data in the cloud rather than locally can help prevent data loss in the event of an
emergency, such as hardware malfunction, malicious threats, or even simple user error
Cons(Challenges and Risks)[1]
Security, Privacy, and Trust
Current cloud offerings are essentially public ... exposing the system to more attacks.
Trust plays the major issue as even critical data is stored on third party infrastructure
Legal and regulatory issues also need attention. Different countries have different laws regarding their citizens
data. For e.g. patient’s health records need to be stored within local borders
Data Lock-In and Standardization
As there is no standardization for storing data, user data is not portable. i.e. one cannot easily shift from one
service provider to other
To deal with this issue, The Cloud Computing Interoperability Forum (CCIF) was formed by organizations such as
Intel, Sun, and Cisco in order to “enable a global cloud computing ecosystem whereby organizations are able to
seamlessly work together for the purposes for wider industry adoption of cloud computing technology
The development of the Unified Cloud Interface (UCI) by CCIF aims at creating a standard programmatic point of
access to an entire cloud infrastructure.
In the hardware virtualization sphere, the Open Virtual Format (OVF) aims at facilitating packing and distribution
of software to be run on VMs so that virtual appliances can be made portable—that is, seamlessly run on
hypervisor of different vendors
Cons(Challenges and Risks)[1]
Availability, Fault-Tolerance, and Disaster Recovery
Customers have certain expectations before moving to the cloud like availability, security and overall
performance.
SLAs(Service Level Agreements), which include Quality of Service(QoS) requirements, must be ideally
set up between customers and cloud computing providers to act as warranty.
Additionally, metrics must be agreed upon by all parties, and penalties for violating the expectations
must also be approved
Resource Management and Energy-Efficiency
One important challenge faced by providers of cloud computing services is the efficient management of
virtualized resource pools.
Physical resources such as CPU cores, disk space, and network bandwidth must be sliced and shared
among virtual machines running potentially heterogeneous workloads
Also operations like backup , load balancing and recovery are needed
Also, such cloud systems need cooling centers due to large amount of heat generated. Such cooling
systems effects on environment also needs to be monitored.
Topic 7: Applications of Cloud
Computing [7]
Applications of Cloud
Computing[7]
Online Data Storage
Backup and Recovery
Bigdata Analysis
Testing and development
Anti-Virus Applications
E-commerce Application
Cloud computing in education
E-Governance Application
Security Aspects of Cloud
Computing [8]
Firewall
security aspects of cloud computing are not just limited to encryption. A firewall is a very secure way of
keeping the data safe by creating an additional layer of protection.
It makes sure that all it blocks all the malicious attacks. Such malicious attacks are very frequent through
web traffic.
Cloud firewalls are hosted over the cloud, unlike traditional firewalls that were not efficient as they
stayed on-premises.
Security Aspects of Cloud
Computing [8]
Encryption
It is a technology that makes data being understood only by the concerned authority.
Its only motive is to make the format of the data that cannot be easily interpreted. Such technology or
process is termed encryption.
Cloud technology relies a lot on encryption to keep the data secured. Some data if unencrypted can be
a cause of great hazards to a company.
Security Aspects of Cloud
Computing [8]
Security Policies
Aspects of data security in cloud computing knows no bounds.
Security policies are applied throughout the complete cloud infrastructure. For better cloud security,
there must be a proper configuration of security settings through strict security policies.
When a company does not take its security policies seriously then they end up going through data
breaches.
Security Aspects of Cloud
Computing [8]
Backup Plans-
Data security also asks for backup plans so that not a single bit of data is inside the realm of risk.
To avoid any kind of data loss, data should be backed either on-premises or on any other cloud.
There should be always a plan B to cover any losses that may occur during data loss.
To be more sure about data security, cloud technology has come up with multi-cloud and hybrid cloud
infrastructure
REFERENCES
1. Buyya, Rajkumar, James Broberg, and Andrzej M. Goscinski, eds. Cloud
computing: Principles and paradigms. John Wiley & Sons, 2010.
2. https://www.spiceworks.com/tech/cloud/articles/what-is-cloud-computing/
3. https://www.techtarget.com/whatis/definition/Web-20-or-Web-2
4. https://www.geeksforgeeks.org/what-is-a-mashup-in-web-technology/
5. https://www.redswitches.com/blog/cloud-computing-vs-utility-computing/#:~:text=Utilit
y%20computing%20is%20a%20service,paying%20for%20only%20their%20consum
ption
.
6. https://cloud.google.com/learn/advantages-of-cloud-computing
7. https://www.geeksforgeeks.org/real-world-applications-of-cloud-computing/
8. https://www.cloudoye.com/kb/cloud-security/what-are-the-security-aspects-provided-
with-cloud
Disclaimer
This material is prepared from various research papers , books and internet sources for teaching
learning purpose only. There is no claim for the content to be original