KEMBAR78
Cloud Computing Unit 2 | PDF
0% found this document useful (0 votes)
203 views25 pages

Cloud Computing Unit 2

Uploaded by

bimwebdeveloper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
203 views25 pages

Cloud Computing Unit 2

Uploaded by

bimwebdeveloper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 25
Cloud Computing | Uni Ee EE 2 Cloud Computing Architecture 24 Cloud Reference Model > The cloud computing reference model is an abstract model that divides a cloud computing environment into abstraction layers and cross-layer fimctions to characterize and standatdize its functions. This reference mnodel divides cloud computing activities and functions into three eross-layer fimections and five logical layers. » Each of these layers describes different things that might be present in a cloud computing environment, such as computing systems, networking, storage equipment, virtualization software, security measures, control and management software, and so forth. It also explains the connections between these organizations. The five layers are the Physical layer, virtual layer, control layer, service orchestration layer, and service layer. ‘The National Institute of Standards and Technology (NIST) is an organization designed by the US government (USG) agency for the adoption and development of cloud computing standards » The cloud computing reference model is a general high-level architecture and is meant for @ cloud computing reference architecture provided, which outlines the primary performervactor and the tnderstanding of the cloud computing needs, uses, features, and standards, An overview of the NIST primary players, as indicated in the figure below. Each performer is an entity that might be a person or a cloud computing activity and role The NIST cloud computing reference architecture identifies five organizations that rake part in a transaction or process and complete duties in cloud computing service Intermediation Service Aggregation Service Arbitrage jaresh Prasad Das Page 1 Figure 2-1: Cloud Reference Model ‘Compiled by: Cloud Computing| Unit-2 ve ‘Cloud Consumer ‘The end user that the cloud computing service is designed to support is the cloud consumer. An individual or corporation with a working relationship with a cloud provider and utilizing its services is referred to as a cloud consumer, A cloud customer peruses a cloud provider's service catalog, makes the proper service request, enters into a service agreement with the cloud provider, and then ufilizes the service. The cloud customer may be charged for the service provided, in which case payment arrangements must be made. They need to have a cloud Service Level Agreement (SLA). Cloud Provider Any individual, group, or other entity in charge of making a service accessible to cloud users is a cloud provider. A cloud provider creates the requested software, platforms, and infrastructure services, manages the technical infiastricture needed to supply the services, provisions the services at agreed upon service levels, and safeguards the services’ security and privacy. ‘Through service interfaces and virtual network interfaces that aid in resource abstraction, the cloud provider implements the cloud software to make computing resources accessible to cloud consumers that use the infiastructure as a service Cloud Carrier A cloud catrier serves as an intermediary between cloud providers and customers, facilitating connectivity and transport of cloud services, Customers can access the clond throtgh the network, telecommmnication, and other access equipment provided by cloud camiers. Customers of cloud services, for instance, can get them through network access devices, including laptops, mobile phoues, PCs, and mobile Intemet devices (MIDs), among others. Network and telecommunication cartiers typically handle the distribution of cloud services, while a transport agent is a company that arranges for the phy'sical delivery of storage devices like high- capacity hard drives. Remember that a cloud provider will establish service level agreements (SLAs) with a cloud carrier to provide services at a level consistent with the SLAs offered to cloud consumers, The cloud provider may also demand that the cloud carrier provide dedicated and encrypted connections between cloud consumers and cloud providers, Cloud Auditor Am unbiased evaluation of cloud services, information system operations, performance, and the security of a cloud computing implementation can be done by a cloud auditor. A cloud auditor can assess a cloud provider's services in terms of performance, service level agreement compliance, privacy implications, and security controls ‘The management, operational, and technical precautions or countermeasures used inside an organizational information system to ensure the privacy. availability, and integrity of the system and its data are known as security controls. To doa security aut, a cloud auditor can evaluate the information system's security controls to see how well they are being implemented, fimctioning as intended, and achieving the required results in relation to the system's security needs, Verifying compliance with law and security policy should be part of the security audit Cloud Broker An organization called a "Cloud Broker" controls how cloud services are used, performed, and delivered and ‘negotiates contracts between cloud providers and cloud users. The integration of cloud services could become too difficult for cloud consumers to handle as cloud computing develops. Instead of contacting a cloud provider directly in certain circumstances, a cloud consumer may request cloud services through a cloud broker, A single point of access for controlling numerous cloud services is offered by cloud brokers, The capacity to offer a single consistent interface to numerous different providers, whether the interface is for commercial or technical objectives, separates a cloud broker from a cloud service provider. Cloud Brokers provide services in three categories. ‘Compiled by:-Naresh Prasad Das Page 2 Cloud Computing| Unit-2 2.2 Cloud Computing Architecture Cloud Computing architecture comprises of many clond components, which are loosely coupled. We can broadly divide the cloud architecture into two parts: © Front End + Back End Each of the ends is connected through a network, usually Intemet. The following diagram shows the graphical view of cloud computing architecture: Mm Te ontene Back End + FroutEnd > The front end refers to the client part of cloud computing system. It consists of interfaces and applications that are required to access the cloud computing platforms, Example - Web Browser. (© It provides applications and the interfaces that are required for the cloud-based service © It consists of client’s side applications, which are web browsers such as Google Chrome and Intemet Explorer. (© Cloud infrastructure is the ouly component of the front-end. © Cloud infrastructure consists of hardware and software components such as data storage, server, virtualization software, etc. © It also provides a Graphical User Interface to the end-users to perform respective tasks. © Back End The back End refers to the cloud itself. It consists of all the resources required to provide cloud computing services. It comprises of huge data storage, virtual machines, security mechanism, services, deployment models, servers, etc. > Itis responsible for monitoring all the programs that rum the application on the front-end ‘Compiled by:-Naresh Prasad Das Page 3 Cloud Computing| Unit-2 It has a large number of data storage systems and servers. The back-end is an important and inige part of the whole cloud computing architecture, as shown below: The components of the back-end cloud architecture are mentioned below Application (© It can either be a software or a platform © Depending upon the client requirement, the application provides the result to the enduser (vith resources) in the back end. Service (© Service is an essential component in cloud architecture (© Its responsibility is to provide utility in the architecture © In a Cloud, few widely used services among the end-users are storage application development environments and web services © Service in backend refers tothe major three types of cloud based services like SaaS, PaaS and aa, Also manages which type of service the user accesses, Runtime Cloud ‘© Runtime cloud in backend provides the execution and Runtime platfomvenvironment to the ‘Virtual machine. Storage (© It stores and maintains data like files, videos, documents, ete, over the intemet © Some of the popular examples of storage services are below: ¥ Amazon S3 Y Oracle Cloud-Storage Y Microsoft Azure Storage © Its capacity varies depending upon the service providers available in the market, Infrastructure (© Cloud infiastucture includes hardware and software components such as servers, storage, network devices, virtualization software, and other storage resources that are needed to support the eloud computing model Management © _Its task is to allot specific resources to a specific task: it simultaneously performs various functions of the cloud environment. ‘© It helps in the management of components like application, task, service, security, data storage, and cloud infrastructure (© In simple terms, it establishes coordination among the cloud resources Security © Security is an integral part of back-end cloud infrastructure © It provides secure cloud resources, systems, files, and infrastructure to end-users, © Also, it implements security management to the cloud server with virtual firewalls which results in preventing data loss 4 Benefits of Cloud Computing Architecture ‘The cloud computing architecture is designed in such a way that: > Itsolves latency issues and improves data processing requirements ‘Compiled by:-Naresh Prasad Das Page 4 Cloud Computing| Unit-2 It reduces IT operating costs and gives good accessibility to access data and digital tools It helps businesses to easily scale up and scale down their cloud resources Ithas a flexibility feature which gives businesses a competitive advantage Itresults in better disaster recovery and provides high security It automatically updates its services It encourages remote working and promotes team collaboration vryyyy + Cloud infrastructure Cloud infiastructure consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. Cloud Infrastructural Components Hypervisor © Hypervisor is a finmvare or low-level program that acts as a'Virtual Machine Manager. It allows to share the single physical instance of cloud resources between several tenants. It isa virtual machine monitor which provides Virtual Operating Platforms to every user It also manages guest operating systems in the cloud Itmuns a separate virtual machine on the back end which consists of software and hardware Its main objective is to divide and allocate resources e000 ‘Management Software © Its responsibility is to manage and monitor cloud operations with various stategies to increase the performance of the cloud ‘© Some of the operations performed by the management software are: ¥ compliance auditing ¥) management of overseeing disaster ¥ contingency plans Deployment Software © It consists of all the mandatory installations and configurations required to run a cloud service (© All deployment of cloud services is performed using a deployment software The three different models which can be deployed are the following SaaS - Software as a service hosts and manages applications of the end-user. Example: Gmail PaaS - Platform as a service helps developers to build, create, and manage applications. Example: Microsoft Azure IaaS - Infrastructure as a service provides services on a pay-as-you-go pricing model ‘Compiled by:-Naresh Prasad Das Page S Cloud Computing| Unit-2 ‘Networ © Itconnects the front-end and back-end. Also, allows every user to access cloud resources © Ithelps users to connect and customize the route and protocol © It isa virtual server which is hosted on the cloud computing platform © Itishighly flexible, secure, and cost-effective Cloud Storage © Here, every bit of data is stored and accessed by a user from anywhere over the internet (© Itis scalable at run-time and is automatically accessed © Data can be modified and retrieved fiom cloud storage over the web Infrastructural Constraints Fundamental constraints that cloud infiastructure should implement are shown in the following diagram: Transparency > Virtualization is the key to share resources in cloud environment. But it is not possible to satisfy the demand with single resource or server. Therefore, there must be transparency in resources, load balancing and application, so that we can scale them on demand. Scalability > Scaling up an application delivery solution is not that easy as scaling up an application because it involves configuration overhead or even re-architecting the network. So, application delivery solution is need to be scalable which will require the virtual infrastructure sch that resource can be provisioned and de-provisioned easily. Intelligent Monitoring To achieve transparency and scalability, application solution delivery will need to be capable of intelligent monitoring. Security ‘The mega data center in the cloud should be securely architected. Also the control node, an entry ‘point in mega data center, also needs to be secure. ‘Compiled by-Naresh Prasad Das Page 6 Cloud Computing| Unit-2 2.2.1 Tas | Infrastructure as a Service Infrastructure-as-a-Service provides access to fimdamental resources stich as physical machines, virtual machines, virtual storage, etc. Apart fiom these resources, the TaaS also offers © Virtual machine disk storage © Viral local area network (VLANs) © Load balancers © addresses © Software bundles > All of the above resources are made available to end user via server virtualization, Moreover, these resources are accessed by the customers as if they own them, Infrastructure as service or IaaS is the basic layer in cloud computing model. TaaS delivers customizable infrastructure on demand. TaaS examples can be categorized in two categories © IaaS Management layer © aa Physical infrastructure > Some service providers provide both above categories and some provides only management layer. % TaaS management layer also required integration with other IaaS sobttions that provide physical infrastructure > Some examples: © Amazon Web Services (AWS) © Microsoft Azure © Google Compute Engine (GCE) vy Enduser (he | eral Load Balancer Vidual machine is depoyed -appieaton) cai Oo tua Machine raat The vita machines wpeacetto sage aay =" Cos onet B laa Vendor > Benefits (© InaS allows the cloud provider to freely locate the infrastructure over the Internet in a cost- effective manner. Some of the key benefits of LaaS ave listed below: © Full conttol of the computing resources through administrative access to VMs. © Flexible and efficient renting of computer hardware © Portability, interoperability with legacy applications. ‘Compiled by:-Naresh Prasad Das Page 7 Cloud Computing| Unit-2 ‘Y~ Full control over computing resources through administrative access to VMs (© IaaS allows the customer to access computing resources through administrative access to virtual machines in the following manner: = Customer issues administrative command to cloud provider to nin the virtual machine or to save data on cloud server, * Customer issues administrative command to virtual machines they owned to start web server of to install new applications Flexible and efficient renting of computer hardware (© nas resomrces such as virtual machines, storage devices, bandwidth, IP addresses, monitoring services, firewalls, ete. are made available to the customers on rent, The payunent is based ‘upon the amount of time the customer retains a resource, Also with administrative access to virtual machines, the customer can run any software, even a custom operating system, © Portability, interoperability with legacy applications © It is possible to maintain legacy between applications and workloads between IaaS clouds. For example, network applications such as Web server or e-mail server that normally runs on ccustomer-owned server hardware can also run from VMs in TaaS cloud. Issues > TaaS shares issues with PaaS and SaaS, sch as Network dependence and browser based risks, It also hhas some specific issues, which are mentioned in the following diagram: Cloud Computing Iaas Issues ‘© Compatibility with legacy security vulnerabilities © Because IaaS offers the customer to rum legacy software in provider's infrastructure, it exposes customers to all of the security vulnerabilities of such legacy software. Virtual Machine sprawl © The VM can become out-of-date with respect to security updates because TnaS allows the customer to operate the virtual machines in running, suspended and off state. However, the provider can automatically update such VMs, but this mechanism is hard and complex. Robustness of VM-level isolation (© TaaS offers an isolated environment to individual customers through hypervisor. Hypervisor is a software layer that includes hardware support for virtualization to split a physical computer into multiple virtual machines, ‘Compiled by:-Naresh Prasad Das Page 8 Cloud Computing| Unit-2 Data erase practices © The customer uses virtual machines that in tum use the common disk resources provided by the cloud provider. When the customer releases the resource, the cloud provider must ensure ‘that next customer to rent the resource does not observe data residue from previous customer. + Characteristics Here are the characteristics of IaaS service model Virtual machines with pre-installed software. ‘Virmal machines with pre-installed operating systems such as Windows, Linx, and Solaris, On-demand availability of resources, Allows to store copies of particular data at different locations. ‘The computing resources can be easily scaled up aud down. ooo00 Top Taas Providers who are providing TaaS cloud computing platform TaaS Providers Communications sity Reliance Technologies Caer) Pens Eoin eet TaaS Vendor Taas Solution Details Amazon Web Elastic, Elastic Compute The cloud computing platform pioneer, Services ‘Cloud (EC2)MapReduce, Amazon offers auto scaling, cloud Route 53, Virtual Private monitoring, and load balancing features as Cloud, ete. paut of its portfolio. ‘Compiled by:-Naresh Prasad Das Page 9 Cloud Computing| Unit-2 2.2.2 PaaS vyvvyy Netmagic Netmagic IaaS Cloud —_-Netmagie runs from data centers in Mumbai, Solutions Chennai, and Bangalore, and a virtual data center in the United States, Plans are underway to extend services to West Asia. Rackspace Cloud servers, cloud files, The cloud computing platform vendor cloud sites, ete. focuses primarily on enterprise-level hosting services Reliance Reliance Internet Data —_-RIDC supports both traditional hosting and Communications Center cloud services, with data centers in Mumbai, Bangalore, Hyderabad, and Chennai. The cloud services offered by RIDC include IaaS and SaaS. Sify Technologies Sify InaS Sify’s cloud computing platform is powered by HP's converged infrastructure. The vendor offers all three types of cloud serviees: IaaS, PaaS, and SaaS Tata TnstaCompute InstaCompute is Tata Communications’ IaaS, ‘Communications offering. InstaCompute data centers are located in Hyderabad and Singapore, with operations in both countries | Platform as a service PaaS provides a computing platform with a programming language execution environment. PaaS provide a development and deployment platform for running applications in the cloud. PaaS constitute the middleware on top of which applications are built. Application management is the core functionality of the middleware PaaS provides min time environments for the applications. PaaS provides © Applications deployment © Configuring application components © Provisioning and configuring supporting technologies For users PaaS interfaces can be in the form of a Web-based interface or in the form of programming, ADIs and libraries. PaaS solutions generally include the infrastructure as well. Pure PaaS offered only the user-level middleware, ‘Compiled by:-Naresh Prasad Das Page 10 Cloud Computing| Unit-2 PaaS offers the runtime environment for applications. It also offers development & deployment tools, ‘required to develop applications. PaaS has a feature of point-and-click tools that enables non-developers to create web applications. > Google's App Engine, Force.com are examples of PaaS offering vendors. Developer may log on to these websites and use the built-in API to create web-based applications. > But the disadvantage of using PaaS is that the developer lock-in with 2 particular vendor. For example, an application written in Python against Google's API using Google's App Engine is likely to work only in that environment, Therefore, the vendor lock-in is the biggest problem in PaaS. > The following diagram shows how PaaS offers an API and development tools to the developers and how it helps the end user to access business applications. > Pass classification: © PaaS-I: Runtime environment with Web-hosted application development platform, Rapid application prototyping. For example Foree.com which is a combination of middleware and infrastructure product type (© PaaS-II: Runtime environment for scaling Web applications. The runtime could be enhanced by additional components that provide scaling capabilities. For example Google AppEngine ‘which is a combination of middleware and infrastructure product type. Appscale is middlware product type. (© PaaS-IIl: Middleware and programming model for developing distributed applications in the cloud, For example Microsoft Azure which is a combination of middleware and infrastructure product type. Manjrasoft Aneka is a middleware product type. > Some examples: (© Google App Engine © Force.com ‘Compiled by-Naresh Prasad Das Page 11 Cloud Computing| Unit-2 ES Y Lower administrative overhead Consumer need not to bother much about the administration because it's the responsibility of clond provider. ¥ Lower total cost of ownership Consumer need not purchase expensive hardware, servers, power and data storage. ¥ Scalable solutions Tris very easy to scale up or down automatically based on application resource demands. ¥ More current system software It is the responsibility of the cloud provider to maintain software versions and patch installations + Issues: Like SaaS, PaaS also place significant burdens on consumer's browsers to maintain reliable and secure connections to the provider systems. Therefore, PaaS shares many of the issues of SaaS. > However, there are some specific issues associated with PaaS as shown in the following diagrau: = ‘Compiled by:-Naresh Prasad Das Page 12 Cloud Computing| Unit-2 'Y~ Lack of portability between paas clouds Although standard languages are used yet the implementations of platforms services may vary. Forexample, file, queue, or hash table interfaces of one platform may differ from another, ‘making it difficult to transfer workloads from one platform to another. Y Event based processor scheduling ‘The PaaS applications are event oriented which poses resource constraints on applications, ie., they have to answer a request in a given interval of ime. Security engineering of paas applications Since the PaaS applications are dependent on network, PaaS applicatious must explicitly use cryptography and manage security exposures, Characteristics PaaS offers browser based development environment. It allows the developer to create database and edit the application code either via Application Programming Interface or point-and-click tools. PaaS provides built-in security, scalability, and web service interfaces PaaS provides built-in tools for defining workflow and approval processes and defining business rules, It is easy to integrate with other applications on the same platform. ‘PaaS also provides web services interfaces that allow us to connect the applications outside the platform. ve vy PaaS Providers Ed otis SE rd Google App Cen Providers Services Google App Engine App Mentity, URL Feteh, Cloud storage client library, Logserviee (GAE) ‘Compiled by:-Naresh Prasad Das Page 13, Cloud Computing| Unit-2 Salesforce.com Faster implementation, Rapid scalability, CRM Services, Sales cloud, Mobile connectivity, Chatter. Windows Azure Compute, security, IoT, Data Storage. AppFog, Justcloud.com, SkyDrive, GoogleDoes Openshift RedHat, Microsoft Azure 4 Pas Types > Based on the functions, the PaaS can be classified into four types as shown in the following diagram: Y Stand-alone development environments The Stand-alone PaaS works as an independent entity for a specific function. It does not include licensing, teclical dependencies on specific SaaS applications, Y Application detivery-onty environments The Application Delivery PaaS includes on-cemand scaling ancl application security. Y Open platform as a service Open PaaS offers open source software that helps a PaaS provider to run applications. Y Add-on development facilities ‘The Add-on PaaS allows to customize the existing SaaS platform. 2.2.3. SaaS | Software as a service Software as a service (SaaS) allows users to connect to and use cloud-based apps over the Internet, ‘SaaS is the service with which end users interact directly It provides a means to free users fiom complex hardware and software management. In SaaS customer co not new to purchase the software and required the license They simply access the application website, enter their credentials and billing details, and can instantly use the application. Customer can customize their software. Application is available to the customer on demand, ‘SaaS can be considered as @ "one-to-many" software delivery model, In SaaS applications are built as per the user needs. ‘SaaS model allows to provide software application as a service to the end users, It refers to a software that is, deployed on a hosted service and is accessible via Internet, vyvyy vuvvy ‘Compiled by:-Naresh Prasad Das Page 14 Cloud Computing| Unit-2 Some of the SaaS applications are not customizable such as an Office Suite. But SaaS provides us Application Programming Interface (API, which allows the developer to develop a customized application. Some examples: © Gmail © Google drive © Dropbox Benefits Using SaaS has proved to be beneficial in tems of scalability, efficiency, performance and much more, Some of the benefits are listed below: Y_ Modest software tools The SaaS application deployment requires a little or no client side software installation which results in the following benefits: © No requirement for complex software packages at client side © Little or no risk of configuration at client side © Low distribution cost Efficient use of software licenses ‘The client can have single license for multiple computers running at different locations which reduces the licensing cost. Also, there is no requirement for license servers because the software runs in the provider's infiastracture, Y CENTRALIZED MANAGEMENT & DATA The data stored by the cloud provider is centralized. However. the cloud providers may store data in a decentratized manner for sake of redundancy and reliability. ¥ PLATFORM RESPONSIBILITIES MANAGED BY PROVIDERS All platform responsibilities such as backups, system maintenance, security, hardware refiesh, power ‘management, etc., are performed by the cloud provider. The consumer need not to bother about them. Y Multitenant solutions Multitenancy allows multiple users to share single instance of resources in virtual isolation. Consumers can customize their application without affecting the core functionality. Issues There are several issues associated with SaaS, some of them are listed below: Browser based risks If the consumer visits malicious website and browser becomes infected, and the subsequent access to SaaS. application might compromise the consumer's data.To avoid such risks, the consumer can use multiple browsers and dedicate a specific browser to access SaaS applications or can use virtual desktop while accessing the SaaS applications Y Network dependence ‘The SaaS application can be delivered only when network is continuously available, Also network should be reliable but the network reliability cannot be guaranteed either by cloud provider or the consumer. Y Lack of portability between sas clouds ‘Transferring workloads from one SaaS cloud to another is not so easy because work flow, business logics, ‘user interfaces, support scripts can be provider specific 4 Characteristics Here are the characteristics of SaaS service model: SaaS makes the software available over the Internet. ‘The Software are maintained by the vendor rather than where they are running, The license to the software may be subscription based or usage based. And itis billed on recurring basis. SaaS applications are cost effective since they do not requite any maintenance at end user side, ‘They are available on demand. They can be scaled up or down on demand ve sve vrvvvy ‘Compiled by:-Naresh Prasad Das Page 15, Cloud Computing | Uni They are automatically upgraded and updated. > SaaS offers share data model, Therefore, multiple users can share single instance of infiastructure. It is uot required to hard code the functionality for individual users. > Allusers are running same version of the software. \ Providers Workday, Ine Provider Services Salseforce.com On-demand CRM solutions MicrosoftOffice Online office suite 365 Google Apps Gmail, Google Calendar, Docs, and sites NetSuite ERP, accounting, order management, CRM, Professionals Services Automation (PSA), and e-commerce applications. GoToMeeting Online meeting and video-conferencing software Constant Contact E-mail marketing, online survey, and event marketing Oracle CRM CRM applications Workday, Ine ‘Human capital management, payroll, and financial management. ‘Compiled by:-Naresh Prasad Das Page 16 Cloud Computing| Unit-2 2.3. Deployment models Deployment models define the type of access to the clond, i.e, how the cloud is located” Cloud can have any of the four types of access: public, private, hybrid and community. Public Cloud _ © Hybrid Cloud 23.1 Public cloud: ‘The public cloud allows systems and services to be easily accessible to general public. Amazon Elastic Compute Cloud (EC2), Microsoft Azure, IBM's Blue Cloud, Sun Cloud, and Google Cloud are ‘examples of the public cloud. PUBLIC cLouD ‘Compiled by:-Naresh Prasad Das Page 17 Cloud Computing| Unit-2 + Benefits > There are many benefits of deploying cloud as public cloud model. The following diagram shows some of those benefits Y Cost effective Since public cloud share same resources with large munber of consumer. it has low cost Y Reliability Since public cloud employs large mumber of resources from different locations, if any of the resource fail, public cloud can employ another one Y. Flexibility It is also very easy to integrate public cloud with private cloud, hence gives consumers a flexible approach, ¥ Location independence Since, public cloud services are delivered through internet, therefore ensures location independence. Y Utility style costing Public cloud is also based on pay-per-use model and resources are accessible whenever consumer needs it Y High scalability Cloud resources are made available on demand from a pool of resources. i. down according the requirement. 4 Disadvantages > Here are the disadvantages of public cloud model: Y Lowsecurity In public cloud model, data is hosted off-site and resources are shared publicly, therefore does not ensure higher level of security. Y Less customizable Itis comparatively less customizable than private cloud 2.3.2 Private cloud: > The private cloud allows systems and services to be accessible within an organization, The private cloud is, opetated only within a single organization, However, it may be managed internally or by third-party. The chief advantage of these systems is that the enterprise retains full control Over corporate data, security ‘guidelines, and system performance: . they can be scaled up or ‘Compiled by:-Naresh Prasad Das Page 18 Cloud Computing| Unit-2 Private Cloud Model 7 + Benentts ‘There are many benefits of deploying clond as private cloud model, The following diagram shows some of those benefits: Higher security and privacy Private cloud operations are not available to general public and resources are shared from distinct pool of resources, therefore, ensures high security and privacy. Y More control Private clouds have more control on its resources and hardware than public cloud because it is accessed only within an organization, ¥ Cost and energy efficiency Private cloud resources are not as cost effective as public clouds but they offer more efficiency than public cloud, ‘Compiled by:-Naresh Prasad Das Page 19 Cloud Computing| Unit-2 Disadvantages Here ae the disadvantages of using private cloud model: Restricted area Private cloud is only accessible locally and is very difficult to deploy globally. Y Inflexible pricing In order to falfill demand, purchasing new hardware is very costly Y Limited scalability Private cloud can be scaled only within capacity of internal hosted resources Y Additional skills In otder to maintain cloud deployment, organization requires mote skilled and expertise. Ave 23.3 Hybrid cloud This can be a combination of private and public clouds that support the requirement to retain some data in an ‘organization, and also the need to offer services in the cloud. A company may use internal resources in a private cloud ‘and maintain total control over its proprietary data. It can then use a public cloud storage provider for backing up less sensitive information, Hybrid Cloud Model + Benefits There are many benefits of deploying cloud as hybrid cloud model. The following diagram shows some of those benefits Scalability It offers both features of public cloud scalability and private cloud scalability Flexibility It offers both secure resources and scalable public resources ‘Compiled by:-Naresh Prasad Das Page 20 Cloud Computing| Unit-2 23.4 Cost efficiencies Public cloud are more cost effective than private, therefore hybrid cloud can have this saving, Security Private cloud in hybrid cloud ensures higher degree of security. Disadvantages Networking issues "Networking becomes complex due to presence of private and public cloud, Security compliance It is necessary to ensure that cloud services are compliant with organization's security policies Infrastructural dependency The hybrid cloud model is dependent on intemal it infrastructure, therefore itis necessary to ensure redundancy across data centers. Community cloud: ‘The community cloud allows system and services to be accessible by group of organizations. It shares the infiastructure between several organizations from a specific community. It may be managed internally or by the third-party. Community Cloud Model / L \% + Benettts There are many benefits of deploying cloud as community cloud model. The following diagram shows some of those benefits: Y Cost effective Commnnity cloud offers same advantage as that of public\ cloud at low cost. Sharing between organizations community cloud provides an infrastructure to share cloud resources and capabilities among several organizations. ¥ Security Comnmnity cloud is comparatively more secure than the public cloud. Y snes (© since all data is housed at one location, one must be careful in storing data in community cloud because it might be accessible by others. © Itis also challenging to allocate responsibilities of governance, security and cost ‘Compiled by:-Naresh Prasad Das Page 21 Cloud Computing| Unit-2 24 Service Oriented Architecture (SOA) > A Service-Oriented Architecture or SOA is a design pattern which is designed to build distributed systems that deliver services to other applicatious through the protocol. It is only a concept and not limited to any programming language or platform, 4 Service A service is a well-defined, self-contained function that represents a unit of fimetionality. A service can exchange information fiom another service. It is not dependent on the state of another service. It uses a loosely coupled, message-based communication model to communicate with applications and other services. Service Connections The figure given below illustrates the service-oriented architecture. Service consumer sends a service request to the service provider, and the service provider sends the service response to the service consumer, The service connection is understandable to both the service consumer and service provider service request po Vv y | <—_—_—__________ service response Message Message Consumer Provider 4 Service-Oriented Terminologies ‘Applications or Services Services ——, ——N ——11 Service sevice | @— tan. ‘Consumer (1 > «6 soe 1 rf ser > OH ma ‘Services - The services are the logical entities defined by one or more published interfaces, Service provider - It is software entity that implements a service specification, Service consumer - It can be called as a requestor or client that calls a service provider. A service ‘consumer can be another service or an end-user application. Service locator - It is a service provider that acts as a registry. It is responsible for examining service provider interfaces and service locations. Service broker - It is a service provider that pass service requests to one or more additional service providers. ‘Compiled by:-Naresh Prasad Das Page 22 Cloud Computing| Unit-2 ‘+ Characteristics of SOA > The services have the following characteristics: ¥ They are loosely coupled. Y They support interoperability They are location-transparent They are self-contained 4 Components of service-oriented architecture ‘The service-oriented architecture stack can be categorized into two parts - fimctional aspects and quality of service aspects. Functions Quality of Service + Functional aspects The functional aspect contains: Transport - It transports the service requests from the service consumer to the service provider and service responses from the service provider to the service consumer 2 Service Communication Protocol - It allows the service provider and the service consumer to communicate with each other o Service Description - It describes the service and data required to invoke it. © Service - It is an actual service © Business Process - It represents the group of services called in a particular sequence associated with the particular rules to meet the business requirements. Service Registry - It contains the description of data which is used by service providers, ‘Compiled by:-Naresh Prasad Das Page 23 Cloud Computing | Unit-2 ————————EEOO————_—_—__—_—__ Quality of Service aspects ‘The quality-of-service aspects contains: © Policy - It represents the set of protocols according to which a service provider makes and provide the services to consumers, 2 Security - It represents the set of protocols required for identification and authorization. © Transaction - It provides the surety of consistent result, This means, if we use the group of services to complete a business fimetion, either all must complete or none of the complete © Management - It defines the set of attributes used to manage the services 4 Advantages of SOA SOA has the following advantages: o Easy to integrate - In a service-oriented architecture, the integration is a service specification that provides implementation transparency o Manage Complexity - Due to service specification, the complexities get isolated, and integration becomes more manageable. Platform Independence - The services are platform-independent as they can communicate with other applications through a common language. © Loose coupling - It facilitates to implement services without impacting other applications. or services, © Parallel Development As SOA follows layet-based architecture, it provides patallel development. Available - The SOA services are easily available to any requester. Reliable ~ As services are small in size, it is easier to test and debug them, 4 Practical applications of SOA: SOA is used in many ways around us whether it is mentioned or not © SOA inffastricture is used by many armies and air force 10 deploy situational awareness systems, © SOA is used to improve the healthcare delivery. © Nowadays many apps are games and they use inbuilt fimetions to nm, For example, an app might need GPS so it uses inbuilt GPS functions of the device This is SOA in mobile solutions. © SOA helps maintain museums a virtualized storage pool for their information and content ‘Compiled by:-Naresh Prasad Das Page 24 Cloud Computing| Unit-2 2.5 Security, trust, and privacy Security, trust, and privacy issues are major obstacles for massive adoption of cloud computing, The traditional cryptographic technologies are used to prevent data tampering and access to sensitive information, The massive use of virtualization technologies exposes the existing system to new threats, which previously were not considered applicable For example, it might be possible that applications hosted in the cloud can process sensitive information: such information can be stored within a cloud storage facility using the most advanced technology in cryptography to protect data and then be considered safe from any attempt to access it without the required permissions. Althowgh these data are processed in memory, they must necessarily be decrypted by the legitimate application, but since the application is hosted in a managed virtual environment it becomes accessible to the virttal machine manager that by program is designed to access the memory pages of such an application. In this case, what is experienced is a lack of control over the environment in which the application is executed, which is made possible by leveraging the cloud. It then happens that a new way of using existing technologies creates new opportunities for additional threats to the security of applications. The lack of control over their own data and processes also poses severe problems for the trust ‘we give to the cloud service provider and the level of privacy we want to have for our data, ‘On one side we need to decide whether to tmst the provider itself; on the other side, specific regulations can simply prevail over the agreement the provider is willing to establish with us concerning the privacy of the information ‘managed on our behalf. Moreover, cloud services delivered to the end user can be the result of a complex stack of services that are obtained by third parties via the primary cloud service provider. In this case there is a chain of responsibilities in terms of service delivery that can introduce more vulnerability for the secure management of data, the enforcement of privacy mules, and the trust given to the service provider. In particular, when a violation of privacy or illegal access to sensitive information is detected, it could become difficult to identify who is liable for such violations. The challenges in this area are, then, mostly concemed with devising secure and trustable systems from different perspectives: technical, social, and legal ‘Compiled by:-Naresh Prasad Das Page 25,

You might also like