Академический Документы
Профессиональный Документы
Культура Документы
Satriyo Dharmanto
at:
IEEE Cloud Computing One Day Course
Institut Teknologi Telkom
Almost
6 billion mobile-cellular subscriptions*
Of 1.8 billion households worldwide, one third have Internet access, compared to only
one fifth five years agoIn developing countries, 25% of homes have a computer and
20% have Internet access, compared to 20% and 13%, respectively, 3 years ago.
Europe leads in broadband connectivity, with fixed- and mobile-broadband penetration reaching
26% and 54%, respectively.
A number of developing countries have been able to leverage mobile-broadband technologies to
overcome infrastructure barriers and provide high-speed Internet services to previously
unconnected areas. In Africa, mobile-broadband penetration has reached 4%, compared with less
than 1% for fixed-broadband penetration.
Bandung -Indonesia 2012 IEEE Cloud Computing IT Telkom
Cloud Computing Ecosystem
Photograph: Urbanmyth/Alamy
Bandung -Indonesia 2012 IEEE Cloud Computing IT Telkom
Cloud Ecosystem Actors:
Cloud Service Provider
Cloud service provider (CSP): An organization that provides and maintains
delivered cloud services.
Picture ; Equinix
Bandung -Indonesia 2012 IEEE Cloud Computing IT Telkom
Cloud Ecosystem Actors:
Cloud Service Partner
Cloud service partner (CSN): A person or organization that provides
support to the building of the service offer of a CSP (e.g. service
integration).
Communication-as-a-Service:
voice over IP (VoIP or Internet telephony),
instant messaging (IM),
collaboration and videoconference applications
using fixed and mobile devices
API(A)
Common API
Cloud Service
provider C
Common API
Consumer Enterprise
Bandung -Indonesia 2012 IEEE Cloud Computing IT Telkom
General use case of DaaS
Derived requirements for the cloud ecosystem
Consumers require accessing their desktop environments independently
of locations, indeed, with their various devices.
Desktop environment needs to guarantee the business continuity and a
recovery solution about a system failure.
Consumers desire to use their personal tasks separating business
computing.
Consumers eager to run various applications as in traditional PCs.
Status of the cloud service Whether or not the cloud service provider has acquired
providers acquisition of the certification for the information security management system
relevant security standard standard: ISMS Certification Standards (Ver.2.0) ISO27001
Status of certification of the party Whether or not measures have been implemented against threat
possessing management authority of information leakage that may be caused by an attacker who has
gained management authority
Status of operational restrictions Whether or not there are access restrictions to prevent installation
included in security measures of malicious software that may cause information leakage, and to
taken on the management system prevent the setting of unnecessary access paths
Keeping data transmitted between Whether or not data transmitted between clouds are kept
cloud systems confidential confidential
Data location Storing data at domestic sites
This use case deals with the SLA mapping between the CSP playing the
Inter-Cloud Service Broker role (CSP-ISB) and other CSPs.
Multiple CSPs will contribute to, or impact concurrently, the SLA between
the CSP-ISB and the CSU when an orchestrated service is provided.
Activities (2012)
IEEE CLOUD 2012 (5th International APCloudCC (IEEE Asia Pacific Cloud
Conference on Cloud Computing) 24-29 June Computing Congress 2012) 14-17
2012, Hawaii, USA November 2012, Shenzhen, CHINA
http://www.thecloudcomputing.org/2012/in
http://www.apcloudcc.org/
dex.html
IEEE Cloud Computing for Emerging Markets IEEE CloudCom 2012 (4th IEEE
Conference, 11-12 October 2012, Bangalore, International Conference on Cloud
INDIA Computing Technology and Science) 3-6
http://ewh.ieee.org/ieee/ccem/index.html December 2012, Taipei, TAIWAN
http://2012.cloudcom.org
Bandung -Indonesia 2012 IEEE Cloud Computing IT Telkom
IEEE Activities in Cloud Computing
Scope Purpose
The working group will develop the Guide for The purpose of the guide is to assist cloud
Cloud Portability and Interoperability Profiles computing vendors and users in developing,
(CPIP). building, and using standards-based cloud
The guide advises cloud computing ecosystem computing products and services, which should
participants (cloud vendors, service providers,
and users) of standards-based choices in areas lead to increased portability, commonality, and
such as application interfaces, portability interoperability.
interfaces, management interfaces, Cloud Computing systems contain many
interoperability interfaces, file formats, and
operation conventions. disparate elements.
The guide groups these choices into multiple For each element there are often multiple
logical profiles, which are organized to address options, each with different externally visible
different cloud personalities. interfaces, file formats, and operational
conventions.
Bandung -Indonesia 2012 IEEE Cloud Computing IT Telkom
IEEE Activities in Cloud Computing
Scope Purpose
The working group will develop the This standard creates an economy
Standard for Intercloud Interoperability
amongst cloud providers that is
and Federation (SIIF).
transparent to users and applications,
This standard defines topology, functions,
which provides for a dynamic
and governance for cloud-to-cloud
interoperability and federation. infrastructure that can support evolving
business models.
Topological elements include clouds,
roots, exchanges (which mediate In addition to the technical issues,
governance between clouds), and appropriate infrastructure for economic
gateways (which mediate data exchange audit and settlement must exist.
between clouds).
Bandung -Indonesia 2012 IEEE Cloud Computing IT Telkom
IEEE Activities in Cloud Computing
Application Hosting
Use reliable, on-demand infrastructure to power your applications, from hosted internal
applications to SaaS offerings.
Content Delivery
Quickly and easily distribute content to end users worldwide, with low costs and high
data transfer speeds.
Web Hosting
Satisfy dynamic web hosting needs with scalable infrastructure platform.
Enterprise IT
Host internal- or external-facing IT applications in secure environment.
Databases
Take advantage of a variety of scalable database solutions, from hosted enterprise
database software or non-relational database solutions.
Source: AWS
Source: AWS
Just-in-time Infrastructure
do not have to worry about pre-procuring capacity for large-scale systems. This
increases agility, lowers risk and lowers operational cost because you scale only as
you grow and only pay for what you use
Usage-based costing
can pass on the same flexible, variable usage-based cost structure to your own
customers
PCI DSS
PCI Data Security Standard as a shared host service provider.
ISO 27001.
Certification of the Information Security Management System (ISMS)
covering infrastructure, data centers, and services.
FISMA.
Federal Information Security Management Act (FISMA). AWS has
been awarded an approval to operate at the FISMA-Low level. It has
also completed the control implementation and successfully passed
the independent security testing and evaluation required to operate at
the FISMA-Moderate level.
Source: AWS
Microsoft released its Office 365 that put the cloud computing market in
the mainstream sector.
Office 365 is aimed for SMEs and small firms with a plan to optimize its
services for firms with a small employee base ones with less than 25
users.
The product includes:
Office Web Apps
Exchange Online
SharePoint Online
Lync Online
for a reasonable cost about $6 per user a month that may increase the
clouds popularity to users with fewer funds.
According to Bedford Report, this method will take the cloud mainstream.
Source: Bedfordreport.com
Source: AWS
Source:
Raleigh
Boulder
Japan
Internet
Canada
Private
Local VPN tunnel
(option) VLAN
Servers
Singapore Germany
Source:
Source:
Source:
Source: