Академический Документы
Профессиональный Документы
Культура Документы
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
04/03/17 1
What is Computing
Application Benefits
• Google Search Engine • High processing power
• Earthquake Simulation Software • Cost Efficient
• Image Rendering • High Availability
• Weather Forecasting • Fault Tolerance
Distributed Computing
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
04/03/17 21
Cloud Computing
1. Deployment Models
2. Service Models
Deployment Models
•Public,
•Private,
•Hybrid and
•Community.
04/03/17 28
PUBLIC CLOUD & PRIVATE CLOUD :
04/03/17 29
COMMUNITY CLOUD & HYBRID CLOUD
04/03/17 30
The NIST model
• The NIST model originally did not require a cloud to use virtualization to pool
resources, nor did it absolutely require that a cloud support multi-tenancy in the
earliest definitions of cloud computing.Multi-tenancy is the sharing of resources
among two or more clients
04/03/17 32
04/03/17 33
History of Cloud Computing
04/03/17 34
04/03/17 35
04/03/17 36
04/03/17 37
04/03/17 38
04/03/17 39
04/03/17 40
04/03/17 41
04/03/17 42
Characteristics of Cloud Computing
04/03/17 43
Benefits of cloud computing
04/03/17 47
Assessing the Role of Open
Standards
• The cloud computing industry is •Deployment of open-source
working with these architectural software
standards: •Standardized Web services
• Platform virtualization of •Autonomic systems
resources •Grid computing
• Service-oriented architecture •Web-application frameworks
•These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications,
and utility computing.
•These businesses require open standards so that data is both portable and universally
accessible.
Infrastructure as a Service (IaaS)
• Infrastructure as a Service (IaaS) is a
way of delivering Cloud Computing
infrastructure – servers, storage, network
and operating systems – as an on-
demand service. Rather than purchasing
servers, software, datacenter space or
network equipment, clients instead buy
those resources as a fully outsourced
service on demand Iaas provides the
following
● Servers- compute, machines
● Storage
● Network
● Operating system
04/03/17 50
04/03/17 51
Introduction to virtualization
04/03/17 52
Run multiple virtual computers on one physical box.
• Desktop
• Server
• Data Center
• Cloud
04/03/17 53
How it is different from dual
boot?
04/03/17 54
Types of Virtualization
• Server Virtualization
• Desktop Virtualization
• Application Virtualization
• Memory
• Storage
• Data
• Network
04/03/17 55
What is Hypervisor
04/03/17 56
Virtualization Benefits
• Redundancy
• Legacy hardware (Inheritance)
• Migration
• Centralized management
04/03/17 57
virtual machine (VM)
• With cloud storage, there's no need for CDs, external hard drives, or
localized servers
• Data is quickly and automatically updated in the cloud and available
for your retrieval whenever you need it
• With no need for physical, on-site storage space, you can have a
smaller workspace, less equipment to buy, and fewer IT employees to
maintain your equipment and manage your data
• IT staff's can spend more time to focusing on other important tasks to
help your business growth.
04/03/17 62
Eucalyptus Open-Source Private
Cloud
• Eucalyptus is a Linux-based open-source software architecture that
implements efficiency-enhancing private and hybrid clouds within
an enterprise’s existing IT infrastructure.
04/03/17 63
Infrastructure Security
04/03/17 64
Infrastructure Security - The
Network Level
• There are four significant risk factors in this use case:
• 1.Ensuring the confidentiality and integrity of organization's data-
in-transit to and from a public cloud provider;
• 2. Ensuring proper access control (authentication, authorization, and
auditing) to whatever resources are used at the public cloud
provider;
• 3. Ensuring the availability of the Internet-facing resources in a
public cloud that are being used by an organization, or have been
assigned to an organization by public cloud providers;
• 4.Replacing the established model of network zones and tiers with
domains.
04/03/17 65
Infrastructure Security - The
Host Level
04/03/17 66
Infrastructure Security - The
Application Level
• The level is responsible for managing
• Application-level security threats;
• End user security;
• SaaS application security;
• PaaS application security;
• Customer-deployed application security
• IaaS application security
• Public cloud security limitations
04/03/17 67
04/03/17 68
Understanding Cloud Security
• Your risks in any cloud deployment are dependent upon the particular
cloud service model chosen and the type of cloud on which you
deploy your applications.
• In order to evaluate your risks, you need to perform the following
analysis:
• 1. Determine which resources (data, services, or applications) you are
planning to move to the cloud.
• 2. Determine the sensitivity of the resource to risk.
• 3. Determine the risk associated with the particular cloud type for a
resource.
04/03/17 69
04/03/17 70
04/03/17 71
Securing Data and Data piracy
Securing data sent to, received from, and stored in the cloud is the
single largest security concern that most organizations should have
with cloud computing.
As with any WAN traffic, you must assume that any data can be
intercepted and modified. That's why, as a matter of course, traffic to a
cloud service provider and stored off-premises is encrypted.
•These are the key mechanisms for protecting data mechanisms:
Access control
Auditing
Authentication
Authorization
04/03/17 72
Cloud Computing Landscape
Applications
Storage
Computing
Development
platform
VM VM VM Services Services
Image reproduced from Cloud security and privacy, 2009, Mather et al.
CLOUD COMPUTING SECURITY
AND PRIVACY ISSUES
• There are numerous security issues for cloud computing as it
encompasses many technologies including
• networks,
• databases,
• operating systems,
• virtualization,
• resource scheduling,
• transaction management,
• load balancing,
• concurrency control and memory management.
04/03/17 81
Access management & Access
Control
• there are six specific areas of the cloud computing environment
where equipment and software require substantial security attention
These six areas are:
• (1) security of data at rest,
• (2) security of data in transit,
• (3) authentication of users/applications/ processes,
• (4) robust separation between data belonging to different customers,
• (5)cloud legal and regulatory issues, and (6) incident response.
04/03/17 82
Launch an Application with AWS
Elastic Beanstalk
04/03/17 83
04/03/17 84
04/03/17 85
04/03/17 86
04/03/17 87
04/03/17 88
04/03/17 89
04/03/17 90
04/03/17 91
04/03/17 92
04/03/17 93
04/03/17 94
CLOUD CONTRACTING
MODELS
• Licensing Agreements Versus Services Agreements
– Summary of Terms of a License Agreement
– Summary of Terms o
– Value of Using a Service Agreement in Cloud Arrangement s
a Service Agreement.
• On-Line Agreements Versus Standard Contracts
• The Importance of Privacy Policies Terms and Conditions
• Risk Allocation and Limitations of Liability
04/03/17 95
Cloud Computing Represented as a Stack of Service Offering Categories1
96
04/03/17 97
Cloud and SOA
04/03/17 98
SOA ARCHITECTURE
• Cloud Infrastructure has many service
components.
• Services can be divided into four domains
• Application Services
• Information Services
• Common IT services
• Infrastructure Services
04/03/17 99
Cloud and SOA-SOA Life Cycle
100
04/03/17
SOA based Cloud Infrastructure
Steps
• Enterprises that intend to harness cloud
computing must consider the following steps
• ● Analysis and Strategy
• ● Planning
• ● Implementation
• ● Value-driven(Feedback)
04/03/17 101
Cloud Computing
And Management
Cloud Computing
Internet-based computing, where different services(servers,
storage and applications) are delivered to an organization's
computers and devices through the Internet.
How Cloud Computing
Works ??
Clouds use a network layer to connect users’ end point
devices, like computers or smart phones, to resources that
are centralized in a data centre.
Users access the data centre via a company network or the
internet or both. Clouds can also be accessed from any
location, allowing mobile workers to access their business
systems on demand.
Cloud Management
Management of cloud computing products and
services.
Software and technologies designed for operating
and monitoring applications, data and services
residing in the cloud.
Cloud Computing Services
Software as a Service(SaaS)
Platform as a service(PaaS)
Infrastructure as a Service(IaaS)
Cloud Computing Deployment
Models
Public (Services provided to general public)
Private (for single organization or any third
party,maintenace cost is high)
Hybrid (mix of public and private cloud
services,gives businesses greater flexibility and
more data depolyment options)
Benefits of Cloud
Management
Global management
Remote office and distributed storage management
Information Access for disaster recovery
Cost reduction
Real time reporting
Easy Upgrades
Encrypted information
Compliance management
Ease of implementation
What is Virtualization?
111/30
04/03/17 112
Why Virtualization? (2/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
– Flexible load balancing
VM
VM
VM
VM
VM
VM
CPU
CPU
CPU
113/30
Why Virtualization? (3/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
VM
– High availability
VM
SW or HW maintenance
(upgrade or fix)
114/30
Why Virtualization? (6/6)
• Other benefits
– Strong security monitoring
• Security monitoring outside OSes
– Ease of deployment
• Virtual appliance
– A bundle of OS and applications
– Flexible testing and debugging
• Building distributed environments on a single
machine
• Kernel development and debugging 115/30
• VM-based recording and replaying
Virtualization & Cloud Computing
Virtualization 2.0
Bluemix is a cloud platform as a service (PaaS)
developed by IBM for building, running, and
managing apps and services.
SoftLayer, an IBM Company, provides cloud
infrastructure as a service from a growing number of
data centers and network points of presence around
the world
Case Study
Need:
A company wanted to help diabetes
patients more easily by sharing
accurate, up-to-date medical
information with physicians .
Solution
Working with IBM,the company created
a mobile app, supported by IBM
Bluemix and
SoftLayer technologies, that captures
and aggregates data directly from other
medical devices and health tools.
Benefit
The virtualized IBM architecture cuts ongoing
operational costs by 30 percent with a flexible
platform, while physicians and diabetics have
clearer insight into patient health, encouraging
better care options.
yy
• ggf
yy
• ggf