Вы находитесь на странице: 1из 15

Research of :

Cloud Computing
Introduction:
common understanding of “cloud computing” is continuously
evolving, and the terminology and concepts used to define it often
need clarifying. Press coverage can be vague or may not fully capture
the extent of what cloud computing entails or represents.
sometimes reporting how companies are making their solutions
available in the “cloud” or how “cloud computing” is the way.
forward, but not examining the characteristics, models, and
services involved in understanding what cloud computing is and what
it can become.
The primary business service models being deployed (such as
software, platform, and infrastructure as a service) and common
deployment models employed by service providers and users to use
and maintain the cloud services (such as the private, public,
community, and hybrid clouds) are discussed.
Also introduced are the benefits and challenges associated with
cloud computing, and for those seeking to use communications
services in the cloud, briefly presented are different ways of
determining the interfaces needed to use these communications
services. (dialogic, 2017 : P. 1- 2)

2
Vision 2030 in Clouding Computing:
Digital transformation in Saudi Arabia is one of the core
elements to achieve the goals of Saudi Vision 2030. In this paper, we
argue that data governance plays a vital role for the success of this
vision. This role is further emphasized when considering the country's
appetite for emerging technologies such as cloud computing solutions.
A thorough survey of literature shows that data governance in general
and for cloud computing, more specifically, is under researched. This
paper puts the Kingdom of Saudi Arabia Vision 2030 for digital
transformation under a test. Supported by an empirical study, this
paper provides an early warning of a highly likely failure if data
governance is not integrated in the vision as a driver for digital
transformation. An empirical survey, using a self-administered
questionnaire, is conducted to explore and evaluate the status of data
governance in the Saudi Arabia. The results of the study reveal that
despite the wide recognition of the importance of data governance,
especially for cloud computing, there is a consensus that this area is
really in its infancy and almost absent from the Saudi organizations.
(Al Ruithe & Benkhelif, 2017)
Type of Clouding:
A. Platform as a Service (PaaS) PaaS[4]
B. Infrastructure as a Service (IaaS)
IaaS[4]
C. Storage as a service Storage as a
service (STaaS)
E. Security as a service Security as a
service (SECaaS)
F. Data as a service Data as a service, or
DaaS,
G. Software as a Service (SaaS) SaaS. (Sareen, Vol. 13, Iss. 3, March
2013)

3
Different between Clouding Computing Storage & Hard
Drive:
Clouding Computing is :
1. Offsite protection
2. Anywhere access
3. Sharing is super easy
4. Real-time collaboration
5. It's free
Why you want a hard drive
1. It's offline
2. Ample storage
3. Is your data safe?
4. Easy backup
5. Best of both worlds. (Saltzman, 2015)
how to manage cloud computing:
Service management in this context covers all the data center
operations activities. This broad discipline considers the necessary
techniques and tools for managing services by both cloud providers
and the internal data center managers across these physical, IT and
virtual environments.
Service management encompasses many different disciplines,
including
 Configuration management
 Asset management

4
 Network management
 Capacity planning
 Service desk
 Root cause analysis
 Workload management
 Patch and update management
The cloud itself is a service management platform. Well-designed
cloud service portfolios include a tight integration of the core service
management capabilities and well-defined interfaces. (Hurwitz &
Others, 2009)
is the files safe in the cloud:
Cloud security architecture is effective only if the correct defensive
implementations are in place. An efficient cloud security architecture
should recognize the issues that will arise with security
management.[8] The security management addresses these issues with
security controls. These controls are put in place to safeguard any
weaknesses in the system and reduce the effect of an attack. While there
are many types of controls behind a cloud security architecture, they can
usually be found in one of the following categories:[8]
Deterrent controls
These controls are intended to reduce attacks on a cloud system.
Much like a warning sign on a fence or a property, deterrent controls
typically reduce the threat level by informing potential attackers that there
will be adverse consequences for them if they proceed. (Some consider
them a subset of preventive controls.)
Preventive controls
Preventive controls strengthen the system against incidents,
generally by reducing if not actually eliminating vulnerabilities. Strong
authentication of cloud users, for instance, makes it less likely that
unauthorized users can access cloud systems, and more likely that cloud
users are positively identified.
5
Detective controls
Detective controls are intended to detect and react appropriately to
any incidents that occur. In the event of an attack, a detective control will
signal the preventative or corrective controls to address the
issue.[8] System and network security monitoring, including intrusion
detection and prevention arrangements, are typically employed to detect
attacks on cloud systems and the supporting communications
infrastructure.
Corrective controls
Corrective controls reduce the consequences of an incident, normally
by limiting the damage. They come into effect during or after an incident.
Restoring system backups in order to rebuild a compromised system is an
example of a corrective control. (Krutiz, 2009 : 197)
Benefit:
The presentation “Cloud Computing: Benefits, risks and
recommendations for information security” will cover some the most
relevant information security implications of cloud computing from the
technical, policy and legal perspective.

Information security benefit and top risks will be outlined and most
importantly, concrete recommendations for how to address the risks and
maximize the benefits for users will be given.(CCIS, 2009)

Is Cloud Computing is useful in Business and why:


There are six Major reason why companies use cloud service:
1- Maintaining Focus on the Business.
2- Business Agility.
3- Scale.
4- Access from anyweher.
5- Staffing Efficiency. (Cloud Computing in Austin)

6
Architecture of Cloud:

Cloud architecture, the systems architecture of the software


systems involved in the delivery of cloud computing, typically
involves multiple cloud components communicating with
each other over a loose coupling mechanism such as a
messaging queue. Elastic provision implies intelligence in the
use of tight or loose coupling as applied to mechanisms such
as these and others. (amazonwebservices.com)
Statistics & Photos for Cloud Computing:

 21 % of EU enterprises used cloud computing in 2016,


mostly for hosting their e-mail systems and storing files in
electronic form.
 51 % of those firms used advanced cloud services relating
to financial and accounting software applications, customer
relationship management or to the use of computing power
to run business applications.
 In 2016, almost twice as many firms used public cloud
servers (15 %) as private cloud servers (8 %), i.e.
infrastructure for their exclusive use.
 Compared to 2014, the use of cloud computing increased
particularly in large enterprises (+10 percentage points).
(Konstantinos GIANNAKOURIS, Maria SMIHILY, 2016)

7
In Saudi Arabia Cloud Computing used in university e.g i)
"King Abdulaziz University", ii) "King Saud University", iii)
"Imam Muhammad ibn Saud Islamic University", iv) "Taibah
University" and v) "Umm al-Qura University"
Figure illustrates the personal data about participants in the
use of Cloud services. 58% of the participants were female
and 42% were male. We also note that the highest number of
participants is undergraduate university students in the age
group 20-25. Moreover, there is a wide variety of devices
used by the participants to access Cloud services and these
devices include laptops, smartphones, PCs and tablets
(Figure). This means that Saudi Cloud consumers also use the
Mobile Cloud computing technology. (Noor, 2016 : 71-72)

8
PHOT:

9
ICloud Email:
Email an iCloud account comes with icloud.com account
(if you previously had an mac.com or me.com account, the
will work too; in fact, they are treated as the same account),
and email from that account appears in all your devices.
iCloud also deals with notes and text messages. You'II find
more information about all of these functions.
All of these services are tied together using storage in
Apple's servers with every iCloud account, you get 5 GB of
storage on a yearly basis if needed (up to 50 GB). Some items,
such as anything you buy from the iTunes Store (whether it be
music, products, apps, books, movies, or television episodes)
and quota. What you,II mostly find using up your iCloud
storage quote is your iCloud email, your documents and data
used by applications (usually preferences and the like)
(Negrino, 2013 : 15)

10
A Reflection:
Personal Opinion on Cloud Computing:
1- In the cloud, you can access your files at any time to extract the
missing information. While in your mobile hard disk or
computer, the device may crash, lose all information, and have
to return the data to see it again.
2- The only problem facing the cloud is the interruption of Internet
access to the service, which hinders access to information.
3- The introduction of the digital system by government ministries
has begun to operate a platform in which the necessary
requirements are raised without the Ministry's review.
4- Cloud computing has helped university students in the Kingdom
to enter and see what has been offered by the university or what
will be planned for the lecture without going back to university.
5- Full redundancy of the computer network, which requires a lot
of wiring, wiring and a main device.
6- Connecting the computer cloud to personal email via Drive
drives helped students to have a location to store their files.
7- (ICloud) to identify this service and it is a cloud storage service
provided by Apple to store your data on servers and restore
them when needed, such data include a backup of the system,
storage of images, names, notes, etc. It is worth mentioning here
that the number of users of the service to the latest cloud
statistical announced In 2013 reached more than 320 million
users around the world.
Conclusion:
We predict cloud computing will grow, so developers should
take it into account. Regardless of whether a cloud provider
sells services at a low level of abstraction like EC2 or a higher
level like App Engine, we believe computing, storage, and
networking must all focus on horizontal scalability of
virtualized resources rather than on single node performance.
Moreover:

11
1. Applications software needs to both scale down rapidly as
well as scale up, which is a new requirement. Such software
also needs a pay-for-use licensing model to match needs of
cloud computing.
2. Infrastructure software must be aware that it is no longer
running on bare metal but on VMs. Moreover, metering and
billing need to be built in from the start.
3. Hardware systems should be designed at the scale of a
container (at least a dozen racks), which will be the minimum
purchase size. Cost of operation will match performance and
cost of purchase in importance, rewarding energy
proportionality5 by putting idle portions of the memory, disk,
and network into low-power mode. Processors should work
well with VMs and flash memory should be added to the
memory hierarchy, and LAN switches and WAN routers must
improve in bandwidth and cost.

12
Resource / Research Style:
1. Al Ruithe, Majid ; Benkhelifa, Elhadj , Cloud Data
Governance In-Light of the Saudi Vision 2030 for Digital
Transformation, 2017.
2. Building GrepTheWeb in the Cloud, Part 1: Cloud
Architectures". Developer.amazonwebservices.com.
Retrieved 22 August 2010.
3. Cloud Computing in Austin, TX, 6 Reasons Why
Companies Should Use Cloud Computing,
http://www.whitehatvirtual.com/blog.
4. ENISA, Greece ; Catteddu, Daniele, Communications in
Computer and Information Science, Cloud Computing:
Benefits, Risks and Recommendations for Information
Security, CCIS,Volume 72, 2009.
5. Hurtiz, Judith S. & Others, Cloud Computing For Dummies,
2009.
6. Konstantinos GIANNAKOURIS, Maria SMIHILY, Cloud
computing - statistics on the use by enterprises
7. Krutz, Ronald L., and Russell Dean Vines. "Cloud
Computing Security Architecture." Cloud Security: A
Comprehensive Guide to Secure Cloud Computing.
Indianapolis, IN: Wiley, 2010. 179-80. Print.
8. Nigrino, Tom , iCloud: Visual QuickStart Guide , peachpit
press, San Francisco , 2013
9. Noor, Talal H. , Usage and Technology Acceptance of
Cloud Computing in Saudi Arabian Universities ,
International Journal of Software Engineering and Its
Applications, Vol. 10, No. 9 (2016), pp. 65-76.
10. Sareen, Pankaj, Cloud Computing: Types,
Architecture, Applications, Concerns, Virtualization and
Role of IT Governance in Cloud, International Journal of

13
Advanced Research in Computer Science and Software
Engineering, Vol. 3, Iss. 3, March 2013.
11. Satlzman, Mac , Hard drive or cloud storage: What's
best for backup? , 21 Feb. 2015.
12. www.dialogic.com

14
Table of Contents:
Title Page No.
Introduction 2
Vision 2030 in Clouding Computing 3
Type of Clouding 3
Different between Clouding Computing 4
Storage & Hard Drive
how to manage cloud computing 4
is the files safe in the cloud 5
Benefit 6
Is Cloud Computing is useful in Business 6
and why
Architecture of Cloud 7
Statistics & Photos for Cloud Computing 7
Photo 9
ICloud Email 10
A Reflection 11
Conclusion 12
Resource / Research Style 13
Table of contents 15

15

Вам также может понравиться