a new era of computing: cloud computing presented by: deepak kumar verma (id: ncraet-113 )
TRANSCRIPT
A New Era of Computing: Cloud Computing
Presented by:
Deepak Kumar Verma (ID: NCRAET-113)
AgendaAgendaIntroduction
Cloud Computing Model
Advantages and Disadvantages
Identified some security issues
Conclusion
IntroductionIntroductionThe definition of cloud computing provided by the
National Institute of Standards and Technology (NIST)
"Cloud computing is a model for enabling convenient, on-
demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage
applications and services) that can be rapidly Provisioned
and released with minimal management effort or service
provider interaction ”.
Cloud Computing ModelCloud Computing Model
There are mainly 3 service models given as:
1. Software as a Service (SaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS)
In the SaaS model, cloud providers install and operate
application software in the cloud and cloud users access the
software from cloud clients. Cloud users do not manage the cloud
infrastructure and platform where the application runs. This
eliminates the need to install and run the application on the cloud
user's own computers, which simplifies maintenance and support.
Examples of SaaS include: Google Apps, Microsoft Office 365,
Onlive, GT Nexus, Marketo, and TradeCard.
SaaSSaaS
PaaSPaaSIn the PaaS model, cloud providers deliver a computing platform
typically including operating system, programming language
execution environment, database, and web server. Application
developers can develop and run their software solutions on a cloud
platform without the cost and complexity of buying and managing
the underlying hardware and software layers.
Examples of PaaS include: AWS Elastic Beanstalk,
Cloud Foundry, Heroku, Force.com, EngineYard, Mendix,
OpenShift, Google App Engine, Windows Azure Cloud Services
and OrangeScape
IaaSIaaSIn this model, providers of IaaS offer computers physical or virtual
machines and other resources. IaaS clouds often offer additional
resources such as a virtual-machine disk image library, raw (block)
and file-based storage, firewalls, load balancers, IP addresses,
virtual local area networks (VLANs), and software bundles. IaaS-
cloud providers supply these resources on-demand from their large
pools installed in data centers.
Examples of IaaS providers include: Amazon EC2,
Azure Services Platform, Google Compute Engine, HP Cloud, iland
, Joyent, NaviSite, RackspaceCloud, ReliaCloud, SAVVIS, and
Terremark.
Some Cloud Service Some Cloud Service ProvidersProviders
Utility ComputingUtility Computing Platform as a Service (PaaS)
Platform as a Service (PaaS)
Cloud-based User Applications
Cloud-based User Applications
Cloud Deployment Cloud Deployment ModelsModels
1. Public Cloud
2. Private Cloud
3. Hybrid Cloud
AdvantagesAdvantages
Lower computer costs.
Improved performance.
Reduced software costs.
Instant software updates.
Unlimited storage capacity.
Increased data reliability.
Universal document access.
Latest version availability.
Device independence.
DisadvantagesDisadvantages
Requires a constant Internet connection.
Does not work well with low-speed connections.
Features might be limited.
Can be slow.
Stored data might not be secure.
Stored data can be lost.
Security Issues in the Security Issues in the CloudCloud
– Loss of Control• Take back control
– Data and apps may still need to be on the cloud– But can they be managed in some way by the consumer?
– Lack of trust• Increase trust (mechanisms)
– Technology– Policy, regulation
– Multi-tenancy• Private cloud
– Takes away the reasons to use a cloud in the first place• Strong separation
ConclusionConclusion• Cloud computing provide a super-computing power .
• This cloud of computers extends beyond a single company or enterprise.
• The applications and data served by the cloud are available to broad group of users, cross-enterprise and cross-platform.
• In developing solutions to cloud computing security issues it may be helpful to identify the problems and approaches in terms of
– Loss of control
– Lack of trust
– Multi-tenancy problems
References1. Ding Feng, Min Zhang, Yan Zhang, and Zhen Xu, “The research of cloud
security”. Journal of Software, 22 (1), 2011.
2. I. Altman, “Privacy Regulation Culturally Universal or Culturally Specific”, Journal
of Social Issues, 33 (3), 1997, 66-84.
3. John Harauz, Lorti M. Kaufman. Bruce Potter, "Data Security in the World of
Cloud Computing", IEEE Security & Privacy, Co published by the IEEE Computer
and Reliability Societies, July/August 2009.
4. Mladen A. Vouch, “Cloud Computing Issues, Research and Implementations”,
Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246
5. R.J. Board, and R. Srikant, “Technological Solutions for Protecting Privacy”, IEEE
Computer, 36 (9), 2003, 115-118.
6. A. Cavoukian and T. Hamilton, Information and Privacy commissioner of
Ontario, Digital Age, McGraw-Hill, 2002.
7. S. Hecht and A. Cockburn, The fate of the forest: developers, destroyers, and
de-fenders of the Amazon. University Of Chicago Press, 2011.
8. F. Shimba, “Cloud Computing: Strategies for Cloud Computing Adoption,”
Masters Dissertation, Dublin Institute of Technology, 2010.
9. A.C. Berglund, E. Elmroth, F. Hernndez, B. Sandman, and J. Tordsson,
“Combining local and Grid resources in scientific workflows (for
Bioinformatics),” 9th International Workshop, PARA, Citeseer, 2008.
10.C. Moretti, K. Steinhaeuser, D. Thain, and N.V. Chawla, “Scaling up
Classifiers to Cloud Computers,” Eighth IEEE International Conf. On Data
Mining, Dec. 2008, 472-481.
11.C. Wang, Q. Wang, K. Ren, and W. Lou.,” Ensuring data storage security in
cloud computing”, 17th International Workshop on Quality of Service,
IWQoS., 2009, p.19.
12. F. Amnesty et al., “Cross layer Privacy Enhancement and Non-Repudiation in Vehicular
Communication ” 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern Switzerland,
March 2007.
13. Flavio Lombardi& Roberto DI Pietro, “Transparent Security for Cloud”, (SAC 10), Sierre,
Switzerland, March 22-26, 2010.
14. L.J. Zhang and Q. Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE Int. Conf.
With Web Services, Jul.2009, 607-616.
15. Marios D. Dikaiakos, George Pall is, DimitriosKatsaros, Pankaj Mehra, Athena Vakali,
"Cloud computing: Distributed Internet Computing for IT and Scientific Research", IEEE
Internet Computing, Published by the IEEE Computer Society, September/October 2009.
16. R. Buyya, C.S. Yale, and S. Venugopal, “Market-Oriented Cloud Computing: Vision,
Hype, and Reality for Delivering IT Services as Computing, Utilities”, Proceeding of the
HPCC 08, 10th IEEE International Conf. On High Performance Computing and
Communications (HPCC 08), 2008, 5-13.
17. R. La,”Quata Sumter, Cloud Computing: Security Risk Classification”, ACMSE 2010,
Oxford, USA, 2010.
18. Rongxing et al, Secure Provenance,” The Essential Bread and Butter of Data
Forensics”, in Cloud Computing, (ASIACCS 10), Beijing, China, 2010.
19. S.C. Misra and A. Mondal, “Identification of a company’s suitability for the adoption of
cloud computing and modeling its corresponding Return on Investment,”
Mathematical and Computer Modelling, 53, Feb. 2011, 504-521.
20. Soren Bleikertz et al, “Security Audits of Multi-tier Virtual Infrastructures in Public
Infrastructure Clouds” CCSW 2010, Chicago, USA.
21. S. Ostermann, A. Iosup, N. Yigitbasi, R. Prodan, T. Fahringer, and D. Epema, “A
performance analysis of EC2 cloud computing services for scientific computing,”
Cloud Computing, Springer,2010, 115-131.
22. S. Yilek, E. Rescorla, H. Shacham, B. Enright, and S. Savage, “when private keys are
public: results from the 2008 debian OpenSSL vulnerability”, in: Proc. 9th ACM
SIGCOMM conf. At Internet measurement conference, 2009.
Thank You