a new era of computing: cloud computing presented by: deepak kumar verma (id: ncraet-113 )

23
A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET- 113)

Upload: bernard-cobb

Post on 11-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

A New Era of Computing: Cloud Computing

Presented by:

Deepak Kumar Verma (ID: NCRAET-113)

Page 2: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

AgendaAgendaIntroduction

Cloud Computing Model

Advantages and Disadvantages

Identified some security issues

Conclusion

Page 3: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

IntroductionIntroductionThe definition of cloud computing provided by the

National Institute of Standards and Technology (NIST)

"Cloud computing is a model for enabling convenient, on-

demand network access to a shared pool of configurable

computing resources (e.g., networks, servers, storage

applications and services) that can be rapidly Provisioned

and released with minimal management effort or service

provider interaction ”.

Page 4: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

Cloud Computing ModelCloud Computing Model

Page 5: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

There are mainly 3 service models given as:

1. Software as a Service (SaaS)

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS)

Page 6: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

In the SaaS model, cloud providers install and operate

application software in the cloud and cloud users access the

software from cloud clients. Cloud users do not manage the cloud

infrastructure and platform where the application runs. This

eliminates the need to install and run the application on the cloud

user's own computers, which simplifies maintenance and support.

Examples of SaaS include: Google Apps, Microsoft Office 365,

Onlive, GT Nexus, Marketo, and TradeCard.

SaaSSaaS

Page 7: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

PaaSPaaSIn the PaaS model, cloud providers deliver a computing platform

typically including operating system, programming language

execution environment, database, and web server. Application

developers can develop and run their software solutions on a cloud

platform without the cost and complexity of buying and managing

the underlying hardware and software layers.

Examples of PaaS include: AWS Elastic Beanstalk,

Cloud Foundry, Heroku, Force.com, EngineYard, Mendix,

OpenShift, Google App Engine, Windows Azure Cloud Services

and OrangeScape

Page 8: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

IaaSIaaSIn this model, providers of IaaS offer computers physical or virtual

machines and other resources. IaaS clouds often offer additional

resources such as a virtual-machine disk image library, raw (block)

and file-based storage, firewalls, load balancers, IP addresses,

virtual local area networks (VLANs), and software bundles. IaaS-

cloud providers supply these resources on-demand from their large

pools installed in data centers.

Examples of IaaS providers include: Amazon EC2,

Azure Services Platform, Google Compute Engine, HP Cloud, iland

, Joyent, NaviSite, RackspaceCloud, ReliaCloud, SAVVIS, and

Terremark.

Page 9: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )
Page 10: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )
Page 11: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

Some Cloud Service Some Cloud Service ProvidersProviders

Utility ComputingUtility Computing Platform as a Service (PaaS)

Platform as a Service (PaaS)

Cloud-based User Applications

Cloud-based User Applications

Page 12: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

Cloud Deployment Cloud Deployment ModelsModels

1. Public Cloud

2. Private Cloud

3. Hybrid Cloud

Page 13: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )
Page 14: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

AdvantagesAdvantages

Lower computer costs.

Improved performance.

Reduced software costs.

Instant software updates.

Unlimited storage capacity.

Increased data reliability.

Universal document access.

Latest version availability.

Device independence.

Page 15: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

DisadvantagesDisadvantages

Requires a constant Internet connection.

Does not work well with low-speed connections.

Features might be limited.

Can be slow.

Stored data might not be secure.

Stored data can be lost.

Page 16: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

Security Issues in the Security Issues in the CloudCloud

– Loss of Control• Take back control

– Data and apps may still need to be on the cloud– But can they be managed in some way by the consumer?

– Lack of trust• Increase trust (mechanisms)

– Technology– Policy, regulation

– Multi-tenancy• Private cloud

– Takes away the reasons to use a cloud in the first place• Strong separation

Page 17: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )
Page 18: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

ConclusionConclusion• Cloud computing provide a super-computing power .

• This cloud of computers extends beyond a single company or enterprise.

• The applications and data served by the cloud are available to broad group of users, cross-enterprise and cross-platform.

• In developing solutions to cloud computing security issues it may be helpful to identify the problems and approaches in terms of

– Loss of control

– Lack of trust

– Multi-tenancy problems

Page 19: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

References1. Ding Feng, Min Zhang, Yan Zhang, and Zhen Xu, “The research of cloud

security”. Journal of Software, 22 (1), 2011.

2. I. Altman, “Privacy Regulation Culturally Universal or Culturally Specific”, Journal

of Social Issues, 33 (3), 1997, 66-84.

3. John Harauz, Lorti M. Kaufman. Bruce Potter, "Data Security in the World of

Cloud Computing", IEEE Security & Privacy, Co published by the IEEE Computer

and Reliability Societies, July/August 2009.

4. Mladen A. Vouch, “Cloud Computing Issues, Research and Implementations”,

Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246

5. R.J. Board, and R. Srikant, “Technological Solutions for Protecting Privacy”, IEEE

Computer, 36 (9), 2003, 115-118.

Page 20: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

6. A. Cavoukian and T. Hamilton, Information and Privacy commissioner of

Ontario, Digital Age, McGraw-Hill, 2002.

7. S. Hecht and A. Cockburn, The fate of the forest: developers, destroyers, and

de-fenders of the Amazon. University Of Chicago Press, 2011.

8. F. Shimba, “Cloud Computing: Strategies for Cloud Computing Adoption,”

Masters Dissertation, Dublin Institute of Technology, 2010.

9. A.C. Berglund, E. Elmroth, F. Hernndez, B. Sandman, and J. Tordsson,

“Combining local and Grid resources in scientific workflows (for

Bioinformatics),” 9th International Workshop, PARA, Citeseer, 2008.

10.C. Moretti, K. Steinhaeuser, D. Thain, and N.V. Chawla, “Scaling up

Classifiers to Cloud Computers,” Eighth IEEE International Conf. On Data

Mining, Dec. 2008, 472-481.

11.C. Wang, Q. Wang, K. Ren, and W. Lou.,” Ensuring data storage security in

cloud computing”, 17th International Workshop on Quality of Service,

IWQoS., 2009, p.19.

Page 21: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

12. F. Amnesty et al., “Cross layer Privacy Enhancement and Non-Repudiation in Vehicular

Communication ” 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern Switzerland,

March 2007.

13. Flavio Lombardi& Roberto DI Pietro, “Transparent Security for Cloud”, (SAC 10), Sierre,

Switzerland, March 22-26, 2010.

14. L.J. Zhang and Q. Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE Int. Conf.

With Web Services, Jul.2009, 607-616.

15. Marios D. Dikaiakos, George Pall is, DimitriosKatsaros, Pankaj Mehra, Athena Vakali,

"Cloud computing: Distributed Internet Computing for IT and Scientific Research", IEEE

Internet Computing, Published by the IEEE Computer Society, September/October 2009.

16. R. Buyya, C.S. Yale, and S. Venugopal, “Market-Oriented Cloud Computing: Vision,

Hype, and Reality for Delivering IT Services as Computing, Utilities”, Proceeding of the

HPCC 08, 10th IEEE International Conf. On High Performance Computing and

Communications (HPCC 08), 2008, 5-13.

Page 22: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

17. R. La,”Quata Sumter, Cloud Computing: Security Risk Classification”, ACMSE 2010,

Oxford, USA, 2010.

18. Rongxing et al, Secure Provenance,” The Essential Bread and Butter of Data

Forensics”, in Cloud Computing, (ASIACCS 10), Beijing, China, 2010.

19. S.C. Misra and A. Mondal, “Identification of a company’s suitability for the adoption of

cloud computing and modeling its corresponding Return on Investment,”

Mathematical and Computer Modelling, 53, Feb. 2011, 504-521.

20. Soren Bleikertz et al, “Security Audits of Multi-tier Virtual Infrastructures in Public

Infrastructure Clouds” CCSW 2010, Chicago, USA.

21. S. Ostermann, A. Iosup, N. Yigitbasi, R. Prodan, T. Fahringer, and D. Epema, “A

performance analysis of EC2 cloud computing services for scientific computing,”

Cloud Computing, Springer,2010, 115-131.

22. S. Yilek, E. Rescorla, H. Shacham, B. Enright, and S. Savage, “when private keys are

public: results from the 2008 debian OpenSSL vulnerability”, in: Proc. 9th ACM

SIGCOMM conf. At Internet measurement conference, 2009.

Page 23: A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

Thank You