SlideShare a Scribd company logo
1 of 7
Download to read offline
Special Publication 800-145 (Draft)




The NIST Definition of
Cloud Computing (Draft)

Recommendations of the National Institute
of Standards and Technology


Peter Mell
Timothy Grance
NIST Special Publication 800-145   The NIST Definition of Cloud Computing
(Draft)                            (Draft)

                                   Recommendations of the National
                                   Institute of Standards and Technology

                                   Peter Mell
                                   Timothy Grance




      C O M P U T E R                                S E C U R I T Y

                                   Computer Security Division
                                   Information Technology Laboratory
                                   National Institute of Standards and Technology
                                   Gaithersburg, MD 20899-8930

                                   January 2011




                                    U.S. Department of Commerce

                                           Gary Locke, Secretary
                                    National Institute of Standards and Technology

                                           Dr. Patrick D. Gallagher, Director
Reports on Computer Systems Technology

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analysis to advance the development and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in Federal computer systems. This Special Publication 800-series
reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative
activities with industry, government, and academic organizations.


          National Institute of Standards and Technology Special Publication 800-145 (Draft)
                                        7 pages (January. 2011)




                 Certain commercial entities, equipment, or materials may be identified in this
                document in order to describe an experimental procedure or concept adequately.
              Such identification is not intended to imply recommendation or endorsement by the
              National Institute of Standards and Technology, nor is it intended to imply that the
               entities, materials, or equipment are necessarily the best available for the purpose.




                                                        ii
Acknowledgements



The authors Peter Mell and Timothy Grance of the National Institute of Standards and Technology
(NIST) would like to thank the many experts in industry and government who contributed their thoughts
to the creation and review of this definition. We especially acknowledge Murugiah Souppaya and Lee
Badger, also of NIST, whose advice and technical insight assisted this effort. Additional
acknowledgements will be added upon the final publication of this guideline.




                                                  iii
1.    Introduction

1.1   Authority

The National Institute of Standards and Technology (NIST) developed this document in furtherance of its
statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002,
Public Law 107-347.

NIST is responsible for developing standards and guidelines, including minimum requirements, for
providing adequate information security for all agency operations and assets; but such standards and
guidelines shall not apply to national security systems. This guideline is consistent with the requirements
of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), “Securing Agency
Information Systems,” as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental
information is provided in A-130, Appendix III.

This guideline has been prepared for use by Federal agencies. It may be used by nongovernmental
organizations on a voluntary basis and is not subject to copyright, though attribution is desired.

Nothing in this document should be taken to contradict standards and guidelines made mandatory and
binding on Federal agencies by the Secretary of Commerce under statutory authority, nor should these
guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce,
Director of the OMB, or any other Federal official.

1.2   Purpose and Scope

The purpose of this publication is to provide the NIST definition of cloud computing. NIST
intends this informal definition to enhance and inform the public debate on cloud computing.
Cloud computing is still an evolving paradigm. Its definition, use cases, underlying technologies,
issues, risks, and benefits will be refined and better understood with a spirited debate by the
public and private sectors. This definition, its attributes, characteristics, and underlying rationale
will evolve over time.

1.3   Audience

The intended audience is people adopting the cloud computing model or providing cloud services.




                                                     1
2.        The NIST Definition of Cloud Computing

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model promotes availability and is composed of five essential characteristics, three service
models, and four deployment models.

Essential Characteristics:

            On-demand self-service. A consumer can unilaterally provision computing capabilities, such as
                   server time and network storage, as needed automatically without requiring human
                   interaction with each service’s provider.
            Broad network access. Capabilities are available over the network and accessed through standard
                   mechanisms that promote use by heterogeneous thin or thick client platforms (e.g.,
                   mobile phones, laptops, and PDAs).
            Resource pooling. The provider’s computing resources are pooled to serve multiple consumers
                   using a multi-tenant model, with different physical and virtual resources dynamically
                   assigned and reassigned according to consumer demand. There is a sense of location
                   independence in that the customer generally has no control or knowledge over the exact
                   location of the provided resources but may be able to specify location at a higher level of
                   abstraction (e.g., country, state, or datacenter). Examples of resources include storage,
                   processing, memory, network bandwidth, and virtual machines.
            Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases
                   automatically, to quickly scale out, and rapidly released to quickly scale in. To the
                   consumer, the capabilities available for provisioning often appear to be unlimited and can
                   be purchased in any quantity at any time.
            Measured Service. Cloud systems automatically control and optimize resource use by leveraging
                   a metering capability1 at some level of abstraction appropriate to the type of service (e.g.,
                   storage, processing, bandwidth, and active user accounts). Resource usage can be
                   monitored, controlled, and reported, providing transparency for both the provider and
                   consumer of the utilized service.

Service Models:

            Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the
                   provider’s applications running on a cloud infrastructure. The applications are accessible
                   from various client devices through a thin client interface such as a web browser (e.g.,
                   web-based email). The consumer does not manage or control the underlying cloud
                   infrastructure including network, servers, operating systems, storage, or even individual
                   application capabilities, with the possible exception of limited user-specific application
                   configuration settings.
            Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto
                   the cloud infrastructure consumer-created or acquired applications created using
                   programming languages and tools supported by the provider. The consumer does not
                   manage or control the underlying cloud infrastructure including network, servers,
                   operating systems, or storage, but has control over the deployed applications and possibly
                   application hosting environment configurations.


1
    Typically through a pay-per-use business model.


                                                         2
Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision
             processing, storage, networks, and other fundamental computing resources where the
             consumer is able to deploy and run arbitrary software, which can include operating
             systems and applications. The consumer does not manage or control the underlying cloud
             infrastructure but has control over operating systems, storage, deployed applications, and
             possibly limited control of select networking components (e.g., host firewalls).

Deployment Models:

      Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed
              by the organization or a third party and may exist on premise or off premise.
      Community cloud. The cloud infrastructure is shared by several organizations and supports a
              specific community that has shared concerns (e.g., mission, security requirements, policy,
              and compliance considerations). It may be managed by the organizations or a third party
              and may exist on premise or off premise.
      Public cloud. The cloud infrastructure is made available to the general public or a large industry
              group and is owned by an organization selling cloud services.
      Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private,
              community, or public) that remain unique entities but are bound together by standardized
              or proprietary technology that enables data and application portability (e.g., cloud
              bursting for load balancing between clouds).




                                                  3

More Related Content

What's hot

Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middlewareLeonardo Bruni
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Serviceswhite paper
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 

What's hot (19)

Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
176
176176
176
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middleware
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 

Similar to The United States National Institute of Standards and Technology (NIST) has put together a definition that almost all “EXPERTS” can agree upon for Definition of Cloud Computing

NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
NIST Definition for Cloud Computing
NIST Definition for Cloud ComputingNIST Definition for Cloud Computing
NIST Definition for Cloud ComputingAjay Ohri
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsi-SCOOP
 
Zálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologiíZálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologiíMarketingArrowECS_CZ
 
«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...Victor Gridnev
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...
Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...
Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...ActiveCloud
 
Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...
Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...
Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...ActiveCloud
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)David Sweigert
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101 Predrag Mitrovic
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 

Similar to The United States National Institute of Standards and Technology (NIST) has put together a definition that almost all “EXPERTS” can agree upon for Definition of Cloud Computing (20)

NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
NIST Definition for Cloud Computing
NIST Definition for Cloud ComputingNIST Definition for Cloud Computing
NIST Definition for Cloud Computing
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitions
 
Nist cloud comp
Nist cloud compNist cloud comp
Nist cloud comp
 
Zálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologiíZálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologií
 
«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...
Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...
Основы построения облачной IT-инфраструктуры. Особенности и преимущества суще...
 
Paper1
Paper1Paper1
Paper1
 
Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...
Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...
Реализация частной и гибридной облачной IT-инфраструктуры предприятия на осно...
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 

More from Michael Hudak

Arrow Reference Letter, I thank you Arrow Electronics
Arrow Reference Letter, I thank you Arrow ElectronicsArrow Reference Letter, I thank you Arrow Electronics
Arrow Reference Letter, I thank you Arrow ElectronicsMichael Hudak
 
Net App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market SolutionsNet App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market SolutionsMichael Hudak
 
Ar Accelerating Converged Infrastructure With Flexpod
Ar Accelerating Converged Infrastructure With FlexpodAr Accelerating Converged Infrastructure With Flexpod
Ar Accelerating Converged Infrastructure With FlexpodMichael Hudak
 
May 2011 Storage Choices For Virtual Server Forrester Survey
May 2011 Storage Choices For Virtual Server Forrester SurveyMay 2011 Storage Choices For Virtual Server Forrester Survey
May 2011 Storage Choices For Virtual Server Forrester SurveyMichael Hudak
 
Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...
Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...
Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...Michael Hudak
 
Oak Hills School District Does The Math With A 1.27 Million Dollar Savings
Oak Hills School District Does The Math With A 1.27 Million Dollar SavingsOak Hills School District Does The Math With A 1.27 Million Dollar Savings
Oak Hills School District Does The Math With A 1.27 Million Dollar SavingsMichael Hudak
 
Champion Solutions Group VDI Advisory Services
Champion Solutions Group VDI Advisory ServicesChampion Solutions Group VDI Advisory Services
Champion Solutions Group VDI Advisory ServicesMichael Hudak
 
NetApp Awards and Recognitions
NetApp Awards and RecognitionsNetApp Awards and Recognitions
NetApp Awards and RecognitionsMichael Hudak
 
Gartner Magic Quadrant Midrange High End Nas Mar11
Gartner Magic Quadrant Midrange High End Nas Mar11Gartner Magic Quadrant Midrange High End Nas Mar11
Gartner Magic Quadrant Midrange High End Nas Mar11Michael Hudak
 
Crn Tech Elite 250 List
Crn Tech Elite 250 ListCrn Tech Elite 250 List
Crn Tech Elite 250 ListMichael Hudak
 
Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...
Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...
Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...Michael Hudak
 
Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]Michael Hudak
 
Champion Solutions Group Atlanta Solutions Lab Partners
Champion Solutions Group Atlanta Solutions Lab   PartnersChampion Solutions Group Atlanta Solutions Lab   Partners
Champion Solutions Group Atlanta Solutions Lab PartnersMichael Hudak
 
Rem NetApp Champion Case Study
Rem NetApp Champion Case StudyRem NetApp Champion Case Study
Rem NetApp Champion Case StudyMichael Hudak
 
Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...
Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...
Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...Michael Hudak
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetMichael Hudak
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201Michael Hudak
 
50,000 Seat V Mware View Deployment
50,000 Seat V Mware View Deployment50,000 Seat V Mware View Deployment
50,000 Seat V Mware View DeploymentMichael Hudak
 
Storage Efficiency Customer Success Stories Sept 2010 power point
Storage Efficiency Customer Success Stories Sept 2010 power pointStorage Efficiency Customer Success Stories Sept 2010 power point
Storage Efficiency Customer Success Stories Sept 2010 power pointMichael Hudak
 
Storage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsStorage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsMichael Hudak
 

More from Michael Hudak (20)

Arrow Reference Letter, I thank you Arrow Electronics
Arrow Reference Letter, I thank you Arrow ElectronicsArrow Reference Letter, I thank you Arrow Electronics
Arrow Reference Letter, I thank you Arrow Electronics
 
Net App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market SolutionsNet App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market Solutions
 
Ar Accelerating Converged Infrastructure With Flexpod
Ar Accelerating Converged Infrastructure With FlexpodAr Accelerating Converged Infrastructure With Flexpod
Ar Accelerating Converged Infrastructure With Flexpod
 
May 2011 Storage Choices For Virtual Server Forrester Survey
May 2011 Storage Choices For Virtual Server Forrester SurveyMay 2011 Storage Choices For Virtual Server Forrester Survey
May 2011 Storage Choices For Virtual Server Forrester Survey
 
Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...
Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...
Great Article, Thanks Paul Feresten, Sr. Product Marketing Manager, and Rajes...
 
Oak Hills School District Does The Math With A 1.27 Million Dollar Savings
Oak Hills School District Does The Math With A 1.27 Million Dollar SavingsOak Hills School District Does The Math With A 1.27 Million Dollar Savings
Oak Hills School District Does The Math With A 1.27 Million Dollar Savings
 
Champion Solutions Group VDI Advisory Services
Champion Solutions Group VDI Advisory ServicesChampion Solutions Group VDI Advisory Services
Champion Solutions Group VDI Advisory Services
 
NetApp Awards and Recognitions
NetApp Awards and RecognitionsNetApp Awards and Recognitions
NetApp Awards and Recognitions
 
Gartner Magic Quadrant Midrange High End Nas Mar11
Gartner Magic Quadrant Midrange High End Nas Mar11Gartner Magic Quadrant Midrange High End Nas Mar11
Gartner Magic Quadrant Midrange High End Nas Mar11
 
Crn Tech Elite 250 List
Crn Tech Elite 250 ListCrn Tech Elite 250 List
Crn Tech Elite 250 List
 
Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...
Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...
Todd Yohoy- Cincinnati, Ohio Superintendent explains how this district is usi...
 
Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]
 
Champion Solutions Group Atlanta Solutions Lab Partners
Champion Solutions Group Atlanta Solutions Lab   PartnersChampion Solutions Group Atlanta Solutions Lab   Partners
Champion Solutions Group Atlanta Solutions Lab Partners
 
Rem NetApp Champion Case Study
Rem NetApp Champion Case StudyRem NetApp Champion Case Study
Rem NetApp Champion Case Study
 
Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...
Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...
Gartner Magic Quadrant Nov 15, 2010 for Midrange and High End Modular Disk Ar...
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201
 
50,000 Seat V Mware View Deployment
50,000 Seat V Mware View Deployment50,000 Seat V Mware View Deployment
50,000 Seat V Mware View Deployment
 
Storage Efficiency Customer Success Stories Sept 2010 power point
Storage Efficiency Customer Success Stories Sept 2010 power pointStorage Efficiency Customer Success Stories Sept 2010 power point
Storage Efficiency Customer Success Stories Sept 2010 power point
 
Storage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsStorage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows Enfironments
 

The United States National Institute of Standards and Technology (NIST) has put together a definition that almost all “EXPERTS” can agree upon for Definition of Cloud Computing

  • 1. Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance
  • 2. NIST Special Publication 800-145 The NIST Definition of Cloud Computing (Draft) (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2011 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director
  • 3. Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-145 (Draft) 7 pages (January. 2011) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. ii
  • 4. Acknowledgements The authors Peter Mell and Timothy Grance of the National Institute of Standards and Technology (NIST) would like to thank the many experts in industry and government who contributed their thoughts to the creation and review of this definition. We especially acknowledge Murugiah Souppaya and Lee Badger, also of NIST, whose advice and technical insight assisted this effort. Additional acknowledgements will be added upon the final publication of this guideline. iii
  • 5. 1. Introduction 1.1 Authority The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations and assets; but such standards and guidelines shall not apply to national security systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), “Securing Agency Information Systems,” as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in A-130, Appendix III. This guideline has been prepared for use by Federal agencies. It may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright, though attribution is desired. Nothing in this document should be taken to contradict standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority, nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other Federal official. 1.2 Purpose and Scope The purpose of this publication is to provide the NIST definition of cloud computing. NIST intends this informal definition to enhance and inform the public debate on cloud computing. Cloud computing is still an evolving paradigm. Its definition, use cases, underlying technologies, issues, risks, and benefits will be refined and better understood with a spirited debate by the public and private sectors. This definition, its attributes, characteristics, and underlying rationale will evolve over time. 1.3 Audience The intended audience is people adopting the cloud computing model or providing cloud services. 1
  • 6. 2. The NIST Definition of Cloud Computing Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. Essential Characteristics: On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs). Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out, and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability1 at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. Service Models: Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. 1 Typically through a pay-per-use business model. 2
  • 7. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Deployment Models: Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds). 3