SlideShare une entreprise Scribd logo
1  sur  46
Asmaa Ibrahim
Part 2: Fundamental Concepts and
Models
3/17/20141
Roles and Boundaries
3/17/20142
Cloud Provider
The organization that provides cloud-based IT resources is the cloud
provider. When assuming the role of cloud provider, an organization is
responsible for making cloud services available to cloud consumers, as per
agreed upon SLA guarantees.
Cloud providers normally own the IT resources that are made available for
lease by cloud consumers; however, some cloud providers also “resell” IT
resources leased from other cloud providers.
3/17/20143
Cloud Consumer
A cloud consumer is an organization (or a human) that has a formal
contract or arrangement with a cloud provider to use IT resources
made available by the cloud provider
3/17/20144
Cloud Service Owner
 The person or organization that legally owns a cloud
service is called a cloud service owner.
 The cloud service owner can be the cloud consumer, or
the cloud provider that owns the cloud within which the
cloud service resides.
 For example, either the cloud consumer of Cloud X or
the cloud provider of Cloud X could own Cloud Service
A (Figures 2.2 and 2.3).
3/17/20145
Figure 2.2
A cloud consumer can be a cloud service
owner when it deploys its own service in
a cloud.
Figure 2.3
A cloud provider becomes a cloud service
owner if it deploys its own cloud service,
typically for other cloud consumers to
use.
3/17/20146
Cloud Resource Administrator
A cloud resource administrator is the person or organization
responsible for administering a cloud-based IT resource (including
cloud services).
The cloud resource administrator can be (or belong to) the cloud
consumer or cloud provider of the cloud within which
the cloud service resides.
Alternatively, it can be (or belong to) a third-party organization
contracted to administer the cloud-based IT resource.
3/17/20147
For example, a cloud service owner can contract a cloud
resource administrator to administer a cloud service
(Figures 2.4 and 2.5).
3/17/20148
Figure 2.4
A cloud resource administrator can be with a cloud consumer organization and administer
remotely accessible IT resources that belong to the cloud consumer.
3/17/20149
Figure 2.5
A cloud resource administrator can be with a cloud provider organization for which it can
administer the cloud provider’s internally and externally available IT resources.
3/17/201410
Additional Roles
3/17/201411
Cloud Auditor
 A third-party (often accredited) that conducts independent
assessments of cloud environments assumes the role of the cloud
auditor..
 The typical responsibilities associated with this role include the
evaluation of security controls, privacy impacts, and
performance..
 The main purpose of the cloud auditor role is to provide an
unbiased assessment (and possible endorsement) of a cloud
environment to help strengthen the trust relationship between
cloud consumers and cloud providers.
3/17/201412
Cloud Broker
 This role is assumed by a party that assumes the
responsibility of managing and negotiating the usage of
cloud services between cloud consumers and cloud
providers.
 Mediation services provided by cloud brokers include
service intermediation, aggregation, and arbitrage.
3/17/201413
Cloud Carrier
 The party responsible for providing the wire-level
connectivity between cloud consumers and cloud
providers assumes the role of the cloud carrier.This role
is often assumed by network and telecommunication
providers.
3/17/201414
Boundaries
3/17/201415
Organizational Boundary
 An organizational boundary represents the physical perimeter that
surrounds a set of IT resources that are owned and governed by an organization.
• The organizational boundary
does not represent the
boundary of an actual
organization, only an
organizational set of IT assets
and IT resources. Similarly,
clouds have an organizational
boundary (Figure2.6).
3/17/201416
Trust Boundary
 A trust boundary is a logical perimeter that typically spans beyond physical
boundaries to represent the extent to which IT resources are trusted (Figure
2.7).
Figure 4.7
An extended trust boundary encompasses the organizational boundaries of the cloud provider
and the cloud consumer. 3/17/201417
Cloud Characteristics
 On-demand usage
 Ubiquitous access
 Multitenancy (and resource pooling)
 Elasticity
 Measured usage
 Resiliency
3/17/201418
Multitenancy
3/17/201419
Figure 2.8
In a single-tenant environment, each cloud consumer has a separate IT resource instance.
3/17/201420
Figure 2.9
In a multitenant environment, a single instance of an IT resource, such as a cloud storage device,
serves multiple consumers. 3/17/201421
Resiliency
3/17/201422
Figure 2.10
A resilient system in which Cloud B hosts a redundant implementation of Cloud ServiceA to provide
failover in case Cloud ServiceA on Cloud A becomes unavailable.
3/17/201423
Cloud Delivery Models
3/17/201424
Cloud Delivery Models
Infrastructure-as-a-Service (IaaS) Amazon EC2
and S3,Terremark Enterprise Cloud,Windows Live
Skydrive and Rackspace Cloud
Software-as-a-Service (SaaS)  (Salesforce CRM,
Google Docs, etc).
Platform-as-a-Service (PaaS)  MicrosoftAzure,
Force and GoogleApp engine
3/17/201425
Note
 Many specialized variations of the three base cloud delivery
models have emerged, each comprised of a distinct combination of
IT resources. Some examples include
 Storage-as-a-Service
 Database-as-a-Service
 Security-as-a-Service
 Communication-as-a-Service
 Integration-as-a-Service
 Testing-as-a-Service
 Process-as-a-Service
3/17/201426
Infrastructure-as-a-Service (IaaS)
Figure 2.11
A cloud consumer is using a virtual server within an IaaS environment. Cloud consumers are provided with a range of
contractual guarantees by the cloud provider, pertaining to characteristics such as capacity, performance, and availability.
3/17/201427
Platform-as-a-Service (PaaS)
Figure 212
A cloud consumer is accessing a ready-made PaaS environment.The question mark indicates that the cloud
consumer is intentionally shielded from the implementation details of the platform. 3/17/201428
Software-as-a-Service (SaaS)
Figure 2.13
The cloud service consumer is given access the cloud service contract, but not to any underlying IT
resources or implementation details.
3/17/201429
Table 2.1
A comparison of typical cloud delivery model control levels.
3/17/201430
Table 2.2
Typical activities carried out by cloud consumers and cloud providers in relation to the
cloud delivery models.
3/17/201431
Combining Cloud Delivery Models
3/17/201432
IaaS + PaaS
Figure 2.14
A PaaS environment based on the IT resources provided by an underlying IaaS environment.
3/17/201433
Figure 2.15
An example of a contract between Cloud Providers X andY, in which services offered by Cloud Provider X are physically
hosted on virtual servers belonging to Cloud ProviderY. Sensitive data that is legally required to stay in a specific region is
physically kept in Cloud B, which is physically located in that region.
3/17/201434
IaaS + PaaS + SaaS
Figure 2.16
A simple layered view of an
architecture comprised of IaaS and
PaaS environments hosting three
SaaS cloud service
implementations.
3/17/201435
Cloud Deployment Models
3/17/201436
Cloud Deployment Models
 A cloud deployment model represents a specific type of
cloud environment, primarily distinguished by ownership,
size, and access.
 There are four common cloud deployment models:
 Public cloud
 Community cloud
 Private cloud
 Hybrid cloud
3/17/201437
Public Clouds
 A public cloud is a publicly accessible cloud environment owned by
a third-party cloud provider.
 The IT resources on public clouds are usually provisioned via the
previously described cloud delivery models and are generally
offered to cloud consumers at a cost or are commercialized via
other avenues (such as advertisement).
 The cloud provider is responsible for the creation and on-going
maintenance of the public cloud and its IT resources.
3/17/201438
A partial view of the public cloud
landscape, highlighting some of the
primary vendors in the
marketplace.
Figure 2.17
Organizations act as cloud consumers when accessing cloud
services and IT resources made available by different cloud
providers.
3/17/201439
Community Clouds
 A community cloud is similar to a public cloud except that its
access is limited to a specific community of cloud consumers.
 The community cloud may be jointly owned by the
community members or by a third-party cloud provider that
provisions a public cloud with limited access.
 The member cloud consumers of the community typically
share the responsibility for defining and evolving the
community cloud
3/17/201440
Figure 2.18
An example of a “community” of organizations accessing IT resources from a community cloud.
3/17/201441
Private Clouds
 A private cloud is owned by a single organization.
 Private clouds enable an organization to use cloud computing
technology as a means of centralizing access to IT resources
by different parts, locations, or departments of the
organization
3/17/201442
Figure 2.19
A cloud service consumer in the organization’s on-premise environment accesses a cloud service hosted on the
same organization’s private cloud via a virtual private network.
3/17/201443
Hybrid Clouds
 A hybrid cloud is a cloud environment comprised of two or
more different cloud deployment models.
 For example, a cloud consumer may choose to deploy cloud
services processing sensitive data to a private cloud and
other, less sensitive cloud services to a public cloud.The
result of this combination is a hybrid deployment model
3/17/201444
Figure 2.20
An organization using a hybrid cloud
architecture that utilizes both a private and
public cloud.
3/17/201445
Other Cloud Deployment Models
 Additional variations of the four base cloud deployment
models can exist. Examples include:
 Virtual Private Cloud –Also known as a “dedicated cloud” or
“hosted cloud,” this model results in a self-contained cloud
environment hosted and managed by a public cloud provider,
and made available to a cloud consumer.
 Inter-Cloud –This model is based on an architecture
comprised of two or more inter-connected clouds.
3/17/201446

Contenu connexe

Tendances

Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
introduction to cloudsim
introduction to cloudsimintroduction to cloudsim
introduction to cloudsimJassika
 
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...Govt. P.G. College Dharamshala
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructureGaurav Jain
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computingAsmaa Ibrahim
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
CloudSim : Introduction and Basic Programming Syntax
CloudSim : Introduction and Basic Programming SyntaxCloudSim : Introduction and Basic Programming Syntax
CloudSim : Introduction and Basic Programming SyntaxVikas Chouhan
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperabilitygaurav jain
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Cloud sim pptx
Cloud sim pptxCloud sim pptx
Cloud sim pptxMD Redaan
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 

Tendances (20)

Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
introduction to cloudsim
introduction to cloudsimintroduction to cloudsim
introduction to cloudsim
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructure
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
CloudSim : Introduction and Basic Programming Syntax
CloudSim : Introduction and Basic Programming SyntaxCloudSim : Introduction and Basic Programming Syntax
CloudSim : Introduction and Basic Programming Syntax
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Cloud sim pptx
Cloud sim pptxCloud sim pptx
Cloud sim pptx
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

En vedette

Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud securityAsmaa Ibrahim
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptAsmaa Ibrahim
 
The basic concepts of information architecture
The basic concepts of information architectureThe basic concepts of information architecture
The basic concepts of information architectureTigran Zargaryan
 
Technology Forecasting Methods
Technology Forecasting MethodsTechnology Forecasting Methods
Technology Forecasting MethodsAsmaa Ibrahim
 
Thesis presentation 2013
Thesis presentation 2013Thesis presentation 2013
Thesis presentation 2013ROHIT SINGLA
 
Architecture drawing presentation
Architecture drawing presentationArchitecture drawing presentation
Architecture drawing presentationCarlson Ko
 
Generating Architectural Concepts & Design Ideas
Generating Architectural Concepts & Design IdeasGenerating Architectural Concepts & Design Ideas
Generating Architectural Concepts & Design IdeasWan Muhammad / Asas-Khu™
 
An introduction to fundamental architecture concepts
An introduction to fundamental architecture conceptsAn introduction to fundamental architecture concepts
An introduction to fundamental architecture conceptswweinmeyer79
 

En vedette (12)

Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise ppt
 
Hosing types
Hosing typesHosing types
Hosing types
 
The basic concepts of information architecture
The basic concepts of information architectureThe basic concepts of information architecture
The basic concepts of information architecture
 
Sahara RDO part1
Sahara RDO part1Sahara RDO part1
Sahara RDO part1
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
Technology Forecasting Methods
Technology Forecasting MethodsTechnology Forecasting Methods
Technology Forecasting Methods
 
Concept sheet - Thesis
Concept sheet - ThesisConcept sheet - Thesis
Concept sheet - Thesis
 
Thesis presentation 2013
Thesis presentation 2013Thesis presentation 2013
Thesis presentation 2013
 
Architecture drawing presentation
Architecture drawing presentationArchitecture drawing presentation
Architecture drawing presentation
 
Generating Architectural Concepts & Design Ideas
Generating Architectural Concepts & Design IdeasGenerating Architectural Concepts & Design Ideas
Generating Architectural Concepts & Design Ideas
 
An introduction to fundamental architecture concepts
An introduction to fundamental architecture conceptsAn introduction to fundamental architecture concepts
An introduction to fundamental architecture concepts
 

Similaire à Fundamental concepts and models

Presentation clod.pptx
Presentation clod.pptxPresentation clod.pptx
Presentation clod.pptxsarahabbas40
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxsarahabbas40
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud ProviderSonali Parab
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
We are going to explore the Web regarding cloud service level agre.docx
We are going to explore the Web regarding cloud service level agre.docxWe are going to explore the Web regarding cloud service level agre.docx
We are going to explore the Web regarding cloud service level agre.docxendawalling
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptxGopalThapa9
 
E041212224
E041212224E041212224
E041212224IOSR-JEN
 

Similaire à Fundamental concepts and models (20)

CLOUD STORAGE.pptx
CLOUD STORAGE.pptxCLOUD STORAGE.pptx
CLOUD STORAGE.pptx
 
Presentation clod.pptx
Presentation clod.pptxPresentation clod.pptx
Presentation clod.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
ITM711 M2.pdf
ITM711  M2.pdfITM711  M2.pdf
ITM711 M2.pdf
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
ITM711-M2.pdf
ITM711-M2.pdfITM711-M2.pdf
ITM711-M2.pdf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
We are going to explore the Web regarding cloud service level agre.docx
We are going to explore the Web regarding cloud service level agre.docxWe are going to explore the Web regarding cloud service level agre.docx
We are going to explore the Web regarding cloud service level agre.docx
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
 
J0423066069
J0423066069J0423066069
J0423066069
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
E041212224
E041212224E041212224
E041212224
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 

Fundamental concepts and models

  • 1. Asmaa Ibrahim Part 2: Fundamental Concepts and Models 3/17/20141
  • 3. Cloud Provider The organization that provides cloud-based IT resources is the cloud provider. When assuming the role of cloud provider, an organization is responsible for making cloud services available to cloud consumers, as per agreed upon SLA guarantees. Cloud providers normally own the IT resources that are made available for lease by cloud consumers; however, some cloud providers also “resell” IT resources leased from other cloud providers. 3/17/20143
  • 4. Cloud Consumer A cloud consumer is an organization (or a human) that has a formal contract or arrangement with a cloud provider to use IT resources made available by the cloud provider 3/17/20144
  • 5. Cloud Service Owner  The person or organization that legally owns a cloud service is called a cloud service owner.  The cloud service owner can be the cloud consumer, or the cloud provider that owns the cloud within which the cloud service resides.  For example, either the cloud consumer of Cloud X or the cloud provider of Cloud X could own Cloud Service A (Figures 2.2 and 2.3). 3/17/20145
  • 6. Figure 2.2 A cloud consumer can be a cloud service owner when it deploys its own service in a cloud. Figure 2.3 A cloud provider becomes a cloud service owner if it deploys its own cloud service, typically for other cloud consumers to use. 3/17/20146
  • 7. Cloud Resource Administrator A cloud resource administrator is the person or organization responsible for administering a cloud-based IT resource (including cloud services). The cloud resource administrator can be (or belong to) the cloud consumer or cloud provider of the cloud within which the cloud service resides. Alternatively, it can be (or belong to) a third-party organization contracted to administer the cloud-based IT resource. 3/17/20147
  • 8. For example, a cloud service owner can contract a cloud resource administrator to administer a cloud service (Figures 2.4 and 2.5). 3/17/20148
  • 9. Figure 2.4 A cloud resource administrator can be with a cloud consumer organization and administer remotely accessible IT resources that belong to the cloud consumer. 3/17/20149
  • 10. Figure 2.5 A cloud resource administrator can be with a cloud provider organization for which it can administer the cloud provider’s internally and externally available IT resources. 3/17/201410
  • 12. Cloud Auditor  A third-party (often accredited) that conducts independent assessments of cloud environments assumes the role of the cloud auditor..  The typical responsibilities associated with this role include the evaluation of security controls, privacy impacts, and performance..  The main purpose of the cloud auditor role is to provide an unbiased assessment (and possible endorsement) of a cloud environment to help strengthen the trust relationship between cloud consumers and cloud providers. 3/17/201412
  • 13. Cloud Broker  This role is assumed by a party that assumes the responsibility of managing and negotiating the usage of cloud services between cloud consumers and cloud providers.  Mediation services provided by cloud brokers include service intermediation, aggregation, and arbitrage. 3/17/201413
  • 14. Cloud Carrier  The party responsible for providing the wire-level connectivity between cloud consumers and cloud providers assumes the role of the cloud carrier.This role is often assumed by network and telecommunication providers. 3/17/201414
  • 16. Organizational Boundary  An organizational boundary represents the physical perimeter that surrounds a set of IT resources that are owned and governed by an organization. • The organizational boundary does not represent the boundary of an actual organization, only an organizational set of IT assets and IT resources. Similarly, clouds have an organizational boundary (Figure2.6). 3/17/201416
  • 17. Trust Boundary  A trust boundary is a logical perimeter that typically spans beyond physical boundaries to represent the extent to which IT resources are trusted (Figure 2.7). Figure 4.7 An extended trust boundary encompasses the organizational boundaries of the cloud provider and the cloud consumer. 3/17/201417
  • 18. Cloud Characteristics  On-demand usage  Ubiquitous access  Multitenancy (and resource pooling)  Elasticity  Measured usage  Resiliency 3/17/201418
  • 20. Figure 2.8 In a single-tenant environment, each cloud consumer has a separate IT resource instance. 3/17/201420
  • 21. Figure 2.9 In a multitenant environment, a single instance of an IT resource, such as a cloud storage device, serves multiple consumers. 3/17/201421
  • 23. Figure 2.10 A resilient system in which Cloud B hosts a redundant implementation of Cloud ServiceA to provide failover in case Cloud ServiceA on Cloud A becomes unavailable. 3/17/201423
  • 25. Cloud Delivery Models Infrastructure-as-a-Service (IaaS) Amazon EC2 and S3,Terremark Enterprise Cloud,Windows Live Skydrive and Rackspace Cloud Software-as-a-Service (SaaS)  (Salesforce CRM, Google Docs, etc). Platform-as-a-Service (PaaS)  MicrosoftAzure, Force and GoogleApp engine 3/17/201425
  • 26. Note  Many specialized variations of the three base cloud delivery models have emerged, each comprised of a distinct combination of IT resources. Some examples include  Storage-as-a-Service  Database-as-a-Service  Security-as-a-Service  Communication-as-a-Service  Integration-as-a-Service  Testing-as-a-Service  Process-as-a-Service 3/17/201426
  • 27. Infrastructure-as-a-Service (IaaS) Figure 2.11 A cloud consumer is using a virtual server within an IaaS environment. Cloud consumers are provided with a range of contractual guarantees by the cloud provider, pertaining to characteristics such as capacity, performance, and availability. 3/17/201427
  • 28. Platform-as-a-Service (PaaS) Figure 212 A cloud consumer is accessing a ready-made PaaS environment.The question mark indicates that the cloud consumer is intentionally shielded from the implementation details of the platform. 3/17/201428
  • 29. Software-as-a-Service (SaaS) Figure 2.13 The cloud service consumer is given access the cloud service contract, but not to any underlying IT resources or implementation details. 3/17/201429
  • 30. Table 2.1 A comparison of typical cloud delivery model control levels. 3/17/201430
  • 31. Table 2.2 Typical activities carried out by cloud consumers and cloud providers in relation to the cloud delivery models. 3/17/201431
  • 32. Combining Cloud Delivery Models 3/17/201432
  • 33. IaaS + PaaS Figure 2.14 A PaaS environment based on the IT resources provided by an underlying IaaS environment. 3/17/201433
  • 34. Figure 2.15 An example of a contract between Cloud Providers X andY, in which services offered by Cloud Provider X are physically hosted on virtual servers belonging to Cloud ProviderY. Sensitive data that is legally required to stay in a specific region is physically kept in Cloud B, which is physically located in that region. 3/17/201434
  • 35. IaaS + PaaS + SaaS Figure 2.16 A simple layered view of an architecture comprised of IaaS and PaaS environments hosting three SaaS cloud service implementations. 3/17/201435
  • 37. Cloud Deployment Models  A cloud deployment model represents a specific type of cloud environment, primarily distinguished by ownership, size, and access.  There are four common cloud deployment models:  Public cloud  Community cloud  Private cloud  Hybrid cloud 3/17/201437
  • 38. Public Clouds  A public cloud is a publicly accessible cloud environment owned by a third-party cloud provider.  The IT resources on public clouds are usually provisioned via the previously described cloud delivery models and are generally offered to cloud consumers at a cost or are commercialized via other avenues (such as advertisement).  The cloud provider is responsible for the creation and on-going maintenance of the public cloud and its IT resources. 3/17/201438
  • 39. A partial view of the public cloud landscape, highlighting some of the primary vendors in the marketplace. Figure 2.17 Organizations act as cloud consumers when accessing cloud services and IT resources made available by different cloud providers. 3/17/201439
  • 40. Community Clouds  A community cloud is similar to a public cloud except that its access is limited to a specific community of cloud consumers.  The community cloud may be jointly owned by the community members or by a third-party cloud provider that provisions a public cloud with limited access.  The member cloud consumers of the community typically share the responsibility for defining and evolving the community cloud 3/17/201440
  • 41. Figure 2.18 An example of a “community” of organizations accessing IT resources from a community cloud. 3/17/201441
  • 42. Private Clouds  A private cloud is owned by a single organization.  Private clouds enable an organization to use cloud computing technology as a means of centralizing access to IT resources by different parts, locations, or departments of the organization 3/17/201442
  • 43. Figure 2.19 A cloud service consumer in the organization’s on-premise environment accesses a cloud service hosted on the same organization’s private cloud via a virtual private network. 3/17/201443
  • 44. Hybrid Clouds  A hybrid cloud is a cloud environment comprised of two or more different cloud deployment models.  For example, a cloud consumer may choose to deploy cloud services processing sensitive data to a private cloud and other, less sensitive cloud services to a public cloud.The result of this combination is a hybrid deployment model 3/17/201444
  • 45. Figure 2.20 An organization using a hybrid cloud architecture that utilizes both a private and public cloud. 3/17/201445
  • 46. Other Cloud Deployment Models  Additional variations of the four base cloud deployment models can exist. Examples include:  Virtual Private Cloud –Also known as a “dedicated cloud” or “hosted cloud,” this model results in a self-contained cloud environment hosted and managed by a public cloud provider, and made available to a cloud consumer.  Inter-Cloud –This model is based on an architecture comprised of two or more inter-connected clouds. 3/17/201446