SlideShare une entreprise Scribd logo
1  sur  20
Cloud Models and Platforms
A Working Definition of Cloud Computing
 Cloud computing is a model for enabling convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management effort or
service provider interaction.
 This cloud model promotes availability and is composed of five essential characteristics,
three service models, and four deployment models.
.
Objectives of Cloud Computing
 Elasticity: Ability to scale virtual machines resources up or down
 On-demand usage: Ability to add or delete computing power (CPU,
memory), and storage according to demand
 Pay-per-use: Pay only for what you use
 Multitenancy: Ability to have multiplecustomers access their servers in the
data center in an isolated manner
.
5 Essential Cloud Characteristics
 On-demand self-service
 Broad network access
 Resource pooling
 Location independence
 Rapid elasticity
 Measured service
.
3 Cloud Service Models
 Cloud Software as a Service (SaaS)
 The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and
accessible from various client devices through a thin client interface such as a Web browser (e.g., web-based email). The
consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage,
or even individual application capabilities, with the possible exception of limited user-specific application configuration
settings.
 Cloud Platform as a Service (PaaS)
 The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created
applications using programming languages and tools supported by the provider (e.g., Java, Python, .Net). The
consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or
storage, but the consumer has control over the deployed applications and possibly application hosting environment
configurations.
 Cloud Infrastructure as a Service (IaaS)
 The capability provided to the consumer is to rent processing, storage, networks, and other fundamental
computing resources where the consumer is able to deploy and run arbitrary software, which can include operating
systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control
over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load
balancers).
 To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics
.
Service Model Architectures
.
Saas, PaaS, IaaS
.
3 Features of Mature SaaS Applications
 SaaS is hosting applications on the Internet as a service (both consumer and enterprise)
 Features of Mature Saas applications:
 Scalable
 Handle growing amounts of work in a graceful manner
 Multi-tenancy
 One application instance may be serving hundreds of companies
 Opposite of multi-instance where each customer is provisioned their own
server running one instance
 Metadata driven configurability
 Instead of customizing the application for a customer (requiring code
changes), one allows the user to configure the application through metadata
.
SaaS Maturity Levels
 Level 1: Ad-Hoc/Custom
 Level 2: Configurable
 Level 3: Configurable,
Multi-Tenant-Efficient
 Level 4: Scalable,
Configurable,
Multi-Tenant-Efficient
Source: Microsoft MSDN Architecture Center
.
3 Cloud Deployment Models Private cloud
 The cloud infrastructure is operated solely for an organization. It may be
managed by the organization or a third party and may exist on premise or off
premise.
 Public cloud
 Mega-scale cloud infrastructure is made available to the general public or a
large industry group and is owned by an organization selling cloud services.
 Hybrid cloud
 The cloud infrastructure is a composition of two or more clouds (private or
public) that remain unique entities but are bound together by standardized or
proprietary technology that enables data and application portability
.
Common Cloud Characteristics
 Cloud computing often leverages:
 Massive scale
 Homogeneity
 Virtualization
 Low cost software
 Geographic distribution
 Advanced security technologies
.
Security is the Major Issue
 Cloud computing often leverages:
 Massive scale
 Homogeneity
 Virtualization
 Low cost software
 Geographic distribution
 Advanced security technologies
.
Top Motivators for Adopting Cloud Computing
Source: IBM Tech Trends Report 2011
.
Cloud Security Advantages
 Shifting public data to a external cloud reduces the exposure of the internal sensitive
data
 Dedicated Security Team
 Greater Investment in Security Infrastructure
 Cloud homogeneity makes security auditing/testing simpler
 Clouds enable automated security management and real-time detection of system
tampering
 Rapid Re-Constitution of Services
 Redundancy / Disaster Recovery
.
Cloud Security Challenges
 Trusting vendor’s security model
 Multi-tenancy
 Data ownership issues
 QoS guarantees
 Attraction to hackers (high-value target)
Security of virtual OSs in the cloud
 Obtaining support from cloud vendor for security related investigations
Cloud Security Challenges Indirect administrator accountability
 Proprietary cloud vendor implementations can’t be examined
 Loss of physical control
 Possibility for massive outages
 Encryption needs for cloud computing
 Encrypting access to the cloud resource control interface
 Encrypting administrative access to OS instances
 Encrypting access to applications
 Encrypting application data at rest
.
Typical use case of provisioning a virtual machine
.
.
Typical use case of provisioning a virtual machine
 The management environment consists of components required to effectively
deliver services to consumers. The various services offered span from image
management and provisioning of machines to billing, accounting, metering,
and more. The cloud management system (CMS) forms the heart of the
management environment along with the hardware components.
 The managed environment is composed of physical servers and in turn the
virtual servers that are “managed-by” the management environment. The
servers in the managed environment belong to a customer pool; where
customers or users can create virtual servers on-demand and scale up/down
as needed.
 The management environment controls and processes all incoming requests
to create, destroy, manage, and monitor virtual machines and storage devices.
In the context of a public cloud, the users get direct access to the VMs created
in the managed environment, through the Internet. They can access the
machines after they are provisioned by the management layer.
.
Typical use case of provisioning a virtual machine
The previous figure describes the following actions:
1. User makes a request to create a VM by logging onto the cloud portal.
2. The request is intercepted by the request manager and is forwarded to the
management environment.
3. The management environment, on receiving the request, interprets it and applies
to it provisioning logic to create a VM from the set of available physical servers.
4. External storage is attached to the VM from a storage area network (SAN) store
during provisioning in addition to the local storage.
5. After the VM is provisioned and ready to use, the user is notified of this
information and finally gains total control of the VM. The user can access this VM
through the public Internet because the VM has a public IP address (e.g. through
SSH).
.
Cloud Ecosystem
Figure. The cloud ecosystem for building private clouds. (a) Cloud consumers need flexible infrastructure on demand. (b) Cloud
management provides remote and secure interfaces for creating, controlling, and monitoring virtualized resources on an
infrastructure-as-a-service cloud. (c) Virtual infrastructure (VI) management provides primitives to schedule and manage VMs
across multiple physical hosts. (d) VM managers provide simple primitives (start, stop, suspend) to manage VMs on a single
host.
Figure from Virtual Infrastructure Management in Private and Hybrid Clouds, Internet Computing, September 2009.

Contenu connexe

Tendances

Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud service management
Cloud service managementCloud service management
Cloud service managementgaurav jain
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management AngelineR
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingAlexis Blandin
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
 
Cloud Technology Ecosystems
Cloud Technology EcosystemsCloud Technology Ecosystems
Cloud Technology EcosystemsJoseph Jacks
 

Tendances (20)

Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
Fundamental Cloud Architectures
Fundamental Cloud ArchitecturesFundamental Cloud Architectures
Fundamental Cloud Architectures
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Cloud Technology Ecosystems
Cloud Technology EcosystemsCloud Technology Ecosystems
Cloud Technology Ecosystems
 

Similaire à Cloud models and platforms

Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAlessandro Iudica
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computingkevnikool
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1ADEOLA ADISA
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxUtkarshKumar608655
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 

Similaire à Cloud models and platforms (20)

Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
 
Cloud management
Cloud managementCloud management
Cloud management
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
cloud computing
cloud computing cloud computing
cloud computing
 
What Is Cloud Computing?
What Is Cloud Computing?What Is Cloud Computing?
What Is Cloud Computing?
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 

Plus de Prabhat gangwar (20)

Middleware
MiddlewareMiddleware
Middleware
 
Pseudolocalization
PseudolocalizationPseudolocalization
Pseudolocalization
 
Mule anypoint studio
Mule anypoint studioMule anypoint studio
Mule anypoint studio
 
Mule anypoint platform
Mule anypoint platformMule anypoint platform
Mule anypoint platform
 
What is cluster analysis
What is cluster analysisWhat is cluster analysis
What is cluster analysis
 
clustering and load balancing
clustering and load balancingclustering and load balancing
clustering and load balancing
 
Middleware systems overview and introduction
Middleware systems overview and introductionMiddleware systems overview and introduction
Middleware systems overview and introduction
 
Restful api modeling language
Restful api modeling languageRestful api modeling language
Restful api modeling language
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule fundamentals
Mule fundamentalsMule fundamentals
Mule fundamentals
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Oracle vs-mulesoft-api-manager-features
Oracle vs-mulesoft-api-manager-featuresOracle vs-mulesoft-api-manager-features
Oracle vs-mulesoft-api-manager-features
 
Oracle real application_cluster
Oracle real application_clusterOracle real application_cluster
Oracle real application_cluster
 
Introducing adf business components
Introducing adf business componentsIntroducing adf business components
Introducing adf business components
 
File transfer methods
File transfer methodsFile transfer methods
File transfer methods
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
 
Bpm
BpmBpm
Bpm
 
Global warming
Global warmingGlobal warming
Global warming
 
Seo
SeoSeo
Seo
 
Vedic mathmetics
Vedic mathmeticsVedic mathmetics
Vedic mathmetics
 

Dernier

Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 

Dernier (20)

Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 

Cloud models and platforms

  • 1. Cloud Models and Platforms
  • 2. A Working Definition of Cloud Computing  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.  This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. .
  • 3. Objectives of Cloud Computing  Elasticity: Ability to scale virtual machines resources up or down  On-demand usage: Ability to add or delete computing power (CPU, memory), and storage according to demand  Pay-per-use: Pay only for what you use  Multitenancy: Ability to have multiplecustomers access their servers in the data center in an isolated manner .
  • 4. 5 Essential Cloud Characteristics  On-demand self-service  Broad network access  Resource pooling  Location independence  Rapid elasticity  Measured service .
  • 5. 3 Cloud Service Models  Cloud Software as a Service (SaaS)  The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and accessible from various client devices through a thin client interface such as a Web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.  Cloud Platform as a Service (PaaS)  The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created applications using programming languages and tools supported by the provider (e.g., Java, Python, .Net). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or storage, but the consumer has control over the deployed applications and possibly application hosting environment configurations.  Cloud Infrastructure as a Service (IaaS)  The capability provided to the consumer is to rent processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load balancers).  To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics .
  • 8. 3 Features of Mature SaaS Applications  SaaS is hosting applications on the Internet as a service (both consumer and enterprise)  Features of Mature Saas applications:  Scalable  Handle growing amounts of work in a graceful manner  Multi-tenancy  One application instance may be serving hundreds of companies  Opposite of multi-instance where each customer is provisioned their own server running one instance  Metadata driven configurability  Instead of customizing the application for a customer (requiring code changes), one allows the user to configure the application through metadata .
  • 9. SaaS Maturity Levels  Level 1: Ad-Hoc/Custom  Level 2: Configurable  Level 3: Configurable, Multi-Tenant-Efficient  Level 4: Scalable, Configurable, Multi-Tenant-Efficient Source: Microsoft MSDN Architecture Center .
  • 10. 3 Cloud Deployment Models Private cloud  The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.  Public cloud  Mega-scale cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.  Hybrid cloud  The cloud infrastructure is a composition of two or more clouds (private or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability .
  • 11. Common Cloud Characteristics  Cloud computing often leverages:  Massive scale  Homogeneity  Virtualization  Low cost software  Geographic distribution  Advanced security technologies .
  • 12. Security is the Major Issue  Cloud computing often leverages:  Massive scale  Homogeneity  Virtualization  Low cost software  Geographic distribution  Advanced security technologies .
  • 13. Top Motivators for Adopting Cloud Computing Source: IBM Tech Trends Report 2011 .
  • 14. Cloud Security Advantages  Shifting public data to a external cloud reduces the exposure of the internal sensitive data  Dedicated Security Team  Greater Investment in Security Infrastructure  Cloud homogeneity makes security auditing/testing simpler  Clouds enable automated security management and real-time detection of system tampering  Rapid Re-Constitution of Services  Redundancy / Disaster Recovery .
  • 15. Cloud Security Challenges  Trusting vendor’s security model  Multi-tenancy  Data ownership issues  QoS guarantees  Attraction to hackers (high-value target) Security of virtual OSs in the cloud  Obtaining support from cloud vendor for security related investigations
  • 16. Cloud Security Challenges Indirect administrator accountability  Proprietary cloud vendor implementations can’t be examined  Loss of physical control  Possibility for massive outages  Encryption needs for cloud computing  Encrypting access to the cloud resource control interface  Encrypting administrative access to OS instances  Encrypting access to applications  Encrypting application data at rest .
  • 17. Typical use case of provisioning a virtual machine . .
  • 18. Typical use case of provisioning a virtual machine  The management environment consists of components required to effectively deliver services to consumers. The various services offered span from image management and provisioning of machines to billing, accounting, metering, and more. The cloud management system (CMS) forms the heart of the management environment along with the hardware components.  The managed environment is composed of physical servers and in turn the virtual servers that are “managed-by” the management environment. The servers in the managed environment belong to a customer pool; where customers or users can create virtual servers on-demand and scale up/down as needed.  The management environment controls and processes all incoming requests to create, destroy, manage, and monitor virtual machines and storage devices. In the context of a public cloud, the users get direct access to the VMs created in the managed environment, through the Internet. They can access the machines after they are provisioned by the management layer. .
  • 19. Typical use case of provisioning a virtual machine The previous figure describes the following actions: 1. User makes a request to create a VM by logging onto the cloud portal. 2. The request is intercepted by the request manager and is forwarded to the management environment. 3. The management environment, on receiving the request, interprets it and applies to it provisioning logic to create a VM from the set of available physical servers. 4. External storage is attached to the VM from a storage area network (SAN) store during provisioning in addition to the local storage. 5. After the VM is provisioned and ready to use, the user is notified of this information and finally gains total control of the VM. The user can access this VM through the public Internet because the VM has a public IP address (e.g. through SSH). .
  • 20. Cloud Ecosystem Figure. The cloud ecosystem for building private clouds. (a) Cloud consumers need flexible infrastructure on demand. (b) Cloud management provides remote and secure interfaces for creating, controlling, and monitoring virtualized resources on an infrastructure-as-a-service cloud. (c) Virtual infrastructure (VI) management provides primitives to schedule and manage VMs across multiple physical hosts. (d) VM managers provide simple primitives (start, stop, suspend) to manage VMs on a single host. Figure from Virtual Infrastructure Management in Private and Hybrid Clouds, Internet Computing, September 2009.

Notes de l'éditeur

  1. Note 1: Cloud computing is still an evolving paradigm. Its definitions, use cases, underlying technologies, issues, risks, and benefits will be refined in a spirited debate by the public and private sectors. These definitions, attributes, and characteristics will evolve and change over time. Note 2: The cloud computing industry represents a large ecosystem of many models, vendors, and market niches. This definition attempts to encompass all of the various cloud approaches
  2. ISDM, IBM System Director and blade servers are shown to depict the components of a cloud system.