Cloud Computing Report
Cloud Computing Report
“CLOUD COMPUTING”
Submitted in Partial Fulfillment of the Requirements
For the award of the Degree of
Bachelor of Technology in
Electronics & Computer Engineering (ECM)
By
G. PRANAY MUKUND
18311A1976
CERTIFICATE
This is to certify that the work reported in the present seminar titled “CLOUD
COMPUTING” is a record work done by me in the Department of Electronics
and Computer Engineering, Sreenidhi Institute of Science and Technology,
Yamnampet, Ghatkesar.
The report is based on the seminar work done entirely by me and not copied from
any other source.
18311A1976
ACKNOWLEDGMENT
We convey our sincere thanks to all the faculties of ECM department, Sreenidhi
Institute of Science and Technology, for their continuous help, co-operation, and
support to complete this seminar.
Finally, we extend our sense of gratitude to almighty, our parents, all our friends,
teaching and non-teaching staff, who directly or indirectly helped us in this
endeavor.
G. PRANAY MUKUND
ECM D2
18311A1976
Abstract
1. DEFINITION 1
2. STATICS 3
3. HISTORY 4
4. CHARACTERSTICS 6
5. DEVELOPMENT MODELS 9
6. ARCHITECTURE 16
9. EMERGING TRENDS 22
10. CONCLUSION 23
11. REFERENCES 24
About Cloud Computing
1
• Advocates note that cloud computing allows
companies to avoid or minimize up-front IT
infrastructure costs. Proponents also claim that cloud
computing allows enterprises to get their applications
up and running faster, with improved manageability
and less maintenance, and that it enables IT teams to
more rapidly adjust resources to meet fluctuating and
unpredictable demand. Cloud providers typically use
a "pay-as-you-go" model, which can lead to
unexpected operating expenses if administrators are
not familiarized with cloud-pricing models.
• The availability of high-capacity networks, low-cost
computers and storage devices as well as the
widespread adoption of hardware
virtualization, service-oriented architecture,
and autonomic and utility computing has led to growth
in cloud computing.
2
STATISTICS
3
HISTORY
5
Characteristics
6
utilisation and efficiency improvements for systems
that are often only 10–20% utilised.
8
Developmental Models
• Private cloud :- Private cloud is cloud infrastructure
operated solely for a single organization.
• It can improve business, but every step in the project
raises security issues that must be addressed to prevent
serious vulnerabilities.
Multicloud
Multicloud is the use of multiple cloud computing services
in a single heterogeneous architecture to reduce reliance
on single vendors, increase flexibility through choice,
mitigate against disasters, etc. It differs from hybrid cloud
in that it refers to multiple cloud services, rather than
multiple deployment modes (public, private, legacy).
Big Data cloud
The issues of transferring large amounts of data to the
cloud as well as data security once the data is in the cloud
initially hampered adoption of cloud for big data, but now
that much data originates in the cloud and with the advent
of bare-metal servers, the cloud has become a solution for
use cases including business analytics and geospatial
analysis.
14
HPC cloud
HPC cloud refers to the use of cloud computing services
and infrastructure to execute high-performance
computing (HPC) applications. These applications
consume considerable amount of computing power and
memory and are traditionally executed on clusters of
computers. Various vendors offer servers that can support
the execution of these applications. In HPC cloud, the
deployment model allows all HPC resources to be inside
the cloud provider infrastructure or different portions of
HPC resources to be shared between cloud provider and
client on-premise infrastructure. The adoption of cloud to
run HPC applications started mostly for applications
composed of independent tasks with no inter-process
communication.
The second offering is an external cloud infrastructure
system, such as Amazon EC2 and AWS, and is used to
provide the “raw” virtual machines for HPC use. ... This
process is automatic, and adding and removing nodes
from this HPC cluster environment can be done on
demand
15
Architecture
16
Cloud architecture:-the systems architecture of
the software systems involved in the delivery of cloud
computing, typically involves multiple cloud
components communicating with each other over a loose
coupling mechanism such as a messaging queue. Elastic
provision implies intelligence in the use of tight or loose
coupling as applied to mechanisms such as these and
others.
Cloud engineering :-
It is the application of engineering disciplines to cloud
computing. It brings a systematic approach to the high-
level concerns of commercialization, standardization, and
governance in conceiving, developing, operating and
maintaining cloud computing systems. It is a
multidisciplinary method encompassing contributions from
diverse areas such
as systems, software, web, performance, information
technology engineering, security, platform, risk,
and quality engineering.
17
Security & Privacy
Cloud computing poses privacy concerns because the
service provider can access the data that is in the cloud at
any time. It could accidentally or deliberately alter or
delete information. Many cloud providers can share
information with third parties if necessary for purposes of
law and order without a warrant. That is permitted in their
privacy policies, which users must agree to before they
start using cloud services. Solutions to privacy include
policy and legislation as well as end users' choices for how
data is stored. Users can encrypt data that is processed or
stored within the cloud to prevent unauthorized access.
According to the Cloud Security Alliance, the top three
threats in the cloud are Insecure Interfaces and
API's, Data Loss & Leakage, and Hardware Failure—
which accounted for 29%, 25% and 10% of all cloud
security outages respectively. Together, these form
shared technology vulnerabilities. In a cloud provider
platform being shared by different users there may be a
possibility that information belonging to different
customers resides on same data server.
18
"There are some real Achilles' heels in the cloud
infrastructure that are making big holes for the bad guys to
get into". Because data from hundreds or thousands of
companies can be stored on large cloud servers, hackers
can theoretically gain control of huge stores of information
through a single attack—a process he called
"hyperjacking". Some examples of this include the
Dropbox security breach, and iCloud 2014
leak.[109] Dropbox had been breached in October 2014,
having over 7 million of its users passwords stolen by
hackers in an effort to get monetary value from it by
Bitcoins (BTC). By having these passwords, they are able
to read private data as well as have this data be indexed
by search engines (making the information public)
There is the problem of legal ownership of the data (If a
user stores some data in the cloud, can the cloud provider
profit from it?). Many Terms of Service agreements are
silent on the question of ownership. Physical control of the
computer equipment (private cloud) is more secure than
having the equipment off site and under someone else's
control (public cloud). This delivers great incentive to
public cloud computing service providers to prioritize
building and maintaining strong management of secure
services. Some small businesses that don't have
expertise in IT security could find that it's more secure for
them to use a public cloud.). Fundamentally, private cloud
is seen as more secure with higher levels of control for the
owner.
19
Limitations and disadvantages
21
Emerging trends
22
Conclusion
23
References
24