CC Notes
CC Notes
1. Frontend : Frontend of the cloud architecture refers to the client side of cloud
computing system. Means it contains all the user interfaces and applications which
are used by the client to access the cloud computing services/resources. For
example, use of a web browser to access the cloud platform.
● Client Infrastructure – Client Infrastructure is a part of the frontend
component. It contains the applications and user interfaces which are required
to access the cloud platform. • In other words, it provides a GUI( Graphical
User Interface ) to interact with the cloud.
2. Backend : Backend refers to the cloud itself which is used by the service
provider. It contains the resources as well as manages the resources and provides
security mechanisms. Along with this, it includes huge storage, virtual applications,
virtual machines, traffic control mechanisms, deployment models, etc.
NIST model
NIST organizes concepts around three major elements: A) characteristics, B) cloud
service models, and C) cloud deployment models as shown in Figure 1.
● Internal/External
● Proprietary/Open
● De-Perimeterized/Perimeterized
● Insourced/Outsourced Dimension
i. Internal/External
The most basic cloud form is the external and internal cloud form. The external or
internal dimension defines the physical location of the data. It acknowledges us
whether the data exists inside or outside of your organization’s boundary.
Here, the data which is stored using a private cloud deployment will be considered
internal and data outside the cloud will be considered external.
ii. Proprietary/Open
The second type of cloud formation is proprietary and open. The proprietary or open
dimension states about the state of ownership of the cloud technology and interfaces. It also
tells the degree of interoperability, while enabling data transportability between the system
and other cloud forms.
The proprietary dimension means, that the organization providing the service is securing
and protecting the data under their ownership.
The open dimension is using a technology in which there are more suppliers. Moreover, the
user is not constrained in being able to share the data and collaborate with selected
partners using the open technology.
iii. De-Perimeterized/Perimeterized
The third type of cloud formation is De-perimeterized and Perimeterized. To reach this form,
the user needs collaboration oriented architecture and Jericho forum commandments.
The Perimeterised and De-perimeterized dimension tells us whether you are operating
inside your traditional it mindset or outside it.
With the help of VPN and operation of the virtual server in your own IP domain, the user can
extend the organizations perimeter into external Cloud Computing domain. This means that
the user is making use of the own services to control access.
iv. Insourced/Outsourced
The Insourced and outsourced dimensions have two states in each of the eight cloud forms.
In the outsourced dimension the services provided by the third party, whereas in the
insourced dimension the services provided by the own staff under the control.
In this few organizations that are traditional bandwidth software or hardware, providers will
run fluently on becoming cloud service providers.
The organizations which are seeking to procedure cloud services must have the ability to
set legally binding collaboration agreement. In this, an organization should ensure that data
is deleted from the service provider’s Infrastructure.
Cloud Deployment Models:-
The cloud deployment model identifies the specific type of cloud environment based on
ownership, scale, and access, as well as the cloud’s nature and purpose. The location
of the servers you’re utilizing and who controls them are defined by a cloud deployment
model. It specifies how your cloud infrastructure will look, what you can change, and
whether you will be given services or will have to create everything yourself.
Relationships between the infrastructure and your users are also defined by cloud
deployment types.
1. Public Cloud : The public cloud makes it possible for anybody to access systems
and services. The public cloud may be less secure as it is open for everyone. The public
cloud is one in which cloud infrastructure services are provided over the internet to the
general people or major industry groups. The infrastructure in this cloud model is owned
by the entity that delivers the cloud services, not by the consumer. It is a type of cloud
hosting that allows customers and users to easily access systems and services. This
form of cloud computing is an excellent example of cloud hosting, in which service
providers supply services to a variety of customers. In this arrangement, storage backup
and retrieval services are given for free, as a subscription, or on a per-use basis.
Example: Google App Engine etc.
3. Hybrid cloud : By bridging the public and private worlds with a layer of proprietary
software, hybrid cloud computing gives the best of both worlds. With a hybrid solution,
you may host the app in a safe environment while taking advantage of the public cloud’s
cost savings. Organizations can move data and applications between different clouds
using a combination of two or more cloud deployment methods, depending on their
needs.
Characteristics of IaaS
There are the following characteristics of IaaS -
● Resources are available as a service
● Services are highly scalable
● Dynamic and flexible
● GUI and API-based access
● Automated administrative tasks
Cost savings: IaaS is more cost-effective than building your own data center. You pay only for what
you need — storage space, CPU power, bandwidth, and other resources. This makes it easier to
scale up or down as needed.
On-demand access: You can instantly provision new resources whenever they’re needed without
having to invest in new hardware and software or hire additional IT staff members. The cloud
provider takes care of all the maintenance and upgrades required to keep your servers online 24/7
with 99 percent uptime guarantees (or better).
Flexibility: With cloud computing, you can easily add more resources when demand increases
without having to upgrade equipment or hire more IT professionals.
PaaS cloud computing platform is created for the programmer to develop, test, run, and
manage the applications.
1. PaaS is a cloud service model that gives a ready-to-use development environment where
developers can specialize in writing and executing high-quality code to make customized
applications.
2. It helps to create an application quickly without managing the underlying infrastructure. For
example, when deploying a web application using PaaS, you don’t have to install an
operating system, web server, or even system updates. However, you can scale and add
new features to your services.
3. This cloud service model makes the method of developing and deploying applications
simpler and it is more expensive than IaaS but less expensive than SaaS.
4. This helps you be more efficient as you don’t get to worry about resource procurement,
capacity planning, software maintenance, patching, or any of the opposite undifferentiated
work involved in running your application.
5. Examples of PaaS: Elastic Beanstalk or Lambda from AWS, WebApps, Functions or Azure
SQL DB from Azure, Cloud SQL DB from Google Cloud, or Oracle Database Cloud Service
from Oracle Cloud.
Characteristics of PaaS:
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App
Engine, Apache Stratos, Magento Commerce Cloud, and OpenShift.
Benefits of PaaS
● PaaS is an easy way to build an application, and it offers a lot of benefits. Here are just a
few:
● Faster development time – You don’t have to build infrastructure before you can start
coding.
● Reduced costs – Your IT department won’t need to spend time on manual deployments or
server management.
● Enhanced security – PaaS providers lock down your applications so that they’re more
secure than traditional web apps.
● High availability – A PaaS provider can make sure your application is always available,
even during hardware failures or maintenance windows.
1. SaaS provides you with a complete product that is run and managed by the service provider.
2. The software is hosted online and made available to customers on a subscription basis or for
purchase in this cloud service model.
3. With a SaaS offering, you don’t need to worry about how the service is maintained or how
the underlying infrastructure is managed. It would help if you believed how you’d use that
specific software.
4. Examples of SaaS: Microsoft Office 365, Oracle ERP/HCM Cloud, SalesForce, Gmail, or
Dropbox.
Characteristics of SaaS
There are the following characteristics of SaaS -
● Managed from a central location
● Hosted on a remote server
● Accessible over the internet
● Users are not responsible for hardware and software updates. Updates are applied
automatically.
● The services are purchased on the pay-as-per-use basis
Benefits of SaaS
The benefits of SaaS are numerous and varied. Many businesses have already made the switch to
SaaS, but some are still skeptical about making the change. Here are some of the top reasons why
you should consider switching to SaaS:
Lower Total Cost of Ownership: One of the biggest benefits of SaaS is that it lowers your total cost
of ownership (TCO) by eliminating hardware expenses and maintenance costs. There is no longer a
need to buy servers or hire IT professionals to maintain or monitor them, which results in fewer
upfront costs and reduced maintenance fees over time.
Better Security: Another benefit of SaaS is improved security. Since most services are hosted on
secure servers in data centers with 24/7 monitoring, there’s less chance for hackers to gain access
or steal your data. This makes SaaS a more secure option for storing sensitive information than
other options like on-premise software or local servers. In fact, according to Gartner’s 2017 Magic
Quadrant report, “Software as a service (SaaS) offerings provide better security than self-hosted
software does.”
Impact Of Cloud Computing On Business:-
Today IT is becoming an enabler of business. Business organizations are moving
Cloud computing is one such tool being used by many business organizations.
Cloud Computing provides a way for businesses to manage their resources online. It
allows the business entities to access their information virtually, whereby, data can be
More and more companies are moving towards cloud computing. Just like a coin has
two sides, cloud computing also has a positive impact and at the same time, some
● Cost Reduction:
reducing the expenses of the company as resources are acquired only when they are
Cloud computing can cause a dramatic decrease in labor and maintenance costs
because the company is required to purchase the infrastructure or maintain it. The
computer hardware is owned by the vendor and stored in off-site locations; thus, this
This is the key benefit of cloud technology as the client has the flexibility to scale up and
Businesses need not worry about the future demands as they can easily scale up the
● Flexibility:
Cloud Computing provides a lot of flexibility. Customers or users are free to decide
about the services which they want to use and pay as per use. Also, users have the
Users can choose public, private, or hybrid storage offerings, based on their security
Users can store a lot more data on the cloud than their local physical storage devices.
Moreover, companies can scale their storage capacity as per their requirements. When
the business grows and more storage space is required, companies can request an
● Disaster Recovery:
A business using cloud services need not prepare complex disaster recovery plans
because the cloud service providers take care of such issues and help the clients to
recover faster.
Key Business Drivers for Cloud Computing :-
A classic cloud driver for people to use hosted compute and storage resources is
BC/DR: keeping the organization running if they cannot access their building(s) or their
Managed cloud hosting helps with all resource challenges – lack of available systems,
and retail, run regular one-off campaigns, special events, or have high levels of
seasonality in their business model. Managed cloud hosting helps by allowing these
companies to “turn up” resources to cope with increased demand then “turn down”
when the demand passes. This elasticity – the ability to “cloud burst” – is a huge driver
for many businesses and will be significantly more cost-effective than buying hardware
server infrastructure. This is often a driver for migrating to the cloud as it means
companies can focus on managing apps and leave the hardware challenge to us.
industries have best practice guidelines or accreditations that are even more stringent.
The cloud offers ways to achieve compliance but also threats – for many, they need to
work with UK-based managed cloud hosting providers operating ISO27001 compliant
datacenters.
Some of the earliest cloud pioneers were “test and dev” users and it remains a major
driver today. The ability to spin up production quality environments to write code and for
User Acceptance Testing – with the ability to migrate easily into a live environment – for
Many IT departments now focus on managing applications and users and using
Once the data is stored in the cloud, it is easier to get back-up and restore that data
using the cloud.
2) Improved collaboration
3) Excellent accessibility
Cloud allows us to quickly and easily access store information anywhere, anytime in the
whole world, using an internet connection. An internet cloud infrastructure increases
organization productivity and efficiency by ensuring that our data is always accessible.
Cloud computing reduces both hardware and software maintenance costs for
organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.
Cloud computing offers Application Programming Interfaces (APIs) to the users for
access services on the cloud and pays the charges as per the usage of service.
Cloud offers us a huge amount of storing capacity for storing our important data such as
documents, images, audio, video, etc. in one place.
8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers many
advanced features related to security and ensures that data is securely stored and
handled.
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio, video, etc.) is stored on the
cloud, and we access these data through the cloud by using the internet connection. If
you do not have good internet connectivity, you cannot access these data. However, we
have no any other way to access data from the cloud.
2) Vendor lock-in
Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may face
problems when transferring their services from one vendor to another. As different
vendors provide different platforms, that can cause difficulty moving from one cloud to
another.
3) Limited Control
Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be aware that
you will be sending all your organization's sensitive information to a third party, i.e., a
cloud computing service provider. While sending the data on the cloud, there may be a
chance that your organization's information is hacked by Hackers.
Unit 2 : Virtualization
Virtualization at OS Level:-
● OS Level Virtualization is a type of server virtualization technology which works
at the OS layer.
● The physical server and single instance of the operating system is virtualized into
multiple isolated partitions, where each partition replicates a real server.
● The OS kernel will run a single operating system and provide that operating
system functionality to each of the partitions.
● Operating-system-level virtualization is not as flexible as other virtualization
approaches since it cannot host a guest operating system different from the host
one, or a different guest kernel.
● For example, with Linux, different distributions are fine, but other operating
systems such as Windows cannot be hosted.
● Operating system virtualization (OS virtualization) is a server virtualization
technology that involves tailoring a standard operating system so that it can run
different applications handled by multiple users on a single computer at a time.
● The operating systems do not interfere with each other even though they are on
the same computer.
● In OS virtualization, the operating system is altered so that it operates like
several different, individual systems.
● The virtualized environment accepts commands from different users running
different applications on the same machine. The users and their requests are
handled separately by the virtualized operating system.
VIRTUALIZATION STRUCTURE / HYPERVISOR ARCHITECTURE :-
Virtualization is achieved through the software known as virtual machine monitor or the
hypervisor ,The software is used in two ways thus forming two different structure of
virtualization,namely Bare Metal Virtualization and Hosted Virtualization.
● The software is not installed onto the bare-metal, but instead is loaded on top of
an already live operating system, so it requires you to first install an OS(Host
OS).
● The Host OS integrates a hypervisor that is responsible for providing the virtual
machines(VMs) with their virtual platform interface and for managing all context
switching scheduling, etc.
● The hypervisor will invoke drivers or other component of the Host OS as needed.
● On the Host OS you may run Guest VMs, but you can also run native
applications
● This approach provides better hardware compatibility than bare-metal
virtualization, because the OS is responsible for the hardware drivers instead of
the hypervisor.
● A hosted virtualization hypervisor does not have direct access to hardware and
must go through the OS, which increases resource overhead and can degrade
virtual machine (VM) performance.
● The latency is minimal and with today’s modern software enhancements, the
hypervisor can still perform optimally.
● Common for desktops, because they allow you to run multiple OSes. These
virtualization hypervisor types are also popular for developers, to maintain
application compatibility on modern OSes.
● Because there are typically many services and applications running on the host
OS, the hypervisor often steals resources from the VMs running on it
● The most popular hosted virtualization hypervisors are: VMware Workstation,
Server, Player and Fusion; Oracle VM VirtualBox; Microsoft Virtual PC; Parallels
Desktop.
Cloud computing applications combine their resources into pools that can
be assigned to users on demand thus attaining efficiency, increased
utilization, reasonable cost & scalability.
Types of Virtualization:
1.Application Virtualization.
2.Network Virtualization.
3.Desktop Virtualization.
4.Storage Virtualization.
5.Server Virtualization.
6.Data virtualization.
The Xen hypervisor implements all the mechanisms, leaving the policy to be
handled by Domain 0, as shown in figure does not include any device drivers
natively. It just provides a mechanism by which a guest have direct access to the
physical devices. As a result, the size of the Xen hypervisor is small.
Xen provides a virtual environment located between the hardware and the OS.
The core components of a Xen system are the hypervisor, kernel, and
applications. The organization of the three components is important.
Like other virtualization systems, many guest run on top of the hypervisor. The
guest OS, which has control ability, is called Domain 0, and the others are called
Domain U. Domain 0 is a privileged guest OS of Xen.
It is first loaded when Xen boots without any file system drivers being available.
Domain 0 is designed to access hardware directly and manage devices.
Therefore, one of the responsibilities of Domain 0 is to allocate and map
hardware resources for the guest domains (the Domain U domains). For
example, Xen is based on Linux and its security level is C2. Its management VM
is named Domain 0, which has the privilege to manage other VMs implemented
on the same host. If Domain0 is compromised, the hacker can control the entire
system. So, in the VM system, security policies are needed to improve the
security of Domain 0.
Domain 0, behaving as a VMM, allows users to create, copy, save, read, modify,
share, migrate, and roll back VMs as easily as manipulating a file, which flexibly
provides tremendous benefits for users. It also brings a series of security
problems during the software life cycle and data lifetime. Traditionally, a
machine’s lifetime can be envisioned as a straight line where the current state of
the machine is a point that progresses monotonically as the software executes.
It also brings a series of security problems during the software life cycle and data
lifetime. Traditionally, a machine’s lifetime can be envisioned as a straight line
where the current state of the machine is a point that progresses monotonically
as the software executes. During this time, configuration changes are made,
software is installed, and patches are applied. In such an environment, the VM
state is in to a tree: At any point, execution can go into N different branches
where multiple instances of a VM can exist at any point in this tree at any given
time. VMs are allowed to roll back to previous states in their execution or rerun
from the same point many times.
Binary Translation with Full Virtualization
Depending on implementation technologies, hardware virtualization can be
classified into two categories: full virtualization and host-based
virtualization. Full virtualization does not need to modify the host OS. It
relies on binary translation to trap and to virtualize the execution of certain
sensitive, nonvirtualizable instructions. The guest OSes and their
applications consist of noncritical and critical instructions. In a host-based
system, both a host OS and a guest OS are used. A virtuali-zation software
layer is built between the host OS and guest OS. These two classes of VM
architec-ture are introduced next.
1. Full Virtualization
3. Host-Based Virtualization
can also run with the host OS directly. This host-based architecture has
some distinct advantages, as enumerated next. First, the user can install
this VM architecture without modifying the host OS. The virtualizing
software can rely on the host OS to provide device drivers and other
low-level services. This will simplify the VM design and ease its
deployment.
VMware pioneered the software market for virtualization. The company has developed virtualization
tools for desktop systems and servers as well as virtual infrastructure for large data centers. ESX is
a VMM or a hypervisor for bare-metal x86 symmetric multiprocessing (SMP) servers. It accesses
hardware resources such as I/O directly and has complete resource management control. An
ESX-enabled server consists of four components: a virtualization layer, a resource manager,
hardware interface components, and a service console, as shown in Figure 3.9. To improve
performance, the ESX server employs a para-virtualization architecture in which the VM kernel
interacts directly with the hardware without involving the host OS.
The VMM layer virtualizes the physical hardware resources such as CPU, memory, network and disk
controllers, and human interface devices. Every VM has its own set of virtual hardware resources. The
resource manager allocates CPU, memory disk, and network bandwidth and maps them to the virtual
hardware resource set of each VM created. Hardware interface components are the device drivers and
the
VMware ESX Server File System. The service console is responsible for booting the system,
initiating the execution of the VMM and resource manager, and relinquishing control to those layers.
It also facilitates the process for system administrators.
CPU virtualization :-
With CPU Virtualization, all the virtual machines act as physical machines and
distribute their hosting resources like having various virtual processors.
Sharing of physical resources takes place to each virtual machine when all
hosting services get the request. Finally, the virtual machines get a share of
the single CPU allocated to them, being a single-processor acting as a
dual-processor.
Memory Virtualization
Since each page table of the guest OSes has a separate page table in the
VMM corresponding to it, the VMM page table is called the shadow page
table. Nested page tables add another layer of indirection to virtual memory.
The MMU already handles virtual-to-physical translations as defined by the
OS. Then the physical memory addresses are translated to machine
addresses using another set of page tables defined by the hypervisor. Since
modern operating systems maintain a set of page tables for every process,
the shadow page tables will get flooded. Consequently, the perfor-mance
overhead and cost of memory will be very high.
VMware uses shadow page tables to perform
virtual-memory-to-machine-memory address translation. Processors use TLB
hardware to map the virtual memory directly to the machine memory to avoid
the two levels of translation on every access. When the guest OS changes the
virtual memory to a physical memory mapping, the VMM updates the shadow
page tables to enable a direct lookup. The AMD Barcelona processor has
featured hardware-assisted memory virtualization since 2007. It provides
hardware assistance to the two-stage address translation in a virtual
execution environment by using a technology called nested paging.
I/O Virtualization
● XaaS is a collective term said to stand for a number of things including "X as a
service," "anything as a service" or "everything as a service."
● The acronym refers to an increasing number of services that are delivered over
the Internet rather than provided locally or on-site.
● Everything-as-a-Service, or XaaS, originated as software-as-a-service (SaaS)
and has since expanded to include services such as infrastructure-as-a-service,
platform-as-a-service, storage-as-a-service, desktop-as-a-service, disaster
recovery-as-a-service, and even nascent operations like marketing-as-a-service
and healthcare-as-a-service.
● XaaS or ‘anything as a service’ is the delivery of IT as a Service through hybrid
Cloud computing and is a reference to either one or a combination of Software as
a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service
(PaaS). Communications as a service (CaaS) or monitoring as a service (Maas).
XaaS brings with it at least three big advantages:
1. Flexible scaling
○ The beauty in outsourcing just about every technology-related business
process is that you won’t be bearing the true costs of up- or down-scaling
your processes and operations in response to strategic or business
changes. That burden will fall to your XaaS provider.
2. Access to evergreen technology
○ Technological evolution has long since been barreling along at an
exponential pace. Sadly, for most of us, our budgets only increase linearly,
if at all. Keeping up with new developments is difficult less from an
implementation perspective and more from a cost perspective. XaaS
changes that for you, the end user, because, as before, the burden of
keeping up with advances lies with the provider and not with you. The key
idea here is that making good use of XaaS means that your operations
stay evergreen at no extra cost!
3. Integrating everything
○ XaaS lets technology professionals concentrate on what they do best.
“XaaS offers great opportunity for the IT department to redirect focus to
more forward-thinking and strategic initiatives while confidently leveraging
XaaS offerings.
Examples of major XaaS’s
The What it stands What it does
_aaS for
DRaaS Disaster Recovers not just data, but also all the
Recovery-as-a-S infrastructure and applications that were in place
ervice prior to man-made or natural disaster. Ensures
business continuity.
D) Database-as-a-Service :-
Like SaaS, PaaS and IaaS of cloud computing we can consider DBaaS (also known as
Managed Database Service) as a cloud computing service. It allows users associated
with database activities to access and use a cloud database system without purchasing
it.
DBaaS and cloud database comes under Software as a Service (SaaS) whose demand
is growing so fast.
DBaaS consists of an info manager element, that controls all underlying info instances
via API. This API is accessible to the user through a management console, typically an
online application, that the user might use to manage and assemble the info and even
provision or deprovision info instances.
Key Characteristics of DBaaS :
● A fully managed info service helps to line up, manage, and administer your info
within the cloud and conjointly offer services for hardware provisioning and
Backup.
● DBaaS permits the availability of info’s effortlessly to Database shoppers from
numerous backgrounds and IT expertise.
● Provides on demand services.
● Supported the resources offered, it delivers a versatile info platform that tailors
itself to the environment’s current desires.
● A team of consultants at your disposal, endlessly watching the Databases.
● Automates info administration and watching.
● Leverages existing servers and storage.
Advantages of DBaaS :
1. DBaaS is responsible of the info supplier to manage and maintain info hardware
and code.
2. The hefty power bills for ventilation and cooling bills to stay the servers running
area unit eliminated.
3. An organization that subscribes to DBaaS is free from hiring info developers or
constructing a info system in-house.
4. Make use of the most recent automation, straightforward outs of clouds area unit
possible at low price and fewer time.
5. Human resources needed to manage the upkeep of the system is eliminated.
6. Since DBaaS is hosted off-site, the organization is free from the hassles of power
or network failure.
7. Explore the portfolio of Oracle info as a service.
Disadvantages of DBaaS :
1. Traditional enterprises may have objections to cloud-based services generally.
2. In case of significant failure of the DBaaS server or network, the organization
might lose its knowledge.
3. Companies already equipped with resources and IT-related human resources
might not realize DBaaS solutions economically viable.
4. Intrinsic network connected problems with cloud can impact the performance of a
DBaaS.
5. Features offered within the typical RDBMS might not perpetually be offered
during a DBaaS system.
6. The use of DBaaS may result in revenue loss in alternative areas of code
updates and hardware management.
E) Storage-as-a-Service :-
Storage as a Service is a type of Cloud Computing service, which makes service
providers offer data storage capacity services (storage) to their customers.
Like other Cloud services, customers use data storage over an Internet connection.
Customers only need to pay according to usage (Pay as You Go), and there is no need
for initial capital expenditures that can demand large funds. Budget management can be
easier because capital expenditure (Capital Expense/Capex) is converted into
operational expenditure (Operational Expense/Opex).
By utilizing STaaS, the burden of managing data storage devices in the corporate office
(on-premise) can be lighter. The space used for storage can be reduced and used for
other purposes. That way, companies can still store on-premise data, especially data
that is considered very sensitive
Another use of Storage as a Service is for data backup for disaster recovery purposes.
In this case, data from a system is periodically backed up. In the event of an event that
causes data loss in the main system, for example due to a disaster (fire, flood,
earthquake) or due to a cyber attack, data can be restored from a backup. The system
can quickly work as before, with minimum downtime.
Enterprises can also use STaaS for business application development and testing.
Application development sometimes requires the use of large capacity data storage, but
it is only used temporarily. With STaaS, application developers can access
large-capacity data storage devices easily and quickly.
1. Costs: Generally, expenses can be regulated so that they are more efficient, and
costs can be reduced. The company only pays data storage fees according to
the capacity used and the amount of data transferred. For cold data, paying for
the amount of data stored may be cheaper. However, if the data is expected to
be accessed frequently, you should take a close look at the available service
contracts.
2. Flexibility: Companies can add storage capacity immediately, without having to
go through a lengthy and expensive procurement process. Data can also be
accessed from anywhere via an Internet connection.
3. Security: Some customers may be reluctant to share sensitive data with third
parties. It is therefore very important to choose a proven STaaS provider with
experience in securing Cloud services. An alternative that is also starting to
attract attention is the on-premise STaaS model, where data storage is still
carried out at the company installation, but is managed by the STaaS service
provider.
F) Compliance-as-a-Service :-
Cloud compliance issues occur as any cloud consumer make use of cloud storage and
backup services. Cloud computing by its very nature extents various jurisdictions. The
laws of the country of request from where it originates many not necessarily match the
laws of the country in which the request is being processed, and probably laws of
neither location match the laws of the country in which the service is delivered.
Compliance is beyond than a basically provided an unidentified service token to an
identity so that access to a resource can be obtain. Compliance is a difficult issue which
needs considerable expertise.
While Compliance as a Service (CaaS) seems in discussion, some examples which falls
under service of this category exist as a general product for a cloud computing
architecture. A Compliance as a Service (CaaS) application would need to oblige as a
third party. CaaS may require to be architecture as its own layer of a Service Oriented
Architecture (SOA) in order to be reliable. A CaaS may be needed to be able to manage
cloud relationships, comprehend security rules and procedures, know how to operate
data and administer privacy, deliver an incidence feedback, archive, and enable the
system to be queried. This is a huge order, but CaaS has the capability to be a good
value-added service.
CaaS system built inside a private cloud in which the data is under control of a single
entity, thus confirming that the data is under that entity’s secure control and that
transaction is audited. Indeed, major cloud computing compliance systems have been
created with the help of private cloud. A well-implemented CaaS service may measure
the risk of servicing compliance and ensure or indemnify tenancy against that risk.
CaaS can be brought to bear as mechanism to guarantee that an e-mail conformed to
particular standards, anything which may be new electronic service of a network of
national postal system and something which may help in ending the scourge of spam.
G) Monitoring-as-a-Service :-
Monitoring as a Service (MaaS) provides you with the security solutions that
are essential for the organizations that are reliant on the IT infrastructure.
However, for effective and efficient monitoring, the organization must have up
to date technology, experts knowing advanced technical skills, scalable
security processes and all this come with a tremendous expense.
Prior to the advent of electronic gadgets that are used for providing security
services, the human resource was used to perform all these monitoring
activities but it was ineffective.
Features of MaaS
1. Protection Against External and Internal Threats
The security monitoring services analyze the alerts from security devices 24/7
in real-time. The security analyst collects data from various security devices to
recognize the threats and thereby imply effective measures to respond to
these threats.
● Early Detection
The information security team detects and discloses the security threats
as soon after they appear. The threats are reported to the customer via
emails.
This reports describes the vulnerabilities in the security of the system
and also describes its effect on the systems or application. The report
may also include the protective measures that you can take for these
vulnerabilities.
● Dashboard Interface
The dashboard interface is implemented as a platform, control and
service monitoring. This conceptualizes your system and its resource at
one place and eases the information security team to monitor the
operation status of the platform being monitor. The information security
team try to find the reason of vulnerability by navigating back in time
and visualize how the system was performing before the problem
occurred and how it is performing after the problem has occurred.
As the root cause of the vulnerability is understood the preventive
measure are suggested to resolve the issue.
● Log Centralization and Analysis
It is a monitoring solution which involves the correlation of log entries
and matching of the log entries. Analyzing this correlation and matching
of log entries set a benchmark for the operational performance and
provide an index of the security threats.
An alarm is raised if an incident moves above the benchmark
parameters. This alarm or warning is analyzed by security experts
responsible for the quick response for such threat incidents.
● Vulnerabilities Detection and Management
This service provides periodic automated testing which exposes the
threat to information system over the internet.
The service identifies threats such as unauthorized access to the
administrative services, the services that have not been updated for a
long.
● Continuous System Patching/Upgrade and Fortification
The level of security is enhanced with the continuous system patching.
System patching is nothing but enhancing the computer program to fix
the vulnerabilities and bugs in the computer program.
System patching is very important as it not only raises the security level
of your system but also supports the newer version of the application
and software installed on your system.
● Intervention, Forensics, and Help Desk Services
We all are familiar with the help desk that provides you with quick
assistance to your problems. Similarly, the MaaS vendor has a team of
experts with ample of knowledge that intervenes whenever any threat is
detected. They provide 24/7 assistance to support and maintain the
applications and infrastructure.
Whenever a threat is detected it requires the forensic analysis to check
out how much time cost and effort it will require to fix it.
While outsourcing any service you must consider and quantify the risk
involved in it. It will raise your confidence that your investment will succeed. A
scalable service is more valuable as the customers can get additional
business benefit by giving some additional cost.
Log monitoring is a process of recording log messages into a file which helps
the developers or administrator to understand how the system or application is
being used. Real-time log monitoring helps in quick detection of errors, failed
process and services.
It also provides alerts for network and protocol failures. It warns the
developers of infrastructure problems. MaaS provides automation for this
time-consuming process.
Advantages of MaaS
1. MaaS provide a ready to use a monitoring tool to its customer at a very
minimal price.
2. MaaS leverage the customer to focus on their business instead of
worrying about the information security of their enterprise.
3. MaaS provides 24/7 assistance to its customers, who can report the
issues and get immediate assistance from the MaaS team.
H) Communication-as-a-Service :-
Communication as a service (CaaS) is a cloud-based solution provided by
cloud vendors. CaaS is a specialized variation of Software as a Service
(SaaS) which is among three basic services delivered by the cloud computing
technology. When we talk about communication, recall, in how many ways we
can communicate with others. Well, we can communicate via text message,
voice call and video call.
CaaS providers manage the hardware and software that are important for
delivering Voice over IP (VoIP) for voice communication service, and other
services like Instant Messaging (IM) to provide text communication service
and video conferencing to provide video communication service.
CaaS model provides economical services as the service users do not have to
bear the expenditure of buying and managing the communication equipment.
CaaS is favourable for small IT companies that on the verge of expansion. Let
us discuss the features of CaaS.
Features of CaaS
1. Integrated and Unified Communication
2. No Investment Required
The customer can outsource the communication services form CaaS vendors.
The customers pay for what they have demanded. The customer can extend
their service requirement according to their need. This brings flexibility and
scalability in communication services and even make the service economical.
4. No Risk of Obsolescence
The CaaS vendors keep on updating their hardware and software that provide
communication services to meet the changing demands of the market. So the
customer using the services does not have to be worried about the service
obsolescence.
The customer outsourcing the CaaS service does not have to bear the cost of
maintaining the equipment deployed for providing communication services.
The same feature is adopted and implemented by the CaaS providers in order
to provide voice continuity or communication continuity even if any
catastrophic event strikes.
CaaS abstracts the networks capability to handle peak load for their customer
which make it flexible. The network capabilities can be extended to raise the
network capacity, devices and area coverage based on the demands of the
CaaS customers. However, the network capabilities can be extended
dynamically according to customers demand so that the resources are not
wasted.
The customers need not worry about the service being getting obsolete as the
CaaS providers perform periodic updates and they also manage the
replacement of hardware and software involved to keep the platform
technically up to date.
CaaS is all about recognizing the use cases where this technology can be
implemented to utilize the full value potential of telecommunication.
I) Communication-as-a-Service :-
Network-as-a-service (NaaS) is a cloud service model in which customers rent
networking services from cloud providers. NaaS allows customers to operate their own
networks without maintaining their own networking infrastructure. Like other cloud
services, NaaS vendors run networking functions using software, essentially allowing
companies to set up their own networks entirely without hardware. All they need is
Internet connectivity.
NaaS can replace virtual private networks (VPNs), multiprotocol label switching (MPLS)
connections, or other legacy network configurations. It can also replace on-premise
networking hardware such as firewall appliances and load balancers. A newer model for
routing traffic and applying security policies, NaaS has had a major impact on enterprise
networking architecture.
The basic premise of DRaaS is that In the event of a real disaster, the remote vendor,
which typically has a globally distributed architecture, is less likely to be impacted
compared to the customer. This allows the vendor to support the customer in a worst
case disaster recovery scenario, in which a disaster results in complete shutdown of the
organization’s physical facilities or computing resources.
Third-party DRaaS vendors can provide failover for on-premise or cloud computing
environments, billed either on-demand, according to actual usage, or through ongoing
retainer agreements. DRaaS requirements and expectations are typically recorded in
service level agreements (SLAs).
Managed DRaaS
In the managed DRaaS model, third parties take full responsibility for disaster recovery.
Choosing this option requires organizations to work closely with DRaaS providers to
keep all infrastructure, application, and service changes up to date. If you don’t have the
expertise and time to manage your own disaster recovery, this is the best option.
Assisted DRaaS
If you want to take responsibility for certain aspects of your disaster recovery plan, or if
you have custom applications that may be difficult for a third party to take over,
supported DRaaS may be a better choice. In this model, the service provider provides
services and expertise that can help optimize the disaster recovery process, but the
customer is responsible for implementing some or all of the disaster recovery plans.
Self-Service DRaaS
The cheapest option is a self-service DRaaS, where customers are responsible for
planning, testing, and managing disaster recovery, and the vendor provides backup
management software, and hosts backups and virtual machines in remote locations.
This model is offered by all major cloud providers—Amazon, Microsoft Azure and
Google Cloud.
When using this model, careful planning and testing is required to ensure that
operations can be immediately failed over to the vendor’s remote data center, and easily
recovered when local resources are restored. This option is ideal for organizations with
in-house disaster recovery and cloud computing expertise.
Hosted DRaaS is especially useful for small businesses that lack in-house experts to
design and execute disaster recovery plans. The ability to outsource infrastructure is
another benefit for smaller organizations, because it avoids the high cost of equipment
needed to run a disaster recovery site.
Features :-
The following are key considerations when selecting a DRaaS provider for your
organization.
Reliability
In the early days of DRaaS, there were concerns about the resources available to the
DRaaS provider, and its ability to service a certain number of customers in case of a
widespread regional disaster.
Today, most DRaaS services are based on public cloud providers, which have virtually
unlimited capacity. At the same time, even public clouds have outages, and it is
important to understand what happens if, when disaster strikes, the DRaaS vendor is
unable to provide services. Another, more likely scenario is that the DRaaS vendor will
perform its duties, but will not meet its SLAs. Understand what are your rights under the
contract, and how your organization will react and recover, in each situation.
Access
Work with your DRaaS provider to understand how users will access internal
applications in a crisis, and how VPN will work—whether it will be managed by the
provider or rerouted. If you use virtual desktop infrastructure (VDI), check the impact of
a failover event on user access, and determine who will manage the VDI during a
disaster.
If you have applications accessed over the Internet, coordinate with providers,
customers, partners, and users how DNS will work in a crisis—whether it should be
transitioned to DNS managed by the provider, or kept with the same DNS (this also
depends on whether your DNS is hosted or self-managed). DNS is a mission critical
service, and if it doesn’t work smoothly during a disaster, even if systems are
successfully transitioned, they will be offline.
Assistance
Ask prospective DRaaS providers about the standard process and support they provide,
during normal operations and during a crisis. Determine:
K) Analytics -as-a-Service :-
Analytics-as-a-Service (AaaS) is a type of Cloud service. It provides access to data
analysis software and tools through the Cloud, rather than having to invest in
on-premise software.
AaaS services are complete and customizable solutions for organizing, analyzing
and visualizing data. The objectives are the same as for on-premise solutions, namely,
to provide information that can be used to make better decisions.
These tools offer different data analysis methods and technologies such as Data
Mining, Predictive Analysis, Dataviz or even advanced techniques such as Artificial
Intelligence and Machine Learning.
One of the main advantages of AaaS solutions is that these services are based on a
subscription model. As with other types of Cloud services, the user pays only for the
resources he or she consumes. This typically saves money compared to purchasing
on-premise software and the accompanying license.
Analytics as a service also provides access to the benefits of data analysis without the
need for one's own Data Warehouse and a full team of Data Scientists. The
infrastructure is managed by the service provider, and some have their own experts
allowing you to completely outsource the work.
Across all industries, more and more companies burdened with untapped data are
turning to analytics solutions as a service. Faced with a shortage of Data Scientists and
other experts, this is often the best alternative. With these services, members of any
team can access the benefits of data analysis without having to master the theory and
technologies required.
Even organizations that already have in-house expertise can use AaaS to relieve
their Data Scientists from the simplest analysis tasks. This allows experts to focus on
more complex analyses.
Indeed, there are hybrid forms of AaaS that allow you to combine your existing
infrastructure with Cloud services. In this case, only part of the data analysis will be
outsourced via the cloud.
However, analytics as a service may not be suitable for all companies. It is essential to
identify and define your needs, so that you can choose a service that meets those
needs without offering unnecessary functionality.
L) Backup -as-a-Service :-
Online backup service, also known as cloud backup or backup as a service (BaaS), is a
method of offsite data storage in which files, folders, or the entire contents of a hard
drive are regularly backed up by a service vendor to a remote secure cloud-based data
repository over a network connection. The purpose of online backup is simple and
straightforward: to protect the information – whether it's business data or personal –
from the risk of loss associated with user error, hacking, or any other kind of
technological disaster.
Instead of performing backup with a centralized, on-premises IT department, BaaS
connects systems to a private, public, or hybrid cloud managed by the outside provider.
Backup as a service is easier to manage than other offsite services. Instead of worrying
about rotating and managing tapes or hard disks at an offsite location, data storage
administrators can offload maintenance and management to the provider
In employing backup as a service, the first step is to purchase and sign up for the
service. Next, you select the services you want to back up. To back up Microsoft Office
365, select Exchange Online or SharePoint Online, or OneDrive for Business.
You make those selections only once. After the initial setup, changes to data you've
selected, as well as new data added to the services you've selected, are backed up
automatically and, with most online backup services, almost instantly.
OpenStack is an open-standard and free platform for cloud computing. Mostly, it is deployed as IaaS (Infrastructure-as-a-
Service) in both private and public clouds where various virtual servers and other types of resources are available for users.
This platform combines inter-related components that networking resources, storage resources, multi-vendor hardware
processing tools, and control diverse throughout the data center. Various users manage it by the command-line tools, web
services, and web-based dashboard.
ARCHITECTURE OF OPENSTACK
OpenStack contains a modular architecture along with several code names for the components.
Nova supports building bare-metal servers, virtual machines. It has narrow support for various system containers. It executes
as a daemon set on the existing Linux server's top for providing that service. This component is specified in Python. It uses
several external libraries of Python such as SQL toolkit and object-relational mapper (SQLAlchemy), AMQP messaging
framework (Kombu), and concurrent networking libraries (Eventlet).
It gives network connectivity as a service facility between various interface devices (such as vNICs) that are handled by some
other types of OpenStack services (such as Nova). It operates the Networking API of OpenStack. It handles every networking
facet for VNI (Virtual Networking Infrastructure) & various authorization layer factors of PNI (Physical Networking
Infrastructure) in an OpenStack platform. OpenStack networking allows projects to build advanced topologies of the virtual
network. It can include some of the services like VPN (Virtual Private Network) and a firewall.
Keystone is a service of OpenStack that offers shared multi-tenant authorization, service discovery, and API client
authentication by implementing Identity API of OpenStack. Commonly, it is an authentication system around the cloud OS. It
also supports standard password and username credentials & token-based systems logins.
Horizon is a canonical implementation of Dashboard of OpenStack which offers the web-based UI to various OpenStack
services such as Keystone, Swift, Nova, etc. Dashboard shifts with a few central dashboards like a Settings Dashboard, a
System Dashboard, and a User Dashboard. It envelopes Core Support. The horizon application ships using the API
abstraction set for many projects of Core OpenStack to facilitate a stable and consistent collection of reusable techniques for
developers. With these abstractions, the developers working on OpenStack Horizon do not require to be familiar intimately
with the entire OpenStack project's APIs.
Heat can be expressed as a service for orchestrating more than one fusion cloud application with templates by
‘CloudFormation’ adaptable Query API and OpenStack-native REST API.
(a) Compatibility & Portability. OpenStack is agile & easy to deploy; it supports both the private & public clouds.
OpenStack APIs are compatible with Amazon Web Services, so users don't need to rewrite applications for AWS.
This compatibility also allows applications and storage to transit between private clouds and public cloud providers.
(b) Security. OpenStack's robust security system supports multiple forms of identification.
(c) Management & Visibility. The open source cloud's Horizon dashboard gives administrators an overview of their
cloud environment including resources and instance pools.
(d) Cloud Storage. OpenStack offers unlimited storage pools and supports block I/O from a variety of vendors, as well
as object file storage. Its built-in storage management automatically recovers failed drives or nodes. To avoid the
effects of drive failures, users can take advantage of pre-emptive drive checking. Additionally, OpenStack's scaling
capabilities enable users to add servers and storage elastically.
(e) Support Big Data. Users can run Hadoop apps & web pages for big data analytics, media files & standard block I/O.
Eucalyptus in cloud computing is an open-source software platform for carrying out IaaS or Infrastructure-as-a-Service in a
hybrid cloud computing or private cloud computing environment. Eucalyptus in cloud computing pools together existing
virtualised framework to make cloud resources for storage as a service, network as a service and infrastructure as a service.
Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems is short known as Eucalyptus in
cloud computing.
ARCHITECTURE OF EUCALYPTUS
The Cloud Controller (CLC) is a Java program that offers EC2-compatible interfaces, as well as a web interface to the
outside world. In addition to handling incoming requests, the CLC acts as the administrative interface for cloud management
and performs high-level resource scheduling and system accounting. The CLC accepts user API requests from command-
line interfaces like euca2ools or GUI-based tools like the Eucalyptus User Console and manages the underlying compute,
storage, and network resources. Only one CLC can exist per cloud and it handles authentication, accounting, reporting, and
quota management.
Walrus, also written in Java, is the Eucalyptus equivalent to AWS Simple Storage Service (S3). Walrus offers persistent
storage to all of virtual machines in the Eucalyptus cloud & can be used as simple HTTP put/get storage as a service solution.
There are no data type restrictions for Walrus, & it can contain images (i.e., the building blocks used to launch virtual
machines), volume snapshots (i.e., point-in-time copies), with application data. Only one Walrus can exist per cloud.
The Cluster Controller (CC) is written in C and acts as the front end for a cluster within a Eucalyptus cloud and communicates
with the Storage Controller and Node Controller. It manages instance (i.e., virtual machines) execution and Service Level
Agreements (SLAs) per cluster.
The Storage Controller (SC) is written in Java and is the Eucalyptus equivalent to AWS EBS. It communicates with the
Cluster Controller and Node Controller and manages Eucalyptus block volumes and snapshots to the instances within its
specific cluster. If an instance requires writing persistent data to memory outside of the cluster, it would need to write to
Walrus, which is available to any instance in any cluster.
The Node Controller (NC) is written in C and hosts the virtual machine instances and manages the virtual network endpoints.
It downloads and caches images from Walrus as well as creates and caches instances. While there is no theoretical limit to
the number of Node Controllers per cluster, performance limits do exist.
FEATURES / CHARACTERISTICS / ADVANTAGES OF EUCALYPTUS
Security in cloud computing is a major concern. Data in cloud should be stored in encrypted form. To restrict client from
accessing the shared data directly, proxy and brokerage services should be employed. Before deploying a particular resource
to cloud, one should need to analyze several aspects of the resource such as :-
Select resource that needs to move to the cloud and analyze its sensitivity to risk.
Cloud service models (IaaS, PaaS, SaaS) require customer to be responsible for security at different levels of service.
Consider the cloud type to be used such as public, private, community or hybrid.
Understand the cloud service provider's system about data storage and its transfer into and out of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud types.
Security Boundaries
A particular service model defines the boundary between the responsibilities of service provider and customer. Cloud Security
Alliance (CSA) stack model defines the boundaries between each service model and shows how different functional units
relate to each other. The following diagram shows the CSA stack model:
Since all the data is transferred using Internet, data security is of major concern in the cloud. Here are key mechanisms for
protecting data :-
Access Control
Auditing
Authentication
Authorization
Since data stored in cloud can be accessed from anywhere, we must have a mechanism to isolate data and protect it from
client’s direct access. Brokered Cloud Storage Access is an approach for isolating storage in the cloud. In this approach, two
services are created :-
The client data request goes to the external service interface of proxy.
The proxy forwards the request to the broker.
The broker requests the data from cloud storage system.
The cloud storage system returns the data to the broker.
The broker returns the data to proxy.
Finally the proxy sends the data to the client.
Encryption
Encryption helps to protect data from being compromised. It protects data that is being transferred as well as data stored in
the cloud. Although encryption helps to protect data from any unauthorized access, it does not prevent data loss.
The hardware and technology used to safeguard data, workloads, and systems on cloud platforms is called Cloud
Security Architecture.
Developing a cloud security architecture plan should start with the blueprint and design process, and it should be built
into cloud platforms from the ground up.
Cloud security architecture is a framework that includes all of the technology and software required to safeguard
information, data, and applications handled in or through the cloud.
Public clouds, private clouds, and hybrid clouds are some of the cloud computing frameworks. All clouds must be
very secure to protect sensitive data and information.
As a company expands, it will require more secure systems to process its workload. Cloud networks provide many
benefits, but they also have a lot of security concerns.
If private data is accessed by an unauthorized user, it may be a hazardous situation for the company. Hence, cloud
security architecture is critical.
Cloud security architecture can close security gaps that go undiscovered in traditional point-of-sale (POS) systems.
In addition, cloud security design eliminates security network redundancy difficulties.
It also aids in the organization of security measures while ensuring their reliability throughout data processing. A
suitable cloud security architecture can also handle complex security issues successfully.
Insider Risks
Insider risks include internal employees with access to systems and data and administrators from cloud service providers
(CSPs). When you sign up for CSP services, you are effectively handing your data and workloads to a team of people in
charge of keeping the CSP architecture up to date.
Availability of Data
Another factor to examine is whether or not data is available to government agencies. Security experts are paying more
attention to the rules, regulations, and real-world examples that show whether a government may access data in a private or
public cloud via court orders or other ways.
DoS Attacks
DoS attack is a hot topic right now. Typical temporary direct denial-of-service (D-DoS) attacks include bombarding a system
with requests until it crashes. Using network compliance standards to block out repeated requests, security perimeters can
deflect these attacks. While working to restore the system, CSPs can also move workloads and traffic to other resources.
Permanent DoS attacks are more damaging, as they frequently cause firmware damage, rendering a server unbootable. In
this situation, a technician needs to manually reload the firmware and rebuild the system from the ground up, which might
take days or weeks.
Cloud-connected Edge Systems
The cloud edge can refer to cloud-connected edge systems, but it also relates to server architecture that isn't directly controlled
by the CSP. Because global CSPs are unable to develop and operate facilities in every corner of the globe, they rely on
partners to provide services to smaller, geographically isolated, or rural areas. As a result, many CSPs lack complete control
over monitoring and ensuring physical box integrity for the hardware, as well as physical attack defenses such as shutting off
USB port access.
Password Strength
Even with the most powerful cloud security architecture globally, a server can't assist you in developing a better password
due to hardware restrictions. One of the most prevalent attack vectors is Password. Hardware, firmware, and software
safeguards focus on cloud security architects.
A standard-based framework called AAA is used to manage who is allowed to access network resources, what they are
allowed to do, and record the actions taken while doing so (via authentication and Authorization). Or we can say, the AAA is
a structural framework used to access computer resources, enforce policies, conduct audits, provide vital data for service
billing, and perform other network administration and security tasks. The primary purpose of this operation is to grant specific,
Authorized user's access to network and software application resources. Authorization is the process of granting or denying
specific user's access to a computer network and its resources. Users can be given several Authorization levels, restricting
their access to the network and its resources. Accounting is known for monitoring and documenting user activities on a
computer network.
(a) Authentication
Authentication provides a method of identifying a user, typically by having the user enter a valid username and
password before access to the network is granted.
Authentication is based on each user having a unique set of login credentials for gaining network access.
The AAA server compares a user's authentication credentials with other user credentials stored in a database; in this
case, that database is Active Directory.
If the user's login credentials match, the user is granted access to the network. If the credentials don't match,
authentication fails and network access is denied.
(b) Authorization
Following authentication, a user must gain authorization for doing certain tasks. After logging in to a system, for
instance, the user may try to issue commands.
The authorization process determines whether the user has the authority to issue such commands.
Simply put, authorization is the process of enforcing policies i.e. determining what types or qualities of activities,
resources, or services a user is permitted.
Usually authorization occurs within the context of authentication. After you have authenticated a user, they may be
authorized for different types of access or activity.
As it relates to network authentication via RADIUS and 802.1x, authorization can be used to determine what VLAN,
Access Control List (ACL), or user role that the user belongs to.
(c) Accounting
The final piece in the AAA framework is accounting, which monitors the resources a user consumes during network
access.
This can include the amount of system time or the amount of data sent and received during a session. Accounting is
carried out by logging session statistics and usage information.
It is used for authorization control, billing, trend analysis, resource utilization, and planning for the data capacity
required for business operations.
ClearPass Policy Manager functions as the accounting server and receives accounting information about the user
from the Network Access Server (NAS).
The NAS must be configured to use ClearPass Policy Manager as an accounting server, and it is up to the NAS to
provide accurate accounting information to ClearPass Policy Manager.