0% found this document useful (0 votes)
101 views

Cloud Computing Revision

Cloud computing allows users to access computing resources over the Internet. It provides several benefits including pay-as-you-go pricing, elasticity, on-demand self-service, and resource pooling. Some challenges of cloud computing include security, privacy, availability, and data lock-in. Cloud architecture includes front-end and back-end platforms connected by a network to provide cloud-based services. Deployment models include public, private, hybrid, and community clouds depending on the intended users.

Uploaded by

Ajinkya Tambe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views

Cloud Computing Revision

Cloud computing allows users to access computing resources over the Internet. It provides several benefits including pay-as-you-go pricing, elasticity, on-demand self-service, and resource pooling. Some challenges of cloud computing include security, privacy, availability, and data lock-in. Cloud architecture includes front-end and back-end platforms connected by a network to provide cloud-based services. Deployment models include public, private, hybrid, and community clouds depending on the intended users.

Uploaded by

Ajinkya Tambe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

UNIT 1

Cloud computing:

Cloud computing is the use of computing resources (hardware


and software) that are delivered as a service over internet.

Features:
• Pay as you go
• Focus on business rather than IT
• Elasticity
• On Demand Self-Service:
• Broad Network Access
• Resource Pooling: The process of pooling resources by
provider/vendor to serve multiple users at a time
according to their requirement without changing any
configuration of resources.
• Rapid Elasticity
• Measured Service
• Security

Mainframes:
Mainframes are high-performance computers with large
amounts of memory and processors that process billions of
simple calculations and transactions in real time.

SOA:
It defines a way to make software components reusable using
the interfaces.
Formally, SOA is an architectural approach in which
applications make use of services available in the network. In
this architecture, services are provided to form applications,
through a network call over the internet. It uses common
communication standards to speed up and streamline the
service integrations in applications.

Web service:
Web service is a set of open protocols and standards that
allow data to be exchanged between different applications or
systems.
A web service is a software module that is intended to carry
out a specific set of functions. Web services in cloud
computing can be found and invoked over the network.
Virtual appliance
A virtual appliance is a pre-installed and pre-configured
software solution on one or more virtual machines that is
optimized for a specific function.

Open Virtualization Format:


Open Virtualization Format is an open standard for packaging
and distributing virtual appliances or, more generally,
software to be run in virtual machines.

Autonomic Computing
Autonomic computing is a computer’s ability to manage itself
automatically through adaptive technologies.

Challenges: Risks:

Security Privacy Disaster Recovery


Trust Resource Management and
Data Lock-In Energy
Availability Efficiency
Fault-Tolerance
UNIT 2
Cloud computing architecture
❑ Cloud computing architecture includes components that
are used to build and maintain cloud environment. These
resources are pooled by virtualization and they are connected
and communicate through a wide network.

❑ Components of CC Architecture include:


• A front-end platform
• One or more back-end platforms (servers and storage)
• A cloud-based delivery
• A network to connect cloud clients, servers, and storage

Cloud Infrastructure Management:


It is a schema to build communication between data and
applications using various APIs and other mapping techniques
• With SaaS you use the application with little
customization.
• With PaaS you create applications that run on the
platform. You are limited by the platform as to what
applications you can create.
• With IaaS you build applications without any tie in to the
platform.
Deployment model:

The deployment is the way in which a cloud is designed to


provide service(s). The deployment model changes as per
the requirement set between CSP and the customer; and
hence the deployment model is most probably user –
specific.

1. Public Cloud:
The whole computing infrastructure is located on the
premises of a CSP that offers the cloud service. This
infrastructure can be accessed by general public.

2. Private Cloud:
Here, the cloud infrastructure is owned by one customer/
organization. This can be on-premise or off-premise as
well.

3. Hybrid cloud:
Means using both private and public clouds, depending
on their purpose.

4. Community cloud:
Community cloud implies an infrastructure that is shared
between organizations, usually with the shared data and
data management concerns.
UNIT 3

Li
• Life cycle of SLA:
1. Contract Definition
2. discovery and negotiation
3. Development & Deployment
4. Execution of services
- Execution and monitoring
- Reporting
- QoS
5. Corrective Actions
6.Termination / Decommission

• Types of SLA:

1. Customer based SLA


2. Service based SLA
3. Multilevel based SLA
- Corporate level
- Customer level
- Service level

• Cloud Economics:

1. Tired Pricing
2. Per-unit Pricing
3. Subscription based Pricing
Cloud Resource management :

The term resource management refers to the operations used


to control how capabilities provided by cloud resources and
services can be made available to other entities in efficient
manner

Objective / Characteristics:
- Scalability
- QoS
- Improved throughput
- Reduce overhead and latency
- Cost effectiveness
- Simple UI

Resources types:

- Compute resources: processors, memory, I/O


- Network resources: router, switches, cables
- Power resources

CRM policies:

1. Admission control
2. Load balancing
3. Capacity allocation
4. Energy optimization
5. QoS
UNIT 4

Cloud Data Management :

Managing the unprocessed or raw data

- Making replicas
- Full access over data
- Large volume transaction
- Keeping data ready for all queries
- Stability of DB

Need of Data Management:

- Security
- Scalability and savings
- Governed access
- Automated backups and disaster recovery
- Improved data quality
- Automated updates
- Sustainability

Parallel DBMS:
Instead of a single backend, there are multiple backend
machines connected either to a single host or to multiple
hosts
Three categories:
- Shared memory
- Shared disk
- Shared nothing
Hadoop: Page up

Hadoop is an open-source software framework for storing


data and running applications on clusters of commodity
hardware. It provides massive storage for any kind of data,
enormous processing power and the ability to handle virtually
limitless concurrent tasks or jobs.

DynamoDB:
It is a service provided by AWS, and is fully managed NoSQL
DB which supports concurrent read and write operations.
Data lake:
- Unstructured, structured, semi – structure data is
stored
- Schema is defined later
- Inexpensive
- Low latency
- Data is kept in raw form
- Used for deep analysis

Data warehouse:
- Structured data
- Schema is defined earlier
- Expensive
- High latency
- Faces issues while transforming data

Big table:
It is NoSQL column-based database which can scale upto
billions of rows and thousand of column and can store
tera bytes or penta bytes of data.
Data can be accessed using:
- Row key
- Column key
- Timestamp key

Cloud Storage types:


Block storage as the name suggests the data is stored in the
form of block. Block Storage store the data in the form of the
fixed-size chunks which is called block.

Object Storage is a storage architecture that manages data as


objects
◦Each object typically includes
◦ –the data itself,
◦ –a variable amount of metadata,
◦ –and a globally unique identifier.

It uses web API call to access the data in the object storage
using its unique identifier

HADOOP
UNIT 5

Basic security components (CIA )


- Confidentiality (Keeping data and resources hidden)
- Integrity (Data integrity and Origin integrity -
authorization)
- Availability (Enabling access to data and resources)

Security attacks – any action that compromises the security of


information/ data/ resources

Types of attacks –
- Interruption -> restrict access of data/ resources
(availability)
- Interception -> an intermediate (un-intended) entity is
accessing resources (confidentiality)
- Modification -> change in data/ communication ( Data
integrity)
- Fabrication -> changing / altering origin of data (
Authentication )

Security concerns in cloud computing –


Data breaches
Compromised credentials and broken authentication -
Insider attacks/ threats
Malware injection
Vulnerability in browsers and APIs
Denial of service attacks
Shared vulnerabilities
VM to VM attacks
Ways/ methods to provide and maintain security to cloud
stored data –

1. Access control
2. SLA (define the responsibilities of the parties)
3. Certified provider
4. Strict validation for user
5. Event prevention and intervention (inside cloud issues)
6. Third party audit (otp / user backgrd)
7. Encryption algos (rsa, pgp)
8. Intel Data Anonymization (to prevent data
breach/disclosure)

Public Cloud Security:


- Ensuring configuration remains same
- CSPM (cloud security posture mngmt) for newly added
resources
- Data from third party providers should be gone through
security measures

Private Cloud Security:

- Use cloud native monitoring tools


- Monitor privileged accounts
- Isolation of all resources (vm, os, storage)
- Separate NICs or VLANs

Hybrid Cloud Security:


- protect public and private cloud
- monitoring tools (common framework)
UNIT 6

Open src vs commercial software:

- cost
- support
- licence
- updates / installation
- customization
Disadvantages of cloud computing:

1. Data privacy ( vulnerable to attack )


2. Security
3. Vendor lock in
4. Limited control
5. Downtime

CSPs:

Open stack:
- Open source s/w
- Used for making Private and public cloud
- Large community of developers
- Falls under IaaS
- Virtual h/w
Cloud foundry:
- Open source s/w
- faster and easier
- Testing and deployment
- Falls under PaaS
- Pivotal, from IBM.
Open shift:
- Red hat
- PaaS
Cloudify:
- Acting as a type of middleware, the idea behind
Cloudify was to provide users a simple way to deploy
applications or services in a cloud computing
environment.
- Cloudify is an open source cloud

You might also like