Chapter 1
Chapter 1
◼ Data is stored:
closer to the site where it is used.
in a device and in a location-independent manner.
Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Utility computing. Pay-per-usage
Resources
Accessible via the Internet
Compute & storage servers
Networks Services Elasticity
Applications
Presentation
API
Applications
connectivity
connectivity
Abstraction
Abstraction
connectivity
Abstraction
Core
Core
Core
23
Cloud activities
Service
Consumer Service Provider Broker
audit Resource r a
abstraction and Provisioning i
control layer c
Privacy t y
impact audit Physical resource
y
layer Arbitrage
Portability/
Hardware Interoperability
Performance
audit
Facility
Carrier
◼ Identity fraud and theft are made possible by the unauthorized access
to personal data in circulation and by new forms of dissemination
through social networks and they could also pose a danger to cloud
computing.
◼ Such events can affect the Internet domain name servers and
prevent access to a cloud or can directly affect the clouds:
◼ in 2004 an attack at Akamai caused a domain name outage and a
major blackout that affected Google, Yahoo, and other sites.
◼ in 2009, Google was the target of a denial of service attack which
took down Google News and Gmail for several days;
◼ in 2012 lightning caused a prolonged down time at Amazon.