2
2
Rajeev Sharma
1.What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we can say that
Cloud is something, which is present at remote location. Cloud can provide
services over public and private networks, i.e., WAN, LAN or VPN.
PCA15E16 Page 1
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
world’s advertising revenue. That revenue has enabled Google to offer free
software to users based on that infrastructure and has changed the market for
user-facing software.
PCA15E16 Page 2
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
PCA15E16 Page 3
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
PCA15E16 Page 4
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
PCA15E16 Page 5
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
1) Agility
3) High Scalability
4) Multi-Sharing
With the help of cloud computing, multiple users and applications can work more
efficientlywith cost reductions by sharing common infrastructure.
PCA15E16 Page 6
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Cloud computing enables the users to access systems using a web browser
regardless of their location or what device they use e.g. PC, mobile phone
etc. As infrastructure is off-site(typically provided by a third-party) and accessed
via the Internet, users can connect from anywhere.
6) Maintenance
7) Low Cost
By using cloud computing, the cost will be reduced because to take the services
of cloud computing, IT company need not to set its own infrastructure and pay-
as-per usage of resources.
Application Programming Interfaces (APIs) are provided to the users so that they
can access services on the cloud by using these APIs and pay the charges as per
the usage of services.
There are certain services and models working behind the scene making the
cloud computing feasible and accessible to end users. Following are the working
models for cloud computing:
Deployment Models
Service Models
Deployment models define the type of access to the cloud, i.e., how the cloud is
located? Cloud can have any of the four types of access: Public, Private, Hybrid,
and Community.
PCA15E16 Page 7
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
A. PUBLIC CLOUD
The public cloud allows systems and services to be easily accessible to the
general public. Public cloud may be less secure because of its openness.
B. PRIVATE CLOUD
The private cloud allows systems and services to be accessible within an
organization. It is more secured because of its private nature.
C. COMMUNITY CLOUD
The community cloud allows systems and services to be accessible by a group
of organizations.
D. HYBRID CLOUD
The hybrid cloud is a mixture of public and private cloud, in which the critical
activities are performed using private cloud while the non-critical activities are
performed using public cloud.
Cloud computing is based on service models. These are categorized into three
basic service models which are -
Infrastructure-as–a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
PCA15E16 Page 8
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
INFRASTRUCTURE-AS-A-SERVICE (IAAS)
IaaS provides access to fundamental resources such as physical machines,
virtual machines, virtual storage, etc.
PLATFORM-AS-A-SERVICE (PAAS)
PaaS provides the runtime environment for applications, development and
deployment tools, etc.
SOFTWARE-AS-A-SERVICE (SAAS)
SaaS model allows to use software applications as a service to end-users.
The concept of Cloud Computing came into existence in the year 1950 with
implementation of mainframe computers, accessible via thin/static clients. Since
then, cloud computing has been evolved from static clients to dynamic ones and
from software to services. The following diagram explains the evolution of cloud
computing:
PCA15E16 Page 9
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
1.5 Benefits
Cloud Computing has numerous advantages. Some of them are listed below -
One can manipulate and configure the applications online at any time.
Cloud resources are available over the network in a manner that provide
platform independent access to any type of clients.
PCA15E16 Page 10
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
It is the biggest concern about cloud computing. Since data management and
infrastructure management in cloud is provided by third-party, it is always a
risk to handover the sensitive information to cloud service providers.
Lock In
It is very difficult for the customers to switch from one Cloud Service Provider
(CSP) to another. It results in dependency on a particular CSP for service.
Isolation Failure
This risk involves the failure of isolation mechanism that separates storage,
memory, and routing between the different tenants.
PCA15E16 Page 11
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
It is possible that the data requested for deletion may not get deleted. It
happens because either of the following reasons
Extra copies of data are stored but are not available at the time of
deletion
There are four key characteristics of cloud computing. They are shown in the
following diagram:
Cloud Computing allows the users to use web services and resources on
demand. One can logon to a website at any time and use them.
PCA15E16 Page 12
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Resource Pooling
Cloud computing allows multiple tenants to share a pool of resources. One can
share single physical instance of hardware, database and basic infrastructure.
Rapid Elasticity
The resources being used by customers at any given point of time are
automatically monitored.
Measured Service
In this service cloud provider controls and monitors all the aspects of cloud
service. Resource optimization, billing, and capacity planning etc. depend on it.
Budget Requirements
Training requirements
Organizations often worry about the availability of the service provided by the
cloud providers. Even the popular service providers like Amazon, Google,
Microsoft experience outages. Keeping the technical issues of a availability aside,
PCA15E16 Page 13
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
a cloud provider could suffer outages for non-technical reasons like going out of
business or regulatory action.
Security of sensitive information in the cloud is one of the most often cited
objections to cloud computing. Analysts and skeptical companies ask “who would
trust their essential data out there somewhere?”. Cloud users face security
threats both from outside and inside the cloud.
The cloud user is responsible for application-level security. The cloud provider is
responsible for physical security, and likely for enforcing external firewall
policies. Security for intermediate layers is shared between the user and the
operator.
Although cloud makes external security easier, it does pose new problems
related to internal security. Cloud providers must guard against theft or denial-
of-service attacks by users. Users need to be protected from one another.
Transferring such high volumes of data between two clouds might take from a
few days to even months with network having high data rates.
PCA15E16 Page 14
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
In the cloud virtual machines can share CPUs and main memory effectively but
network and I/O sharing is more problematic. As a result, different Amazon EC2
instances vary more in their I/O performance than in main memory
performance.
The obstacle to attracting HPC is, HPC applications need to ensure that all the
threads of a program are running simultaneously, and today’s virtual machines
and operating systems do not provide a programmer visible way to ensure this.
The problem with storage is it’s rigid behavior towards scalability. There have
been many attempts to answer this, varying in the richness of the query and
storage APIs, the performance guarantees offered, and the resulting consistency
semantics.
Pay-as-you-go model is well applied for storage and network bandwidth, as they
can be measured in terms of bytes transferred. Computation is slightly different,
depending on the virtualization level. For example, Google AppEngine
automatically scales in response to load increases and decreases, and users are
charged by the cycles used. AWS charges by the hour for the number of
instances that are alive (even when they are inactive).
One customer’s bad behavior can affect the reputation of other customers using
the same cloud. For example, In March 2009, FBI raided a Dallas data center
because a company whose services are hosted there was being investigated for
possible criminal activity, which affected a number of other innocent customers
who are also hosted in the same data center.
PCA15E16 Page 15
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Current software licencing bills its consumers on the basis of how many
machines (physical) on which the software is going to be installed. The problem
with cloud is, the computational units are VMs instead of physical machines. A
physical machine might have tens of VMs running on it. So, how does software
vendors licence their software?
Following table gives a summary of the above mentioned obstacles for cloud
computing along with possible opportunities for each obstacle:
PCA15E16 Page 16
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Computing Performance
High network bandwidth is needed for data intensive applications on cloud, this
results in high cost.
In cloud computing, low bandwidth does not meet the desired computing
performance.
Reliability and Availability
Most of the businesses are dependent on services provided by third-party,
hence it is mandatory for the cloud systems to be reliable and robust.
PCA15E16 Page 17
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
parameters are the deciding factors for provisioning of services and in formation
of SLA metrics.
(a) Quality of Service(QoS) requirements are met and if any party violates the
SLA terms, the defaulter has to pay penalty according to the clauses defined in
SLA.
(b) To indicate the profits, the service provider may obtain if the service is
delivered at certain levels,
(c) To indicate the penalty, the service provider has to pay if the agreed-upon
performance is not met.
(d) There exist many forms of SLAs with different metrics and measurement
methods (e.g., measured at a per-customer level or a per query level).
2.2 SLA Model: Front end (Users), Back end (Providers and geographically
Distributed servers) and the network are the fundamental cloud components
which forms or lays the blue print for Cloud architecture. [12]. SLA is between
the provider and the consumer depending upon the various factors and
parameters. Users request for various services from cloud provider depending
upon its need. The provider with the help of broker /auditor fulfills the demand.
For establishment of SLA, the providers depending upon the demand negotiates,
allocates and manages the SLA. The entire process is depicted in the below
figure.
PCA15E16 Page 18
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
The model of SLA not only determine the template parameters for providers and
users who use different types of cloud service signing contract, but also helps
users to select a superior service. The evaluation method based on the SLA
model combines assessment from both providers and users. It is obvious that
service with high grade has high quality in its own service type .
In SaaS, software and associated data are centrally hosted on the cloud server.
SaaS is accessed by users using a thin client via a web browser.
PCA15E16 Page 19
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
In SaaS, the software & the applications associated with it are centrally located
on the cloud server, and users can access them via a thin client connecting
application, i.e., using a web browser.
Easy to buy: The cost of SaaS is based on a monthly or yearly fees allowing
new organizations to access the world of business at a low-cost, at least lesser
than licensed application.
Special Software: No special software versions are required as all the users
will use the same software version. SaaS reduces IT costs by outsourcing
hardware & software maintenance.
Disadvantages are also the points that users and vendors must keep in
mind while using the SaaS:
Latency factor: comes due to a variable distance of data between the cloud &
the end-user, and hence a possibility of latency may arise while interacting
with applications.
Internet Connection: is a major issue. Without internet connection, SaaS
applications are unusable.
Switching between SaaS vendors in case of any change is very difficult
The SaaS cloud service is not very secure than in-house deployment.
PCA15E16 Page 20
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Load balancers
Software Packages
IP address
VLANs
All of the above resources are made available to end user via server
virtualization. Moreover, these resources are accessed by the customers
as if they own them.
PCA15E16 Page 21
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Dynamic: Users can dynamically opt & configure devices such as CPU, storage
drive, etc.
Easy Access: Users can easily access the vast cloud computing power.
PCA15E16 Page 22
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
A developer is able to write the application as well as deploy it directly into this
layer easily.PaaS extend and abstract the IaaS layer by removing the hassle of
managing the individual virtual machine.
App Engine of Google and Force.com are examples of PaaS offering vendors.
Developer may log on to these websites and use the built-in API to create web-
based applications.
PCA15E16 Page 23
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
But the disadvantage of using PaaS is that, the developer locks-in with a
particular vendor. For example, an application written in Python against API of
Google, and using App Engine of Google is likely to work only in that
environment.
The following diagram shows how PaaS offers an API and development tools to
the developers and how it helps the end user to access business applications.
Advantages of PaaS:
Low Cost: Development via PaaS requires a computer & a good internet
connection and hence less investment in hardware & software.
PCA15E16 Page 24
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Data-Privacy: Privacy of data can get hamper if it is not held within the
boundary of the company or organization.
Characteristics
PaaS also provides web services interfaces that allow us to connect the
applications outside the platform.
PaaS Types
Based on the functions, PaaS can be classified into four types as shown in the
following diagram:
PCA15E16 Page 25
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Open PaaS offers an open source software that helps a PaaS provider to run
applications.
2. SalesFroce.com
3. Windows Azure
4. AppFog
5. Openshift
PCA15E16 Page 26
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Identity
There are several identity services that are deployed to validate services such
as validating web sites, transactions, transaction participants, client, etc.
Identity-as-a-Service may include the following:
Directory services
Federated services
Registration
Authentication services
PCA15E16 Page 27
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
SSO Working
There are several implementations of SSO. Here, we discuss the common ones:
User logs into the authentication server using a username and password.
PCA15E16 Page 28
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Authentication server sends the user's security credentials for that server
back to the intranet server.
If an employee leaves the company, then disabling the user account at the
authentication server prohibits the user's access to all the systems.
FIDM describes the technologies and protocols that enable a user to package
security credentials across security domains. It uses Security Markup Language
(SAML) to package a user's security credentials as shown in the following
diagram:
OpenID
It offers users to login into multiple websites with single account. Google,
Yahoo!, Flickr, MySpace, WordPress.com are some of the companies that
support OpenID.
Benefits
PCA15E16 Page 29
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
To use NaaS model, the customer is required to logon to the web portal, where
he can get online API. Here, the customer can customize the route.
In turn, customer has to pay for the capacity used. It is also possible to turn off
the capacity at any time.
Mobile NaaS
Mobile NaaS offers more efficient and flexible control over mobile devices. It
uses virtualization to simplify the architecture thereby creating more efficient
processes.
PCA15E16 Page 30
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
NaaS Benefits
Independence
PCA15E16 Page 31
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma
Bursting
Resilience
The reliability treatments are available, which can be applied for critical
applications.
Analytics
The data protection solutions are available, which can be applied for highly
sensitive applications.
Support Models
PCA15E16 Page 32