0% found this document useful (0 votes)
2 views

2

Cloud computing is a model that allows for remote access to hardware and software resources over the internet, offering services such as online data storage and application hosting. It features various deployment models (public, private, hybrid, community) and service models (IaaS, PaaS, SaaS), providing flexibility and cost-effectiveness while also presenting risks related to security, data lock-in, and performance unpredictability. Key characteristics include on-demand self-service, broad network access, resource pooling, and rapid elasticity, making it an essential component of modern IT infrastructure.

Uploaded by

akashsinghp072
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

2

Cloud computing is a model that allows for remote access to hardware and software resources over the internet, offering services such as online data storage and application hosting. It features various deployment models (public, private, hybrid, community) and service models (IaaS, PaaS, SaaS), providing flexibility and cost-effectiveness while also presenting risks related to security, data lock-in, and performance unpredictability. Key characteristics include on-demand self-service, broad network access, resource pooling, and rapid elasticity, making it an essential component of modern IT infrastructure.

Uploaded by

akashsinghp072
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

CLOUD COMPUTING UNIT-2 Dr.

Rajeev Sharma

UNIT-2 [Cloud Computing]

1.What is Cloud?

The term Cloud refers to a Network or Internet. In other words, we can say that
Cloud is something, which is present at remote location. Cloud can provide
services over public and private networks, i.e., WAN, LAN or VPN.

Applications such as e-mail, web conferencing, customer relationship


management (CRM) execute on cloud.

Cloud computing is an abstraction based on the notion of pooling physical


resources and presenting them as a virtual resource. It is a new model for
provisioning resources, for staging applications, and for platform-independent
user access to services. Clouds can come in many different types, and the
services and applications that run on clouds may or may not be delivered by a
cloud service provider. These different types and levels of cloud services mean
that it is important to define what type of cloud computing system you are
working with. To help clarify how cloud computing has changed the nature of
commercial system deployment, consider these three examples: l Google: In the
last decade, Google has built a worldwide network of datacenters to service its
search engine. In doing so Google has captured a substantial portion of the

PCA15E16 Page 1
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

world’s advertising revenue. That revenue has enabled Google to offer free
software to users based on that infrastructure and has changed the market for
user-facing software.

l Azure Platform: By contrast, Microsoft is creating the Azure Platform. It


enables .NET Framework applications to run over the Internet as an alternate
platform for Microsoft developer software running on desktops

Il Amazon Web Services: One of the most successful cloud-based businesses


is Amazon Web Services, which is an Infrastructure as a Service offering that
lets you rent virtual computers on Amazon’s own infrastructure.

PCA15E16 Page 2
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

PCA15E16 Page 3
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

1.1 What is Cloud Computing?

Cloud Computing refers to manipulating, configuring, and accessing the


hardware and software resources remotely. It offers online data storage,
infrastructure, and application.

PCA15E16 Page 4
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Cloud computing offers platform independency, as the software is not required


to be installed locally on the PC. Hence, the Cloud Computing is making our
business applications mobile and collaborative.

1.2 Why Cloud Computing

Actually, Small as well as some large IT companies follows the traditional


methods to provide the IT infrastructure. That means for any IT company, we
need a Server Room that is the basic need of IT companies.

In that server room, there should be a database server, mail


server, networking, firewalls,routers, modem, switches, QPS (Query Per Second
means how much queries or load will be handled by the server) , configurable
system, high net speed and the maintenance engineers.

To establish such IT infrastructure, we need to spend lots of money. To


overcome all these problems and to reduce the IT infrastructure cost, Cloud
Computing comes into existence.

PCA15E16 Page 5
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

1.3 Characteristics of Cloud Computing

The characteristics of cloud computing are given below:

1) Agility

The cloud works in the distributed computing environment. It shares resources


among users and works very fast.

2) High availability and reliability

Availability of servers is high and more reliable, because chances of


infrastructure failure are minimal.

3) High Scalability

Means "on-demand" provisioning of resources on a large scale, without having


engineers for peak loads.

4) Multi-Sharing

With the help of cloud computing, multiple users and applications can work more
efficientlywith cost reductions by sharing common infrastructure.

PCA15E16 Page 6
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

5) Device and Location Independence

Cloud computing enables the users to access systems using a web browser
regardless of their location or what device they use e.g. PC, mobile phone
etc. As infrastructure is off-site(typically provided by a third-party) and accessed
via the Internet, users can connect from anywhere.

6) Maintenance

Maintenance of cloud computing applications is easier, since they do not need to


be installed on each user's computer and can be accessed from different places.
So, it reduces the cost also.

7) Low Cost

By using cloud computing, the cost will be reduced because to take the services
of cloud computing, IT company need not to set its own infrastructure and pay-
as-per usage of resources.

8) Services in pay-per-use mode

Application Programming Interfaces (APIs) are provided to the users so that they
can access services on the cloud by using these APIs and pay the charges as per
the usage of services.

1.4 Basic Concepts

There are certain services and models working behind the scene making the
cloud computing feasible and accessible to end users. Following are the working
models for cloud computing:

 Deployment Models

 Service Models

1.4.1 Deployment Models

Deployment models define the type of access to the cloud, i.e., how the cloud is
located? Cloud can have any of the four types of access: Public, Private, Hybrid,
and Community.

PCA15E16 Page 7
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

A. PUBLIC CLOUD

The public cloud allows systems and services to be easily accessible to the
general public. Public cloud may be less secure because of its openness.

B. PRIVATE CLOUD
The private cloud allows systems and services to be accessible within an
organization. It is more secured because of its private nature.

C. COMMUNITY CLOUD
The community cloud allows systems and services to be accessible by a group
of organizations.

D. HYBRID CLOUD
The hybrid cloud is a mixture of public and private cloud, in which the critical
activities are performed using private cloud while the non-critical activities are
performed using public cloud.

1.4.2 Service Models

Cloud computing is based on service models. These are categorized into three
basic service models which are -

 Infrastructure-as–a-Service (IaaS)

 Platform-as-a-Service (PaaS)

 Software-as-a-Service (SaaS)

Anything-as-a-Service (XaaS) is yet another service model, which includes


Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-
as-a-Service or Strategy-as-a-Service.

The Infrastructure-as-a-Service (IaaS) is the most basic level of service.


Each of the service models inherit the security and management mechanism
from the underlying model, as shown in the following diagram:

PCA15E16 Page 8
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

INFRASTRUCTURE-AS-A-SERVICE (IAAS)
IaaS provides access to fundamental resources such as physical machines,
virtual machines, virtual storage, etc.

PLATFORM-AS-A-SERVICE (PAAS)
PaaS provides the runtime environment for applications, development and
deployment tools, etc.

SOFTWARE-AS-A-SERVICE (SAAS)
SaaS model allows to use software applications as a service to end-users.

History of Cloud Computing

The concept of Cloud Computing came into existence in the year 1950 with
implementation of mainframe computers, accessible via thin/static clients. Since
then, cloud computing has been evolved from static clients to dynamic ones and
from software to services. The following diagram explains the evolution of cloud
computing:

PCA15E16 Page 9
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

1.5 Benefits

Cloud Computing has numerous advantages. Some of them are listed below -

 One can access applications as utilities, over the Internet.

 One can manipulate and configure the applications online at any time.

 It does not require to install a software to access or manipulate cloud


application.

 Cloud Computing offers online development and deployment tools,


programming runtime environment through PaaS model.

 Cloud resources are available over the network in a manner that provide
platform independent access to any type of clients.

 Cloud Computing offers on-demand self-service. The resources can be


used without interaction with cloud service provider.

 Cloud Computing is highly cost effective because it operates at high


efficiency with optimum utilization. It just requires an Internet connection

 Cloud Computing offers load balancing that makes it more reliable.

PCA15E16 Page 10
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

1.6 Risks related to Cloud Computing

Although cloud Computing is a promising innovation with various benefits in the


world of computing, it comes with risks. Some of them are discussed below:

Security and Privacy

It is the biggest concern about cloud computing. Since data management and
infrastructure management in cloud is provided by third-party, it is always a
risk to handover the sensitive information to cloud service providers.

Although the cloud computing vendors ensure highly secured password


protected accounts, any sign of security breach may result in loss of customers
and businesses.

Lock In

It is very difficult for the customers to switch from one Cloud Service Provider
(CSP) to another. It results in dependency on a particular CSP for service.

Isolation Failure

This risk involves the failure of isolation mechanism that separates storage,
memory, and routing between the different tenants.

PCA15E16 Page 11
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Management Interface Compromise

In case of public cloud provider, the customer management interfaces are


accessible through the Internet.

Insecure or Incomplete Data Deletion

It is possible that the data requested for deletion may not get deleted. It
happens because either of the following reasons

 Extra copies of data are stored but are not available at the time of
deletion

 Disk that stores data of multiple tenants is destroyed.

1.7 Characteristics of Cloud Computing

There are four key characteristics of cloud computing. They are shown in the
following diagram:

On Demand Self Service

Cloud Computing allows the users to use web services and resources on
demand. One can logon to a website at any time and use them.

Broad Network Access

Since cloud computing is completely web based, it can be accessed from


anywhere and at any time.

PCA15E16 Page 12
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Resource Pooling

Cloud computing allows multiple tenants to share a pool of resources. One can
share single physical instance of hardware, database and basic infrastructure.

Rapid Elasticity

It is very easy to scale the resources vertically or horizontally at any time.


Scaling of resources means the ability of resources to deal with increasing or
decreasing demand.

The resources being used by customers at any given point of time are
automatically monitored.

Measured Service

In this service cloud provider controls and monitors all the aspects of cloud
service. Resource optimization, billing, and capacity planning etc. depend on it.

Before deploying applications to cloud, it is necessary to consider your business


requirements. Following are the issues one must consider:

 Data Security and Privacy Requirement

 Budget Requirements

 Type of cloud - public, private or hybrid

 Data backup requirements

 Training requirements

 Dashboard and reporting requirements

 Client access requirements

 Data export requirements

1.8 What Are The Challenges and obstacles Of Cloud Computing?

Obstacle 1: Business Continuity and Service Availability

Organizations often worry about the availability of the service provided by the
cloud providers. Even the popular service providers like Amazon, Google,
Microsoft experience outages. Keeping the technical issues of a availability aside,

PCA15E16 Page 13
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

a cloud provider could suffer outages for non-technical reasons like going out of
business or regulatory action.

Obstacle 2: Data Lock-In

Data Lock-is related to tight dependency of an organization’s business with the


software or hardware infrastructure of a cloud provider. Even though software
stacks have improved interoperability among platforms, the storage APIs are still
essentially proprietary, or at least have not been subject of active
standardization. This leads to customers not being able to extract their data and
programs from one site to run on another as in hybrid cloud computing or surge
computing.

Obstacle 3: Data Confidentiality/Auditability

Security of sensitive information in the cloud is one of the most often cited
objections to cloud computing. Analysts and skeptical companies ask “who would
trust their essential data out there somewhere?”. Cloud users face security
threats both from outside and inside the cloud.

The cloud user is responsible for application-level security. The cloud provider is
responsible for physical security, and likely for enforcing external firewall
policies. Security for intermediate layers is shared between the user and the
operator.

Although cloud makes external security easier, it does pose new problems
related to internal security. Cloud providers must guard against theft or denial-
of-service attacks by users. Users need to be protected from one another.

Obstacle 4: Data Transfer Bottlenecks

Now-a-days cloud applications are becoming data-intensive. The data store


capacity of enterprise applications or academic scientific programs might range
from a few terabytes to a few petabytes or even more.

Transferring such high volumes of data between two clouds might take from a
few days to even months with network having high data rates.

Obstacle 5: Performance Unpredictability

PCA15E16 Page 14
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

In the cloud virtual machines can share CPUs and main memory effectively but
network and I/O sharing is more problematic. As a result, different Amazon EC2
instances vary more in their I/O performance than in main memory
performance.

The obstacle to attracting HPC is, HPC applications need to ensure that all the
threads of a program are running simultaneously, and today’s virtual machines
and operating systems do not provide a programmer visible way to ensure this.

Obstacle 6: Scalable Storage

The problem with storage is it’s rigid behavior towards scalability. There have
been many attempts to answer this, varying in the richness of the query and
storage APIs, the performance guarantees offered, and the resulting consistency
semantics.

Obstacle 7: Bugs in Large-Scale Distributed Systems

One of the difficult challenges in cloud computing is removing errors in large-


scale distributed systems. A common caveat is that these bugs cannot be
reproduced in smaller configurations, so the debugging must occur at scale in
the production data centers.

Obstacle 8: Scaling Quickly

Pay-as-you-go model is well applied for storage and network bandwidth, as they
can be measured in terms of bytes transferred. Computation is slightly different,
depending on the virtualization level. For example, Google AppEngine
automatically scales in response to load increases and decreases, and users are
charged by the cycles used. AWS charges by the hour for the number of
instances that are alive (even when they are inactive).

Obstacle 9: Reputation Fate Sharing

One customer’s bad behavior can affect the reputation of other customers using
the same cloud. For example, In March 2009, FBI raided a Dallas data center
because a company whose services are hosted there was being investigated for
possible criminal activity, which affected a number of other innocent customers
who are also hosted in the same data center.

PCA15E16 Page 15
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Obstacle 10: Software Licencing

Current software licencing bills its consumers on the basis of how many
machines (physical) on which the software is going to be installed. The problem
with cloud is, the computational units are VMs instead of physical machines. A
physical machine might have tens of VMs running on it. So, how does software
vendors licence their software?

Following table gives a summary of the above mentioned obstacles for cloud
computing along with possible opportunities for each obstacle:

1.9 Challenges in Cloud Computing


Following diagram shows the major challenges in cloud computing.

PCA15E16 Page 16
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

2.0 Security and Privacy


 Security and privacy are the main challenge in cloud computing.
 These challenges can reduced by using security applications, encrypted file
systems, data loss software.
Interoperability
 The application on one platform should be able to incorporate services from the
other platform. This is known as Interoperability.
 It is becoming possible through web services, but to develop such web services
is complex.
Portability
 The applications running on one cloud platform can be moved to new cloud
platform and it should operate correctly without making any changes in design,
coding.
 The portability is not possible, because each of the cloud providers uses
different standard languages for their platform.
Service Quality
The Service-Level Agreements (SLAs) of the providers are not enough to
guarantee the availability and scalability. The businesses disinclined to switch to
cloud without a strong service quality guarantee.

Computing Performance
 High network bandwidth is needed for data intensive applications on cloud, this
results in high cost.
 In cloud computing, low bandwidth does not meet the desired computing
performance.
Reliability and Availability
Most of the businesses are dependent on services provided by third-party,
hence it is mandatory for the cloud systems to be reliable and robust.

2.1 Cloud SLA

A cloud SLA (cloud service-level agreement) is an agreement between


a cloudservice provider and a customer that ensures a minimum level of service
is maintained. Management and establishment of Service Level agreement (SLA)
in cloud totally depends upon the various parameters which helps in
establishment of SLA between the service providers and users. These

PCA15E16 Page 17
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

parameters are the deciding factors for provisioning of services and in formation
of SLA metrics.

A need to establish a Service Level Agreement (SLA) for providers, customers


and between provider and customer is there in cloud environment. SLA is
defined as a legal contract between participants to ensure:

(a) Quality of Service(QoS) requirements are met and if any party violates the
SLA terms, the defaulter has to pay penalty according to the clauses defined in
SLA.

(b) To indicate the profits, the service provider may obtain if the service is
delivered at certain levels,

(c) To indicate the penalty, the service provider has to pay if the agreed-upon
performance is not met.

(d) There exist many forms of SLAs with different metrics and measurement
methods (e.g., measured at a per-customer level or a per query level).

(e) In other words, Service Level Agreement (SLA) is an agreement negotiated


between service users and providers, which defines the metrics, expected QoS,
and penalties during service delivery.

2.2 SLA Model: Front end (Users), Back end (Providers and geographically
Distributed servers) and the network are the fundamental cloud components
which forms or lays the blue print for Cloud architecture. [12]. SLA is between
the provider and the consumer depending upon the various factors and
parameters. Users request for various services from cloud provider depending
upon its need. The provider with the help of broker /auditor fulfills the demand.
For establishment of SLA, the providers depending upon the demand negotiates,
allocates and manages the SLA. The entire process is depicted in the below
figure.

PCA15E16 Page 18
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Fig: Service level agreement model.

The model of SLA not only determine the template parameters for providers and
users who use different types of cloud service signing contract, but also helps
users to select a superior service. The evaluation method based on the SLA
model combines assessment from both providers and users. It is obvious that
service with high grade has high quality in its own service type .

Types of Cloud Services[(IaaS, PaaS, SaaS, IdaaS).] [Cloud Services]

 Software as a Service (SaaS)


 Platform as a Service (PaaS)
 Infrastructure as a Service (IaaS)
 Identity as a Service (IDaaS)
 Network as a Service (NaaS)

2.2.1 Software as a Service | SaaS

SaaS is a software distribution model in which applications are hosted by a cloud


service provider and made available to customers over internet. SaaS is also
known as "On-Demand Software".

In SaaS, software and associated data are centrally hosted on the cloud server.
SaaS is accessed by users using a thin client via a web browser.

PCA15E16 Page 19
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

In SaaS, the software & the applications associated with it are centrally located
on the cloud server, and users can access them via a thin client connecting
application, i.e., using a web browser.

The SaaS provides various applications such as:

 Billing and invoicing system

 Customer Relationship Management (CRM) applications

 Help desk applications

 Human Resource (HR) solutions

There are various advantages and disadvantages of SaaS.


The advantages are:

 Easy to buy: The cost of SaaS is based on a monthly or yearly fees allowing
new organizations to access the world of business at a low-cost, at least lesser
than licensed application.

 Minimization of Hardware Requirement: All SaaS software is hosted


remotely & so there is no or lesser need of hardware for the organizations.

 Special Software: No special software versions are required as all the users
will use the same software version. SaaS reduces IT costs by outsourcing
hardware & software maintenance.

 Low Maintenance: SaaS removes the daily problem of installing, maintaining


and updating software. The set-up cost of SaaS is also less in comparison to
enterprise software.

Disadvantages are also the points that users and vendors must keep in
mind while using the SaaS:
 Latency factor: comes due to a variable distance of data between the cloud &
the end-user, and hence a possibility of latency may arise while interacting
with applications.
 Internet Connection: is a major issue. Without internet connection, SaaS
applications are unusable.
 Switching between SaaS vendors in case of any change is very difficult
 The SaaS cloud service is not very secure than in-house deployment.

PCA15E16 Page 20
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

2.2.2 Infrastructure as a Service | IaaS

Iaas, earlier called Hardware as a Service (HaaS), is a cloud computing


platform based model. IaaS, as the name suggests, is a way of providing
Cloud computing infrastructure such as virtual machines, storage drives,
servers, operating systems & networks, which is also an on-demand
service like that of SaaS.

IaaS provides users with:

 Load balancers

 Disk storage via virtual machines

 Software Packages

 IP address

 VLANs

 All of the above resources are made available to end user via server
virtualization. Moreover, these resources are accessed by the customers
as if they own them.

PCA15E16 Page 21
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Advantages of IaaS are:

 Dynamic: Users can dynamically opt & configure devices such as CPU, storage
drive, etc.

 Easy Access: Users can easily access the vast cloud computing power.

 Renting: Flexible and efficient while renting IT infrastructures.

 Full control of computer resources along with portability.

Disadvantages of IaaS are as follows:

 Internet connection is a must.

 IaaS depends on virtualization services.

 This service restricts user-privacy & customization.

 Top vendors who are providing IaaS cloud computing platform

IaaS Vendor Iaas Solution Details

Amazon Web Elastic, Elastic The cloud computing platform


Services Compute Cloud (EC2) pioneer, Amazon offers auto
MapReduce, Route scaling, cloud monitoring, and load
53, Virtual Private balancing features as part of its
Cloud, etc. portfolio.

Netmagic Netmagic IaaS Cloud Netmagic runs from data centers in


Solutions Mumbai, Chennai, and Bangalore,
and a virtual data center in the
United States. Plans are underway
to extend services to West Asia.

Rackspace Cloud servers, cloud The cloud computing platform


files, cloud sites, etc. vendor focuses primarily on
enterprise-level hosting services.

PCA15E16 Page 22
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Reliance Reliance Internet RIDC supports both traditional


Communications Data Center hosting and cloud services, with
data centers in Mumbai, Bangalore,
Hyderabad, and Chennai. The cloud
services offered by RIDC include
IaaS and SaaS.

Sify Technologies Sify IaaS Sify's cloud computing platform is


powered by HP's converged
infrastructure. The vendor offers all
three types of cloud services: IaaS,
PaaS, and SaaS.

Tata InstaCompute InstaCompute is Tata


Communications Communications' IaaS offering.
InstaCompute data centers are
located in Hyderabad and
Singapore, with operations in both
countries.

2.2.3 Platform as a Service (PaaS)

PaaS cloud computing platform is a developer programming platform which is


created for the programmer to develop, test, run and manage the applications.

A developer is able to write the application as well as deploy it directly into this
layer easily.PaaS extend and abstract the IaaS layer by removing the hassle of
managing the individual virtual machine.

Platform-as-a-Service offers the runtime environment for applications. It also


offers development and deployment tools required to develop applications. PaaS
has a feature of point-and-click tools that enables non-developers to create web
applications.

App Engine of Google and Force.com are examples of PaaS offering vendors.
Developer may log on to these websites and use the built-in API to create web-
based applications.

PCA15E16 Page 23
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

But the disadvantage of using PaaS is that, the developer locks-in with a
particular vendor. For example, an application written in Python against API of
Google, and using App Engine of Google is likely to work only in that
environment.

The following diagram shows how PaaS offers an API and development tools to
the developers and how it helps the end user to access business applications.

Advantages of PaaS:

 Scalability: of users ranges from hundreds to thousands.

 Prebuilt Business Plan: PaaS vendors provide pre-defined business functionality


for users to directly start the project.

 Low Cost: Development via PaaS requires a computer & a good internet
connection and hence less investment in hardware & software.

 Instant Community: PaaS providers facilitates user providing online


communities where a developer can get new ideas & share their experience &
advice.

 Simple & easy to use

Disadvantages of PaaS are as follows:

PCA15E16 Page 24
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

 Vendor Migration: Migration from one PaaS vendors' application to another


PaaS vendor will create some problem.

 Data-Privacy: Privacy of data can get hamper if it is not held within the
boundary of the company or organization.

 Mix-up Complexity: Some of the applications developed may be local while


others are from the cloud; which may increase the complexity.

Characteristics

Here are the characteristics of PaaS service model:

 PaaS offers browser based development environment. It allows the


developer to create database and edit the application code either via
Application Programming Interface or point-and-click tools.

 PaaS provides built-in security, scalability, and web service interfaces.

 PaaS provides built-in tools for defining workflow, approval


processes, and business rules.

 It is easy to integrate PaaS with other applications on the same platform.

 PaaS also provides web services interfaces that allow us to connect the
applications outside the platform.

PaaS Types

Based on the functions, PaaS can be classified into four types as shown in the
following diagram:

PCA15E16 Page 25
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Stand-alone development environments

The stand-alone PaaS works as an independent entity for a specific function. It


does not include licensing or technical dependencies on specific SaaS
applications.

Application delivery-only environments

The application delivery PaaS includes on-demand scaling and application


security.

Open platform as a service

Open PaaS offers an open source software that helps a PaaS provider to run
applications.

Add-on development facilities

The add-on PaaS allows to customize the existing SaaS platform.

Top vendors who are providing PaaS cloud computing platform

1. Google Apps Engine (GAE)

2. SalesFroce.com

3. Windows Azure

4. AppFog

5. Openshift

6. Cloud Foundary from VMware

2.2.4 Identity as a Service (IDaaS)

IDaaS (Identity as a Service) This provides management of employee or user's


identity information as a digital entity. It minimizes the problem of
remembering every different username & password combination or disabling of
account when an employee leaves the company.

Employees in a company require to login to system to perform various tasks.


These systems may be based on local server or cloud based. Following are the
problems that an employee might face:

 Remembering different username and password combinations for


accessing multiple servers.

PCA15E16 Page 26
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

 If an employee leaves the company, it is required to ensure that each


account of that user is disabled. This increases workload on IT staff.

To solve above problems, a new technique emerged which is known as Identity-


as–a-Service (IDaaS).

IDaaS offers management of identity information as a digital entity. This


identity can be used during electronic transactions.

Identity

Identity refers to set of attributes associated with something to make it


recognizable. All objects may have same attributes, but their identities cannot
be the same. A unique identity is assigned through unique identification
attribute.

There are several identity services that are deployed to validate services such
as validating web sites, transactions, transaction participants, client, etc.
Identity-as-a-Service may include the following:

 Directory services

 Federated services

 Registration

 Authentication services

 Risk and event monitoring

 Single sign-on services

 Identity and profile management

Single Sign-On (SSO)

To solve the problem of using different username and password combinations


for different servers, companies now employ Single Sign-On software, which
allows the user to login only one time and manage the access to other systems.

SSO has single authentication server, managing multiple accesses to other


systems, as shown in the following diagram:

PCA15E16 Page 27
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

SSO Working

There are several implementations of SSO. Here, we discuss the common ones:

Following steps explain the working of Single Sign-On software:

 User logs into the authentication server using a username and password.

 The authentication server returns the user's ticket.

 User sends the ticket to intranet server.

 Intranet server sends the ticket to the authentication server.

PCA15E16 Page 28
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

 Authentication server sends the user's security credentials for that server
back to the intranet server.

If an employee leaves the company, then disabling the user account at the
authentication server prohibits the user's access to all the systems.

Federated Identity Management (FIDM)

FIDM describes the technologies and protocols that enable a user to package
security credentials across security domains. It uses Security Markup Language
(SAML) to package a user's security credentials as shown in the following
diagram:

OpenID

It offers users to login into multiple websites with single account. Google,
Yahoo!, Flickr, MySpace, WordPress.com are some of the companies that
support OpenID.

Benefits

 Increased site conversation rates

 Access to greater user profile content

 Fewer problems with lost passwords

PCA15E16 Page 29
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

 Ease of content integration into social networking sites

2.2.5 Network as a Service (NaaS)

NaaS (Network as a Service) allows users to access network infrastructure


directly. This service uses the virtualized network infrastructure & provides users
& customers with network services in a secured manner. The NaaS providers
maintain & manage network resources which decrease the workload of
customers/users. It is also based on the pay-per-use model.

Network-as-a-Service allows us to access to network infrastructure directly and


securely. NaaS makes it possible to deploy custom routing protocols.

NaaS uses virtualized network infrastructure to provide network services to the


customer. It is the responsibility of NaaS provider to maintain and manage the
network resources. Having a provider working for a customer decreases the
workload of the customer. Moreover, NaaS offers network as a utility. NaaS is
also based on pay-per-use model.

How NaaS is delivered?

To use NaaS model, the customer is required to logon to the web portal, where
he can get online API. Here, the customer can customize the route.

In turn, customer has to pay for the capacity used. It is also possible to turn off
the capacity at any time.

Mobile NaaS

Mobile NaaS offers more efficient and flexible control over mobile devices. It
uses virtualization to simplify the architecture thereby creating more efficient
processes.

PCA15E16 Page 30
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Following diagram shows the Mobile NaaS service elements:

NaaS Benefits

NaaS offers a number of benefits as discussed below:

Independence

Each customer is independent and can segregate the network.

PCA15E16 Page 31
CLOUD COMPUTING UNIT-2 Dr. Rajeev Sharma

Bursting

The customer pays for high-capacity network only on requirement.

Resilience

The reliability treatments are available, which can be applied for critical
applications.

Analytics

The data protection solutions are available, which can be applied for highly
sensitive applications.

Ease of Adding New Service Elements

It is very easy to integrate new service elements to the network.

Support Models

A number of support models are available to reduce operation cost.

Isolation of Customer Traffic

The customer traffic is logically isolated.

PCA15E16 Page 32

You might also like