Cloud computing architecture and vulnerabilies


Published on

Brief information of cloud computing

Published in: Technology
No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cloud computing architecture and vulnerabilies

  2. 2. WHAT IS CLOUD COMPUTING ?• Cloud computing is delivery of computing as service rather than as a product.• Enables on-demand network access to a shared pool.• Requires minimal management effort or service provider interaction.• It is UTILITY based system comprising of: 3
  3. 3. • It is collection of virtualized computers connected under SERVICE LEVEL AGREEMENT (SLA).• A service-level agreement is a part of a service contract where the level of service is formally defined.• It defines the role of third party control which includes: Negotiation of contract. Fulfillment in real time. QoS parameter. Monitoring. Enforcement. 4
  4. 4. NEED OF CLOUD COMPUTING• Cloud computing is a compelling paradigm.• The mission is to take computing on retail basis.• Making internet the ultimate resource of all computing needs.• Services are sold on a subscription or pay-per usage basis over internet. 5
  5. 5. 6Fig1:flow diagram of need of cloud computing [ref 2]
  6. 6. Evolution of cloud computing 7Fig2: Cloud computing evolution [ref 1]
  7. 7. 8Fig3: classification of cloud [ref 2]
  8. 8. Cloud Computing Architecture 9
  9. 9. SERVICE ORIENTED ARCHITECTURE (SOA) • SOA is an architectural pattern that guides business solutions to create, organize and reuse its computing components. • It is having a layered architecture each layer meant for performing different tasks.Fig 4 : Basic Architecture diagram of service oriented architecture [ref 2] 10
  10. 10. DETAILED SOA ARCHITECTURE DESCRIPTIONFig 5: detailed service oriented architecture description including all layers and their components.[ref 1] 11
  11. 11. • Individual Cloud Provider Layer: Each provider builds a data center that powers the cloud services it provides. Within each cloud there is request dispatcher working with virtual machine monitor to allocate the requests to available resources.• Cloud Ontology Mapping Layer: It masks the differences among the different cloud providers. Helps in migration of cloud application from one cloud to another. Storage ontology Computing ontology Communication ontology 12
  12. 12. • Cloud Broker Layer: It serves as an agent between individual CSP and SOA layer. It needs to fulfill following tasks: CLOUD PROVIDER INFORMATION PUBLISHING RANKING DYNAMIC SLA NEGOTIATION ON-DEMAND PROVISION MODEL• SOA Layer: Services are published as re-deployable packages. It contains following information and files: COMPILED CODE SOURCE CODE CONFIGURATION FILE 13
  13. 13. CHARACTERISTIC OF CLOUD COMPUTINGFig 6 : Various characteristics of cloud computing [ref 8] 14
  15. 15. SERVICE CATEGORIES The service provider provides services under following categories:Software is Provides a Virtualizespresented to the end development computing power,user on demand, platform with a set of storage andusually in a browser. services to assist on network cloud connectivity 16
  16. 16. Fig 7: service categories in a cloud with various components implemented at various levels [ref 6] 17
  17. 17. TECHINICAL CHARACTERISTICS LOOSE COUPLING:  Through virtualization or other technologies, the infrastructures are separated in logic. Users sets Uset1 , Uset2 , …, Usetm where (m ≥1). Providers sets Pset1 , Pset2 ,…, Psetn where ( n ≥1 ). Useti loose coupling with provider setj: Set (Useti Psetj ). User sets are independent: Useti ∩ Usetj =φ ( 0 ≤ i, j ≤ m , i ≠ j ). Provider sets are independent: Pseti ∩ Psetj =φ ( 0 ≤ i, j ≤ m , i ≠ j ). The loose coupling (cloud user connects to cloud Provider) sets are independent: Set (Useti1, Psetj1 )∩ (Useti2, Psetj2 ) =φ.Set (Usetgoogle ,Psetgoogle ) ∩ Set (Usetyahoo ,Psetyahoo) ∩ (Usetbing ,Psetbing ) =φ 18
  18. 18. Fig 8: Result of a survey conducted among IT giants to find out most crucial element that 19they are concerned about in cloud computing [ref 4 ]
  19. 19.  SECURITY: In cloud, data is distributed regardless of where your base repository of data is finally stored Personal data may be scattered in PRIVACY: various virtual data centers, even across the national borders. Servers in cloud have same problems as resident servers RELIABILITY: experiencing downtimes and slowdowns. By unthoughtful data sharing, various laws and government LEGAL ISSUES regulations may be violated. Data in the cloud should never become invalid even when the service provider go broke and LONG TERM VIABILITY: swallowed by other company.
  20. 20. Fig 9: information security requirements in various service categories of different computing models of cloudcomputing [ref 7] 21
  21. 21. • Identification & Authentication: Users must be validated by username-password authentication.• Authorization: Exerting control and privilege over information flow in the cloud.• Confidentiality: Information security protocols must be enforced at various layers of cloud architecture.• Integrity: Applying the due diligence within the cloud domain when accessing the data.• Non-repudiation: Applying traditional security protocols and token provisioning to data transfer.• Availability: Most critical security requirement as it is a key decision factor when choosing among different cloud models. 22
  22. 22.  Cloud computing is an emerging technology having many features from earlier technologies like grid and cluster computing. It brings infinite computability, good scalability, service on- demand, etc. The reliability, availability and other non functional properties are very good. There are still many challenges regarding security of data but that can be solved.
  23. 23. References[1] Wei-Tek Tsai, Xin Sun, Janaka Balasooriya “Service-Oriented Cloud Computing Architecture” in 2010 international conference on information technology, pp 684-689, © IEEE 2010.[2] Manish Pokharel, YoungHyun Yoon, Jong Sou Park, “Cloud Computing in System Architecture”, in Computer Network and Multimedia Technology (CNMT), 2009 , © IEEE 2009 .[3] Jianfeng Yang, Zhibin Chen, “Cloud computing research and security issues”, in International Conference on Computational Intelligence and Software Engineering (CiSE), 2010 , © IEEE 2010 .[4] Krešimir Popović, Željko Hocenski, “Cloud computing security issues and challenges” in MIPRO, 2010 Proceedings of the 33rd International Convention, pp 344-349 , © IEEE 2010.[5] Ilango Sriram, Ali Khajeh-Hosseini, “Research Agenda in Cloud Technologies”, © IEEE 2010.[6] Wikipedia- Cloud computing.[7] Ramgovind S, Eloff MM, Smith E, “The Management of Security in Cloud Computing”, © IEEE 2010.[8] Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu Gong “The Characteristics of Cloud Computing” in 39th International Conference on Parallel Processing Workshops (ICPPW), 2010 24
  24. 24. 25
  25. 25. 26