Business implementation of Cloud Computing

403 views
321 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
403
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Business implementation of Cloud Computing

  1. 1. Business implementation and Security Concerns of “Cloud Computing” Qaid Johar Abbasi Sodawala, Rahul Telang, (MCA II Year) & Prof. Sham S. Malgikar, Asst Professor JSPM’s Jayawant Institute of Computer Application, Tathawade, Pune. Mail: shammalgikar@gmail.com,quaidjohar.sodawala@gmail.comAbstract: Cloud computing is boasted as the next big thing in enterprise IT. Thecorporate data centers and on premise software will not shed their light soon but"the clouds" will have growing impact on enterprise IT and business activities inmany small and large organizations. The paper attempts to explore the corporate implementation of cloudcomputing and in how many ways it can be done. Also a very concerning issuesregarding cloud computing security are discussed.-------------------------------------------------------------------------------------------------------------Introduction: computing can be understood as more of aFew years back when internet was just service rather than a product.born, business activities moved at very slowpace. Now in twenty first century the pace What is cloud computing?of business is much quicker and it continuesto increase as the constant stream of new Cloud computing is an emergingtechnologies make their way to stimulate computing model by which users can gainbusiness processes. access to their applications from anywhere, through any connected device. A user-Cloud as a metaphor for "internet" is a centric interface makes the cloudcombination of various servers and infrastructure supporting the applicationsnetworks which is under veil to provide transparent to users. The applicationsservices like computation, software, data reside in massively scalable data centersaccess and storage to end user hiding its where computational resources can beactual physical location and configuration of dynamically provisioned and shared tothe system that delivers the service. Cloud
  2. 2. achieve significant scalability. A strong resources are optimally leveraged toservice management platform is build, so provide innovative services over the Web,that management costs of adding more IT and servers are provisioned in accordanceresources to the cloud can be significantly with the logical needs of the service usinglower than those associated with alternate advanced, automated tools. The cloud theninfrastructures. enables the service creators, program administrators and others to use theseWhy cloud: services via a Web-based interface that abstracts away the complexity of the 1. Scalability: underlying dynamic infrastructure. Servers can easily grow or shrink as per demand The infrastructure management methodology enables IT organizations to 2. Cost: manage large numbers of highly virtualized It helps keep the cost down for both resources as a single large resource. It also the users and website owners. Also allows IT organizations to massively for the users, they can access it from any computer and still have the file increase their data center resources they need. For the owners, they do without significantly increasing the number not need to reproduce the software of people traditionally required to maintain and ship it out. They just rent the that increase. server space. For organizations currently using 3. Instant: traditional infrastructures, a cloud will The scalability can be achieved enable users to consume IT resources in the instantly. It’s like controlling light data center in ways that were never brightness by regulator. available before. Companies that employ 4. Mobility: traditional data center management User can access their data practices know that making IT resources anywhere. available to an end user can be time- intensive. It involves many steps, such as procuring hardware; finding raised floor space and sufficient power and cooling;Business value of cloud computing: allocating administrators to install operating systems, middleware and software;Cloud computing is both a business provisioning the network; and securing thedelivery model and an infrastructure environment. Most companies find that thismanagement methodology. The business process can take upwards of two to threedelivery model provides a user experience months. Those IT organizations that are re-by which hardware, software and network provisioning existing hardware resources
  3. 3. find that it still takes several weeks to distinguish between grid computing andaccomplish. A cloud dramatically alleviates cloud computing.this problem by implementing automation, In the 1990s, the concept of virtualizationbusiness workflow and resource abstraction was expanded beyond virtual servers tothat allows a user to browse a catalog of IT higher levels of abstraction—the virtualservices, add them to a shopping cart and platform, including storage and networksubmit the order. After an administrator resources. Utility computing offeredapproves the order, the cloud does the rest. clusters as virtual platforms for computingThis process reduces the time required to with a metered business model. Moremake those resources available to the recently software as a service (SaaS) hascustomer from months to minutes. raised the level of virtualization to theEvolution: application, with a business model of charging not by the resources consumed Cloud computing is an important but by the value of the application to subscribers.topic. However, it is not a revolutionarynew development, but an evolution that The concept of cloud computing hashas taken place over several decades. evolved from the concepts of grid, utility and SaaS. It is an emerging model through The trend toward cloud computing which users can gain access to theirstarted in the late 1980s with the concept applications from anywhere, at any time,of grid computing when, for the first time, a through their connected devices.large number of systems were applied to asingle Cloud computing Models: Basically there are three types of cloud computing models which are: 1. Public. 2. Private. 3. Hybrid. Each type of cloud computing model—public, private or hybrid— faces different levels of IT risk.Problem, usually scientific in nature and In the private cloud deliveryrequiring exceptionally high levels of model, the cloud owner does notparallel computation. it’s important to share resources with any other
  4. 4. company. Private clouds are owned security and privacy with a minimumand operated by a single investment in fixed IT costs.organization, delivering IT serviceswithin the constraints of their own Cloud Service models:network perimeter. In addition to the different cloud In the public cloud computing models, there are distinctionscomputing model, IT activities and among the most common cloud servicefunctions are provided as a service models as shown in Figure. Available tothat can be billed on a pay-per-use anyone with Internet access, cloud serviceor subscription basis via the Internet models include:from external suppliers, usingresources not owned by theconsumer. The sharing of ITresources in a public, multitenantenvironment can help improveutilization rates and can reducecosts significantly while maintainingaccess to high quality technology. Ina public cloud, an organization rentsIT resources instead of having toinvest in their own physical ITinfrastructure or maintain under- ● Software as a Service (SaaS) cloudutilized equipment to service peak model—Enables software to be deliveredloads. Instead, they can scale usage from a host source over a network asup or down, according to need, with opposed to installations or implementationscosts directly proportional to need. ● Platform as a Service (PaaS) cloud Many organizations embrace model—Enables operating systems andboth public and private cloud middleware services to be delivered from acomputing by integrating the two managed source over a networkmodels into hybrid clouds. Thesehybrids are designed to meet ● Infrastructure as a Service (IaaS) cloudspecific business and technology model—Enables the entire infrastructure torequirements, so that activities and be delivered as a service over a network,tasks are allocated to traditional IT, including storage, routers, virtual systems,external or internal clouds, as hardware and servers.appropriate, helping to optimize
  5. 5. Cloud computing and security: the cloud provider to deliver secure systems.grand challenge: The clients do not have access to the hypervisor layer—the underlying operatingWhile cloud computing models are system that manages one or more virtual machines that run on a physical machine—attractive because of their flexibility and which typically does not share the virtualcost effectiveness, certain challenges must network segment with any of the otherbe addressed in order to provide a viable hosted virtual machines to avoid network-option to traditional data services. First and based intrusions. The cloud provider mayforemost is the issue of security. The also separately offer an optional virtualexternalized aspect of outsourcing can private network (VPN) capability so that themake it harder to maintain data integrity client can help ensure a protected networkand privacy, support data and service that is not directly visible for Internet-basedavailability, demonstrate compliance, and attackers. It is the client’s responsibility tosecure highly available access to maintain the patch level for all provisionedapplications and information. In short, virtual machines after the initialcloud computing can present an added level deployment as well as a properly configuredof risk. VPN to shield their valuable data andAlthough cloud computing can shift some infrastructure. If a client, however, choosescontrol over data and operations from the to refrain from purchasing a VPN option orclient organization to its cloud provider does not patch any of their web facingmuch in the same way organizations entrust virtual machines, the machines can bepart of their IT operations to outsourcing vulnerable.companies—operating a secure cloud- If an organization decides to implementbased IT environment is, after all, a shared these mechanisms in a private cloud usingresponsibility. Even basic tasks, such as their internal IT department, they will relyapplying patches and configuring network on their business policies to govern aspectssecurity, are the responsibility of both the like data confidentiality, access control tocloud service provider and consumer. Let us applications and systems, and so on.examine an example for both public and Employees will be entrusted to handle theprivate cloud. IT infrastructure because they areIn an IaaS model it is the cloud provider’s recertified against the business policies onresponsibility to offer a number of pre- a regular basis. In this environmentconfigured virtual machines that constantly organizations have to deal with the risk ofhave to be kept updated with the latest unauthorized privileged user access, datasecurity patches. When clients provision the loss prevention, malicious intrusions andvirtual machines, they have to trust the unintentional user errors. They also have to observe and comply with internal or
  6. 6. regulatory guidelines. If the organization a public cloud deployment, and thatdecides to implement these mechanisms in contracts are in place to guarantee localizeda public cloud using the cloud provider data storage.discussed in the example above, they willrely on written business agreements to Reference:govern the exact same aspects, as explained Web reference:in the private cloud example. They alsohave to deal with the same risks and comply http://www.ibm.com/cloud-computing/us/en/with the same internal or regulatory www.wikipedia.orgguidelines. http://thecloudtutorial.com/cloudtypes.htmlOther aspects about cloud computing alsorequire a major reassessment of securityand risk. Inside the cloud, it is often difficultto physically locate where data is stored.Security processes that were once visibleare now hidden behind layers ofabstraction. This lack of visibility can createa number of security and compliance issuesand may prohibit certain IT use cases to beimplemented using a strictly public cloudenvironment. Clients need to ensure thatthey can select a physical location even for

×