Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Unit-3.pptx
1. Unit-III
COMMON STANDARDS AND CLOUD
PLATFORMS
Prepared by
Mr. B . A. Chaugule
ZCOER ,PUNE
Department of Information Technology
1
Zeal Education Society’s
Zeal College of Engineering & Research,
Pune
Department of Information Technology
2. Common Standards: The Open Cloud Consortium, Open Virtualization
Format, Standards for Application
Developers: Browsers (Ajax), Data (XML, JSON), Solution Stacks (LAMP
and LAPP), Syndication (Atom, Atom Publishing Protocol, and RSS),
Standards for Security.
Amazon web services: Compute services Storage Services Communication
Services Additional services
Google AppEngine: Architecture and core concepts, Application life cycle,
Cost model
Microsoft Azure: Azure core concepts, SQL Azure, Windows Azure
platform appliance
ZCOER ,PUNE
Department of Information Technology
2
CONTENTS
3. Common Standards in Cloud
Computing
ZCOER ,PUNE
Department of Information Technology
3
Common goals for cloud standards include
portability, migration, and security.
1. Working Groups
2. Open Cloud Consortium
3. The Distributed Management Task Force
4. Standards for Application Developers
5. Standards for Messaging
6. Standards for Security
4. Working Groups
ZCOER ,PUNE
Department of Information Technology
4
A working group is an assembled, cooperative
collaboration of researchers working on new
research activities that would be difficult for
any one member to develop alone.
A working group can exist for anywhere
between a few months to many years.
Working groups generally strive to create an
informational document a standard, or find
some resolution for problems related to a
system or network.
Working groups are sometimes also referred to
as task groups or technical advisory groups.
5. Working Groups
ZCOER ,PUNE
Department of Information Technology
5
Working groups support the interest and activities of
OCC (Open Cloud Consortium) Members. The
current working groups include:
The Open Science Data Cloud (OSDC) Working Group
Project Matsu
The Open Cloud Testbed Working Group
Biomedical Commons Cloud (BCC)
Working Group on Standards and Interoperability
for Clouds
Working Group on Information Sharing, Security,
and Clouds has a primary focus on standards and
standards-based architectures for sharing
information between clouds.
7. Open Cloud Consortium
ZCOER ,PUNE
Department of Information Technology
7
The Open Cloud Consortium (OCC) is
1. A not for profit
2. Manages and operates cloud computing
infrastructure to support scientific, medical, health
care and environmental research.
3. OCC members span the globe and include over 10
universities, over 15 companies, and over 5
government agencies and national laboratories.
4. The OCC is organized into several different working
groups.
8. The OCC Mission
ZCOER ,PUNE
Department of Information Technology
8
The purpose of the Open Cloud Consortium is to
support the development of standards for
cloud computing and to develop a framework
for interoperability among various clouds.
The OCC supports the development of
benchmarks for cloud computing.
Manages cloud computing testbeds, such as
the Open Cloud Testbed, to improve cloud
computing software and services.
Sponsors workshops and other events related to
cloud computing to educate the community.
9. The Distributed Management Task
Force (DMTF)
ZCOER ,PUNE
Department of Information Technology
9
DMTF management standards are critical to enabling
management interoperability among multi vendor systems,
tools and solutions within the enterprise.
The DMTF started the Virtualization Management Initiative
(VMAN).
The Open Virtualization Format (OVF) is a fairly new standard
that has emerged within the VMAN Initiative.
Benefits of VMAN are
Lowering the IT learning curve, and
Lowering complexity for vendors implementing their solutions
10. Standardized Approaches available to
Companies due to VMAN Initiative
ZCOER ,PUNE
Department of Information Technology
10
VMAN- A set of specifications that address the
management lifecycle of a virtual
environment.
Deploy virtual computer systems
Discover and take inventory of virtual computer
systems
Manage the life cycle of virtual computer
systems
Add/change/delete virtual resources
Monitor virtual systems for health and
performance
Ex- SolarWinds Virtualization Manager (VMAN) is designed to be an
11. Open Virtualization Format (OVF)
Features & Benefits
ZCOER ,PUNE
Department of Information Technology
11
The OVF simplifies interoperability, security, and virtual
machine life-cycle management by describing an open, secure,
portable, efficient, and extensible format for the packaging and
distribution of one or more virtual appliances.
The OVF specifies procedures and technologies to permit
integrity (Continuity) checking of the virtual machines (VM).
The OVF also provides mechanisms that support license
checking for the enclosed Vms.
The OVF streamlined & simplified installation and deployment
process using metadata.
The OVF is designed to be extended as the industry moves
forward with virtual appliance technology
12. Standards for Application Developers
ZCOER ,PUNE
Department of Information Technology
12
The purpose of application development standards is to
ensure uniform, consistent, high-quality software solutions.
Programming standards help to improve the readability of
the software, allowing developers to understand new code
more quickly and thoroughly.
Commonly used application standards are available for the
Internet in browsers, for transferring data, sending messages,
and securing data.
13. Standards for Browsers (Ajax)
ZCOER ,PUNE
Department of Information Technology
13
AJAX (Asynchronous JavaScript and XML), is a group of
interrelated web development techniques used to create
interactive web applications or rich Internet applications.
Using Ajax, web applications can retrieve data from the
server asynchronously, without interfering with the
display and behavior of the browser page currently being
displayed to the user.
The use of Ajax has led to an increase in interactive
animation on web pages.
14. Standards for Browsers (Ajax)
ZCOER ,PUNE
Department of Information Technology
14
Using Ajax, a web application can request only the content
that needs to be updated in the web pages. This greatly
reduces networking bandwidth usage and page load times.
Sections of pages can be reloaded individually.
An Ajax framework helps developers to build dynamic web
pages on the client side. Data is sent to or from the server
using requests, usually written in JavaScript.
ICEfaces is an open source Ajax framework developed as Java
product and maintained by http://icefaces.org.
15. Data (XML, JSON)
ZCOER ,PUNE
Department of Information Technology
15
Extensible Markup Language (XML) allows to define markup
elements.
Its purpose is to enable sharing of structured data.
XML is often used to describe structured data and to
serialize Objects.
XML provides a basic syntax that can be used to share
information among different kinds of computers, different
applications, and different organizations without needing to be
converted from one to another.
16. Data (XML, JSON)
ZCOER ,PUNE
Department of Information Technology
16
JSON (JavaScript Object Notation ) is a lightweight computer
data interchange format. It is a text-based, human-readable
format for representing simple data structures and associative
arrays (called objects).
1.The JSON format is often used for transmitting structured
data over a network connection in a process called
serialization.
Its main application is in Ajax web application programming,
where it serves as an alternative to the XML format.
17. Solution Stacks (LAMP and LAPP)
ZCOER ,PUNE
Department of Information Technology
17
LAMP is a popular open source solution commonly used to
run dynamic web sites and servers.
It includes Linux, Apache, MySQL, and PHP (or Perl or
Python) and is considered by many to be the platform of
choice for development and deployment of high-performance
web applications which require a solid and reliable foundation.
2.When used in combination, they represent a solution stack of
technologies that support application servers.
18. Linux, Apache, PostgreSQL, and
PHP(or Perl or Python) (LAPP)
ZCOER ,PUNE
Department of Information Technology
18
The LAPP stack is an open source web platform that can be
used to run dynamic web sites and servers.
It is considered by many to be a more powerful alternative to
the more popular LAMP stack.
2.LAPP offers SSL
3.Many consider the LAPP stack a more secure out-of-the-box
solution than the LAMP stack.
19. ZCOER ,PUNE
Department of Computer Engineering,
19
LAMP LAPP
Linux as OS, Apache as the Web
server, MySQL as RDBMS
and PHP/Perl/Python as scripting
language.
LAPP uses Linux as OS, Apache as
the Web server,, PostGreSQL as
RDBMS , and
and PHP/Perl/Python as scripting
language.
Less Powerful as compare to
LAPP
It is considered by many to be a
powerful alternative to the more
popular LAMP
20. Standards for Messaging
ZCOER ,PUNE
Department of Information Technology
20
A message is a unit of information that is moved from one
place to another.
Most common messaging standards used in the cloud are
1. Simple Message Transfer Protocol (SMTP)
2. Post Office Protocol (POP)
3. Internet Messaging Access Protocol (IMAP)
4. Syndication (Atom, Atom Publishing Protocol, and RSS)
5. Communications (HTTP, SIMPLE, and XMPP)
21. Simple Message Transfer Protocol
ZCOER ,PUNE
Department of Information Technology
21
1.Simple Message Transfer Protocol is arguably the most
important protocol in use today for basic messaging.
Before SMTP was created, email messages were sent using File
Transfer Protocol (FTP).
2.The FTP protocol was designed to transmit files, not
messages, so it did not provide any means for recipients to
identify the sender or for the sender to designate an intended
recipient.
3.SMTP was designed so that sender and recipient information
could be transmitted with the message.
4.SMTP is a two-way protocol that usually operates using TCP
(Transmission Control Protocol) port 25
22. Post Office Protocol (POP)
ZCOER ,PUNE
Department of Information Technology
22
1.SMTP can be used both to send and receive messages, but
the client must have a constant connection to the host to
receive SMTP messages.
2.The Post Office Protocol (POP) was introduced to
circumvent this situation.
3.POP is a lightweight protocol whose single purpose is to
download messages from a server. This allows a server to
store messages until a client connects and requests them.
4.Once the client connects, POP servers begin to download
the messages and subsequently delete them from the server.
23. Internet Messaging Access Protocol
ZCOER ,PUNE
Department of Information Technology
23
1.Once mail messages are downloaded with POP, they are
automatically deleted from the server when the download
process has finished.
2.Many businesses have compulsory compliance guidelines
that require saving messages. It also becomes a problem if
users move from computer to computer or use mobile
networking, since their messages do not automatically move
where they go.
3.To get around these problems, a standard called Internet
Messaging Access Protocol was created. IMAP allows
messages to be kept on the server but viewed and
manipulated (usually via a browser) as though they were
stored locally.
24. Syndication (Atom, Atom Publishing
Protocol, and RSS)
ZCOER ,PUNE
Department of Information Technology
24
Web syndication is a marketing strategy that involves
licensing the rights to broadcast or distribute content
from one Internet site to another.
In general, syndication is the supply of material for reuse and
integration with other material, often through a paid service
subscription.
The most common example of syndication is in newspapers
Newspapers receive the content from the content providers,
reformat it as required, integrate it with other copy, print it, and
publish it.
25. Syndication (Atom, Atom Publishing
Protocol, and RSS)
ZCOER ,PUNE
Department of Information Technology
25
Atom is an XML-based document format that describes lists of
related information known as "feeds".
Feeds are composed of a number of items, known as "entries",
each with an extensible set of attached meta-data. For
example, each entry has a title.
The primary use case that Atom addresses is the syndication of
Web content such as web logs and news headlines to Web sites
as well as directly to user agents.
26. Syndication (Atom, Atom Publishing
Protocol, and RSS)
ZCOER ,PUNE
Department of Information Technology
26
The Atom Publishing Protocol (AtomPub) is an application
level protocol for publishing and editing Web resources.
The Atom Publishing Protocol is the protocol for
publishing and editing resources in the Atom
document format over HTTP
The protocol supports the creation of Web Resources and
provides facilities for:
1. Collections: Sets of Resources, which can be retrieved in
whole or in part.
2. Services: Discovery and description of Collections.
3. Editing: Creating, editing, and deleting Resources.
27. Syndication (Atom, Atom Publishing
Protocol, and RSS)
ZCOER ,PUNE
Department of Information Technology
27
RSS stands for Really Simple Syndication
RSS allows you to syndicate your site content
RSS defines an easy way to share and view headlines and
content
RSS files can be automatically updated
RSS allows personalized views for different sites
RSS is written in XML
If a site offers an RSS feed, you get notified whenever a post
goes up, and then you can read a summary or the whole post.
28. Standards for Security
ZCOER ,PUNE
Department of Information Technology
28
Cloud Security Issues:
1. Denial of Service Attacks.
2. Data Loss/Leakage.
3. Data Privacy/Confidentiality.
4. Accidental Exposure of Credentials.
5. Incident Response.
29. Standards for Security
ZCOER ,PUNE
Department of Information Technology
29
The cloud is, by nature, an attractive target for
cyberattacks, because it is exposed to public networks.
Aspects of cloud security — including identity and access
management (IAM), network security, virtualization
security, Zero Trust Network Access (ZTNA), endpoint
security, data privacy and content security.
30. ZCOER ,PUNE
Department of Information Technology
30
ISO Standards:
The International Organization for Standardization (ISO) 27001 created a
standard to assist organizations, helping them safeguard their information
using best practices.
The ISO has created standards for many kinds of systems and technologies,
such as:
ISO/IEC 17789 (2014) — this standard outlines cloud computing activities,
functional components, and roles, including the way they interact.
ISO/IEC 19944-1 (2020) — this standard specifies how data is transported
via cloud service centers and cloud service users.
ISO/IEC Technical Specification 23167 (2020) — this standard specifies
techniques and technologies employed in cloud computing, such as VMs,
containers, and hypervisors.
ISO/IEC 27018 (2019) — this document describes guidelines founded on
ISO/IEC 27002, emphasizing the safeguarding of personal identifiable
information (PII) within the public cloud.
Standards for Security
31. ZCOER ,PUNE
Department of Information Technology
31
PCI DSS:
• The Payment Card Industry Data Security Standard
(PCI DSS) is a series of security conditions for
merchants who accept debit or credit cards.
• PCI DSS relates to organizations that store or process
cardholder data.
• If your organization retains and handles sensitive
payment card details in the cloud, it is your
responsibility to provide your IT team with
advanced cloud expertise to create and upkeep
your cloud environment safely.
• If you don’t adhere to the PCI DSS Cloud Computing
Guidelines, you may lose your capacity to process
payment card transactions.
PCI DSS-Payment Card Industry Data Security Standard
32. ZCOER ,PUNE
Department of Information Technology
32
• To safeguard the health-related data of individuals, the
Health Insurance Portability and Accountability Act
(HIPAA) features sections that directly relate to the
security of information.
• HIPAA is a law that relates to organizations that deal
with personally identifiable medical information.
• In terms of information security, the HIPAA Security
Rule (HSR) is the most applicable.
• The HSR provides guidelines for keeping an
individual’s electronic health details safe. This
includes information that a covered entity uses, creates,
maintains, or receives.
• If your organization employs cloud-based services
(IaaS, PaaS, SaaS) to oversee and move health
information, it is your task to make sure the service
provider is HIPAA-compliant..
HIPAA-Health Insurance Portability and
Accountability Act
33. ZCOER ,PUNE
Department of Information Technology
33
• Organizations implement SOC certification to show a great
commitment to data security, and to make sure they have the
correct security strategies in place.
• CC2.0: Communication and information — deals with how
organizations manage external and internal communications and
data flows.
• CC5.0: Control activities — addresses how an organization’s
control pursuits account for technology and risk management.
• CC6.0: Logical and physical access control — addresses how
organization controls enable logical access to IT credentials and
systems. Covers control of physical entry to facilities, and security
standards to prevent and detect unauthorized access.
• CC7.0: System operations — deals with how an organization
controls and observes systems for possible events, anomalies, and
configuration changes that could bring with them security risks..
• CC8.0: Change management — addresses how organizations
measure and determine which modifications are required in their
data, infrastructure, procedures and software. This allows them to
safely make necessary changes while preventing unauthorized
changes.
System and Organization Controls (SOC)
Reporting: