SlideShare a Scribd company logo
1 of 82
Effectively and Securely Using the Cloud Computing Paradigm Peter Mell, Tim Grance NIST, Information Technology Laboratory 8-12-2009
NIST Cloud Research Team ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contact information is available from: http://www.nist.gov/public_affairs/contact.htm
NIST Cloud Computing Resources ,[object Object],[object Object],[object Object]
Caveats and Disclaimers ,[object Object],[object Object],[object Object],Citation Note: All sources for the material in this presentation are included within the Powerpoint “notes” field on each slide
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Part I: Effective and Secure Use
Understanding Cloud Computing
Origin of the term “Cloud Computing” ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Working Definition of Cloud Computing ,[object Object],[object Object]
5 Essential Cloud Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3 Cloud Service Models ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Service Model Architectures
4 Cloud Deployment Models ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Cloud Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing Security
Security is the Major Issue
Analyzing Cloud Security ,[object Object],[object Object],[object Object],[object Object],[object Object],Former Intel CEO, Andy Grove: “only the paranoid survive”
General Security Advantages ,[object Object],[object Object],[object Object],[object Object]
General Security Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Relevant Cloud Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Provisioning Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Storage Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Processing Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Support Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Network and Perimeter Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Security Advantages Part 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cloud Security Advantages Part 2
Cloud Security Challenges Part 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Security Challenges Part 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Migration Paths for Cloud Computing
The ‘Why’ and ‘How’ of Cloud Migration ,[object Object],[object Object],[object Object]
Balancing Threat Exposure and Cost Effectiveness ,[object Object],[object Object],[object Object]
Cloud Migration and Cloud Security Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Putting it Together ,[object Object],[object Object],[object Object],[object Object]
Migration Paths for  Cloud Adoption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Possible Effects of Cloud Computing ,[object Object],[object Object],[object Object],[object Object]
Cloud Computing and Standards
A proposal: The Cloud Interoperability Profile ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NIST and Standards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing Publications
Planned NIST  Cloud Computing Publication ,[object Object],[object Object],[object Object],[object Object],[object Object]
Part II: Cloud Resources, Case Studies, and Security Models
Thoughts on Cloud Computing
Thoughts on Cloud Computing ,[object Object],[object Object],[object Object]
Thoughts on Cloud Computing ,[object Object],[object Object],[object Object],[object Object]
Thoughts on Cloud Computing ,[object Object],[object Object]
Core objectives of Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “sunny” vision of the future ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Foundational Elements of Cloud Computing
Foundational Elements of Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Primary Technologies Other Technologies
Web 2.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Consumer Software Revolution
Software as a Service (SaaS) ,[object Object],[object Object],[object Object],[object Object],Enterprise Software Revolution
Three Features of  Mature SaaS Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SaaS Maturity Levels ,[object Object],[object Object],[object Object],[object Object],Source: Microsoft MSDN Architecture Center
Utility Computing ,[object Object],[object Object],[object Object],[object Object]
Service Level Agreements (SLAs) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Autonomic System Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Grid Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Platform Virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Service Oriented Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web application frameworks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free and Open Source Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Statistics on Cloud Economics
Cost of Traditional Data Centers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Energy Conservation and Data Centers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Economics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Economics ,[object Object],[object Object]
Cloud Computing Case Studies and Security Models
Google Cloud User: City of Washington D.C. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Are Hybrid Clouds in our Future? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
vCloud Initiative ,[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft Azure Services Source: Microsoft Presentation, A Lap Around Windows Azure, Manuvir Das
Windows Azure Applications,  Storage, and Roles Cloud Storage (blob, table, queue) Web Role LB n Worker Role m Source: Microsoft Presentation, A Lap Around Windows Azure, Manuvir Das
Case Study: Facebook’s Use of Open Source and Commodity Hardware (8/08) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: IBM-Google Cloud (8/08) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Amazon Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amazon Cloud Users:  New York Times and Nasdaq (4/08) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study:  Salesforce.com in Government ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study:  Salesforce.com in Government ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contact information is available from: http://www.nist.gov/public_affairs/contact.htm

More Related Content

What's hot

Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Vic Winkler
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 

What's hot (20)

Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 

Viewers also liked

GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...
GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...
GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...Patrick Chanezon
 
Cloud Computing Bootcamp On The Google App Engine [v1.1]
Cloud Computing Bootcamp On The Google App Engine [v1.1]Cloud Computing Bootcamp On The Google App Engine [v1.1]
Cloud Computing Bootcamp On The Google App Engine [v1.1]Matthew McCullough
 
Baocao ltm
Baocao ltmBaocao ltm
Baocao ltmptlong96
 
GDD Brazil 2010 - Google Storage, Bigquery and Prediction APIs
GDD Brazil 2010 - Google Storage, Bigquery and Prediction APIsGDD Brazil 2010 - Google Storage, Bigquery and Prediction APIs
GDD Brazil 2010 - Google Storage, Bigquery and Prediction APIsPatrick Chanezon
 
Cloud Computing Bootcamp On The Google App Engine v1.2.1
Cloud Computing Bootcamp On The Google App Engine v1.2.1Cloud Computing Bootcamp On The Google App Engine v1.2.1
Cloud Computing Bootcamp On The Google App Engine v1.2.1Matthew McCullough
 
Developing Java Web Applications In Google App Engine
Developing Java Web Applications In Google App EngineDeveloping Java Web Applications In Google App Engine
Developing Java Web Applications In Google App EngineTahir Akram
 

Viewers also liked (6)

GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...
GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...
GDD Brazil 2010 - What's new in Google App Engine and Google App Engine For B...
 
Cloud Computing Bootcamp On The Google App Engine [v1.1]
Cloud Computing Bootcamp On The Google App Engine [v1.1]Cloud Computing Bootcamp On The Google App Engine [v1.1]
Cloud Computing Bootcamp On The Google App Engine [v1.1]
 
Baocao ltm
Baocao ltmBaocao ltm
Baocao ltm
 
GDD Brazil 2010 - Google Storage, Bigquery and Prediction APIs
GDD Brazil 2010 - Google Storage, Bigquery and Prediction APIsGDD Brazil 2010 - Google Storage, Bigquery and Prediction APIs
GDD Brazil 2010 - Google Storage, Bigquery and Prediction APIs
 
Cloud Computing Bootcamp On The Google App Engine v1.2.1
Cloud Computing Bootcamp On The Google App Engine v1.2.1Cloud Computing Bootcamp On The Google App Engine v1.2.1
Cloud Computing Bootcamp On The Google App Engine v1.2.1
 
Developing Java Web Applications In Google App Engine
Developing Java Web Applications In Google App EngineDeveloping Java Web Applications In Google App Engine
Developing Java Web Applications In Google App Engine
 

Similar to Effectively and Securely Using the Cloud Computing Paradigm

glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and servicesJas Preet
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelIOSR Journals
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriManuela Moroncini
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing FundamentalsVikas Sahni
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.pptArunKumbi1
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 

Similar to Effectively and Securely Using the Cloud Computing Paradigm (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and services
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.ppt
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 

Effectively and Securely Using the Cloud Computing Paradigm

Editor's Notes

  1. Cloud Computing Quotes from Vivek Kundra (Federal CIO): "The cloud will do for government what the Internet did in the '90s," he said. "We're interested in consumer technology for the enterprise," Kundra added. "It's a fundamental change to the way our government operates by moving to the cloud. Rather than owning the infrastructure, we can save millions." http://www.nextgov.com/nextgov/ng_20081126_1117.php “ I believe it's the future," he says. "It's moving technology leaders away from just owning assets, deploying assets and maintaining assets to fundamentally changing the way services are delivered.“ http://www.cio.de/news/cio_worldnews/867008 "It's definitely not hype," says Vivek Kundra, CTO for the District of Columbia government, which plans to blend IT services provided from its own data center with external cloud platforms like Google Apps. "Any technology leader who thinks it's hype is coming at it from the same place where technology leaders said the Internet is hype.“ http://www.cio.de/news/cio_worldnews/867008/
  2. The NIST tree pictured is a direct decendant of the tree that dropped an apple on Sir Isaac Newton in 1665 (see http://www.gazette.net/gazette_archive/1997/199714/gaithersburg/news/a55925-1.html).
  3. Jeff Bezos’ quote: http://news.cnet.com/8301-13953_3-9977100-80.html?tag=mncol Kevin Marks quote: http://news.cnet.com/8301-13953_3-9938949-80.html?tag=mncol video interview
  4. Note 1: Cloud computing is still an evolving paradigm. Its definitions, use cases, underlying technologies, issues, risks, and benefits will be refined in a spirited debate by the public and private sectors. These definitions, attributes, and characteristics will evolve and change over time. Note 2: The cloud computing industry represents a large ecosystem of many models, vendors, and market niches. This definition attempts to encompass all of the various cloud approaches.
  5. On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider. Ubiquitous network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs). Resource pooling. The provider’s computing resources are pooled using a homogenous infrastructure to serve all consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence as the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. Rapid elasticity. Capabilities can be rapidly and elastically provisioned, and in some cases automatically, to quickly scale up and rapidly released to quickly scale down. To the consumer, the capabilities available for provisioning often appear to be infinite and can be purchased in any quantity at any time. Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
  6. Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and accessible from various client devices through a thin client interface such as a Web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created applications using programming languages and tools supported by the provider (e.g., java, python, .Net). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or storage, but the consumer has control over the deployed applications and possibly application hosting environment configurations. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load balancers).
  7. Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud . The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting).
  8. Massive Scale. Cloud implementations, regardless of the deployment model, tend to be as large as possible in order to take advantage of economies of scale. Large cloud deployments can often be located next to cheap power and real estate to lower costs. They often take advantage of bulk commodity hardware purchases and streamlined datacenter technologies (e.g., contain based data centers). To improve effectiveness, large cloud deployments may be located near high speed Internet hubs. Virtualization. Virtualization is a critical element of most cloud implementations and is used to provide the essential cloud characteristics of location independent resource pooling and rapid elasticity. Virtualization, when used in the cloud paradigm, enables data centers to increase their server utilization from a typical 10% to an ideal 80% thereby producing significant cost savings. This said, other techniques (such as software sandboxing in a PaaS model) can provide similar benefits although they are less used. Non-stop computing. Cloud implementation (especially SaaS and PaaS) often enable a characteristic of non-stop computing. This means that cloud applications can take advantage of the abstraction of the cloud distributed software layer from the hardware to enable an application to remain active at all times even through upgrades. In this model there are no scheduled maintenance downtimes for applications. Free Software. The massive scale of many clouds combined with the need for many software licenses encourages the use of free software in the development of cloud architectures. By free software we mean software that is one of the following: open source, a product that is free to the cloud developer (e.g., a software company usually includes its own products in its cloud offerings), or very cheaply licensed (possibly due to open source competition). Geographic Distribution. Cloud systems that are built on the concept of resource pooling may not have separate backup sites. Instead, cloud providers often rely on unused cloud capacity to provide disaster recovery capabilities. To make this work cloud providers not only need significant unused capacity but must have their resource pool geographically distributed so that a single data center disaster will not cause an outage or overcapacity situation (this is discussed more in chapter 4). Service Oriented Software. As noted in the cloud definition, “cloud software takes full advantage of the cloud paradigm by being service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability.” This is an important characteristic for cloud applications in order for them to fully leverage the location independent resource pool and rapid elasticity capabilities. Clouds can run applications that do not have this characteristic, but such applications will be isolated workload instances for which the cloud cannot provide the same reliability and scalability that service oriented application are provided. Autonomic Computing. Cloud implementations often have automated systems to enable their management and security. This characteristic enables them to be massive and complex and yet still be cost effective. According to IBM [see auto slide] autonomic computing has four properties: self-healing, self-configuration, self-optimization, and self-protection. Clouds may exhibit all of these properties. Self-healing may happen when a physical server or storage device fails and the cloud automatically replicates the associated processes or data to other devices. Self-configuration happens when a customer provisions a process instance or a virtual machine and the management and security configurations are set up automatically. Self-optimization may happen when a cloud dynamically relocates processes and/or storage to optimize cloud usage and service delivery. Lastly, the self-protection property may exist in clouds and leverage the overall automation and homogeneity. However, this property does not commonly exist in advanced forms that aren’t available using traditional computing models. Advanced Security Technologies. Cloud implementations often contain advanced security technologies. The homogenous resource pooled nature of the cloud enables cloud providers to focus all their security resources on securing the cloud architecture. At the same time, the automation capabilities within a cloud combined with the large focused security resources usually result in advanced security capabilities. These capabilities are often necessary because the multi-tenant nature of clouds increased the threat exposure compared to traditional computing models.
  9. Source: InfoWorld Quote, http://www.infoworld.com/article/08/04/07/15FE-cloud-computing-reality_2.html
  10. Source: CNET video interview 5/7/08 http://news.cnet.com/8301-13953_3-9938949-80.html?tag=mncol
  11. CNET Article written by Dan Farber 6/26/08 http://news.cnet.com/8301-13953_3-9978153-80.html?tag=mncol
  12. Source: http://news.cnet.com/8301-13953_3-9977100-80.html?tag=mncol
  13. Data source: CNET article 6/25/08 http://news.cnet.com/8301-13953_3-9977517-80.html?tag=mncol
  14. Source: Long tail, The Long Tail" by Chris Anderson , Wired , Oct. 2004 Source: O’Reilly quote, http://radar.oreilly.com/archives/2006/12/web-20-compact.html
  15. Source: Williams and computerworld quotes, Software as a service: The next big thing, Eric Knorr 23/03/06, http://www.computerworld.com.au/index.php/id;889026646;fp;4;fpid;1398720840
  16. Source: Scalable definition, André B. Bondi, 'Characteristics of scalability and their impact on performance', Proceedings of the 2nd international workshop on Software and performance, Ottawa, Ontario, Canada, 2000, ISBN 1-58113-195-X , pages 195 - 203 Source: Three attributes for SaaS, Architecture Strategies for Catching the Long Tail, Frederick Chong and Gianpaolo Carraro Microsoft Corporation April 2006, http://msdn.microsoft.com/en-us/library/aa479069.aspx
  17. Source: Architecture Strategies for Catching the Long Tail, Frederick Chong and Gianpaolo Carraro Microsoft Corporation April 2006, http://msdn.microsoft.com/en-us/library/aa479069.aspx
  18. Source SLA Zone: http://www.sla-zone.co.uk/ Wikipedia definition of SLA: http://en.wikipedia.org/wiki/Service_level_agreement
  19. Source: 38% statistic, Xiaolong Jin and Jiming Liu, " From Individual Based Modeling to Autonomy Oriented Computation ", in Matthias Nickles, Michael Rovatsos, and Gerhard Weiss (editors), Agents and Computational Autonomy: Potential, Risks, and Solutions , pages 151–169, Lecture Notes in Computer Science, vol. 2969, Springer, Berlin, 2004. ISBN 978-3-540-22477-8 . Source: 18:1 statistics, Trends in technology’, survey, Berkeley University of California, USA, March 2002 Source: IBM 4 properties, http://www-01.ibm.com/software/tivoli/autonomic/ Source: Autonomic properties, Wikipedia entry on autonomic system computing (providing an alternate vision to IBM’s)
  20. Source: “What is the Grid? A Three Point Checklist”, Ian Foster, http://www-fp.mcs.anl.gov/~foster/Articles/WhatIsTheGrid.pdf Source: Wikipedia, http://en.wikipedia.org/wiki/Grid_computing
  21. Source: ‘Web Services: Principles and Technology’ (Michael Papazoglou) Chapter 1 Source: Infoworld quote, http://www.infoworld.com/article/08/04/07/15FE-cloud-computing-reality_2.html Source: Rube Goldberg picture, http://en.wikipedia.org/wiki/Rube_Goldberg
  22. Source: ‘Web Services: Principles and Technology’ (Michael Papazoglou) Chapter 1
  23. Wikipedia list of frameworks: http://en.wikipedia.org/wiki/List_of_web_application_frameworks
  24. Source: 11.8 and 15%, Martin MC Brown, Computerworld, http://blogs.computerworld.com/data_center_utilization_15_of_11_8_million_is_a_big_number Source: $800, Ron Markezich, Vice President Microsoft Online, Microsoft talk at the Booz Allen Hamilton Cloud Computing Summit, 11/20/2008. Source: IBM Report May 2008, Creating a green data center to help reduce energy costs and gain a competitive advantage.
  25. Source: http://www.cloudave.com/link/global-green-computing-fund http://news.cnet.com/8301-11128_3-10140142-54.html?tag=newsEditorsPicksArea.0
  26. Source: Gartner stat, ComputerWeekly, 4/11/2008, http://www.computerweekly.com/galleries/233192-8/Gartner-fellow-Brian-Gammage-Align-IT-with-business-and-look-for-cost-savings-in-the-cloud.htm Source: Alchemy Plus, 12/3/08, http://www.infoworld.com/article/08/12/03/Scotland_hotbed_for_green_datacenters_1.html Source: Preferred Hotel, 11/24/08, http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9121485 Source: CTO DC, Mike Bradshaw, Google talk at the Booz Allen Hamilton Cloud Computing Summit, 11/20/2008. Patrick Marshall, The power of the cloud. Government Computer News, 9/29/08. http://www.gcn.com/print/27_24/47228-1.html
  27. Source: Reese, http://broadcast.oreilly.com/2008/10/the-economics-of-cloud-c.html
  28. http://arstechnica.com/software/news/2008/10/washington-dc-latest-to-drop-microsoft-for-web-apps.ars Quote is from http://www.nextgov.com/nextgov/ng_20081126_1117.php
  29. Source: IBM hybrid cloud, http://news.cnet.com/8301-19413_3-10161245-240.html?tag=newsFeaturedBlogArea.0
  30. Source: vCloud press release, 9/15/08, http://vmware.com/company/news/releases/vcloud_vmworld08.html
  31. Data taken from CNET news article and interview 8/18/08 http://news.cnet.com/8301-13953_3-10027064-80.html?tag=mncol
  32. Source: Infoworld Article, http://www.infoworld.com/article/08/08/27/35NF-cloud-providers_2.html Source: IBM cloud presentation at BAH cloud computing summit 10/29/08
  33. Source: Infoworld article (availability zones and elastic IP), http://www.infoworld.com/article/08/03/27/Amazon-adds-resilience-to-cloud-computing_1.html
  34. Source: Infoworld, http://www.infoworld.com/article/08/04/07/15FE-cloud-computing-utility_1.html
  35. http://arstechnica.com/software/news/2008/10/washington-dc-latest-to-drop-microsoft-for-web-apps.ars Quote is from http://www.nextgov.com/nextgov/ng_20081126_1117.php
  36. http://arstechnica.com/software/news/2008/10/washington-dc-latest-to-drop-microsoft-for-web-apps.ars Quote is from http://www.nextgov.com/nextgov/ng_20081126_1117.php