SlideShare a Scribd company logo
1 of 54
Download to read offline
CHAPTER-1
INTRODUCTION
Cloud
Computing
 Computing is being transformed into a model
similar to utilities such as water, electricity, gas,
and telephony.
 Based on the concept of dynamic provisioning .
 Works on pay-per-use or pay-as-you-go model.
Cloud computing at a glance
 In 1969, Leonard Kleinrock, one of the chief scientists of
the original Advanced Research Projects Agency Network
(ARPANET), which seeded the Internet, said:
“As of now, computer networks are still in their infancy,
but as they grow up and become sophisticated, we will
probably see the spread of ‘computer utilities’ which, like
present electric and telephone utilities, will service
individual homes and offices across the country”.
“I don’t care where my servers are, who manages them,
where my documents are stored, or where my applications
are hosted. I just want them always available and access
them from any device connected through Internet. And I
am willing to pay for this service for as a long as I need it”.
Cont...
 Utility computing
 Web 2.0 technologies play a central role in
making cloud computing an attractive
opportunity for building computing systems.
 Service orientation or architecture.
 Virtualization
The vision of cloud computing
 Cloud computing allows anyone with a credit card to
provision virtual hardware, runtime environ- ments,
and services.
 These are used for as long as needed, with no up-front
commitments required.
 The entire stack of a computing system is transformed
into a collection of utilities, which can be provisioned
and composed together to deploy systems in hours
rather than days and with virtually no maintenance
costs.
Cont..
 The long-term vision of cloud computing is that IT
services are traded as utilities in an open market,
without technological and legal barriers.
 In this cloud marketplace, cloud service providers and
consumers, trading cloud services as utilities, play a
central role.
 The need for ubiquitous storage and compute power
on demand is the most common reason to consider
cloud computing.
Cont..
 A scalable runtime for applications is an attractive
option for application and system developers that do
not have infra- structure or cannot afford any further
expansion of existing infrastructure.
 The capability for Web- based access to documents
and their processing using sophisticated applications
is one of the appealing factors for end users.
 This opportunity, initially met with skepticism, has
now become a practice across several application
domains and business sectors (see Figure 1.1).
I want to
focus on
application
logic and not
maintenance
and
scalability
issues
I need to grow my
infrastructure, but I
do not know for
how long…
I have a lot of
infrastructure
that I want to
rent …
I have
infrastructure
and provide
application
services
I want to access
and edit my
documents and
photos from
everywhere..
I have
infrastructure
and provide
application
services
Defining a cloud
No capital
investments
Quality of
Service
Billing
PaaS
SaaS
IaaS
IT
outsourcing
Scalability
Provisioning on
demand
Privacy & Trust
Virtualization
Internet Elasticity
Service Level
Agreement
Virtual Datacenters
Security
Utility computing
Green computing
SLA defines quality-of-service
parameters under which the
 Cloud computing refers to both the applications delivered as
services over the Internet and the hardware and system software
in the datacenters that provide those services.
 Definition proposed by the U.S.National Instituteof
Standards and Technology (NIST):
 Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and
services) that can be rapidly provisioned and
released with minimal management effort or service
provider interaction.
 According to Reese, we can define three criteria to
discriminate whether a service is delivered in the cloud
computing style:
 • The service is accessible via a Web browser
(nonproprietary) or a Web services application
programming interface (API).
 • Zero capital expenditure is necessary to get started.
 • You pay only for what you use as you use it.
 The utility-oriented nature of cloud computing is
clearly expressed by Buyya et al. :
 A cloud is a type of parallel and distributed
system consisting of a collection of
interconnected and virtualized computers that are
dynamically provisioned and presented as one or
more unified computing resources based on
service-level agreements established through
negotiation between the service provider and
consumers.
A closer look
 Large enterprises can offload some of their activities to cloud-
based systems.
 Small enterprises and start-ups can afford to translate their ideas
into business results more quickly, without excessive up-front
costs.
 System developers can concentrate on the business logic rather
than dealing with the complexity of infrastructure management
and scalability.
 End users can have their documents accessible from everywhere
and any device.
Cloud computing does not only contribute with the opportunity
of easily accessing IT services on demand, it also introduces a
new way of thinking about IT services and resources: as
utilities. A bird’s-eye view of a cloud computing environment is
shown in Figure
Subscription - Oriented Cloud Services:
X{compute, apps, data, ..} as a Service
(..aaS)
Public Clouds
Developmen
t and
Runtime
Platform
Storage
Compute
Applications
Cloud
Manage
r
Clients
Cloud Services Govt. Cloud Services
Privat
e
Cloud
Hybri
d
Cloud
Cloud Deployment Models OR Types
Hybrid Cloud:
Combines Private, Public or
Community Clouds.
Allows manipulation of CapEX
and OpEX to reduce costs.
Supports resource Portability.
Private Cloud:
Leverages
existing CapEx.
Can Helps to
reduce OpEx.
Intended for
single tenant
Public Cloud:
Shifts CapEx
to OpEx
Offers pay as
you grow.
Supports
multiple
tenants.
Community Cloud:
Allows sharing of CapEx
and OpEx to reduce costs.
Bridges together groups or
organizations with common
goal.
Supports reduce
portability.
The cloud computing reference model
Web 2.0
Interfac
es
End-user applications
Scientific applications Office
automation, photo editing,
CRM, and social networking
Examples : Google Documents,
Facebook, Flickr, Salesforce
Runtime environment for
applications Development and
data processing platforms
Examples : Windows Azure,
Hadoop, Google AppEngine,
Aneka
Virtualized servers Storage and
networking Examples : Amazon
EC2, S3, Rightscale, vCloud
Software as a Service
Platform as a Service
Infrastructure as a Service
Cont...
Characteristics and benefits
 Cloud computing has some interesting characteristics
that bring benefits to both cloud service con- sumers
(CSCs) and cloud service providers (CSPs). These
characteristics are:
 No up-front commitments
 • On-demand access
 • Nice pricing
 • Simplified application acceleration and scalability
 • Efficient resource allocation
 • Energy efficiency
Cont...
 • Seamless creation and use of third-party services
 Multi-tenancy
 Increased agility in defining and structuring
software systems.
 Finally, service orientation and on-demand access
create new opportunities for composing sys- tems
and applications with a flexibility not possible
before cloud computing.
Benefits Cont..
Challenges ahead
 New, interesting problems and challenges are regularly being
posed to the cloud community, including IT practitioners,
managers, governments, and regulators.
 Besides the practical aspects, which are related to configuration,
networking, and sizing of cloud computing systems, a new set of
challenges concerning the dynamic provisioning of cloud
computing services and resources arises.
 Example, how many resources need to be provisioned, and
for how long should they be used, in order to maximize the
benefit?
 Technical challenges also arise for cloud service providers .
 The integration of real and virtual infrastructure, security
and legislation .
Cont..
 Security in terms of confidentiality, secrecy, and
protection of data in a cloud environment is
another important challenge.
 Cryptography can help secure the transit of
data.
 Legal issues may also arise.
 These are specifically tied to the ubiquitous
nature of cloud computing, which spreads
computing infrastructure across diverse
geographical locations.
 Different legislation about privacy in different
countries may potentially create disputes as
to the rights that third parties (including
government agencies) have to your data.
Challenges/Issues Difficulties Possible Solutions
Outsourcing Data and Applications
Cloud user host data and applications on
cloud servers by relying on third parties
to make decisions about user data and
platforms. Cloud Computing provides
access to data, but the challenge is to
ensure that only authorized user can
gain access to it (Hassan Takabi et al.,
2010).
It’s very difficult to have appropriate
mechanisms to prevent cloud providers
from using customers’ data in a way that
hasn’t been agreed upon.
Any technical means could not
completely prevent cloud providers
from abusing customer data in all
cases, so a combination of technical
and nontechnical can be used to
achieve this. Clients need to have
significant trust in their provider’s
technical competence and
economic stability.
Service Level Agreement
It is essential for customers to get
assurances from providers on service
delivery. Typically, these are provided
during Service Level Agreements
(SLAs) negotiated between the
providers and customers (John et al.,
2009).
1. Definition of SLA specification.
2. Different cloud offerings will need
to classify different Meta
specifications.
Advanced SLA methods need to
regularly integrate user advice and
customization features into the SLA
assessment framework.
Extensibility and Shared
Responsibility
Cloud providers and customers must
share the responsibility for security and
privacy in Cloud Computing
environments, but sharing levels will
differ for different delivery models,
which in turn affect
cloud extensibility (Hassan Takabi et al.,
2010).
1. Providing privacy and security to all
deployment models is difficult.
2. Private clouds could also demand
more extensibility to accommodate
customized requirements so
providing security in that stage is
difficult.
Provide the security to each level of
resource sharing and make use of
available, advanced and new
protection mechanisms to provide
privacy and security to each level.
the hardware
Cloud Interoperability
Which provide the freedom to customer to
switch from alternative
vendors/offerings/providers simultaneously
to optimize resources at various stages in
an organization (Gundeep et al., 2012).
1. Cloud APIs makes it very difficult to
merge cloud services with an
organization's own existing legacy
systems.
2. Aim of interoperability is to detect the
faultless fluid data across local
applications, across clouds and among
clouds and it is difficult to detect.
Standardization approach would be a
good solution to deal with this issue.
For example optimizing in
outsourcing a number of insignificant
functions to cloud services offered by
different vendors.
Heterogeneity
Cloud providers use various hardware and
software resources to build Cloud
environments. To some extent, resource
virtualization achieves high-level system
homogeneity, but the same infrastructure
being used to support different tenants with
different protection
and system requirements can generate
difficulties (Hassan Takabi et al., 2010).
A potential issue are:
1. If a client subscribes to different cloud
providers for different services then the
assumptions that each of these cloud
providers make in building the services
can severely affect the emergent trust
and security properties.
2. Generates integration challenges.
3. In a multi-tenant environment, the
protection requirements for each tenant
might differ, which can make a multi-
tenant cloud a single point of
compromise.
Designing of more efficient privacy
and security mechanisms could
overcome the said difficulties.
Multi-tenancy
This means that the cloud platform is
shared and exploited by number of clients
(Bhaskar et al., 2009), (Zhifeng, 2012).
1. Opponents who may also be legal
cloud clients may utilize the co-
residence issue.
2. Many security issues such as data
breach, computation breach, flooding
attack, etc., are incurred.
3. It supplies new vulnerabilities to the
cloud platform.
There are three kinds of multi-tenancy
enablement approaches such as
sharing, arbitration and virtualization.
To achieve the full potential of multi-
tenancy three issues continue to be
solved such as Resource sharing,
Security isolation, Customization.
Load Balancing
Load balancing can be defined as assigning
a part of job to another or idle computer to
improve the efficiency and optimize the use
of resources (Wei-Tek et al., 2010).
Continuous monitoring of the components
becomes overhead and when one becomes
non-responsive, the load balancer needs to
inform that stop sending traffic to
overloaded system.
Effectively implementing load
balancer by using new mechanism.
Resource Scheduling
Means assigning the resources such as
hardware, software, process time,
communication bandwidth and applications
to the processes.
Implementing multitasking
and multiplexing techniques in scheduler is
somewhat tedious task.
Implement scheduler to have
advanced algorithm and
mechanism which concern
about the throughput, latency,
specifically: turnaround time,
response time and fairness /
waiting time.
Virtualization
IT virtualization is the abstraction of
physical infrastructures such as servers,
data centers, networks capabilities and
storage resources (Wei-Tek et al., 2010).
1. Rise of high density.
2. Reduced IT load affects Power Usage
Effectiveness (PUE).
3. Dynamic IT loads.
4. Lower redundancy requirements are
possible.
Physical infrastructure efficiency
measured as PUE will increase if the
power and cooling infrastructure is
right-sized to the new lesser overall
load, then necessity for idleness in the
physical infrastructure may be
reduced by using highly virtualized
data center design and IT fault-
tolerance functioned with a high level.
Privacy and Security
A third party causes the security and
privacy issues more critical when
outsourcing the data and business
applications (Bhaskar, 2009a).
Finding the solutions for the attacks:
Malware-injection, flooding, accountability
check problem, browser Security, securing
data in transmission, identity and access
management is difficult.
Requires novel techniques to tackle
with. Some of the countermeasures
are described in Table 3.2.
Historical developments
 We briefly review five core technologies that played
an important role in the realization of cloud
computing.
 These technologies are:
 distributed systems,
 virtualization,
 Web 2.0,
 service orientation, and
 utility computing.
1. Distributed systems
 “A distributed system is a collection of independent
computers that appears to its users as a single coherent
system”.
 It evidences two very important elements characterizing a
distributed system: the fact that it is composed of multiple
independent components and that these components are
perceived as a single entity by users.
 This is particularly true in the case of cloud computing, in
which clouds hide the complex architecture they rely on
and provide a single interface to users.
Cont..
 The primary purpose of distributed systems is to share
resources and utilize them better. This is true in the case of
cloud computing, where this concept is taken to the extreme
and resources (infrastructure, runtime environments, and
services) are rented to users.
 Distributed systems often exhibit other properties such
as heterogeneity, openness, scalability, transparency,
concurrency, continuous availability, and independent
failures.
 To some extent these also
characterizeclouds,especiallyinthecontextofscalability,co
ncurrency,andcontinuous availability.
Cont..
 Three major milestones have led to cloud computing: mainframe
computing, cluster computing, and grid computing.
 1.Mainframes: These were the first examples of large
computational facilities leveraging multiple processing units.
 Powerful, highly reliable computers specialized for large data
movement and massive input/output (I/O) operations.
 Used by large organizations for bulk data processing tasks such as:
 online transactions,
 enterprise resource planning,
 and other operations involving the processing of significant amounts
of data.
 “always on” and capable of tolerating failures transparently.
 Batch processing was the main application of mainframes.
 Such systems are still in use for transaction processing (such as online
banking, airline ticket booking, supermarket and telcos, and government
services).
 2. Clusters. Cluster computing started as a low-cost
alternative to the use of mainframes and
supercomputers.
 These machines could then be connected by a high-
bandwidth network and controlled by specific software tools
that manage them as a single system.
 Starting in the 1980s, clusters become the standard
technology for parallel and high-performance computing.
 Built by commodity machines, they were cheaper than
mainframes and made high-performance computing available
to a large number of groups, including universities and small
research labs.
Cont..
 3. Grids: Grid computing appeared in the early 1990s as
an evolution of cluster computing.
 In an analogy to the power grid, grid computing proposed
a new approach to access large computational power, huge
storage facilities, and a variety of services.
 Users can “consume” resources in the same way as they
use other utilities such as power, gas, and water.
 Different from a “large cluster,” a computing grid was a
dynamic aggregation of heterogeneous computing nodes,
and its scale was nationwide or even worldwide.
Cont..
 Several developments made possible the diffusion of
computing grids:
 (a) clusters became quite common resources;
 (b) they were often underutilized;
 (c) new problems were requiring computational power
that went beyond the capability of single clusters; and
 (d) the improvements in networking and the diffusion
of the Internet made possible long-distance, high-
bandwidth connectivity.
 All these elements led to the development of grids,
which now serve a multitude of users across the world.
2. Virtualization
 Creation of logical instances or emulation of s/ws and
h/ws on the top of actual h/w devices.
 It encompasses a collection of solutions allowing the
abstraction of some of the fundamental elements for
computing, such as hardware, runtime environments,
storage, and networking.
 Virtualization confers that degree of customization and
control that makes cloud computing appealing for users
and, at the same time, sustainable for cloud services
providers.
Cont..
3. Web 2.0
 The Web is the primary interface through which cloud computing
delivers its services.
 At present, the Web encompasses a set of technologies and
services that facilitate interactive information sharing,
collaboration, user centered design, and application composition.
 This evolution has transformed the Web into a rich platform for
application development and is known as Web 2.0.
 Web 2.0brings interactivity and flexibility into Web pages,
providing enhanced user experience by gaining Web-based access
to all the functions that are normally found in desktop
applications.
 These capabilities are obtained by integrating a collection of
standards and technologies such as XML, Asynchronous
Java Script and XML(AJAX), Web Services, and others.
Cont..
 Lightweight deployment and programming models are very
important for effective support of such dynamism.
 Loose coupling is another fundamental property. New
applications can be “synthesized” simply by composing
existing services and inte- grating them, thus providing
added value.
 This way it becomes easier to follow the interests of users.
Finally, Web 2.0 applications aim to leverage the “long tail”
of Internet users by making themselves available to everyone
in terms of either media accessibility or affordability.
 Examples of Web2.0 applications are Google Documents,
GoogleMaps, Flickr, Facebook, Twitter, YouTube,
de.li.cious, Blogger, and Wikipedia.
4. Service-oriented computing
 Service orientation is the core reference model for cloud
computing systems.
 Service-oriented computing(SOC) supports the development
of rapid, low-cost, flexible, interoperable, and evolvable
applications and systems.
 A service is an abstraction representing a self-describing and
platform-agnostic component that can perform any function
—any thing from a simple function to a complex business
process.
 Virtually any piece of code that performs a task can be turned
into a service and expose its functionalities through a
network-accessible protocol.
 A service is supposed to be loosely coupled, reusable,
programming language independent, and location transparent.
Cont..
 Loose coupling allows services to serve different scenarios
more easily and makes them reusable. Independence from a
specific platform increases services accessibility.
 Thus, a wider range of clients, which can look up services
in global registries and consume them in a location-
transparent manner, can be served.
 Services are composed and aggregated into a service-
oriented architecture(SOA), which is a logical way of
organizing of software systems to provide end users or
other entities distributed over the network with services
through published and discoverable interfaces.
Cont..
 Service-oriented computing introduces and diffuses two
important concepts, which are also fundamental to cloud
computing: quality of service(QoS) and Software-as-a-
Service(SaaS).
 1. Quality of service (QoS) identifies a set of functional and
nonfunctional attributes that can be used to evaluate the
behavior of a service from different perspectives.
 These could be performance metrics such as response time, or
security attributes, transactional integrity, reliability,
scalability, and availability.
 Via SLA.
Cont..
 2. Software-as-a-Service(SaaS) introduces a new delivery
model for applications.
 The term has been inherited from the world of application
service providers (ASPs), which deliver software services-based
solutions across the wide area network from a central datacenter
and make them available on a subscription or rental basis.
 The ASP is responsible for maintaining the infrastructure and
making available the application, and the client is freed from
maintenance costs and difficult upgrades. This software
delivery model is possible because economies of scale are
reached by means of multitenancy.
 The SaaS approach reaches its full development with service-
oriented computing (SOC), where loosely coupled software
components can be exposed and priced singularly, rather than
entire applications.
Cont..
 One of the most popular expressions of service orientation is represented
by Web Services (WS) [21]. These introduce the concepts of SOC into
the World Wide Web, by making it consumable by applications and not
only humans.
 Web services are software components that expose functionalities
accessible using a method invocation pattern that goes over the
HyperText Transfer Protocol (HTTP).
 The interface of a Web service can be programmatically inferred by meta
data expressed through the Web Service Description
Language(WSDL); this is an XML language that defines the
characteristics of the service and all the methods, together with
parameters, descriptions, and return type, exposed by the service.
 Using SOAP and WSDL over HTTP, Web services become platform
independent and accessible to the World Wide Web.
 The standards and specifications concerning Web services are controlled
by the World Wide Web Consortium (W3C). Among the most popular
architectures for developing Web services we can note ASP.NET [24]
and Axis [25].
5. Utility-oriented computing
 Utility computing is a vision of computing that defines a
service-provisioning model for compute services in which
resources such as storage, compute power, applications, and
infrastructure are packaged and offered on a pay-per-use basis.
 Additional features such as operating systems, process control,
and user-metering facilities are added to mainframes.
 The capillary diffusion of the Internet and the Web provided
the technological means to realize utility computing on a
worldwide scale and through simple interfaces.
 Service-oriented architectures(SOAs).
 SOC broadened the concept of what could have been accessed
as a utility in a computer system: not only compute power and
storage but also services and application components could be
utilized and integrated on demand.
1.3 Building cloud computing environments
 The creation of cloud computing environments encompasses both:
 the development of applications and systems that leverage cloud
computing solutions and
 the creation of frameworks, platforms, and infrastructures
delivering cloud computing services.
 Application development
 Applications that leverage cloud computing benefit from its
capability to dynamically scale on demand.
 One class of applications that takes the biggest advantage of this
feature is that of Web applications.
 With the diffusion of Web2.0 technologies, the Web has become
a platform for developing rich and complex applications,
including enterprise applications that now leverage the Internet
as the preferred channel for service delivery and user interaction.
Cont..
 Another class of applications are resource-intensive applications.
 These can be either data- intensive or compute-intensive
applications.
 Cloud computing provides a solution for on-demand and dynamic
scaling across the entire stack of computing.
 This is achieved by
 (a) providing methods for renting compute power, storage, and
networking;
 (b) offering runtime environments designed for scalability and
dynamic sizing; and
 (c) providing application services that mimic the behavior of
desktop applications but that are completely hosted and managed
on the provider side.
 All these capabilities leverage service orientation, which allows a
simple and seamless integration into existing systems. Developers
access such services via simple Web interfaces, often implemented
through representational state transfer (REST) Web services.
Infrastructure and system development
 Besides administrative tasks mostly connected to the
accessibility of resources in the cloud, the extreme
dynamism of cloud systems—where new nodes and
services are provisioned on demand—constitutes the
major challenge for engineers and developers.
 This characteristic is pretty peculiar to cloud computing
solutions and is mostly addressed at the middleware
layer of computing system.
 Infrastructure-as-a-Service solutions provide the
capabilities to add and remove resources.
Cont..
 Platform-as-a-Service solutions embed into their core offering
algorithms and rules that control the provisioning process and
the lease of resources.
 Web 2.0 technologies constitute the interface through which
cloud computing services are delivered, managed, and
provisioned.
 Virtualization is another element that plays a fundamental role in
cloud computing. This technology is a core feature of the
infrastructure used by cloud providers.
 These are all considerations that influence the way we program
applications and systems based on cloud computing
technologies.
Computing platforms and technologies
 Development of a cloud computing application happens by
leveraging platforms and frameworks that provide different
types of services, from the baremetal infrastructure to
customizable applications serving specific purposes.
 Amazon web services (AWS)
 Google AppEngine
 Microsoft Azure
 Hadoop
 Force.com and Salesforce.com
 Manjrasoft Aneka
Amazon web services (AWS)
 AWS offers comprehensive cloud IaaS services ranging
from virtual compute, storage, and networking to complete
computing stacks.
 AWS is mostly known for its compute and storage-on-
demand services, namely Elastic Compute Cloud(EC2) and
Simple Storage Service(S3).
 EC2 provides users with customizable virtual hardware
that can be used as the base infrastructure for deploying
computing systems on the cloud.
 It is possible to choose from a large variety of virtual
hardware configurations, including GPU and cluster
instances.
Cont...
 EC2 instances are deployed either by using the AWS console,
which is a comprehensive Web portal for accessing AWS
services, or by using the Web services API available for several
programming languages.
 EC2 also provides the capability to save a specific running
instance as an image, thus allowing users to create their own
templates for deploying systems.
 These templates are stored into S3 that delivers persistent
storage on demand.
 S3 is organized into buckets; these are containers of objects that
are stored in binary form and can be enriched with attributes.
 Users can store objects of any size, from simple files to entire
disk images, and have them accessible from everywhere.
Google AppEngine
 Google App Engine is a scalable runtime environment mostly
devoted to executing Web applications.
 These take advantage of the large computing infrastructure of
Google to dynamically scale as the demand varies over time.
 App Engine provides both a secure execution environment and a
collection of services that simplify the development of scalable
and high-performance Web applications.
 Theseservicesincludein-
memorycaching,scalabledatastore,jobqueues,messaging,and
cron tasks.
 Developers can build and test applications on their own machines
using the App Engine software development kit(SDK),which
replicates the production runtime environment and helps test and
profile applications.
 Once development is complete ,developers can easily migrate
their application to App Engine, set quot as to contain the costs
generated, and make the application available to the world.
 The languages currently supported arePython,Java,andGo. 1.3.3.3
Microsoft Azure
 Microsoft Azure is a cloud operating system
and a platform for developing applications in
the cloud.
 It provides a scalable runtime environment for
Web applications and distributed applications
in general.
 Applications in Azure are organized around the
concept of roles, which identify a distribution
unit for applications and embody the
application’s logic.
 Currently, there are three types of role:
 Web role,
 worker role, and
 virtual machine role.
Cont..
 The Web role is designed to host a Web
application, the worker role is a more generic
container of applications and can be used to
perform workload processing, and the virtual
machine role provides a virtual environment in
which the computing stack can be fully
customized, including the operating systems.
 Besides roles, Azure provides a set of additional
services that complement application
execution, such as support for storage
(relational data and blobs), networking,
caching, content delivery, and others.

More Related Content

Similar to Ch-1-INTRODUCTION (1).pdf

Assignment on Cloud Computing
Assignment on Cloud ComputingAssignment on Cloud Computing
Assignment on Cloud ComputingAl Shahriar
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
cloude computing report
cloude computing reportcloude computing report
cloude computing reportKrishnalal Kj
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation ReportAjit Yadav
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
Cloud computing note for bca students 1.pdf
Cloud computing note for bca students 1.pdfCloud computing note for bca students 1.pdf
Cloud computing note for bca students 1.pdfpoothuinku
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud ComputingJIM MUKERJEE
 
Jagadeesha kulal J - Cloud computing
Jagadeesha kulal J - Cloud computing Jagadeesha kulal J - Cloud computing
Jagadeesha kulal J - Cloud computing JAGADEESHA KULAL J
 
How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...Claudia Brown
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introductionRameshKante
 

Similar to Ch-1-INTRODUCTION (1).pdf (20)

The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 
Assignment on Cloud Computing
Assignment on Cloud ComputingAssignment on Cloud Computing
Assignment on Cloud Computing
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloude computing report
cloude computing reportcloude computing report
cloude computing report
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud computing note for bca students 1.pdf
Cloud computing note for bca students 1.pdfCloud computing note for bca students 1.pdf
Cloud computing note for bca students 1.pdf
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
Jagadeesha kulal J - Cloud computing
Jagadeesha kulal J - Cloud computing Jagadeesha kulal J - Cloud computing
Jagadeesha kulal J - Cloud computing
 
How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 

Ch-1-INTRODUCTION (1).pdf

  • 2.  Computing is being transformed into a model similar to utilities such as water, electricity, gas, and telephony.  Based on the concept of dynamic provisioning .  Works on pay-per-use or pay-as-you-go model.
  • 3. Cloud computing at a glance  In 1969, Leonard Kleinrock, one of the chief scientists of the original Advanced Research Projects Agency Network (ARPANET), which seeded the Internet, said: “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of ‘computer utilities’ which, like present electric and telephone utilities, will service individual homes and offices across the country”. “I don’t care where my servers are, who manages them, where my documents are stored, or where my applications are hosted. I just want them always available and access them from any device connected through Internet. And I am willing to pay for this service for as a long as I need it”.
  • 4. Cont...  Utility computing  Web 2.0 technologies play a central role in making cloud computing an attractive opportunity for building computing systems.  Service orientation or architecture.  Virtualization
  • 5. The vision of cloud computing  Cloud computing allows anyone with a credit card to provision virtual hardware, runtime environ- ments, and services.  These are used for as long as needed, with no up-front commitments required.  The entire stack of a computing system is transformed into a collection of utilities, which can be provisioned and composed together to deploy systems in hours rather than days and with virtually no maintenance costs.
  • 6. Cont..  The long-term vision of cloud computing is that IT services are traded as utilities in an open market, without technological and legal barriers.  In this cloud marketplace, cloud service providers and consumers, trading cloud services as utilities, play a central role.  The need for ubiquitous storage and compute power on demand is the most common reason to consider cloud computing.
  • 7. Cont..  A scalable runtime for applications is an attractive option for application and system developers that do not have infra- structure or cannot afford any further expansion of existing infrastructure.  The capability for Web- based access to documents and their processing using sophisticated applications is one of the appealing factors for end users.  This opportunity, initially met with skepticism, has now become a practice across several application domains and business sectors (see Figure 1.1).
  • 8. I want to focus on application logic and not maintenance and scalability issues I need to grow my infrastructure, but I do not know for how long… I have a lot of infrastructure that I want to rent … I have infrastructure and provide application services I want to access and edit my documents and photos from everywhere.. I have infrastructure and provide application services
  • 9. Defining a cloud No capital investments Quality of Service Billing PaaS SaaS IaaS IT outsourcing Scalability Provisioning on demand Privacy & Trust Virtualization Internet Elasticity Service Level Agreement Virtual Datacenters Security Utility computing Green computing SLA defines quality-of-service parameters under which the
  • 10.  Cloud computing refers to both the applications delivered as services over the Internet and the hardware and system software in the datacenters that provide those services.  Definition proposed by the U.S.National Instituteof Standards and Technology (NIST):  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
  • 11.  According to Reese, we can define three criteria to discriminate whether a service is delivered in the cloud computing style:  • The service is accessible via a Web browser (nonproprietary) or a Web services application programming interface (API).  • Zero capital expenditure is necessary to get started.  • You pay only for what you use as you use it.
  • 12.  The utility-oriented nature of cloud computing is clearly expressed by Buyya et al. :  A cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers.
  • 13. A closer look  Large enterprises can offload some of their activities to cloud- based systems.  Small enterprises and start-ups can afford to translate their ideas into business results more quickly, without excessive up-front costs.  System developers can concentrate on the business logic rather than dealing with the complexity of infrastructure management and scalability.  End users can have their documents accessible from everywhere and any device.
  • 14. Cloud computing does not only contribute with the opportunity of easily accessing IT services on demand, it also introduces a new way of thinking about IT services and resources: as utilities. A bird’s-eye view of a cloud computing environment is shown in Figure Subscription - Oriented Cloud Services: X{compute, apps, data, ..} as a Service (..aaS) Public Clouds Developmen t and Runtime Platform Storage Compute Applications Cloud Manage r Clients Cloud Services Govt. Cloud Services Privat e Cloud Hybri d Cloud
  • 15. Cloud Deployment Models OR Types Hybrid Cloud: Combines Private, Public or Community Clouds. Allows manipulation of CapEX and OpEX to reduce costs. Supports resource Portability. Private Cloud: Leverages existing CapEx. Can Helps to reduce OpEx. Intended for single tenant Public Cloud: Shifts CapEx to OpEx Offers pay as you grow. Supports multiple tenants. Community Cloud: Allows sharing of CapEx and OpEx to reduce costs. Bridges together groups or organizations with common goal. Supports reduce portability.
  • 16. The cloud computing reference model Web 2.0 Interfac es End-user applications Scientific applications Office automation, photo editing, CRM, and social networking Examples : Google Documents, Facebook, Flickr, Salesforce Runtime environment for applications Development and data processing platforms Examples : Windows Azure, Hadoop, Google AppEngine, Aneka Virtualized servers Storage and networking Examples : Amazon EC2, S3, Rightscale, vCloud Software as a Service Platform as a Service Infrastructure as a Service
  • 18. Characteristics and benefits  Cloud computing has some interesting characteristics that bring benefits to both cloud service con- sumers (CSCs) and cloud service providers (CSPs). These characteristics are:  No up-front commitments  • On-demand access  • Nice pricing  • Simplified application acceleration and scalability  • Efficient resource allocation  • Energy efficiency
  • 19. Cont...  • Seamless creation and use of third-party services  Multi-tenancy  Increased agility in defining and structuring software systems.  Finally, service orientation and on-demand access create new opportunities for composing sys- tems and applications with a flexibility not possible before cloud computing.
  • 20.
  • 22.
  • 23. Challenges ahead  New, interesting problems and challenges are regularly being posed to the cloud community, including IT practitioners, managers, governments, and regulators.  Besides the practical aspects, which are related to configuration, networking, and sizing of cloud computing systems, a new set of challenges concerning the dynamic provisioning of cloud computing services and resources arises.  Example, how many resources need to be provisioned, and for how long should they be used, in order to maximize the benefit?  Technical challenges also arise for cloud service providers .  The integration of real and virtual infrastructure, security and legislation .
  • 24. Cont..  Security in terms of confidentiality, secrecy, and protection of data in a cloud environment is another important challenge.  Cryptography can help secure the transit of data.  Legal issues may also arise.  These are specifically tied to the ubiquitous nature of cloud computing, which spreads computing infrastructure across diverse geographical locations.  Different legislation about privacy in different countries may potentially create disputes as to the rights that third parties (including government agencies) have to your data.
  • 25. Challenges/Issues Difficulties Possible Solutions Outsourcing Data and Applications Cloud user host data and applications on cloud servers by relying on third parties to make decisions about user data and platforms. Cloud Computing provides access to data, but the challenge is to ensure that only authorized user can gain access to it (Hassan Takabi et al., 2010). It’s very difficult to have appropriate mechanisms to prevent cloud providers from using customers’ data in a way that hasn’t been agreed upon. Any technical means could not completely prevent cloud providers from abusing customer data in all cases, so a combination of technical and nontechnical can be used to achieve this. Clients need to have significant trust in their provider’s technical competence and economic stability. Service Level Agreement It is essential for customers to get assurances from providers on service delivery. Typically, these are provided during Service Level Agreements (SLAs) negotiated between the providers and customers (John et al., 2009). 1. Definition of SLA specification. 2. Different cloud offerings will need to classify different Meta specifications. Advanced SLA methods need to regularly integrate user advice and customization features into the SLA assessment framework. Extensibility and Shared Responsibility Cloud providers and customers must share the responsibility for security and privacy in Cloud Computing environments, but sharing levels will differ for different delivery models, which in turn affect cloud extensibility (Hassan Takabi et al., 2010). 1. Providing privacy and security to all deployment models is difficult. 2. Private clouds could also demand more extensibility to accommodate customized requirements so providing security in that stage is difficult. Provide the security to each level of resource sharing and make use of available, advanced and new protection mechanisms to provide privacy and security to each level. the hardware
  • 26. Cloud Interoperability Which provide the freedom to customer to switch from alternative vendors/offerings/providers simultaneously to optimize resources at various stages in an organization (Gundeep et al., 2012). 1. Cloud APIs makes it very difficult to merge cloud services with an organization's own existing legacy systems. 2. Aim of interoperability is to detect the faultless fluid data across local applications, across clouds and among clouds and it is difficult to detect. Standardization approach would be a good solution to deal with this issue. For example optimizing in outsourcing a number of insignificant functions to cloud services offered by different vendors. Heterogeneity Cloud providers use various hardware and software resources to build Cloud environments. To some extent, resource virtualization achieves high-level system homogeneity, but the same infrastructure being used to support different tenants with different protection and system requirements can generate difficulties (Hassan Takabi et al., 2010). A potential issue are: 1. If a client subscribes to different cloud providers for different services then the assumptions that each of these cloud providers make in building the services can severely affect the emergent trust and security properties. 2. Generates integration challenges. 3. In a multi-tenant environment, the protection requirements for each tenant might differ, which can make a multi- tenant cloud a single point of compromise. Designing of more efficient privacy and security mechanisms could overcome the said difficulties. Multi-tenancy This means that the cloud platform is shared and exploited by number of clients (Bhaskar et al., 2009), (Zhifeng, 2012). 1. Opponents who may also be legal cloud clients may utilize the co- residence issue. 2. Many security issues such as data breach, computation breach, flooding attack, etc., are incurred. 3. It supplies new vulnerabilities to the cloud platform. There are three kinds of multi-tenancy enablement approaches such as sharing, arbitration and virtualization. To achieve the full potential of multi- tenancy three issues continue to be solved such as Resource sharing, Security isolation, Customization.
  • 27. Load Balancing Load balancing can be defined as assigning a part of job to another or idle computer to improve the efficiency and optimize the use of resources (Wei-Tek et al., 2010). Continuous monitoring of the components becomes overhead and when one becomes non-responsive, the load balancer needs to inform that stop sending traffic to overloaded system. Effectively implementing load balancer by using new mechanism. Resource Scheduling Means assigning the resources such as hardware, software, process time, communication bandwidth and applications to the processes. Implementing multitasking and multiplexing techniques in scheduler is somewhat tedious task. Implement scheduler to have advanced algorithm and mechanism which concern about the throughput, latency, specifically: turnaround time, response time and fairness / waiting time. Virtualization IT virtualization is the abstraction of physical infrastructures such as servers, data centers, networks capabilities and storage resources (Wei-Tek et al., 2010). 1. Rise of high density. 2. Reduced IT load affects Power Usage Effectiveness (PUE). 3. Dynamic IT loads. 4. Lower redundancy requirements are possible. Physical infrastructure efficiency measured as PUE will increase if the power and cooling infrastructure is right-sized to the new lesser overall load, then necessity for idleness in the physical infrastructure may be reduced by using highly virtualized data center design and IT fault- tolerance functioned with a high level. Privacy and Security A third party causes the security and privacy issues more critical when outsourcing the data and business applications (Bhaskar, 2009a). Finding the solutions for the attacks: Malware-injection, flooding, accountability check problem, browser Security, securing data in transmission, identity and access management is difficult. Requires novel techniques to tackle with. Some of the countermeasures are described in Table 3.2.
  • 28. Historical developments  We briefly review five core technologies that played an important role in the realization of cloud computing.  These technologies are:  distributed systems,  virtualization,  Web 2.0,  service orientation, and  utility computing.
  • 29. 1. Distributed systems  “A distributed system is a collection of independent computers that appears to its users as a single coherent system”.  It evidences two very important elements characterizing a distributed system: the fact that it is composed of multiple independent components and that these components are perceived as a single entity by users.  This is particularly true in the case of cloud computing, in which clouds hide the complex architecture they rely on and provide a single interface to users.
  • 30. Cont..  The primary purpose of distributed systems is to share resources and utilize them better. This is true in the case of cloud computing, where this concept is taken to the extreme and resources (infrastructure, runtime environments, and services) are rented to users.  Distributed systems often exhibit other properties such as heterogeneity, openness, scalability, transparency, concurrency, continuous availability, and independent failures.  To some extent these also characterizeclouds,especiallyinthecontextofscalability,co ncurrency,andcontinuous availability.
  • 31. Cont..  Three major milestones have led to cloud computing: mainframe computing, cluster computing, and grid computing.  1.Mainframes: These were the first examples of large computational facilities leveraging multiple processing units.  Powerful, highly reliable computers specialized for large data movement and massive input/output (I/O) operations.  Used by large organizations for bulk data processing tasks such as:  online transactions,  enterprise resource planning,  and other operations involving the processing of significant amounts of data.  “always on” and capable of tolerating failures transparently.  Batch processing was the main application of mainframes.  Such systems are still in use for transaction processing (such as online banking, airline ticket booking, supermarket and telcos, and government services).
  • 32.  2. Clusters. Cluster computing started as a low-cost alternative to the use of mainframes and supercomputers.  These machines could then be connected by a high- bandwidth network and controlled by specific software tools that manage them as a single system.  Starting in the 1980s, clusters become the standard technology for parallel and high-performance computing.  Built by commodity machines, they were cheaper than mainframes and made high-performance computing available to a large number of groups, including universities and small research labs.
  • 33. Cont..  3. Grids: Grid computing appeared in the early 1990s as an evolution of cluster computing.  In an analogy to the power grid, grid computing proposed a new approach to access large computational power, huge storage facilities, and a variety of services.  Users can “consume” resources in the same way as they use other utilities such as power, gas, and water.  Different from a “large cluster,” a computing grid was a dynamic aggregation of heterogeneous computing nodes, and its scale was nationwide or even worldwide.
  • 34. Cont..  Several developments made possible the diffusion of computing grids:  (a) clusters became quite common resources;  (b) they were often underutilized;  (c) new problems were requiring computational power that went beyond the capability of single clusters; and  (d) the improvements in networking and the diffusion of the Internet made possible long-distance, high- bandwidth connectivity.  All these elements led to the development of grids, which now serve a multitude of users across the world.
  • 35. 2. Virtualization  Creation of logical instances or emulation of s/ws and h/ws on the top of actual h/w devices.  It encompasses a collection of solutions allowing the abstraction of some of the fundamental elements for computing, such as hardware, runtime environments, storage, and networking.  Virtualization confers that degree of customization and control that makes cloud computing appealing for users and, at the same time, sustainable for cloud services providers.
  • 37. 3. Web 2.0  The Web is the primary interface through which cloud computing delivers its services.  At present, the Web encompasses a set of technologies and services that facilitate interactive information sharing, collaboration, user centered design, and application composition.  This evolution has transformed the Web into a rich platform for application development and is known as Web 2.0.  Web 2.0brings interactivity and flexibility into Web pages, providing enhanced user experience by gaining Web-based access to all the functions that are normally found in desktop applications.  These capabilities are obtained by integrating a collection of standards and technologies such as XML, Asynchronous Java Script and XML(AJAX), Web Services, and others.
  • 38. Cont..  Lightweight deployment and programming models are very important for effective support of such dynamism.  Loose coupling is another fundamental property. New applications can be “synthesized” simply by composing existing services and inte- grating them, thus providing added value.  This way it becomes easier to follow the interests of users. Finally, Web 2.0 applications aim to leverage the “long tail” of Internet users by making themselves available to everyone in terms of either media accessibility or affordability.  Examples of Web2.0 applications are Google Documents, GoogleMaps, Flickr, Facebook, Twitter, YouTube, de.li.cious, Blogger, and Wikipedia.
  • 39. 4. Service-oriented computing  Service orientation is the core reference model for cloud computing systems.  Service-oriented computing(SOC) supports the development of rapid, low-cost, flexible, interoperable, and evolvable applications and systems.  A service is an abstraction representing a self-describing and platform-agnostic component that can perform any function —any thing from a simple function to a complex business process.  Virtually any piece of code that performs a task can be turned into a service and expose its functionalities through a network-accessible protocol.  A service is supposed to be loosely coupled, reusable, programming language independent, and location transparent.
  • 40. Cont..  Loose coupling allows services to serve different scenarios more easily and makes them reusable. Independence from a specific platform increases services accessibility.  Thus, a wider range of clients, which can look up services in global registries and consume them in a location- transparent manner, can be served.  Services are composed and aggregated into a service- oriented architecture(SOA), which is a logical way of organizing of software systems to provide end users or other entities distributed over the network with services through published and discoverable interfaces.
  • 41. Cont..  Service-oriented computing introduces and diffuses two important concepts, which are also fundamental to cloud computing: quality of service(QoS) and Software-as-a- Service(SaaS).  1. Quality of service (QoS) identifies a set of functional and nonfunctional attributes that can be used to evaluate the behavior of a service from different perspectives.  These could be performance metrics such as response time, or security attributes, transactional integrity, reliability, scalability, and availability.  Via SLA.
  • 42. Cont..  2. Software-as-a-Service(SaaS) introduces a new delivery model for applications.  The term has been inherited from the world of application service providers (ASPs), which deliver software services-based solutions across the wide area network from a central datacenter and make them available on a subscription or rental basis.  The ASP is responsible for maintaining the infrastructure and making available the application, and the client is freed from maintenance costs and difficult upgrades. This software delivery model is possible because economies of scale are reached by means of multitenancy.  The SaaS approach reaches its full development with service- oriented computing (SOC), where loosely coupled software components can be exposed and priced singularly, rather than entire applications.
  • 43. Cont..  One of the most popular expressions of service orientation is represented by Web Services (WS) [21]. These introduce the concepts of SOC into the World Wide Web, by making it consumable by applications and not only humans.  Web services are software components that expose functionalities accessible using a method invocation pattern that goes over the HyperText Transfer Protocol (HTTP).  The interface of a Web service can be programmatically inferred by meta data expressed through the Web Service Description Language(WSDL); this is an XML language that defines the characteristics of the service and all the methods, together with parameters, descriptions, and return type, exposed by the service.  Using SOAP and WSDL over HTTP, Web services become platform independent and accessible to the World Wide Web.  The standards and specifications concerning Web services are controlled by the World Wide Web Consortium (W3C). Among the most popular architectures for developing Web services we can note ASP.NET [24] and Axis [25].
  • 44. 5. Utility-oriented computing  Utility computing is a vision of computing that defines a service-provisioning model for compute services in which resources such as storage, compute power, applications, and infrastructure are packaged and offered on a pay-per-use basis.  Additional features such as operating systems, process control, and user-metering facilities are added to mainframes.  The capillary diffusion of the Internet and the Web provided the technological means to realize utility computing on a worldwide scale and through simple interfaces.  Service-oriented architectures(SOAs).  SOC broadened the concept of what could have been accessed as a utility in a computer system: not only compute power and storage but also services and application components could be utilized and integrated on demand.
  • 45. 1.3 Building cloud computing environments  The creation of cloud computing environments encompasses both:  the development of applications and systems that leverage cloud computing solutions and  the creation of frameworks, platforms, and infrastructures delivering cloud computing services.  Application development  Applications that leverage cloud computing benefit from its capability to dynamically scale on demand.  One class of applications that takes the biggest advantage of this feature is that of Web applications.  With the diffusion of Web2.0 technologies, the Web has become a platform for developing rich and complex applications, including enterprise applications that now leverage the Internet as the preferred channel for service delivery and user interaction.
  • 46. Cont..  Another class of applications are resource-intensive applications.  These can be either data- intensive or compute-intensive applications.  Cloud computing provides a solution for on-demand and dynamic scaling across the entire stack of computing.  This is achieved by  (a) providing methods for renting compute power, storage, and networking;  (b) offering runtime environments designed for scalability and dynamic sizing; and  (c) providing application services that mimic the behavior of desktop applications but that are completely hosted and managed on the provider side.  All these capabilities leverage service orientation, which allows a simple and seamless integration into existing systems. Developers access such services via simple Web interfaces, often implemented through representational state transfer (REST) Web services.
  • 47. Infrastructure and system development  Besides administrative tasks mostly connected to the accessibility of resources in the cloud, the extreme dynamism of cloud systems—where new nodes and services are provisioned on demand—constitutes the major challenge for engineers and developers.  This characteristic is pretty peculiar to cloud computing solutions and is mostly addressed at the middleware layer of computing system.  Infrastructure-as-a-Service solutions provide the capabilities to add and remove resources.
  • 48. Cont..  Platform-as-a-Service solutions embed into their core offering algorithms and rules that control the provisioning process and the lease of resources.  Web 2.0 technologies constitute the interface through which cloud computing services are delivered, managed, and provisioned.  Virtualization is another element that plays a fundamental role in cloud computing. This technology is a core feature of the infrastructure used by cloud providers.  These are all considerations that influence the way we program applications and systems based on cloud computing technologies.
  • 49. Computing platforms and technologies  Development of a cloud computing application happens by leveraging platforms and frameworks that provide different types of services, from the baremetal infrastructure to customizable applications serving specific purposes.  Amazon web services (AWS)  Google AppEngine  Microsoft Azure  Hadoop  Force.com and Salesforce.com  Manjrasoft Aneka
  • 50. Amazon web services (AWS)  AWS offers comprehensive cloud IaaS services ranging from virtual compute, storage, and networking to complete computing stacks.  AWS is mostly known for its compute and storage-on- demand services, namely Elastic Compute Cloud(EC2) and Simple Storage Service(S3).  EC2 provides users with customizable virtual hardware that can be used as the base infrastructure for deploying computing systems on the cloud.  It is possible to choose from a large variety of virtual hardware configurations, including GPU and cluster instances.
  • 51. Cont...  EC2 instances are deployed either by using the AWS console, which is a comprehensive Web portal for accessing AWS services, or by using the Web services API available for several programming languages.  EC2 also provides the capability to save a specific running instance as an image, thus allowing users to create their own templates for deploying systems.  These templates are stored into S3 that delivers persistent storage on demand.  S3 is organized into buckets; these are containers of objects that are stored in binary form and can be enriched with attributes.  Users can store objects of any size, from simple files to entire disk images, and have them accessible from everywhere.
  • 52. Google AppEngine  Google App Engine is a scalable runtime environment mostly devoted to executing Web applications.  These take advantage of the large computing infrastructure of Google to dynamically scale as the demand varies over time.  App Engine provides both a secure execution environment and a collection of services that simplify the development of scalable and high-performance Web applications.  Theseservicesincludein- memorycaching,scalabledatastore,jobqueues,messaging,and cron tasks.  Developers can build and test applications on their own machines using the App Engine software development kit(SDK),which replicates the production runtime environment and helps test and profile applications.  Once development is complete ,developers can easily migrate their application to App Engine, set quot as to contain the costs generated, and make the application available to the world.  The languages currently supported arePython,Java,andGo. 1.3.3.3
  • 53. Microsoft Azure  Microsoft Azure is a cloud operating system and a platform for developing applications in the cloud.  It provides a scalable runtime environment for Web applications and distributed applications in general.  Applications in Azure are organized around the concept of roles, which identify a distribution unit for applications and embody the application’s logic.  Currently, there are three types of role:  Web role,  worker role, and  virtual machine role.
  • 54. Cont..  The Web role is designed to host a Web application, the worker role is a more generic container of applications and can be used to perform workload processing, and the virtual machine role provides a virtual environment in which the computing stack can be fully customized, including the operating systems.  Besides roles, Azure provides a set of additional services that complement application execution, such as support for storage (relational data and blobs), networking, caching, content delivery, and others.