SlideShare a Scribd company logo
Chapter 1 – Introduction
1
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
Contents
 Network-centric computing and network-centric content.
 Cloud computing.
 Delivery models and services.
 Ethical issues in cloud computing.
 Cloud vulnerabilities.
Cloud Computing: Theory and Practice.
Chapter 1 2Dan C. Marinescu
Network-centric computing
 Information processing can be done more efficiently on large farms of
computing and storage systems accessible via the Internet.
 Grid computing – initiated by the National Labs in the early 1990s; targeted
primarily at scientific computing.
 Utility computing – initiated in 2005-2006 by IT companies and targeted at
enterprise computing.
 The focus of utility computing is on the business model for providing
computing services; it often requires a cloud-like infrastructure.
 Cloud computing is a path to utility computing embraced by major IT
companies including: Amazon, HP, IBM, Microsoft, Oracle, and others.
3
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
Network-centric content
 Content: any type or volume of media, be it static or dynamic,
monolithic or modular, live or stored, produced by aggregation, or
mixed.
 The “Future Internet” will be content-centric.
The creation and consumption of audio and visual content is likely to
transform the Internet to support increased quality in terms of
resolution, frame rate, color depth, stereoscopic information.
4
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
Network-centric computing and content
 Data-intensive: large scale simulations in science and engineering
require large volumes of data. Multimedia streaming transfers large
volume of data.
 Network-intensive: transferring large volumes of data requires high
bandwidth networks.
 Low-latency networks for data streaming, parallel computing,
computation steering.
 The systems are accessed using thin clients running on systems
with limited resources, e.g., wireless devices such as smart phones
and tablets.
 The infrastructure should support some form of workflow
management.
Cloud Computing: Theory and Practice.
Chapter 1 5Dan C. Marinescu
Evolution of concepts and technologies
 The concepts and technologies for network-centric computing and
content evolved along the years.
 The web and the semantic web - expected to support composition of
services. The web is dominated by unstructured or semi-structured
data, while the semantic web advocates inclusion of sematic content in
web pages.
 The Grid - initiated in the early 1990s by National Laboratories and
Universities; used primarily for applications in the area of science and
engineering.
 Peer-to-peer systems.
 Computer clouds.
Cloud Computing: Theory and Practice.
Chapter 1 6Dan C. Marinescu
Cloud computing
 Uses Internet technologies to offer scalable and elastic services.
The term “elastic computing” refers to the ability of dynamically
acquiring computing resources and supporting a variable workload.
 The resources used for these services can be metered and
the users can be charged only for the resources they used.
 The maintenance and security are ensured by service providers.
 The service providers can operate more efficiently due to
specialization and centralization.
7
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
Cloud computing (cont’d)
 Lower costs for the cloud service provider are past to the cloud users.
 Data is stored:
 closer to the site where it is used.
 in a device and in a location-independent manner.
 The data storage strategy can increase reliability, as well as security,
and can lower communication costs.
Cloud Computing: Theory and Practice.
Chapter 1 8Dan C. Marinescu
Types of clouds
 Public Cloud - the infrastructure is made available to the general
public or a large industry group and is owned by the organization
selling cloud services.
 Private Cloud – the infrastructure is operated solely for an
organization.
 Community Cloud - the infrastructure is shared by several
organizations and supports a community that has shared
concerns.
 Hybrid Cloud - composition of two or more clouds (public, private,
or community) as unique entities but bound by standardized
technology that enables data and application portability.
Cloud Computing: Theory and Practice.
Chapter 1 9Dan C. Marinescu
The “good” about cloud computing
 Resources, such as CPU cycles, storage, network bandwidth, are
shared.
 When multiple applications share a system, their peak demands for
resources are not synchronized thus, multiplexing leads to a higher
resource utilization.
 Resources can be aggregated to support data-intensive
applications.
 Data sharing facilitates collaborative activities. Many applications
require multiple types of analysis of shared data sets and multiple
decisions carried out by groups scattered around the globe.
10
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
More “good” about cloud computing
 Eliminates the initial investment costs for a private computing
infrastructure and the maintenance and operation costs.
 Cost reduction: concentration of resources creates the opportunity
to pay as you go for computing.
 Elasticity: the ability to accommodate workloads with very large
peak-to-average ratios.
 User convenience: virtualization allows users to operate in familiar
environments rather than in idiosyncratic ones.
Cloud Computing: Theory and Practice.
Chapter 1 11Dan C. Marinescu
Why cloud computing could be successful
when other paradigms have failed?
 It is in a better position to exploit recent advances in software, networking,
storage, and processor technologies promoted by the same companies
who provide cloud services.
 It is focused on enterprise computing; its adoption by industrial
organizations, financial institutions, government, and so on could have a
huge impact on the economy.
 A cloud consists of a homogeneous set of hardware and software
resources.
 The resources are in a single administrative domain (AD). Security,
resource management, fault-tolerance, and quality of service are less
challenging than in a heterogeneous environment with resources in
multiple ADs.
12
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
Challenges for cloud computing
 Availability of service; what happens when the service provider
cannot deliver?
 Diversity of services, data organization, user interfaces available
at different service providers limit user mobility; once a customer is
hooked to one provider it is hard to move to another.
Standardization efforts at NIST!
 Data confidentiality and auditability, a serious problem.
 Data transfer bottleneck; many applications are data-intensive.
13
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
More challenges
 Performance unpredictability, one of the consequences of resource
sharing.
 How to use resource virtualization and performance isolation for QoS
guarantees?
 How to support elasticity, the ability to scale up and down quickly?
 Resource management; are self-organization and self-management
the solution?
 Security and confidentiality; major concern.
 Addressing these challenges provides good research
opportunities!!
Cloud Computing: Theory and Practice.
Chapter 1 14Dan C. Marinescu
Cloud Computing: Theory and Practice.
Chapter 1 15Dan C. Marinescu
Delivery models
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Deployment models
Private cloud
Hybrid cloud
Public cloud
Community cloud
Defining attributes
Massive infrastructure
Accessible via the Internet
Utility computing. Pay-per-usage
Elasticity
Cloud computing
Resources
Networks
Compute & storage servers
Services
Applications
Infrastructure
Distributed infrastructure
Resource virtualization
Autonomous systems
Cloud delivery models
 Software as a Service (SaaS)
 Platform as a Service (PaaS)
 Infrastructure as a Service (IaaS)
Cloud Computing: Theory and Practice.
Chapter 1 16Dan C. Marinescu
Software-as-a-Service (SaaS)
 Applications are supplied by the service provider.
 The user does not manage or control the underlying cloud
infrastructure or individual application capabilities.
 Services offered include:
 Enterprise services such as: workflow management, group-ware and
collaborative, supply chain, communications, digital signature, customer
relationship management (CRM), desktop software, financial
management, geo-spatial, and search.
 Web 2.0 applications such as: metadata management, social
networking, blogs, wiki services, and portal services.
 Not suitable for real-time applications or for those where data is not
allowed to be hosted externally.
 Examples: Gmail, Google search engine.
Cloud Computing: Theory and Practice.
Chapter 1 17Dan C. Marinescu
Platform-as-a-Service (PaaS)
 Allows a cloud user to deploy consumer-created or acquired
applications using programming languages and tools supported by
the service provider.
 The user:
 Has control over the deployed applications and, possibly, application
hosting environment configurations.
 Does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage.
 Not particularly useful when:
 The application must be portable.
 Proprietary programming languages are used.
 The hardware and software must be customized to improve the
performance of the application.
Cloud Computing: Theory and Practice.
Chapter 1 18Dan C. Marinescu
Infrastructure-as-a-Service (IaaS)
 The user is able to deploy and run arbitrary software, which can
include operating systems and applications.
 The user does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage,
deployed applications, and possibly limited control of some
networking components, e.g., host firewalls.
 Services offered by this delivery model include: server hosting, Web
servers, storage, computing hardware, operating systems, virtual
instances, load balancing, Internet access, and bandwidth
provisioning.
Cloud Computing: Theory and Practice.
Chapter 1 19Dan C. Marinescu
Cloud Computing: Theory and Practice.
Chapter 1 20Dan C. Marinescu
Facilities
Hardware
Core
connectivity
Abstraction
API
Software as a Service
Facilities
Hardware
Core
connectivity
Abstraction
API
Integration and
middleware
Data Metadata
Applications
API
Presentation
Infrastructure as a Service
Facilities
Hardware
Core
connectivity
Abstraction
API
Integration and
middleware
Platform as a Service
Cloud activities
 Service management and provisioning including:
 Virtualization.
 Service provisioning.
 Call center.
 Operations management.
 Systems management.
 QoS management.
 Billing and accounting, asset management.
 SLA management.
 Technical support and backups.
Cloud Computing: Theory and Practice.
Chapter 1 21Dan C. Marinescu
Cloud activities (cont’d)
 Security management including:
 ID and authentication.
 Certification and accreditation.
 Intrusion prevention.
 Intrusion detection.
 Virus protection.
 Cryptography.
 Physical security, incident response.
 Access control, audit and trails, and firewalls.
Cloud Computing: Theory and Practice.
Chapter 1 22Dan C. Marinescu
Cloud activities (cont’d)
 Customer services such as:
 Customer assistance and on-line help.
 Subscriptions.
 Business intelligence.
 Reporting.
 Customer preferences.
 Personalization.
 Integration services including:
 Data management.
 Development.
Cloud Computing: Theory and Practice.
Chapter 1 23Dan C. Marinescu
NIST cloud reference model
Cloud Computing: Theory and Practice.
Chapter 1 24Dan C. Marinescu
Carrier
S
e
c
u
r
i
t
y
P
r
i
v
a
c
y
Service
Consumer BrokerService Provider
Auditor
Security
audit
Privacy
impact audit
Performance
audit
Service
Management
Business
support
Provisioning
Portability/
Interoperability
IAAS
IaaS
SaaS
Service Layer
PaaS
Carrier
Hardware
Facility
Physical resource
layer
Resource
abstraction and
control layer
Intermediation
Aggregation
Arbitrage
Ethical issues
 Paradigm shift with implications on computing ethics:
 The control is relinquished to third party services.
 The data is stored on multiple sites administered by several
organizations.
 Multiple services interoperate across the network.
 Implications
 Unauthorized access.
 Data corruption.
 Infrastructure failure, and service unavailability.
Cloud Computing: Theory and Practice.
Chapter 1 25Dan C. Marinescu
De-perimeterisation
 Systems can span the boundaries of multiple organizations and cross
the security borders.
 The complex structure of cloud services can make it difficult to
determine who is responsible in case something undesirable happens.
 Identity fraud and theft are made possible by the unauthorized access
to personal data in circulation and by new forms of dissemination
through social networks and they could also pose a danger to cloud
computing.
Cloud Computing: Theory and Practice.
Chapter 1 26Dan C. Marinescu
Privacy issues
 Cloud service providers have already collected petabytes of
sensitive personal information stored in data centers around the
world. The acceptance of cloud computing therefore will be
determined by privacy issues addressed by these companies and
the countries where the data centers are located.
 Privacy is affected by cultural differences; some cultures favor
privacy, others emphasize community. This leads to an ambivalent
attitude towards privacy in the Internet which is a global system.
Cloud Computing: Theory and Practice.
Chapter 1 27Dan C. Marinescu
Cloud vulnerabilities
 Clouds are affected by malicious attacks and failures of the
infrastructure, e.g., power failures.
 Such events can affect the Internet domain name servers and
prevent access to a cloud or can directly affect the clouds:
 in 2004 an attack at Akamai caused a domain name outage and a
major blackout that affected Google, Yahoo, and other sites.
 in 2009, Google was the target of a denial of service attack which
took down Google News and Gmail for several days;
 in 2012 lightning caused a prolonged down time at Amazon.
Cloud Computing: Theory and Practice.
Chapter 1 28Dan C. Marinescu

More Related Content

What's hot

Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
Mehul Patel
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Animesh Chaturvedi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Syam Lal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Reetesh Gupta
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
Jaya Silwal
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
Dr Neelesh Jain
 
Grid computing
Grid computingGrid computing
Grid computing
Dikshita_Viradia
 
Service oriented architecture characteristics of soa
Service oriented architecture characteristics  of soaService oriented architecture characteristics  of soa
Service oriented architecture characteristics of soa
smithaps4
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computing
hrmalik20
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
Mohammed Sajjad Ali
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Sudarsun Santhiappan
 
cloud computing
cloud computingcloud computing
cloud computing
Yasir Hilal
 
Cloud computing and Cloudsim
Cloud computing and CloudsimCloud computing and Cloudsim
Cloud computing and Cloudsim
Manash Kumar Mondal
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
Shreyans Jain
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ronak patel
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Assignment on Cloud Computing
Assignment on Cloud ComputingAssignment on Cloud Computing
Assignment on Cloud Computing
Al Shahriar
 

What's hot (20)

Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
 
Grid computing
Grid computingGrid computing
Grid computing
 
Service oriented architecture characteristics of soa
Service oriented architecture characteristics  of soaService oriented architecture characteristics  of soa
Service oriented architecture characteristics of soa
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computing
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud computing and Cloudsim
Cloud computing and CloudsimCloud computing and Cloudsim
Cloud computing and Cloudsim
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Assignment on Cloud Computing
Assignment on Cloud ComputingAssignment on Cloud Computing
Assignment on Cloud Computing
 

Similar to Chapter1

Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
IJEACS
 
G0314043
G0314043G0314043
G0314043
iosrjournals
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
Vamsi Krishna Vanama
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
Emily Smith
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
cloude computing report
cloude computing reportcloude computing report
cloude computing report
Krishnalal Kj
 
Introduction.ppt
Introduction.pptIntroduction.ppt
Introduction.ppt
ssuserd23711
 
Introduction to cloud Cambridge University.ppt
Introduction to cloud Cambridge University.pptIntroduction to cloud Cambridge University.ppt
Introduction to cloud Cambridge University.ppt
estabraqhm
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
Sagar Kumar
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
Udara Sandaruwan
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
ahmed elmeghiny
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
Sitamarhi Institute of Technology
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
Paper Writing Services Reviews
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Supriya Pase
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
Dr. Amarjeet Singh
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
Dr. Amarjeet Singh
 

Similar to Chapter1 (20)

Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
G0314043
G0314043G0314043
G0314043
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
cloude computing report
cloude computing reportcloude computing report
cloude computing report
 
Introduction.ppt
Introduction.pptIntroduction.ppt
Introduction.ppt
 
Introduction to cloud Cambridge University.ppt
Introduction to cloud Cambridge University.pptIntroduction to cloud Cambridge University.ppt
Introduction to cloud Cambridge University.ppt
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 

Recently uploaded

Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
Nettur Technical Training Foundation
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 

Recently uploaded (20)

Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 

Chapter1

  • 1. Chapter 1 – Introduction 1 Cloud Computing: Theory and Practice. Chapter 1Dan C. Marinescu
  • 2. Contents  Network-centric computing and network-centric content.  Cloud computing.  Delivery models and services.  Ethical issues in cloud computing.  Cloud vulnerabilities. Cloud Computing: Theory and Practice. Chapter 1 2Dan C. Marinescu
  • 3. Network-centric computing  Information processing can be done more efficiently on large farms of computing and storage systems accessible via the Internet.  Grid computing – initiated by the National Labs in the early 1990s; targeted primarily at scientific computing.  Utility computing – initiated in 2005-2006 by IT companies and targeted at enterprise computing.  The focus of utility computing is on the business model for providing computing services; it often requires a cloud-like infrastructure.  Cloud computing is a path to utility computing embraced by major IT companies including: Amazon, HP, IBM, Microsoft, Oracle, and others. 3 Cloud Computing: Theory and Practice. Chapter 1Dan C. Marinescu
  • 4. Network-centric content  Content: any type or volume of media, be it static or dynamic, monolithic or modular, live or stored, produced by aggregation, or mixed.  The “Future Internet” will be content-centric. The creation and consumption of audio and visual content is likely to transform the Internet to support increased quality in terms of resolution, frame rate, color depth, stereoscopic information. 4 Cloud Computing: Theory and Practice. Chapter 1Dan C. Marinescu
  • 5. Network-centric computing and content  Data-intensive: large scale simulations in science and engineering require large volumes of data. Multimedia streaming transfers large volume of data.  Network-intensive: transferring large volumes of data requires high bandwidth networks.  Low-latency networks for data streaming, parallel computing, computation steering.  The systems are accessed using thin clients running on systems with limited resources, e.g., wireless devices such as smart phones and tablets.  The infrastructure should support some form of workflow management. Cloud Computing: Theory and Practice. Chapter 1 5Dan C. Marinescu
  • 6. Evolution of concepts and technologies  The concepts and technologies for network-centric computing and content evolved along the years.  The web and the semantic web - expected to support composition of services. The web is dominated by unstructured or semi-structured data, while the semantic web advocates inclusion of sematic content in web pages.  The Grid - initiated in the early 1990s by National Laboratories and Universities; used primarily for applications in the area of science and engineering.  Peer-to-peer systems.  Computer clouds. Cloud Computing: Theory and Practice. Chapter 1 6Dan C. Marinescu
  • 7. Cloud computing  Uses Internet technologies to offer scalable and elastic services. The term “elastic computing” refers to the ability of dynamically acquiring computing resources and supporting a variable workload.  The resources used for these services can be metered and the users can be charged only for the resources they used.  The maintenance and security are ensured by service providers.  The service providers can operate more efficiently due to specialization and centralization. 7 Cloud Computing: Theory and Practice. Chapter 1Dan C. Marinescu
  • 8. Cloud computing (cont’d)  Lower costs for the cloud service provider are past to the cloud users.  Data is stored:  closer to the site where it is used.  in a device and in a location-independent manner.  The data storage strategy can increase reliability, as well as security, and can lower communication costs. Cloud Computing: Theory and Practice. Chapter 1 8Dan C. Marinescu
  • 9. Types of clouds  Public Cloud - the infrastructure is made available to the general public or a large industry group and is owned by the organization selling cloud services.  Private Cloud – the infrastructure is operated solely for an organization.  Community Cloud - the infrastructure is shared by several organizations and supports a community that has shared concerns.  Hybrid Cloud - composition of two or more clouds (public, private, or community) as unique entities but bound by standardized technology that enables data and application portability. Cloud Computing: Theory and Practice. Chapter 1 9Dan C. Marinescu
  • 10. The “good” about cloud computing  Resources, such as CPU cycles, storage, network bandwidth, are shared.  When multiple applications share a system, their peak demands for resources are not synchronized thus, multiplexing leads to a higher resource utilization.  Resources can be aggregated to support data-intensive applications.  Data sharing facilitates collaborative activities. Many applications require multiple types of analysis of shared data sets and multiple decisions carried out by groups scattered around the globe. 10 Cloud Computing: Theory and Practice. Chapter 1Dan C. Marinescu
  • 11. More “good” about cloud computing  Eliminates the initial investment costs for a private computing infrastructure and the maintenance and operation costs.  Cost reduction: concentration of resources creates the opportunity to pay as you go for computing.  Elasticity: the ability to accommodate workloads with very large peak-to-average ratios.  User convenience: virtualization allows users to operate in familiar environments rather than in idiosyncratic ones. Cloud Computing: Theory and Practice. Chapter 1 11Dan C. Marinescu
  • 12. Why cloud computing could be successful when other paradigms have failed?  It is in a better position to exploit recent advances in software, networking, storage, and processor technologies promoted by the same companies who provide cloud services.  It is focused on enterprise computing; its adoption by industrial organizations, financial institutions, government, and so on could have a huge impact on the economy.  A cloud consists of a homogeneous set of hardware and software resources.  The resources are in a single administrative domain (AD). Security, resource management, fault-tolerance, and quality of service are less challenging than in a heterogeneous environment with resources in multiple ADs. 12 Cloud Computing: Theory and Practice. Chapter 1Dan C. Marinescu
  • 13. Challenges for cloud computing  Availability of service; what happens when the service provider cannot deliver?  Diversity of services, data organization, user interfaces available at different service providers limit user mobility; once a customer is hooked to one provider it is hard to move to another. Standardization efforts at NIST!  Data confidentiality and auditability, a serious problem.  Data transfer bottleneck; many applications are data-intensive. 13 Cloud Computing: Theory and Practice. Chapter 1Dan C. Marinescu
  • 14. More challenges  Performance unpredictability, one of the consequences of resource sharing.  How to use resource virtualization and performance isolation for QoS guarantees?  How to support elasticity, the ability to scale up and down quickly?  Resource management; are self-organization and self-management the solution?  Security and confidentiality; major concern.  Addressing these challenges provides good research opportunities!! Cloud Computing: Theory and Practice. Chapter 1 14Dan C. Marinescu
  • 15. Cloud Computing: Theory and Practice. Chapter 1 15Dan C. Marinescu Delivery models Infrastructure as a Service (IaaS) Software as a Service (SaaS) Platform as a Service (PaaS) Deployment models Private cloud Hybrid cloud Public cloud Community cloud Defining attributes Massive infrastructure Accessible via the Internet Utility computing. Pay-per-usage Elasticity Cloud computing Resources Networks Compute & storage servers Services Applications Infrastructure Distributed infrastructure Resource virtualization Autonomous systems
  • 16. Cloud delivery models  Software as a Service (SaaS)  Platform as a Service (PaaS)  Infrastructure as a Service (IaaS) Cloud Computing: Theory and Practice. Chapter 1 16Dan C. Marinescu
  • 17. Software-as-a-Service (SaaS)  Applications are supplied by the service provider.  The user does not manage or control the underlying cloud infrastructure or individual application capabilities.  Services offered include:  Enterprise services such as: workflow management, group-ware and collaborative, supply chain, communications, digital signature, customer relationship management (CRM), desktop software, financial management, geo-spatial, and search.  Web 2.0 applications such as: metadata management, social networking, blogs, wiki services, and portal services.  Not suitable for real-time applications or for those where data is not allowed to be hosted externally.  Examples: Gmail, Google search engine. Cloud Computing: Theory and Practice. Chapter 1 17Dan C. Marinescu
  • 18. Platform-as-a-Service (PaaS)  Allows a cloud user to deploy consumer-created or acquired applications using programming languages and tools supported by the service provider.  The user:  Has control over the deployed applications and, possibly, application hosting environment configurations.  Does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage.  Not particularly useful when:  The application must be portable.  Proprietary programming languages are used.  The hardware and software must be customized to improve the performance of the application. Cloud Computing: Theory and Practice. Chapter 1 18Dan C. Marinescu
  • 19. Infrastructure-as-a-Service (IaaS)  The user is able to deploy and run arbitrary software, which can include operating systems and applications.  The user does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of some networking components, e.g., host firewalls.  Services offered by this delivery model include: server hosting, Web servers, storage, computing hardware, operating systems, virtual instances, load balancing, Internet access, and bandwidth provisioning. Cloud Computing: Theory and Practice. Chapter 1 19Dan C. Marinescu
  • 20. Cloud Computing: Theory and Practice. Chapter 1 20Dan C. Marinescu Facilities Hardware Core connectivity Abstraction API Software as a Service Facilities Hardware Core connectivity Abstraction API Integration and middleware Data Metadata Applications API Presentation Infrastructure as a Service Facilities Hardware Core connectivity Abstraction API Integration and middleware Platform as a Service
  • 21. Cloud activities  Service management and provisioning including:  Virtualization.  Service provisioning.  Call center.  Operations management.  Systems management.  QoS management.  Billing and accounting, asset management.  SLA management.  Technical support and backups. Cloud Computing: Theory and Practice. Chapter 1 21Dan C. Marinescu
  • 22. Cloud activities (cont’d)  Security management including:  ID and authentication.  Certification and accreditation.  Intrusion prevention.  Intrusion detection.  Virus protection.  Cryptography.  Physical security, incident response.  Access control, audit and trails, and firewalls. Cloud Computing: Theory and Practice. Chapter 1 22Dan C. Marinescu
  • 23. Cloud activities (cont’d)  Customer services such as:  Customer assistance and on-line help.  Subscriptions.  Business intelligence.  Reporting.  Customer preferences.  Personalization.  Integration services including:  Data management.  Development. Cloud Computing: Theory and Practice. Chapter 1 23Dan C. Marinescu
  • 24. NIST cloud reference model Cloud Computing: Theory and Practice. Chapter 1 24Dan C. Marinescu Carrier S e c u r i t y P r i v a c y Service Consumer BrokerService Provider Auditor Security audit Privacy impact audit Performance audit Service Management Business support Provisioning Portability/ Interoperability IAAS IaaS SaaS Service Layer PaaS Carrier Hardware Facility Physical resource layer Resource abstraction and control layer Intermediation Aggregation Arbitrage
  • 25. Ethical issues  Paradigm shift with implications on computing ethics:  The control is relinquished to third party services.  The data is stored on multiple sites administered by several organizations.  Multiple services interoperate across the network.  Implications  Unauthorized access.  Data corruption.  Infrastructure failure, and service unavailability. Cloud Computing: Theory and Practice. Chapter 1 25Dan C. Marinescu
  • 26. De-perimeterisation  Systems can span the boundaries of multiple organizations and cross the security borders.  The complex structure of cloud services can make it difficult to determine who is responsible in case something undesirable happens.  Identity fraud and theft are made possible by the unauthorized access to personal data in circulation and by new forms of dissemination through social networks and they could also pose a danger to cloud computing. Cloud Computing: Theory and Practice. Chapter 1 26Dan C. Marinescu
  • 27. Privacy issues  Cloud service providers have already collected petabytes of sensitive personal information stored in data centers around the world. The acceptance of cloud computing therefore will be determined by privacy issues addressed by these companies and the countries where the data centers are located.  Privacy is affected by cultural differences; some cultures favor privacy, others emphasize community. This leads to an ambivalent attitude towards privacy in the Internet which is a global system. Cloud Computing: Theory and Practice. Chapter 1 27Dan C. Marinescu
  • 28. Cloud vulnerabilities  Clouds are affected by malicious attacks and failures of the infrastructure, e.g., power failures.  Such events can affect the Internet domain name servers and prevent access to a cloud or can directly affect the clouds:  in 2004 an attack at Akamai caused a domain name outage and a major blackout that affected Google, Yahoo, and other sites.  in 2009, Google was the target of a denial of service attack which took down Google News and Gmail for several days;  in 2012 lightning caused a prolonged down time at Amazon. Cloud Computing: Theory and Practice. Chapter 1 28Dan C. Marinescu