This chapter introduces cloud computing and discusses its key concepts. It describes cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. It discusses the delivery models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). The chapter also outlines some of the benefits of cloud computing as well as challenges and ethical issues that need to be addressed for its successful adoption.
Cluster computing is a type of computing where a group of several computers are linked together, allowing the entire group of computers to behave as if it were a single entity. There are a wide variety of different reasons why people might use cluster computing for various computer tasks. It s also used to make sure that a computing system will always be available. It is unknown when this cluster computing concept was first developed, and several different organizations have claimed to have invented it.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Those who out-compute can many times out-compete. The cloud gives you access to a massive amount of compute power when you need it. This talk will present an introduction to HPC in the cloud, including, the benefits of HPC in the cloud, how to get started, some tools to use, and how you can manage data. We will showcase several examples of HPC in the cloud by a number of public sector and commercial customers.
Created by: Dr. Jeff Layton, Principal, Solutions Architect
Evolution of Distributed computing: Scalable computing over the Internet – Technologies for network based systems – clusters of cooperative computers - Grid computing Infrastructures – cloud computing - service oriented architecture – Introduction to Grid Architecture and standards – Elements of Grid – Overview of Grid Architecture.
Cluster computing is a type of computing where a group of several computers are linked together, allowing the entire group of computers to behave as if it were a single entity. There are a wide variety of different reasons why people might use cluster computing for various computer tasks. It s also used to make sure that a computing system will always be available. It is unknown when this cluster computing concept was first developed, and several different organizations have claimed to have invented it.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Those who out-compute can many times out-compete. The cloud gives you access to a massive amount of compute power when you need it. This talk will present an introduction to HPC in the cloud, including, the benefits of HPC in the cloud, how to get started, some tools to use, and how you can manage data. We will showcase several examples of HPC in the cloud by a number of public sector and commercial customers.
Created by: Dr. Jeff Layton, Principal, Solutions Architect
Evolution of Distributed computing: Scalable computing over the Internet – Technologies for network based systems – clusters of cooperative computers - Grid computing Infrastructures – cloud computing - service oriented architecture – Introduction to Grid Architecture and standards – Elements of Grid – Overview of Grid Architecture.
Cloud computing is using the internet to access someone else's software running on someone else's hardware in someone else's data center.
OUTLINE-
Definitions of Cloud computing
Architecture of Cloud computing
Benefits of Cloud computing
Opportunities of Cloud Computing
Cloud computing – Google Apps
Grid computing vs Cloud computing
Service level agreement in cloud computing an overviewDr Neelesh Jain
In the presentation overview of Service Level Agreement in Cloud Computing is discussed. Also introduction to Cloud Computing, and its benefits are too discussed.
In computing, It is the description about Grid Computing.
It gives deep idea about grid, what is grid computing? , why we need it? , why it is so ? etc. History and Architecture of grid computing is also there. Advantages , disadvantages and conclusion is also included.
Cloud computing system models for distributed and cloud computinghrmalik20
System Models for Distributed and Cloud
Computing,Peer-to-peer (P2P) Networks,Computational and Data Grids,Clouds,Advantage of Clouds over Traditional
Distributed Systems,Performance Metrics and Scalability Analysis,System Efficiency,Performance Challenges in Cloud Computing,WHY CLOUD COMPUTING,What is cloud computing and why is it distinctive,CLOUD SERVICE DELIVERY MODELS AND THEIR
PERFORMANCE CHALLENGES,Cloud computing security,What does Cloud Computing Security mean,Cloud Security Landscape,Energy Efficiency of Cloud Computing,How energy-efficient is cloud computing?
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
In a fast growing storage space management world, it is now an important task to think about options that can safely store our data and at a cheaper cost. Small scale businesses, that cant afford their own storage spaces, can easily take the advantage of such services.
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
Cloud computing is using the internet to access someone else's software running on someone else's hardware in someone else's data center.
OUTLINE-
Definitions of Cloud computing
Architecture of Cloud computing
Benefits of Cloud computing
Opportunities of Cloud Computing
Cloud computing – Google Apps
Grid computing vs Cloud computing
Service level agreement in cloud computing an overviewDr Neelesh Jain
In the presentation overview of Service Level Agreement in Cloud Computing is discussed. Also introduction to Cloud Computing, and its benefits are too discussed.
In computing, It is the description about Grid Computing.
It gives deep idea about grid, what is grid computing? , why we need it? , why it is so ? etc. History and Architecture of grid computing is also there. Advantages , disadvantages and conclusion is also included.
Cloud computing system models for distributed and cloud computinghrmalik20
System Models for Distributed and Cloud
Computing,Peer-to-peer (P2P) Networks,Computational and Data Grids,Clouds,Advantage of Clouds over Traditional
Distributed Systems,Performance Metrics and Scalability Analysis,System Efficiency,Performance Challenges in Cloud Computing,WHY CLOUD COMPUTING,What is cloud computing and why is it distinctive,CLOUD SERVICE DELIVERY MODELS AND THEIR
PERFORMANCE CHALLENGES,Cloud computing security,What does Cloud Computing Security mean,Cloud Security Landscape,Energy Efficiency of Cloud Computing,How energy-efficient is cloud computing?
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
In a fast growing storage space management world, it is now an important task to think about options that can safely store our data and at a cheaper cost. Small scale businesses, that cant afford their own storage spaces, can easily take the advantage of such services.
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. This paper describes methods for enhancing security and reliability in decentralized cloud-based solutions, as well as suggests a few security solution methods of implementation.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
6th International Conference on Machine Learning & Applications (CMLA 2024)
Chapter1
1. Chapter 1 – Introduction
1
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
2. Contents
Network-centric computing and network-centric content.
Cloud computing.
Delivery models and services.
Ethical issues in cloud computing.
Cloud vulnerabilities.
Cloud Computing: Theory and Practice.
Chapter 1 2Dan C. Marinescu
3. Network-centric computing
Information processing can be done more efficiently on large farms of
computing and storage systems accessible via the Internet.
Grid computing – initiated by the National Labs in the early 1990s; targeted
primarily at scientific computing.
Utility computing – initiated in 2005-2006 by IT companies and targeted at
enterprise computing.
The focus of utility computing is on the business model for providing
computing services; it often requires a cloud-like infrastructure.
Cloud computing is a path to utility computing embraced by major IT
companies including: Amazon, HP, IBM, Microsoft, Oracle, and others.
3
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
4. Network-centric content
Content: any type or volume of media, be it static or dynamic,
monolithic or modular, live or stored, produced by aggregation, or
mixed.
The “Future Internet” will be content-centric.
The creation and consumption of audio and visual content is likely to
transform the Internet to support increased quality in terms of
resolution, frame rate, color depth, stereoscopic information.
4
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
5. Network-centric computing and content
Data-intensive: large scale simulations in science and engineering
require large volumes of data. Multimedia streaming transfers large
volume of data.
Network-intensive: transferring large volumes of data requires high
bandwidth networks.
Low-latency networks for data streaming, parallel computing,
computation steering.
The systems are accessed using thin clients running on systems
with limited resources, e.g., wireless devices such as smart phones
and tablets.
The infrastructure should support some form of workflow
management.
Cloud Computing: Theory and Practice.
Chapter 1 5Dan C. Marinescu
6. Evolution of concepts and technologies
The concepts and technologies for network-centric computing and
content evolved along the years.
The web and the semantic web - expected to support composition of
services. The web is dominated by unstructured or semi-structured
data, while the semantic web advocates inclusion of sematic content in
web pages.
The Grid - initiated in the early 1990s by National Laboratories and
Universities; used primarily for applications in the area of science and
engineering.
Peer-to-peer systems.
Computer clouds.
Cloud Computing: Theory and Practice.
Chapter 1 6Dan C. Marinescu
7. Cloud computing
Uses Internet technologies to offer scalable and elastic services.
The term “elastic computing” refers to the ability of dynamically
acquiring computing resources and supporting a variable workload.
The resources used for these services can be metered and
the users can be charged only for the resources they used.
The maintenance and security are ensured by service providers.
The service providers can operate more efficiently due to
specialization and centralization.
7
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
8. Cloud computing (cont’d)
Lower costs for the cloud service provider are past to the cloud users.
Data is stored:
closer to the site where it is used.
in a device and in a location-independent manner.
The data storage strategy can increase reliability, as well as security,
and can lower communication costs.
Cloud Computing: Theory and Practice.
Chapter 1 8Dan C. Marinescu
9. Types of clouds
Public Cloud - the infrastructure is made available to the general
public or a large industry group and is owned by the organization
selling cloud services.
Private Cloud – the infrastructure is operated solely for an
organization.
Community Cloud - the infrastructure is shared by several
organizations and supports a community that has shared
concerns.
Hybrid Cloud - composition of two or more clouds (public, private,
or community) as unique entities but bound by standardized
technology that enables data and application portability.
Cloud Computing: Theory and Practice.
Chapter 1 9Dan C. Marinescu
10. The “good” about cloud computing
Resources, such as CPU cycles, storage, network bandwidth, are
shared.
When multiple applications share a system, their peak demands for
resources are not synchronized thus, multiplexing leads to a higher
resource utilization.
Resources can be aggregated to support data-intensive
applications.
Data sharing facilitates collaborative activities. Many applications
require multiple types of analysis of shared data sets and multiple
decisions carried out by groups scattered around the globe.
10
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
11. More “good” about cloud computing
Eliminates the initial investment costs for a private computing
infrastructure and the maintenance and operation costs.
Cost reduction: concentration of resources creates the opportunity
to pay as you go for computing.
Elasticity: the ability to accommodate workloads with very large
peak-to-average ratios.
User convenience: virtualization allows users to operate in familiar
environments rather than in idiosyncratic ones.
Cloud Computing: Theory and Practice.
Chapter 1 11Dan C. Marinescu
12. Why cloud computing could be successful
when other paradigms have failed?
It is in a better position to exploit recent advances in software, networking,
storage, and processor technologies promoted by the same companies
who provide cloud services.
It is focused on enterprise computing; its adoption by industrial
organizations, financial institutions, government, and so on could have a
huge impact on the economy.
A cloud consists of a homogeneous set of hardware and software
resources.
The resources are in a single administrative domain (AD). Security,
resource management, fault-tolerance, and quality of service are less
challenging than in a heterogeneous environment with resources in
multiple ADs.
12
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
13. Challenges for cloud computing
Availability of service; what happens when the service provider
cannot deliver?
Diversity of services, data organization, user interfaces available
at different service providers limit user mobility; once a customer is
hooked to one provider it is hard to move to another.
Standardization efforts at NIST!
Data confidentiality and auditability, a serious problem.
Data transfer bottleneck; many applications are data-intensive.
13
Cloud Computing: Theory and Practice.
Chapter 1Dan C. Marinescu
14. More challenges
Performance unpredictability, one of the consequences of resource
sharing.
How to use resource virtualization and performance isolation for QoS
guarantees?
How to support elasticity, the ability to scale up and down quickly?
Resource management; are self-organization and self-management
the solution?
Security and confidentiality; major concern.
Addressing these challenges provides good research
opportunities!!
Cloud Computing: Theory and Practice.
Chapter 1 14Dan C. Marinescu
15. Cloud Computing: Theory and Practice.
Chapter 1 15Dan C. Marinescu
Delivery models
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Deployment models
Private cloud
Hybrid cloud
Public cloud
Community cloud
Defining attributes
Massive infrastructure
Accessible via the Internet
Utility computing. Pay-per-usage
Elasticity
Cloud computing
Resources
Networks
Compute & storage servers
Services
Applications
Infrastructure
Distributed infrastructure
Resource virtualization
Autonomous systems
16. Cloud delivery models
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Cloud Computing: Theory and Practice.
Chapter 1 16Dan C. Marinescu
17. Software-as-a-Service (SaaS)
Applications are supplied by the service provider.
The user does not manage or control the underlying cloud
infrastructure or individual application capabilities.
Services offered include:
Enterprise services such as: workflow management, group-ware and
collaborative, supply chain, communications, digital signature, customer
relationship management (CRM), desktop software, financial
management, geo-spatial, and search.
Web 2.0 applications such as: metadata management, social
networking, blogs, wiki services, and portal services.
Not suitable for real-time applications or for those where data is not
allowed to be hosted externally.
Examples: Gmail, Google search engine.
Cloud Computing: Theory and Practice.
Chapter 1 17Dan C. Marinescu
18. Platform-as-a-Service (PaaS)
Allows a cloud user to deploy consumer-created or acquired
applications using programming languages and tools supported by
the service provider.
The user:
Has control over the deployed applications and, possibly, application
hosting environment configurations.
Does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage.
Not particularly useful when:
The application must be portable.
Proprietary programming languages are used.
The hardware and software must be customized to improve the
performance of the application.
Cloud Computing: Theory and Practice.
Chapter 1 18Dan C. Marinescu
19. Infrastructure-as-a-Service (IaaS)
The user is able to deploy and run arbitrary software, which can
include operating systems and applications.
The user does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage,
deployed applications, and possibly limited control of some
networking components, e.g., host firewalls.
Services offered by this delivery model include: server hosting, Web
servers, storage, computing hardware, operating systems, virtual
instances, load balancing, Internet access, and bandwidth
provisioning.
Cloud Computing: Theory and Practice.
Chapter 1 19Dan C. Marinescu
20. Cloud Computing: Theory and Practice.
Chapter 1 20Dan C. Marinescu
Facilities
Hardware
Core
connectivity
Abstraction
API
Software as a Service
Facilities
Hardware
Core
connectivity
Abstraction
API
Integration and
middleware
Data Metadata
Applications
API
Presentation
Infrastructure as a Service
Facilities
Hardware
Core
connectivity
Abstraction
API
Integration and
middleware
Platform as a Service
21. Cloud activities
Service management and provisioning including:
Virtualization.
Service provisioning.
Call center.
Operations management.
Systems management.
QoS management.
Billing and accounting, asset management.
SLA management.
Technical support and backups.
Cloud Computing: Theory and Practice.
Chapter 1 21Dan C. Marinescu
22. Cloud activities (cont’d)
Security management including:
ID and authentication.
Certification and accreditation.
Intrusion prevention.
Intrusion detection.
Virus protection.
Cryptography.
Physical security, incident response.
Access control, audit and trails, and firewalls.
Cloud Computing: Theory and Practice.
Chapter 1 22Dan C. Marinescu
23. Cloud activities (cont’d)
Customer services such as:
Customer assistance and on-line help.
Subscriptions.
Business intelligence.
Reporting.
Customer preferences.
Personalization.
Integration services including:
Data management.
Development.
Cloud Computing: Theory and Practice.
Chapter 1 23Dan C. Marinescu
24. NIST cloud reference model
Cloud Computing: Theory and Practice.
Chapter 1 24Dan C. Marinescu
Carrier
S
e
c
u
r
i
t
y
P
r
i
v
a
c
y
Service
Consumer BrokerService Provider
Auditor
Security
audit
Privacy
impact audit
Performance
audit
Service
Management
Business
support
Provisioning
Portability/
Interoperability
IAAS
IaaS
SaaS
Service Layer
PaaS
Carrier
Hardware
Facility
Physical resource
layer
Resource
abstraction and
control layer
Intermediation
Aggregation
Arbitrage
25. Ethical issues
Paradigm shift with implications on computing ethics:
The control is relinquished to third party services.
The data is stored on multiple sites administered by several
organizations.
Multiple services interoperate across the network.
Implications
Unauthorized access.
Data corruption.
Infrastructure failure, and service unavailability.
Cloud Computing: Theory and Practice.
Chapter 1 25Dan C. Marinescu
26. De-perimeterisation
Systems can span the boundaries of multiple organizations and cross
the security borders.
The complex structure of cloud services can make it difficult to
determine who is responsible in case something undesirable happens.
Identity fraud and theft are made possible by the unauthorized access
to personal data in circulation and by new forms of dissemination
through social networks and they could also pose a danger to cloud
computing.
Cloud Computing: Theory and Practice.
Chapter 1 26Dan C. Marinescu
27. Privacy issues
Cloud service providers have already collected petabytes of
sensitive personal information stored in data centers around the
world. The acceptance of cloud computing therefore will be
determined by privacy issues addressed by these companies and
the countries where the data centers are located.
Privacy is affected by cultural differences; some cultures favor
privacy, others emphasize community. This leads to an ambivalent
attitude towards privacy in the Internet which is a global system.
Cloud Computing: Theory and Practice.
Chapter 1 27Dan C. Marinescu
28. Cloud vulnerabilities
Clouds are affected by malicious attacks and failures of the
infrastructure, e.g., power failures.
Such events can affect the Internet domain name servers and
prevent access to a cloud or can directly affect the clouds:
in 2004 an attack at Akamai caused a domain name outage and a
major blackout that affected Google, Yahoo, and other sites.
in 2009, Google was the target of a denial of service attack which
took down Google News and Gmail for several days;
in 2012 lightning caused a prolonged down time at Amazon.
Cloud Computing: Theory and Practice.
Chapter 1 28Dan C. Marinescu