SlideShare a Scribd company logo
Cloud Computing and
Service model, Is their any
relationship?
Ahmad Karawash
1
The web computing technology started by Monolithic computing, in
which a single-processor system is used and the data processing is
totally centralized, followed by:
 Procedure computing,
 Client-server computing,
 Object oriented computing,
 Service oriented computing,
 Resource oriented computing,
Today, the web has reached the cloud computing that provides almost
infinitely flexible and scalable external computing and processing
services.
2
 Cloud Computing is the result of evolution and adoption of existing
technologies and paradigms.
 Cloud computing delivers remote services with a user's data,
software and computation.
It is deployed as:
 Private
 Public
 Hybrid
It is characterized by:
 Scalability,
 Elasticity,
 Reliability
 Availability
 Virtualization.
3
Cloud Computing Components
SOFTWARE AS A SERVICE
Single application, multi-tenancy, network-based, one-to-many
delivery of applications, all users have same access to features.
Examples: (word, PowerPoint)
Salesforce.com, Google Docs, Red Hat Network/RHEL
4
SaaS
PaaS
IaaS
PLATFORM-AS-A-SERVICE
Application developer model, Application deployed to an elastic
service that auto scales, low administrative overhead. No concept of
virtual machines or operating system. Code it and deploy it.
Examples: (Eclipse, visual studio)
VMware CloudFoundry, Google AppEngine, Windows Azure, Rackspace
Sites, Red Hat OpenShift, Active State Stackato, Appfog
INFRASTRUCTURE-AS-A-SERVICE
Servers and storage are made available in a scalable way over a
network.
Examples: (Memory, CPU)
EC2,Rackspace CloudFiles, OpenStack, CloudStack,
Eucalyptus, OpenNebula
5
What is SOC?
 SOC promises a world of cooperating services loosely connected,
creating dynamic business processes and agile applications that
span organizations and platforms (Georgakopoulos, 2008).
 Without SOC, organizations found it almost impossible to reach the
cloud (Ramana, 2011).
 One of the latest challenges is how to work with SOC in a cloud
computing environment (Wei et al., 2010).
 Service-oriented computing and cloud computing have a reciprocal
relationship - one provides the computing of services, and the other
provides the services of computing (Wei & Blake, 2010).
 Realizing SOC promise requires the design of Service Oriented
Architecture (SOA).
6
 SOA is an architectural style which utilizes technologies that
provides a dynamically connect and communicate software
applications between different business partners (Guner, 2005)
– Components
• Service Providers
• Service Registry
• Service Requestors
– Operations
• Publish
• Find
• Bind
7
Michael P. Papazoglou, Web Services, 1st Edition, © Pearson Education
Limited 2008
– A Marriage is Made in IT heaven: Cloud and SOA
(Medrano, 2012)
◦ Example: “Boeing is using service-oriented architecture (SOA)
principles behind a new PaaS platform, Called The Boeing
Edge. The system promises to reshape the way Boeing
connects with its customers in the airline business”, said Jim
Crabbe, senior product manager at Boeing.
8
According to Capgemini /HP common report (Mulholland et al., 2008)
there are five reasons to utilize SOA on the way to the cloud such as:
1. Accessibility: The cloud is accessible through a service interface,
2. Visibility: SOA tools and techniques can help an organization find
services that meet its needs,
3. Extensibility: Cloud services can be modified and customized using
SOA techniques,
4. Matching Expectations: Cloud services require clear matching
techniques in which SOA contract-management techniques are
useful,
5. Adherence to Standards: SOA policy management techniques
validate that an organization follows appropriate cloud standards.
9
 Services still have some limitations regarding security, composition,
selection & discovery.
 Web service composition is one of the most challenging problems of
recent years (Pejman, 2012).
 Many researchers have proposed various techniques and employed it
for web service selection problem (Krithiga, 2012)
 The security issues of Web Services in a distributed environment are
a major concern of web research (Sinha, 2010).
10
 Cloud computing used SOA as an efficient architecture to be spread
all over the Web.
 Limitations of service model are transferred to the cloud.
 Weakness points in cloud computing are inherited from the adoption
of service model.
11
 (Wei & Blake, 2010): Yi Wei and M. Brian Blake, Service-Oriented Computing and Cloud Computing: Challenges
and Opportunities, Published by the IEEE Computer Society, 2010, 1089-7801/10/.
 (Hauck et al., 2010): Michael Hauck, Matthias Huber, Markus Klems, Samuel Kounev, Jorn Muller-Quade,
Alexander Pretschner, Ralf Reussner, Stefan Tai, Challenges and opportunities of Cloud Computing, Karlsruhe
Institute of Technology Technical Report Vol. 2010-19
 (Karray et al., 2013): Karray, A., Teyeb, R., Jemma, M., A Heuristic Approach for Web-service discovery and
selection, International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 2, April 2013,
DOI: 10.5121/ijcsit.2013.5210.
 (Nallur et Bahsoon, 2013): Nallur, V.; and Bahsoon, R.; A Decentralized Self-Adaptation Mechanism for Service-
Based Applications in the Cloud, IEEE Transactions on Software Engineering, Vol. 39, No. 5, pp.591-612, May
2013.
 (Mulholland et al., 2008): Mulholland, A., Daniels, R., Hall, T. (2008), Capgemini and HP, The Cloud and SOA:
Creating an Architecture for Today and for the Future.
 (Bose, Component Based Development): DEBAYAN BOSE, COMPONENT BASED DEVELOPMENT, APPLICATION IN
SOFTWARE ENGINEERING, INDIAN STATISTICAL INSTITUTE.
 (Coulouris et al., 2011): Coulouris, George; Jean Dollimore, Tim Kindberg, Gordon Blair (2011). Distributed
Systems: Concepts and Design (5th Edition). Boston: Addison-Wesley.ISBN 0-132-14301-1.
 (CISCO, 2010): Cisco UCS B440 M1 High-Performance Blade Server: World-Record Virtualization Performance,
http://www.cisco.com/en/US/prod/collateral/ps10265/ps10280/LE_671311_PB_VMmark_B440.pdf
 (Selda Guner, 2005): Selda Guner, Architectural Approaches, Concepts and Methodologies of Service Oriented
Architecture, Thesis, Technical University Hamburg, Germany (2005)
 (Yeluri, 2013): Raghu Yeluri , 2013. Service Security and Compliance in the Cloud, Service Technology Magazine.
 (Wei et al., 2010): Yi Wei, M. Brian Blake, "Service-Oriented Computing and Cloud Computing: Challenges and
Opportunities," IEEE Internet Computing, vol. 14, no. 6, pp. 72-75, Nov.-Dec. 2010, doi:10.1109/MIC.2010.147
 ……..
12
 Ahmad Karawash
 PhD Researcher
 Email: ahmad_karawash@hotmail.com
 http://www.linkedin.com/pub/dir/Ahmad/Karawash
 https://www.researchgate.net/profile/Ahmad_Karawash
13

More Related Content

Similar to Cloud computing and Service model

Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
michael591
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
Paper Writing Services Reviews
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
ijccsa
 
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
IJCSES Journal
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
Mandar Pathrikar
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
iosrjce
 
B017660813
B017660813B017660813
B017660813
IOSR Journals
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ijccsa
 
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECCAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
TawnaDelatorrejs
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
Running head CLOUD COMPUTING SECURITY .docx
Running head CLOUD COMPUTING SECURITY                            .docxRunning head CLOUD COMPUTING SECURITY                            .docx
Running head CLOUD COMPUTING SECURITY .docx
joellemurphey
 
Agent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research AgendaAgent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research Agenda
idescitation
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
 
Web Services Based Information Retrieval Agent System for Cloud Computing
Web Services Based Information Retrieval Agent System for Cloud ComputingWeb Services Based Information Retrieval Agent System for Cloud Computing
Web Services Based Information Retrieval Agent System for Cloud Computing
Editor IJCATR
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
IJEACS
 
Review and Classification of Cloud Computing Research
Review and Classification of Cloud Computing ResearchReview and Classification of Cloud Computing Research
Review and Classification of Cloud Computing Research
iosrjce
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
 

Similar to Cloud computing and Service model (20)

Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
 
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
B017660813
B017660813B017660813
B017660813
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
 
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECCAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Running head CLOUD COMPUTING SECURITY .docx
Running head CLOUD COMPUTING SECURITY                            .docxRunning head CLOUD COMPUTING SECURITY                            .docx
Running head CLOUD COMPUTING SECURITY .docx
 
cloud
cloudcloud
cloud
 
Agent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research AgendaAgent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research Agenda
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Web Services Based Information Retrieval Agent System for Cloud Computing
Web Services Based Information Retrieval Agent System for Cloud ComputingWeb Services Based Information Retrieval Agent System for Cloud Computing
Web Services Based Information Retrieval Agent System for Cloud Computing
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
Review and Classification of Cloud Computing Research
Review and Classification of Cloud Computing ResearchReview and Classification of Cloud Computing Research
Review and Classification of Cloud Computing Research
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 

More from Ahmad karawash

Object-Oriented Programming (OOP)
Object-Oriented Programming (OOP)Object-Oriented Programming (OOP)
Object-Oriented Programming (OOP)
Ahmad karawash
 
Introduction to-data-science
Introduction to-data-scienceIntroduction to-data-science
Introduction to-data-science
Ahmad karawash
 
How to understand your data
How to understand your dataHow to understand your data
How to understand your data
Ahmad karawash
 
Cloud storage with AWS
Cloud storage with AWSCloud storage with AWS
Cloud storage with AWS
Ahmad karawash
 
Message queues
Message queuesMessage queues
Message queues
Ahmad karawash
 
Build a custom metrics on aws cloud
Build a custom metrics on aws cloudBuild a custom metrics on aws cloud
Build a custom metrics on aws cloud
Ahmad karawash
 
Password hashing, salting, bycrpt
Password hashing, salting, bycrptPassword hashing, salting, bycrpt
Password hashing, salting, bycrpt
Ahmad karawash
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
Ahmad karawash
 
Reasoning of database consistency through description logics
Reasoning of database consistency through description logicsReasoning of database consistency through description logics
Reasoning of database consistency through description logicsAhmad karawash
 
From use case to software architecture
From use case to software architectureFrom use case to software architecture
From use case to software architecture
Ahmad karawash
 

More from Ahmad karawash (10)

Object-Oriented Programming (OOP)
Object-Oriented Programming (OOP)Object-Oriented Programming (OOP)
Object-Oriented Programming (OOP)
 
Introduction to-data-science
Introduction to-data-scienceIntroduction to-data-science
Introduction to-data-science
 
How to understand your data
How to understand your dataHow to understand your data
How to understand your data
 
Cloud storage with AWS
Cloud storage with AWSCloud storage with AWS
Cloud storage with AWS
 
Message queues
Message queuesMessage queues
Message queues
 
Build a custom metrics on aws cloud
Build a custom metrics on aws cloudBuild a custom metrics on aws cloud
Build a custom metrics on aws cloud
 
Password hashing, salting, bycrpt
Password hashing, salting, bycrptPassword hashing, salting, bycrpt
Password hashing, salting, bycrpt
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
Reasoning of database consistency through description logics
Reasoning of database consistency through description logicsReasoning of database consistency through description logics
Reasoning of database consistency through description logics
 
From use case to software architecture
From use case to software architectureFrom use case to software architecture
From use case to software architecture
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Cloud computing and Service model

  • 1. Cloud Computing and Service model, Is their any relationship? Ahmad Karawash 1
  • 2. The web computing technology started by Monolithic computing, in which a single-processor system is used and the data processing is totally centralized, followed by:  Procedure computing,  Client-server computing,  Object oriented computing,  Service oriented computing,  Resource oriented computing, Today, the web has reached the cloud computing that provides almost infinitely flexible and scalable external computing and processing services. 2
  • 3.  Cloud Computing is the result of evolution and adoption of existing technologies and paradigms.  Cloud computing delivers remote services with a user's data, software and computation. It is deployed as:  Private  Public  Hybrid It is characterized by:  Scalability,  Elasticity,  Reliability  Availability  Virtualization. 3 Cloud Computing Components
  • 4. SOFTWARE AS A SERVICE Single application, multi-tenancy, network-based, one-to-many delivery of applications, all users have same access to features. Examples: (word, PowerPoint) Salesforce.com, Google Docs, Red Hat Network/RHEL 4 SaaS PaaS IaaS PLATFORM-AS-A-SERVICE Application developer model, Application deployed to an elastic service that auto scales, low administrative overhead. No concept of virtual machines or operating system. Code it and deploy it. Examples: (Eclipse, visual studio) VMware CloudFoundry, Google AppEngine, Windows Azure, Rackspace Sites, Red Hat OpenShift, Active State Stackato, Appfog INFRASTRUCTURE-AS-A-SERVICE Servers and storage are made available in a scalable way over a network. Examples: (Memory, CPU) EC2,Rackspace CloudFiles, OpenStack, CloudStack, Eucalyptus, OpenNebula
  • 5. 5
  • 6. What is SOC?  SOC promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms (Georgakopoulos, 2008).  Without SOC, organizations found it almost impossible to reach the cloud (Ramana, 2011).  One of the latest challenges is how to work with SOC in a cloud computing environment (Wei et al., 2010).  Service-oriented computing and cloud computing have a reciprocal relationship - one provides the computing of services, and the other provides the services of computing (Wei & Blake, 2010).  Realizing SOC promise requires the design of Service Oriented Architecture (SOA). 6
  • 7.  SOA is an architectural style which utilizes technologies that provides a dynamically connect and communicate software applications between different business partners (Guner, 2005) – Components • Service Providers • Service Registry • Service Requestors – Operations • Publish • Find • Bind 7 Michael P. Papazoglou, Web Services, 1st Edition, © Pearson Education Limited 2008
  • 8. – A Marriage is Made in IT heaven: Cloud and SOA (Medrano, 2012) ◦ Example: “Boeing is using service-oriented architecture (SOA) principles behind a new PaaS platform, Called The Boeing Edge. The system promises to reshape the way Boeing connects with its customers in the airline business”, said Jim Crabbe, senior product manager at Boeing. 8
  • 9. According to Capgemini /HP common report (Mulholland et al., 2008) there are five reasons to utilize SOA on the way to the cloud such as: 1. Accessibility: The cloud is accessible through a service interface, 2. Visibility: SOA tools and techniques can help an organization find services that meet its needs, 3. Extensibility: Cloud services can be modified and customized using SOA techniques, 4. Matching Expectations: Cloud services require clear matching techniques in which SOA contract-management techniques are useful, 5. Adherence to Standards: SOA policy management techniques validate that an organization follows appropriate cloud standards. 9
  • 10.  Services still have some limitations regarding security, composition, selection & discovery.  Web service composition is one of the most challenging problems of recent years (Pejman, 2012).  Many researchers have proposed various techniques and employed it for web service selection problem (Krithiga, 2012)  The security issues of Web Services in a distributed environment are a major concern of web research (Sinha, 2010). 10
  • 11.  Cloud computing used SOA as an efficient architecture to be spread all over the Web.  Limitations of service model are transferred to the cloud.  Weakness points in cloud computing are inherited from the adoption of service model. 11
  • 12.  (Wei & Blake, 2010): Yi Wei and M. Brian Blake, Service-Oriented Computing and Cloud Computing: Challenges and Opportunities, Published by the IEEE Computer Society, 2010, 1089-7801/10/.  (Hauck et al., 2010): Michael Hauck, Matthias Huber, Markus Klems, Samuel Kounev, Jorn Muller-Quade, Alexander Pretschner, Ralf Reussner, Stefan Tai, Challenges and opportunities of Cloud Computing, Karlsruhe Institute of Technology Technical Report Vol. 2010-19  (Karray et al., 2013): Karray, A., Teyeb, R., Jemma, M., A Heuristic Approach for Web-service discovery and selection, International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 2, April 2013, DOI: 10.5121/ijcsit.2013.5210.  (Nallur et Bahsoon, 2013): Nallur, V.; and Bahsoon, R.; A Decentralized Self-Adaptation Mechanism for Service- Based Applications in the Cloud, IEEE Transactions on Software Engineering, Vol. 39, No. 5, pp.591-612, May 2013.  (Mulholland et al., 2008): Mulholland, A., Daniels, R., Hall, T. (2008), Capgemini and HP, The Cloud and SOA: Creating an Architecture for Today and for the Future.  (Bose, Component Based Development): DEBAYAN BOSE, COMPONENT BASED DEVELOPMENT, APPLICATION IN SOFTWARE ENGINEERING, INDIAN STATISTICAL INSTITUTE.  (Coulouris et al., 2011): Coulouris, George; Jean Dollimore, Tim Kindberg, Gordon Blair (2011). Distributed Systems: Concepts and Design (5th Edition). Boston: Addison-Wesley.ISBN 0-132-14301-1.  (CISCO, 2010): Cisco UCS B440 M1 High-Performance Blade Server: World-Record Virtualization Performance, http://www.cisco.com/en/US/prod/collateral/ps10265/ps10280/LE_671311_PB_VMmark_B440.pdf  (Selda Guner, 2005): Selda Guner, Architectural Approaches, Concepts and Methodologies of Service Oriented Architecture, Thesis, Technical University Hamburg, Germany (2005)  (Yeluri, 2013): Raghu Yeluri , 2013. Service Security and Compliance in the Cloud, Service Technology Magazine.  (Wei et al., 2010): Yi Wei, M. Brian Blake, "Service-Oriented Computing and Cloud Computing: Challenges and Opportunities," IEEE Internet Computing, vol. 14, no. 6, pp. 72-75, Nov.-Dec. 2010, doi:10.1109/MIC.2010.147  …….. 12
  • 13.  Ahmad Karawash  PhD Researcher  Email: ahmad_karawash@hotmail.com  http://www.linkedin.com/pub/dir/Ahmad/Karawash  https://www.researchgate.net/profile/Ahmad_Karawash 13

Editor's Notes

  1. Cloud can be modeled as : SaaS, PaaS and IaaS.