SlideShare a Scribd company logo
The Role of a Reference
     Architecture in Cloud Standards

                              Robert Bohn
                   NIST Information Technology Laboratory


                  Cloud Computing in the Federal Government
                             FOSE/CloudCamp
                              Washington, DC
                                July 20, 2011


NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
2


                            Background

   • Technological Maturity
   • Economic
   • Standards Driven
       –   Data Portability
       –   Service Interoperability
       –   Security
       –   Cloud to Cloud interaction
   • USG needs a starting point – A Reference


NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
3


                                           Objective
                       Develop a vendor neutral reference architecture
                     consistent with the NIST Cloud Computing definition

    3 Service Models
    - SaaS, PaaS, IaaS

    4 Deployment models
    - Public, Private, Community, Hybrid

    5 Essential Characteristics
     - On demand self-service
     - Broad network access
     - Resource Pooling
     - Rapid Elasticity
     - Measured Service



                                                                    A Cloud
 Determine the “What” of Cloud Computing, not the “How”

NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
4

      NIST Cloud Computing Reference Architecture
                 Actors and their Roles
    Cloud Consumer                                    Cloud Provider
  Person or organization                                                                                Cloud
     that maintains a          Person, organization or entity responsible for making a service          Broker
   business relationship                       available to Cloud Consumers.                        An entity that
  with, and uses service                                                                          manages the use,
  from Cloud Providers.                                                                           performance and
                                                                                                  delivery of cloud
                                                                                                    services, and
        Cloud Auditor                                                                                 negotiates
  A party that can conduct                                                                           relationships
  independent assessment                                                                           between Cloud
      of cloud services,                                                                            Providers and
     information system                                                                           Cloud Consumers.
  operations, performance
  and security of the cloud
       implementation.


                                                 Cloud Carrier
                    The intermediary that provides connectivity and transport of cloud services
                                    from Cloud Providers to Cloud Consumers.


NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
5

                   The NIST Cloud Computing
                     Reference Architecture
                                          Cloud Provider
                                                                                               Cloud
     Cloud                                                                                     Broker
    Consumer       Service Layer
                               SaaS                 Cloud Service
                                                    Management                                   Service
                          PaaS                                                               Intermediation
      Cloud                                               Business
     Auditor            IaaS                              Support




                                                                        Security

                                                                                   Privacy
                                                                                                Service
                                                                                              Aggregation
      Security      Resource Abstraction and
       Audit                                         Provisioning/
                         Control Layer               Configuration
                                                                                                Service
      Privacy      Physical Resource Layer                                                     Arbitrage
    Impact Audit                                       Portability/
                           Hardware                  Interoperability
    Performance
                               Facility
       Audit



                                          Cloud Carrier



NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
6


                             Questions?

   NIST Cloud Computing Collaboration Site
   http://collaborate.nist.gov/twiki-cloud-computing/

   NIST Cloud Computing Home Page
   http://www.nist.gov/itl/cloud

   Contact:
   Dawn Leaf   dawn.leaf@nist.gov
   Lee Badger  lee.badger@nist.gov
   Robert Bohn robert.bohn@nist.gov


NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
7


                           Backup Slides

   • Taxonomy
   • Example: Cloud Consumer/Provider Activities
   • Acknowledgements




NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
8


                                Taxonomies

   Taxonomy: The science of categorization, or classification, of
      things based on a predetermined system. (Webopedia)

   Main Attributes:
   • Typically a controlled vocabulary with a hierarchical tree-like structure
   • Terms in a taxonomy have relationships with other terms
   • Usually in the form of a parent (broader) / child (narrower)


   Benefits:
   • Encompasses and labels all significant concepts within a given domain
   • Allows users to understand the context of each label

NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
9


                           RA Taxonomy




NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
10

                    Examples Terms and Definitions
 Level 1:
 •   Cloud Service Provider – Person, organization or higher-level system responsible for making
     a service available to service consumers.

 Level 2:
 •   Cloud Service Management – Cloud Service Management includes all the service-related
     functions that are necessary for the management and operations of those services required
     by or proposed to customers.

 Level 3:
 •   Public Cloud - The cloud infrastructure is made available to the general public or a large
     industry group and is owned by an organization selling cloud services. [NIST Definition of
     Cloud Computing]

 Level 4:
 •   Data Portability – The ability to transfer data from one system to another without being
     required to recreate or reenter data descriptions or to modify significantly the application
     being transported. [Federal Standard 1037C]




NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
11


           Cloud Consumer/Provider Activities
    Service   Consumer Activities                Provider Activities
    Model

    SaaS      Uses application/service for       Installs, manages, maintains and supports
              business process operations        the software application on a cloud
                                                 infrastructure.
    PaaS      Develops, tests, deploys and       Provisions and manages cloud infrastructure
              manages applications hosted in a   and middleware for the platform
              cloud environment                  consumers; provides development,
                                                 deployment and administration tools to
                                                 platform consumers.
    IaaS      Creates/installs, manages and      Provisions and manages the physical
              monitors services for IT           processing, storage, networking and the
              infrastructure operations          hosting environment and cloud
                                                 infrastructure for IaaS consumers.




NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
12


                      Acknowledgements
      Dr. Fang Liu, Jin Tong, Dr. Jian Mao: Knowcean Consulting Inc.
      Dr. Robert Bohn, John Messina: NIST ITL
      Dawn Leaf, NIST Senior Executive for Cloud Computing

  With broad contributions from members of the NIST Reference
    Architecture and Taxonomy Working Group and the Reference
    Architecture Analysis Team:
  Randy Baklini, Gregg Brown, Frederic De Vaulx, Michele Drgon,
    Anne Frantzen, Babak Jahromi, Dean Kemp, Cary Landis,
    Eugene Luster, Bob Marcus, Gary Mazzaferro, Hung Nguyen,
    Marlin Pohlman, Alan Sill, Ken Stavinoha, Pat Stingley, Tom
    Young and Jay Levine

NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM

More Related Content

What's hot

Cloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesCloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabilies
Vinay Dwivedi
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 
Advanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingAdvanced Concepts of Cloud Computing
Advanced Concepts of Cloud Computing
Swwapnil Saali
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
solarisyougood
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Nishtha Gupta
 
Latest Research Topics on Cloud Computing
Latest Research Topics on Cloud ComputingLatest Research Topics on Cloud Computing
Latest Research Topics on Cloud Computing
Thesis Scientist Private Limited
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ashish Mishra
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
gaurav jain
 
Cloud Computing - True Vision Technologies
Cloud Computing  - True Vision TechnologiesCloud Computing  - True Vision Technologies
Cloud Computing - True Vision Technologies
Scottperrone
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
Mohammed Sajjad Ali
 
Fundamental Cloud Architectures
Fundamental Cloud ArchitecturesFundamental Cloud Architectures
Fundamental Cloud Architectures
Mohammed Sajjad Ali
 
Cloud Computing- Sreehari S
Cloud Computing- Sreehari SCloud Computing- Sreehari S
Cloud Computing- Sreehari S
Dipayan Sarkar
 
Kussu.ppt
Kussu.pptKussu.ppt
Kussu.ppt
kusumjawla
 
Cloud computing
Cloud computingCloud computing
Cloud computingdomsr
 
Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedMd. Hasibur Rashid
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
Sai P Mishra
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introductionguest90f660
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
amutharajan10
 

What's hot (20)

Cloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesCloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabilies
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Advanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingAdvanced Concepts of Cloud Computing
Advanced Concepts of Cloud Computing
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Latest Research Topics on Cloud Computing
Latest Research Topics on Cloud ComputingLatest Research Topics on Cloud Computing
Latest Research Topics on Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
 
Cloud Computing - True Vision Technologies
Cloud Computing  - True Vision TechnologiesCloud Computing  - True Vision Technologies
Cloud Computing - True Vision Technologies
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
 
Fundamental Cloud Architectures
Fundamental Cloud ArchitecturesFundamental Cloud Architectures
Fundamental Cloud Architectures
 
Cloud Computing- Sreehari S
Cloud Computing- Sreehari SCloud Computing- Sreehari S
Cloud Computing- Sreehari S
 
Kussu.ppt
Kussu.pptKussu.ppt
Kussu.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree compared
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Viewers also liked

Cloud Computing - Apptis Approach
Cloud Computing - Apptis ApproachCloud Computing - Apptis Approach
Cloud Computing - Apptis Approach
Intel Corporation
 
DNS is Sexy
DNS is SexyDNS is Sexy
DNS is Sexy
Intel Corporation
 
Chanel Ddwards and Tamara Mendelson of Eventbrite
Chanel Ddwards and Tamara Mendelson of EventbriteChanel Ddwards and Tamara Mendelson of Eventbrite
Chanel Ddwards and Tamara Mendelson of Eventbrite
Intel Corporation
 
Simple cloud reference architecture
Simple cloud reference architectureSimple cloud reference architecture
Simple cloud reference architectureDaeMyung Kang
 
Mobile security-reference-architecture
Mobile security-reference-architectureMobile security-reference-architecture
Mobile security-reference-architectureVishal Sharma
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Khazret Sapenov
 
PCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitecturePCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitectureHyTrust
 
The Enterprise Reference Architecture and Tools
The Enterprise Reference Architecture and ToolsThe Enterprise Reference Architecture and Tools
The Enterprise Reference Architecture and Tools
Software Park Thailand
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
Netskope
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
Priyanka Aash
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
Okta-Inc
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
F5 Networks
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
Sai Kesavamatham
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
ForgeRock
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
Bob Rhubart
 
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Stuart Charlton
 
AWS Webcast - Active Directory on AWS
AWS Webcast - Active Directory on AWSAWS Webcast - Active Directory on AWS
AWS Webcast - Active Directory on AWS
Amazon Web Services
 

Viewers also liked (20)

Cloud Computing - Apptis Approach
Cloud Computing - Apptis ApproachCloud Computing - Apptis Approach
Cloud Computing - Apptis Approach
 
DNS is Sexy
DNS is SexyDNS is Sexy
DNS is Sexy
 
Chanel Ddwards and Tamara Mendelson of Eventbrite
Chanel Ddwards and Tamara Mendelson of EventbriteChanel Ddwards and Tamara Mendelson of Eventbrite
Chanel Ddwards and Tamara Mendelson of Eventbrite
 
Simple cloud reference architecture
Simple cloud reference architectureSimple cloud reference architecture
Simple cloud reference architecture
 
Mobile security-reference-architecture
Mobile security-reference-architectureMobile security-reference-architecture
Mobile security-reference-architecture
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
 
PCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitecturePCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference Architecture
 
The Enterprise Reference Architecture and Tools
The Enterprise Reference Architecture and ToolsThe Enterprise Reference Architecture and Tools
The Enterprise Reference Architecture and Tools
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
 
AWS Webcast - Active Directory on AWS
AWS Webcast - Active Directory on AWSAWS Webcast - Active Directory on AWS
AWS Webcast - Active Directory on AWS
 

Similar to Intro to Cloud Computing in the Federal Government

Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 
ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011
Open Data Center Alliance
 
Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Herbert Wanner
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud Business
ACMBangalore
 
Cloud + Soa: Enterprise Service Platform
Cloud + Soa: Enterprise Service PlatformCloud + Soa: Enterprise Service Platform
Cloud + Soa: Enterprise Service Platformvictorlbrown
 
BlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationBlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company Presentation
Supratik Ghatak
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
BlazeClan Technologies
BlazeClan TechnologiesBlazeClan Technologies
BlazeClan Technologies
Varoon Rajani
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
Blaze clan company presentation
Blaze clan   company presentationBlaze clan   company presentation
Blaze clan company presentationSupratik Ghatak
 
Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...
Ciro Puglisi
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Nazish Mohammed
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
Phil Agcaoili
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
CA API Management
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudKristian Nese
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
Govind Maheswaran
 
Infrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpeInfrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpe
Fabrizio Volpe
 
Roadmap to hyper hybrid cloud
Roadmap to hyper hybrid cloudRoadmap to hyper hybrid cloud

Similar to Intro to Cloud Computing in the Federal Government (20)

Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011
 
Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3
 
Cloud computing ppt_0
Cloud computing ppt_0Cloud computing ppt_0
Cloud computing ppt_0
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud Business
 
Cloud + Soa: Enterprise Service Platform
Cloud + Soa: Enterprise Service PlatformCloud + Soa: Enterprise Service Platform
Cloud + Soa: Enterprise Service Platform
 
BlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationBlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company Presentation
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
BlazeClan Technologies
BlazeClan TechnologiesBlazeClan Technologies
BlazeClan Technologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Blaze clan company presentation
Blaze clan   company presentationBlaze clan   company presentation
Blaze clan company presentation
 
Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private Cloud
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
Infrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpeInfrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpe
 
Roadmap to hyper hybrid cloud
Roadmap to hyper hybrid cloudRoadmap to hyper hybrid cloud
Roadmap to hyper hybrid cloud
 

More from Intel Corporation

Changing the way people connect, communicate and collabrote
Changing the way people connect, communicate and collabroteChanging the way people connect, communicate and collabrote
Changing the way people connect, communicate and collabrote
Intel Corporation
 
Jeff Sandquist talk at EventTech
Jeff Sandquist talk at EventTechJeff Sandquist talk at EventTech
Jeff Sandquist talk at EventTech
Intel Corporation
 
Oscar padilla of pervasive lightning talk at cloud camp austin
Oscar padilla of pervasive lightning talk at cloud camp austinOscar padilla of pervasive lightning talk at cloud camp austin
Oscar padilla of pervasive lightning talk at cloud camp austinIntel Corporation
 
Walter falk of ibm lightning talks at cloud camp austin
Walter falk of ibm lightning talks at cloud camp austinWalter falk of ibm lightning talks at cloud camp austin
Walter falk of ibm lightning talks at cloud camp austinIntel Corporation
 
Ed Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp CincyEd Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Intel Corporation
 
Bob Roudebush BlueLock Lightning Talk at CloudCamp Cincy
Bob Roudebush BlueLock Lightning Talk at CloudCamp CincyBob Roudebush BlueLock Lightning Talk at CloudCamp Cincy
Bob Roudebush BlueLock Lightning Talk at CloudCamp Cincy
Intel Corporation
 
1. andrew case of profitability.net lightning talk cloud camp cincy
1. andrew case of profitability.net lightning talk cloud camp cincy1. andrew case of profitability.net lightning talk cloud camp cincy
1. andrew case of profitability.net lightning talk cloud camp cincyIntel Corporation
 
5. troy davis lightning talk cloud camp cincy
5. troy davis lightning talk cloud camp cincy5. troy davis lightning talk cloud camp cincy
5. troy davis lightning talk cloud camp cincyIntel Corporation
 
John sheehan of twillio gives cloud camp denver lightning talk
John sheehan of twillio gives cloud camp denver lightning talkJohn sheehan of twillio gives cloud camp denver lightning talk
John sheehan of twillio gives cloud camp denver lightning talkIntel Corporation
 
Jason baker of relia cloud gives cloudcamp denver lightning talk
Jason baker of relia cloud gives cloudcamp denver lightning talkJason baker of relia cloud gives cloudcamp denver lightning talk
Jason baker of relia cloud gives cloudcamp denver lightning talkIntel Corporation
 
George reese of en stratus gives cloudcamp denver lightning talk
George reese of en stratus gives cloudcamp denver lightning talkGeorge reese of en stratus gives cloudcamp denver lightning talk
George reese of en stratus gives cloudcamp denver lightning talkIntel Corporation
 
David fauth gives cloud camp lightning talk
David fauth gives cloud camp lightning talkDavid fauth gives cloud camp lightning talk
David fauth gives cloud camp lightning talkIntel Corporation
 
Bryan walsh of hosting.com gives cloud camp denver lightning talk
Bryan walsh of hosting.com gives cloud camp denver lightning talkBryan walsh of hosting.com gives cloud camp denver lightning talk
Bryan walsh of hosting.com gives cloud camp denver lightning talkIntel Corporation
 
Uri budnik of right scale gives cloudcamp denver lightning talk
Uri budnik of right scale gives cloudcamp denver lightning talkUri budnik of right scale gives cloudcamp denver lightning talk
Uri budnik of right scale gives cloudcamp denver lightning talkIntel Corporation
 
Operations as Code
Operations as CodeOperations as Code
Operations as Code
Intel Corporation
 
The IBM Cloud
The IBM CloudThe IBM Cloud
The IBM Cloud
Intel Corporation
 
Microsoft Windows Azure
Microsoft Windows AzureMicrosoft Windows Azure
Microsoft Windows Azure
Intel Corporation
 
The Cloud Challenge for Government
The Cloud Challenge for GovernmentThe Cloud Challenge for Government
The Cloud Challenge for Government
Intel Corporation
 
Democratizing the Cloud with Open Source Cloud Development
Democratizing the Cloud with Open Source Cloud DevelopmentDemocratizing the Cloud with Open Source Cloud Development
Democratizing the Cloud with Open Source Cloud Development
Intel Corporation
 
Examples of Cloud Computing within the Federal Government
Examples of Cloud Computing within the Federal GovernmentExamples of Cloud Computing within the Federal Government
Examples of Cloud Computing within the Federal Government
Intel Corporation
 

More from Intel Corporation (20)

Changing the way people connect, communicate and collabrote
Changing the way people connect, communicate and collabroteChanging the way people connect, communicate and collabrote
Changing the way people connect, communicate and collabrote
 
Jeff Sandquist talk at EventTech
Jeff Sandquist talk at EventTechJeff Sandquist talk at EventTech
Jeff Sandquist talk at EventTech
 
Oscar padilla of pervasive lightning talk at cloud camp austin
Oscar padilla of pervasive lightning talk at cloud camp austinOscar padilla of pervasive lightning talk at cloud camp austin
Oscar padilla of pervasive lightning talk at cloud camp austin
 
Walter falk of ibm lightning talks at cloud camp austin
Walter falk of ibm lightning talks at cloud camp austinWalter falk of ibm lightning talks at cloud camp austin
Walter falk of ibm lightning talks at cloud camp austin
 
Ed Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp CincyEd Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp Cincy
 
Bob Roudebush BlueLock Lightning Talk at CloudCamp Cincy
Bob Roudebush BlueLock Lightning Talk at CloudCamp CincyBob Roudebush BlueLock Lightning Talk at CloudCamp Cincy
Bob Roudebush BlueLock Lightning Talk at CloudCamp Cincy
 
1. andrew case of profitability.net lightning talk cloud camp cincy
1. andrew case of profitability.net lightning talk cloud camp cincy1. andrew case of profitability.net lightning talk cloud camp cincy
1. andrew case of profitability.net lightning talk cloud camp cincy
 
5. troy davis lightning talk cloud camp cincy
5. troy davis lightning talk cloud camp cincy5. troy davis lightning talk cloud camp cincy
5. troy davis lightning talk cloud camp cincy
 
John sheehan of twillio gives cloud camp denver lightning talk
John sheehan of twillio gives cloud camp denver lightning talkJohn sheehan of twillio gives cloud camp denver lightning talk
John sheehan of twillio gives cloud camp denver lightning talk
 
Jason baker of relia cloud gives cloudcamp denver lightning talk
Jason baker of relia cloud gives cloudcamp denver lightning talkJason baker of relia cloud gives cloudcamp denver lightning talk
Jason baker of relia cloud gives cloudcamp denver lightning talk
 
George reese of en stratus gives cloudcamp denver lightning talk
George reese of en stratus gives cloudcamp denver lightning talkGeorge reese of en stratus gives cloudcamp denver lightning talk
George reese of en stratus gives cloudcamp denver lightning talk
 
David fauth gives cloud camp lightning talk
David fauth gives cloud camp lightning talkDavid fauth gives cloud camp lightning talk
David fauth gives cloud camp lightning talk
 
Bryan walsh of hosting.com gives cloud camp denver lightning talk
Bryan walsh of hosting.com gives cloud camp denver lightning talkBryan walsh of hosting.com gives cloud camp denver lightning talk
Bryan walsh of hosting.com gives cloud camp denver lightning talk
 
Uri budnik of right scale gives cloudcamp denver lightning talk
Uri budnik of right scale gives cloudcamp denver lightning talkUri budnik of right scale gives cloudcamp denver lightning talk
Uri budnik of right scale gives cloudcamp denver lightning talk
 
Operations as Code
Operations as CodeOperations as Code
Operations as Code
 
The IBM Cloud
The IBM CloudThe IBM Cloud
The IBM Cloud
 
Microsoft Windows Azure
Microsoft Windows AzureMicrosoft Windows Azure
Microsoft Windows Azure
 
The Cloud Challenge for Government
The Cloud Challenge for GovernmentThe Cloud Challenge for Government
The Cloud Challenge for Government
 
Democratizing the Cloud with Open Source Cloud Development
Democratizing the Cloud with Open Source Cloud DevelopmentDemocratizing the Cloud with Open Source Cloud Development
Democratizing the Cloud with Open Source Cloud Development
 
Examples of Cloud Computing within the Federal Government
Examples of Cloud Computing within the Federal GovernmentExamples of Cloud Computing within the Federal Government
Examples of Cloud Computing within the Federal Government
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Intro to Cloud Computing in the Federal Government

  • 1. The Role of a Reference Architecture in Cloud Standards Robert Bohn NIST Information Technology Laboratory Cloud Computing in the Federal Government FOSE/CloudCamp Washington, DC July 20, 2011 NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 2. 2 Background • Technological Maturity • Economic • Standards Driven – Data Portability – Service Interoperability – Security – Cloud to Cloud interaction • USG needs a starting point – A Reference NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 3. 3 Objective Develop a vendor neutral reference architecture consistent with the NIST Cloud Computing definition 3 Service Models - SaaS, PaaS, IaaS 4 Deployment models - Public, Private, Community, Hybrid 5 Essential Characteristics - On demand self-service - Broad network access - Resource Pooling - Rapid Elasticity - Measured Service A Cloud Determine the “What” of Cloud Computing, not the “How” NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 4. 4 NIST Cloud Computing Reference Architecture Actors and their Roles Cloud Consumer Cloud Provider Person or organization Cloud that maintains a Person, organization or entity responsible for making a service Broker business relationship available to Cloud Consumers. An entity that with, and uses service manages the use, from Cloud Providers. performance and delivery of cloud services, and Cloud Auditor negotiates A party that can conduct relationships independent assessment between Cloud of cloud services, Providers and information system Cloud Consumers. operations, performance and security of the cloud implementation. Cloud Carrier The intermediary that provides connectivity and transport of cloud services from Cloud Providers to Cloud Consumers. NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 5. 5 The NIST Cloud Computing Reference Architecture Cloud Provider Cloud Cloud Broker Consumer Service Layer SaaS Cloud Service Management Service PaaS Intermediation Cloud Business Auditor IaaS Support Security Privacy Service Aggregation Security Resource Abstraction and Audit Provisioning/ Control Layer Configuration Service Privacy Physical Resource Layer Arbitrage Impact Audit Portability/ Hardware Interoperability Performance Facility Audit Cloud Carrier NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 6. 6 Questions? NIST Cloud Computing Collaboration Site http://collaborate.nist.gov/twiki-cloud-computing/ NIST Cloud Computing Home Page http://www.nist.gov/itl/cloud Contact: Dawn Leaf dawn.leaf@nist.gov Lee Badger lee.badger@nist.gov Robert Bohn robert.bohn@nist.gov NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 7. 7 Backup Slides • Taxonomy • Example: Cloud Consumer/Provider Activities • Acknowledgements NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 8. 8 Taxonomies Taxonomy: The science of categorization, or classification, of things based on a predetermined system. (Webopedia) Main Attributes: • Typically a controlled vocabulary with a hierarchical tree-like structure • Terms in a taxonomy have relationships with other terms • Usually in the form of a parent (broader) / child (narrower) Benefits: • Encompasses and labels all significant concepts within a given domain • Allows users to understand the context of each label NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 9. 9 RA Taxonomy NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 10. 10 Examples Terms and Definitions Level 1: • Cloud Service Provider – Person, organization or higher-level system responsible for making a service available to service consumers. Level 2: • Cloud Service Management – Cloud Service Management includes all the service-related functions that are necessary for the management and operations of those services required by or proposed to customers. Level 3: • Public Cloud - The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. [NIST Definition of Cloud Computing] Level 4: • Data Portability – The ability to transfer data from one system to another without being required to recreate or reenter data descriptions or to modify significantly the application being transported. [Federal Standard 1037C] NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 11. 11 Cloud Consumer/Provider Activities Service Consumer Activities Provider Activities Model SaaS Uses application/service for Installs, manages, maintains and supports business process operations the software application on a cloud infrastructure. PaaS Develops, tests, deploys and Provisions and manages cloud infrastructure manages applications hosted in a and middleware for the platform cloud environment consumers; provides development, deployment and administration tools to platform consumers. IaaS Creates/installs, manages and Provisions and manages the physical monitors services for IT processing, storage, networking and the infrastructure operations hosting environment and cloud infrastructure for IaaS consumers. NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM
  • 12. 12 Acknowledgements Dr. Fang Liu, Jin Tong, Dr. Jian Mao: Knowcean Consulting Inc. Dr. Robert Bohn, John Messina: NIST ITL Dawn Leaf, NIST Senior Executive for Cloud Computing With broad contributions from members of the NIST Reference Architecture and Taxonomy Working Group and the Reference Architecture Analysis Team: Randy Baklini, Gregg Brown, Frederic De Vaulx, Michele Drgon, Anne Frantzen, Babak Jahromi, Dean Kemp, Cary Landis, Eugene Luster, Bob Marcus, Gary Mazzaferro, Hung Nguyen, Marlin Pohlman, Alan Sill, Ken Stavinoha, Pat Stingley, Tom Young and Jay Levine NIST INFORMATION TECHNOLOGY LABORATORY CLOUD COMPUTING PROGRAM