SlideShare a Scribd company logo
Introduction to Cloud Computing
What is it anyway?




Tom Eberle
PETAG Affinity Group
June 21, 2012
Overview
• Introduction
• Cloud Technologies
    –   Web Applications
    –   Clustering
    –   Terminal Services
    –   Application Servers
    –   Virtualization
    –   Hypervisors
•   Service Models
•   Deployment Models
•   Cloud Security
•   Final Thoughts
What is Cloud Computing?

       Larry Ellison, Founder of Oracle
       “..we've redefined cloud computing to
          include everything that we already
          do.. I don't understand what we
          would do differently in the light of
          cloud“ – Oracle OpenWorld, 2009
What is Cloud Computing?

       Richard Stallman, Founder of GNU
       “It's stupidity. It's worse than stupidity:
           it's a marketing hype campaign“
            - The Guardian Newspaper, 2008
What is Cloud Computing?

       Bruce Schneier, Security Expert, Author
       “Cloud computing is nothing new.. It's the
          modern version of the timesharing
          model from the 1960s, which was
          eventually killed by the rise of the
          personal computer. “
          - Schneier on Security Blog, 2009
What is Cloud Computing?
What is Cloud Computing?


     - Siri Says
     “Services that provide common business
        applications online, which are accessed
        from a Web browser, while the software
        and data are stored on the servers; a
        style of computing in which dynamically
        scalable and often virtualized resources
        are provided as a service over the
        internet”
Introduction
• What Comprises Cloud Computing?
     Broadband                                   Measured           On-Demand
                      Rapid Elasticity
   Network Access                                Services           Self-Services
                                                                                    Essential
                                                                                    Characteristics
                                Resource Pooling




   Software as a                 Platform as a              Infrastructure as       Service
   Service (SasS)               Service (PasS)              a Service (IasS)        Models



    Public            Private                    Hybrid            Community        Deployment
                                                                                    Models


                * NIST Visual Model of Cloud Computing
What is Cloud Computing?
Why Adopt Cloud Computing?
• Scalability - Organizations have access to a large amount of
  resources that scale based on user demand
• Elasticity - Organization’s can request, use, and release as
  many resources as needed based on changing needs
• Virtualization - Each user has a single view of the available
  resources, independently of how they are arranged in terms of
  physical devices
• Lower Infrastructure Costs - The pay-per-use model allows
  an organization to only pay for the resources they need with
  basically no investment in the physical resources available in
  the cloud. There are no infrastructure maintenance or
  upgrade costs
Why Adopt Cloud Computing?
• Availability - Organizations have the ability for the user to
  access data and applications from around the globe
• Collaboration - Organizations are starting to see the cloud as
  a way to work simultaneously on common data and
  information
• Risk Reduction - Organizations can use the cloud to test
  ideas and concepts before making major investments in
  technology
• Reliability - In order to support SLAs (service-level
  agreements), cloud providers have reliability mechanisms that
  are much more robust than those that could be cost-
  effectively provided by a single organization
Cloud Technology
Web Applications
• Simplest form of cloud computing
• Applications created in standard web
  programming languages (HTML, javascript,
  XML, PHP, etc)
• Apps reside somewhere on a server (Google
  Docs, Quickbooks On-line, etc)
• Accessed via your PC’s web browser
• If your PC fails, you can access data from
  another PC
Clustering
• Cluster of computers (i.e. multiple different
  servers)
  – Different server hardware
  – Possibly different OS (depending on app)
• Generally Used as Database Servers
  (MySQL, Microsoft Active Directory)
• Benefits
  – Replication: Servers maintains same data
  – Load balancing between servers in the cluster
  – Fault tolerance: cluster responds w/traffic routing
Clustering Example

MySQL         MySQL
 OS            OS




MySQL         MySQL
 OS            OS
Terminal Services
• Based off of old Mainframe and Dumb Terminal Architecture
• Now You Use Terminal Services Servers and Thin Clients
• Thin Clients can be Hardware Devices or Software installed
  on a computer
• All processing happens on Terminal Services Server
• Thin Client simply gets a "Window" into the server sharing the
  same OS and applications of the server
• Benefits
   – Application & data is stored on the server
   – Data can be accessible by other thin clients
   – Maintenance
TS Server Example
Application Servers
• Uses Terminal Services but instead of
  providing a full Environment it only
  delivers a specific Application.
• Benefits
  – Applications distributed to thin clients
  – Data stored on server (shared)
  – Maintenance
Virtualization
• What is it?
  – Separation of OS from hardware
  – Ability to EASILY move OS (including Apps &
    Settings) to new physical hardware
  – Accomplished with virtualization software
     • Client Installed Virtualization
     • Hypervisors
Client Installed Virtualization


   Instance 1    Instance 2     Instance 3

  Windows 7        Linux         Windows
                                   2008
                                  Server

           Client Virtualization Software (VirtualBox)

            Operating System (Windows/Linux/Mac)

                           PC Hardware
Hypervisors
• More powerful than client installed virtualization
  software
• Provides high reliability for critical services (e.g. MS
  Exchange server)
• Two Part Solution: Hypervisor & Management
  Software
• Hypervisor is installed on the physical server
  hardware
   – It’s like a thin OS
   – Only provides rudimentary connection info (IP address,
     computer name, etc) for the management software
   – Supports installation of OS’s when installing computer
     instances
Hypervisors
• Management Software is installed on an admin
  computer
• Purpose: Configure each Virtual Machine, or
  Instance and provide fault tolerance.
  – Connects to the Hypervisor installed on the server(s)
  – Allows creation the virtual computer instances on the
    server
     • Create virtual disk partitions, allocate memory, Install OS
     • Instances can be copy/paste to any other server on network
       running compatible hypervisors
  – On-the-fly reconfiguration when hardware fails
Hypervisor


Computer        Computer        Computer
Instance 1      Instance 2      Instance 3
                                 Windows
Windows 7          Linux
                                Server 2008

                                              Management
        1G              10 G            5G     Software
100 G   RAM     200 G   RAM     100 G   RAM
                                               (VMWare
                                               vSphere)
        Hypervisor (VMWare ESXi)
                                                 PC
              Server Hardware                 Hardware
Hypervisor Fault Tolerance
Computer     Computer         Computer                     Management
                                                            Software
Instance 1   Instance 2       Instance 3
                                                          (VMWare Sphere)
                  Hypervisor (VMWare ESXi)
                      Server Hardware 1                   PC Hardware


Computer     Computer         Computer       Computer
Instance 1   Instance 2       Instance 3     Instance 4
                  Hypervisor (VMWare ESXi)
                      Server Hardware 2


Computer     Computer         Computer       Computer
Instance 1   Instance 2       Instance 3     Instance 4
                  Hypervisor (VMWare ESXi)
                      Server Hardware 3


Computer     Computer         Computer       Computer
Instance 1   Instance 2       Instance 3     Instance 4
                  Hypervisor (VMWare ESXi)
                      Server Hardware 4
Hypervisors
• Most Hypervisor Software: Free and/or
  OpenSource
  – VMware, Citrix
• Most Management Software: Free (Lite
  version), Paid (Fault Tolerance and other
  features)
Service Models
Service Models
• Everything as a Service: XasS
• Most Common: SPI
  – Software as a Service: SasS
  – Platform as a Service: PasS
  – Infrastructure as a Service: SasS
• Other models
  –   Storage as a Service: SasS
  –   Communications as a Service: CasS
  –   Network as a Service: NasS
  –   Monitoring as a Service: MasS
Infrastructure as a Service (IasS)
             Applications

                 Data
You Manage




                                              • What you gain: Computer/
               Runtime
                                                Server
             Middleware
                                              • Consumer: SysAdmins
                 O/S
                                              • Examples
                              Vendor Manage




             Virtualization
                                                – Rackspace.com
               Servers
                                                – Go Grid
               Storage
                                                – Amazon Web Services (AWS)
             Networking
Platform as a Service (PasS)
             Applications
You Manage




                 Data
                                              • What you gain: Application/
               Runtime
                                                Framework
             Middleware
                                              • Consumer: App Developers
                 O/S
                                              • Examples
                              Vendor Manage




             Virtualization
                                                – Force.com
               Servers
                                                – Google App Engine
               Storage
                                                – Microsoft Azure
             Networking
Software as a Service (SasS)
Applications

    Data
                                 • What you gain: Business
  Runtime                          Functionality
                 Vendor Manage



Middleware                       • Consumer: End Users
    O/S                          • Examples
Virtualization                     – Google Docs/Gmail
                                   – FreshBooks
  Servers
                                   – SalesForce
  Storage
                                   – BaseCamp
Networking
Cloud Deployment Models
Cloud Deployment Models
Cloud Deployment Models
• Public Cloud
  – Infrastructure made available to general public or
    large industry group
  – Owned by the organization selling the service
• Private Cloud
  – Infrastructure operated solely for a single
    organization
  – May be managed by the organization or a third
    party
  – May be located on-premise or off-premise
Cloud Deployment Models
• Community Cloud
  – Infrastructure is shared by several organizations and
    supports a specific community that has shared
    concerns (e.g. mission, security requirements, policy,
    compliance, etc.)
  – May be managed by the organizations or a third party
  – May be located on-premise or off-premise
• Hybrid Cloud
  – Infrastructure is a composition of two or more clouds
  – Remain unique entities but bound together by
    standardized or proprietary technology that enable
    data and application portability
Cloud Deployment Models

             Infrastructure         Infrastructure        Infrastructure      Accessible and
              Managed By              Owned By               Located          Consumed By


  Public    Third Party Provider   Third Party Provider      Off-Premise         Untrusted




               Organization           Organization           On-Premise
 Private/
Community           OR                     OR                                     Trusted

            Third Party Provider   Third Party Provider      Off-Premise




 Hybrid     Both Organization &    Both Organization &    Both On-Premise &      Trusted &
            Third Party Provider   Third Party Provider      Off-Premise         Untrusted
Cloud Security

  • John Chambers, CEO Cisco
    Systems - “[Cloud Computing] is a
    security nightmare and it can't be
    handled in traditional ways.“ –
    Keynote Address, 2009 RSA
    Security Conference
Cloud Security
• No list of security controls can cover all
  cloud deployments
• Organizations should adopt a risk-based
  approach about moving to the cloud
• Use Cloud Security Alliance (CSA) quick
  method for evaluating tolerance in moving
  an asset to the cloud
Cloud Security
• Identify Each Asset for Cloud
  Deployment
  – Data
  – Application/Functions/Processes
• Data and applications don’t need to reside
  in the same location
Cloud Security
• Evaluate the Asset
  – How would we be harmed if the asset became widely
    public or widely distributed?
  – How would we be harmed if an employee of our
    cloud provider accessed the asset?
  – How would we be harmed if the process or function
    were manipulated by an outsider?
  – How would we be harmed if the process or function
    failed to provide expected results?
  – How would we be harmed if the information/data were
    unexpectedly changed?
  – How would we be harmed if the asset were
    unavailable for a peroid of time?
Cloud Security
• Map the Asset to Potential Cloud
  Deployment Models
  – Public
  – Private, internal/on-premises
  – Private, external (including dedicated or shared
    infrastructure)
  – Community; taking into account the hosting
    location, and identification of other community
    members
  – Hybrid; have in mind at least a rough architecture
    of where components, functions, and data will
    reside.
Cloud Security
• Evaluate Potential Cloud Service Models
  and Providers
  – Focus on the degree of control you’ll have
     • SasS: Software as a Service
     • PasS: Platform as a Service
     • IasS: Infrastructure as a Service
• Map Out the Potential Data Flow
  – Map out data flow between your organization,
    cloud services, and any customer/other nodes
  – Understand whether, and how, data can move in
    and out of the cloud
  – Identify risk exposure points
Risk Management Approaches
       Consumer Security Responsibility
Less




                                                           Security Participation by
                                                           End User Organization
                                                S
                                              SasS         SasS
                                             Software      PasS & SasS
                                                P
                                                           IasS, PasS, & SasS
                                              PasS
                                             Platform
                                                I
More




                                               IasS
                                          Infrastructure
Cloud Security
• Security Conclusions
  – You should understand the importance of
    what your considering moving into the cloud
  – Risk tolerance for each asset
  – Which combinations of deployment and
    service models are acceptable
  – You should have a good idea of potential
    exposure points for sensitive information and
    operations
Barriers to Cloud Adoption
•   Security - The key concern is data privacy: organizations do not have
    control of or know where their data is being stored
•   Interoperability - A universal set of standards and/or interfaces has not
    yet been defined, resulting in a significant risk of vendor lock-in
•   Resource Control - The amount of control that the organization has
    over the cloud environment varies greatly
•   Latency - All access to the cloud is done via the internet, introducing
    latency into every communication between the user and the
    environment
•   Platform or Language Constraints - Some cloud environments
    provide support for specific platforms and languages only
•   Legal Issues - There are concerns in the cloud computing community
    over jurisdiction, data protection, fair information practices, and
    international data transfer
Final Thoughts
• Cloud Computing is in essence an
  economic model
  – It is a different way to acquire and manage IT
    resources
• There are multiple cloud providers—the
  cloud is real
  – Currently most cloud consumers are small
    enterprises
  – Large enterprises are exploring private clouds
  – The number of providers will most probably grow
    as people start seeing greater savings and
    improvements to reduce adoption barriers
Final Thoughts
• Cloud Computing adoption requires cost/
  benefit/risk analysis to determine
  – What resources to move to the cloud (if any)
  – What situations warrant use of cloud resources,
    even for one-time situations
  – Implementation of private clouds vs. usage of
    public clouds
  – What risks are associated with using resources
    on the cloud
  – What risks are associated to providing resources
    in the cloud
Final Thoughts
• Decisions from a cloud consumer
  perspective depend on
  – Required control level
  – Required security level
  – Compatibility with local infrastructure
• Decisions from a cloud provider
  perspective depend on
  – Market/user characteristics
  – Established SLAs
  – Available technology
Thank You

Tom Eberle
  Tom.Eberle@Comcast.net
  LinkedIn.com/in/teberle
  Twitter.com/teberle
References
• Cloud Security Alliance Guide.v3.0
• “Introduction to Cloud Computing” – Everyman IT
• “Introduction to Security and Privacy in Cloud
  Computing”, Ragib Hanson , Johns Hopkins University,
  1/25/2010
• “Architectural Implications of Cloud Computing”, Grace
  A. Lewis, Software Engineering Institute, 2011
• “Introduction to Cloud Computing”, Wikipedia
• “Cloud Computing”, Wikipedia

More Related Content

What's hot

Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
Ashok Kumar
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
Vivek Ravindran
 
Cloud computing ppt by Binesh
Cloud computing ppt by BineshCloud computing ppt by Binesh
Cloud computing ppt by Binesh
Binesh
 
Cloud Computing - Technologies and Trends
Cloud Computing - Technologies and TrendsCloud Computing - Technologies and Trends
Cloud Computing - Technologies and Trends
Marcelo Sávio
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?
Amazon Web Services
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Naveed Farooq
 
Cloud computing
Cloud computingCloud computing
Cloud computing
حيدر نافع nafaa
 
Software defined datacenter SDDC
Software defined datacenter SDDCSoftware defined datacenter SDDC
Software defined datacenter SDDC
psjitha
 
Cloud computing
Cloud computingCloud computing
Cloud computing
MOHIT PANDEY
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
Pranav Vashistha
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
MonishaNehkal
 
Introduction to Amazon Web Services (AWS)
Introduction to Amazon Web Services (AWS)Introduction to Amazon Web Services (AWS)
Introduction to Amazon Web Services (AWS)
Garvit Anand
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
Haslina
 
cloud computing
cloud computingcloud computing
cloud computing
Yasir Hilal
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
Divya S
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
Shashi soni
 

What's hot (20)

Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud computing ppt by Binesh
Cloud computing ppt by BineshCloud computing ppt by Binesh
Cloud computing ppt by Binesh
 
Cloud Computing - Technologies and Trends
Cloud Computing - Technologies and TrendsCloud Computing - Technologies and Trends
Cloud Computing - Technologies and Trends
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Software defined datacenter SDDC
Software defined datacenter SDDCSoftware defined datacenter SDDC
Software defined datacenter SDDC
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Introduction to Amazon Web Services (AWS)
Introduction to Amazon Web Services (AWS)Introduction to Amazon Web Services (AWS)
Introduction to Amazon Web Services (AWS)
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 

Viewers also liked

Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Scott Bils
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
Priyodarshini Dhar
 
Trends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science BereichTrends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science Bereich
AWS Germany
 
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Chad Lawler
 
Cloud Security Alliance Guide to Cloud Security
Cloud Security Alliance Guide to Cloud SecurityCloud Security Alliance Guide to Cloud Security
Cloud Security Alliance Guide to Cloud Security
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Open Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -EucalyptusOpen Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -Eucalyptus
Sameer Naik
 
Cloud Stakeholders
Cloud StakeholdersCloud Stakeholders
Cloud Stakeholders
Miroslav Lessev
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Animesh Chaturvedi
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and Methods
Riant Soft
 

Viewers also liked (9)

Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Trends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science BereichTrends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science Bereich
 
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
 
Cloud Security Alliance Guide to Cloud Security
Cloud Security Alliance Guide to Cloud SecurityCloud Security Alliance Guide to Cloud Security
Cloud Security Alliance Guide to Cloud Security
 
Open Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -EucalyptusOpen Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -Eucalyptus
 
Cloud Stakeholders
Cloud StakeholdersCloud Stakeholders
Cloud Stakeholders
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and Methods
 

Similar to Introduction to Cloud Computing

Cloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaCloud computing by prabhunath sharma
Cloud computing by prabhunath sharma
Prabhunath Sharma
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
Studying
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
Studying
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
ErvisTema1
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
aleyeldean
 
cloud computing
cloud computingcloud computing
cloud computing
Abhijeet Shah
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
AsmTrash
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
Jamie Shoup
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization
Wellshop.pk
 
Virtualization
VirtualizationVirtualization
Virtualization
kousardiffi
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
BIJIT GHOSH
 
Parth virt
Parth virtParth virt
Parth virt
Parth Monga
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
Otto Mora
 
Cloud and its job oppertunities
Cloud and its job oppertunitiesCloud and its job oppertunities
Cloud and its job oppertunities
Ramya SK
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Bharat Kalia
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
Kamal Arora
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
Pratik Patil
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computing
ssuser7b6236
 
Virtualization
VirtualizationVirtualization
Virtualization
Birju Tank
 

Similar to Introduction to Cloud Computing (20)

Cloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaCloud computing by prabhunath sharma
Cloud computing by prabhunath sharma
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
cloud computing
cloud computingcloud computing
cloud computing
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
 
Parth virt
Parth virtParth virt
Parth virt
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
 
Cloud and its job oppertunities
Cloud and its job oppertunitiesCloud and its job oppertunities
Cloud and its job oppertunities
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 

Introduction to Cloud Computing

  • 1. Introduction to Cloud Computing What is it anyway? Tom Eberle PETAG Affinity Group June 21, 2012
  • 2. Overview • Introduction • Cloud Technologies – Web Applications – Clustering – Terminal Services – Application Servers – Virtualization – Hypervisors • Service Models • Deployment Models • Cloud Security • Final Thoughts
  • 3. What is Cloud Computing? Larry Ellison, Founder of Oracle “..we've redefined cloud computing to include everything that we already do.. I don't understand what we would do differently in the light of cloud“ – Oracle OpenWorld, 2009
  • 4. What is Cloud Computing? Richard Stallman, Founder of GNU “It's stupidity. It's worse than stupidity: it's a marketing hype campaign“ - The Guardian Newspaper, 2008
  • 5. What is Cloud Computing? Bruce Schneier, Security Expert, Author “Cloud computing is nothing new.. It's the modern version of the timesharing model from the 1960s, which was eventually killed by the rise of the personal computer. “ - Schneier on Security Blog, 2009
  • 6. What is Cloud Computing?
  • 7. What is Cloud Computing? - Siri Says “Services that provide common business applications online, which are accessed from a Web browser, while the software and data are stored on the servers; a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the internet”
  • 8. Introduction • What Comprises Cloud Computing? Broadband Measured On-Demand Rapid Elasticity Network Access Services Self-Services Essential Characteristics Resource Pooling Software as a Platform as a Infrastructure as Service Service (SasS) Service (PasS) a Service (IasS) Models Public Private Hybrid Community Deployment Models * NIST Visual Model of Cloud Computing
  • 9. What is Cloud Computing?
  • 10. Why Adopt Cloud Computing? • Scalability - Organizations have access to a large amount of resources that scale based on user demand • Elasticity - Organization’s can request, use, and release as many resources as needed based on changing needs • Virtualization - Each user has a single view of the available resources, independently of how they are arranged in terms of physical devices • Lower Infrastructure Costs - The pay-per-use model allows an organization to only pay for the resources they need with basically no investment in the physical resources available in the cloud. There are no infrastructure maintenance or upgrade costs
  • 11. Why Adopt Cloud Computing? • Availability - Organizations have the ability for the user to access data and applications from around the globe • Collaboration - Organizations are starting to see the cloud as a way to work simultaneously on common data and information • Risk Reduction - Organizations can use the cloud to test ideas and concepts before making major investments in technology • Reliability - In order to support SLAs (service-level agreements), cloud providers have reliability mechanisms that are much more robust than those that could be cost- effectively provided by a single organization
  • 13. Web Applications • Simplest form of cloud computing • Applications created in standard web programming languages (HTML, javascript, XML, PHP, etc) • Apps reside somewhere on a server (Google Docs, Quickbooks On-line, etc) • Accessed via your PC’s web browser • If your PC fails, you can access data from another PC
  • 14. Clustering • Cluster of computers (i.e. multiple different servers) – Different server hardware – Possibly different OS (depending on app) • Generally Used as Database Servers (MySQL, Microsoft Active Directory) • Benefits – Replication: Servers maintains same data – Load balancing between servers in the cluster – Fault tolerance: cluster responds w/traffic routing
  • 15. Clustering Example MySQL MySQL OS OS MySQL MySQL OS OS
  • 16. Terminal Services • Based off of old Mainframe and Dumb Terminal Architecture • Now You Use Terminal Services Servers and Thin Clients • Thin Clients can be Hardware Devices or Software installed on a computer • All processing happens on Terminal Services Server • Thin Client simply gets a "Window" into the server sharing the same OS and applications of the server • Benefits – Application & data is stored on the server – Data can be accessible by other thin clients – Maintenance
  • 18. Application Servers • Uses Terminal Services but instead of providing a full Environment it only delivers a specific Application. • Benefits – Applications distributed to thin clients – Data stored on server (shared) – Maintenance
  • 19. Virtualization • What is it? – Separation of OS from hardware – Ability to EASILY move OS (including Apps & Settings) to new physical hardware – Accomplished with virtualization software • Client Installed Virtualization • Hypervisors
  • 20. Client Installed Virtualization Instance 1 Instance 2 Instance 3 Windows 7 Linux Windows 2008 Server Client Virtualization Software (VirtualBox) Operating System (Windows/Linux/Mac) PC Hardware
  • 21. Hypervisors • More powerful than client installed virtualization software • Provides high reliability for critical services (e.g. MS Exchange server) • Two Part Solution: Hypervisor & Management Software • Hypervisor is installed on the physical server hardware – It’s like a thin OS – Only provides rudimentary connection info (IP address, computer name, etc) for the management software – Supports installation of OS’s when installing computer instances
  • 22. Hypervisors • Management Software is installed on an admin computer • Purpose: Configure each Virtual Machine, or Instance and provide fault tolerance. – Connects to the Hypervisor installed on the server(s) – Allows creation the virtual computer instances on the server • Create virtual disk partitions, allocate memory, Install OS • Instances can be copy/paste to any other server on network running compatible hypervisors – On-the-fly reconfiguration when hardware fails
  • 23. Hypervisor Computer Computer Computer Instance 1 Instance 2 Instance 3 Windows Windows 7 Linux Server 2008 Management 1G 10 G 5G Software 100 G RAM 200 G RAM 100 G RAM (VMWare vSphere) Hypervisor (VMWare ESXi) PC Server Hardware Hardware
  • 24. Hypervisor Fault Tolerance Computer Computer Computer Management Software Instance 1 Instance 2 Instance 3 (VMWare Sphere) Hypervisor (VMWare ESXi) Server Hardware 1 PC Hardware Computer Computer Computer Computer Instance 1 Instance 2 Instance 3 Instance 4 Hypervisor (VMWare ESXi) Server Hardware 2 Computer Computer Computer Computer Instance 1 Instance 2 Instance 3 Instance 4 Hypervisor (VMWare ESXi) Server Hardware 3 Computer Computer Computer Computer Instance 1 Instance 2 Instance 3 Instance 4 Hypervisor (VMWare ESXi) Server Hardware 4
  • 25. Hypervisors • Most Hypervisor Software: Free and/or OpenSource – VMware, Citrix • Most Management Software: Free (Lite version), Paid (Fault Tolerance and other features)
  • 27. Service Models • Everything as a Service: XasS • Most Common: SPI – Software as a Service: SasS – Platform as a Service: PasS – Infrastructure as a Service: SasS • Other models – Storage as a Service: SasS – Communications as a Service: CasS – Network as a Service: NasS – Monitoring as a Service: MasS
  • 28. Infrastructure as a Service (IasS) Applications Data You Manage • What you gain: Computer/ Runtime Server Middleware • Consumer: SysAdmins O/S • Examples Vendor Manage Virtualization – Rackspace.com Servers – Go Grid Storage – Amazon Web Services (AWS) Networking
  • 29. Platform as a Service (PasS) Applications You Manage Data • What you gain: Application/ Runtime Framework Middleware • Consumer: App Developers O/S • Examples Vendor Manage Virtualization – Force.com Servers – Google App Engine Storage – Microsoft Azure Networking
  • 30. Software as a Service (SasS) Applications Data • What you gain: Business Runtime Functionality Vendor Manage Middleware • Consumer: End Users O/S • Examples Virtualization – Google Docs/Gmail – FreshBooks Servers – SalesForce Storage – BaseCamp Networking
  • 33. Cloud Deployment Models • Public Cloud – Infrastructure made available to general public or large industry group – Owned by the organization selling the service • Private Cloud – Infrastructure operated solely for a single organization – May be managed by the organization or a third party – May be located on-premise or off-premise
  • 34. Cloud Deployment Models • Community Cloud – Infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g. mission, security requirements, policy, compliance, etc.) – May be managed by the organizations or a third party – May be located on-premise or off-premise • Hybrid Cloud – Infrastructure is a composition of two or more clouds – Remain unique entities but bound together by standardized or proprietary technology that enable data and application portability
  • 35. Cloud Deployment Models Infrastructure Infrastructure Infrastructure Accessible and Managed By Owned By Located Consumed By Public Third Party Provider Third Party Provider Off-Premise Untrusted Organization Organization On-Premise Private/ Community OR OR Trusted Third Party Provider Third Party Provider Off-Premise Hybrid Both Organization & Both Organization & Both On-Premise & Trusted & Third Party Provider Third Party Provider Off-Premise Untrusted
  • 36. Cloud Security • John Chambers, CEO Cisco Systems - “[Cloud Computing] is a security nightmare and it can't be handled in traditional ways.“ – Keynote Address, 2009 RSA Security Conference
  • 37. Cloud Security • No list of security controls can cover all cloud deployments • Organizations should adopt a risk-based approach about moving to the cloud • Use Cloud Security Alliance (CSA) quick method for evaluating tolerance in moving an asset to the cloud
  • 38. Cloud Security • Identify Each Asset for Cloud Deployment – Data – Application/Functions/Processes • Data and applications don’t need to reside in the same location
  • 39. Cloud Security • Evaluate the Asset – How would we be harmed if the asset became widely public or widely distributed? – How would we be harmed if an employee of our cloud provider accessed the asset? – How would we be harmed if the process or function were manipulated by an outsider? – How would we be harmed if the process or function failed to provide expected results? – How would we be harmed if the information/data were unexpectedly changed? – How would we be harmed if the asset were unavailable for a peroid of time?
  • 40. Cloud Security • Map the Asset to Potential Cloud Deployment Models – Public – Private, internal/on-premises – Private, external (including dedicated or shared infrastructure) – Community; taking into account the hosting location, and identification of other community members – Hybrid; have in mind at least a rough architecture of where components, functions, and data will reside.
  • 41. Cloud Security • Evaluate Potential Cloud Service Models and Providers – Focus on the degree of control you’ll have • SasS: Software as a Service • PasS: Platform as a Service • IasS: Infrastructure as a Service • Map Out the Potential Data Flow – Map out data flow between your organization, cloud services, and any customer/other nodes – Understand whether, and how, data can move in and out of the cloud – Identify risk exposure points
  • 42. Risk Management Approaches Consumer Security Responsibility Less Security Participation by End User Organization S SasS SasS Software PasS & SasS P IasS, PasS, & SasS PasS Platform I More IasS Infrastructure
  • 43. Cloud Security • Security Conclusions – You should understand the importance of what your considering moving into the cloud – Risk tolerance for each asset – Which combinations of deployment and service models are acceptable – You should have a good idea of potential exposure points for sensitive information and operations
  • 44. Barriers to Cloud Adoption • Security - The key concern is data privacy: organizations do not have control of or know where their data is being stored • Interoperability - A universal set of standards and/or interfaces has not yet been defined, resulting in a significant risk of vendor lock-in • Resource Control - The amount of control that the organization has over the cloud environment varies greatly • Latency - All access to the cloud is done via the internet, introducing latency into every communication between the user and the environment • Platform or Language Constraints - Some cloud environments provide support for specific platforms and languages only • Legal Issues - There are concerns in the cloud computing community over jurisdiction, data protection, fair information practices, and international data transfer
  • 45. Final Thoughts • Cloud Computing is in essence an economic model – It is a different way to acquire and manage IT resources • There are multiple cloud providers—the cloud is real – Currently most cloud consumers are small enterprises – Large enterprises are exploring private clouds – The number of providers will most probably grow as people start seeing greater savings and improvements to reduce adoption barriers
  • 46. Final Thoughts • Cloud Computing adoption requires cost/ benefit/risk analysis to determine – What resources to move to the cloud (if any) – What situations warrant use of cloud resources, even for one-time situations – Implementation of private clouds vs. usage of public clouds – What risks are associated with using resources on the cloud – What risks are associated to providing resources in the cloud
  • 47. Final Thoughts • Decisions from a cloud consumer perspective depend on – Required control level – Required security level – Compatibility with local infrastructure • Decisions from a cloud provider perspective depend on – Market/user characteristics – Established SLAs – Available technology
  • 48. Thank You Tom Eberle Tom.Eberle@Comcast.net LinkedIn.com/in/teberle Twitter.com/teberle
  • 49. References • Cloud Security Alliance Guide.v3.0 • “Introduction to Cloud Computing” – Everyman IT • “Introduction to Security and Privacy in Cloud Computing”, Ragib Hanson , Johns Hopkins University, 1/25/2010 • “Architectural Implications of Cloud Computing”, Grace A. Lewis, Software Engineering Institute, 2011 • “Introduction to Cloud Computing”, Wikipedia • “Cloud Computing”, Wikipedia

Editor's Notes

  1. This class introduces students to the world of Cloud Computing and explains that Cloud Computing is more then Virtualization.
  2. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  3. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  4. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  5. Are Created in Web Programming Languages Generally Use Databases to Store Data
  6. Are Generally Used for Database Servers (MySQL, Microsoft Active Directory) Load is balanced between servers in a cluster. If one server fails the cluster responds by not sending traffic to it. Servers maintain the same data by using replication
  7. Based off of old Mainframe and Dumb Terminal Architecture Now You Use Terminal Services Servers and Thin Clients Thin Clients can be Hardware Devices or Software installed on a computer All processing happens on Terminal Services Server and the Thin Client simply gets a "Window" into the server. Example: http://www.ncomputing.com/
  8. Uses Terminal Services but instead of providing a full Environment it only delivers a specific Application.
  9. Uses Desktop Clients Software or Hypervisors to allow you to install multiple Operating Systems on to one physical server.
  10. Example: Mac Computer VMWare Fusion Install Windows 7 Windows 7 runs in a window on the Mac Desktop
  11. i. Hypervisor is installed on the physical hardware to support the Operating Systems, and Management Software is used to configure each Virtual Machine, or Instance. ii. VMWare uses ESXi as the Hypervisor and vSphere for the Management Software
  12. i. Hypervisor is installed on the physical hardware to support the Operating Systems, and Management Software is used to configure each Virtual Machine, or Instance. ii. VMWare uses ESXi as the Hypervisor and vSphere for the Management Software
  13. Management Software Installed on another computer VMware vSphere
  14. Management Software Installed on another computer VMware vSphere
  15. i. Hypervisor is installed on the physical hardware to support the Operating Systems, and Management Software is used to configure each Virtual Machine, or Instance. ii. VMWare uses ESXi as the Hypervisor and vSphere for the Management Software
  16. The Public Cloud is Cloud Computing used from Online Vendors Private Clouds are environments on business/organization property that use Cloud Technologies.
  17. The Public Cloud is Cloud Computing used from Online Vendors Private Clouds are environments on business/organization property that use Cloud Technologies.
  18. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  19. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  20. Security... Most Small Business Security is poor. Security for most small to medium sized business will be better when systems are hosted in the cloud Local and Internet Bandwidth becomes more important with Cloud Computing. Even on the LAN you may end using all of your bandwidth.
  21. Security... Most Small Business Security is poor. Security for most small to medium sized business will be better when systems are hosted in the cloud Local and Internet Bandwidth becomes more important with Cloud Computing. Even on the LAN you may end using all of your bandwidth.
  22. Security... Most Small Business Security is poor. Security for most small to medium sized business will be better when systems are hosted in the cloud Local and Internet Bandwidth becomes more important with Cloud Computing. Even on the LAN you may end using all of your bandwidth.