SlideShare a Scribd company logo
1 of 31
NIST Cloud Computing
Reference Architecture
Prepared by
Dr. Avita Katal
Assistant Professor(SG)
Cloud Software Operations Cluster
School of Computer Science
UPES, Dehradun
Unit objectives
After completing this unit, you should be able to:
• Understand the concept of NIST's Cloud Computing Reference
Architecture (CCRA)
• Learn about the conceptual reference model
• Gain knowledge on architectural components in CCRA
NIST Cloud Computing Reference Architecture (CCRA)
• The NIST CCRA doesn't focus on how to design solution and
implementation, but mainly focuses on the requirements of what the
cloud services should provide.
• To facilitate the understanding of the operational difficulties or
complexities in cloud computing the reference architecture is
designed.
• NIST CCRA is a tool for developing, discussing and describing a system
specific architecture by using a common framework of reference.
• NIST CCRA doesn't represent the system architecture of a particular
cloud computing system.
Objectives of NIST
• In the context of an overall cloud computing conceptual model the
NIST CCRA is to understand and illustrate the various cloud services.
• In order to understand, compare, discuss and categorize the cloud
services, the NIST CCRA is meant to provide a technical reference to
agencies and to other consumers.
• The NIST CCRA is meant to facilitate the analysis of candidate
standards for interoperability, portability, security and reference
implementations.
Interactions between actors in Cloud
Computing
Example: Usage scenario 1
Example: Usage scenario 2
Example: Usage scenario 3
Example: Usage scenario 3
Cloud Broker
• A cloud broker as an entity that manages the use, performance and
delivery of cloud services and negotiates relationships between cloud
providers and cloud consumers.
Cloud Auditor
• A cloud auditor is a team that can perform an independent
examination of cloud service controls, with the intent to express an
opinion there on.
• Audits are performed to verify conformance to standards through
review of objective evidence.
• A cloud auditor can gauge the services provided by a cloud provider in
terms of security controls, privacy impact, performance, etc.
Cloud carrier
• A cloud carrier acts as a mediator which provides connectivity and
transport of cloud services between cloud consumers and cloud
providers.
• Cloud carriers provide access to consumers through network,
telecommunication and other access devices
CCRA: Architectural components
• According to NIST's cloud computing definition, a cloud infrastructure
can be operated in one of the following implementation models:
– Private cloud
– Public cloud
– Community cloud or hybrid cloud
• The differences between the implementation models mentioned
depend on how exclusive the computing resources are available to a
consumer in the cloud.
Example
Services
Available
to
a
Cloud
Consumer
Cloud Provider Service Orchestration
Cloud
Provider
Cloud
Service
Management
Business support
Commercial support involves the set of services related to businesses
that deal with customers and support processes. It includes the
components used to execute commercial operations oriented to the
client.
• Customer management.
• Contract management.
• Inventory management.
• Accounting and billing.
• Reporting and auditing.
• Pricing and rating.
Provisioning and configuration
• SLA management: Monitoring of SLA, application of SLA according to the defined
policies and that covers the SLA contract definition
• Resource changing: While repairs and updates adjust the configuration/resources
assignment and also join new nodes in the cloud according to the demand
• Rapid provisioning: Based on the requested services/resources/capabilities that
automatically deploy systems in the cloud.
• Metering: Appropriate for the type of service (for example, storage, processing,
bandwidth and active user accounts) that provides a measurement capability at some
level of abstraction.
• Monitoring and Reporting: Generation of performance reports, discovery and
monitoring of virtual resources and monitoring of operations and events in the cloud.
Portability and interoperability
• Cloud providers should provide mechanisms to support data
portability, service interoperability and system portability.
• Data portability is the ability of cloud consumers to copy data objects in or
out of a cloud or to use a disk for mass data transfer.
• Service interoperability is the ability of cloud consumers to use their data and
services through multiple cloud providers with a unified management interface
.
• System portability allows the migration of a fully stopped virtual machine
instance or a machine image from one provider to another or migrating
applications, services and their contents from one service provider to another
Security
• Shared security responsibilities:
 Security is actually a shared responsibility. Security controls (i.e., the measures used to provide protections) must be analyzed to
determine which party is in a better position to implement.
 This analysis should include estimates from the perspective of the service model, where different service models imply different degrees
of control between cloud consumers and cloud providers.
• Cloud service model perspectives:
 Identified by NIST definition of cloud computing, the three cloud service models such as IaaS, PaaS and SaaS offer consumers different
types of service management operations and launch different points of entry to cloud systems.
 Therefore, it is important to consider, when designing and implementing security, the impact of cloud service models and their different
problems.
 In the security considerations of the SaaS cloud system, there has been an emphasis on web browser security.
 IaaS cloud consumers have VMs that run on hypervisors on hosts. Therefore to achieve VM isolation hypervisor security has been studied
extensively for IaaS cloud providers that use technologies of virtualization.
• Implications of cloud deployment models :
 From the perspective of the implementation model, one way to see the security implications is the different level of exclusivity of the
tenants in an implementation model.
 A public cloud could have an unpredictable coexistence with each other, while the private cloud is dedicated to a single consumer
organization. Therefore, compared to the public cloud, the isolation of the workload is a minor concern for security in a private cloud.
From the perspective of the implementation model, another way to analyze the impact of security is to use the concept of access limits
Cloud
Service
Provider
Security
and
Privacy
Cloud taxonomy
• Level 1 (Role): As conceptualized by the associated actors, a role in the context of cloud
computing indicates a set of behaviors and obligations.
• Level 2 (Activity): Associated with a specific role an activity means general tasks or
behaviors.
• Level 3 (Component): Component refers to the specific processes, tasks or actions that must
be performed to achieve the specific objective of the activity.
• Level 4 (Sub-component): The subcomponent is a modular part of a component.
• First level terms (Role):
• Cloud consumer
• Cloud provider
• Cloud Carrier
• Cloud broker
• Cloud auditor
Second level terms (Activity):
• Cloud distribution Security audit
• Cloud access Privacy impact audit
• Service deployment Performance audit
• Service orchestration
• Cloud service management
• Security
• Privacy
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service (IaaS)
• Consumption of services
• Service provision
• Third level terms (Component):
• Service intermediation
• Aggregation of services
• Arbitration of services
• Private cloud:
• Community cloud
• Public cloud
• Hybrid cloud
• Service layer
• Abstraction layer and resource control
• Portability
• Interoperability
• Mobile endpoints
• Fixed endpoints
Fourth level terms (Sub-component):
Data portability
Interoperability
Portability of the system
Rapid provisioning
Resource change
Monitoring and reporting
Measurement
SLA management

More Related Content

Similar to NIST CCRA.pptx for cloud computing and virtualization

Lecture 2 introduction to cloud computing
Lecture 2   introduction to cloud computingLecture 2   introduction to cloud computing
Lecture 2 introduction to cloud computingdralaa7
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...DineshKumar746335
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxhaileysuszelalem
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptxtaruian
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.pptTomMot10
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management AngelineR
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.pptDss
 
introduction-to-cloud-computing
introduction-to-cloud-computingintroduction-to-cloud-computing
introduction-to-cloud-computingssuserc27607
 
Lecture 1 - Introduction to Cloud Computing.pptx
Lecture 1 - Introduction to Cloud Computing.pptxLecture 1 - Introduction to Cloud Computing.pptx
Lecture 1 - Introduction to Cloud Computing.pptxHuyLc16
 
Chapter_1_-_Introduction_to_Cloud_Computing.pptx
Chapter_1_-_Introduction_to_Cloud_Computing.pptxChapter_1_-_Introduction_to_Cloud_Computing.pptx
Chapter_1_-_Introduction_to_Cloud_Computing.pptxSushmithaNatraj1
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computingnewbie2019
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Niggasudhanshu345mishra
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
 
Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Tim Harvey
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 

Similar to NIST CCRA.pptx for cloud computing and virtualization (20)

Lecture 2 introduction to cloud computing
Lecture 2   introduction to cloud computingLecture 2   introduction to cloud computing
Lecture 2 introduction to cloud computing
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptx
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
12458003.ppt
12458003.ppt12458003.ppt
12458003.ppt
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
CC UNIT-2.pptx
CC UNIT-2.pptxCC UNIT-2.pptx
CC UNIT-2.pptx
 
4582349.ppt
4582349.ppt4582349.ppt
4582349.ppt
 
introduction-to-cloud-computing
introduction-to-cloud-computingintroduction-to-cloud-computing
introduction-to-cloud-computing
 
Lecture 1 - Introduction to Cloud Computing.pptx
Lecture 1 - Introduction to Cloud Computing.pptxLecture 1 - Introduction to Cloud Computing.pptx
Lecture 1 - Introduction to Cloud Computing.pptx
 
Chapter_1_-_Introduction_to_Cloud_Computing.pptx
Chapter_1_-_Introduction_to_Cloud_Computing.pptxChapter_1_-_Introduction_to_Cloud_Computing.pptx
Chapter_1_-_Introduction_to_Cloud_Computing.pptx
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computing
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Nigga
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers
 
Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

NIST CCRA.pptx for cloud computing and virtualization

  • 1. NIST Cloud Computing Reference Architecture Prepared by Dr. Avita Katal Assistant Professor(SG) Cloud Software Operations Cluster School of Computer Science UPES, Dehradun
  • 2. Unit objectives After completing this unit, you should be able to: • Understand the concept of NIST's Cloud Computing Reference Architecture (CCRA) • Learn about the conceptual reference model • Gain knowledge on architectural components in CCRA
  • 3. NIST Cloud Computing Reference Architecture (CCRA) • The NIST CCRA doesn't focus on how to design solution and implementation, but mainly focuses on the requirements of what the cloud services should provide. • To facilitate the understanding of the operational difficulties or complexities in cloud computing the reference architecture is designed. • NIST CCRA is a tool for developing, discussing and describing a system specific architecture by using a common framework of reference. • NIST CCRA doesn't represent the system architecture of a particular cloud computing system.
  • 4. Objectives of NIST • In the context of an overall cloud computing conceptual model the NIST CCRA is to understand and illustrate the various cloud services. • In order to understand, compare, discuss and categorize the cloud services, the NIST CCRA is meant to provide a technical reference to agencies and to other consumers. • The NIST CCRA is meant to facilitate the analysis of candidate standards for interoperability, portability, security and reference implementations.
  • 5.
  • 6.
  • 7. Interactions between actors in Cloud Computing
  • 10. Example: Usage scenario 3 Example: Usage scenario 3
  • 11. Cloud Broker • A cloud broker as an entity that manages the use, performance and delivery of cloud services and negotiates relationships between cloud providers and cloud consumers.
  • 12.
  • 13. Cloud Auditor • A cloud auditor is a team that can perform an independent examination of cloud service controls, with the intent to express an opinion there on. • Audits are performed to verify conformance to standards through review of objective evidence. • A cloud auditor can gauge the services provided by a cloud provider in terms of security controls, privacy impact, performance, etc.
  • 14.
  • 15. Cloud carrier • A cloud carrier acts as a mediator which provides connectivity and transport of cloud services between cloud consumers and cloud providers. • Cloud carriers provide access to consumers through network, telecommunication and other access devices
  • 16.
  • 17.
  • 18. CCRA: Architectural components • According to NIST's cloud computing definition, a cloud infrastructure can be operated in one of the following implementation models: – Private cloud – Public cloud – Community cloud or hybrid cloud • The differences between the implementation models mentioned depend on how exclusive the computing resources are available to a consumer in the cloud.
  • 19.
  • 21.
  • 22. Cloud Provider Service Orchestration
  • 24. Business support Commercial support involves the set of services related to businesses that deal with customers and support processes. It includes the components used to execute commercial operations oriented to the client. • Customer management. • Contract management. • Inventory management. • Accounting and billing. • Reporting and auditing. • Pricing and rating.
  • 25. Provisioning and configuration • SLA management: Monitoring of SLA, application of SLA according to the defined policies and that covers the SLA contract definition • Resource changing: While repairs and updates adjust the configuration/resources assignment and also join new nodes in the cloud according to the demand • Rapid provisioning: Based on the requested services/resources/capabilities that automatically deploy systems in the cloud. • Metering: Appropriate for the type of service (for example, storage, processing, bandwidth and active user accounts) that provides a measurement capability at some level of abstraction. • Monitoring and Reporting: Generation of performance reports, discovery and monitoring of virtual resources and monitoring of operations and events in the cloud.
  • 26. Portability and interoperability • Cloud providers should provide mechanisms to support data portability, service interoperability and system portability. • Data portability is the ability of cloud consumers to copy data objects in or out of a cloud or to use a disk for mass data transfer. • Service interoperability is the ability of cloud consumers to use their data and services through multiple cloud providers with a unified management interface . • System portability allows the migration of a fully stopped virtual machine instance or a machine image from one provider to another or migrating applications, services and their contents from one service provider to another
  • 27. Security • Shared security responsibilities:  Security is actually a shared responsibility. Security controls (i.e., the measures used to provide protections) must be analyzed to determine which party is in a better position to implement.  This analysis should include estimates from the perspective of the service model, where different service models imply different degrees of control between cloud consumers and cloud providers. • Cloud service model perspectives:  Identified by NIST definition of cloud computing, the three cloud service models such as IaaS, PaaS and SaaS offer consumers different types of service management operations and launch different points of entry to cloud systems.  Therefore, it is important to consider, when designing and implementing security, the impact of cloud service models and their different problems.  In the security considerations of the SaaS cloud system, there has been an emphasis on web browser security.  IaaS cloud consumers have VMs that run on hypervisors on hosts. Therefore to achieve VM isolation hypervisor security has been studied extensively for IaaS cloud providers that use technologies of virtualization. • Implications of cloud deployment models :  From the perspective of the implementation model, one way to see the security implications is the different level of exclusivity of the tenants in an implementation model.  A public cloud could have an unpredictable coexistence with each other, while the private cloud is dedicated to a single consumer organization. Therefore, compared to the public cloud, the isolation of the workload is a minor concern for security in a private cloud. From the perspective of the implementation model, another way to analyze the impact of security is to use the concept of access limits
  • 30. • Level 1 (Role): As conceptualized by the associated actors, a role in the context of cloud computing indicates a set of behaviors and obligations. • Level 2 (Activity): Associated with a specific role an activity means general tasks or behaviors. • Level 3 (Component): Component refers to the specific processes, tasks or actions that must be performed to achieve the specific objective of the activity. • Level 4 (Sub-component): The subcomponent is a modular part of a component. • First level terms (Role): • Cloud consumer • Cloud provider • Cloud Carrier • Cloud broker • Cloud auditor Second level terms (Activity): • Cloud distribution Security audit • Cloud access Privacy impact audit • Service deployment Performance audit • Service orchestration • Cloud service management • Security • Privacy • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS) • Consumption of services • Service provision
  • 31. • Third level terms (Component): • Service intermediation • Aggregation of services • Arbitration of services • Private cloud: • Community cloud • Public cloud • Hybrid cloud • Service layer • Abstraction layer and resource control • Portability • Interoperability • Mobile endpoints • Fixed endpoints Fourth level terms (Sub-component): Data portability Interoperability Portability of the system Rapid provisioning Resource change Monitoring and reporting Measurement SLA management

Editor's Notes

  1. Actor cloud consumer: A person or organization that maintains a business relationship with cloud providers and uses service from cloud providers. Actor cloud provider: A person, organization or an entity responsible for making a service available to cloud consumer/interested parties. Actor cloud auditor: A party which can conduct independent assessment/examination or audit of cloud, services, performance, security and information system operations of the cloud implementation. Actor cloud broker: An entity which manages the delivery, use and performance of cloud services and helps in negotiating relationships between cloud providers and cloud consumers. Actor cloud carrier: An intermediary which provides connectivity and transport of cloud, services from cloud providers to cloud consumers.
  2. Instead of contacting directly to cloud provider a cloud consumer may request service from cloud broker. After all the cloud broker may create a new service by improving or enhancing an existing service or by combining multiple services. In this scenario, the cloud consumers interacts with the cloud broker instead of directly with cloud providers which are invisible to the cloud consumer.
  3. Cloud carriers are an intermediary which provides connectivity and transport of cloud services from cloud providers to cloud consumers. Follow the figure , a cloud provider arranges for a participates in two unique Service Level Agreements (SLAs), one with a cloud carrier i.e., SLA2 and another one with a cloud consumer i.e., SLA1. A cloud provider arranges SLAs with a cloud carrier and it may request encrypted and dedicated connections to make sure the cloud services are consumed at a consistent level according to the legal agreement along with the cloud consumers. In this scenario, in order to provide essential requirements in SLA1, the cloud provider may specify its requirements on capability, flexibility and functionality in SLA2.
  4. For a cloud service, a cloud auditor conducts independent examinations/assessments of the of the cloud service implementation. This audit may involve interactions with the cloud provider and the cloud consumer.
  5. Sure, here are examples of how a cloud broker could provide service arbitrage, intermediation, and aggregation according to the NIST CCRA (National Institute of Standards and Technology Cloud Computing Reference Architecture): Service Arbitrage: Example: A cloud broker offers a comparison service where it evaluates multiple cloud service providers (CSPs) based on factors like price, performance, reliability, and compliance. It then recommends the This allows clients to benefit from the best possible service at the most competitive price. most suitable CSP to its clients based on their specific needs and budget constraints. Intermediation: Example: A cloud broker acts as an intermediary between cloud service providers and their clients. It provides value-added services such as negotiation of contracts, performance monitoring, security management, and billing consolidation. For instance, the broker could negotiate volume discounts with CSPs on behalf of its clients, ensuring cost savings and simplifying the procurement process. Aggregation: Example: A cloud broker aggregates multiple cloud services from different providers into a single unified platform. For instance, it may integrate Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) offerings from various providers into a single user interface. This allows clients to access and manage diverse cloud services seamlessly, simplifying deployment, management, and scaling of their applications.
  6. In the NIST CCRA (National Institute of Standards and Technology Cloud Computing Reference Architecture), a cloud auditor plays a crucial role in ensuring compliance, security, and governance within cloud environments. Here's how a cloud auditor fits into the NIST CCRA framework: Compliance Assurance: A cloud auditor verifies whether cloud services and deployments comply with relevant regulations, standards, and policies. This includes assessing adherence to industry-specific regulations (such as HIPAA for healthcare or GDPR for data privacy, HIPAA (Health Insurance Portability and Accountability Act) and GDPR (General Data Protection Regulation) are two important regulations related to data privacy and security)), as well as internal organizational policies. Security Assessment: The cloud auditor evaluates the security measures implemented by cloud service providers and consumers to protect data, applications, and infrastructure. This involves assessing the effectiveness of security controls, vulnerability management practices, access controls, encryption mechanisms, and incident response procedures.(Shared Responsibility Model- Security of the cloud and security in the cloud) Risk Management: Cloud auditors identify and assess risks associated with cloud deployments, including potential security threats, data breaches, service outages, and compliance violations. They analyze risk factors such as data sensitivity, geographic location, service dependencies, and contractual agreements to provide recommendations for risk mitigation. Governance Oversight: Cloud auditors monitor and enforce governance policies to ensure accountability, transparency, and responsible use of cloud resources. This includes reviewing access logs, audit trails, configuration settings, and usage reports to detect unauthorized activities, policy violations, or deviations from best practices. Assurance Reporting: Based on their assessments, cloud auditors produce assurance reports that document the compliance, security, and risk posture of cloud environments. These reports may include compliance attestations, audit findings, remediation recommendations, and ongoing compliance monitoring plans.
  7. Business support causes the set of services related to the business that deal mainly with customers and support processes. It includes the customer-oriented components needed to execute business operations. Customer management: It manages customer accounts, open/close/close accounts, manage customer relationships solving problems and problems of customers and providing contact points, manage user profiles, etc. Contract management: It manages contracts of configuration/negotiation services/termination/closing of contract, etc. Pricing and rating: It determines the prices by evaluating the services in the cloud, depending on the profile of the user who manages the promotions and the pricing rules, etc. Inventory management: It manages and configures service catalogs, etc. Accounting and billing: It manages customer billing information, send account statements, track invoices, process payments received, etc. Reporting and auditing: It generates reports, monitor user operations, etc.
  8. Data Portability: The platform provides tools and APIs that allow customers to easily copy data objects in and out of the cloud environment. For example, customers can use a web-based interface or command-line tools to transfer large datasets between their on-premises infrastructure and the cloud, or between different cloud providers. Additionally, the platform supports the use of physical storage devices (e.g., external hard drives or tape drives) for mass data transfer. Customers can ship their storage devices to the cloud provider's data center, where the data is uploaded or downloaded directly to/from the storage device, bypassing the need for internet bandwidth. Service Interoperability: The platform offers a unified management interface that abstracts the underlying differences between cloud providers' APIs and services. Customers can manage their data and services through a single pane of glass, regardless of the underlying cloud infrastructure. For example, customers can provision virtual machines, databases, storage buckets, and other resources from different cloud providers using a standardized set of APIs and workflows provided by the platform. They can also monitor resource usage, configure security policies, and automate deployment pipelines in a consistent manner across multiple clouds. System Portability: The platform supports system portability by facilitating the migration of virtual machine instances, machine images, applications, and services between different cloud providers. Customers can export their virtual machine instances or machine images from one cloud provider and import them into another provider's infrastructure, preserving their configurations, operating systems, and application settings. Additionally, the platform offers tools and services to refactor or containerize applications for compatibility with different cloud environments, allowing customers to migrate their applications and services seamlessly between cloud providers without vendor lock-in.
  9. Shared security responsibilities As discussed above, in a cloud system, the cloud provider and the cloud consumer have different degrees of control over computing resources. Compared to traditional IT systems, where in an organization has control over the entire stack of computing resources and the complete life cycle of the systems, cloud providers and cloud consumers design, build, implement and operate collaborative cloud-based systems. The division of control means that both parties now share the responsibilities of providing sufficient protections to cloud-based systems. Security is actually a shared responsibility. Security controls (i.e., the measures used to provide protections)must be analyzed to determine which party is in a better position to implement. This analysis should include estimates from the perspective of the service model, where different service models imply different degrees of control between cloud consumers and cloud providers. For example, the administration of the user account of the application implemented in a IaaS environment is generally not the responsibility of the IaaS provider, while the account management controls for users with initial system privileges in IaaS scenarios are generally performed by the IaaS provider. Cloud service model perspectives Identified by NIST definition of cloud computing, the three cloud service models such as IaaS, PaaS and SaaS offer consumers different types of service management operations and launch different points of entry to cloud systems. Therefore, it is important to consider, when designing and implementing security, the impact of cloud service models and their different problems. For example, through the network connection generally through the Internet and through a web browser, SaaS provides users with access to offers in the cloud. In the security considerations of the SaaS cloud system, there has been an emphasis on web browser security. IaaS cloud consumers have VMs that run on hypervisors on hosts. Therefore to achieve VM isolation hypervisor security has been studied extensively for IaaS cloud providers that use technologies of virtualization. Implications of cloud deployment models The variations of the cloud implementation models discussed in the previous sections also have important security implications. From the perspective of the implementation model, one way to see the security implications is the different level of exclusivity of the tenants in an implementation model. A public cloud could have an unpredictable coexistence with each other, while the private cloud is dedicated to a single consumer organization. Therefore, compared to the public cloud, the isolation of the workload is a minor concern for security in a private cloud. From the perspective of the implementation model, another way to analyze the impact of security is to use the concept of access limits. For example, at the cloud boundary when the private cloud is hosted on the site within the network limit of the cloud consumer organization, a private cloud on the site may or may not need additional border controllers or protection, while a cloud private off-line at the edge of the cloud requires the establishment of such perimeter protection.
  10. To track or distinguish an individual's identity, the PII is information that can be used such as your name, biometric records, social security number/aadhar card number, etc., when combined with other personal or identifying information i.e., linked or linkable to a private party such as the date and place of birth, the maiden name of the mother etc. Although cloud computing offers a flexible solution for software, information and shared resources, it also poses additional privacy challenges for consumers in the cloud. Security refers to measures taken to protect systems, networks, applications, and data from unauthorized access, misuse, disruption, or destruction. Privacy refers to the right of individuals to control the collection, use, and disclosure of their personal information.
  11. Taxonomy is defined as the science of classifying or categorizing things based on a predefined system. The taxonomy contains a controlled vocabulary with a hierarchical tree structure. In the above figure, a four-level taxonomy is depicted to describe the main concepts about cloud computing. • Level 1 (Role): As conceptualized by the associated actors, a role in the context of cloud computing indicates a set of behaviors and obligations. • Level 2 (Activity): Associated with a specific role an activity means general tasks or behaviors. • Level 3 (Component): Component refers to the specific processes, tasks or actions that must be performed to achieve the specific objective of the activity. • Level 4 (Sub-component): The subcomponent is a modular part of a component. First level terms (Role): • Cloud consumer: This is a person or organization that maintains a business relationship with cloud service providers and uses the cloud service providers service. • Cloud provider: This is a person, organization or entity that is responsible for serving consumers, making a service available. • Cloud carrier: This is the intermediary that provides transport and connectivity of services in the cloud between consumers of the cloud and cloud providers. • Cloud broker: This is an entity that negotiates relationships between cloud consumers and cloud providers and manages the delivery, performance and use of cloud services. • Cloud auditor: Cloud auditor is a part that can lead in the implementation of the cloud, the independent examination of cloud services, performance, security and information system operations.
  12. Second level terms (Activity): • Cloud distribution: This is the process of transporting data in the cloud between cloud consumers and cloud providers. • Cloud access: This is to gain access to or make contact with cloud services. • Service deployment: All the organization and activities necessary to make a cloud service available is a service deployment. • Service orchestration: It refers to the provision, management and coordination of cloud infrastructure to provide services in the cloud to meet IT and business needs. • Cloud service management: This is composed of all the functions related to the service that are necessary for the operations and management of the services proposed or required by the clients. • Security: Here security means security of information. Whereas information security protects information and information systems against unauthorized use, access, modification, disclosure, destruction or interruption in order to provide the following: - Integrity, which means protecting against improper modification or destruction of information and also ensuring that the information is authentic and not reputable. - Confidentiality, which means protecting property information and personal privacy and also preserving authorized restrictions for accessing and disclosing information. - Availability, which means making sure that the use and timely and reliable access to information. • Privacy: The privacy of information throughout its life cycle is nothing more than the consistent, safe and adequate use, processing, collection, disposition and communication of PI and PII. • Software as a Service (SaaS): SaaS is the capacity offered to the consumer by the provider is to use the applications (providers) that run on an infrastructure in the cloud. Through a thin client interface such as a web browser, applications can be accessed from various client devices. With the possible exception of limited configurations of user-specific applications only, the consumer/user cannot control or manage the underlying infrastructure of the cloud including the capabilities of individual applications, operating systems, storage, servers or the network. • Platform as a Service (PaaS): PaaS is the capacity offered to the consumer by the provider is to implement in the cloud infrastructure applications acquired or created by the consumer using the tools and compatible programming languages of the provider. The consumer has control over the applications deployed and possibly the settings of the application-hosting environment, while the consumer cannot control or manage the underlying infrastructure of the cloud including operating systems, storage, servers or the network. • Infrastructure as a Service (IaaS): IaaS is the capacity offered to the consumer by the provider is to provide processing, networks, storage and other fundamental computing resources through that the consumer can run and implement any software, including applications and operating systems. The consumer has control over the implemented applications, operating systems, storage and possibly limited control of the selected network components while the consumer cannot control or manage the underlying infrastructure of the cloud. • Consumption of services: When using a service in the cloud, the consumption of services is an intermediary of the cloud. • Service provision: In the act of providing a service in the cloud, service provision is a cloud broker. Security audit: The security audit is a systematic evaluation of a system in the cloud measuring how well it is in accordance with a set of predefined and tested security criteria. • Privacy impact audit: This is a systematic evaluation of a cloud system measuring how well it is in accordance with a set of predefined and tested privacy impact criteria. • Performance audit: This is a systematic evaluation of a cloud system measuring how well it is in accordance with a set of predefined and tested performance criteria.
  13. Third level terms (Component): • Service intermediation: Service intermediation adds value on top of a given service to enhance some specific capability. Service intermediation is an intermediation broker that provides a service which directly enhances a given service delivered to service consumers. • Aggregation of services: The aggregation of services will ensure that the data is modeled and integrated in all the services of the components and also to ensure the security and movement of the data between the multiple providers and the consumer of the service. Service aggregation combines multiple existing services into one or more services (new). • Arbitration of services: Both, the service of arbitration of services in the cloud and the aggregation of services in the cloud are similar. The main difference between them is that the aggregate services are not fixed. Certainly, the main objective of arbitration is to provide the service aggregator with flexibility and opportunistic options, for example, providing a credit scoring service that verify multiple scoring agencies and opts for the best score or through a service provider that provides multiple email services. • Private cloud: This is the infrastructure in the cloud is used exclusively for an organization. The private cloud can exist on the site or outside of it and can be managed by the organization or even through a third party. • Community cloud: This is the infrastructure in the cloud shared by many organizations and supports a specific community that has shared concerns, for example, policies, missions, compliance considerations and security requirements. Community cloud can exist inside or outside the facilities and can be managed by organizations or a third party. • Public cloud: The public cloud is the infrastructure in the cloud that is made available to the general public or a large industrial group is owned by an organization that sells cloud services. • Hybrid cloud: Hybrid cloud is the infrastructure in the cloud that is a composition of two or more private, public or community clouds that remains as unique entities but united by standardized technology that allows the portability of data and applications, for example, cloudburst for charge. • Service layer: The service layer defines the basic services provided by cloud providers physical resource layer - it comprises of all the physical resources used to provide cloud services is the hardware and the facility. • Abstraction layer and resource control: In reality, resource abstraction and control layer means the software elements such as virtual machines, virtual data storage, hypervisor and supporting software components used to perform the infrastructure on the basis of which can establish the service in the cloud. • Portability: Portability is the ability of a system or software to run more than one operating system or to run on more than one type of computer. Alternatively, it is the ability to transfer data from one system to another without the need to modify significantly the application being transported or to re-create or re-enter data descriptions. • Interoperability: Interoperability is the ability to execute, communicate programs or transfer data under specific conditions between many different functional units. Provisioning/configuration is a process of preparing and equipping a cloud to allow it to provide new services to its customers. Mobile endpoints: A physical device, often carried by the user that provided a human or machine interface for applications and services in the cloud. • Fixed endpoints: A physical device, fixed in its location that provided a man or machine interface to cloud applications and services can use the multiple methods and protocols to connect to applications and services in the cloud. A fixed endpoint typically uses a single method and protocol to connect to cloud applications and services. Fourth level terms (Sub-component): • Data portability: Data portability is the ability to transfer data from one system to another without the need to significantly modify the application being transported or to recreate or re-enter the data descriptions service. • Interoperability: Interoperability is the capability to execute, to communicate programs or to transfer data under specified conditions among many different cloud services. • Portability of the system: The portability of the system is the capacity of a service to run in more than one type of cloud. • Rapid provisioning: Based on the requested resources/services/capabilities rapid provisioning is automatic deploying of cloud system. • Resource change: Adjust the resource/configuration assignment for updates, repairs and join new nodes to the cloud. • Monitoring and reporting: Discovering and monitoring the virtual resources, monitoring cloud events and operations and generating reports based on performance. • Measurement: Appropriate to the type of services, for example, processing, storage, bandwidth and user accounts (active), the measurement provides a measurement capacity at some level of abstraction. • SLA management: According to the defined policies the SLA management covers the SLA contract definition (basic scheme with service quality parameters), the SLA application and the SLA control.