SlideShare a Scribd company logo
NIST Cloud Computing Reference Architecture
1. Background

NIST : The goal is to accelerate the federal
government’s adoption of secure and effective
cloud computing to reduce costs and improve
services.
NIST working group

- Cloud Computing Target Business Use Cases
- Cloud Computing Reference Architecture and Taxonomy
- Cloud Computing Standards Roadmap
- Cloud Computing SAJACC (Standards Acceleration to
Jumpstart the Adoption of Cloud Computing)
- Cloud Computing Security
2. Objectives
Provides a simple and unambiguous taxonomy of
three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and
Hybrid cloud)
Provides a unifying view of five essential
characteristics
- On-demand self-service
- Broad network access
- Resource pooling
- Rapid elasticity
- Measured service
The project team developed a Strawman
model of architectural concepts
3. Cloud Computing Reference Architecture

Figure 1: The Conceptual Reference Model
Figure 2: Interactions between the Actors in Cloud Computing
(dedicated and encrypted connection)

(capability, flexibility and functionality)
Cloud Consumer
Cloud Provider

Figure 7: Cloud Provider - Major Activities
Cloud Auditor => security controls, privacy impact,
performance
Cloud Broker => intermediation, aggregation,
arbitrage
Cloud Carrier
provides connectivity and transport of cloud
services between cloud consumers and cloud
providers (network, telecommunication, access
devices )
Figure 17: Cloud Taxonomy

More Related Content

What's hot

Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
Abhishek Dey
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
Software Park Thailand
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
Jacob Zvirikuzhe
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
pradeepas7
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
Kartik Kalpande Patil
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
mrzahidfaiz.blogspot.com
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
kumari36
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
ishapadhy
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computing
hrmalik20
 
On demand provisioning
On demand provisioningOn demand provisioning
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
Abdelkhalik Mosa
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
Ripal Ranpara
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
gaurav jain
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
Raj Raj
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
Burhan Ahmed
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
Dr Neelesh Jain
 

What's hot (20)

Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computing
 
On demand provisioning
On demand provisioningOn demand provisioning
On demand provisioning
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
 

Similar to NIST Cloud Computing Reference Architecture

Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Prateek Maurya
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Nigga
sudhanshu345mishra
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
AslamHossain30
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
Violet Violet
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
Dr. Radhey Shyam
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG
Bob Marcus
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ajay Paratmandali
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ijccsa
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
IRJET Journal
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
Vivek Ravindran
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Editor Jacotech
 
Feet On The Ground Head In The Cloud
Feet On The Ground Head In The CloudFeet On The Ground Head In The Cloud
Feet On The Ground Head In The Clouddchmielewski
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computingkevnikool
 

Similar to NIST Cloud Computing Reference Architecture (20)

Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Nigga
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
 
Scheduling in CCE
Scheduling in CCEScheduling in CCE
Scheduling in CCE
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG
 
internship paper
internship paperinternship paper
internship paper
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
Feet On The Ground Head In The Cloud
Feet On The Ground Head In The CloudFeet On The Ground Head In The Cloud
Feet On The Ground Head In The Cloud
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 

More from Thanakrit Lersmethasakul

CHAMPSPACE: Living as a Champion
CHAMPSPACE: Living as a ChampionCHAMPSPACE: Living as a Champion
CHAMPSPACE: Living as a Champion
Thanakrit Lersmethasakul
 
CHAMPSPACE: Living as a Champion (Draft)
CHAMPSPACE: Living as a Champion (Draft)CHAMPSPACE: Living as a Champion (Draft)
CHAMPSPACE: Living as a Champion (Draft)
Thanakrit Lersmethasakul
 
Doing Business on Modern Trade Era
Doing Business on Modern Trade EraDoing Business on Modern Trade Era
Doing Business on Modern Trade Era
Thanakrit Lersmethasakul
 
Integrated Life Architecture (Draft)
Integrated Life Architecture (Draft)Integrated Life Architecture (Draft)
Integrated Life Architecture (Draft)
Thanakrit Lersmethasakul
 
Roadmap, roadmapping, roadmapper, roadmappee and roadmapware
Roadmap, roadmapping, roadmapper, roadmappee and roadmapwareRoadmap, roadmapping, roadmapper, roadmappee and roadmapware
Roadmap, roadmapping, roadmapper, roadmappee and roadmapware
Thanakrit Lersmethasakul
 
Scenario Planning
Scenario PlanningScenario Planning
Scenario Planning
Thanakrit Lersmethasakul
 
Organizational cultures II
Organizational cultures IIOrganizational cultures II
Organizational cultures II
Thanakrit Lersmethasakul
 
Organizational cultures I
Organizational cultures IOrganizational cultures I
Organizational cultures I
Thanakrit Lersmethasakul
 
Core Concept: Software Defined Everything
Core Concept: Software Defined EverythingCore Concept: Software Defined Everything
Core Concept: Software Defined Everything
Thanakrit Lersmethasakul
 
How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?
Thanakrit Lersmethasakul
 
Epigram Collection
Epigram CollectionEpigram Collection
Epigram Collection
Thanakrit Lersmethasakul
 
Algorithmic Trading
Algorithmic TradingAlgorithmic Trading
Algorithmic Trading
Thanakrit Lersmethasakul
 
Doing Business Index
Doing Business IndexDoing Business Index
Doing Business Index
Thanakrit Lersmethasakul
 
Web-based Design for the status of a Technology Roadmap
Web-based Design for the status of a Technology RoadmapWeb-based Design for the status of a Technology Roadmap
Web-based Design for the status of a Technology Roadmap
Thanakrit Lersmethasakul
 
National Innovation Systems
National Innovation SystemsNational Innovation Systems
National Innovation Systems
Thanakrit Lersmethasakul
 
Innovation Systems
Innovation SystemsInnovation Systems
Innovation Systems
Thanakrit Lersmethasakul
 
National Innovation Systems
National Innovation SystemsNational Innovation Systems
National Innovation Systems
Thanakrit Lersmethasakul
 
LEGO Serious Play
LEGO Serious PlayLEGO Serious Play
LEGO Serious Play
Thanakrit Lersmethasakul
 
Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]
Thanakrit Lersmethasakul
 
Why What How in Sense of CRM
Why What How in Sense of CRMWhy What How in Sense of CRM
Why What How in Sense of CRM
Thanakrit Lersmethasakul
 

More from Thanakrit Lersmethasakul (20)

CHAMPSPACE: Living as a Champion
CHAMPSPACE: Living as a ChampionCHAMPSPACE: Living as a Champion
CHAMPSPACE: Living as a Champion
 
CHAMPSPACE: Living as a Champion (Draft)
CHAMPSPACE: Living as a Champion (Draft)CHAMPSPACE: Living as a Champion (Draft)
CHAMPSPACE: Living as a Champion (Draft)
 
Doing Business on Modern Trade Era
Doing Business on Modern Trade EraDoing Business on Modern Trade Era
Doing Business on Modern Trade Era
 
Integrated Life Architecture (Draft)
Integrated Life Architecture (Draft)Integrated Life Architecture (Draft)
Integrated Life Architecture (Draft)
 
Roadmap, roadmapping, roadmapper, roadmappee and roadmapware
Roadmap, roadmapping, roadmapper, roadmappee and roadmapwareRoadmap, roadmapping, roadmapper, roadmappee and roadmapware
Roadmap, roadmapping, roadmapper, roadmappee and roadmapware
 
Scenario Planning
Scenario PlanningScenario Planning
Scenario Planning
 
Organizational cultures II
Organizational cultures IIOrganizational cultures II
Organizational cultures II
 
Organizational cultures I
Organizational cultures IOrganizational cultures I
Organizational cultures I
 
Core Concept: Software Defined Everything
Core Concept: Software Defined EverythingCore Concept: Software Defined Everything
Core Concept: Software Defined Everything
 
How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?
 
Epigram Collection
Epigram CollectionEpigram Collection
Epigram Collection
 
Algorithmic Trading
Algorithmic TradingAlgorithmic Trading
Algorithmic Trading
 
Doing Business Index
Doing Business IndexDoing Business Index
Doing Business Index
 
Web-based Design for the status of a Technology Roadmap
Web-based Design for the status of a Technology RoadmapWeb-based Design for the status of a Technology Roadmap
Web-based Design for the status of a Technology Roadmap
 
National Innovation Systems
National Innovation SystemsNational Innovation Systems
National Innovation Systems
 
Innovation Systems
Innovation SystemsInnovation Systems
Innovation Systems
 
National Innovation Systems
National Innovation SystemsNational Innovation Systems
National Innovation Systems
 
LEGO Serious Play
LEGO Serious PlayLEGO Serious Play
LEGO Serious Play
 
Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]
 
Why What How in Sense of CRM
Why What How in Sense of CRMWhy What How in Sense of CRM
Why What How in Sense of CRM
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

NIST Cloud Computing Reference Architecture

  • 1. NIST Cloud Computing Reference Architecture
  • 2. 1. Background NIST : The goal is to accelerate the federal government’s adoption of secure and effective cloud computing to reduce costs and improve services.
  • 3. NIST working group - Cloud Computing Target Business Use Cases - Cloud Computing Reference Architecture and Taxonomy - Cloud Computing Standards Roadmap - Cloud Computing SAJACC (Standards Acceleration to Jumpstart the Adoption of Cloud Computing) - Cloud Computing Security
  • 4. 2. Objectives Provides a simple and unambiguous taxonomy of three service models - Software as a service (SaaS) - Platform as a service (PaaS) - Infrastructure as a service (IaaS) (Private cloud, Community cloud, Public cloud, and Hybrid cloud)
  • 5. Provides a unifying view of five essential characteristics - On-demand self-service - Broad network access - Resource pooling - Rapid elasticity - Measured service The project team developed a Strawman model of architectural concepts
  • 6. 3. Cloud Computing Reference Architecture Figure 1: The Conceptual Reference Model
  • 7. Figure 2: Interactions between the Actors in Cloud Computing
  • 8. (dedicated and encrypted connection) (capability, flexibility and functionality)
  • 10. Cloud Provider Figure 7: Cloud Provider - Major Activities
  • 11. Cloud Auditor => security controls, privacy impact, performance Cloud Broker => intermediation, aggregation, arbitrage
  • 12. Cloud Carrier provides connectivity and transport of cloud services between cloud consumers and cloud providers (network, telecommunication, access devices )
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Figure 17: Cloud Taxonomy