SlideShare a Scribd company logo
1 of 59
Asmaa Ibrahim
3/17/20141
Part I: Fundamental Cloud
Computing
Fundamental Cloud Computing
3/17/20142
 Chapter 1: Understanding Cloud Computing
 Chapter 2: Fundamental Concepts and
Models
 Chapter 3: Cloud-Enabling Technology
 Chapter 4: Fundamental Cloud Security
Understanding Cloud Computing
3/17/20143
 Origins and Influences
 Basic Concepts and Terminology
A Brief History
3/17/20144
“As of now, computer
networks are still in their
infancy, but as they grow up
and become sophisticated, we
will probably see the spread of
„computer utilities‟ …”.
Leonard Kleinrock
A Brief History
3/17/20145
What is the next ??
3/17/20146
3/17/20147
Innovation
Technology
8
3/17/20149
 Cloud computing is a new way of
delivering computing resources, not
a new technology.
Why Cloud Computing?
3/17/201410
 Business Drivers
 Capacity Planning
 Organizational Agility
 Cost Reduction
 Technology Innovations
 Clustering
 Grid Computing
 Virtualization
Capacity planning
3/17/201411
Organizational Agility
3/17/201412
Cost Reduction
3/17/201413
Clustering
3/17/201414
3/17/201415
Grid Computing
3/17/201416
Virtualization
3/17/201417
 Let’s talk about virtualization in details.
Virtualization History
3/17/201418
Virtualization Principles
3/17/201419
Server virtualization separates
software from hardware.
The low-layer virtualization
software abstracts a virtual
hardware interface by means of
space segmentation, time
division, and emulation to
provide the upper-layer OSs
with an expected hardware
environment.
Virtualization architecture
3/17/201420
Virtualization Implementation
3/17/201421
 VMM virtualizes three types of physical
resources: CPU, memory, and I/O device. CPU
virtualization is the most important.
 We will go through:
 CPU virtualization
 memory virtualization
 I/O device virtualization
1- CPU Virtualization
3/17/201422
 Classical virtualization method
 The modern computer architecture offers at least two levels of
privilege (user mode and kernel mode) to isolate system
software from application programs
 x86 virtualization method
 The x86 architecture offers four levels of privilege known as
Ring 0, 1, 2, and 3. The x86 has the following sensitive
instructions:
1. Instructions used to access and modify machine state or VM state
2. Instructions that read or change sensitive registers, such as a clock
register or interrupt registers, or memory locations
3. Instructions that reference the storage protection system, memory, or
address relocation system (such as paging)
4. All I/O instructions
x86 virtualization method
3/17/201423
2- Memory Virtualization
3/17/201424
3- I/O Device Virtualization
3/17/201425
 The VMM virtualizes I/O devices to reuse limited I/O
resources. It intercepts requests when guest OSs
attempt to access I/O devices and then uses software
to emulate real hardware. There are three types of I/O
device virtualization methods: complete emulation on
interface, front-end and back-end emulation, and
direct allocation.
Technology Innovations vs. Enabling
Technologies
3/17/201426
 These are distinguished as cloud-enabling
technologies:
 Broadband Networks and Internet Architecture
 Data Center Technology
 (Modern) Virtualization Technology
 Web Technology
 Multitenant Technology
 Service Technology
Basic Concepts and Terminology
3/17/201427
Cloud
3/17/201428
 A Cloud refers to a distinct IT environment that is
designed for the purpose of remotely provisioning
scalable and measured IT resources.
Figure 1.1
The symbol used to denote the boundary
of a cloud environment.
IT Resource
3/17/201429
 An IT resource is a physical or virtual IT-related
artifact that can be either software based, such as a
virtual server or a custom software program, or
hardware-based, such as a physical server or a
network device (Figure 1.2).
Figure 1.2
Examples of common IT resources and their corresponding
symbols.
Figure 1.3
A cloud is hosting eight IT resources: three virtual servers, two cloud
services, and three storage devices.
3/17/201430
On-Premise
3/17/201431
 An on-premise IT resource can access and
interact with a cloud-based IT resource.
 An on-premise IT resource can be moved to a
cloud, thereby changing it to a cloud-based IT
resource.
 Redundant deployments of an IT resource can
exist in both on-premise and cloud-based
environments.
Scaling
3/17/201434
 Scaling, from an IT resource perspective,
represents the ability of the IT resource to handle
increased or decreased usage demands.
 The following are types of scaling:
 Horizontal Scaling – scaling out and scaling in
 Vertical Scaling – scaling up and scaling down
Horizontal Scaling
3/17/201435
Figure 1.4
An IT resource (Virtual Server A) is scaled out by adding more of the same
IT resources (Virtual Servers B and C).
Vertical Scaling
3/17/201436
Figure 1.5
An IT resource (a virtual server with two CPUs) is scaled up by
replacing it with a more powerful IT resource with increased capacity
for data storage (a physical server with four CPUs).
HS & VS comparison
3/17/201437
Service
3/17/201438
 From an implementation perspective, a service is
a software program that can be remotely invoked
via a published technical interface (or API)
referred to as a service contract.
 When a software program invoked and interacts
with a service, it is labeled as a service
consumer.
 Services acting as service consumers can invoke
other services. When two or more services
participates to complete a given task, the services
form a service composition.
 A service can reside on-premise or in a cloud. In
the latter case, I is further qualified as a cloud
service (as explained in the following Cloud
Service section).
Cloud Service
3/17/201439
 A cloud service is any IT resource that is made
remotely accessible via a cloud.
 Unlike other IT fields that fall under the service
technology umbrella—such as service- oriented
architecture—the term ―service‖ within the context
of cloud computing is especially broad.
A cloud service that exists as a virtual server is also being accessed from
outside of the cloud’s boundary (right). The cloud service on the right may
be accessed by a human user that has remotely logged on to the virtual
server.
3/17/201440
A cloud service with a published technical interface is being accessed by
a consumer outside of the cloud (left). The cloud service on the left is
likely being invoked by a consumer program that was designed to access
the cloud service’s published technical interface.
3/17/201441
Goals and Benefits from Cloud
Computing
3/17/201442
Benefits
3/17/201443
 Reduced Investments and Proportional Costs
 Increased Scalability
 Increased Availability and Reliability
Reduced Investments and
Proportional Costs
3/17/201444
 The most common economic rationale for investing in
cloud-based IT resources is in the reduction or
outright elimination of up-front IT investments, namely
hardware and software purchases and ownership
costs.
 A cloud’s Measured Usage characteristic represents a
feature-set that allows measured operational
expenditures (directly related to business
performance) to replace anticipated capital
expenditures. This is also referred to as proportional
costs.
Reduced Investments and
Proportional Costs
3/17/201445
 The Elimination or minimization of up-front
financial commitments allows enterprises to start
small and accordingly increase IT resource
allocation as required. Moreover, the reduction of
up-front capital expenses allows for the capital to
be redirected to the core business investment.
 IT professionals, and network bandwidth can be
obtained at lower costs, resulting in both
Reduced Investments and
Proportional Costs
3/17/201446
 Common measurable benefits to cloud
consumers include:
 On-demand access to pay-as-you-go computing
resources on a short-term basis (such as
processors by the hour), and the ability to release
these computing resources when they are no longer
needed.
 The perception of having unlimited computing
resources that are available on demand, thereby
reducing the need to prepare for provisioning.
 The ability to add or remove IT resources at a fine-
grained level, such as modifying available storage
disk space by single gigabyte increments.
 Abstraction of the infrastructure so applications are not
locked into devices or locations and can be easily
moved if needed.
Increased Scalability
3/17/201447
 A simple example of usage demand fluctuations throughout a 24
hour period is provided in Figure 3.8.
Figure 1.8
An example of an organization’s changing demand for an IT
resource over the course of a day.
Increased Availability and Reliability
3/17/201448
 The availability and reliability of IT resources are
directly associated with tangible business
benefits.
 A hallmark of the typical cloud environment is its
intrinsic ability to provide extensive support for
increasing the availability of a cloud-based IT
resource to minimize or even eliminate outages,
and for increasing its reliability so as to minimize
the impact of runtime failure conditions.
Increased Availability and Reliability
3/17/201449
Specifically:
 An IT resource with increased availability is
accessible for longer periods of time (for example,
22 hours out of a 24 hour day). Cloud providers
generally offer resilient‖ IT resources for which
they are able to guarantee high levels of
availability.
 An IT resource with increased reliability is able to
better avoid and recover from exception
conditions. The modular architecture of cloud
environments provides extensive failover support
that increases reliability.
Risks and Challenges
3/17/201450
Risks and Challenges
3/17/201451
 Increased Security Vulnerabilities
 Reduced Operational Governance Control
 Limited Portability Between Cloud Providers
 Multi-Regional Compliance and Legal Issue
Increased Security Vulnerabilities
3/17/201452
 The moving of business data to the cloud means
that the responsibility over data security becomes
shared with the cloud provider. The remote usage
of IT resources requires an expansion of trust
boundaries by the cloud consumer to include the
external cloud.
3/17/201453
Consider the following examples:
3/17/201454
 An unreliable cloud provider may not maintain
the guarantees it makes in the SLAs that were
published for its cloud services. This can
jeopardize the quality of the cloud consumer
solutions that rely on these cloud services.
 Longer geographic distances between the
cloud consumer and cloud provider can
require additional network hops that introduce
fluctuating latency and potential bandwidth
constraints.
Another Scenario
3/17/201455
Figure 1.10
An unreliable network connection compromises the quality of
communication between cloud consumer and cloud provider
environments. 3/17/201456
Limited Portability Between Cloud
Providers
3/17/201457
 Due to a lack of established industry
standards within the cloud computing industry,
public clouds are commonly proprietary to
various extents. For cloud consumers that
have custom-built solutions with
dependencies on these proprietary
environments, it can be challenging to move
from one cloud provider to another.
 Portability is a measure used to determine the
impact of moving cloud consumer IT
resources and data between clouds
Figure 1.11
A cloud consumer’s application has a decreased level of portability when assessing a potential migration from
Cloud A to Cloud B, because the cloud provider of Cloud B does not support the same security technologies
as Cloud A.
3/17/201458
Multi-Regional Compliance and
Legal Issues
3/17/201459
 Third-party cloud providers will frequently establish
data centers in affordable or convenient geographical
locations. Cloud consumers will often not be aware of
the physical location of their IT resources and data
when hosted by public clouds.
 For some organizations, this can pose serious legal
concerns pertaining to industry or government
regulations that specify data privacy and storage
policies.
 For example, some UK laws require personal data
belonging to UK citizens to be kept within the United
Kingdom.
Legal Issues
3/17/201460
 Another potential legal issue pertains to the
accessibility and disclosure of data.
 Countries have laws that require some types of data
to be disclosed to certain government agencies or to
the subject of the data.
 For example, a European cloud consumer’s data that
is located in the U.S. can be more easily accessed by
government agencies (due to the U.S. Patriot Act)
when compared to data located in many European
Union countries.
Activity
3/17/201461

More Related Content

What's hot

Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreementsCade Zvavanjanja
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutionMajid Hajibaba
 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 pptDr VISU P
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Rubal Sagwal
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computingRaj Sarode
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationVivek Ravindran
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Brian K. Dickard
 
Cloud computing
Cloud computingCloud computing
Cloud computingRam Sharma
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Robert Grossman
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material ccAnkit Gupta
 

What's hot (20)

Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 ppt
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Fundamental of cloud computing
Fundamental of cloud computingFundamental of cloud computing
Fundamental of cloud computing
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 
Cloud Computing Essentials
Cloud Computing EssentialsCloud Computing Essentials
Cloud Computing Essentials
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
 

Viewers also liked

Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptAsmaa Ibrahim
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud securityAsmaa Ibrahim
 
Cloud Computing: Some Basic Concepts
Cloud Computing: Some Basic ConceptsCloud Computing: Some Basic Concepts
Cloud Computing: Some Basic ConceptsYash Gupta
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)vvmenon22
 
What is Cloud computing?
What is Cloud computing?What is Cloud computing?
What is Cloud computing?Richard Harvey
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing IntroductionCraig Dickson
 
Scalability and Reliability in the Cloud
Scalability and Reliability in the CloudScalability and Reliability in the Cloud
Scalability and Reliability in the Cloudgmthomps
 
Everything about Cloud Computing
Everything about Cloud ComputingEverything about Cloud Computing
Everything about Cloud ComputingIDS Infotech
 
AWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computingAWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computingEuro IT Group
 
Aws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To KnowAws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To KnowScalr
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemReuven Lerner
 
Azure vs AWS Best Practices: What You Need to Know
Azure vs AWS Best Practices: What You Need to KnowAzure vs AWS Best Practices: What You Need to Know
Azure vs AWS Best Practices: What You Need to KnowRightScale
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingMicrosoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingIlyas F ☁☁☁
 

Viewers also liked (20)

Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise ppt
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Cloud Computing: Some Basic Concepts
Cloud Computing: Some Basic ConceptsCloud Computing: Some Basic Concepts
Cloud Computing: Some Basic Concepts
 
Hosing types
Hosing typesHosing types
Hosing types
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)
 
What is Cloud computing?
What is Cloud computing?What is Cloud computing?
What is Cloud computing?
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Scalability and Reliability in the Cloud
Scalability and Reliability in the CloudScalability and Reliability in the Cloud
Scalability and Reliability in the Cloud
 
Everything about Cloud Computing
Everything about Cloud ComputingEverything about Cloud Computing
Everything about Cloud Computing
 
AWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computingAWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computing
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Aws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To KnowAws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To Know
 
AWS vs. Azure
AWS vs. AzureAWS vs. Azure
AWS vs. Azure
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, Jerusalem
 
Azure vs AWS Best Practices: What You Need to Know
Azure vs AWS Best Practices: What You Need to KnowAzure vs AWS Best Practices: What You Need to Know
Azure vs AWS Best Practices: What You Need to Know
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingMicrosoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
 

Similar to Fundamental cloud computing

Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud ComputingMonica Rivera
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingSteven Wallach
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
B02120307013
B02120307013B02120307013
B02120307013theijes
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 

Similar to Fundamental cloud computing (20)

50120140503020
5012014050302050120140503020
50120140503020
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
V04405122126
V04405122126V04405122126
V04405122126
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
 
G017324043
G017324043G017324043
G017324043
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Availability in Cloud Computing
Availability in Cloud ComputingAvailability in Cloud Computing
Availability in Cloud Computing
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
B02120307013
B02120307013B02120307013
B02120307013
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 

Fundamental cloud computing

  • 1. Asmaa Ibrahim 3/17/20141 Part I: Fundamental Cloud Computing
  • 2. Fundamental Cloud Computing 3/17/20142  Chapter 1: Understanding Cloud Computing  Chapter 2: Fundamental Concepts and Models  Chapter 3: Cloud-Enabling Technology  Chapter 4: Fundamental Cloud Security
  • 3. Understanding Cloud Computing 3/17/20143  Origins and Influences  Basic Concepts and Terminology
  • 4. A Brief History 3/17/20144 “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of „computer utilities‟ …”. Leonard Kleinrock
  • 6. What is the next ?? 3/17/20146
  • 9. 3/17/20149  Cloud computing is a new way of delivering computing resources, not a new technology.
  • 10. Why Cloud Computing? 3/17/201410  Business Drivers  Capacity Planning  Organizational Agility  Cost Reduction  Technology Innovations  Clustering  Grid Computing  Virtualization
  • 17. Virtualization 3/17/201417  Let’s talk about virtualization in details.
  • 19. Virtualization Principles 3/17/201419 Server virtualization separates software from hardware. The low-layer virtualization software abstracts a virtual hardware interface by means of space segmentation, time division, and emulation to provide the upper-layer OSs with an expected hardware environment.
  • 21. Virtualization Implementation 3/17/201421  VMM virtualizes three types of physical resources: CPU, memory, and I/O device. CPU virtualization is the most important.  We will go through:  CPU virtualization  memory virtualization  I/O device virtualization
  • 22. 1- CPU Virtualization 3/17/201422  Classical virtualization method  The modern computer architecture offers at least two levels of privilege (user mode and kernel mode) to isolate system software from application programs  x86 virtualization method  The x86 architecture offers four levels of privilege known as Ring 0, 1, 2, and 3. The x86 has the following sensitive instructions: 1. Instructions used to access and modify machine state or VM state 2. Instructions that read or change sensitive registers, such as a clock register or interrupt registers, or memory locations 3. Instructions that reference the storage protection system, memory, or address relocation system (such as paging) 4. All I/O instructions
  • 25. 3- I/O Device Virtualization 3/17/201425  The VMM virtualizes I/O devices to reuse limited I/O resources. It intercepts requests when guest OSs attempt to access I/O devices and then uses software to emulate real hardware. There are three types of I/O device virtualization methods: complete emulation on interface, front-end and back-end emulation, and direct allocation.
  • 26. Technology Innovations vs. Enabling Technologies 3/17/201426  These are distinguished as cloud-enabling technologies:  Broadband Networks and Internet Architecture  Data Center Technology  (Modern) Virtualization Technology  Web Technology  Multitenant Technology  Service Technology
  • 27. Basic Concepts and Terminology 3/17/201427
  • 28. Cloud 3/17/201428  A Cloud refers to a distinct IT environment that is designed for the purpose of remotely provisioning scalable and measured IT resources. Figure 1.1 The symbol used to denote the boundary of a cloud environment.
  • 29. IT Resource 3/17/201429  An IT resource is a physical or virtual IT-related artifact that can be either software based, such as a virtual server or a custom software program, or hardware-based, such as a physical server or a network device (Figure 1.2). Figure 1.2 Examples of common IT resources and their corresponding symbols.
  • 30. Figure 1.3 A cloud is hosting eight IT resources: three virtual servers, two cloud services, and three storage devices. 3/17/201430
  • 31. On-Premise 3/17/201431  An on-premise IT resource can access and interact with a cloud-based IT resource.  An on-premise IT resource can be moved to a cloud, thereby changing it to a cloud-based IT resource.  Redundant deployments of an IT resource can exist in both on-premise and cloud-based environments.
  • 32. Scaling 3/17/201434  Scaling, from an IT resource perspective, represents the ability of the IT resource to handle increased or decreased usage demands.  The following are types of scaling:  Horizontal Scaling – scaling out and scaling in  Vertical Scaling – scaling up and scaling down
  • 33. Horizontal Scaling 3/17/201435 Figure 1.4 An IT resource (Virtual Server A) is scaled out by adding more of the same IT resources (Virtual Servers B and C).
  • 34. Vertical Scaling 3/17/201436 Figure 1.5 An IT resource (a virtual server with two CPUs) is scaled up by replacing it with a more powerful IT resource with increased capacity for data storage (a physical server with four CPUs).
  • 35. HS & VS comparison 3/17/201437
  • 36. Service 3/17/201438  From an implementation perspective, a service is a software program that can be remotely invoked via a published technical interface (or API) referred to as a service contract.  When a software program invoked and interacts with a service, it is labeled as a service consumer.  Services acting as service consumers can invoke other services. When two or more services participates to complete a given task, the services form a service composition.  A service can reside on-premise or in a cloud. In the latter case, I is further qualified as a cloud service (as explained in the following Cloud Service section).
  • 37. Cloud Service 3/17/201439  A cloud service is any IT resource that is made remotely accessible via a cloud.  Unlike other IT fields that fall under the service technology umbrella—such as service- oriented architecture—the term ―service‖ within the context of cloud computing is especially broad.
  • 38. A cloud service that exists as a virtual server is also being accessed from outside of the cloud’s boundary (right). The cloud service on the right may be accessed by a human user that has remotely logged on to the virtual server. 3/17/201440
  • 39. A cloud service with a published technical interface is being accessed by a consumer outside of the cloud (left). The cloud service on the left is likely being invoked by a consumer program that was designed to access the cloud service’s published technical interface. 3/17/201441
  • 40. Goals and Benefits from Cloud Computing 3/17/201442
  • 41. Benefits 3/17/201443  Reduced Investments and Proportional Costs  Increased Scalability  Increased Availability and Reliability
  • 42. Reduced Investments and Proportional Costs 3/17/201444  The most common economic rationale for investing in cloud-based IT resources is in the reduction or outright elimination of up-front IT investments, namely hardware and software purchases and ownership costs.  A cloud’s Measured Usage characteristic represents a feature-set that allows measured operational expenditures (directly related to business performance) to replace anticipated capital expenditures. This is also referred to as proportional costs.
  • 43. Reduced Investments and Proportional Costs 3/17/201445  The Elimination or minimization of up-front financial commitments allows enterprises to start small and accordingly increase IT resource allocation as required. Moreover, the reduction of up-front capital expenses allows for the capital to be redirected to the core business investment.  IT professionals, and network bandwidth can be obtained at lower costs, resulting in both
  • 44. Reduced Investments and Proportional Costs 3/17/201446  Common measurable benefits to cloud consumers include:  On-demand access to pay-as-you-go computing resources on a short-term basis (such as processors by the hour), and the ability to release these computing resources when they are no longer needed.  The perception of having unlimited computing resources that are available on demand, thereby reducing the need to prepare for provisioning.  The ability to add or remove IT resources at a fine- grained level, such as modifying available storage disk space by single gigabyte increments.  Abstraction of the infrastructure so applications are not locked into devices or locations and can be easily moved if needed.
  • 45. Increased Scalability 3/17/201447  A simple example of usage demand fluctuations throughout a 24 hour period is provided in Figure 3.8. Figure 1.8 An example of an organization’s changing demand for an IT resource over the course of a day.
  • 46. Increased Availability and Reliability 3/17/201448  The availability and reliability of IT resources are directly associated with tangible business benefits.  A hallmark of the typical cloud environment is its intrinsic ability to provide extensive support for increasing the availability of a cloud-based IT resource to minimize or even eliminate outages, and for increasing its reliability so as to minimize the impact of runtime failure conditions.
  • 47. Increased Availability and Reliability 3/17/201449 Specifically:  An IT resource with increased availability is accessible for longer periods of time (for example, 22 hours out of a 24 hour day). Cloud providers generally offer resilient‖ IT resources for which they are able to guarantee high levels of availability.  An IT resource with increased reliability is able to better avoid and recover from exception conditions. The modular architecture of cloud environments provides extensive failover support that increases reliability.
  • 49. Risks and Challenges 3/17/201451  Increased Security Vulnerabilities  Reduced Operational Governance Control  Limited Portability Between Cloud Providers  Multi-Regional Compliance and Legal Issue
  • 50. Increased Security Vulnerabilities 3/17/201452  The moving of business data to the cloud means that the responsibility over data security becomes shared with the cloud provider. The remote usage of IT resources requires an expansion of trust boundaries by the cloud consumer to include the external cloud.
  • 52. Consider the following examples: 3/17/201454  An unreliable cloud provider may not maintain the guarantees it makes in the SLAs that were published for its cloud services. This can jeopardize the quality of the cloud consumer solutions that rely on these cloud services.  Longer geographic distances between the cloud consumer and cloud provider can require additional network hops that introduce fluctuating latency and potential bandwidth constraints.
  • 54. Figure 1.10 An unreliable network connection compromises the quality of communication between cloud consumer and cloud provider environments. 3/17/201456
  • 55. Limited Portability Between Cloud Providers 3/17/201457  Due to a lack of established industry standards within the cloud computing industry, public clouds are commonly proprietary to various extents. For cloud consumers that have custom-built solutions with dependencies on these proprietary environments, it can be challenging to move from one cloud provider to another.  Portability is a measure used to determine the impact of moving cloud consumer IT resources and data between clouds
  • 56. Figure 1.11 A cloud consumer’s application has a decreased level of portability when assessing a potential migration from Cloud A to Cloud B, because the cloud provider of Cloud B does not support the same security technologies as Cloud A. 3/17/201458
  • 57. Multi-Regional Compliance and Legal Issues 3/17/201459  Third-party cloud providers will frequently establish data centers in affordable or convenient geographical locations. Cloud consumers will often not be aware of the physical location of their IT resources and data when hosted by public clouds.  For some organizations, this can pose serious legal concerns pertaining to industry or government regulations that specify data privacy and storage policies.  For example, some UK laws require personal data belonging to UK citizens to be kept within the United Kingdom.
  • 58. Legal Issues 3/17/201460  Another potential legal issue pertains to the accessibility and disclosure of data.  Countries have laws that require some types of data to be disclosed to certain government agencies or to the subject of the data.  For example, a European cloud consumer’s data that is located in the U.S. can be more easily accessed by government agencies (due to the U.S. Patriot Act) when compared to data located in many European Union countries.

Editor's Notes

  1. Before delving into the layers of technologies that underlie clouds, the motivations that led to their creation by industry leaders must first be understood. Several of the primary business drivers that fostered modern cloud-based technology are presented in this section.
  2. Capacity planning is the process of determining and fulfilling future demands of anorganization’s IT resources, products, and services. Within this context, capacity representsthe maximum amount of work that an IT resource is capable of delivering ina given period of time. A discrepancy between the capacity of an IT resource and itsdemand can result in a system becoming either inefficient (over-provisioning) or unable to fulfill user needs (under-provisioning). Capacity planning is focused on minimizingthis discrepancy to achieve predictable efficiency and performance.
  3. Organizational agility is the measure of an organization’sresponsiveness to change.An IT enterprise often needs to respond to business change by scaling its IT resourcesbeyond the scope of what was previously predicted or planned for. For example, infrastructuremay be subject to limitations that prevent the organization from respondingto usage fluctuations—even when anticipated—if previous capacity planning effortswere restricted by inadequate budgets.
  4. Two costs need to be accounted for: the cost of acquiring new infrastructure, and thecost of its ongoing ownership. Operational overhead represents a considerable share ofIT budgets, often exceeding up-front investment costs.
  5. Technology architectures and various interaction scenarios involving IT resources areillustrated in diagrams like the one shown in Figure 3.3. It is important to note the followingpoints when studying and working with these diagrams:• The IT resources shown within the boundary of a given cloud symbol usually donot represent all of the available IT resources hosted by that cloud. Subsets of ITresources are generally highlighted to demonstrate a particular topic.• Focusing on the relevant aspects of a topic requires many of these diagrams tointentionally provide abstracted views of the underlying technology architectures.This means that only a portion of the actual technical details are shown.
  6. key points as described above