The document outlines an agenda for a presentation on cloud computing. The presentation will cover understanding cloud computing concepts and boundaries, how to transform IT into a service, why cloud computing, applications enabled by cloud computing, challenges of cloud computing, key cloud attributes, IT as a service, cloud service models, types of clouds, software service models, and cloud security. The presentation is limited to 2 hours.
2. PAL
Purpose – To understand concepts and boundaries of Cloud Computing
Agenda
– Data
– What is Cloud Computing?
– How would you transform information technology into a Service?
– Why Cloud Computing?
– Applications Enabled by Cloud Computing
– Challenges
– Five Key Cloud Attributes
– IT as a Service
– Cloud Service Models
– The Cloud Stack
– Types of Clouds
– Software Service Models
– Cloud Security
Limit – 2 Hrs.
3/4/2013 Abdelmonim A. Osman 2
7. Big Data
Big data is defined as large pools of data that can be
captured, communicated, aggregated, stored, and
analyzed.
Data continues to grow:
– In mid-2010, the information universe carried 1.2
zettabytes and 2020 predictions expect nearly 44 times
more at 35 zettabytes coming our way.
Applications are becoming data-intensive.
3/4/2013 Abdelmonim A. Osman 7
8. Big Data
Data-intensive computing is a class of parallel
computing applications which use a data parallel
approach to processing large volumes of data
typically terabytes or petabytes in size and
typically referred to as Big Data.
Parallel computing is a form of computation in which many calculations are carried
out simultaneously, operating on the principle that large problems can often be
divided into smaller ones, which are then solved concurrently ("in parallel").
http://en.wikipedia.org/wiki/Data-intensive_computing
http://en.wikipedia.org/wiki/Parallel_computing
3/4/2013 Abdelmonim A. Osman 8
10. What Do We Do With Data?
Store Share
Access Process
…. and
Encrypt more!
We want to do these seamlessly...
3/4/2013 Abdelmonim A. Osman 10
11. Using Diverse Interfaces & Devices
Desktops
Mobile Devices
…and even appliances
Consumer Electronics
We also want to access, share and process our data
from all of our devices, anytime, anywhere!
3/4/2013 Abdelmonim A. Osman 11
12. What About the Future?
How will you…
…work on documents?
…get your news & info?
and share media? …navigate?
…communicate with …live in an intelligent
friends and family? home?
…
3/4/2013 Abdelmonim A. Osman 12
14. …How Will We Manage Our Data?
Manage it
• Personal, but time consuming.
ourselves?
How would you get • Would you keep it on your devices?
access to your data
wherever you are? • or would you keep it online?
What if it’s managed • and you can get this “service” for
by someone else? free or with a subscription?
3/4/2013 Abdelmonim A. Osman 14
15. Has this Happened Before?
Innovation Product Service
3/4/2013 Abdelmonim A. Osman 15
16. Think of it this Way …
Evolution of water Utility
Get a continuous
Generate your own Buy it as a product and supply of the utility
utility manage it through a dedicated
connection
3/4/2013 Abdelmonim A. Osman 16
17. How About Electricity?
Transformation from a Product to a Service
Innovation Product Service
New Disruptive Buy and Maintain Electric Grid, pay only
for the electricity you
Technology the Technology use
3/4/2013 Abdelmonim A. Osman 17
18. Disruptive Technology
A disruptive innovation or disruptive technology
– is an innovation that helps create a new market and value
network, and eventually goes on to disrupt an existing
market and value network (over a few years or decades),
displacing an earlier technology.
– The term is used in business and technology literature to
describe innovations that improve a product or service in
ways that the market does not expect, typically first by
designing for a different set of consumers in the new
market and later by lowering prices in the existing market.
http://en.wikipedia.org/wiki/Disruptive_innovation
3/4/2013 Abdelmonim A. Osman 18
19. …and Banking?
Evolution of Banking
Traditional Banking
No Banks
Banking Instruments Internet Banking
(Take care of your
(Give your money (Cheques / Credit (…more services)
own money )
to the bank) Cards)
3/4/2013 Abdelmonim A. Osman 19
20. So What is Cloud
Computing?
3/4/2013 Abdelmonim A. Osman 20
21. Can We Define Cloud Computing?
“Cloud Computing is the transformation of
IT from a product to a service”
Innovation Product Service
3/4/2013 Abdelmonim A. Osman 21
22. Cloud Computing
Transformation of IT from a Product to a Service
Innovation of IT IT Products Cloud Computing
New Disruptive Buy and Maintain On-Demand IT
services on a Pay-as
Technology the Technology You-Go basis
3/4/2013 Abdelmonim A. Osman 22
23. So… how would you transform
information technology into a
Service?
3/4/2013 Abdelmonim A. Osman 23
24. Requirements to Transform IT
to a Service
Connectivity Ease of Programmability
– For moving data around – Ease of development of
Interactivity complex services to users
– Seamless interfaces Manage Large Amounts
Reliability of Data
– Failure will affect many – Big Data
people, not just one
Performance Efficiency
– It should not be slower or – Cost
less efficient than what Power
people already have
Pay-as-you-Go Scalability & Elasticity
– Should not pay an upfront – Flexible and rapid response to
fee for the service changing user needs
3/4/2013 Abdelmonim A. Osman 24
25. Requirements to Transform IT
to a Service
Connectivity
Internet Ease of Programmability
– For moving data around –Programming Model of
Ease of development
Interactivity complex services to users
Web 2.0
– Seamless interfaces Manage Large Amounts
Reliability of Data
Storage Technologies
– Fault-Tolerance
Failure will affect many – Big Data
people, not just one
Performance Efficiency
– It should not be slower
Parallel / Distributedor – Cost
less efficient than what Power
Programming
people already have Virtualization Technologies
Pay-as-you-Go Scalability & Elasticity
Utility Computing
– Should not pay an upfront – Flexible and rapid response to
fee for the service changing user needs
3/4/2013 Abdelmonim A. Osman 25
26. Web 2.0 & Fault-Tolerant
The term Web 2.0 was coined in 1999 to describe
web sites that use technology beyond the static
pages of earlier web sites. http://en.wikipedia.org/wiki/Web_2.0
fault-tolerant is a design that enables a system to
continue operation, possibly at a reduced
level, rather than failing completely, when some part
of the system fails. http://en.wikipedia.org/wiki/Fault-tolerant_design
3/4/2013 Abdelmonim A. Osman 26
27. Parallel Programming & Utility Computing
Parallel computing is a form of computation in which
many calculations are carried out simultaneously,
operating on the principle that large problems can
often be divided into smaller ones, which are then
solved concurrently ("in parallel").
http://en.wikipedia.org/wiki/Parallel_programming
Utility computing is the packaging of computing
resources, such as computation, storage and
services, as a metered service. This model has the
advantage of a low or no initial cost to acquire
computer resources; instead, computational
resources are essentially rented.
http://en.wikipedia.org/wiki/Utility_computing
3/4/2013 Abdelmonim A. Osman 27
28. Virtualization
Virtualization, in computing, is a term that refers to
the various techniques, methods or approaches of
creating a virtual (rather than actual) version of
something, such as a virtual hardware platform,
operating system (OS), storage device, or network
resources. http://en.wikipedia.org/wiki/Virtualization
3/4/2013 Abdelmonim A. Osman 28
30. Cloud Computing
Think of it as Internet Computing
– Computation done over the Internet
• High Bandwidth
Enabling • High Speed Internet Cloud
• Virtualization Computing
Technologies
• Utility Computing
• …
3/4/2013 Abdelmonim A. Osman 30
31. for a more complete definition!
Cloud Computing is the
delivery of computing as a
service rather than a
product,
whereby shared
resources, software, and
information are provided to
computers and other
devices,
as a metered service over
a network.
3/4/2013 Abdelmonim A. Osman 31
32. Why Cloud Computing?
Pay-as-You-Go Simplified IT Scale quickly Flexible options Resource Carbon
economic model management and effortlessly • Configure software Utilization is Footprint
• Reduce capital • All you need is • Resources can be packages, instance improved decreased
expenditure access to the rented and released types operating
systems. • Reduce Idle • Sharing of resources
• No upfront cost internet. as required resources by sharing means less servers,
• Reduced Time to • It’s the providers • Software Controlled • Any software platform
and consolidation less power and less
Market responsibility to • Instant scalablility • Access from any emissions.
machine connected • Better utilization of
manage the details. CPU / Storage and
to the Internet
Bandwidth.
3/4/2013 Abdelmonim A. Osman 32
33. Applications Enabled by Cloud
Computing
High Growth Applications Aperiodic Bursting Applications
Startup Seasonal
Businesses Businesses
On-Off Applications Periodic Applications
Changing
Research computational
Computing patterns over
time
3/4/2013 Abdelmonim A. Osman 33
34. High Growth Applications
2001 2006
vs.
Growing exponentially
Could not keep up with the growth of
their number of users.
What do you do when your startup
gains traction?
3/4/2013 Abdelmonim A. Osman 34
35. High Growth Applications
Animoto traffic doubled for 3 days when released
as Facebook plug-in in April 2008
They could scale from 50 servers to 3500 and
go back down using cloud computing services
Users use it What do you do when your startup
to produce gains traction?
video pieces
from their When Animoto made its
photos,
video clips service available via
and music. Facebook, it experienced a
Animoto is a great demand surge that
example of leveraging Can you grow quick resulted in growing from
the cloud for its
enough? 50 servers to 3500 servers
strengths of instant in three days... After the
availability and virtually peak subsided, traffic fell
limitless scope. to a level that was well
below the peak’.
3/4/2013 Abdelmonim A. Osman 35
36. A periodic Bursting Applications
Website went down on 9/11/2001 due to traffic
February 14th – Busiest Day of the Year
US Holiday Season
Website crashed within 10 minutes of the free trouser
promotion during Superbowl 2010
Even if you design your website infrastructure to handle
peak loads, wont it be idle during other times?
3/4/2013 Abdelmonim A. Osman 36
37. On-Off Applications
Researchers running large-scale scientific
simulation using 1000s of computers.
Modern Drug Discovery
• Data-intensive simulation and tests to
discover new compounds
• Large compute power required for
simulation jobs
• Time to market is crucial
Why not rent computer time to run
these simulations?
3/4/2013 Abdelmonim A. Osman 37
38. Periodic Applications
Stock Market Analysis
• Different compuational requirements
over time
• Mine market data during the day.
• Process and Analyze at night.
Dynamic and Flexible infrastructure can
reduce costs and improve performance.
3/4/2013 Abdelmonim A. Osman 38
39. Technical Challenges
Programming is tricky but improving
Tools are continuously evolving
Moving large data is still expensive Security
Quality of Service
Green computing
Internet Dependence
3/4/2013 Abdelmonim A. Osman 39
40. Green computing
“The study and practice of designing, manufacturing,
using, and disposing of computers, servers, and
associated subsystems—such as monitors, printers,
storage devices, and networking and
communications systems — efficiently and effectively
with minimal or no impact on the environment.“
http://en.wikipedia.org/wiki/Green_computing
3/4/2013 Abdelmonim A. Osman 40
42. Non-Technical Challenges
Vendor Lock-In
– (Vendor lock-in is a situation in which a customer
using a product or service cannot easily transition to
a competitor’s product or service.)
Non-standardized
Security Risks Privacy
Legal
Service Level Agreements
– A service-level agreement (SLA) is a part of a service contract
where a service is formally defined.
3/4/2013 Abdelmonim A. Osman 42
44. Five Key Cloud Attributes
Five Key Cloud Attributes:
1. Shared / pooled resources
2. Broad network access
3. On-demand self-service
4. Scalable and elastic
5. Metered by use
3/4/2013 Abdelmonim A. Osman 44
45. Shared / Pooled Resources
Resources are drawn from a common pool
Common resources build economies of scale
Common infrastructure runs at high efficiency
3/4/2013 Abdelmonim A. Osman 45
46. Broad Network Access
Broad network access refers to resources
hosted in a private cloud network (operated
within a company's firewall) that are available
for access from a wide range of devices, such
as tablets, PCs, Macs and smartphones.
These resources are also accessible from a
wide range of locations that offer online
access.
3/4/2013 Abdelmonim A. Osman 46
47. Broad Network Access
Open standards and APIs
Almost always IP, HTTP, and REST
• Representational State Transfer (REST) is a style of software
architecture for distributed systems such as the World Wide Web.
Available from anywhere with an internet
connection
3/4/2013 Abdelmonim A. Osman 47
48. On-Demand Self-Service
Completely automated
Users abstracted from the implementation
Near real-time delivery (seconds or minutes)
Services accessed through a self-serve
web interface
3/4/2013 Abdelmonim A. Osman 48
49. Scalable and Elastic
Resources dynamically-allocated between
users
Additional resources dynamically-released
when needed
Fully automated
3/4/2013 Abdelmonim A. Osman 49
50. Metered by Use
Services are metered, like a utility
Users pay only for services used
Services can be cancelled at any time
3/4/2013 Abdelmonim A. Osman 50
51. A Cloud is …
A data center hardware and software that the
vendors use to offer the computing resources and
services
3/4/2013 Abdelmonim A. Osman 51
52. Cloud Computing
“Cloud Computing is the transformation of IT from a
product to a service”
Innovation Product Service
The “Cloud”
3/4/2013 Abdelmonim A. Osman 52
53. Cloud Computing
Cloud Computing is the
delivery of computing as a
service rather than a
product,
whereby shared
resources, software, and
information are provided to
computers and other
devices,
as a metered service over
a network.
3/4/2013 Abdelmonim A. Osman 53
54. IT as a Service
How do you offer IT as a service?
Different users have different needs
Consider the needs of:
– Average End User
– Mobile Application Developer
– Enterprise System Architect
Let us look at some of the typical service models
3/4/2013 Abdelmonim A. Osman 54
55. IT as a Service
3/4/2013 Abdelmonim A. Osman 55
57. SaaS
You are most familiar with this! SaaS
PaaS
Software is delivered as a IaaS
service over the Internet,
eliminating the need to install
and run the application on the
customer's own computer
This simplifies maintenance
and support
Examples: Gmail, YouTube, and
Google Docs, among others
3/4/2013 Abdelmonim A. Osman 57
59. PaaS
The Cloud provider exposes
a set of tools (a platform) SaaS
PaaS
which allows users to create
IaaS
SaaS applications
The SaaS application
runs on the provider’s
infrastructure
The cloud provider manages
the underlying hardware
and requirements
3/4/2013 Abdelmonim A. Osman 59
60. PaaS Example I
Google App Engine
3/4/2013 Abdelmonim A. Osman 60
61. PaaS Example I
Google App Engine (often referred to as GAE or
simply App Engine, and also used by the acronym
GAE/J) is a platform as a service (PaaS) cloud
computing platform for developing and hosting web
applications in Google-managed data centers.
http://en.wikipedia.org/wiki/Google_App_Engine
3/4/2013 Abdelmonim A. Osman 61
62. PaaS Example II
The Facebook Developer Platform
3/4/2013 Abdelmonim A. Osman 62
63. PaaS Example II
The Facebook Platform is a software environment
provided by the social networking service Facebook
for third-party developers to create their own
applications and services that access data in
Facebook.
http://en.wikipedia.org/wiki/Facebook_Platform
3/4/2013 Abdelmonim A. Osman 63
64. IaaS (1/3)
The cloud provider
leases to users Virtual
Machine Instances
(i.e., computer
infrastructure) using the
virtualization technology
The user has access to a
standard Operating
System environment
and can install and
configure all the layers
above it
3/4/2013 Abdelmonim A. Osman 64
71. Applications
Cloud applications can range
from Web applications to
Applications scientific computational jobs
Data
Runtime
Middleware
Operating System
Virtualization
Servers
Storage
Networking
3/4/2013 Abdelmonim A. Osman 71
72. Data
Data Management
New generation cloud-
Applications
Data
specific databases and
Runtime
Middleware
management systems
E.g., Hbase, Cassandra,
Operating System
Virtualization
Servers
Storage
Networking
Hive, Pig etc.
3/4/2013 Abdelmonim A. Osman 72
73. Runtime Environment
Runtime platforms to support
cloud programming models
Applications
Data
E.g., MPI, MapReduce,
Runtime
Middleware
Pregel etc.
Operating System
Virtualization
Servers
Storage
Networking
3/4/2013 Abdelmonim A. Osman 73
74. Middleware for Clouds
Management platforms that
enable:
Applications Resource Management
Data
Runtime
Middleware
Monitoring
Operating System
Virtualization
Provisioning
Servers
Storage Identity Management
Networking
and Security
3/4/2013 Abdelmonim A. Osman 74
75. Operating Systems
Standard Operating Systems
used in Personal Computing
Applications
Packaged with libraries and
Data software for quick deployment
Runtime
Middleware and provisioning
E.g., Amazon Machine Images
Operating System
Virtualization
Servers
Storage (AMI) contain OS as well as
Networking
required software packages as
a “snapshot” for instant
deployment
3/4/2013 Abdelmonim A. Osman 75
76. Virtualization
Key Component
Resource Virtualization
Applications
Data Amazon EC2 is based on the
Runtime
Middleware Xen virtualization platform
Operating System
Virtualization
Servers
Storage
Networking
3/4/2013 Abdelmonim A. Osman 76
77. Cloud Service Layers in the
Service Levels
Packaged IaaS PaaS SaaS
Software
User Managed
Applications Applications Applications Applications
User Managed
Data Data Data Data
Runtime Runtime Runtime Runtime
Vendor Managed
User Managed
Middleware Middleware Middleware
Vendor Managed
Middleware
Operating System Operating System Operating System Operating System
Vendor Managed
Virtualization Virtualization Virtualization Virtualization
Servers Servers Servers Servers
Storage Storage Storage Storage
Networking Networking Networking Networking
3/4/2013 Abdelmonim A. Osman 77
78. Types of Clouds (1/4)
Public
Private
Hybrid
3/4/2013 Abdelmonim A. Osman 78
79. Types of Clouds (2/4)
Public (external) cloud
– Open market for on demand computing and IT resources
– Concerns: Limited SLA (Service Level Agreement) ,
reliability, availability, security, trust and confidence
– Examples: IBM, Google, Amazon, …
3/4/2013 Abdelmonim A. Osman 79
80. Types of Clouds (3/4)
Private (Internal) cloud
– For enterprises/corporations with large scale IT
3/4/2013 Abdelmonim A. Osman 80
81. Types of Clouds (4/4)
Hybrid cloud
– Extend the private cloud(s) by connecting it to other
external cloud vendors to make use of their available cloud
services
3/4/2013 Abdelmonim A. Osman 81
83. Economics of Cloud Computing
Evolution of Software Service Models
What is the Value Proposition for Cloud
Computing?
How did Cloud Computing emerge from
business / industry rather than from
Academia?
3/4/2013 Abdelmonim A. Osman 83
84. Cost of Information Technology
When you are using IT there are three
primary costs associated with it:
– Software Cost (Media + License cost/user)
– Support Cost (Vendor Support, Updates and
Patches etc.)
– Management Cost (IT Infrastructure
costs, Manpower, etc.)
3/4/2013 Abdelmonim A. Osman 84
85. Traditional Model
Classical Model
Software provider develops software and charges a
license fee per user for the client
The provider may charge a support fee /user
The management of the software is the clients
responsibility
– Up to 4x the cost of the actual software per year!
– Infrastructure, Manpower, software maintenance
Traditional Software – Oracle etc.
3/4/2013 Abdelmonim A. Osman 85
86. Software Service Models
Traditional
$4000 /user
Software Cost
(one-time)
Support Cost $800 /user
/year
Up to 4x the
cost of
Management Cost
Software!
Deployment
Software deployment is all of the activities
Client Side
Location that make a software system available for use
3/4/2013 Abdelmonim A. Osman 86
87. Open Source Model
“Free” Model
Software provider packages Open Source Software
and provides it at little or no cost to the client
The provider makes money on support – charges a
higher fee than traditional model
The cost of Managing the software remains the same
as Traditional Model
– Up to 4x the cost of the actual software per year!
– Infrastructure, Manpower, software maintenance
3/4/2013 Abdelmonim A. Osman 87
88. Software Service Models
Open
Traditional
Source
$4000 /user
Software Cost $0 /user
(one-time)
Support Cost $800 /user $1600 /user
/year /year
Management Cost Up to 4x the cost of Software!
Deployment
Client Side
Location
3/4/2013 Abdelmonim A. Osman 88
89. Outsourcing Model
Primary cost of Software Management is in
Manpower
Why not delegate the management of
software to a country with cheaper labor costs
– India, China etc.
Outsource the management of software for a
flat fee – keep IT management costs under
control
3/4/2013 Abdelmonim A. Osman 89
90. Software Service Models
Open
Traditional Outsourcing
Source
$4000 /user $4000 /user
Software Cost $0 /user
(one-time) (one-time)
Support Cost $800 /user $1600 /user $800 /user
/year /year /year
< 1300 /user
Management Cost Up to 4x the cost of Software!
/month
Deployment Client or
Client Side Provider Side
Location
3/4/2013 Abdelmonim A. Osman 90
91. Hybrid and Hybrid+ Model
Business Software Requirements do not change often.
– ERP/Financials/CRM etc.
Why reinvent the wheel?
Standardize, Specialize and Repeat
– Create a flexible version of the Software that can be quickly
configured and deployed.
– Automate support through remote access.
Sell easy to deploy software to many clients.
– Decrease the Margin
– Increase the Customers
Hybrid+ is more advanced – charge a flat monthly fee for
the software, support and management
3/4/2013 Abdelmonim A. Osman 91
92. Software Service Models
Open
Traditional Outsourcing Hybrid Hybrid+
Source
$4000 /user $4000 /user $4000 /user
Software Cost $0 /user
(one-time) (one-time) (one-time)
Support Cost $800 /user $1600 /user $800 /user $800 /user $300 / user
/year /year /year /year month
Bid < 1300 $150 /user
Management Cost Up to 4x the cost of Software!
/user /month /month
Deployment Client or Provider Side
Client Side
Location
3/4/2013 Abdelmonim A. Osman 92
93. Software as a Service Cloud
Computing
Develop Web Application
Offer to customers over Internet
No deployment costs
Amortize Management and Support
costs over many clients
3/4/2013 Abdelmonim A. Osman 93
94. Software Service Models
Open
Traditional Outsourcing Hybrid Hybrid+ SaaS
Source
$4000 /user $4000 /user $4000 /user
Software Cost $0 /user
(one-time) (one-time) (one-time)
$800 /user $1600 /user $800 /user $800 /user $300 / user < $100 /user
Support Cost
/year /year /year /year month /month
Bid < 1300 $150 /user
Management Cost Up to 4x the cost of Software!
/user /month /month
Deployment Client or Provider Side Provider Side
Client Side
Location
3/4/2013 Abdelmonim A. Osman 94
96. Cloud Services as a % of IT
Worldwide IT Spending by Consumption Model
600
IT Cloud Services
On-Premise IT
Worldwide IT Spending ($ billion) 500
10%
44
400 5%
17
300 CAGR
26% 416
4%
200 359
100
0
Source: IDC, September 2009 2009 2013
3/4/2013 Abdelmonim A. Osman 96
97. Cloud Services Growth Impact
Sources of Incremental IT Spending Growth in 2013
Cloud vs. Traditional Products
3/4/2013 Abdelmonim A. Osman 97
100. Causes of Problems Associated
with Cloud Computing
Most security problems stem from:
– Loss of control
– Lack of trust (mechanisms)
– Multi-tenancy
These problems exist mainly in 3rd party
management models
– Self-managed clouds still have security issues, but not
related to above
3/4/2013 Abdelmonim A. Osman 100
101. Loss of Control in the Cloud
Consumer’s loss of control
– Data, applications, resources are located with provider
– User identity management is handled by the cloud
– User access control rules, security policies and
enforcement are managed by the cloud provider
– Consumer relies on provider to ensure
• Data security and privacy
• Resource availability
• Monitoring and repairing of services/resources
3/4/2013 Abdelmonim A. Osman 101
102. Lack of Trust in the Cloud
A brief deviation from the talk
– (But still related)
– Trusting a third party requires taking risks
Defining trust and risk
– Opposite sides of the same coin (J. Camp)
– People only trust when it pays (Economist’s view)
– Need for trust arises only in risky situations
Defunct third party management schemes
– Hard to balance trust and risk
– e.g. Key Escrow (Clipper chip)
– Is the cloud headed toward the same path?
3/4/2013 Abdelmonim A. Osman 102
103. Lack of Trust in the Cloud
Chiles and McMakin (1996) define trust as increasing
one’s vulnerability to the risk of opportunistic
behavior of another whose behavior is not under
one’s control in a situation in which the costs of
violating the trust are greater than the benefits of
upholding the trust.
Trust here means mostly lack of accountability and
verifiability
3/4/2013 Abdelmonim A. Osman 103
104. Multi-tenancy Issues in the Cloud
Who are my neighbors?
What is their objective?
They present another facet of risk and trust
requirements
3/4/2013 Abdelmonim A. Osman 104
105. Multi-tenancy Issues in the Cloud
Conflict between tenants’ opposing goals
– Tenants share a pool of resources and have opposing goals
How does multi-tenancy deal with conflict of
interest?
– Can tenants get along together and ‘play nicely’ ?
– If they can’t, can we isolate them?
How to provide separation between tenants?
Cloud Computing brings new threats
– Multiple independent users share the same physical
infrastructure
– Thus an attacker can legitimately be in the same physical
machine as the target
3/4/2013 Abdelmonim A. Osman 105
107. References
Tom White, Hadoop: The Definitive Guide (2nd
Edition), O'Reilly Media, 2010
James E. Smith and Ravi Nair, Virtual Machines :
Versatile Platforms for Systems and Processes,
Morgan Kauffman, 2005
Jurg van Vilet and Flavia Paganelli, Programming
Amazon EC2, O'Reilly Media, 2011
3/4/2013 Abdelmonim A. Osman 107
108. References
Jothy Rosenberg and Arthur Mateos, The Cloud at
Your Service, Manning Publications, 2010
Research in Cloud Security and Privacy Bharat
Bhargava, Anya Kim and YounSun Cho
– www.cs.purdue.edu/homes/bb/cloud/cloud-complete.ppt
http://en.wikipedia.org/
3/4/2013 Abdelmonim A. Osman 108
109. References
Cloud Computing 2010 An IDC Update
– http://www.slideshare.net/monimawad/savedfiles?s_title
=cloud-computing-2010-an-idc-
update&user_login=JorFigOr
Carnegie Mellon University Qatar
– http://www.qatar.cmu.edu
3/4/2013 Abdelmonim A. Osman 109