08448380779 Call Girls In Friends Colony Women Seeking Men
Business implementation of Cloud Computing
1. Business implementation and Security Concerns of “Cloud
Computing”
Qaid Johar Abbasi Sodawala, Rahul Telang, (MCA II Year)
& Prof. Sham S. Malgikar, Asst Professor
JSPM’s Jayawant Institute of Computer Application, Tathawade, Pune.
Mail: shammalgikar@gmail.com,quaidjohar.sodawala@gmail.com
Abstract:
Cloud computing is boasted as the next big thing in enterprise IT. The
corporate data centers and on premise software will not shed their light soon but
"the clouds" will have growing impact on enterprise IT and business activities in
many small and large organizations.
The paper attempts to explore the corporate implementation of cloud
computing and in how many ways it can be done. Also a very concerning issues
regarding cloud computing security are discussed.
-------------------------------------------------------------------------------------------------------------
Introduction:
computing can be understood as more of a
Few years back when internet was just service rather than a product.
born, business activities moved at very slow
pace. Now in twenty first century the pace What is cloud computing?
of business is much quicker and it continues
to increase as the constant stream of new Cloud computing is an emerging
technologies make their way to stimulate computing model by which users can gain
business processes. access to their applications from anywhere,
through any connected device. A user-
Cloud as a metaphor for "internet" is a
centric interface makes the cloud
combination of various servers and
infrastructure supporting the applications
networks which is under veil to provide
transparent to users. The applications
services like computation, software, data
reside in massively scalable data centers
access and storage to end user hiding its
where computational resources can be
actual physical location and configuration of
dynamically provisioned and shared to
the system that delivers the service. Cloud
2. achieve significant scalability. A strong resources are optimally leveraged to
service management platform is build, so provide innovative services over the Web,
that management costs of adding more IT and servers are provisioned in accordance
resources to the cloud can be significantly with the logical needs of the service using
lower than those associated with alternate advanced, automated tools. The cloud then
infrastructures. enables the service creators, program
administrators and others to use these
Why cloud: services via a Web-based interface that
abstracts away the complexity of the
1. Scalability:
underlying dynamic infrastructure.
Servers can easily grow or shrink as
per demand The infrastructure management
methodology enables IT organizations to
2. Cost: manage large numbers of highly virtualized
It helps keep the cost down for both resources as a single large resource. It also
the users and website owners. Also
allows IT organizations to massively
for the users, they can access it from
any computer and still have the file increase their data center resources
they need. For the owners, they do without significantly increasing the number
not need to reproduce the software of people traditionally required to maintain
and ship it out. They just rent the that increase.
server space.
For organizations currently using
3. Instant: traditional infrastructures, a cloud will
The scalability can be achieved enable users to consume IT resources in the
instantly. It’s like controlling light data center in ways that were never
brightness by regulator. available before. Companies that employ
4. Mobility: traditional data center management
User can access their data practices know that making IT resources
anywhere. available to an end user can be time-
intensive. It involves many steps, such as
procuring hardware; finding raised floor
space and sufficient power and cooling;
Business value of cloud computing:
allocating administrators to install operating
systems, middleware and software;
Cloud computing is both a business
provisioning the network; and securing the
delivery model and an infrastructure environment. Most companies find that this
management methodology. The business process can take upwards of two to three
delivery model provides a user experience months. Those IT organizations that are re-
by which hardware, software and network provisioning existing hardware resources
3. find that it still takes several weeks to distinguish between grid computing and
accomplish. A cloud dramatically alleviates cloud computing.
this problem by implementing automation,
In the 1990s, the concept of virtualization
business workflow and resource abstraction
was expanded beyond virtual servers to
that allows a user to browse a catalog of IT
higher levels of abstraction—the virtual
services, add them to a shopping cart and
platform, including storage and network
submit the order. After an administrator
resources. Utility computing offered
approves the order, the cloud does the rest.
clusters as virtual platforms for computing
This process reduces the time required to
with a metered business model. More
make those resources available to the
recently software as a service (SaaS) has
customer from months to minutes.
raised the level of virtualization to the
Evolution: application, with a business model of
charging not by the resources consumed
Cloud computing is an important but by the value of the application to
subscribers.
topic. However, it is not a revolutionary
new development, but an evolution that The concept of cloud computing has
has taken place over several decades. evolved from the concepts of grid, utility
and SaaS. It is an emerging model through
The trend toward cloud computing
which users can gain access to their
started in the late 1980s with the concept
applications from anywhere, at any time,
of grid computing when, for the first time, a
through their connected devices.
large number of systems were applied to a
single Cloud computing Models:
Basically there are three types of cloud
computing models which are:
1. Public.
2. Private.
3. Hybrid.
Each type of cloud computing
model—public, private or hybrid—
faces different levels of IT risk.
Problem, usually scientific in nature and In the private cloud delivery
requiring exceptionally high levels of model, the cloud owner does not
parallel computation. it’s important to share resources with any other
4. company. Private clouds are owned security and privacy with a minimum
and operated by a single investment in fixed IT costs.
organization, delivering IT services
within the constraints of their own Cloud Service models:
network perimeter.
In addition to the different cloud
In the public cloud computing models, there are distinctions
computing model, IT activities and among the most common cloud service
functions are provided as a service models as shown in Figure. Available to
that can be billed on a pay-per-use anyone with Internet access, cloud service
or subscription basis via the Internet models include:
from external suppliers, using
resources not owned by the
consumer. The sharing of IT
resources in a public, multitenant
environment can help improve
utilization rates and can reduce
costs significantly while maintaining
access to high quality technology. In
a public cloud, an organization rents
IT resources instead of having to
invest in their own physical IT
infrastructure or maintain under-
● Software as a Service (SaaS) cloud
utilized equipment to service peak
model—Enables software to be delivered
loads. Instead, they can scale usage
from a host source over a network as
up or down, according to need, with
opposed to installations or implementations
costs directly proportional to need.
● Platform as a Service (PaaS) cloud
Many organizations embrace
model—Enables operating systems and
both public and private cloud
middleware services to be delivered from a
computing by integrating the two
managed source over a network
models into hybrid clouds. These
hybrids are designed to meet ● Infrastructure as a Service (IaaS) cloud
specific business and technology model—Enables the entire infrastructure to
requirements, so that activities and be delivered as a service over a network,
tasks are allocated to traditional IT, including storage, routers, virtual systems,
external or internal clouds, as hardware and servers.
appropriate, helping to optimize
5. Cloud computing and security: the cloud provider to deliver secure systems.
grand challenge: The clients do not have access to the
hypervisor layer—the underlying operating
While cloud computing models are system that manages one or more virtual
machines that run on a physical machine—
attractive because of their flexibility and
which typically does not share the virtual
cost effectiveness, certain challenges must
network segment with any of the other
be addressed in order to provide a viable
hosted virtual machines to avoid network-
option to traditional data services. First and
based intrusions. The cloud provider may
foremost is the issue of security. The
also separately offer an optional virtual
externalized aspect of outsourcing can
private network (VPN) capability so that the
make it harder to maintain data integrity
client can help ensure a protected network
and privacy, support data and service
that is not directly visible for Internet-based
availability, demonstrate compliance, and
attackers. It is the client’s responsibility to
secure highly available access to
maintain the patch level for all provisioned
applications and information. In short,
virtual machines after the initial
cloud computing can present an added level
deployment as well as a properly configured
of risk.
VPN to shield their valuable data and
Although cloud computing can shift some infrastructure. If a client, however, chooses
control over data and operations from the to refrain from purchasing a VPN option or
client organization to its cloud provider does not patch any of their web facing
much in the same way organizations entrust virtual machines, the machines can be
part of their IT operations to outsourcing vulnerable.
companies—operating a secure cloud-
If an organization decides to implement
based IT environment is, after all, a shared
these mechanisms in a private cloud using
responsibility. Even basic tasks, such as
their internal IT department, they will rely
applying patches and configuring network
on their business policies to govern aspects
security, are the responsibility of both the
like data confidentiality, access control to
cloud service provider and consumer. Let us
applications and systems, and so on.
examine an example for both public and
Employees will be entrusted to handle the
private cloud.
IT infrastructure because they are
In an IaaS model it is the cloud provider’s recertified against the business policies on
responsibility to offer a number of pre- a regular basis. In this environment
configured virtual machines that constantly organizations have to deal with the risk of
have to be kept updated with the latest unauthorized privileged user access, data
security patches. When clients provision the loss prevention, malicious intrusions and
virtual machines, they have to trust the unintentional user errors. They also have to
observe and comply with internal or
6. regulatory guidelines. If the organization a public cloud deployment, and that
decides to implement these mechanisms in contracts are in place to guarantee localized
a public cloud using the cloud provider data storage.
discussed in the example above, they will
rely on written business agreements to Reference:
govern the exact same aspects, as explained Web reference:
in the private cloud example. They also
have to deal with the same risks and comply http://www.ibm.com/cloud-computing/us/en/
with the same internal or regulatory
www.wikipedia.org
guidelines.
http://thecloudtutorial.com/cloudtypes.html
Other aspects about cloud computing also
require a major reassessment of security
and risk. Inside the cloud, it is often difficult
to physically locate where data is stored.
Security processes that were once visible
are now hidden behind layers of
abstraction. This lack of visibility can create
a number of security and compliance issues
and may prohibit certain IT use cases to be
implemented using a strictly public cloud
environment. Clients need to ensure that
they can select a physical location even for