On National Teacher Day, meet the 2024-25 Kenan Fellows
Cloud computing
1. Cloud
Computing
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
Shree Manibhai Virani and
Smt. Navalben Virani Science
College, Rajkot
(Autonomous)
Affiliated to Saurashtra
University, Rajkot
04/03/17 1
Module:1.1
Overview of Computing Paradigm
2. What is Computing
• The process of utilizing computer technology to complete a task.
Computing may involve computer hardware and/or software, but must
involve some form of a computer system.
• Computing includes
• designing,
• developing and
• building hardware and software systems;
• processing,
• structuring, and managing various kinds of information;
• doing scientific research on and with computers;
• entertainment media.
3. Grid computing
• Grid computing involves connecting geographically remote
computers into a single network to create a virtual
supercomputer by combining the computational power of all
computers on grid.
4. • "the Grid"links together computing resources (PCs,
workstations, servers, storage elements) and provides the
mechanism needed to access them.
• By implementing our proposed Intranet Grid it is very easy to
download multiple files very fast
• No need to worry about the security as we are authenticating
each and every step taking place in our Grid
• In particular user to access the database. Further
implementations could be carried out in the nearest future
Grid computing
5. WHY GRID COMPUTING?
40%Mainframes are idle
90%Unix servers are idle
95%PC servers are idle
0-15%Mainframes are idle in peak-hour
70%PC servers are idle in peak-hour
6. • Cluster computing is a form of computing in which a group of
computers are linked together so they can act like a single entity.
• It is the technique of linking two or more computers into a
network(Usually through a local area network)in order to take
advantage of the parallel processing power of those computers.
Cluster Computing
7. Cluster Application
• Google Search Engine
• Earthquake Simulation Software
• Image Rendering
• Weather Forecasting
Application Benefits
• High processing power
• Cost Efficient
• High Availability
• Fault Tolerance
8.
9. Distributed Computing
• It’s the solution to the problem
where your RAM is too small and
your data are too big and/or too
CPU-intensive to be processed on a
single machine.
• It split a big task into smaller tasks
and execute them on multiple
machines
10. Advantages Of Distributed
Computing System
• Inherently Distributed applications:
several applications are inherently distributed in nature and require distributed
computing system for their realization
• Information Sharing among Distributed Users:
In a distributed computing system, information generated by one of the users can
be easily and efficiently shared by the users working at other nodes of the
system .The use of distributed computing systems by a group of users to work
cooperatively is known as computer-supported cooperative working (CSCW), or
groupware .
• Resource Sharing:
Information is not the only thing that can be shared in a distributed computing
system. Sharing of software resources such as software libraries and databases as
well as hardware resources such as printers, hard disks, and plotters can also be
done in a very effective way among all the computers and the users of a single
distributed computing system.
11. Utility Computing
• Utility computing is a service provisioning model in which a service
provider makes computing resources and infrastructure management
available to the customer as needed, and charges them for specific usage
rather than a flat rate.
• Like other types of on-demand computing (such as grid computing), the
utility model seeks to maximize the efficient use of resources and/or
minimize associated costs.
15. Evolution of Cloud Computing
• Solving large
problems with
parallel computing
• Network-based
subscriptions to
applications• Offering computing
resources as a
metered service
• Anytime, anywhere
access to virtualized
IT resources
delivered
dynamically as a
service.
Software as a Service
Utility Computing
Cloud Computing
Grid Computing
Abstraction –> Simplification -> Capability Aggregation
16. Business Drivers for Cloud
Business growth
• Business growth is one of the top benefits organisations realise as a result of cloud adoption,
with 52% of enterprises reporting increased growth since going cloud (2015 Cloud Enterprise
Report).
2. Efficiency
• Efficiency is an extremely common cloud driver, with 71% of organisations worldwide
ranking it a top area they hope to approve through cloud technology (2015 Cloud Enterprise
Report).
3. Experience
• Next among the business drivers is improving the quality of the customer experience, which
45% of enterprises worldwide rank as a top cloud driver (although that number jumps to 61%
looking at only organisations in the UK and Australia).
4. Assurance
• Finally, there is assurance, which is the idea that data will be more secure in the cloud and
the user will attain better uptime because its solutions are maintained by providers that have
built their businesses around these competencies.
21. Cloud
Computing
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
Shree Manibhai Virani and
Smt. Navalben Virani Science
College, Rajkot
(Autonomous)
Affiliated to Saurashtra
University, Rajkot
04/03/17 21
Module:1.2
Introduction to Cloud Computing
22. Cloud Computing
• Cloud computing refers to applications and services that run on a
distributed network using virtualized resources and accessed by
common Internet protocols and networking standards.
• Cloud computing takes the technology, services, and applications that
are similar to those on the Internet and turns them into a self-service
utility. The use of the word “cloud” makes reference to the two
essential concepts:
23. Cloud Computing
• Abstraction: Cloud computing abstracts the details of system
implementation from users and developers. Applications run on
physical systems that aren't specified, data is stored in locations that
are unknown, administration of systems is outsourced to others, and
access by users is ubiquitous.
• Virtualization: Cloud computing virtualizes systems by pooling and
sharing resources. Systems and storage can be provisioned as needed
from a centralized infrastructure, costs are assessed on a metered
basis, multi-tenancy is enabled, and resources are scalable with
agility.
26. Basic ConceptsBasic Concepts
There are certain services and models working behind the
scene making the cloud computing feasible and accessible to
end users. Following are the working models for cloud
computing:
1. Deployment Models1. Deployment Models
2. Service Models2. Service Models
27. Deployment ModelsDeployment Models
Deployment models define the
type of access to the cloud, i.e.,
how the cloud is located? Cloud
can have any of the four types of
access:
•Public,
•Private,
•Hybrid and
•Community.
29. 04/03/17 29
PUBLIC CLOUDPUBLIC CLOUD : The Public Cloud allows systems and services to
be easily accessible to the general public. Public cloud may be less
secure because of its openness, e.g., e-mail.
PRIVATE CLOUDPRIVATE CLOUD : The Private Cloud allows systems and services
to be accessible within an organization. It offers increased security
because of its private nature.
PUBLIC CLOUD & PRIVATE CLOUDPUBLIC CLOUD & PRIVATE CLOUD :
30. 04/03/17 30
COMMUNITY CLOUDCOMMUNITY CLOUD : The Community Cloud allows systems and
services to be accessible by group of organizations.
HYBRID CLOUDHYBRID CLOUD : The Hybrid Cloud is mixture of public and private
cloud. However, the critical activities are performed using private cloud
while the non-critical activities are performed using public cloud.
COMMUNITY CLOUD & HYBRID CLOUDCOMMUNITY CLOUD & HYBRID CLOUD
31.
32. The NIST model
• The United States government is a major consumer of computer services and,
therefore, one of the major users of cloud computing networks.
• The NIST model originally did not require a cloud to use virtualization to pool
resources, nor did it absolutely require that a cloud support multi-tenancy in the
earliest definitions of cloud computing.Multi-tenancy is the sharing of resources
among two or more clients
04/03/17 32
43. Characteristics of Cloud Computing
• Have access to low cost power
• Leverage renewable power source
• Be near abundant water
• Be sited where high-speed network backbone connections
can be made
• Keep land costs modest and occupation unobtrusive Obtain
tax breaks
• Optimize the overall system latency
04/03/17 43
44. Benefits of cloud computing
• On-demand self-service
• Broad network access
• Resource pooling
• Rapid elasticity
• Measured service
• Lower costs
• Ease of utilization
• Quality of Service
• Reliability
04/03/17 44
• Outsourced IT
management
• Simplified maintenance
and upgrade
• Low Barrier to Entry
47. Communication Protocols
• Cloud computing arises from services available over the Internet
communicating using the standard Internet protocol suite underpinned
by the HTTP and HTTPS transfer protocols.
• In order to engage in inter process communication (IPC) processes,
many client/server protocols have been applied to distributed
networking over the years. Various forms of RPC (Remote Procedure
Call) implementations (including DCOM, Java RMI, and CORBA)
04/03/17 47
48. Assessing the Role of Open
Standards
• The cloud computing industry is
working with these architectural
standards:
• Platform virtualization of
resources
• Service-oriented architecture
•Deployment of open-source
software
•Standardized Web services
•Autonomic systems
•Grid computing
•Web-application frameworks
•These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications,
and utility computing.
•These businesses require open standards so that data is both portable and universally
accessible.
49.
50. Infrastructure as a Service (IaaS)
• Infrastructure as a Service (IaaS) is a
way of delivering Cloud Computing
infrastructure – servers, storage, network
and operating systems – as an on-
demand service. Rather than purchasing
servers, software, datacenter space or
network equipment, clients instead buy
those resources as a fully outsourced
service on demand Iaas provides the
following
● Servers- compute, machines
● Storage
● Network
● Operating system
04/03/17 50
52. Introduction to virtualization
• Virtualization is a technology to run multiple same or
different operating systems which is completely
isolated from each other.
• Ex: Run both Windows and Linux on the same
machine
04/03/17 52
53. Run multiple virtual computers on one physical box.
• Desktop
• Server
• Data Center
• Cloud
04/03/17 53
54. How it is different from dual
boot?
• Both OSes run simultaneously
04/03/17 54
55. Types of Virtualization
• Server Virtualization
• Desktop Virtualization
• Application Virtualization
• Memory
• Storage
• Data
• Network
04/03/17 55
56. What is Hypervisor
• Hypervisor is a software layer sits between Hardware
and OSes which will interact with hardware and
resources and provide an interface to share the
available resources to Virtual containers
04/03/17 56
58. virtual machine (VM)
• A virtual machine (VM) is an operating system (OS) or
application environment that is installed on software, which
imitates dedicated hardware. The end user has the same
experience on a virtual machine as they would have on
dedicated hardware.
• Specialized software, called a hypervisor, emulates the
PC client or server's CPU, memory, hard disk, network and
other hardware resources completely, enabling virtual
machines to share the resources.
04/03/17 58
59. Storage as a service
• Online file storage centers or cloud storage
providers allow you to safely upload your
files to the Internet.
iCloud is a service provided by Apple
• 5GB storage space is free of cost
• Once the iCloud is used you can share your
stored data on any of your different Apple
devices
• Aceess to all files, music, calendar, email
• Only iOS 5 has iCloud installed04/03/17 59
62. Business Benefits
• With cloud storage, there's no need for CDs, external hard drives, or
localized servers
• Data is quickly and automatically updated in the cloud and available
for your retrieval whenever you need it
• With no need for physical, on-site storage space, you can have a
smaller workspace, less equipment to buy, and fewer IT employees to
maintain your equipment and manage your data
• IT staff's can spend more time to focusing on other important tasks to
help your business growth.
04/03/17 62
63. Eucalyptus Open-Source Private
Cloud
• Eucalyptus is a Linux-based open-source software architecture that
implements efficiency-enhancing private and hybrid clouds within
an enterprise’s existing IT infrastructure.
Eucalyptus is an acronym for “Elastic Utility Computing
Architecture for Linking Your Programs to Useful Systems.”
A Eucalyptus private cloud is deployed across an enterprise’s “on
premise” data center infrastructure and is accessed by users over
enterprise intranet. Thus, sensitive data remains entirely secure from
external intrusion behind the enterprise firewall.
04/03/17 63
65. Infrastructure Security - The
Network Level
• There are four significant risk factors in this use case:
• 1.Ensuring the confidentiality and integrity of organization's data-
in-transit to and from a public cloud provider;
• 2. Ensuring proper access control (authentication, authorization, and
auditing) to whatever resources are used at the public cloud
provider;
• 3. Ensuring the availability of the Internet-facing resources in a
public cloud that are being used by an organization, or have been
assigned to an organization by public cloud providers;
• 4.Replacing the established model of network zones and tiers with
domains.
04/03/17 65
66. Infrastructure Security - The
Host Level
• The host security responsibilities in SaaS and PaaS
services are transferred to the provider of cloud
services. IaaS customers are primarily responsible for
securing the hosts provisioned in the cloud
(virtualization software security, customer guest OS
or virtual server security).
04/03/17 66
67. Infrastructure Security - The
Application Level
• The level is responsible for managing
• Application-level security threats;
• End user security;
• SaaS application security;
• PaaS application security;
• Customer-deployed application security
• IaaS application security
• Public cloud security limitations
04/03/17 67
69. Understanding Cloud Security
• Your risks in any cloud deployment are dependent upon the particular
cloud service model chosen and the type of cloud on which you
deploy your applications.
• In order to evaluate your risks, you need to perform the following
analysis:
• 1. Determine which resources (data, services, or applications) you are
planning to move to the cloud.
• 2. Determine the sensitivity of the resource to risk.
• 3. Determine the risk associated with the particular cloud type for a
resource.
04/03/17 69
72. Securing Data and Data piracy
Securing data sent to, received from, and stored in the cloud is the
single largest security concern that most organizations should have
with cloud computing.
As with any WAN traffic, you must assume that any data can be
intercepted and modified. That's why, as a matter of course, traffic to a
cloud service provider and stored off-premises is encrypted.
•These are the key mechanisms for protecting data mechanisms:
Access control
Auditing
Authentication
Authorization
04/03/17 72
80. Control and jurisdictional issues
On premise
App
VM
Server
Storage
Network
On premise
(hosted)
App
VM
Server
Storage
Network
IaaS
App
VM
Server
Storage
Network
PaaS
App
Services
Server
Storage
Network
SaaS
App
Services
Server
Storage
Network
Organization
has control
Organization shares
control with vendor
Vendor
has control
Image reproduced from Cloud security and privacy, 2009, Mather et al.
81. CLOUD COMPUTING SECURITY
AND PRIVACY ISSUES
• There are numerous security issues for cloud computing as it
encompasses many technologies including
• networks,
• databases,
• operating systems,
• virtualization,
• resource scheduling,
• transaction management,
• load balancing,
• concurrency control and memory management.
04/03/17 81
82. Access management & Access
Control
• there are six specific areas of the cloud computing environment
where equipment and software require substantial security attention
These six areas are:
• (1) security of data at rest,
• (2) security of data in transit,
• (3) authentication of users/applications/ processes,
• (4) robust separation between data belonging to different customers,
• (5)cloud legal and regulatory issues, and (6) incident response.
04/03/17 82
95. CLOUD CONTRACTING
MODELS
• Licensing Agreements Versus Services Agreements
– Summary of Terms of a License Agreement
– Summary of Terms o
– Value of Using a Service Agreement in Cloud Arrangement s
a Service Agreement.
• On-Line Agreements Versus Standard Contracts
• The Importance of Privacy Policies Terms and Conditions
• Risk Allocation and Limitations of Liability
04/03/17 95
98. Cloud and SOA
• SOA is an approach to architecture that is intended to
promote flexibility and scalability.
• SOA is defined by what a service is. Services are defined by
the following characteristics
• ● Explicit, implementation-independent interfaces
• ● Loosely bound
• ● Invoked through communication protocol
• ● encapsulate reusable business functions
04/03/17 98
99. SOAARCHITECTURE
• Cloud Infrastructure has many service
components.
• Services can be divided into four domains
• Application Services
• Information Services
• Common IT services
• Infrastructure Services
04/03/17 99
100. Cloud and SOA-SOA Life Cycle
• SOA lifecycle resembles “traditional” application lifecycle, but
introduces new terminology.
• SOA in terms of life cycle requires a start in the SOA model Phase by
gathering business requirement and designing their business
processes.
• Once they have been optimized the business processes, they
implement it by combining new and existing services.
• These assets are then deployed into a secure and integrated
environment for integrating people , processes and information
04/03/17
100
101. SOA based Cloud Infrastructure
Steps
• Enterprises that intend to harness cloud
computing must consider the following steps
• ● Analysis and Strategy
• ● Planning
• ● Implementation
• ● Value-driven(Feedback)
04/03/17 101
103. Cloud Computing
Internet-based computing, where different services(servers,
storage and applications) are delivered to an organization's
computers and devices through the Internet.
104. How Cloud Computing
Works ??
Clouds use a network layer to connect users’ end point
devices, like computers or smart phones, to resources that
are centralized in a data centre.
Users access the data centre via a company network or the
internet or both. Clouds can also be accessed from any
location, allowing mobile workers to access their business
systems on demand.
105.
106. Cloud Management
Management of cloud computing products and
services.
Software and technologies designed for operating
and monitoring applications, data and services
residing in the cloud.
109. Cloud Computing Deployment
Models
Public (Services provided to general public)
Private (for single organization or any third
party,maintenace cost is high)
Hybrid (mix of public and private cloud
services,gives businesses greater flexibility and
more data depolyment options)
110. Benefits of Cloud
Management
Global management
Remote office and distributed storage management
Information Access for disaster recovery
Cost reduction
Real time reporting
Easy Upgrades
Encrypted information
Compliance management
Ease of implementation
111. What is Virtualization?
• Multiple OSes on a single machine
– Giving an illusion that each OS is running on real HW
– Virtual Machine Monitor (VMM)
• Another layer of kernel to virtualize multiple OSes
• Also called “hypervisor”
–An OS as a supervisor is no more HW-dictator!
111/30
113. Why Virtualization? (2/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
– Flexible load balancing
VMVM
VMVM
VMVM
CPU
CPU
CPU
CPU
113/30
114. Why Virtualization? (3/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
– High availability
VMVM
SW or HW maintenance
(upgrade or fix)
114/30
115. Why Virtualization? (6/6)
• Other benefits
– Strong security monitoring
• Security monitoring outside OSes
– Ease of deployment
• Virtual appliance
– A bundle of OS and applications
– Flexible testing and debugging
• Building distributed environments on a single
machine
• Kernel development and debugging
• VM-based recording and replaying
115/30
116. Virtualization & Cloud Computing
• Virtualized data centers
Virtualization 1.x: Near term
Virtualization 2.0: Emerging
Virtualization 3.0: Future
Virtualization 3.0
The fully virtualized datacenter
for cloud services
2013+
Virtualization 1.x
Virtualization 2.0
2009
출처 : IDC 2010 report
116/30
117. IBM – Cloud Transformation
Bluemix is a cloud platform as a service (PaaS)
developed by IBM for building, running, and
managing apps and services.
SoftLayer, an IBM Company, provides cloud
infrastructure as a service from a growing number of
data centers and network points of presence around
the world
118. Case Study
Need:
A company wanted to help diabetes
patients more easily by sharing
accurate, up-to-date medical
information with physicians .
119. Solution
Working with IBM,the company created
a mobile app, supported by IBM
Bluemix and
SoftLayer technologies, that captures
and aggregates data directly from other
medical devices and health tools.
120. Benefit
The virtualized IBM architecture cuts ongoing
operational costs by 30 percent with a flexible
platform, while physicians and diabetics have
clearer insight into patient health, encouraging
better care options.
Grid computing - combination of computer resources from multiple administrative domains applied to a common task
Utility computing focus is on the business model on which providing the computing services are based. , as a metered service similar to a traditional public utility (such as electricity, water, natural gas, or telephone network). Utility computing merely means "Pay and Use", with regards to computing power.
Cloud computing is a broader concept than utility computing and relates to the underlying architecture in which the services are designed
Saas - relates to software applications which are not purchased and hosted locally but licensed from an organization which also hosts the software. The applications are then accessed over the Web.
Many sectors including healthcare, government, finance, retail and automobile use the cloud for file sharing, web, mobile, HPC, CRM, ERP, data storage, analytics etc.
Lot of sensitive information stored, processed and transferred on the cloud
Educational records, IRB
IP, Health
Finance
Government
Games, Entertainment etc.
Why would customers save money?
What is speed to adoption? Low upfront investment, startup can grow as required
Why is licensing easier?
Who is responsible for data loss or other issues in the cloud?
Organizational control decreases from private to public, and IaaS to SaaS
Liability depends on SLA and contract
Organization has accountability irrespective of control and liability
In a virtual machine environment, multiple operating systems can run on a single piece of hardware
A hypervisor, also called Virtual Machine Monitor (VMM), is computer software/hardware platform virtualization software that allows multiple operating systems to run on a host computer concurrently