SlideShare uma empresa Scribd logo
1 de 22
© 2010 SIOS Technology Overview of Cloud Computing Presented by: Jim Kaskade SIOS Chief of Cloud SugarCon 2010
What is Cloud? ,[object Object],[object Object],“ Computers For Rent On  The Internet” “ Pay for Computing as You Use It” “ Storage in  The Sky” “ Virtualized Servers” “ Automatically Scalable / Elastic Compute Resources”
Cloud Evolution ,[object Object],[object Object],[object Object],[object Object],Open MPP  &  SMP Commodity Clusters Grid Computing 1990 Virtualized Clusters SaaS PaaS IaaS 1995 2000 2005 2007 1965 1980 Cloud Proprietary Mainframe http://jameskaskade.com/?p=594
The Three aaS’s in Cloud Cloud   Applications (Apps-as-a-service) Cloud (Application)   Platforms (Platform-as-a-Service) Cloud   Infrastructure (Infrastructure-as-a-Service) App Deploy IT Cloud Services App Dev/Test
Amazon S3: storage Amazon EC2: virtual servers Amazon CloudFront: CDN Amazon SimpleDB & RDS Amazon Virtual Private Cloud Elastic MapReduce: Hadoop Elastic Block Storage AMI Marketplace Windows Azure: OS SQL Azure: RDBMS AppFabric: Service Bus Dallas: Marketplace
Hybrid Cloud Configuration
Cloud Use Cases Level Of Adoption Of Cloud Deployments Importance to Business On-Premise Virtualization Test/Development Backup & Archive HA/DR Burst / Overflow Production Off-Premise Cloud
Why Use The Cloud?
Cloud Economics
Traditional Datacenter Cloud
 
 
 
 
Cloud Security?
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Certifications & Accreditations
[object Object],[object Object],[object Object],Physical Security
[object Object],[object Object],Backups
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],EC2 Security
Enough?
[object Object],[object Object],[object Object],© 2010 SIOS Technology

Mais conteúdo relacionado

Mais procurados

Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
Rajshri Mohan
 
Cloud Computing in a Nutshell
Cloud Computing in a NutshellCloud Computing in a Nutshell
Cloud Computing in a Nutshell
Victor Haydin
 

Mais procurados (20)

Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
 
Ppt cloud deployment
Ppt cloud deploymentPpt cloud deployment
Ppt cloud deployment
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
2.introduction to amazon web services
2.introduction to  amazon web services2.introduction to  amazon web services
2.introduction to amazon web services
 
Cloud computing & .NET 4.0 overview
Cloud computing & .NET 4.0 overviewCloud computing & .NET 4.0 overview
Cloud computing & .NET 4.0 overview
 
Cloud Computing Models
Cloud Computing ModelsCloud Computing Models
Cloud Computing Models
 
A Journey To The Cloud - An Introduction To Cloud Computing
A Journey To The Cloud - An Introduction To Cloud Computing A Journey To The Cloud - An Introduction To Cloud Computing
A Journey To The Cloud - An Introduction To Cloud Computing
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Architecture Primer
Cloud Computing Architecture PrimerCloud Computing Architecture Primer
Cloud Computing Architecture Primer
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Cloud Computing Introduction for Kids
Cloud Computing Introduction for KidsCloud Computing Introduction for Kids
Cloud Computing Introduction for Kids
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and Challenges
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
 
Cloud Computing in a Nutshell
Cloud Computing in a NutshellCloud Computing in a Nutshell
Cloud Computing in a Nutshell
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Application of Cloud Computing
Application of Cloud ComputingApplication of Cloud Computing
Application of Cloud Computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
2011 Introduction to Cloud Computing and Amazon Web Services
2011 Introduction to Cloud Computing and Amazon Web Services2011 Introduction to Cloud Computing and Amazon Web Services
2011 Introduction to Cloud Computing and Amazon Web Services
 
Cloud computing in a nutshell
Cloud computing in a nutshellCloud computing in a nutshell
Cloud computing in a nutshell
 

Destaque

Cloud Computing overview and case study
Cloud Computing overview and case studyCloud Computing overview and case study
Cloud Computing overview and case study
Babak Hosseinzadeh
 
Blue brain technology
Blue brain technology Blue brain technology
Blue brain technology
gande92
 

Destaque (14)

Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Cloud Computing Overview And Predictions May 2009
Cloud Computing Overview And Predictions   May 2009Cloud Computing Overview And Predictions   May 2009
Cloud Computing Overview And Predictions May 2009
 
Cloud Computing India Introduction and Overview - by karROX
Cloud Computing India Introduction and Overview - by karROXCloud Computing India Introduction and Overview - by karROX
Cloud Computing India Introduction and Overview - by karROX
 
Cloud Computing overview and case study
Cloud Computing overview and case studyCloud Computing overview and case study
Cloud Computing overview and case study
 
Blue brain Technology
Blue brain TechnologyBlue brain Technology
Blue brain Technology
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Blue brain technology
Blue brain technology Blue brain technology
Blue brain technology
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
 
Blue brain
Blue brain Blue brain
Blue brain
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Semelhante a Overview of Cloud Computing

Intro to cloud.pdf
Intro to cloud.pdfIntro to cloud.pdf
Intro to cloud.pdf
SawanBhattacharya
 
Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境
Amazon Web Services
 
[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...
[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...
[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...
Amazon Web Services Korea
 
Cloud Computing: Making the right choice
Cloud Computing: Making the right choiceCloud Computing: Making the right choice
Cloud Computing: Making the right choice
IndicThreads
 

Semelhante a Overview of Cloud Computing (20)

Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
 
IBM CLOUD - PRESENTAZIONE
IBM CLOUD - PRESENTAZIONEIBM CLOUD - PRESENTAZIONE
IBM CLOUD - PRESENTAZIONE
 
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 AustraliaBest Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material
 
Cloud quick start
Cloud quick startCloud quick start
Cloud quick start
 
Intro to cloud.pdf
Intro to cloud.pdfIntro to cloud.pdf
Intro to cloud.pdf
 
Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境
 
Evolution to the Hybrid Data Center
Evolution to the Hybrid Data CenterEvolution to the Hybrid Data Center
Evolution to the Hybrid Data Center
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
 
Migration to Aws Cloud
Migration to Aws Cloud  Migration to Aws Cloud
Migration to Aws Cloud
 
[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...
[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...
[AWS에서의 미디어 및 엔터테인먼트] AWS 개요, 클라우드 스토리지 및 Amazon CloudFront, Elastic Transcod...
 
AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Hostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud PresentationHostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud Presentation
 
Hello cloud
Hello  cloudHello  cloud
Hello cloud
 
AWS for Startups
AWS for StartupsAWS for Startups
AWS for Startups
 
Cloud Computing: Making the right choice
Cloud Computing: Making the right choiceCloud Computing: Making the right choice
Cloud Computing: Making the right choice
 
Fundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWSFundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWS
 
Cloud Computing Business Model
Cloud Computing Business ModelCloud Computing Business Model
Cloud Computing Business Model
 
AWSome Day 2019 - New Jersey
AWSome Day 2019 - New JerseyAWSome Day 2019 - New Jersey
AWSome Day 2019 - New Jersey
 

Overview of Cloud Computing

  • 1. © 2010 SIOS Technology Overview of Cloud Computing Presented by: Jim Kaskade SIOS Chief of Cloud SugarCon 2010
  • 2.
  • 3.
  • 4. The Three aaS’s in Cloud Cloud Applications (Apps-as-a-service) Cloud (Application) Platforms (Platform-as-a-Service) Cloud Infrastructure (Infrastructure-as-a-Service) App Deploy IT Cloud Services App Dev/Test
  • 5. Amazon S3: storage Amazon EC2: virtual servers Amazon CloudFront: CDN Amazon SimpleDB & RDS Amazon Virtual Private Cloud Elastic MapReduce: Hadoop Elastic Block Storage AMI Marketplace Windows Azure: OS SQL Azure: RDBMS AppFabric: Service Bus Dallas: Marketplace
  • 7. Cloud Use Cases Level Of Adoption Of Cloud Deployments Importance to Business On-Premise Virtualization Test/Development Backup & Archive HA/DR Burst / Overflow Production Off-Premise Cloud
  • 8. Why Use The Cloud?
  • 11.  
  • 12.  
  • 13.  
  • 14.  
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.

Notas do Editor

  1. In this session SIOS will cover a new SugarCRM offering for High Availability (HA) and Disaster Recovery (DR), leveraging the benefits of cloud computing. Take advantage of cloud as your real-time failover instead of investing in expensive on-premise HA or DR server clusters. In this session you will learn about: * Cloud Security * High Availability via the Cloud * Disaster Recovery via the Cloud * Public Cloud use-cases * Deploying SugarCRM HA/DR * Application Monitoring & Real-time data replication If you have mission-critical applications and associated business data, can you afford not to have a clear business continuity plan? And if you have a plan, can you afford not to consider the benefits of cloud computing such as: opex vs. capex, flexibility, time-to-market, and efficiency of resources?
  2. * Host Operating System: AWS administrators with a business need are required to use their individual cryptographically strong SSH keys to gain access to a bastion host. These bastion hosts are specifically built systems that are designed and configured to protect the management plane of the cloud. Once connected to the bastion, authorized administrators are able to use a privilege escalation command to gain access to an individual host. All such accesses are logged and routinely audited. When an AWS employee no longer has a business need to administer EC2 hosts, their privileges on and access to the bastion hosts are revoked. * Guest Operating System: Virtual instances are completely controlled by the customer. They have full root access and all administrative control over additional accounts, services, and applications. AWS administrators do not have access to customer instances, and cannot log into the guest OS. Customers should disable password-based access to their hosts and utilize token or key-based authentication to gain access to unprivileged accounts. Further, customers should employ a privilege escalation mechanism with logging on a per-user basis. For example, if the guest OS is Linux, utilize SSH with keys to access the virtual instance, enable shell command-line logging, and use the ‘sudo’ utility for privilege escalation. Customers should generate their own key pairs in order to guarantee that they are unique, and not shared with other customers or with AWS. * Firewall: Amazon EC2 provides a complete firewall solution; this mandatory inbound firewall is configured in a default deny mode and the Amazon EC2 customer must explicitly open any ports to allow inbound traffic. The traffic may be restricted by protocol, by service port, as well as by source IP address (individual IP or CIDR block). API: Calls to launch and terminate instances, change firewall parameters, and perform other functions are all signed by an X.509 certificate or the customer’s Amazon Secret Access Key. Without access to the customer’s Secret Access Key or X.509 certificate, Amazon EC2 API calls cannot be made on their behalf. In addition, API calls can be encrypted in transit with SSL to maintain confidentiality. Amazon recommends always using SSL-protected API endpoints. The Hypervisor Amazon EC2 currently utilizes a highly customized version of the Xen hypervisor, taking advantage of paravirtualization. Because paravirtualized guests rely on the hypervisor to provide support for operations that normally require privileged access, it is possible to run the guest OS with no elevated access to the CPU. This explicit virtualization of the physical resources leads to a clear separation between guest and hypervisor, resulting in strong security separation between the two. Instance Isolation Different instances running on the same physical machine are isolated from each other utilizing the Xen hypervisor. Amazon is an active participant and contributor within the Xen community, which ensures awareness of potential pending issues. In addition, the aforementioned firewall resides within the hypervisor layer, between the physical interface and the instance's virtual interface. All packets must pass through this layer, thus an instance’s neighbors have no additional access to that instance, and can be treated as if they are on separate physical hosts. The physical RAM is separated using similar mechanisms. Customer instances have no access to raw disk devices, but instead are presented with virtualized disks. The AWS proprietary disk virtualization layer automatically wipes every block of storage used by the customer, and guarantees that one customer’s data is never exposed to another. Note that unintentionally leaving data on disk devices is only one possible breach of confidentiality; many others exist, and for this reason AWS recommends that customers further protect their data using appropriate means. One common solution is to run an encrypted filesystem on top of the virtualized disk device. Network Security The AWS network provides significant protection against traditional network security issues and the customer can implement further protection. The following are a few examples: * Distributed Denial Of Service (DDoS) Attacks: AWS API endpoints are hosted on the same Internet-scale, world class infrastructure that supports the Amazon.com retail site. Standard DDoS mitigation techniques such as syn cookies and connection limiting are used. To further mitigate the effect of potential DDoS attacks, Amazon maintains internal bandwidth which exceeds its provider-supplied Internet bandwidth. * Man In the Middle (MITM) Attacks: All of the AWS APIs are available via SSL-protected endpoints which provides server authentication. Amazon EC2 AMIs automatically generate new SSH host keys on first boot and log them to the console. Customers can then use the secure APIs to call the console and access the host keys before logging into the instance for the first time. Customers are encouraged to use the SSL endpoints for all of their interactions with AWS. * IP Spoofing: Amazon EC2 instances cannot send spoofed traffic. The Amazon -controlled, host-based firewall infrastructure will not permit an instance to send traffic with a source IP or MAC address other than its own. * Port Scanning: Port scans by Amazon EC2 customers are a violation of the Amazon EC2 Acceptable Use Policy (AUP). Violations of the AUP are taken seriously, and every reported violation is investigated. When Port scanning is detected it is stopped and blocked. Port scans of Amazon EC2 instances are generally ineffective because, by default, all inbound ports on Amazon EC2 instances are closed. The customer’s strict management of security groups can further mitigate the threat of port scans. If the customer configures the security group to allow traffic from any source to a specific port, then that specific port will be vulnerable to a port scan. In these cases, the customer must use appropriate security measures to protect listening services that may be essential to their application from being discovered by an unauthorized port scan. For example, a web server must clearly have port 80 (HTTP) open to the world, and the administrator of this server is responsible for ensuring the security of the HTTP server software, such as Apache. * Packet sniffing by other tenants: It is not possible for a virtual instance running in promiscuous mode to receive or “sniff” traffic that is intended for a different virtual instance. While customers can place their interfaces into promiscuous mode, the hypervisor will not deliver any traffic to them that is not addressed to them. This includes two virtual instances that are owned by the same customer, even if they are located on the same physical host. Attacks such as ARP cache poisoning do not work within EC2. While Amazon EC2 does provide ample protection against one customer inadvertently or maliciously attempting to view another’s data, as a standard practice customers should encrypt sensitive traffic.
  3. If you want to see more…. … whether you’re a channel partner who wants to appreciate how this can provide you incremental business, … or you are a customer who wants to understand how you can protect your enterprise’s critical assets for less than the cost of 2 hours of your admin staff’s time each month, … ..we’re in Booth 201 and we’re giving a talk today at 1:30pm. Notes - HA For SugarCRM Costs: $10/seat/mth x 25 users = $250/mth Notes - IT Costs in Hours: Avg salary: $102K High-end: $162K (someone who understands business continuity) Fully loaded $162K (1.5x)=$243K=$117/hr $250 = 2 hours of admin time. http://www.cbsalary.com/salary_chart.aspx?edu=&sid=CA&cty=palo%2balto&jn=&tid=249423&kw=Information%2bTechnology&specialty=Information%2bTechnology%2bAdministrator%2b%28IT%2bAdministrator%29&ns=1