SlideShare uma empresa Scribd logo
1 de 49
Introduction to Cloud Computing
What is it anyway?




Tom Eberle
PETAG Affinity Group
June 21, 2012
Overview
• Introduction
• Cloud Technologies
    –   Web Applications
    –   Clustering
    –   Terminal Services
    –   Application Servers
    –   Virtualization
    –   Hypervisors
•   Service Models
•   Deployment Models
•   Cloud Security
•   Final Thoughts
What is Cloud Computing?

       Larry Ellison, Founder of Oracle
       “..we've redefined cloud computing to
          include everything that we already
          do.. I don't understand what we
          would do differently in the light of
          cloud“ – Oracle OpenWorld, 2009
What is Cloud Computing?

       Richard Stallman, Founder of GNU
       “It's stupidity. It's worse than stupidity:
           it's a marketing hype campaign“
            - The Guardian Newspaper, 2008
What is Cloud Computing?

       Bruce Schneier, Security Expert, Author
       “Cloud computing is nothing new.. It's the
          modern version of the timesharing
          model from the 1960s, which was
          eventually killed by the rise of the
          personal computer. “
          - Schneier on Security Blog, 2009
What is Cloud Computing?
What is Cloud Computing?


     - Siri Says
     “Services that provide common business
        applications online, which are accessed
        from a Web browser, while the software
        and data are stored on the servers; a
        style of computing in which dynamically
        scalable and often virtualized resources
        are provided as a service over the
        internet”
Introduction
• What Comprises Cloud Computing?
     Broadband                                   Measured           On-Demand
                      Rapid Elasticity
   Network Access                                Services           Self-Services
                                                                                    Essential
                                                                                    Characteristics
                                Resource Pooling




   Software as a                 Platform as a              Infrastructure as       Service
   Service (SasS)               Service (PasS)              a Service (IasS)        Models



    Public            Private                    Hybrid            Community        Deployment
                                                                                    Models


                * NIST Visual Model of Cloud Computing
What is Cloud Computing?
Why Adopt Cloud Computing?
• Scalability - Organizations have access to a large amount of
  resources that scale based on user demand
• Elasticity - Organization’s can request, use, and release as
  many resources as needed based on changing needs
• Virtualization - Each user has a single view of the available
  resources, independently of how they are arranged in terms of
  physical devices
• Lower Infrastructure Costs - The pay-per-use model allows
  an organization to only pay for the resources they need with
  basically no investment in the physical resources available in
  the cloud. There are no infrastructure maintenance or
  upgrade costs
Why Adopt Cloud Computing?
• Availability - Organizations have the ability for the user to
  access data and applications from around the globe
• Collaboration - Organizations are starting to see the cloud as
  a way to work simultaneously on common data and
  information
• Risk Reduction - Organizations can use the cloud to test
  ideas and concepts before making major investments in
  technology
• Reliability - In order to support SLAs (service-level
  agreements), cloud providers have reliability mechanisms that
  are much more robust than those that could be cost-
  effectively provided by a single organization
Cloud Technology
Web Applications
• Simplest form of cloud computing
• Applications created in standard web
  programming languages (HTML, javascript,
  XML, PHP, etc)
• Apps reside somewhere on a server (Google
  Docs, Quickbooks On-line, etc)
• Accessed via your PC’s web browser
• If your PC fails, you can access data from
  another PC
Clustering
• Cluster of computers (i.e. multiple different
  servers)
  – Different server hardware
  – Possibly different OS (depending on app)
• Generally Used as Database Servers
  (MySQL, Microsoft Active Directory)
• Benefits
  – Replication: Servers maintains same data
  – Load balancing between servers in the cluster
  – Fault tolerance: cluster responds w/traffic routing
Clustering Example

MySQL         MySQL
 OS            OS




MySQL         MySQL
 OS            OS
Terminal Services
• Based off of old Mainframe and Dumb Terminal Architecture
• Now You Use Terminal Services Servers and Thin Clients
• Thin Clients can be Hardware Devices or Software installed
  on a computer
• All processing happens on Terminal Services Server
• Thin Client simply gets a "Window" into the server sharing the
  same OS and applications of the server
• Benefits
   – Application & data is stored on the server
   – Data can be accessible by other thin clients
   – Maintenance
TS Server Example
Application Servers
• Uses Terminal Services but instead of
  providing a full Environment it only
  delivers a specific Application.
• Benefits
  – Applications distributed to thin clients
  – Data stored on server (shared)
  – Maintenance
Virtualization
• What is it?
  – Separation of OS from hardware
  – Ability to EASILY move OS (including Apps &
    Settings) to new physical hardware
  – Accomplished with virtualization software
     • Client Installed Virtualization
     • Hypervisors
Client Installed Virtualization


   Instance 1    Instance 2     Instance 3

  Windows 7        Linux         Windows
                                   2008
                                  Server

           Client Virtualization Software (VirtualBox)

            Operating System (Windows/Linux/Mac)

                           PC Hardware
Hypervisors
• More powerful than client installed virtualization
  software
• Provides high reliability for critical services (e.g. MS
  Exchange server)
• Two Part Solution: Hypervisor & Management
  Software
• Hypervisor is installed on the physical server
  hardware
   – It’s like a thin OS
   – Only provides rudimentary connection info (IP address,
     computer name, etc) for the management software
   – Supports installation of OS’s when installing computer
     instances
Hypervisors
• Management Software is installed on an admin
  computer
• Purpose: Configure each Virtual Machine, or
  Instance and provide fault tolerance.
  – Connects to the Hypervisor installed on the server(s)
  – Allows creation the virtual computer instances on the
    server
     • Create virtual disk partitions, allocate memory, Install OS
     • Instances can be copy/paste to any other server on network
       running compatible hypervisors
  – On-the-fly reconfiguration when hardware fails
Hypervisor


Computer        Computer        Computer
Instance 1      Instance 2      Instance 3
                                 Windows
Windows 7          Linux
                                Server 2008

                                              Management
        1G              10 G            5G     Software
100 G   RAM     200 G   RAM     100 G   RAM
                                               (VMWare
                                               vSphere)
        Hypervisor (VMWare ESXi)
                                                 PC
              Server Hardware                 Hardware
Hypervisor Fault Tolerance
Computer     Computer         Computer                     Management
                                                            Software
Instance 1   Instance 2       Instance 3
                                                          (VMWare Sphere)
                  Hypervisor (VMWare ESXi)
                      Server Hardware 1                   PC Hardware


Computer     Computer         Computer       Computer
Instance 1   Instance 2       Instance 3     Instance 4
                  Hypervisor (VMWare ESXi)
                      Server Hardware 2


Computer     Computer         Computer       Computer
Instance 1   Instance 2       Instance 3     Instance 4
                  Hypervisor (VMWare ESXi)
                      Server Hardware 3


Computer     Computer         Computer       Computer
Instance 1   Instance 2       Instance 3     Instance 4
                  Hypervisor (VMWare ESXi)
                      Server Hardware 4
Hypervisors
• Most Hypervisor Software: Free and/or
  OpenSource
  – VMware, Citrix
• Most Management Software: Free (Lite
  version), Paid (Fault Tolerance and other
  features)
Service Models
Service Models
• Everything as a Service: XasS
• Most Common: SPI
  – Software as a Service: SasS
  – Platform as a Service: PasS
  – Infrastructure as a Service: SasS
• Other models
  –   Storage as a Service: SasS
  –   Communications as a Service: CasS
  –   Network as a Service: NasS
  –   Monitoring as a Service: MasS
Infrastructure as a Service (IasS)
             Applications

                 Data
You Manage




                                              • What you gain: Computer/
               Runtime
                                                Server
             Middleware
                                              • Consumer: SysAdmins
                 O/S
                                              • Examples
                              Vendor Manage




             Virtualization
                                                – Rackspace.com
               Servers
                                                – Go Grid
               Storage
                                                – Amazon Web Services (AWS)
             Networking
Platform as a Service (PasS)
             Applications
You Manage




                 Data
                                              • What you gain: Application/
               Runtime
                                                Framework
             Middleware
                                              • Consumer: App Developers
                 O/S
                                              • Examples
                              Vendor Manage




             Virtualization
                                                – Force.com
               Servers
                                                – Google App Engine
               Storage
                                                – Microsoft Azure
             Networking
Software as a Service (SasS)
Applications

    Data
                                 • What you gain: Business
  Runtime                          Functionality
                 Vendor Manage



Middleware                       • Consumer: End Users
    O/S                          • Examples
Virtualization                     – Google Docs/Gmail
                                   – FreshBooks
  Servers
                                   – SalesForce
  Storage
                                   – BaseCamp
Networking
Cloud Deployment Models
Cloud Deployment Models
Cloud Deployment Models
• Public Cloud
  – Infrastructure made available to general public or
    large industry group
  – Owned by the organization selling the service
• Private Cloud
  – Infrastructure operated solely for a single
    organization
  – May be managed by the organization or a third
    party
  – May be located on-premise or off-premise
Cloud Deployment Models
• Community Cloud
  – Infrastructure is shared by several organizations and
    supports a specific community that has shared
    concerns (e.g. mission, security requirements, policy,
    compliance, etc.)
  – May be managed by the organizations or a third party
  – May be located on-premise or off-premise
• Hybrid Cloud
  – Infrastructure is a composition of two or more clouds
  – Remain unique entities but bound together by
    standardized or proprietary technology that enable
    data and application portability
Cloud Deployment Models

             Infrastructure         Infrastructure        Infrastructure      Accessible and
              Managed By              Owned By               Located          Consumed By


  Public    Third Party Provider   Third Party Provider      Off-Premise         Untrusted




               Organization           Organization           On-Premise
 Private/
Community           OR                     OR                                     Trusted

            Third Party Provider   Third Party Provider      Off-Premise




 Hybrid     Both Organization &    Both Organization &    Both On-Premise &      Trusted &
            Third Party Provider   Third Party Provider      Off-Premise         Untrusted
Cloud Security

  • John Chambers, CEO Cisco
    Systems - “[Cloud Computing] is a
    security nightmare and it can't be
    handled in traditional ways.“ –
    Keynote Address, 2009 RSA
    Security Conference
Cloud Security
• No list of security controls can cover all
  cloud deployments
• Organizations should adopt a risk-based
  approach about moving to the cloud
• Use Cloud Security Alliance (CSA) quick
  method for evaluating tolerance in moving
  an asset to the cloud
Cloud Security
• Identify Each Asset for Cloud
  Deployment
  – Data
  – Application/Functions/Processes
• Data and applications don’t need to reside
  in the same location
Cloud Security
• Evaluate the Asset
  – How would we be harmed if the asset became widely
    public or widely distributed?
  – How would we be harmed if an employee of our
    cloud provider accessed the asset?
  – How would we be harmed if the process or function
    were manipulated by an outsider?
  – How would we be harmed if the process or function
    failed to provide expected results?
  – How would we be harmed if the information/data were
    unexpectedly changed?
  – How would we be harmed if the asset were
    unavailable for a peroid of time?
Cloud Security
• Map the Asset to Potential Cloud
  Deployment Models
  – Public
  – Private, internal/on-premises
  – Private, external (including dedicated or shared
    infrastructure)
  – Community; taking into account the hosting
    location, and identification of other community
    members
  – Hybrid; have in mind at least a rough architecture
    of where components, functions, and data will
    reside.
Cloud Security
• Evaluate Potential Cloud Service Models
  and Providers
  – Focus on the degree of control you’ll have
     • SasS: Software as a Service
     • PasS: Platform as a Service
     • IasS: Infrastructure as a Service
• Map Out the Potential Data Flow
  – Map out data flow between your organization,
    cloud services, and any customer/other nodes
  – Understand whether, and how, data can move in
    and out of the cloud
  – Identify risk exposure points
Risk Management Approaches
       Consumer Security Responsibility
Less




                                                           Security Participation by
                                                           End User Organization
                                                S
                                              SasS         SasS
                                             Software      PasS & SasS
                                                P
                                                           IasS, PasS, & SasS
                                              PasS
                                             Platform
                                                I
More




                                               IasS
                                          Infrastructure
Cloud Security
• Security Conclusions
  – You should understand the importance of
    what your considering moving into the cloud
  – Risk tolerance for each asset
  – Which combinations of deployment and
    service models are acceptable
  – You should have a good idea of potential
    exposure points for sensitive information and
    operations
Barriers to Cloud Adoption
•   Security - The key concern is data privacy: organizations do not have
    control of or know where their data is being stored
•   Interoperability - A universal set of standards and/or interfaces has not
    yet been defined, resulting in a significant risk of vendor lock-in
•   Resource Control - The amount of control that the organization has
    over the cloud environment varies greatly
•   Latency - All access to the cloud is done via the internet, introducing
    latency into every communication between the user and the
    environment
•   Platform or Language Constraints - Some cloud environments
    provide support for specific platforms and languages only
•   Legal Issues - There are concerns in the cloud computing community
    over jurisdiction, data protection, fair information practices, and
    international data transfer
Final Thoughts
• Cloud Computing is in essence an
  economic model
  – It is a different way to acquire and manage IT
    resources
• There are multiple cloud providers—the
  cloud is real
  – Currently most cloud consumers are small
    enterprises
  – Large enterprises are exploring private clouds
  – The number of providers will most probably grow
    as people start seeing greater savings and
    improvements to reduce adoption barriers
Final Thoughts
• Cloud Computing adoption requires cost/
  benefit/risk analysis to determine
  – What resources to move to the cloud (if any)
  – What situations warrant use of cloud resources,
    even for one-time situations
  – Implementation of private clouds vs. usage of
    public clouds
  – What risks are associated with using resources
    on the cloud
  – What risks are associated to providing resources
    in the cloud
Final Thoughts
• Decisions from a cloud consumer
  perspective depend on
  – Required control level
  – Required security level
  – Compatibility with local infrastructure
• Decisions from a cloud provider
  perspective depend on
  – Market/user characteristics
  – Established SLAs
  – Available technology
Thank You

Tom Eberle
  Tom.Eberle@Comcast.net
  LinkedIn.com/in/teberle
  Twitter.com/teberle
References
• Cloud Security Alliance Guide.v3.0
• “Introduction to Cloud Computing” – Everyman IT
• “Introduction to Security and Privacy in Cloud
  Computing”, Ragib Hanson , Johns Hopkins University,
  1/25/2010
• “Architectural Implications of Cloud Computing”, Grace
  A. Lewis, Software Engineering Institute, 2011
• “Introduction to Cloud Computing”, Wikipedia
• “Cloud Computing”, Wikipedia

Mais conteúdo relacionado

Mais procurados

Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureAptera Inc
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Cloud Native Application
Cloud Native ApplicationCloud Native Application
Cloud Native ApplicationVMUG IT
 
AWS 101: Cloud Computing Seminar (2012)
AWS 101: Cloud Computing Seminar (2012)AWS 101: Cloud Computing Seminar (2012)
AWS 101: Cloud Computing Seminar (2012)Amazon Web Services
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project Ayush Mukherjee
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationSai P Mishra
 
Migrating On-Premises Workloads with Azure Migrate
Migrating On-Premises Workloads with Azure MigrateMigrating On-Premises Workloads with Azure Migrate
Migrating On-Premises Workloads with Azure MigrateDinusha Kumarasiri
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web ServicesJames Armes
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingJithin Parakka
 
The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?Codit
 
Azure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxAzure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxceyhan1
 

Mais procurados (20)

Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Cloud Native Application
Cloud Native ApplicationCloud Native Application
Cloud Native Application
 
AWS 101: Cloud Computing Seminar (2012)
AWS 101: Cloud Computing Seminar (2012)AWS 101: Cloud Computing Seminar (2012)
AWS 101: Cloud Computing Seminar (2012)
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud Computing & Distributed Computing
 
Migrating On-Premises Workloads with Azure Migrate
Migrating On-Premises Workloads with Azure MigrateMigrating On-Premises Workloads with Azure Migrate
Migrating On-Premises Workloads with Azure Migrate
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Open Banking on AWS
Open Banking on AWSOpen Banking on AWS
Open Banking on AWS
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?
 
Azure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxAzure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptx
 

Destaque

Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Scott Bils
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingPriyodarshini Dhar
 
Trends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science BereichTrends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science BereichAWS Germany
 
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Chad Lawler
 
Open Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -EucalyptusOpen Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -EucalyptusSameer Naik
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and MethodsRiant Soft
 

Destaque (9)

Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Trends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science BereichTrends und Anwendungsbeispiele im Life Science Bereich
Trends und Anwendungsbeispiele im Life Science Bereich
 
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
 
Cloud Security Alliance Guide to Cloud Security
Cloud Security Alliance Guide to Cloud SecurityCloud Security Alliance Guide to Cloud Security
Cloud Security Alliance Guide to Cloud Security
 
Open Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -EucalyptusOpen Source Cloud Computing -Eucalyptus
Open Source Cloud Computing -Eucalyptus
 
Cloud Stakeholders
Cloud StakeholdersCloud Stakeholders
Cloud Stakeholders
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and Methods
 

Semelhante a Introduction to Cloud Computing

Cloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaCloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaPrabhunath Sharma
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1Studying
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1Studying
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdfErvisTema1
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session aleyeldean
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure PlatformAsmTrash
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization Wellshop.pk
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computingBIJIT GHOSH
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101Otto Mora
 
Cloud and its job oppertunities
Cloud and its job oppertunitiesCloud and its job oppertunities
Cloud and its job oppertunitiesRamya SK
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualizationhktripathy
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingBharat Kalia
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101Kamal Arora
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing Pratik Patil
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computingssuser7b6236
 
Virtualization
VirtualizationVirtualization
VirtualizationBirju Tank
 

Semelhante a Introduction to Cloud Computing (20)

Cloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaCloud computing by prabhunath sharma
Cloud computing by prabhunath sharma
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
cloud computing
cloud computingcloud computing
cloud computing
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
 
Parth virt
Parth virtParth virt
Parth virt
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
 
Cloud and its job oppertunities
Cloud and its job oppertunitiesCloud and its job oppertunities
Cloud and its job oppertunities
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Último

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Introduction to Cloud Computing

  • 1. Introduction to Cloud Computing What is it anyway? Tom Eberle PETAG Affinity Group June 21, 2012
  • 2. Overview • Introduction • Cloud Technologies – Web Applications – Clustering – Terminal Services – Application Servers – Virtualization – Hypervisors • Service Models • Deployment Models • Cloud Security • Final Thoughts
  • 3. What is Cloud Computing? Larry Ellison, Founder of Oracle “..we've redefined cloud computing to include everything that we already do.. I don't understand what we would do differently in the light of cloud“ – Oracle OpenWorld, 2009
  • 4. What is Cloud Computing? Richard Stallman, Founder of GNU “It's stupidity. It's worse than stupidity: it's a marketing hype campaign“ - The Guardian Newspaper, 2008
  • 5. What is Cloud Computing? Bruce Schneier, Security Expert, Author “Cloud computing is nothing new.. It's the modern version of the timesharing model from the 1960s, which was eventually killed by the rise of the personal computer. “ - Schneier on Security Blog, 2009
  • 6. What is Cloud Computing?
  • 7. What is Cloud Computing? - Siri Says “Services that provide common business applications online, which are accessed from a Web browser, while the software and data are stored on the servers; a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the internet”
  • 8. Introduction • What Comprises Cloud Computing? Broadband Measured On-Demand Rapid Elasticity Network Access Services Self-Services Essential Characteristics Resource Pooling Software as a Platform as a Infrastructure as Service Service (SasS) Service (PasS) a Service (IasS) Models Public Private Hybrid Community Deployment Models * NIST Visual Model of Cloud Computing
  • 9. What is Cloud Computing?
  • 10. Why Adopt Cloud Computing? • Scalability - Organizations have access to a large amount of resources that scale based on user demand • Elasticity - Organization’s can request, use, and release as many resources as needed based on changing needs • Virtualization - Each user has a single view of the available resources, independently of how they are arranged in terms of physical devices • Lower Infrastructure Costs - The pay-per-use model allows an organization to only pay for the resources they need with basically no investment in the physical resources available in the cloud. There are no infrastructure maintenance or upgrade costs
  • 11. Why Adopt Cloud Computing? • Availability - Organizations have the ability for the user to access data and applications from around the globe • Collaboration - Organizations are starting to see the cloud as a way to work simultaneously on common data and information • Risk Reduction - Organizations can use the cloud to test ideas and concepts before making major investments in technology • Reliability - In order to support SLAs (service-level agreements), cloud providers have reliability mechanisms that are much more robust than those that could be cost- effectively provided by a single organization
  • 13. Web Applications • Simplest form of cloud computing • Applications created in standard web programming languages (HTML, javascript, XML, PHP, etc) • Apps reside somewhere on a server (Google Docs, Quickbooks On-line, etc) • Accessed via your PC’s web browser • If your PC fails, you can access data from another PC
  • 14. Clustering • Cluster of computers (i.e. multiple different servers) – Different server hardware – Possibly different OS (depending on app) • Generally Used as Database Servers (MySQL, Microsoft Active Directory) • Benefits – Replication: Servers maintains same data – Load balancing between servers in the cluster – Fault tolerance: cluster responds w/traffic routing
  • 15. Clustering Example MySQL MySQL OS OS MySQL MySQL OS OS
  • 16. Terminal Services • Based off of old Mainframe and Dumb Terminal Architecture • Now You Use Terminal Services Servers and Thin Clients • Thin Clients can be Hardware Devices or Software installed on a computer • All processing happens on Terminal Services Server • Thin Client simply gets a "Window" into the server sharing the same OS and applications of the server • Benefits – Application & data is stored on the server – Data can be accessible by other thin clients – Maintenance
  • 18. Application Servers • Uses Terminal Services but instead of providing a full Environment it only delivers a specific Application. • Benefits – Applications distributed to thin clients – Data stored on server (shared) – Maintenance
  • 19. Virtualization • What is it? – Separation of OS from hardware – Ability to EASILY move OS (including Apps & Settings) to new physical hardware – Accomplished with virtualization software • Client Installed Virtualization • Hypervisors
  • 20. Client Installed Virtualization Instance 1 Instance 2 Instance 3 Windows 7 Linux Windows 2008 Server Client Virtualization Software (VirtualBox) Operating System (Windows/Linux/Mac) PC Hardware
  • 21. Hypervisors • More powerful than client installed virtualization software • Provides high reliability for critical services (e.g. MS Exchange server) • Two Part Solution: Hypervisor & Management Software • Hypervisor is installed on the physical server hardware – It’s like a thin OS – Only provides rudimentary connection info (IP address, computer name, etc) for the management software – Supports installation of OS’s when installing computer instances
  • 22. Hypervisors • Management Software is installed on an admin computer • Purpose: Configure each Virtual Machine, or Instance and provide fault tolerance. – Connects to the Hypervisor installed on the server(s) – Allows creation the virtual computer instances on the server • Create virtual disk partitions, allocate memory, Install OS • Instances can be copy/paste to any other server on network running compatible hypervisors – On-the-fly reconfiguration when hardware fails
  • 23. Hypervisor Computer Computer Computer Instance 1 Instance 2 Instance 3 Windows Windows 7 Linux Server 2008 Management 1G 10 G 5G Software 100 G RAM 200 G RAM 100 G RAM (VMWare vSphere) Hypervisor (VMWare ESXi) PC Server Hardware Hardware
  • 24. Hypervisor Fault Tolerance Computer Computer Computer Management Software Instance 1 Instance 2 Instance 3 (VMWare Sphere) Hypervisor (VMWare ESXi) Server Hardware 1 PC Hardware Computer Computer Computer Computer Instance 1 Instance 2 Instance 3 Instance 4 Hypervisor (VMWare ESXi) Server Hardware 2 Computer Computer Computer Computer Instance 1 Instance 2 Instance 3 Instance 4 Hypervisor (VMWare ESXi) Server Hardware 3 Computer Computer Computer Computer Instance 1 Instance 2 Instance 3 Instance 4 Hypervisor (VMWare ESXi) Server Hardware 4
  • 25. Hypervisors • Most Hypervisor Software: Free and/or OpenSource – VMware, Citrix • Most Management Software: Free (Lite version), Paid (Fault Tolerance and other features)
  • 27. Service Models • Everything as a Service: XasS • Most Common: SPI – Software as a Service: SasS – Platform as a Service: PasS – Infrastructure as a Service: SasS • Other models – Storage as a Service: SasS – Communications as a Service: CasS – Network as a Service: NasS – Monitoring as a Service: MasS
  • 28. Infrastructure as a Service (IasS) Applications Data You Manage • What you gain: Computer/ Runtime Server Middleware • Consumer: SysAdmins O/S • Examples Vendor Manage Virtualization – Rackspace.com Servers – Go Grid Storage – Amazon Web Services (AWS) Networking
  • 29. Platform as a Service (PasS) Applications You Manage Data • What you gain: Application/ Runtime Framework Middleware • Consumer: App Developers O/S • Examples Vendor Manage Virtualization – Force.com Servers – Google App Engine Storage – Microsoft Azure Networking
  • 30. Software as a Service (SasS) Applications Data • What you gain: Business Runtime Functionality Vendor Manage Middleware • Consumer: End Users O/S • Examples Virtualization – Google Docs/Gmail – FreshBooks Servers – SalesForce Storage – BaseCamp Networking
  • 33. Cloud Deployment Models • Public Cloud – Infrastructure made available to general public or large industry group – Owned by the organization selling the service • Private Cloud – Infrastructure operated solely for a single organization – May be managed by the organization or a third party – May be located on-premise or off-premise
  • 34. Cloud Deployment Models • Community Cloud – Infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g. mission, security requirements, policy, compliance, etc.) – May be managed by the organizations or a third party – May be located on-premise or off-premise • Hybrid Cloud – Infrastructure is a composition of two or more clouds – Remain unique entities but bound together by standardized or proprietary technology that enable data and application portability
  • 35. Cloud Deployment Models Infrastructure Infrastructure Infrastructure Accessible and Managed By Owned By Located Consumed By Public Third Party Provider Third Party Provider Off-Premise Untrusted Organization Organization On-Premise Private/ Community OR OR Trusted Third Party Provider Third Party Provider Off-Premise Hybrid Both Organization & Both Organization & Both On-Premise & Trusted & Third Party Provider Third Party Provider Off-Premise Untrusted
  • 36. Cloud Security • John Chambers, CEO Cisco Systems - “[Cloud Computing] is a security nightmare and it can't be handled in traditional ways.“ – Keynote Address, 2009 RSA Security Conference
  • 37. Cloud Security • No list of security controls can cover all cloud deployments • Organizations should adopt a risk-based approach about moving to the cloud • Use Cloud Security Alliance (CSA) quick method for evaluating tolerance in moving an asset to the cloud
  • 38. Cloud Security • Identify Each Asset for Cloud Deployment – Data – Application/Functions/Processes • Data and applications don’t need to reside in the same location
  • 39. Cloud Security • Evaluate the Asset – How would we be harmed if the asset became widely public or widely distributed? – How would we be harmed if an employee of our cloud provider accessed the asset? – How would we be harmed if the process or function were manipulated by an outsider? – How would we be harmed if the process or function failed to provide expected results? – How would we be harmed if the information/data were unexpectedly changed? – How would we be harmed if the asset were unavailable for a peroid of time?
  • 40. Cloud Security • Map the Asset to Potential Cloud Deployment Models – Public – Private, internal/on-premises – Private, external (including dedicated or shared infrastructure) – Community; taking into account the hosting location, and identification of other community members – Hybrid; have in mind at least a rough architecture of where components, functions, and data will reside.
  • 41. Cloud Security • Evaluate Potential Cloud Service Models and Providers – Focus on the degree of control you’ll have • SasS: Software as a Service • PasS: Platform as a Service • IasS: Infrastructure as a Service • Map Out the Potential Data Flow – Map out data flow between your organization, cloud services, and any customer/other nodes – Understand whether, and how, data can move in and out of the cloud – Identify risk exposure points
  • 42. Risk Management Approaches Consumer Security Responsibility Less Security Participation by End User Organization S SasS SasS Software PasS & SasS P IasS, PasS, & SasS PasS Platform I More IasS Infrastructure
  • 43. Cloud Security • Security Conclusions – You should understand the importance of what your considering moving into the cloud – Risk tolerance for each asset – Which combinations of deployment and service models are acceptable – You should have a good idea of potential exposure points for sensitive information and operations
  • 44. Barriers to Cloud Adoption • Security - The key concern is data privacy: organizations do not have control of or know where their data is being stored • Interoperability - A universal set of standards and/or interfaces has not yet been defined, resulting in a significant risk of vendor lock-in • Resource Control - The amount of control that the organization has over the cloud environment varies greatly • Latency - All access to the cloud is done via the internet, introducing latency into every communication between the user and the environment • Platform or Language Constraints - Some cloud environments provide support for specific platforms and languages only • Legal Issues - There are concerns in the cloud computing community over jurisdiction, data protection, fair information practices, and international data transfer
  • 45. Final Thoughts • Cloud Computing is in essence an economic model – It is a different way to acquire and manage IT resources • There are multiple cloud providers—the cloud is real – Currently most cloud consumers are small enterprises – Large enterprises are exploring private clouds – The number of providers will most probably grow as people start seeing greater savings and improvements to reduce adoption barriers
  • 46. Final Thoughts • Cloud Computing adoption requires cost/ benefit/risk analysis to determine – What resources to move to the cloud (if any) – What situations warrant use of cloud resources, even for one-time situations – Implementation of private clouds vs. usage of public clouds – What risks are associated with using resources on the cloud – What risks are associated to providing resources in the cloud
  • 47. Final Thoughts • Decisions from a cloud consumer perspective depend on – Required control level – Required security level – Compatibility with local infrastructure • Decisions from a cloud provider perspective depend on – Market/user characteristics – Established SLAs – Available technology
  • 48. Thank You Tom Eberle Tom.Eberle@Comcast.net LinkedIn.com/in/teberle Twitter.com/teberle
  • 49. References • Cloud Security Alliance Guide.v3.0 • “Introduction to Cloud Computing” – Everyman IT • “Introduction to Security and Privacy in Cloud Computing”, Ragib Hanson , Johns Hopkins University, 1/25/2010 • “Architectural Implications of Cloud Computing”, Grace A. Lewis, Software Engineering Institute, 2011 • “Introduction to Cloud Computing”, Wikipedia • “Cloud Computing”, Wikipedia

Notas do Editor

  1. This class introduces students to the world of Cloud Computing and explains that Cloud Computing is more then Virtualization.
  2. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  3. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  4. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  5. Are Created in Web Programming Languages Generally Use Databases to Store Data
  6. Are Generally Used for Database Servers (MySQL, Microsoft Active Directory) Load is balanced between servers in a cluster. If one server fails the cluster responds by not sending traffic to it. Servers maintain the same data by using replication
  7. Based off of old Mainframe and Dumb Terminal Architecture Now You Use Terminal Services Servers and Thin Clients Thin Clients can be Hardware Devices or Software installed on a computer All processing happens on Terminal Services Server and the Thin Client simply gets a "Window" into the server. Example: http://www.ncomputing.com/
  8. Uses Terminal Services but instead of providing a full Environment it only delivers a specific Application.
  9. Uses Desktop Clients Software or Hypervisors to allow you to install multiple Operating Systems on to one physical server.
  10. Example: Mac Computer VMWare Fusion Install Windows 7 Windows 7 runs in a window on the Mac Desktop
  11. i. Hypervisor is installed on the physical hardware to support the Operating Systems, and Management Software is used to configure each Virtual Machine, or Instance. ii. VMWare uses ESXi as the Hypervisor and vSphere for the Management Software
  12. i. Hypervisor is installed on the physical hardware to support the Operating Systems, and Management Software is used to configure each Virtual Machine, or Instance. ii. VMWare uses ESXi as the Hypervisor and vSphere for the Management Software
  13. Management Software Installed on another computer VMware vSphere
  14. Management Software Installed on another computer VMware vSphere
  15. i. Hypervisor is installed on the physical hardware to support the Operating Systems, and Management Software is used to configure each Virtual Machine, or Instance. ii. VMWare uses ESXi as the Hypervisor and vSphere for the Management Software
  16. The Public Cloud is Cloud Computing used from Online Vendors Private Clouds are environments on business/organization property that use Cloud Technologies.
  17. The Public Cloud is Cloud Computing used from Online Vendors Private Clouds are environments on business/organization property that use Cloud Technologies.
  18. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  19. For those concerned about the security of sensitive data, Amazon moved to create “GovCloud,” a cluster of data centers only available to government agencies and contractors
  20. Security... Most Small Business Security is poor. Security for most small to medium sized business will be better when systems are hosted in the cloud Local and Internet Bandwidth becomes more important with Cloud Computing. Even on the LAN you may end using all of your bandwidth.
  21. Security... Most Small Business Security is poor. Security for most small to medium sized business will be better when systems are hosted in the cloud Local and Internet Bandwidth becomes more important with Cloud Computing. Even on the LAN you may end using all of your bandwidth.
  22. Security... Most Small Business Security is poor. Security for most small to medium sized business will be better when systems are hosted in the cloud Local and Internet Bandwidth becomes more important with Cloud Computing. Even on the LAN you may end using all of your bandwidth.