Cloud Computing Project
Cloud Computing Project
Cloud Computing Project
Prepared By
Supervised By
Mehedi Hasan
Date:April, 2012
Cloud Computing
Page |2
IST, Dhaka
Cloud Computing
Page |3
Acknowledgement
IST, Dhaka
Cloud Computing
Page |4
Contents
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Abstract
Introduction
The Concept
Comparison with other sytems
Brief history
Service model of Cloud computing
Deployment model of cloud computing
Architecture of cloud computing
Cloud consumption type
Obstackels
Advantages
Example
Some issues
Research
future
IST, Dhaka
Cloud Computing
Page |5
Abstract
Imagine yourself in the world where the users of the computer of todays internet
world dont have to run, install or store their application or data on their own
computers, imagine the world where every piece of your information or data
would reside on the Cloud (Internet).
As a metaphor for the Internet, "the cloud" is a familiar clich, but when
combined with "computing", the meaning gets bigger and fuzzier. Some analysts
and vendors define cloud computing narrowly as an updated version of utility
computing: basically virtual servers available over the Internet. Others go very
broad, arguing anything you consume outside the firewall is "in the cloud",
including conventional outsourcing.
Cloud computing comes into focus only when you think about what we
always need: a way to increase capacity or add capabilities on the fly without
investing in new infrastructure, training new personnel, or licensing new
software. Cloud computing encompasses any subscription-based or pay-per-use
service that, in real time over the Internet, extends ICT's existing capabilities.
Cloud computing is at an early stage, with a motley crew of providers large
and small delivering a slew of cloud-based services, from full-blown applications
to storage services to spam filtering. Yes, utility-style infrastructure providers are
part of the mix, but so are SaaS (software as a service) providers such as
Salesforce.com. Today, for the most part, IT must plug into cloud-based services
individually, but cloud computing aggregators and integrators are already
emerging.
IST, Dhaka
Cloud Computing
Page |6
Introduction
this project is done about all about cloud computing. this project includes
what is cloud
characteristics
Brief history
types of Cloud Services
its clients
How to deploy Cloud system
the Architecture of cloud sytem
Software and applications regarding Cloud
Some issues like, Privacy, legal, security, open source and Sustainability
researches in this cloud computing
References
IST, Dhaka
Cloud Computing
Page |7
IST, Dhaka
Cloud Computing
Page |8
The two words in the phrase Cloud Computing have the following interpretations:
To "store, manage, and process data, which implies that the data
is private to the entity, in the sense that it is determined by them, even if it
is accessible by others.
IST, Dhaka
Cloud Computing
Page |9
IST, Dhaka
Cloud Computing
P a g e | 10
Characteristics
Cloud computing exhibits the following key characteristics:
Empowerment of end-users of computing resources by putting the
provisioning of those resources in their own control, as opposed to the
control of a centralized IT service (for example)
Agility improves with users' ability to re-provision technological
infrastructure resources.
Application programming interface (API) accessibility to software that
enables machines to interact with cloud software in the same way the user
interface facilitates interaction between humans and computers. Cloud
computing systems typically use REST-based APIs.
Cost is claimed to be reduced and in a public cloud delivery model capital
expenditure is converted to operational expenditure. This is purported to
lower barriers to entry, as infrastructure is typically provided by a thirdparty and does not need to be purchased for one-time or infrequent
intensive computing tasks. Pricing on a utility computing basis is finegrained with usage-based options and fewer IT skills are required for
implementation (in-house).
Device and location independence enable users to access systems using a
web browser regardless of their location or what device they are using
(e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a
third-party) and accessed via the Internet, users can connect from
anywhere.
Virtualization technology allows servers and storage devices to be shared
and utilization be increased. Applications can be easily migrated from one
physical server to another.
ECE 4th Year Project
IST, Dhaka
Cloud Computing
P a g e | 11
IST, Dhaka
Cloud Computing
P a g e | 12
IST, Dhaka
Cloud Computing
P a g e | 13
IST, Dhaka
Cloud Computing
P a g e | 14
Brief History
The term "cloud" is used as a metaphor for the Internet, based on the cloud
drawing used in the past to represent the telephone network,[19] and later to
depict the Internet in computer network diagrams as an abstraction of the
underlying infrastructure it represents.
The ubiquitous availability of high capacity networks, low cost computers and
storage devices as well as the widespread adoption of virtualization, serviceoriented architecture, autonomic, and utility computing have led to a tremendous
growth in cloud computing. Details are abstracted from end-users, who no longer
have need for expertise in, or control over, the technology infrastructure "in the
cloud" that supports them.
The underlying concept of cloud computing dates back to the 1960s, when John
McCarthy opined that "computation may someday be organized as a public
utility." Almost all the modern-day
characteristics of cloud computing (elastic
provision, provided as a utility, online,
illusion of infinite supply), the comparison
to the electricity industry and the use of
public, private, government, and
community forms, were thoroughly
explored in Douglas Parkhill's 1966 book,
The Challenge of the Computer Utility.
Other scholars have shown that cloud
computing's roots go all the way back to
the 1950s when scientist Herb Grosch
(the author of Grosch's law) postulated
that the entire world would operate on
dumb terminals powered by about 15
large data centers.
IST, Dhaka
Cloud Computing
P a g e | 15
IST, Dhaka
Cloud Computing
P a g e | 16
IST, Dhaka
Cloud Computing
P a g e | 17
IST, Dhaka
Cloud Computing
P a g e | 18
IST, Dhaka
Cloud Computing
P a g e | 19
IST, Dhaka
Cloud Computing
P a g e | 20
IST, Dhaka
Cloud Computing
P a g e | 21
IST, Dhaka
Cloud Computing
P a g e | 22
way
IST, Dhaka
Cloud Computing
P a g e | 23
IST, Dhaka
Cloud Computing
P a g e | 24
Public cloud
Public clouds are
cloud systems that are
made available to any
entity in a nonexclusive group, such
as the general public,
or all organisations in a
specific industry.
Because there are
many consumers,
these are multitenanted clouds. They
are owned by cloud
providers, and are off-premise for all consumers.
The cloud is public only in the sense that, potentially, any entity that requires the
provided services can become a consumer, and a public cloud may not
necessarily be of interest to every entity. For example, a SaaS public cloud might
provide an accounting system that is of interest only to certain types of small
business.
The most ubiquitous, and almost a synonym for, cloud computing. The
cloud infrastructure is made available to the general public or a large
industry group and is owned by an organization selling cloud services.
Examples of Public Cloud:
IST, Dhaka
Cloud Computing
P a g e | 25
Community cloud
Community cloud shares infrastructure between several organizations from
a specific community with common concerns (security, compliance,
jurisdiction, etc.), whether managed internally or by a third-party and
hosted internally or externally. The costs are spread over fewer users than
a public cloud
(but more than a
private cloud), so
only some of the
cost savings
potential of cloud
computing are
realized.
Community
clouds are
supplied to a
group of related
entities that share
a common
purpose, such as mission, security requirements, policy or compliance
considerations, and that therefore need the same type of hosting. These
are multi-tenanted clouds that may be managed by the community or by a
third party, and they may be off-premise for all the consumers, or onpremise for one of the consumers.
Unlike a private cloud, the community of consumers isn't narrowly
exclusive. However, they may not be truly public clouds, because not every
entity that could use the service may be able to become a consumer.
IST, Dhaka
Cloud Computing
P a g e | 26
Hybrid Cloud
A hybrid cloud is a composition of two or more public, private and community
clouds that are used on a day-to-day basis or for cloud bursting.
Becoming part of such a cloud can be attractive to the providers, because it results
in a larger pool of resources that
can be made available to their
consumers, so that variations
in demand can be managed
more flexibly. Also, for
consumers, it may be that
some of their data must be in a
private cloud, for security and
privacy reasons, but it may be
more economical to keep some
other, perhaps less sensitive,
data in a public cloud, because
the cost of these is generally
lower.
A hybrid cloud is also a cloud
of clouds, but the difference
with the latter is that it can contain only one type of cloud deployment, rather than
a mixture of public and private clouds, as with a hybrid.
IST, Dhaka
Cloud Computing
P a g e | 27
Private cloud
Private clouds(also called internal cloud or corporate cloud) are cloud systems
that are accessible only by a single entity, or by an exclusive group of related
entities that share the same purpose and requirements, such as all the
business units in a single organisation. They are generally single-tenanted, but
they can be multi-tenanted if the individual group members act as separate
consumers. They may be owned by a cloud provider and be located offpremise, or they may be owned and operated by the consumer and be
located on-premise. In the latter case, they can also be known as internal
clouds or corporate clouds. These clouds are usually private because of the
IST, Dhaka
Cloud Computing
P a g e | 28
need for system and data security, and, for this reason, they will usually be
behind a firewall that restricts access to a limited set of client devices.
There are some it systems that have some of the same characteristics and
advantages as cloud computing, but that are accessible only through a
private LAN or WAN, rather than the Internet. These have been described as
cloud computing-like, but, because of the shared features, they are
sometimes included as part of cloud computing itself.
IST, Dhaka
Cloud Computing
P a g e | 29
become service providers that meet the needs of their "customers" within the
corporation. Marketing media that uses the words "private cloud" is designed
to appeal to an organization that needs or wants more control over their data
than they can get by using a third-party hosted service such as Amazon's
Elastic Compute Cloud (EC2) or Simple Storage Service (S3).
Vertical cloud
A vertical cloud is a public cloud optimized for a specific, vertical industry.
IST, Dhaka
Cloud Computing
P a g e | 30
The Intercloud
The Intercloud is an interconnected global "cloud of clouds" and an
extension of the In the Intercloud is an interconnected global "cloud
of clouds" and an extension of the Internet "network of networks" on which it is
based. The term was first used in the context of cloud computing in 2007
when Kevin Kelly opined that "eventually we'll have the Intercloud, the cloud of
clouds". It became popular in 2009 and has also been used to describe the
datacenter of the future.
The Intercloud scenario is based on the key concept that each single cloud does
not have infinite physical resources. If a cloud saturates, the computational and
storage resources of its infrastructure, it would not be able to satisfy further
requests for service allocations sent from its clients. The Intercloud scenario aims
to address such a situation, and in theory, each cloud can use the computational
and storage resources of the infrastructures of other clouds. Such forms of pay-
IST, Dhaka
Cloud Computing
P a g e | 31
for-use may introduce new business opportunities among cloud providers if they
manage to go beyond the theoretical framework.
Nevertheless, the Intercloud raises many more challenges than solutions
concerning federation, security, interoperability, vendors' lock-ins, trust, legal
issues, QoS, monitoring, and billing.
Ternet "network of networks" on which it is based. The term was first used in the
context of cloud computing in 2007 when Kevin Kelly opined that "eventually we'll
have the Intercloud, the cloud of clouds". It became popular in 2009 and has
also been used to describe the datacenter of the future.
The Intercloud scenario is based on the key concept that each single cloud does
not have infinite physical resources. If a cloud saturates, the computational and
storage resources of its infrastructure, it would not be able to satisfy further
requests for service allocations sent from its clients. The Intercloud scenario aims
to address such a situation, and in theory, each cloud can use the computational
and storage resources of the infrastructures of other clouds. Such forms of payfor-use may introduce new business opportunities among cloud providers if they
manage to go beyond the theoretical framework.
IST, Dhaka
Cloud Computing
P a g e | 32
Cloud engineering
Cloud Architecture
Cloud engineering is the application of engineering disciplines to cloud
computing. It brings a systematic approach to the high level concerns of
commercialization, standardization, and governance of cloud computing
applications. At a practical level it adopts the tools of engineering in
conceiving, developing, operating and maintaining cloud computing
systems.
IST, Dhaka
Cloud Computing
P a g e | 33
IST, Dhaka
Cloud Computing
P a g e | 34
their day-to-day use of the services, or the way they contract for the services, or
their reasons for choosing one service over another, and these have been called
the consumption model.
Some of them have been described as essential, but it has also been observed
that no single feature is proposed by all definitions and they have been
discussed using terms such as alternatives, options, generally, recurrent ideas or
typically, to indicate that they dont necessarily apply to all cloud services.
We will describe five common types of consumption model of cloud computing
system:
IST, Dhaka
Cloud Computing
P a g e | 35
Measured service
Payment on the basis of consumption requires a measured service and
a metering capability, but even free services may need to be metered if
they apply only up to some level of resource.
Resource pooling
Multi-tenant hosting involves pooled resources that are shared among the
several tenants. This can be a consumer advantage, because sharing the
resources may lead to lower costs for each tenant.
However, resource pooling doesn't apply to a private cloud with only one
tenant, because this type of resource sharing applies only between
different tenants, rather than among a tenant's individual users. Sharing
resources among users applies to any server or datacenter, whether it is
part of cloud computing or not.
i.
IST, Dhaka
Cloud Computing
ii.
iii.
P a g e | 36
Access
a. Broad
Access to cloud services is via the Internet, and this leads to the possibility
of consumers having broad access, which means the ability to use the
services from multiple types of cloud client, including desktop, portable and
hand-held devices, or from many different locations.
To achieve access from many different clients, it is necessary for the
websites to be made compatible with hand-held devices as well as PCs, for
example because of the different screen sizes and the different mechanics
of scrolling within large web pages.
Access can be from any location where an Internet connection is available,
either from a fixed PC, for example in an office or Internet caf, or from
anywhere that mobile telephone access is available, for example using
a USB modem attached to a notebook.
However, a private cloud may only allow access from certain sources, for
example if it is behind a firewall.
b. Transparent
In IT, something is transparent to users if they do not need to understand
or be aware of it. For example, with cloud computing, consumers can
IST, Dhaka
Cloud Computing
P a g e | 37
have transparent access, which means that the users of a service need not
be aware of who provides the service or where the host is located.
However, for legal and regulatory requirements regarding the security of
data and the laws that might apply to breaches of service levels, a
consumer may need to have their hosting provided by a known
organization in a specific location.
IST, Dhaka
Cloud Computing
P a g e | 38
IST, Dhaka
Cloud Computing
P a g e | 39
IST, Dhaka
Cloud Computing
P a g e | 40
target from the SaaS provider to the Utility Computing provider, who can
more readily absorb it and (as we argued in Section 3) is also likely to have
already DDoS protection as a core competency.
Data Lock-In
Software stacks have improved interoperability among platforms, but the
APIs for Cloud Computing itself are still essentially proprietary, or at least
have not been the subject of active standardization. Thus, customers
cannot easily extract their data and programs from one site to run on
another. Concern about the difcult of extracting data from the cloud is
preventing some organizations from adopting Cloud Computing. Customer
lock-in may be attractive to Cloud Computing providers, but Cloud
Computing users are vulnerable to price increases (as Stallman warned), to
reliability problems, or even to providers going out of business.
For example, an online storage service called The Linkup shut down on
August 8, 2008 after losing access as much as 45% of customer data [12].
The Linkup, in turn, had relied on the online storage service Nirvanix to
store customer data, and now there is nger pointing between the two
organizations as to why customer data was lost. Meanwhile, The Linkups
20,000 users were told the service was no longer available and were urged
to try out another storage site.
The obvious solution is to standardize the APIs so that a SaaS developer
could deploy services and data across multiple Cloud Computing providers
so that the failure of a single company would not take all copies of
customer data with it. The obvious fear is that this would lead to a race-tothe-bottom of cloud pricing and atten the prots of Cloud Computing
providers. We offer two arguments to allay this fear.
First, the quality of a service matters as well as the price, so customers will
not necessarily jump to the lowest cost service. Some Internet Service
Providers today cost a factor of ten more than others because they are
more dependable and offer extra services to improve usability.
IST, Dhaka
Cloud Computing
P a g e | 41
IST, Dhaka
Cloud Computing
P a g e | 42
A related concern is that many nations have laws requiring SaaS providers
to keep customer data and copyrighted material within national
boundaries. Similarly, some businesses may not like the ability of a country
to get access to their data via the court system; for example, a European
customer might be concerned about using SaaS in the United States given
the USA PATRIOT Act.
Cloud Computing gives SaaS providers and SaaS users greater freedom to
place their storage. For example,Amazon provides S3 services located
physically in the United States and in Europe, allowing providers to keep
data in whichever they choose. With AWS regions, a simple conguration
change avoids the need to nd and negotiate with a hosting provider
overseas.
IST, Dhaka
Cloud Computing
P a g e | 43
IST, Dhaka
Cloud Computing
P a g e | 44
Our experience is that multiple Virtual Machines can share CPUs and main
memory surprisingly well in Cloud Computing, but that I/O sharing is more
problematic. Figure 3(a) shows the average memory bandwidth for 75 EC2
instances running the STREAM memory benchmark [32]. The mean
bandwidth is 1355 MBytes per second, with a
standard deviation of just 52 MBytes/sec, less than 4% of the mean. Figure
3(b) shows the average disk bandwidth
for 75 EC2 instances each writing 1 GB les to local disk. The mean disk
write bandwidth is nearly 55 MBytes per
second with a standard deviation of a little over 9 MBytes/sec, more than
16% of the mean. This demonstrates the
problem of I/O interference between virtual machines.
One opportunity is to improve architectures and operating systems to
efciently virtualize interrupts and I/O channels. Technologies such as
PCIexpress are difcult to virtualize, but they are critical to the cloud. One
reason to be
hopeful is that IBM mainframes and operating systems largely overcame
these problems in the 1980s, so we have
successful examples from which to learn.
Another possibility is that ash memory will decrease I/O interference.
Flash is semiconductor memory that
preserves information when powered off like mechanical hard disks, but
since it has no moving parts, it is much faster
to access (microseconds vs. milliseconds) and uses less energy. Flash
memory can sustain many more I/Os per second
per gigabyte of storage than disks, so multiple virtual machines with
conicting random I/O workloads could coexist
better on the same physical computer without the interference we see with
mechanical disks. The lack of interference
that we see with semiconductor main memory in Figure 3(a) might extend
to semiconductor storage as well, thereby
IST, Dhaka
Cloud Computing
P a g e | 45
increasing the number of applications that can run well on VMs and thus
share a single computer. This advance could
lower costs to Cloud Computing providers, and eventually to Cloud
Computing consumers.
Another unpredictability obstacle concerns the scheduling of virtual
machines for some classes of batch processing
programs, specically for high performance computing. Given that highperformance computing is used to justify
Government purchases of $100M supercomputer centers with 10,000 to
1,000,000 processors, there certainly are
many tasks with parallelism that can benet from elastic computing. Cost
associativity means that there is no cost
penalty for using 20 times as much computing for 1=20th
the time. Potential applications that could benet include
those with very high potential nancial returnsnancial analysis,
petroleum exploration, movie animationand
could easily justify paying a modest premium for a 20x speedup. One
estimate is that a third of todays server market
is high-performance computing [10].
The obstacle to attracting HPC is not the use of clusters; most parallel
computing today is done in large clusters
using the message-passing interface MPI. The problem is that many HPC
applications need to ensure that all the
threads of a program are running simultaneously, and todays virtual
machines and operating systems do not provide a programmer-visible way
to ensure this. Thus, the opportunity to overcome this obstacle is to offer
something like
gang scheduling for Cloud Computing.
IST, Dhaka
Cloud Computing
P a g e | 46
Scaling Quickly
Pay-as-you-go certainly applies to storage and to network bandwidth, both
of which count bytes used. Computation
is slightly different, depending on the virtualization level. Google AppEngine
automatically scales in response to
load increases and decreases, and users are charged by the cycles used.
AWS charges by the hour for the number of
instances you occupy, even if your machine is idle.
The opportunity is then to automatically scale quickly up and down in
response to load in order to save money,
but without violating service level agreements. Indeed, one RAD Lab focus
is the pervasive and aggressive use of
statistical machine learning as a diagnostic and predictive tool that would
allow dynamic scaling, automatic reaction
to performance and correctness problems, and generally automatic
management of many aspects of these systems.
Another reason for scaling is to conserve resources as well as money. Since
an idle computer uses about two-thirds
of the power of a busy computer, careful use of resources could reduce the
impact of datacenters on the environment,
IST, Dhaka
Cloud Computing
P a g e | 47
IST, Dhaka
Cloud Computing
P a g e | 48
Software Licensing
Current software licenses commonly restrict the computers on which the
software can run. Users pay for the software
and then pay an annual maintenance fee. Indeed, SAP announced that it
would increase its annual maintenance fee to at least 22% of the purchase
price of the software, which is comparable to Oracles pricing *38]. Hence,
many cloud computing providers originally relied on open source software
in part because the licensing model for commercial software is not a good
match to Utility Computing.
The primary opportunity is either for open source to remain popular or
simply for commercial software companies to change their licensing
structure to better t Cloud Computing. For example, Microsoft and
Amazon now offer pay-as-you-go software licensing for Windows Server
and Windows SQL Server on EC2. An EC2 instance running Microsoft
Windows costs $0.15 per hour instead of the traditional $0.10 per hour of
the open source version.
A related obstacle is encouraging sales forces of software companies to sell
products into Cloud Computing. Payas-you-go seems incompatible with the
quarterly sales tracking used to measure effectiveness, which is based on
one-time purchases. The opportunity for cloud providers is simply to offer
prepaid plans for bulk use that can be sold at discount. For example,
Oracle sales people might sell 100,000 instance hours using Oracle that
can be used over the next two years at a cost less than is the customer
were to purchase 100,000 hours on their own. They could then
meet their quarterly quotas and make their commissions from cloud sales
as well as from traditional software sales, potentially converting this
customer-facing part of a company from naysayers into advocates of cloud
computing.
IST, Dhaka
Cloud Computing
P a g e | 49
Advantages
There are many possible advantages of cloud computing, but they may not
apply to all consumers.
Reduced Costs:
Cloud services paid for on a usage basis can be financially advantageous for
a consumer when compared to the outright purchase, or long-term rental,
of what would be a big-budget item. Also, there are reduced operating
costs, because a cloud consumer does not need to house, staff and
maintain their own equipment.
Up to date software:
SaaS consumers can always have the most up-to-date software, because
versioning is controlled centrally by the cloud provider, and when they
make a new release it is automatically available to every user.
This is particularly advantageous for cloud desktops, because deployment
of new software versions can be very costly and time consuming for a large
organisation with many PCs, and because it can therefore be difficult to
ensure that everyone has the same version of the organisation's PC
software applications at any one time.
Improved access:
Cloud computing involves using the Internet, and this can provide access
from multiple locations and many different types of user device.
IST, Dhaka
Cloud Computing
P a g e | 50
IST, Dhaka
Cloud Computing
P a g e | 51
For example, the provider may be able to supply better demand smoothing,
because they can perform capacity planning over a much larger pool of
resources, and for a large group of consumers, whose peak loads will
probably not occur all at the same time.
Examples
All cloud services have a dedicated-resource aspect, with consumer-controlled access
to these resources by authorised users, via a secure-access method, such as a login
ID. Also, the resources process data that is private to the consumer and their
associates, which means that it is entered or created by them, although it may be
accessible by others, including the general public.
There are many organisations that supply cloud services, and there is a very wide range
of such services.
Application Software
A range of cloud applications is available, including common small-business
applications, such as accounting, and medium-to-large organisation line-ofbusiness or mission-critical applications, such as CRM and ERP.
These applications are:
The authorized users of the hosted software include the organizations staff, and
possibly the staff of their associates, such as customers and suppliers. The
private data includes confidential information entered by the users, such as
IST, Dhaka
Cloud Computing
P a g e | 52
Database
Database as a Service (DbaaS) hosts cloud databases, and virtually all
major database platforms are available in the cloud, including Amazon
SimpleDB and Amazon Relational Database Service.
The private data for these services consists of the records stored in the
database.
Email
Email computing involves two aspects:
IST, Dhaka
Cloud Computing
P a g e | 53
private data for this computing consists of the received and sent emails
stored, perhaps temporarily, by the ISP prior to being retrieved for reading
on the PC, or sent via the Internet.
For web-based email, or webmail, such as Gmail, the data is stored for the
consumer in disk space allocated by the service provider, and emails are
composed, read and organised using software hosted by the provider at their
site. The private data for this computing includes all emails, folders and address
books. Webmail is part of Software as a Service.
In both cases, a PC, or other user device, is a cloud client used to access the
services.
Office-productivity software
Office-productivity software, such as Google Docs, is available as a cloud
service. The private data for this software consists of the user's created
artefacts, such as word-processor documents and spreadsheet models, which
are stored and managed on the provider's infrastructure. This is part
of Software as a Service.
Software production
Development environments
There are cloud services, such as the Azure Services Platform, that
provide software-development environments. These are part
of Platform as a Service, which is one of the cloud-computing service
models.
The private data for these services consists of all development
information, which would be accessible only by the consumers and
their authorized users, including any third-party developers.
Customer support
There are cloud services, such as Get Satisfaction, that provide self-help
and developer support for the customers of a software company. This
IST, Dhaka
Cloud Computing
P a g e | 54
support is obtained and entered at a website that hosts and sells the
companys products.
This is a service for the software company, and the private data includes
the domain names of the websites for which support is required.
Storage Service
Disk storage space can be rented from some cloud providers, and consumers of
these services can upload software or data, for example by using the service for
backup of client-device information. The private data would consist of the
uploaded material.
The infrastructure is:
Screen-sharing systems, such as LogMeIn and Mikogo that can be used for remote
support or co-operation on projects among geographically distributed participants.
For these systems, client software needs to be installed on a user device, and
this isn't part of cloud computing, but there is also central storage of a user's
identity, so that they can connect with others. This storage and the associated
connectivity software are part of cloud computing.
The private data for this service includes the consumers identity.
Websites
Creation and hosting
There are cloud services that provide website creation and hosting.
IST, Dhaka
Cloud Computing
P a g e | 55
The private data for the consumers of these services includes the
websites content, and the dedicated resources would include a CMS, so
that they can manage the website, and possibly a CRM, so that they can
manage customers and purchases.
Feedback
There are cloud services for website operators, that allow visitors to a
website to provide feedback to these operators, and that allow the
operators to analyse this feedback.
The private data includes the consumers domain names for which
feedback is required.
Visitor statistics
There are cloud services, such as Google Analytics, that provide website
visitor statistics to the operators, and that provide analysis of these
statistics.
These are consumed by website operators, and the private data includes
the consumers domain names for which statistics are required.
Payment
There are cloud services, such as PayPal, that allow website visitors to
pay for anything purchased at the site.
These are consumed by website operators, and the private data includes
information on the consumers connected bank accounts, so that transfers
of accumulated payment amounts can be made.
Personal uses
Cloud storage
Anyone with Internet access can rent cloud storage and upload their
personal data, for backup or sharing purposes. This is known as
a personal cloud, and it is part of Infrastructure as a Service.
For example, with photos in the cloud, a family can share them with
members and friends that are in distributed locations, in a way that
couldnt happen with data on their PCs. The private data consists of the
IST, Dhaka
Cloud Computing
P a g e | 56
uploaded information, and the authorised users consist of all those given
access to this information.
Potentially, this type of service could have the largest group of tenants
across all providers, because any member of the general public with a
device that can access the Internet can become a consumer, if only to
backup data.
Internet TV
Internet TV, also known as cloud TV, is a cloud service.
The private data for the consumers of these services includes
their multicast address.
Online banking
Online banking is an example of SaaS for the banks customers, and the
private data for each consumer includes their bank account transaction
information.
Besides desktop and portable computers, the cloud clients used to access
this service include ATMs, online or mobile wallets, and point-of-sale
terminals.
Synced data
Different client devices owned by the same consumer can have their data
synchronized, or synced, via the cloud, so that each device can access
the data produced by all the other devices. This is done by automatically
backing up the data of each client using cloud infrastructure.
One example of this for personal use is the iCloud, which provides cloud
storage for an individual's music downloads from the iTunes Store in such
a way that they can be accessed from any of their client devices. In this
IST, Dhaka
Cloud Computing
P a g e | 57
case, the private data consists of the tunes that are automatically gathered
for the consumer onto their cloud storage, regardless of how they are
purchased.
Online retailing
There are cloud services, such as eBay, that allow individuals to sell items
on the Internet.
The private data for these services includes details of the consumers sale
items.
Blogging
There are cloud services, such as WordPress, that enable individuals to
create and maintain a weblog.
The consumers of these services control access by allowing only
themselves to contribute blog topics and to respond to visitor comments,
or by authorising others to do so.
The private data includes the:
1. Topics that are entered from time to time.
2. Comments entered by blog visitors, which can be published or
suppressed by the consumer.
3. Responses of the consumer.
4. Details of who can read or contribute to the blog, which can be the
general public, or an exclusive group.
IST, Dhaka
Cloud Computing
P a g e | 58
with the same file-sharing software, such as BitTorrent, that are on-line at
any one time. For these participants, the service is the mutual sharing of
files, and this sharing is:
1. Consumed by each participant by uploading from another participant, or
Consumers, the:
1. Private data consists of the files on their own device that they allow to be shared.
2. Dedicated resources include their file-sharing software, which is used for the
uploading and downloading of files, and to identify them as part of the network.
3. Controlled access consists of allowing the use of their client device for uploading
IST, Dhaka
Cloud Computing
P a g e | 59
Privacy
The cloud model has been criticized by privacy advocates for the greater
ease in which the companies hosting the cloud services control, thus, can
monitor at will, lawfully or unlawfully, the communication and data stored
between the user and the host company. Instances such as the secret NSA
program, working with AT&T, and Verizon, which recorded over 10 million
phone calls between American citizens, causes uncertainty among privacy
advocates, and the greater powers it gives to telecommunication
companies to monitor user activity. Using a cloud service provider (CSP) can
complicate privacy of data because of the extent to which virtualization for
cloud processing (virtual machines) and cloud storage are used to
implement cloud service . The point is that because of CSP operations,
customer or tenant data may not remain on the same system, or in the
same data center or even within the same provider's cloud. This can lead to
legal concerns over jurisdiction. While there have been efforts (such as USEU Safe Harbor) to "harmonize" the legal environment, providers such
as Amazon still cater to major markets (typically the United States and the
European Union) by deploying local infrastructure and allowing customers
to select "availability zones."Cloud computing poses privacy concerns
because the service provider at any point in time, may access the data that
is on the cloud. They could accidentally or deliberately alter or even delete
some info.
Compliance
In order to obtain compliance with regulations including FISMA, HIPAA,
and SOX in the United States, the Data Protection Directive in the EU and
IST, Dhaka
Cloud Computing
P a g e | 60
IST, Dhaka
Cloud Computing
P a g e | 61
Open source
Open-source software has provided the foundation for many cloud
computing implementations, one prominent example being the Hadoop
framework. In November 2007, the Free Software Foundation released
the Affero General Public License, a version of GPLv3 intended to close a
perceived legal loophole associated with free software designed to be run
over a network.
Open standards
Most cloud providers expose APIs that are typically well-documented (often
under a Creative Commons license) but also unique to their
implementation and thus not interoperable. Some vendors have adopted
others' APIs and there are a number of open standards under development,
with a view to delivering interoperability and portability.
Security
As cloud computing is achieving increased popularity, concerns are being
voiced about the security issues introduced through adoption of this new
model. The effectiveness and efficiency of traditional protection
mechanisms are being reconsidered as the characteristics of this innovative
deployment model can differ widely from those of traditional
architectures. An alternative perspective on the topic of cloud security is
that this is but another, although quite broad, case of "applied security"
and that similar security principles that apply in shared multi-user
mainframe security models apply with cloud security.
The relative security of cloud computing services is a contentious issue that
may be delaying its adoption. Physical control of the Private Cloud
equipment is more secure than having the equipment off site and under
someone elses control. Physical control and the ability to visually inspect
the data links and access ports is required in order to ensure data links are
not compromised. Issues barring the adoption of cloud computing are due
in large part to the private and public sectors' unease surrounding the
external management of security-based services. It is the very nature of
cloud computing-based services, private or public, that promote external
management of provided services. This delivers great incentive to cloud
computing service providers to prioritize building and maintaining strong
IST, Dhaka
Cloud Computing
P a g e | 62
IST, Dhaka
Cloud Computing
P a g e | 63
Research
IST, Dhaka
Cloud Computing
P a g e | 64
IST, Dhaka
Cloud Computing
P a g e | 65
IST, Dhaka
Cloud Computing
P a g e | 66
Second, we're beginning to focus on fit and function, and not the hype.
However, I still see many square cloud pegs going into round enterprise
holes. Why? The hype drives the movement to cloud computing, but there
is little thought as to the actual fit of the technology. Thus, there is
diminished business value and even a failed project or two. We'll find the
right fit for this stuff in a few years. We just need to learn from our failures
and become better at using clouds.
Third, security will move to "centralized trust." This means we'll learn to
manage identities within enterprises -- and within clouds. From there we'll
create places on the Internet where we'll be able to validate identities, like
the DMV validates your license. There will be so many clouds that we'll
have to deal with the need for a single sign-on, and identity-based security
will become a requirement.
IST, Dhaka
Cloud Computing
P a g e | 67
Fourth, centralized data will become a key strategic advantage. We'll get
good at creating huge databases in the sky that aggregate valuable
information that anybody can use through a publicly accessible API, such as
stock market behavior over decades or clinical outcome data to provide
better patient care. These databases will use big data technology such as
Hadoop, and they will reach sizes once unheard of.
Fifth, mobile devices will become more powerful and thinner. That's a nobrainer. With the continued rise of mobile computing and the reliance on
clouds to support mobile applications, mobile devices will have more
capabilities, but the data will live in the cloud. Apple's iCloud is just one
example.
IST, Dhaka
Cloud Computing
P a g e | 68
Refences:
IST, Dhaka