Assignment No. 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

ASSIGNMENT NO.

Q.1. Explain the NIST cloud model.


Ans:
National Institute of Standards and Technology (NIST) is an agency under the scope of US
Department of Commerce. NIST is responsible for defining standards in Science and
Technology.
The Computer Security Division of NIST has provided a formal Definition and Characteristics of
Cloud computing.

NIST five essential characteristics of Cloud Computing


1. On demand self-service
2. Broad network access
3. Resource pooling
4. Rapid Elasticity
5. Measured service

ISO 17788 six essential characteristics of Cloud Computing


1. On demand self-service
2. Broad network access
3. Resource pooling
4. Rapid Elasticity
5. Measured service
6. Multi-tenancy

1. On Demand Self service


Computer services such as Email, Application Network, or Server service can be provided
without requiring interaction with each service provider.
Self-service means that the consumer performs all the actions needed to acquire the service
himself, instead of going through an IT department. For example – The consumer’s request is
then automatically processed by the cloud infrastructure, without human intervention on the
provider’s side.

2. Broad Network Access


Cloud capabilities are available over the network and accessed through standard mechanism that
promote use by heterogeneous client such as mobile phone, laptop

3. Resource pooling
– The providers computing resources are pooled together to serve multiple customers, with
different physical and virtual resources dynamically assigned and reassigned according to the
customers demand.
– There is a sense of location independence in that the customer generally has no control or
knowledge over the exact location of the provided resources but may be able to specify location
at a higher level of abstraction (e.g. country, state, or datacenter).
– Example of resources include storage, processing, memory, and network bandwidth.

4. Rapid elasticity
– Capabilities can be elastically provisioned and released, in some cases automatically, to scale
rapidly outward and inward commensurate with demand.
– To the consumer, the capabilities available for provisioning often appear to be unlimited and
can be appropriated in any quantity at any time.

5. Measured service
– Cloud systems automatically control and optimize resource use by leveraging a metering
capability at some level of abstraction appropriate to the type of service (e.g. storage, processing,
bandwidth, and active use account).
– Resource usage can be monitored, controlled, and reported, providing transparency for both the
provider and consumer of the utilized service.
6. Multi-tenancy
In a private cloud, the customers are also called tenants, can have different business divisions
inside the same company. In a public cloud, the customers are often entirely different
organizations.
Most public cloud providers use the multi-tenancy model. Multi-tenancy allows customers to run
one server instance, which is less expensive and makes it easier to deploy updates to a large
number of customers.

Q.2. Explain the SPI cloud service model.


Ans:

A commonly agreed upon framework for describing cloud computing services goes by the
acronym "SPI." This acronym stands for the three major services provided through the cloud:
software-as-a-service (SaaS), platform-as-a-service (Paas), and infrastructure-as-a-service (Iaas).
Figure 1 illustrates the relationship between services, uses, and types of clouds. Based on its
business goals, an enterprise can choose to adopt one, or multiple, of the cloud service types
depicted in the SPI model:
1. SaaS is a software distribution model in which a cloud provider hosts applications on its
own infrastructure and makes them available to users over a network, typically the
internet.
2. PaaS is a model in which a cloud provider hosts an application development platform on
its own infrastructure and makes that platform available to users over the internet.
3. IaaS is a model in which a cloud provider hosts servers, storage, network components and
other key parts of IT infrastructure and then delivers those resources to users over the
internet.
Relevant Technologies in Cloud Computing
Cloud computing isn't so much a technology as it is the combination of many preexisting
technologies. These technologies have matured at different rates and in different contexts, and
were not designed as a coherent whole; however, they have come together to create a technical
ecosystem for cloud computing. New advances in processors, virtualization technology, disk
storage, broadband Internet connection, and fast, inexpensive servers have combined to make the
cloud a more compelling solution.
Figure 2 illustrates the relevant technologies.
1) Cloud access devices
The range of access devices for the cloud has expanded in recent years. Home PCs, enterprise
PCs, network computers, mobile phone devices, custom handheld devices, and custom static
devices (including refrigerators) are all online. Interestingly, the growth of the iPhone and the
proliferation of applications available from its App Store illustrate an improvement in terms of
access to the cloud. This greater access is resulting in greater use and growth of services within
the cloud. For example, you can now use skype through the iPhone, thus bringing this
peer-to-peer network much closer to users, and Salesforce.com has introduced an application that
allows users to access its services from the iPhone, as well as many other vendors.

2) Browsers and thin clients


Users of multiple device types can now access applications and information from wherever they
can load a browser. Indeed, browsers are becoming increasingly sophisticated. Enterprise
applications, such as SAP and Oracle, can be accessed through a browser interface- -a change
from when a client (a so-called "fat") application needed to be loaded onto the desktop. The
general population has become more familiar with the browser function and can use a discrete
application, where the context is intuitive, without requiring training or user guides.

3) High-speed broadband access


A critical component of the cloud is the broadband network, which offers the means to connect
components and provides one of the substantial differences from the utility computing concept of
30 years ago. Broadband access is now widely available, especially in global metropolitan areas.
Nearly pervasive wireless access (e.g. WiFi, cellular, emerging WiMAX) is available, which has
established mobile devices as entry points to the IT resources of the enterprise and the cloud.

4) Data centers and server farms


Cloud-based services require large computing capacity and are hosted in data centers and server
farms. These distributed data centers and server farms span multiple locations and can be linked
via internetworks providing distributed computing and service delivery capabilities.
A number of examples today illustrate the flexibility and scalability of cloud computing power.
For instance, Google has linked a very large number of inexpensive servers to provide
tremendous flexibility and power. Amazon's Elastic Compute Cloud (EC2) provides
virtualization in the data center to create huge numbers of virtual instances for services being
requested. Salesforce.com provides Saas to its large customer base by grouping its customers
into clusters to enable scalability and flexibility.

5) Storage devices
Decreasing storage costs and the flexibility with which storage can be deployed have changed
the storage landscape. The fixed direct access storage device (DASD) has been replaced with
storage area networks (SANs), which have reduced costs and allowed a great deal more
flexibility in enterprise storage. SAN software manages integration of storage devices and can
independently allocate storage space on demand across a number of devices.

Q.3. Write a short note on cloud cube model.


Ans:

The Cloud cube model helps to classify the network of cloud-based on the four-dimensional
factor. The main motive of the cloud model is to secure and protect the cloud network. The cloud
model supports to choose cloud creation for the security association. It also helps IT managers,
organizations, and business leaders by offering a safe and protected network. Security is an
essential aspect for cloud users, and most of the cloud providers understand it. The customer
should also take care of that; the selected cloud formation fulfills the regulatory and location
needs. They also need one thing in their mind that if cloud providers stop offering the services,
where else they can move.

There are three service models which consist:


● SaaS
● PaaS
● IaaS

There are four deployment models also.


● Public cloud
● Private cloud
● Community cloud
● Hybrid cloud

The models are flexible, user-friendly, and offer many benefits to cloud users.

How data is secured in the cloud cube model?


There are various steps and point you should keep on your mind while securing your data in a
cloud cube model.
1. The categorization of the data, the user must know what rules must be applied to secure
and protect it.
2. It should make sure; that the data exist only in particular trust levels.
3. It should examine that what regulatory compliance and constraints are applicable. For
example: – The data must keep in a specific limit and whether it has to stay in the secure
harbor or not.
When the data is categorized and can put in the needed zone, the assigned person is in a position
to decide the following aspects-
● The processes and data, which are to be shift in the cloud.
● At what level the customer wants to operate in the cloud. Maybe it is infrastructure,
platform, and software.
● The cloud formations fulfill the requirements.
● In a cloud, the level of operation can be different as per the requirement.
The following figure shows the cloud layers, where the cloud operates:
Dimensions of Cloud Cube Model
There are four dimensions in the Cloud cube model.
● Internal/External
● Proprietary/open
● De-perimeterized/perimeterized
● Insourced/outsourced dimension

Internal/External: – Internal/External is the most common form of the cloud. It describes the
physical location of the data. It agrees us whether the data exists inside or outside of your
organization’s limit. In this, the data that is stored by the help of private cloud deployment will
be referred to as internal, and data outside the cloud will be referred to as external.

Proprietary/Open: ​– The second dimension of cloud formation is proprietary/open. It defines


the state of ownership of the cloud technology and interfaces. It also defines the level of
incomparability while enabling data transportability between the system and forms of cloud.

The meaning of proprietary dimension means that the organization is offering the service in a
secure and protected manner under their ownership.
The open dimension using such type of technology in which more suppliers are allowing. In
addition to that, the user is not constrained in being able to share the data and cooperate with
selected partners using open technology.

De-perimeterized/Perimeterized: – To reach de-perimeterized/perimeterized form, the user


requires Jericho forum and collaboration-oriented architecture commandments. It defines
whether you are working inside your traditional it mindset or outside it.
The meaning Perimeterized dimension is continuing to work within the traditional it boundary,
orphan signaled by network firewalls. With the support of VPN and the operation of the virtual
server in your IP domain, the customer can expand the organization’s boundary into the external
cloud computing domain.
The meaning of De-perimeterized is the system is designed on the principles outlined in the
Jericho forum’s commandments. In this, data is encapsulated with metadata and structure, which
will again support to secure the data and control the inappropriate usage.

Insourced/Outsourced: – Insourced/outsourced is the fourth dimension of the cloud cube


model. In the outsourced dimension, services are offered by the third party, and in the insourced
dimension, the services are offered by the own staff.
In some organizations with traditional bandwidth software or hardware, providers will run
smoothly when they become cloud service providers. Organizations exploring to process cloud
services should have the capability to set a legally binding collaboration agreement. In this, an
organization must ensure that the data is removed from the service provider’s infrastructure.

You might also like