CLOUD COMPUTING

September 26, 2017 | Author: Ravi Joshi | Category: Cloud Computing, Software As A Service, Platform As A Service, Provisioning, Server (Computing)
Share Embed Donate


Short Description

CLOUD COMPUTING...

Description

CLOUD COMPUTING

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 1

CLOUD COMPUTING

INTRODUCTION: Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design, grid, and enterprise IT management to enable a more approach for deploying and scaling applications.

Cloud promises real costs savings and agility to customers. Through cloud computing, a company can rapidly deploy applications where the underlying technology components can expand and contract with the natural ebb and flow of the business life cycle. Traditionally, once an application was deployed it was bound to a particular infrastructure, until the infrastructure was upgraded. The

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 2

CLOUD COMPUTING

result was low efficiency, utilization, and flexibility. Cloud enablers, such as virtualization and grid computing, allow applications to be dynamically deployed onto the most suitable infrastructure at run time. This elastic aspect of cloud computing allows applications to scale and grow without needing traditional‗fork-lift‘ upgrades. IT departments and infrastructure providers are under increasing pressure to provide computing infrastructure at the lowest possible cost. In order to do this, the concepts of resource pooling, virtualization, dynamic provisioning, utility and commodity computing must be leveraged to create a public or private cloud that meets these needs. World-class data centers are now being formed that can provide this Infrastructure-as-a-Service (IaaS) in a very efficient manner.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 3

CLOUD COMPUTING

Customers can thus decide to develop their own applications, to run on their own internal private clouds, or leverage software as a SaaS application that run on public clouds. Integration and federation of services across both the public and private cloud, so-called ―hybrid clouds,‖ is an emerging area of interest. The public cloud concept allows customers to develop and deploy applications with tremendous speedwithout the procurement and red-tape issues of dealing with potentially slow moving and costly .

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 4

CLOUD COMPUTING

WHAT IS THE CLOUD COMPUTING?

Cloud computing is receiving a great deal of attention, both in publications and among users, from individuals at home to the U.S. government. Yet it is not always clearly defined.1 Cloud computing is a subscription-based service where you can obtain networked storage space and computer resources. One way to think of cloud computing is to consider your experience with email. Your email client, if it is Yahoo!, Gmail, Hotmail, and so on, takes care of housing all of the hardware and software necessary to support your personal email account. When you want to access your email you open your web browser, go to the email client, and log in.

The most important part of the equation is having internet access. Your email is not housed on your physical computer; you access it through an internet

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 5

CLOUD COMPUTING

connection, and you can access it anywhere. If you are on a trip, at work, or down the street getting coffee, you can check your email as long as you have access to the internet. Your email is different than software installed on your computer, such as a word processing program. When you create a document using word processing software, that document stays on the device you used to make it unless you physically move it. An email client is similar to how cloud computing works. Except instead of accessing just your email, you can choose what information you have access to within the cloud.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 6

CLOUD COMPUTING

OBJECTIVES:

1) To study the requirement of cloud computing in I.T company. 2) To study how cloud computing save the time of customer. 3) To study how the organization perform their work using cloud computing. 4) To study the universal document access process. 5) To study the impact of cloud computing to reduce the software cost. 6) To explore the unlimited storage capacity of storage devices by using cloud computing method.

HYPOTHESIS:

Ho- Cloud Computing technique is beneficial for the I.T companies to maintain their large volume of Data.

H1- Cloud Computing technique is useful for the customer for easy access of the Company Data.

H2- Cloud Computing technique is Cost effective.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 7

CLOUD COMPUTING

How can you use the cloud? The cloud makes it possible for you to access your information from anywhere at any time. While a traditional computer setup requires you to be in the same location as your data storage device, the cloud takes away that step. The cloud removes the need for you to be in the same physical location as the hardware that stores your data. Your cloud provider can both own and house the hardware and software necessary to run your home or business applications.

This is especially helpful for businesses that cannot afford the same amount of hardware and storage space as a bigger company. Small companies can store their information in the cloud, removing the cost of purchasing and storing memory devices. Additionally, because you only need to buy the amount of storage space you will use, a business can purchase more space or reduce their subscription as their business grows or as they find they need less storage space. One requirement is that you need to have an internet connection in order to access the cloud. This means that if you want to look at a specific document you have housed in the cloud, you must first establish an internet connection either through a wireless or wired internet or a mobile broadband connection. The benefit is that you can access that same document from wherever you are with any device that can access the internet. These devices could be a desktop, laptop, tablet, or phone. This can all Dept. of Management technology & Research, N. M. D. College, Gondia

Page 8

CLOUD COMPUTING

so help your business to function more smoothly because anyone who can connect to the internet and your cloud can work on documents, access software, and store data. Imagine picking up your smartphone and downloading a .pdf document to review instead of having to stop by the office to print it or upload it to your laptop. This is the freedom that the cloud can provide for you or your organization.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 9

CLOUD COMPUTING

Types of clouds:

There are different types of clouds that you can subscribe to depending on your needs. As a home user or small business owner, you will most likely use public cloud services.

1.Public Cloud: A public cloud can be accessed by any subscriber with an internet connection and access to the cloud space.

2. Private Cloud: A private cloud is established for a specific group or organization and limits access to just that group.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 10

CLOUD COMPUTING

3. Community Cloud: A community cloud is shared among two or more organizations that have similar cloud requirements.

4. Hybrid Cloud: A hybrid cloud is essentially a combination of at least two clouds, where the clouds included are a mixture of public, private, or community.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 11

CLOUD COMPUTING

Choosing a cloud provider: Each provider serves a specific function, giving users more or less control over their cloud depending on the type. When you choose a provider, compare your needs to the cloud services available. Your cloud needs will vary depending on how you intend to use the space and resources associated with the cloud. If it will be for personal home use, you will need a different cloud type and provider than if you will be using the cloud for business. Keep in mind that your cloud provider will be pay-as-you-go, meaning that if your technological needs change at any point you can purchase more storage space (or less for that matter) from your cloud provider. There are three types of cloud providers that you can subscribe to: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). These three types differ in the amount of control that you have over your information, and conversely, how much you can expect your provider to do for you. Briefly, here is what you can expect from each type.

1. Software as a Service: A SaaS provider gives subscribers access to both resources and applications. SaaS makes it unnecessary for you to have a physical copy of software to install on your devices. SaaS also makes it easier to have the same software on all of your devices at once by accessing it on the cloud. In a SaaS agreement, you have the least control over the cloud.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 12

CLOUD COMPUTING

2. Platform as a Service:

A PaaS system goes a level above the Software as a Service setup. A PaaS provider gives subscribers access to the components that they require to develop and operate applications over the internet.

3. Infrastructure as a Service: An IaaS agreement, as the name states, deals primarily with computational infrastructure. In an IaaS agreement, the subscriber completely outsources the storage and resources, such as hardware and software, that they need.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 13

CLOUD COMPUTING

Figure of Cloud Provider

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 14

CLOUD COMPUTING

As you go down the list from number one to number three, the subscriber gains more control over what they can do within the space of the cloud. The cloud provider has less control in an IaaS system than with anSaaS agreement.

What does this mean for the home user or business looking to start using the cloud? It means you can choose your level of control over your information and types of services that you want from a cloud provider. For example, imagine you are starting up your own small business. You cannot afford to purchase and store all of the hardware and software necessary to stay on the cutting edge of your market. By subscribing to an Infrastructure as a Service cloud, you would be able to maintain your new business with just as much computational capability as a larger, more established company, while only paying for the storage space and bandwidth that you use. However, this system may mean you have to spend more of your resources on the development and operation of applications. As you can see, you should evaluate your current computational resources, the level of control you want to have, your financial situation, and where you foresee your business going before signing up with a cloud provider. If you are a home user, however, you will most likely be looking at free or lowcost cloud services (such as web-based email) and will not be as concerned with many of the more complex cloud offerings.

After you have fully taken stock of where you are and where you want to be, research into each cloud provider will give you a better idea of whether they are right for you.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 15

CLOUD COMPUTING

Literature Review:

A Proposed Architecture of Cloud Computing for Education System in Bangladesh and the Impact on Current Education System , IEEE, International journal of Computer science.

In this modern era the developing countries will be remain mired in poverty unless they preoccupy more on widening the technology and innovation to everywhere throughout the country including urban to small rural areas. The essence of Computer is now swelling in such an extent that we can not think a single moment without Computer; everyone residing in a country now needs to be proficient in different aspects of Computer system and enlightens themselves with the innovative research works that will thrive their daily life style. However although the Computer Education is now indispensable for people of every stratification but due to the poor economic condition many countries are unable to introduce their inhabitants with rich technologies and innovation developed by computer system. Consequently a shared based system evokes for uniform distribution of resources between people of every stratum. In this research work we are introducing an architecture

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 16

CLOUD COMPUTING

of Cloud Computing for education sector and discuss the impact of our propose architecture on the availability of widespread resources to all around the country. We are presenting here a comparative analysis of our proposed architecture with the existing one to demonstrate the advantages of the proffered architecture over the current one.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 17

CLOUD COMPUTING

Characteristics of Cloud computing:  Dynamic computing infrastructure: Cloud computing requires a dynamic computing infrastructure. The foundation for the dynamic infrastructure is a standardized, scalable, and secure physical infrastructure. There should be levels of redundancy to ensure high levels of availability, but mostly it must be easy to extend as usage growth demands it, without requiring architecture rework. Next, it must be virtualized. A dynamic computing infrastructure is critical to effectively supporting the elastic nature of service provisioning and de-provisioning as requested by users while maintaining high levels of reliability and security. The consolidation provided by virtualization, coupled with provisioning automation, creates a high level of utilization and reuse, ultimately yielding a very effective use of capital equipment.



IT service-centric approach:

Cloud computing is IT (or business) service-centric. This is in sharp contrast to more traditional system- or server- centric models. In most cases, users of the cloud generally want to run some business service or application for a specific, timely purpose; they don‘t want to get bogged down in the system and network administration of the environment. They would prefer to quick and easy access a dedicated instance of an application or service. By abstracting away the server-centric view of the infrastructure, system users can easily access powerful pre-defined computing environments designed specifically around their service.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 18

CLOUD COMPUTING

An IT Service Centric approach enables user adoption and business agility – the easier and faster a user can perform an administrative task, the more expedient the business moves, reducing costs or driving revenue.



Self-service based usage model:

Interacting with the cloud requires some level of user self-service. Best of breed self-service provides users the ability to upload, build, deploy, schedule, manage, and report on their business services on demand. Self-service cloud offerings must provide easy-to-use, intuitive user interfaces that equip users to productively manage the service delivery lifecycle.

 Minimally or self-managed platform: For an IT team or a service provider to efficiently provide a cloud for its constituents, they must leverage a technology platform that is self-managed. Best-of-breed clouds enable self-management via software automation, leveraging the following capabilities:

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 19

CLOUD COMPUTING

1. A provisioning engine for deploying services and tearing them down recovering resources for high levels of reuse 2. Mechanisms for scheduling and reserving resource capacity Capabilities for configuring, managing, and reporting to ensure resources can be allocated and reallocated to multiple groups of users 3. Tools for controlling access to resources and policies for how resources can be used or operations can be performed All of these capabilities enable business agility while simultaneously enacting critical

and

necessary

administrativecontrol.

 Consumption-based billing: Finally, cloud computing is usage-driven. Consumers pay for only what resources they use and therefore are charged or billed on a consumption-based model. Cloud computing platforms must provide mechanisms to capture usage

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 20

CLOUD COMPUTING

information that enables charge back reporting and integration with billing systems.

Cloud Controlling Devices

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 21

CLOUD COMPUTING

Methodology:

Cloud computing is broken down into three segments: "applications," "platforms," and "infrastructure".

i.

Application:

So far, the applications segment of cloud computing is the only segment that has proven successful as a business model. By running business applications over the Internet from centralized servers rather than from on-site servers, companies can cut some serious costs. Furthermore, while avoiding maintenance costs, licensing costs and the costs of the hardware required to run servers on-site, companies are able to run applications much more efficiently from a computing standpoint.

On demand software services come in a few different varieties that may vary in their pricing scheme and how the software is delivered to the end users. In the past, the end-user would generally purchase a license from the software provider and then install and run the software directly from on-premise servers.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 22

CLOUD COMPUTING

Segments of Cloud Computing

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 23

CLOUD COMPUTING

ii.

Platform:

Platforms serve as an interface for users to access applications provided by partners or in some cases the customers. The following companies are some that have developed platforms that allow end users to access applications from centralized servers using the Internet. Next is the name of the platform used by the company: 1. Google (GOOG) - Apps Engine 2. Amazon.com (AMZN) - EC2 3. Microsoft (MSFT) - Windows Live 4. Terremark Worldwide (TMRK) - The Enterprise Cloud 5. Salesforce.com (CRM) - Force.com 6. NetSuite (N) - Suiteflex 7. Mosso - Mosso, a division of Rackspace 8. Metrisoft - MetrisoftSaaS Platform iii.

Infrastructure:

The final segment in cloud computing, known as infrastructure, is the backbone of the entire concept. Infrastructure vendors provide the physical storage space and processing capabilities that allow all the services described above.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 24

CLOUD COMPUTING

Implementing Cloud Computing:

All of the architectural and organizational considerations mentioned herein are generally apply to all implementations of a cloud infrastructure. As we focus on building the cloud, a number of models have been developed for deploying a cloud infrastructure. i. Private

Clouds:

In a private cloud, the infrastructure for implementing the cloud is controlled completely by the enterprise. Typically, private clouds are implemented in the data center of the enterprise and managed by internal resources. A private cloud maintains all corporate data in resources under the control of the legal and contractual umbrella of the organization. This eliminates the regulatory, legal and security concerns associated with information being processed on third party computing resources. The private cloud can also be used by existing IT departments to dramatically reduce their costs and as an opportunity to shift from a cost canter to a value centre in the eyes of the business. ii. Public

Clouds:

In a public cloud, external organizations provide the infrastructure and management required to implement the cloud. Public clouds dramatically simplify implementation and are typically billed based on usage. This transfers the cost from a capital expenditure to an operational expense and can quickly be scaled to meet the organization‘s needs. Temporary applications or applications with burst resource requirements typically benefit from the public cloud‘s Dept. of Management technology & Research, N. M. D. College, Gondia

Page 25

CLOUD COMPUTING

ability to ratchet up resources when needed and then scale them back when they are no longer needed. In a private cloud, the company would need to provision for the worst case across all the applications that share the infrastructure. This can result in wasted resources when utilization is not at its peak.

Public clouds have the disadvantage of hosting your data in an offsite organization outside the legal and regulatory umbrella of your organization. In addition, as most public clouds leverage a worldwide network of data centers, it is difficult to document the physical location of data at any particular moment. These issues result in potential regulatory compliance issues that include the use of public clouds for certain organizations or business applications.

Not all public cloud based applications can provide the necessary flexibility and functionality needed by business users. For this reason, customers require the ability to take preferred functionality from one cloud application and combine it with another, creating a cloud based component application. This is still an emerging area of development with some early companies, such as Cast Iron, providing integration of a wide range of cloud-based applications. Ultimately, many customers may decide that the private cloud offers more flexibility and

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 26

CLOUD COMPUTING

develop

iii. Hybrid

new

applications

themselves.

Clouds:

To meet the benefits of both approaches, newer execution models have been developed to combine public and private clouds into a unified solution. Applications with significant legal, regulatory or service level concerns for information can be directed to a private cloud. Other applications with less stringent regulatory or service level requirements can leverage a public cloud infrastructure. Implementation of a hybrid model requires additional coordination between the private and public service management system. This typically involves a federated policy management tool, seamless hybrid integration, federated security, information asset management, coordinated provisioning control, and unified monitoring systems.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 27

CLOUD COMPUTING

ARCHITECTURE OF CLOUD COMPUTING:

Figure-Cloud Computing Architecture According to our proposed architecture each individual PC act as a cloud partner which offers the necessary resources to the cloud system from its available resources. However each of these individual PC is the property of a particular educational institute whereas the institute owned those PCs from the budget sanctioned by the government for that particular institute. There is a local server associated with individual institute who monitors everything ranging from PC status to individual requests for that institute. The users associated with a particular local server submit their request to the cloud via the local server. The local server collects the entire request from the clients in its domain within a specific time period and forward those request after Dept. of Management technology & Research, N. M. D. College, Gondia

Page 28

CLOUD COMPUTING

verification. In addition there are some providers who have the agreement with the cloud system and offers different services to the user. A. Request Initialization Procedure: According to our propose architecture each user terminal communicates the local server for receiving services from cloud sides. The procedure is depicted in figure .

The steps of the procedure are summarized bellow: 1. First of all user request is sent to local server with necessary user identification information like user id and password.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 29

CLOUD COMPUTING

2. The authentication module of local server verifies the user. It then sends a form with appropriate graphical user interface (GUI) according to the label of user. 3. User provides exact service specifications through the user interfaces. After receiving the exact specification from user the local server verifies the current available resources, policy to the cloud like pricing policy, encryption system and other data security etc. 4. If the user does not have an agreement to receive the requested services or if the pricing policy. mismatches, the local server immediately informs the user for alternatives like immediate payment or payment through credit card etc. 5. If the user agrees with the current policy it sends an acknowledgement reply message to the local server. 6. The local server send the user the requested resource as soon as it receives the resources from the cloud system.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 30

CLOUD COMPUTING

B. Resource Monitoring Procedure: In our architecture we are providing a facility of sharing the unused resources. Thus there must be a process to identify the unused resources. The procedure of resource identification is depicted in the figure with a flow diagram. Figure-: Flow Diagram of Sharing Resource Information The cloud system sends a periodic salutation message to each server associated with an institute to find out the status of their respective clients. Each server replicates several copy of that salutation message and forwards each copy to the client under its domain. The server waits until it receives the Resource Information Message from all of its clients. When all the information from the client comes, the server generates a recapitulate message based on the information that it collects from the client end and send back the message to the cloud system.

C. Resource Allocation Procedure: The server collects the request from each client under its domain at a particular time interval. Thereafter the server summarizes the total requests by combining them according to the individual group of services. As for example if the server of an institute accepts two request from two distinct clients one with 10 GB of storage and one antivirus software and second one with 5 GB of storage along with an antivirus software and visual C++ software at a particular then it just summarizes the request with 15 GB of storage along with two Antivirus software and a visual C++ software. The cloud system as soon receiving the request from the server end it just send 15 GB of storage, images of the two antivirus software and the entire visual C++ software or the part of the software if necessary after a verification. Dept. of Management technology & Research, N. M. D. College, Gondia

Page 31

CLOUD COMPUTING

INTERNAL ARCHITECTURE OF CLOUD CENTRAL SYSTEM

The Architecture of Cloud Central System composed of two sub-layers. The upper sub-layer performs several operations prior to offer any service such as authentication, credit verification, scheduling and security. In addition there is a government central control system associated with the cloud upper sub-layer to monitor the operation of the cloud system. On the other hand the lower sublayers basically offers four different types of services such as SAAS, PASS, IAAS or e-Learning tools as a service based on the user demands.

1) The

Upper Sub-layer:

Security is a massive issue in cloud system as the services are accessed over the internet. Since the individual client has the options to choose their own security

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 32

CLOUD COMPUTING

methods like encryption process, cloud system has the agreement with local server to understand the security methods so that it can interpret them. As we mentioned that users at several levels constitute our educational system and therefore request for services are different for those diverse levels of users. Hence it is very important to maintain the access method by identifying the types of users and services. This sub-layer defines a policy of equilibrium between User and Provider by taking several factors into consideration such as user level, latency and throughput. According to the policy the government sets different priority for different levels of users so that the user with higher priority can access the resources with lower latency. The policy also ensures the provider to run the software smoothly with maximum throughput and highest load balance. The Authentication and Credit Verification sub-layer associated with the upper sub-layer checks for the validity of the local server as soon as a request for resources is come from the server end. This sub-layer also verifies the user credit information for the requested service. If it finds that the user has sufficient balances for the requested services it accept the request as a valid one and transform the request to the lower sub-layer. As soon as the lower sub-layer confirms the request from its available resource pool it adjusts the user account after deducting the amount for the requested service. There are two subsections associated with the Government Rules as Rule Based sub-layer of the architecture namely the planning and monitoring committee. The planning committee decides the prices for different types of services based on analysis and agreement with the cloud partners. It also decides how much funding needs to be allocated for individual organization. Normally several factors are considered when it allocates a specific amount of budget for a particular institute such as the level of education, student number, student quality, area of study and progression of that institute. Furthermore it can enhance the budget if it finds that the user is

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 33

CLOUD COMPUTING

demanding more resources continuously through their submitted comments. The corruption monitoring committee monitors the daily proceedings of every institute. In addition it also observes the objections come from the user end. There are several types of objections that can be come from the user end such as the improper resource distribution, shortage of resources, inappropriate software or unmatched software etc. So the corruption committee is responsible for taking necessary initiatives to sort out the problem associated with the user end. The committee has also the power to take any action against the authority of the institute involving in corruptions.

2) The

Lower Sub-layer:

The lower part of the architecture gives access to the particular resources requested by the user. Once the upper layer sends positive acknowledgement to the lower layer it offers the particular services to the requested user. The Service Identification Panel associating with the lower layer identifies the particular service requested by each individual user. The cloud client-vendor-partner instrumental panel creates an interaction between the operations performed in the front-end and backend. However, since the vendors can not operate autonomously without the help of their partners so instrumental panel‘s responsibility is to create interaction between cloud partners with the cloud vendors and clients. The layer contains an Operational Panel, whose task is to monitoring the circumstances, handling the PCs and managing images. This panel contains a script based tools for constructing, configuring, monitoring, controlling and maintaining the clusters. This tool is known as Extreme Administrator Toolkit (xCAT). Each request arrives from the server ends in the form of bare-metal image format is first loaded on xCAT and then process by virtual cloud system. However it is possible that the desired image that is

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 34

CLOUD COMPUTING

already loaded in its xCAT system can not be found in any available real or virtual server. In such case it looks for any available server that fulfils the specifications depicted in that image and the xCAT system vigorously load that image. The implementation panel associated with the lower layer provides a distinct platform for the execution of the virtual software. It also ensures the deployment of the total virtual software or part of the software package effectively without installation on the operation surface. The exhibition panel supervises the instances of virtual exhibit and agglomerates the desktop windows. Since the execution of the software ensues the decentralized procedure on different physical or virtual machines so this panel ensures that users can interact with the presentation window of those de-centrally executed software.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 35

CLOUD COMPUTING

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 36

CLOUD COMPUTING

CLOUD COMPUTING SECURITY PLAN: Cloud computing has unique security risks. Security risks, threats, and breaches can come in so many forms and from so many places that many companies take a comprehensive approach to security management across IT and the business. The following pointers useful for creating cloud computing security plan.  In most circumstances, approach cloud security from a risk-management perspective. Be sure to involve your organization‘s risk-management specialists in the planning.  The cost of security could be an issue. Be aware of what similar organizations spend on IT security and be prepared to spend a similar amount. It also helps to track time lost due to any kind of attack—as a measurement of cost that you may be able to reduce.

 Identity management is key. Give priority to improving identity management if your current capability is poor.  Try to create general awareness of security risks by educating and warning staff members about specific dangers. It is easy to become complacent, especially if you‘re using a cloud service provider. However, most security breaches are created inside the network.  Use external IT security consultants to regularly check your company‘s security policy and network, as well as those of your cloud service providers.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 37

CLOUD COMPUTING

 Determine specific IT security policies for change management and patch management, and make sure that policies are well understood by your staff and your cloud service provider.  Stay abreast of news about IT security breaches in other companies and the causes of those breaches.  Review backup and disaster-recovery systems in light of IT security. Apart from anything else, IT security breaches can require complete application recovery. Because of the complexity of securing cloud environments, many organizations use hybrid cloud environments that include public as well as private clouds. Cloud service providers each have their own way of managing security. Sometimes, the cloud service provider‘s security plan will conflict with your company‘s rules. Before you implement your security plan you need to ensure that it will complement your provider‘s plan.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 38

CLOUD COMPUTING

ADVANTAGES OF CLOUD COMPUTING:

 Unlimited storage capacity: ◦ Cloud computing offers virtually limitless storage. ◦ Your computer's current 200 Gbyte hard drive is small compared to the hundreds of Pbytes available in the cloud. ◦ Whatever you need to store, you can.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 39

CLOUD COMPUTING

 Increased data reliability: ◦ Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the cloud should not affect the storage of your data. ◦ That also means that if your personal computer crashes, all your data is still out there in the cloud, still accessible. ◦ In a world where few individual desktop PC users back up their data on a regular basis, cloud computing is a data-safe computing platform!  Improved performance: ◦ With few large programs hogging your computer's memory, you will see better performance from your PC. ◦ Computers in a cloud computing system boot and run faster because they have fewer programs and processes loaded into memory…

 Reduced software costs: ◦ Instead of purchasing expensive software applications, you can get most of what you need for free-ish! ◦ That is right - most cloud computing applications today, such as the Google Docs suite, are totally free. That is a lot better than paying $200+ for similar Microsoft Office software which alone may be justification for switching to cloud applications

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 40

CLOUD COMPUTING

 Unlimited storage capacity: ◦ Cloud computing offers virtually limitless storage. ◦ Your computer's current 200 Gbyte hard drive is small compared to the hundreds of Pbytes available in the cloud. ◦ Whatever you need to store, you can.

 Increased data reliability: ◦ Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the cloud should not affect the storage of your data. ◦ That also means that if your personal computer crashes, all your data is still out there in the cloud, still accessible. ◦ In a world where few individual desktop PC users back up their data on a regular basis, cloud computing is a data-safe computing platform!  Universal document access: ◦ That is not a problem with cloud computing, because you do not take your documents with you. ◦ Instead, they stay in the cloud, and you can access them whenever you have a computer and an Internet connection. ◦ All your documents are instantly available from wherever you are.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 41

CLOUD COMPUTING

 Latest version availability: ◦ Another document-related advantage of cloud computing is that when you edit a document at home, that edited version is what you see when you access the document at work. ◦ The cloud always hosts the latest version of your documents; as long as you are connected, you are not in danger of having an outdated version.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 42

CLOUD COMPUTING

BARRIERS TO CLOUD COMPUTING: IT cloud services are still largely in the early adoption phase. As such, it is no surprise that there‘s a long list of issues cloud services suppliers need to address to drive mainstream adoption. Here‘s how our respondents rated nine of the challenges commonly ascribed to the cloud services model.

i.

Customer Perspective:

• Data Security:Many customers don‘t wish to trust their data to ―the cloud‖. Data must be locally retained for regulatory reasons.

• Latency:The cloud can be many milliseconds away. Not suitable for realtime applications. •

Application

Availability:Cannot switch from existing legacy

applications. Equivalent cloud applications do not exist.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 43

CLOUD COMPUTING

ii.

Vendor Perspective:

1. Service Level Agreements  Security: with the businesses‘ information and critical IT resources outside the firewall, customers worry about their vulnerability to attack.  Cloud services dependability: The complex web of interdependency that supports cloud services availability and performance – from network availability and performance, to the availability and performance of the cloud service provider‘s systems, and beyond, to the performance and availability of the ―supply chain‖ of services that the service provider depends on – cries out for suppliers who can offer greater transparency of interdependencies as well as credible service level assurances. 2. Business Models  SaaS/PaaS models are challenging. • Much lower upfront revenue. While customers certainly enjoy the economic and operational benefits of the off-the-shelf, standardized nature of many cloud services, this survey shows they nonetheless want greater ability to ―fit‖ cloud services more tightly into the context of their specific business. Users want to maximize the leverage of their many other critical business systems – inhouse legacy systems and, increasingly, externally-sourced cloud services – by being able to integrate across these systems. ‖SaaS 1.0″ systems – that lack standard-based APIs, and are effectively ―islands‖ – are of diminishing value; this is why user should be include the requirement for web services APIs in definition of cloud services.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 44

CLOUD COMPUTING

3. Customer Lock-in • Customers want open/standard APIs. • Need to continuously add value.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 45

CLOUD COMPUTING

Result:

The primary intention of our proposed architecture is to use our limited resources in a most efficient way. Since we find that the resources remain unused for most of the time so we have introduced this architecture. Furthermore we can find some serious flaws in the management of resources as there is no central observation of resources for individual institute. In addition the widespread use of pirated software can be controlled using our proposed architecture. We have introduced four different types of services in this architecture. We believe that this architecture can provide an effective way to balance the resources with the current economical condition by utilization of unused resources and elimination of third party involvements and provide more Dept. of Management technology & Research, N. M. D. College, Gondia

Page 46

CLOUD COMPUTING

secure environment since the client can also now configure his own security policy. Using a side by side analysis between the current educational structures with our proposed one we have demonstrated the benefits of our architecture in different perspective. Although our primary intention was to design architecture of education for Bangladesh‘s perspective but any developing country can use this architecture for their education system. In future we would introduce a prototypes system based on this architecture and would discuss the practical issues that may be encountered during practical implementation of our proposed Architecture.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 47

CLOUD COMPUTING

CLOUD COMPUTING FOR E-BUSINESS: Within 10 years, 80% of all computing, storage, and e-commerce done worldwide may take place in the cloud predict analysts, in what‘s been termed the third phase of Internet computing in the modern era.1 This paradigm shift highlights 2010 as a watershed year in the rising supremacy of cloud computing and mobile devices in reshaping where and how information (and applications) is accessed.1 The first phase of computing combined software and operating systems into one terminal allowing basic communication through devices such as email. The second phase allowed the user to connect to the World Wide Web containing millions of websites, which in the mid-1990s saw Internet usage increase 100-fold in just two years. In the present third phase, everything will live in the cloud – including your data and software. Further, by 2020, there could be in excess of 100 billion devices and sensors accessing these remote data centers in the cloud. Only a small amount, approximately 1.4 billion, will be personal computers. The progression away from the mainframe to personal computers is now being superseded by the dual arrival of the Smartphone and cloud computing. In each step the underlying structure of computing has become more distributed. This has profound implications for how consumers, vendors and suppliers will interact inside the e-commerce channel over the next decade.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 48

CLOUD COMPUTING

Defining a cloud service:

The term ―cloud computing‖ has been hotly contested, drawing both derision and praise from different sectors of the I.T. community. At its core, the term refers to the outsourcing of data centers and application services to a remote provider under a pay-as-you-go contract. This ‗metered‘ approach lowers costs and reduces complexity, simultaneously allowing the business to consume additional services ―on-demand‖.

Worldwide Public IT Cloud Services Spending by Category This virtualization of server infrastructure –- sharing one server as if it were several –- allows for huge cost savings and economies of scale.2 Hybrid models are also possible whereby a business may build its own private cloud and temporarily access additional public cloud services if it so requires.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 49

CLOUD COMPUTING

An example of this could include an e-commerce site, which leverages further cloud services to deal with the effects of a successful social media campaign without having to upgrade its infrastructure.3 However, the term cloud computing does have further meanings in addition to those defined above. These include Software as a Service (Saas), Platform as a Service (Paas), and Infrastructure as a Service (Iaas). In simple terms, SaaS refers to an end user accessing a remote product or ecommerce service over the Internet. These could include a remote CRM such as Salesforce or a data center offered by Amazon Web Services. PaaS is geared towards developers who wish to deploy applications in the cloud and don‘t want to get involved with the server infrastructure. The Google apps store is an example of this. The final version, IaaS, allows developers maximum interaction with the underlying server infrastructure including, but not limited to, deploying backoffice applications on that remote environment.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 50

CLOUD COMPUTING

BENEFITS TO E-BUSINESS:  Trust: One of biggest challenges facing e-commerce pioneers in the early days of the web turned out not to be a technical problem, but a human one: Trust.5 It took time to build trust into their networks and establish a set of online credentials that made buyers feel comfortable initiating an online purchase. With the advent of cloud computing, existing businesses and startups can immediately leverage the trust built into established cloud systems such as Google, Amazon and Salesforce. A business can now point out to its customer base that their technical platform is managed and secured by the best cloud engineers in the world. 

Cost Savings:

Cost is generally one of the primary reasons for moving a business application or data center to the cloud. While there may be a low cost associated with developing and deploying an e-commerce application, the parallel need for hardware and bandwidth may turn out to be expensive. Generally, a cloud-based initiative on a virtualized server may save a company 80% of the costs normally associated with a traditional e-commerce roll out. 6 

Speed:

A company may be able to roll out an e-commerce application five times faster than before and begin selling immediately on the remote platform.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 51

CLOUD COMPUTING

 Scalability: Often referred to as ―elastic‖, these cloud services allow a business to scale quickly and support seasonal spikes in demand or those triggered by special promotions.8 

Security:

Securing applications, physical facilities and networks is a critical consideration. Many cloud vendors complete third-party certification, including ISO 27001 and SysTrust audits. VI has been audited in for ISO 9001 and ISO 27001. Further security measures are implemented at the application, facility and network levels including data encryption, biometric screening of personnel and certification through third-party vulnerability assessment programs.7 

Interoperability:

The explosive growth in cloud ecommerce offerings in the next few years will also see an increase in the ability to share information between clouds and communities of clouds. Leading-edge cloud vendors will offer a standardsbased framework, which allows programmatic access for users, partners and others who want to leverage additional functionality from within the cloud. Cloud computing involves the provision of computer, component, or a network of virtual resources online. In essence, it is Internet‐based computing, whereby shared resources, software and information are provided online to computers and other devices on‐demand, like a public utility over the Internet.1 It is a general term for anything that involves delivering hosted services over the Internet and describes a new concept for IT services. A paradigm from mainframe to client–server that preceded it in the early '80s, it is a by-product

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 52

CLOUD COMPUTING

and consequence of the ease‐of‐access to remote computing sites provided by the Internet.2 The term cloud is used as a metaphor for the Internet, based on the earlier models used to depict the telephone network, and its relationship with the Internet in computer network diagrams.3 Clouds often appear as single points of access for all consumers' computing needs and generally have five essential characteristics: on‐demand self‐service, broad network access, resource pooling, rapid elasticity, and measured service.4 Typical cloud computing providers deliver common business applications online which are accessed from a web browser, while the software and data are stored on servers.

Experientially, the concept and definition of cloud computing and its infrastructure currently consists of reliable services delivered through data centers that are built on computer and storage virtualization technologies. These services are accessible anywhere in the world, with ―the cloud‖ appearing as a single point of access for all the computing needs of consumers. Since clouds cross many countries borders, it may soon become the ultimate form of globalisation.5 As such it is the subject of complex geopolitical issues, whereby

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 53

CLOUD COMPUTING

providers must satisfy many legal restrictions in order to deliver service to a global market. Cloud computing is being driven by providers such as Google, Amazon and Yahoo as well as traditional vendors including IBM, Intel, Microsoft and SAP.

Commercial offerings need to meet the quality of service requirements of customers and typically offer service level agreements when necessary with open standards source software being critical to the growth of cloud computing.

As customers generally do not own the infrastructure or know all details about cloud computing, they most often consume the resources as a service. Many cloud computing providers have adopted the utility computing model which is analogous to how traditional public utilities like electricity are consumed, while others are billed on a subscription basis. By sharing consumable and "intangible" computing power between multiple tenants, utilization rates can be improved (as servers are not left idle). This reduces costs significantly while increasing the speed of application development. Today, cloud computing is enabling IT professionals to rethink the entire packaging, delivery, and operation of e‐ business. The concept of e‐business is a simple one. Electronic business, commonly referred to as "eBusiness" or "e‐business", is the application of information and communication technologies (ICT) in support of all the activities of business. Electronic commerce therefore focuses on the use of ICT to enable the external activities and relationships of the business with individuals, groups and other businesses.8 Cloud computing is helping businesses advance their e‐business models. This changing relationship between cloud computing and e‐business will result in a positive shift in its delivery. Cloud computing comes into focus only when an organization thinks about what e‐business always needs: a way to increase Dept. of Management technology & Research, N. M. D. College, Gondia

Page 54

CLOUD COMPUTING

capacity or add capabilities without increasing cost, that is, investing in new infrastructure, training new personnel, or licensing new software. Since cloud computing deals with sharing resources online, it becomes easier to market, and share resources within the changing global market. This saves a lot of commuting costs, collateral material costs (letter headed, papers and envelopes) and presents the added opportunity of online web hosting and e‐meetings. Cloud Computing however is not without its issues. It poses the problem of securing sensitive and personal data ―in the wild‖ on the internet. As physical data will be stored off premises, companies will need to take steps to ensure data security by inquiring about some of the security policies employed by the Cloud provider. Regulatory compliance, user access control policies and procedures, business continuity/disaster recovery and change management are all important factors a client should consider when migrating to the services offered by a Cloud provider. As it is with electronic advancement such as cloud computing and e‐business, there are additional security concerns. Although controllable, certain pertinent issues such as identity theft, online fraud, credit card cloning and other online scams have led to a need for greater security. Consequently, IT security, through cloud computing is needed to enhance the e‐business requirement for safe working operations. As such, security compliance becomes indispensable. Proactive strategies need to be put in place to prevent information from being hijacked from within the Cloud, and measures also need to be taken by the providers of Cloud Computing to ensure that any changes and modifications they make to the software does not compromise the security of their clients.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 55

CLOUD COMPUTING

This information security approach therefore becomes a watch dog for the cloud computing and e‐business process and makes sure all necessary security protocols are met and upheld. Since Information security helps bridge the gap between both processes, it inadvertently checkmates the negative implications of using cloud computing to enhance the e‐business process. The future seems promising for the Cloud Computing platform. WCS has the experience and capacity to effectively manage and implement cloud computing processes and has done so in the past. WCS aims to be the final definitive solution for businesses which rely on and require a more secure cloud as a means to effectively and efficiently conduct e‐business. A safer cloud means safer e‐business practices and WCS is a resource to achieve this goal.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 56

CLOUD COMPUTING

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 57

CLOUD COMPUTING

Summary: For IT departments in larger enterprises, developing a private cloud often makes the most financial and business sense. When developing the architectural vision, an enterprise architect should bear in mind the characteristics of cloud computing as well as consider some of the organizational and cultural issues that might become obstacles to the adoption of the future state architecture. When moving ahead, decisions must be made on whether the future-state technical architecture should emphasize compatibility with the current standard or start from scratch to minimize cost. Future state systems architecture designs involve trade-offs between lower cost/operational efficiency and greater flexibility. Using an Enterprise Architecture framework can help enterprise architects navigate the trade-offs and design a system that accomplishes the business goal.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 58

CLOUD COMPUTING

FUTURE WORK:  However there are concerns that the mainstream adoption of cloud computing could cause many problems for users.  Whether these worries are grounded or not has yet to be seen.  Many new open source systems appearing that you can install and run on your local cluster – should be able to run a variety of applications on these systems.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 59

CLOUD COMPUTING

CONCLUSION:

Cloud computing offers real alternatives to IT departments for improved flexibility and lower cost. Markets are developing for the delivery of software applications, platforms, and infrastructure as a service to IT departments over the ―cloud‖. These services are readily accessible on a pay-per-use basis and offer great alternatives to businesses that need the flexibility to rent infrastructure on a temporary basis or to reduce capital costs. Architects in larger enterprises find that it may still be more cost effective to provide the desired services in-house in the form of ―private clouds‖ to minimize cost and maximize compatibility with internal standards and regulations. If so, there are several options for future-state systems and technical architectures that architects should consider finding the right trade-off between cost and flexibility. Using an architectural framework will help architects evaluate these trade-offs within the context of the business architecture and design a system that accomplishes the business goal.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 60

CLOUD COMPUTING

REFERENCES: [1]M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M.Zaharia. Above the Clouds: ―A Berkeley View of Cloud computing‖. Technical Report No. UCB/EECS-2009-28, University of California at Berkley, USA, Feb. 10, 2009.

[2] L. Vaquero, L. Merino, and J. Caceres."A break in the clouds: towards a cloud definition".SIGCOMM Comp. Communications Review, vol. 39, pp. 50—55 (2009).

[3] L. Youseff, M. Butrico, and D. Da Silva."Toward a Unified Ontology of Cloud Computing," Grid Computing Environments Workshop (GCE '08), pp. 1—10 (2008).

[4] P. Mell and T. Grance. ―The NIST Definition of Cloud Computing‖. National Institute of Standards and Technology (2009).

[5]A Proposed Architecture of Cloud Computing for Education System in Bangladesh and the Impact on Current Education System , IEEE, International journal of Computer science.

[6]Cloud Computing:- The New Frontier of Internet Computing IEEE Internet computing , author G.Pillas , ISSN 1089 7801.

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 61

CLOUD COMPUTING

ABBREVIATION: SaaS

Software as a Service

PaaS

Platform as a service

CapEx

Capital Expenditures

OpEx

Operating Expenditure

SOA

Service-Oriented Architecture

TCO

Total Cost of Ownership

IaaS

Infrastructure-as-a-Service

QoS

Quality of Service

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 62

CLOUD COMPUTING

BIBLIOGRAPHY:

 IEEE papers on Cloud Computing.  Magazines &Journals & e-books.  www.cloudcomputing.coms

Dept. of Management technology & Research, N. M. D. College, Gondia

Page 63

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF