Cloud Computing Overview
Cloud Computing Overview
Overview
• Introduction to Cloud Computing • Data Management in Cloud Computing
1 Overview of Computing 1 Looking at Data, Scalability & Cloud
2 Cloud Computing (NIST Model) Services
3 Properties, Characteristics & Disadvantages 2 Database & Data Stores in Cloud
4 Role of Open Standards 3 Large Scale Data Processing
• Cloud Computing Architecture • Cloud Security
1 Cloud computing stack 1 Infrastructure Security
2 Service Models (XaaS)
2 Data security and Storage
1 Infrastructure as a Service(IaaS)
2 Platform as a Service(PaaS)
3 Identity and Access Management
3 Software as a Service(SaaS) 4 Access Control, Trust, Reputation, Risk
3 Deployment Models
• Service Management in Cloud Computing • Case Study on Open Source and
Service Level Agreements(SLAs) Commercial Clouds, Cloud Simulator
Cloud Economics
• Research trend in Cloud Computing,
• Resource Management in Cloud
Computing Fog Computing
Origins and Influences
NIST published its original definition back in 2009, followed by a revised version
after further review and industry input that was published in September of 2011:
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and released with minimal management effort or
service provider interaction. This cloud model is composed of five essential characteristics, three
service models, and four deployment models.”
A Gartner report listing cloud computing at the top of its strategic technology areas further
reaffirmed its prominence as an industry trend by announcing its formal definition as:
“...a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a
service to external customers using Internet technologies.”
It was during this time that Amazon launched its Elastic Compute Cloud
(EC2) services that enabled organizations to “lease” computing capacity
and processing power to run their enterprise applications.
Performance
Computing intensive The task could consume a lot of time on computing.
For example, Computation of Pi value using Monte Carlo simulation
Data intensive
The task that deals with a large amount or large size of files. For example,
Facebook, LHC(Large Hadron Collider) experimental data processing.
Robustness
No SPOF (Single Point Of Failure) Other nodes can execute the same task executed
on failed node.
Distributed applications
• Applications that consist of a set of processes that are distributed
across a network of machines and work together as an ensemble
to solve a common problem
• In the past, mostly client-server
Resource management centralized at the server
• Peer to Peer computing represents a movement towards more
truly distributed applications
Grid Computing
• Pcwebopedia.com
A form of networking. unlike conventional networks that focus on
communication among devices, grid computing harnesses
unused processing cycles of all computers in a network for
solving problems too intensive for any stand-alone machine
• IBM
Grid computing enables the virtualization of distributed
computing and data resources such as processing, network
bandwidth and storage capacity to create a single system image,
granting users and applications seamless access to vast IT
capabilities. Just as an Internet user views a unified instance of
content via the Web, a grid user essentially sees a single, large
virtual computer.
• Sun Microsystems
Grid Computing is a computing infrastructure that provides
dependable, consistent, pervasive and inexpensive access to
Electrical Power Grid Analogy
Electrical Power Grid Computing Grid
1. Data Backup
2. Data Security
3. Partner Competency
4. Defining SLA
NIST model
• The U.S. National Institute of Standards and Technology (NIST) has a set
of working definitions (
http://csrc.nist.gov/groups/SNS/cloudcomputing/cloud-def-v15.doc ) that
separate cloud computing into service models and deployment models.
• The latest version of the NIST definition does require that cloud
computing networks use virtualization and support multi-tenancy
Deployment models
5.Measured service: The use of cloud system resources is measured, audited, and
reported to the customer based on a metered system.
(A client can be charged based on a known metric such as amount of storage used,
number of transactions, network I/O (Input/Output) or bandwidth, amount of processing
power used, and so forth. A client is charged based on the level of services provided.)
• While these five core features of cloud computing are on almost anybody’s list, you also
should consider these additional advantages
1. Lower costs:
2. Ease of utilization:
3. Quality of Service
4. Reliability
5. Outsourced IT management
6. Simplified maintenance and upgrade
7. Low Barrier to Entry
Disadvantages of cloud computing
• While the benefits of cloud computing are myriad, the disadvantages are just as numerous.
1. As a general rule, the advantages of cloud computing present a more compelling case for
small organizations than for larger ones. Larger organizations can support IT staff and
development efforts that put in place custom software solutions that are crafted with their
particular needs in mind.
2. When you use an application or service in the cloud, you are using something that isn’t
necessarily as customizable as you might want. Additionally, although many cloud computing
applications are very capable, applications deployed on-premises still have many more
features than their cloud counterparts.
3. All cloud computing applications suffer from the inherent latency that is intrinsic in their WAN
connectivity. While cloud computing applications excel at large-scale processing tasks, if your
application needs large amounts of data transfer, cloud computing may not be the best model
for you
4. Additionally, cloud computing is a stateless system, as is the Internet in general. In order for
communication to survive on a distributed system, it is necessarily unidirectional in nature. All
the requests you use in HTTP: PUTs, GETs, and so on are requests to a service provider. The
service provider then sends a response.
5. If you had to pick a single area of concern in cloud computing, that area would undoubtedly be
privacy and security
Assessing the Role of Open Standards
2. Elasticity: You have the ability to right-size resources as required. This feature
allows you to optimize your system and capture all possible transactions.
3. Low barrier to entry: You can gain access to systems for a small investment.
( This feature offers access to global resources to small ventures and provides the
ability to experiment with little risk.)
1. Utility services cost less even though they cost more: Utilities charge a
premium for their services, but customers save money by not paying for services that
they aren’t using.
2. On-demand trumps forecasting: The ability to provision and tear down resources
(de-provision) captures revenue and lowers costs.
3. The peak of the sum is never greater than the sum of the peaks. A cloud can
deploy less capacity because the peaks of individual tenants in a shared system are
averaged over time by the group of tenants.
4. Aggregate demand is smoother than individual: Multi-tenancy also tends to
average the variability intrinsic in individual demand because the “coefficient of
random variables” is always less than or equal to that of any of the individual
variables. With a more predictable demand and less variation, clouds can run at
higher utilization rates than captive systems. This allows cloud systems to operate at
higher efficiencies and lower costs.
5. Average unit costs are reduced by distributing fixed costs over more units of
output: Cloud vendors have a size that allows them to purchase resources at
significantly reduced prices. (This feature was described in the previous section.)
The laws of cloudonomics