Cloud Computing
Cloud Computing
Author:
A smooth-Ileana Kstrylv
Translator
Mohammadi-e-Taiba
Entry
Title and author name
Pub
Appearance
ISBN
Status cataloging
note
note
Issue
Issue
Issue
Issue
Added entry
Congress Classification
Dewey Decimal Classification
National Bibliography Number
Tran Mohammadi-e-Taiba
slato
r
Published
Circula 0111 Edition
tion
Publisher
Price
Cloud Computing Basics
Index
Chapters partnership
.....................................................................................
01
Background 01
...................................................................... .............................
...
On-demand self-service 00
...................................................................... .........................
.......
Resource sharing 02
...................................................................... .........................
.......
Group 01
...................................................................... ........................
........
Hybrid 01
...................................................................... ........................
........
Infrastructure as a Service 02
...................................................................... ........................
........
Cloud 02 drivers
...................................................................... ..............................
..
System Drivers 02
...................................................................... ..............................
..
6 Basics of Cloud Computing
Agility 02
....................................................................... ........................
........
Reliability 21
...................................................................... ........................
........
Efficiency 20
...................................................................... ........................
........
Ease of maintenance 20
...................................................................... ........................
........
Business drivers 22
....................................................................................................
...
Price 22.
....................................................................... ........................
........
Consumerism 22
...................................................................... ........................
........
Surround technology 23
...................................................................... ........................
........
Virtualization 23
...................................................................... ........................
........
Program structure 23
....................................................................... ........................
........
Bandwidth 22
...................................................................... ........................
........
Cloud providers drivers 22
...................................................................... .............................
...
Economies of scale 22
...................................................................... ........................
........
Consolidation 22
...................................................................... ........................
........
22 security.
...................................................................... ........................
........
Property data 22
...................................................................... ........................
........
Cloud Computing Basics 7
Audit or investigation 22
...................................................................... ........................
........
31 security.
...................................................................... ........................
........
Technology challenges 30
...................................................................... ........................
........
Flexibility 30
...................................................................... ........................
........
Summary 30
...................................................................... ..............................
..
Authentication 32
...................................................................... ..............................
..
Access 32
...................................................................... ........................
........
Advanced authentication methods 32
...................................................................... ..............................
..
IdPPublic 32
...................................................................... ..............................
..
32
............................................................................. OpenI
D
20
.............................................................................. Goog
le
20
.......................................................................... Faceboo
k
8 principles of cloud computing
Microsoft account 20
...................................................................... ..............................
..
Autonomous computing 23
...................................................................... ........................
........
Hardware virtualization 22
...................................................................... ..............................
..
Hypervisor 21
..................................................................................
Xen
22
........................................................................... Hype
r -V
22
............................................................................. vSp
here
22
................................................................................K
VM
Web Developer Technologies 22
...................................................................... ..............................
..
11
.............................................................................. HT
ML
11 .................................................................. Adobe
Flash
10
............................................................................... S
OAP
10
............................................................................... R
EST
10.
.................................................................................. J
ava
JavaScript..................................................................... 10
12
.......................................................................... ASP.
NET
Basics of Cloud 9
13 ................................................................ Ruby on
Rails
12
.............................................................................. JB
OSS
12.
..................................................................................
PHP
11
................................................................................ JS
ON
Summary
.....................................................................................
11
Chapter 4. cloud deployment models ....................... 67
Introduction
......................................................................................
11
Public Clouds
.....................................................................................
12
Advantages
.....................................................................................
12
-0 access or availability ................................................. 12
-0 scalability .................................................................. 12
-2 Accessibility .............................................................. 12
-3 reduce costs 11
...................................................................... ........................
........
Disadvantages 11
...................................................................... ..............................
..
-0 limitations of consolidation 10
...................................................................... ........................
........
-0 flexibility, decreased 10
...................................................................... ........................
........
2. Disability mandatory 10
...................................................................... ........................
........
Responsibilities 10
...................................................................... .............................
...
Security considerations 10
...................................................................... ..............................
..
Data 12
...................................................................... ..............................
..
Acceptance / compliance 12
...................................................................... ..............................
..
Audit 12
...................................................................... ..............................
..
Private clouds 12
...................................................................... ..............................
..
Advantages
.....................................................................................
13
12 The Basics of Cloud Computing
-0 maintenance 13
...................................................................... ........................
........
-2 Nzartkrdn 12
...................................................................... ........................
........
Disadvantages 12
...................................................................... ..............................
..
-0 Price 12
...................................................................... ........................
........
Audit 11
...................................................................... ..............................
..
Clouds 12
...................................................................... ..............................
..
Benefits 12
...................................................................... ..............................
..
-0 Price 12
...................................................................... ........................
........
-0 multitenant 12
...................................................................... ........................
........
Disadvantages 12
...................................................................... ..............................
..
-0 property ....................................................................12
Responsibilities 12
...................................................................... .............................
...
Security considerations 12
...................................................................... ..............................
..
Data 12
...................................................................... ..............................
..
Compliance 12
...................................................................... ..............................
..
Audit 21
...................................................................... ..............................
..
Hybrid clouds 21
...................................................................... ..............................
..
Cloud Computing Basics 11
Benefits 20
...................................................................... ..............................
..
Disadvantages 20
...................................................................... ..............................
..
-0 Consolidation 20
...................................................................... ........................
........
Security considerations 20
...................................................................... ..............................
..
Data 20
...................................................................... ..............................
..
Audit 20
...................................................................... ..............................
..
Summary 20
...................................................................... ..............................
..
Software as a Service 22
...................................................................... ..............................
..
Features 23
................................................................................. Saa
S
Customization 22
...................................................................... ..............................
..
Drivers 22
................................................................................. Saa
S
Challenges 22
................................................................................. Saa
S
Places) positions (of 22
...................................................................... ........................
........
Multitenant 22
...................................................................... ........................
........
Providers 22
................................................................................. Saa
S
22
...................................................................... Outlook.c
om
21.................................................................. Google
drive
10 Cloud Computing Basics
20
................................................................... Salesforce.
com
Platform as a Service 22
...................................................................... ..............................
..
Features 22
................................................................................. Paa
S
Customization
................................................................................... 0
11
analysis ..................................................................... .
011
Consolidation
................................................................................... 0
11
Responsibilities 011
................................................................................. Pa
aS
010 drivers
................................................................................. Paa
S
010 Challenges
................................................................................. Paa
S
Flexibility Challenges .................................................. 010
Security challenges .................................................... 010
Providers 010
................................................................................. Paa
S
010. ...........................................................windows
Azure
Engine 012 ..................................................... Google
App
Infrastructure as a Service
................................................................................... 0
12
responsibilities
................................................................................... 0
01
Drivers
................................................................................... 0
00
Challenges
................................................................................... 0
00
Security challenges
................................................................................... 0
00
Providers 000
.................................................................................. Ia
aS
Elastic or flexible cloud computing Amazon 000
................................................................................ )E
C0 (
Other service models
................................................................................... 0
21
021 database as a service
............................................................................. )Db
aaS(
Desktop as a Service .................................................. 021
Cloud Computing Basics 14
Failures
................................................................................... 0
22
Management changes in operating environments
................................................................................... 0
23
Version Management
................................................................................... 0
22
Information about infrastructure: Configuration
Management
................................................................................... 0
21
Vulnerability and penetration tests
................................................................................... 0
21
Response and security surveillance
................................................................................... 0
21
022
.................................................................... Housekeepin
g
Threat Control
................................................................................... 0
22
Incident response
................................................................................... 0
11
Best practices
................................................................................... 0
11
Flexibility in operation
................................................................................... 0
10
Summary ................................................................... .
010
Chapters partnership
Introduction
future IT organization to host. Basics of cloud computing that will help policy questions
that, at the time of review or set up a pilot project or cloud environment're arise, lead.
Cloud just for large companies and those with big budgets are not available, the
alternative technology with cost savings, is now available in the majority. In some cases,
each organization must decide whether or not to use the advantages of cloud.
Consumers regularly decide whether photos, music and data files stored on your local
system or use of cloud providers. So what do you choose? The simple answer is not. It
all depends on your needs and the resources available to you. The purpose of this book
These tips for people who want to become familiar with cloud computing
technology. Whether you're looking to get general knowledge and what you
need to decide whether to use cloud environment, this book will guide you.
The decision to move to the cloud should not be ignored. In general, for most
is. You do not want to neglect your decision. It is important that you have the information
18 Cloud Computing Basics
You can get more before making a decision, not equipped. This
book will help you in obtaining this important information.
The structure of this book
This book contains seven chapters. Beginning with an overview of cloud technologies that
have formed the start. Then about your options when deploying a cloud environment, we're
talking to them. And then we'll guide you in making decisions. After the decision, some of the
Chapter 0 introduces the basics of cloud concepts and some of the benefits
that it provides a clear assignment describe arise. Some of the issues and
concerns that some organizations move to the cloud when they need to
cover. And also say how the issues and concerns can be mitigated.
Season 0 technologies and concepts that are used in a cloud environment examine
as a service.)IaaS( 2 Then take a look at the newer service models have been
developed recently.
1
Software as a Service
2
Platform as a Service
3
Infrastructure as a Service
Cloud Computing
Basics 19
وWe also cover efficient. We believe that the issues covered in these chapters you
understand not only clear, but also will help you implement cloud. With the cloud,
like most new technologies, the key to ensuring its correct understanding of what
you're dealing with. You have to understand in order to ensure that the cloud is right
for your organization, you need to. We aim to make sure that you have the
necessary understanding.
02 The Basics of Cloud Computing
• This Season
What is the cloud?
Cloud drivers)Cloud Drivers(
Barriers to Cloud Adoption: What is the obstacle?
Introduction
The concept of cloud computing can be very confusing. In this chapter,
we provide an overview of cloud and concepts related to the start. Then
some factors that cloud the organization to speak.
For more service, which provides cloud services varies over time. To adapt to rapidly changing
customer needs some service. Think What services have you used), especially related services
technology (which over time has not changed. Certainly the number is not high. If you are a
service provider, you, for this to provide customers with value, you need your services change .
certainly does not exclude the cloud. here is that Gyjknndgy. whenever someone for a clear
definition and thinks it is right, re-change services. many thought that when the National Institute
of Standards
providers are trying to offer services, however, do not. Just because a web-based application,
it does not mean that it's cloudy. Program and service program must display certain
is the cloud computing represent the five characteristics: on-demand self-service, broad
network access, resource sharing, flexible or rapid elasticity and measured service. All five
characteristics must be present to ensure that the proposal, the proposal is expected to be
considered correct.
On-demand self-service
And the application process are completed automatically. The advantages for the
User self-service also reduces the liability of managers. Free management of day to day
to create hard, but for cloud providers is definitely worth the time and money. User self-
service user portal is implemented mainly through. Khalqanhay portals that can be used to
Will be required. Lyalhsab, users with an interface model 3Which allows them to put the right
information that are displayed. At the end of this portal APIs with applications,
the systemAPIOr means for automation and simplification does not exist, causing the problem.
Sarbanes -OxleyTo avoid this requires controls that the user is able to use specific
services or carry out certain activities without a license, it is. As a result, some
processes can be fully automated. It is important that you find out which processes
can be implemented and can not be automated self-service environment.
connections for connecting to the service or program. In most cases, the connection will
is growing, but they still are relatively slower than LAN connections. Therefore, the
provider must require users to have plenty of bandwidth to use the service.
Connections that are limited in bandwidth leads to the second part of this requirement are:
cloud services should thin clients 1Require. First, download a fat client1It may take a lot of
time, particularly in connection with low bandwidth. Second, if the application client
4
template interface
5
compliance programs
6 :thin client To Computer Or computer program Apply Is to fulfill
duties Computational related to other computers
1 :fat client in model Client model-Srvysdhndh networks PC, client
Say The abilities Has a lot of server or standalone server acts
03 The Basics of Cloud Computing
Between a client and a service system, users are faced with the
problems of latency on broadband connections.
This brings us to the third part of this requirement: Cloud services should be able to be
accessed by a wide variety of client devices. Laptops and desktops are not the only
devices that are used to connect to the Internet and networks. Users can also via tablets,
smartphones, and a host of other options are also attached. Cloud services are required
to support all devices. If a service requires a client, the provider may be forced to
costly, so if the solution is structured in such a way that the user does not need to be
very helpful.
Resource sharing
Resource sharing helps reduce costs by providing flexibility creates. Essen resource
sharing based on the fact that the client needs to prove to all the resources available to
them. When resources are not used, instead of being unemployed, they can be used by
other customers. The provider allows more than one customer service provider) If any
resources on the physical system in a tank Mygyrndkh can be used by multiple virtual
systems.
comfortable in order to satisfy customer requests. Cloud deployments must have the
necessary infrastructure to expand service capacity. If the system is well designed, this
may only require computer resources, hard disk, and like it. They key is that even if
resources are available, as long as they need not be used. The vendor's storage usage
Most rapid elasticity or flexibility of automation and synchronization is performed. When the
use of resources is to a certain point, a startup 2Activated. This setup will automatically start
processing capacity expansion. When consumption decreased capacity to ensure that these
resources are not wasted, decreased. This feature enables you to manage the
implementation of cloud what they burst capacity required by many of its users. Continuous
Capacity increased capacity is needed for only a short time. For example, an organization
may need to increase the capacity of the processing order at the end of the financial quarter.
In a traditional system, an organization may need to support the volume of data transfer
8
Rapid Elasticity
9
trigger
06 The Basics of Cloud Computing
Internal capacity. This means that the resources that are always available, but
in a time interval used. In a cloud environment, the organization of the
advantages of public cloud resources used for a short period of time. It does not
always need to be available internal capacity.
Measured service
Cloud services must be able to measure consumption. The consumer can use different
criteria such as bandwidth, time, and measurement data is used. Service attributes measured
creates a Myarmnasb identification, a determined rate. This rate is used to determine how
customer payments. In this way, the client's bill based on consumption levels. If the service is
not used on a particular day, the customer will not incur charges for that day. If you have to
pay the cost of cloud services, you must ensure that you know exactly which services you are
measuring the resulting costs. In a measured service, it is very important that you understand
the costs associated. If you do not have a good understanding of the costs may be so
unpleasant surprise.
public, private, and hybrid group. Here we Khalshay of any offer, but in the next
chapters in more detail to them.
10
pay as you go
Cloud Computing
Basics 07
General
When most people think about cloud computing, public cloud service model
they think. In the public service, all systems and resources that provide the
service are in a foreign service provider. The service provider is responsible for
managing the systems that have been used to provide services. Client is solely
responsible for any software or application client that is installed on end-user
systems. Links to public cloud providers often occur via the Internet.
Private
In a private cloud, systems, and resources that provide services within the organization
or company from which they are used. The organization responsible for managing the
systems that have been used to provide services. In addition, the organization
responsible for the program and client software that is installed on end-user systems.
Often through private cloudsLAN Local or WANAre available. The user remote control
users, this access via the Internet or through the use of a virtual private network)VPN(
will be provided.
Group
Public clouds are a relatively clear that members of a selected group of organizations is
shared. These organizations are generally the same mission. These organizations do not
want to use the public cloud because it is open to the public. They offer more privacy
than the public cloud what they want. In addition, each organization does not want to be
solely responsible for cloud storage, they are capable of sharing responsibilities with
each other.
hybrid
Hybrid cloud model cloud model is a combination of two or more. The clouds themselves are
not combined, but the clouds parted and they are all connected together. Pchydgy a hybrid
cloud environment more, but it allows more flexibility in meeting the objectives of the
organizations.
08 The Basics of Cloud Computing
you start talking about your cloud service models. descriptionNISTCloud computing
Infrastructure as a Service
Infrastructure as a Service, or IaaSProvides infrastructure services to the customer base.
The service includes physical machines, virtual machines, networking, storage, or some
combination of these items. Then you can create whatever you're in the top management
Platform as a Service
Platform as a Service, or PaaSAn operating system, development platform, and
provides a database platform. ImplementationsPaaSOrganizations to develop
programs without worrying about the infrastructure needed to support the
development environment. However, depending on the implementationPaaS
That you used in tools that you can use to create Brnamhytan are limited.
Software as a Service
Software as a Service or SaaSProvides application and data services. Application,
data,
Cloud drivers11
Cloud gives people new opportunities. Liable to roll out the program, you must pay
the cost of the system would be correct and well-trained staff. Now, depending on
which provider you choose, it'll be extremely reduced costs. Cloud is a big factor in
the introduction of the new consumer era. End users do not need to use apps that
do not like and does not cover their needs. They can choose another program much
easier to read.
Today, some programs SaaS Are mostly used, customer relationship management)CRM(And
planning company source)ERP(A. ProgramsCRM And ERPCan be very complex and difficult to
implement and support. TodaySaaS Many examples of these programs are hosted by
System drivers
There are many system drivers that organization to the cloud. An organization may
require specific system properties that can provide it with their current structure.
Enterprises may have the knowledge or the budget to determine the characteristics
of the environment do not have internally, so they are looking for a cloud provider to
Agility
Cloud environments can provide great agility. You can easily find them again when the
resources are not appropriate. This allows you to add resources to the system that they
Needs and keep them away from a system that does not want
them. You can easily add the systems to develop capacity.
Internal cloud environments to take better advantage of the internal
infrastructure resources. Virtualization uses a cloud infrastructure that
can be used to increase the percentage of Zyrsakhttan help Zrfyttan.
As a result, there is less likely that the system is idle.
Reliability
Confidence in the environment can be very expensive. It often involves having
multiple systems in the data center locations. You should have a disaster
providers have several place settings, so if you use their services, you can
instantly add reliability to their environment. You may request that the service be
used in several places, but at least it is an option.
be added automatically to increased consumption. This helps in two ways. Increased capacity
to ensure that customer needs are met, will help. The fact that resources can be allocated on
demand to automatically means that they are not always available, which means that the
systems are unemployed and waiting is not required. These systems still use resources. If you
do not have to wait for the system, you can save the consumption of resources such as power
and cooling. This scalability allows you to meet customer needs for the better. You can quickly
12
disaster recovery
Cloud Computing
Basics 41
Performance
Efficiency in cloud systems continuously measured and controlled. If efficiency is less
than a certain level, the system can automatically be adjusted to provide more capacity.
The service level agreement also has advantages. ASLA ) Tvaqnamh service level (a
certain level of efficiency is ensured. If this level is created, service provider generally
some levels of productivity and economic efficiency. This efficiency is often in the form of
a refund or reduction in fees. So, although guaranteed performance not possible provide
Ease of maintenance
Ease of maintenance can be very profitable in cloud computing. If the other person
infrastructures and systems that are used to provide a service management strategy, they are
generally responsible for maintenance. It has several meanings. You do not have to worry
وBe the software. You do not have to worry about spending time trying to
manage multiple servers and many different client systems connect. You should
be concerned about the destruction caused by Windows maintenance. There
are some examples that administrators need a few hours to log in to change the
system. As well as maintenance and support agreements with several vendors
can be very costly. In a cloud environment, you should only deal with the
maintenance of the service provider.
secure than traditional environments. Managers and engineers who specialized public
type of safety or environmental focus a data type. This focus allows administrators to
spend more time on security measures the better. Additionally, a cloud provider more
money to provide specific problem-solving. They also solve issues for several clients and
not just an organization. Many organizations are looking to the cloud to facilitate
put. They can flexibility and choices that you can do to secure the environment to restrict.
If you are able to outsource certain functions to an external provider, you'll also be able
Business drivers
Cloud can help you deploy and run applications faster. As well as better management
capability
وWhen you consider the benefits you get, you can exchange your business to a simple
architecture and agile. There are other key advantages are the cost and consumerism.
Cost
Cloud environments can be a source of reduced cost. One of the largest reserves
transfer costs from cost of capital is the cost of operations. When setting up a
traditional environment, infrastructure and tools must be purchased ahead of time. It
is often used as part of the capital budget be purchased. In the cloud you should
worry about your equipment, you only pay for the service costs. A service charge is
usually in the operating budget of the organization's account. Generally easier
confirmation confirming the operating cost is the cost of capital. In addition, cloud
environments using traditional storage occur benefits and to calculate benefits.
These are usually cheaper than more specialized components.
Consumerism
Information technology has changed the landscape by signs consumerism.
Consumerism focus on customer needs and demands. Consumers are not limited to a
particular paradigm; they selections. For access and free apps that want to reach the
consumer needs, environment, information technology must be flexible. They may need
to provide a host of several programs that provide a function, they are. It can be difficult
and costly to force in support. Using a cloud environment to provide these services can
make it a lot easier. More cloud environments accessible from various devices such as
computers, laptops, tablets and mobile phones provide. They flexibility to users in any
Surround technology
Recent advances in technology are a big reason for moving to the cloud. In the past,
the cloud was a good idea but it was a false hope. Technology to bring the dream to
reality was not. Cloud model lacks key components to be an acceptable option. Get
enough servers to serve consumers was very expensive. And you have separate
servers for each client would vote. Integrated program were able to measure
ranges. Most applications require a greater amount of data to transfer between
applications and the client. They must meet all of the services. Now technology has
been developed for many of the shortcomings solution has been created.
virtualization
Virtualization great motivator in moving towards the cloud. In fact, when people think
much about the cloud, they think of virtualization in a cloud environment is a must,
but it is not. Virtualization can be implemented in a wide role cloudy, but not
required. With virtualization, you're able to host multiple virtual machine on a
physical system. This greatly reduces the implementation costs. You do not need a
separate physical systems for each customer in mind. In addition, virtualization lets
you collect and supply the increased consumption of physical systems.
Program structure
There are also changes in the design and program structure. Previously, the program could
serve several client. Another way to prevent a customer or client information was not part of
the program. Now several clients can access a particular instance of the application, but their
separately.SOA Allows applications to allow sharing elements. SOA , APISuch displays that
can be used by systems client or client applications. Open source computing providers the
increasing bandwidth
Speed access to the Internet) bandwidth (greatly increased. This increases the overall speed
of access to the app. In many cases, the Internet can access based on comparable-based
access LANIs local. Increased bandwidth could mean response time is better. This helps
In recent years, the number of cloud services and cloud providers has increased. There
is relief for consumers and providers. And the reason is that every day there are new
providers. They are benefits that can be achieved by providing cloud services to
consider.
Economies of scale
Cloud providers use a concept known as economies of scale, which is based on the fact that
when you create an infrastructure for application or service, add incremental capacity is only
required Azafhhay. The higher the setting, the greater the potential return on investment is
higher. For example, take a look at our e-mail services. Implementation of e-mail services for
employees in 2111 to about 02 cents for each email box costs internally. Provider
14
orchestration
15
hypervisors
46 The Basics of Cloud Computing
Implements cloud email services to 011,111 users for each email box
will cost 01 cents. Deals can cost 02 cents for each email box
suggestions. That is where we are all winners. Provider revenue and
cost is also cheaper than what can an organization.
Alternative income
Offer subscription-based services can provide services for the provider with
a stream of periodic income. Alternative income stability to a business adds.
An income stream to help meet earnings estimates and budgeting.
Ambiguity
One of the problems that hinder the clouds in the lack of understanding that
provides cloud services. This lack of understanding causes fear. Most of these fears
about hidden costs, lack of control, integration issues, security concerns and so on.
However, all these problems can be reduced if you Rdk clear understanding of what
you're looking for deals and what to expect in mind. We give you the knowledge
needed to overcome this fear. Many of the concerns only questions that have no
definitive answer. When you are dealing Ksbvkarysh ability to do things your
organization, you must be wary of the unknown. You should not be able to reduce
the risks do that. If you do not know what the risks are, then surely you can not let
them down.
Cloud Computing
Basics 47
customer needs. Many public cloud services are clear. If your organization requires
a specific service that is provided to a particular species does not, you will not be
dealsSLAWould not suggest in any way. OthersSLATo offer, but it ensures that they are
not suitable for many organizations. 03/1 access to your organization may require a
special application or service, the provider can not offer it. One note of this part is that if
your organization can provide a certain level of access) due to technical limitations (the
service provider for a given service or application is faced with the same technical
limitations.
16
Maturity
48 The Basics of Cloud Computing
Integration
When working with service providers, integration is a key element. Because the system
used by your service providers do not, you will not have direct access to them. No direct
access, some interfaces are provided for making it possible to integrate with other
Data integration
data from one location to another location discover.Bandwidth used during the copy
process, you will definitely affect the costs of the service. The lack of real-time data
access provider could be issues in many circumstances. Realtime data are often
required to report. Moving data in real-time can have a large bandwidth needs. The
bandwidth consumption can be very expensive.
Sometimes web interface provided by the service provider is not good enough alone.
You may need to program or web service, you must take advantage of other service
providers. Many service providers interface orAPIOffered that can be used to access
performance. Secure access to this interface gives you access to the required function
for programming.
17
on-premises
Cloud Computing
Basics 49
Security
Although some cloud implementations assume than traditional deployments in some
cases are very safe, but some aspects are less secure and have a higher risk. This
risk stems mainly from the fact that you do not have direct control over the system
Property data
There are many questions about the ownership of data in the cloud. Essen cloud
implementation is a big question is who owns the data? You may now create data,
but the field is sorted in an external service provider. Are you still're the owner?
What happens if the service provider to come out of this business? How can you
access your data? Does that property can be obtained your information? Whether
the company is obliged to give it to you? The questions that you should consider
when they consider a service provider. Different service providers have different
answers to these questions, then you need to be aware of what you expect from a
service provider.
Audit or investigation
Ability to perform appropriate audit among different cloud environments. Depending on the
implementation, you may not have direct access to the systems and applications that you
want to be audited
وOr not.
Which is used to keep it private. In certain cases, you may have personal standards
Legal issues and agreements can be very difficult when working with cloud
Europe have access to the server, what Mqrrhay apply? General guidance to ensure that
you follow the laws in each jurisdiction. One of the ways that you can to ensure that
auditorSAS11 Type II Has approved .The audit makes sure that the access provider
Multitenancy
Tenants can offer some of your stuff. You should take the time to
various organizations that have a service use the same careful. No
doubt there will be security and customization issues.
Security
With multi-tenancy and you control the people who have little knowledge sharing
systems like the system you have. Your subconscious mind that your competitors can
use the same system. If your competitors are able to extract some security gaps on the
host system, they may also be able to access your environment. This is the same hack.
Hackers also purchase cloud. Their main aim is to find and exploit to gain access to
amount of customization that is done there. In some cases, you may be able to
Cloud Computing
Basics 31
a while. You may have to get different versions of your app. The new version may need to
Technology challenges
Although great improvements in cloud technologies, but there are many ways to
grow. Many technologies have not yet been officially approved as standard. This will
cases this means adding capacity, because you are a great place to change
02
Change horizontal scale
To change the horizontal scale Scale outAlso called, means an
increase of more nodes to the system. An example would be
increasing the number of Web servers from one to three named.
Change vertical scale
Change the vertical scale Scale up Also called, means to add resources to a
changed. For example, you can add a number of processes running daemon) in
Horizontal scale need. Change horizontal scale can lead to increased load on a data
center and related expenses increased environmental sources such as cooling and
electric motor.
Company policies
If your company already has used only internal resources, policies and procedures
policies that can control when you've completed the cloud environment and when
you have not done this apply. You are policies to determine what can and what can
not be transferred to the cloud need. You are the policies around what the service
flexibility
Select a cloud environment may be somewhat limited. You must consider that if a
service provider are not satisfied with how difficult it is to change provider. Changing
providers is difficult. This is a great concern that the data from one provider to another, to
Summary
There are five key cloud characteristics: on-demand self-service, broad network
access, resource distribution, flexible Fast and measurement services. A solution
must have five attributes to be considered as a correct solution. There are four cloud
deployment models: public, private, and hybrid Grvhyy. Each model Due to the fact
that the infrastructure environment where it is defined. There cloud service models:
Software as a service, platform as a service and infrastructure as a
service.SaaSCloud cloudy original model but has continued to grow and expand.
Now many service models available. There are many factors to move the
organization to the cloud, as well as many other factors that keep them away from it.
Each organization must evaluate the clouds that is right for them and the best
choices.
Cloud Computing
Basics 34
• This Season
identity confirmation
Computing concepts
Hardware virtualization
Web Developer Technologies
Introduction
Cloud is a service, but several technology elements are stacked to enable the cloud.
These technologies and advances in technology are responsible for the rapid growth
of cloud and access cloud applications. We do not talk in detail about technology,
but it is important that you have a common perception of them. Because when you
have one provider and cloud products to choose from, if you can create a distinction
between the technologies and know each offer what is very Mzayamnd.
Authentication
Authentication is the process of identifying those who say that if the same user. In many
systems of access to resources, you must first establish your identity. If sensitive information
is vague, and whenever you need to check, you must create confidence in the person, the
right person is. If you do not, you will not be able to trust the person or even be able to trust
the information provided by them. There are different ways to authenticate a person or object
cloud is not excluded. The authentication in a public cloud environment is more important
applications and data. Since public cloud applications are available via the Web, they
can theoretically be available to all. For this reason, the service provider must insure that
the proper precautions to protect applications and user data are used. This process has
been selected to ensure that proper authentication begins. Similarly, when you evaluate
your cloud provider should make sure that they are appropriate measures for
authentication. The information in this section is placed at your disposal to help you
evaluate.
Think this way: you know that when you attempt a system for authentication
وEnter your username and your password, Czech system will tell whether or not the correct
combination. You must enter the correct password corresponding to the username you have
entered is. If one of them is incorrect, authentication will fail. First the system checks whether
the name
Cloud Computing
Basics 35
Access19
After the authentication credentials are allowed and licensing begins. Authorization
is the process of determining what a user is allowed to do it. License not only about
the system and access the system. The possibility and capability that permits users
everywhere. Every organization should have a security policy that defines who has
access to what resources and let them do what they have on these resources.
Authorization policies can be anything from concerns about privacy for compliance
with the regulations affected. It is important to have a system that you are able to
apply your license policy, including public cloud-based systems.
Multi-factor authentication
One way to ensure the appropriate authentication security using multi-factor authentication is.
Multi-factor authentication because of several factors such uses is called authentication. You
may be a factor to consider a set of authentication. There are three factors that can be used
for authentication: something you Mydaynd, what you are, what you are. Something that you
know the password, birthday, or personal information. What you once used a password, smart
card, and other things that you may have to physically. You are what you are biometric, such
considered, it must use at least two of the three factors mentioned. For example, when a user
attempts to acknowledge that he may enter passwords and codes used once.
those who are storing sensitive data. So if you feel you need multi-objective
Risk-based authentication
Risk-based authentication began to acquire a reputation. The authentication due to
increased risks of public programs and website were confronted with was created.
Risk-based authentication of a risk profile to determine the authentication request
can use is suspected. Risk rating given to any attempt authentication. If the score is
risk beyond a certain amount, service provider or a Web site can request more
information before allowing them to access. This information can be traditional or
factor authentication security questions are added.
A risk is calculated based on user and system features. Site profiles for each user based on a
common information such as time of arrival, system or method used to access the site
provides access. When a user attempts to access the site and its recent consumer
Identity providers
In the field of authentication, there are certain service provider is a provider of identity.
Identity provider orIdPEntity that maintains and manages identity information. You
can be sent to anyone who needs it. Generally, this is a service provider, which relies
identification information.
Tank credits21
Tank credit, which sometimes store or warehouse user authentication is called, is where the
real user accounts stored in them. Two main types of authentication repository withIdPWhat
used: databases and directories are repositories. In general, the database credit-specific
tables created by the user are stored management. One of the reasons that the database is
programming, so write the code for user authentication database is relatively easy. Includes
lightweight directory access protocol tanks Help)LDAP( 00 And implementation are working
directory. LDAP A method based on simple standards for access to the data warehouse
20Relying party
21 Credential Store
22
Lightweight Directory Access Protocol
38 The Basics of Cloud Computing
application directly to the warehouse are. figure) 0-0 (indicating that the IdPWhat
works. Programs withIdP Communicate and IdP Credits associated with the tank.
IdPPublic
Identity providers can be public or private. usingIdPThe public is growing steadily.
usingIdP Foreign can save time and money for you. IdPAre available for use in different
OpenID
we with OpenID Let's start. OpenIDA standard for authentication. It provides a framework
an application and other sources. You can use a central entity, such asIdP, Which for
authentication for several websites and sources. Since theIdP The standard OpenID
Added and service provider supports it, interoperability will work well. OpenIDProvides
several key advantages. First, the authentication service provider should not be worried
Srvysshan. They should also be concerned about the maintenance of reservoirs credit or
managing users. Reset Password and things rapidly increases support costs will be
removed. Second,OpenID, The service provider which methods are used for user
authentication is not important. This allows you to select an authentication scheme to the
needs of your organization without having to worry about what your schedule will work or
not, and economic efficiency. You may also change your authentication scheme when
you think you need, you feel more freedom. It can change in theIdP , Or you can create a
IdPSelect the new. Since theIdP , OpenIDYour support, your program to the
authentication mechanism has changed paramount importance. If youIdP Select the new,
you must validate the application or service and new IdPNew, but it does not change the
Google
IdP Standards-based Google OpenIDIs. In accordance withOpenID 0.1. IdP Google
also supports the following extensions: Swap Properties 020.1 OpenID, UI 0.1
Facebook
Facebook An identity provider that is growing strongly. Facebook Recently OAuth 0.1
To provide authentication and authorization data. Facebook several API
وThe software development kit will be provided to you in integrating Login FacebookWith the
help Brnamhytan. You can javascript client, calls natural Device) Android,IOS
وEtc. (or run the server. For more information about the provider Identity Facebook To
Microsoft account
Microsoft has an identity provider, which already named Windows Live Known.
providers03 is.
23
OpenID Attribute Exchange
24 Microsoft's federated identity provider
service
50 The Basics of Cloud Computing
Basically, a program to the trusted entity, which IdPIs, when the presence of said
user who accepts. In fact, the program itself does not do anything to acknowledge
the user's identity. It is simply what theIdPHe says it. Before the reliability
programIdP, A relationship of trust must be created between them. The program
must addressIdP That trust has to be configured. IdPMust be configured with the
address of the program. In most cases, some key between two entities that
exchange to establish this relationship. This key is used by entities to identify each
other.
option. ACS A cloud-based web service Azure Windows that is used for identification and
for Web apps and services will be used. In this way, it functions not directly in the code for
model, no installation is not required. You still have to implement examples for their
ACSIt is very flexible. According to many protocols and environment. This allows you to
Supports such Oauth, OpenID, WS-Federation, And .WS-Trust also ACS Several
types of token formats) encryption (also supported. It formats SAML 0.0; SAML
0.1 JWT And SWT supports the. ACSDevelopment using many Web platforms
support. You mayNET, PHP, Python, Java And more. ACS Includes a host of
practices that are committed to further identify critical environments. ACS Allows
you to implement only a function that is essential for the implementation of the
catalog. ACS The following function provides: authentication, authorization,
Mthdsazy, the transfer of password security, trust management, management
and automation.
Computing concepts
Two key concepts in the implementation of cloud computing is
involved. These concepts will help to establish the philosophy of
many cloud implementations.
exactly what Amazon has done to implement Abrysh. In fact, Amazon has been so
Autonomous computing
Autonomous computing by Paul Horn From IBMIn 0110 presented the vision that
each has its own computing system to automatically manage, and shared.
Key benefits of reduction in the inherent complexity of computing systems,
and more intuitive and easier to calculations by the operators and users. In
this vision of autonomous computing systems, self-optimizing, self-
protection and self-improvement.
Similar efforts to simplify the management of information technology independently led,
research groups are still on their systems to improve the systems and policies that can
work. Our success with many of the products have obtained and also one of the main
goals of controllability
Cloud Computing
Basics 55
Us. Given that the purpose of cloud computing to simplify computing system and provide elasticity
in computing and access on the system, any new initiatives more automated machines are added
directly to the cloud infrastructure. Virtualization technologies right level of abstraction for managing
dynamic hardware resources and making changes in the elasticity of demand have provided. To
say that cloud computing vision, autonomous computing sharing is not wrong.
Many of these programs customized for each user the ability to manage multi-tenant and
did not use, as well as automatic deployment and elasticity to scale had requested. That
is the modelSaas Cloud computing model ASP Is taken.
Hardware virtualization
When most people think about the cloud, virtualization In fact, they think. But in fact required
to create virtualized cloud environment. If you think cloud properties, none of them does not
require virtualization. If it is not required, but virtualization has been used in many cloud
26
off-the-shelf
56 The Basics of Cloud Computing
This will be done by adding a new virtual machine and not making physical systems. The most
simulated physical system in a real physical system is used. In many cases there are no
physical systems simulation. In this case, the density of the system and increasing the use of
hardware virtualization to create system is used. The use of virtual machines to share physical
resources. Therefore, when a physical system does not use virtual resources, physical
will be idle for an extended period. You paid for but not using all its potential.
hypervisor and the network offer, but strong features added by other products. In this section,
what service you're using, the hypervisor is very important in your decision. You must ensure
Principles hypervisor
Hypervisor virtualization capabilities provide something. Hypervisor as an
interface between the physical system, host, and virtualized systems, the
guest acts. Hayprvayzrhay different needs are different elements that should
be on providing virtualization host system to be installed. In addition, various
Hayprvayzrhay provide different options for the guest operating systems.
27 Hypervisors
Cloud Computing
Basics 57
Of hypervisor
There are two types of hypervisor type 0 and 0.0 hypervisor in the stacks are classified
according to their seat. 0 Hayprvayzrhay type generally are directly on top of the hardware
structure. Hypervisor type 0 acts as the operating system itself. This allows them to efficiently
uses system resources are physical. For this reason, many cloud environments are built using
the hypervisor type 0. Hypervisor type 0 is generally at the top of another operating system.
The operating system controls access to physical hardware. The hypervisor as a control
system between the host operating system and guest operating system works. One of the
biggest advantages is that you can generally Hayprvayzrhay type 0 normal desktop install
them on the system. And does not require a separate system be installed hypervisor.
Hypervisor Xen
Two versions of the hypervisor Xen There are versions of open source and
commercial versions proposed by Citrix, The serverXenCalled. In this book
we About serverXenWe'll talk. ServerXenHypervisor type 0 is basically a
customized version of Linux is installed on your server hardware.
Implementing ServerXen Consists of two main entities: the hypervisor server
Xen That the system hardware02 Is installed, and the Central Management
Console Xen Windows is installed on the system.
82
:bare-metal system Only computer hardware)) Programming pure metal
((ie direct control of hardware instead of relying on the operating system services
58 The Basics of Cloud Computing
Hyper-V
Hyper-V0 is a hypervisor type. The hypervisor is installed after the Windows
operating system accesses it. But the fact is that when youHyper-VTurn, it puts itself
between the hardware and the world. And you see the problem here is that the OS
vSphere
VMWare A hypervisor type 0 suggests that vSphereCalled. The hypervisor is
KVM
Kernel-based virtual machine, commonly called KVM Known as Is a hypervisor-based
the Linux kernel is open source. KVM It is a core module and loading kvm-ko Name or
platform specific model, or the same kvm-intel.ko Different kvm .kvm-amd.ko The
applications generally do not need to install client. This is one of the things that make
them attractive in the cloud-based scenarios. They can be accessible from anywhere and
in many cases are available from the device, because the device has a suitable web
applications. In fact, web applications have become the de facto standard for the
HTML
HyperText Markup Language, a standard has been widespread for a long
time. ActuallyHTMLThe best standard for creating web pages. All web
browsers interpret web pagesHTML Know. HTMLThe tags to format and
add structure to web pages. Tdad tags and functionalityHTMLIs growing. In
fact, the latest version of theHTML2 has causedHTML It is best web
programming language.
Adobe Flash
Adobe Flash A programming language that is used primarily to create animations
and vector graphics. Flash One of the languages is very common on the Internet
programs used for animation needs.
FlashDue to the stability and security not very well known. For these
reasons, some systems that do not support. Developers are looking for
other ways to provide the same performance for them.HTML2 one of the
technologies that have the potential to replace much thoughtFlash Is.
Cloud Computing
Basics 61
SOAP
SOAP , Soap02, Is a protocol for exchanging data between Web services.
REST
REST21 A functional structure. RESTExchange program is divided
into server and client. A creature that creates client application
and server application that serves entity.
REST Six constraints on the implementation of the program
defines
Model client / server.Strict concerns must be differentiated between client
and server.
29
Simple Object Access Protocol
30
Representational State Transfer
60 The Basics of Cloud Computing
Java
Java is an object-oriented programming language. Java applications are
designed to run on any platform. Java code to an intermediate language
called Java bytecode interpretation of that. The byte code is then executed
by the Java Virtual Machine. Since the system running the right versionJVM
It has to be able to run Java programs.
Java Script
JavaScript is a programming language object-oriented lightweight. All versions of
the web browser understands JavaScript. Sometimes you will see that for security
as a server-side language used, but today it is used for programming the client and
the server. Due to the widespread adoption of Java script, many sites and web
31
Stateless
Cloud Computing
Basics 64
ASP.NET
ASP.NETA server-side web development language developed by Microsoft. It
allows a developer to create dynamic pages thatweb formsIt's called. This
means that the page can be changed according to the specification or
specification requirements.ASP.NET Above the common language
runtime)CLR(Microsoft is created.CLR At the moment of compiling a program
written in any programming language, using the framework .NET Microsoft
gives.
63 The Basics of Cloud Computing
Ruby on Rails
Ruby on RailsRuby also called, an open source development framework that can be
32JBOSS
PHP
PHP Is a programming language and server-side script. PHPFor personal home pages.
Many programming languages server side to a web page need to call a separate file, but
32
JavaBeans Open Source Software Application Server
66 The Basics of Cloud Computing
JSON
JavaScript object notation)JSON( 22 And data structures used for the display.
JSONWidely used to transfer data between the web server and application. We
should point out that althoughJSONJavascript is taken, but it is a language-
independent. One of the featuresJSON That it is attractive to the developer.
Summary
In some cases, you only have to understand the technology behind the clouds
least need. In other cases, you have to understand the broader need. It is
important that you understand what technologies are involved when deciding on
the cloud provider. If you need to integrate cloud implementation in mind,
understand that you must choose which technologies integration is very
important. This might authentication technologies, computing technologies,
virtualization technologies and web development technologies.
33
JavaScript Object Notation
Cloud Computing
Basics 67
• This Season
Public Clouds
Private Clouds
Some Clouds
Hybrid Clouds
Introduction
NIST Four cloud deployment model defines public clouds, private clouds, clouds group 23
وHybrid clouds. A cloud deployment model according to where the infrastructure is
established
important that you choose a model that you acknowledge the requirements of the model.
More importantly is that head different value proposition of cloud deployment models and
different costs associated with it. Therefore, in many cases, your choice of cloud
deployment model reduces costs. In many cases, to be able to decide whether true, we
Public Clouds
Public cloud environments that are fully managed and serviced by a foreign
service provider. When most people think about cloud computing, they are
public clouds. In fact, you'll find more articles and tools that are relevant to
public clouds. This is because the initial public clouds are cloud environments.
Most public cloud deployments are still in cloud environments.
benefits
The number of public cloud implementations because public clouds offer
many advantages it is growing. Very strong value proposition for a public
offer, although there are some problems, which we will study them.
-1 access or availability35
Public cloud deployments finding suggests increased availability. Any organization that
wishes to access a definition of the limits to achieve. Each organizational than access that is
able to reach it. Sometimes these two are matched together, and sometimes not. The problem
is that access is expensive, the cost of software and hardware costs, and the cost of staff.
Many public cloud provider software, hardware and staff are available to offer access to be
high. They may cost a little more to offer Srvysshan that this is more accessible, but it will not
وHigh fault tolerance in mind. You should ask Aryhdhndh that with what services are
Availability 35
Cloud Computing
Basics 69
Know your costs. You should also make sure that your ideal access
portion of the service level agreement)SLA(You.SLA You can give
you the assurance that your access needs may be met.
Be aware that while public clouds can increase your reach, but you must make sure
that you know what will be available. The package is to offer the service. On
offerSaaS, Alone programs will be available. But the proposalPaaS And IaaSAlthough
the platform or infrastructure may be available, but the program will not be available.
-2 scalability
Highly scalable public cloud implementations structure suggests. What implementing
public cloud and private clouds that do not offer the ability to scale infrastructure
is, depending on what your organization needs. If your organization ServiceSaaSUse, you
can add users without the associated infrastructure. If the serviceIaaS Or PaaS Use, you
will have enhanced capacity to create and your services, but you still need to ensure that
-3 Accessibility36
Public cloud providers are of great importance to the accessibility. To increase the customer,
they are trying to ensure that service can be different Kalynthay day. The aim is to ensure that
their services may be used by any device on the Internet without having toVPNOr any other
client software is available. Today, the Internet and the Internet only through the browser-
based applications on laptops and computers traditionally do not have access. Persons
Accessibility 36
72 The Basics of Cloud Computing
There are many choices for web browsers. Tblth and smartphones have many uses.
Although new devices web browser, they are not full web browsers. So to have the
ability to support these devices, applications and web pages should be somewhat
systems and web browsers is very costly. Development and quality assurance costs can
be extremely high. So while many organizations want to provide this type of support for
users, but it is expensive. However, because service providers focus more on offering a
-4 reduce costs
Public clouds are attractive because of their low cost. But you must consider that this
cost can become so similar that you think is not good. You should not only have a good
understanding about the low price but should be aware of this savings time. Using a
cloud of other organizations should not be worried about the costs for hardware and
software deployments. The customer only uses the cost of the service. More costs are
upfront costs, mainly because of the cost is to buy the hardware. As well as reducing
maintenance and support costs, and environmental costs are also reduced. Since the
servers in the data center you are not, you have the space, cooling and power costs as
you lower. In fact, if you outsource all your apps, you do not need the data center.IT
Cons
Public cloud implementations advantages and its limitations. Many of these can
the organization.
Cloud Computing
Basics 71
-1 limits of integration
In the clouds SaaSPublic systems are outside your organization, namely the data
outside your organization. Placing the data in an external location or move for you
when reporting to internal systems is a problem for you. If you need to report or
analysis, business intelligence, you can end data transmission over the Internet. The
concerns about the performance and security issues for you. When the data are
reported in the same place, they are delivered quickly.
Consolidation program can also proposals SaaSPublic problematic. In ideal conditions,
different applications can use shared functionality. You do not have to repeat the same
The public cloud applications a problem. App providers shouldAPIAnd Web services
offer that the customer can use them to do so. Otherwise you may get in a situation
-2 flexibility dropped
When you use a public cloud provider, you're exposed to that provider's upgrade
time. In most cases, when Artqadhy do you usually will not be affected. Many
Would increase the administrative burden them. Members are trained in the new
3. Disability mandatory37
When you're using a public cloud provider, while keeping system
Repair is offline deals
Downtime
70 The Basics of Cloud Computing
Doing that is bad for you and your organization. Depending on how the
system is divided, you are able to delay repairs for a short period and agree
on when to organize and the right provider, you will be. However,
maintenance can not be delayed for a long time.
responsibilities
With public clouds, more responsibility service provider's neck. Provider is responsible
for maintenance and support. Provider is also responsible for ensuring that personnel are
well trained. In the public cloud, the service provider is responsible for all the elements
needed to implement the service. These elements are different depending on the
services offered. They can include servers, applications, storage and all. In a public
cloud, the consumer is responsible for everything that is needed to use the service.
There are a few exceptions, such as client-server implementations in an application that
is involved. The consumer is responsible for installing the client and ensure that it works
pretty well. The service provider is responsible for developing the client and offer support
to obtain the best performance.
Security considerations
Ensure security in public cloud scenarios is very difficult. Since you have access
to the system to provide the service do not manage properly, making sure that
they are safe is very difficult. In this case, you must listen closely to provide
guidance and to be assured of its features.
Cloud Computing
Basics 74
data
The real issue in the case of public cloud providers increases data security.
Questions about the ownership of the data. Since the owner of the service
provider systems that your data are located, a provider of data can be
considered potential owner.
There are also issues about access to data as well. Theoretically, anyone who
Compliance / Compliance
Acceptance or compliance concerns can be one of the largest public cloud
service providers.What to do with the fact that you see a bit of what happens
behind the scenes you. In most cases, you must provide the facilities or
equipment that is compatible with their use. Provider may CertificationSAS-11
have no possibility that you will be able to check it yourself. You have to
reviewSAS Trust that it has examined enough.
Audit
In the case of public cloud service providers, you will have a limited audit
capabilities. You will not have direct access to an account or event management
systems. In most cases you will be able to implement its warning of Aqaba or
register and log in again. Then you have to rely on what the vendor provides. Many
public cloud providers give you access to some forms of recorded programs. These
records can be used to view and make decisions with respect to the user access
authorization to be used.
Private Clouds
Private clouds are fully managed and maintained by your organization. View
all the infrastructure needed for your environment in a data center that will
make you control it. Therefore, you are responsible for purchasing,
maintenance and support.
73 The Basics of Cloud Computing
Many people have a clear understanding that such a belief that private clouds are clouds
really difficult for them. They think they are the only true public cloud cloud. But if you
note the characteristics of the cloud, the cloud will notice that it does not matter where it
is located. Cloud value proposition when you're talking about private clouds as opposed
to public clouds changes, but does not specify that the cloud value proposition or not.
benefits
Private cloud models have many advantages. Most of these benefits
you have direct access to all systems. You can access the records, tracking
performance grid, trace debugging much faster in mind, or you can provide courses
-2 maintenance
By private clouds, you can control the upgrade cycle. When you do not have to
upgrade the work will be done. If the new version features and functions that you
want to do, you will not be forced to upgrade. If your organization has a specific
schedule for upgrades and maintenance that you can do these things at the time.
This helps to reduce the impact of system outages. In some cases, you may need to
run multiple versions of an app in mind that this is just for compatibility. If you do not
control systems, you will not be able to have access to several versions of the
program. With an internal cloud, you run multiple versions of an application are free.
This flexibility gives you the ability of handling increased for the customer needs.
Cloud Computing
Basics 75
-3 Nzartkrdn
Since you in your private cloud environment direct access to your system, you are able to
have any regulatory you want. You can monitor anything from applications to hardware
systems. A great advantage of this feature is that you can take preventive measures to avoid
Cons
Although you will control the whole environment Noble is very good but there are
problems. When you implement a private cloud environment, you will face problems
like traditional internal problems, implement solutions. You should consider these
problems and then decide whether an internal cloud is a good choice for you.
-1 Price
Implement a private cloud requires costs. You're forced to deploy infrastructure that can
not only support your current needs, but can also support your future needs. You should
require all parts of the business that will support them to estimate. You should also
implement an infrastructure that can support the peak times. All systems that must
support the peak times Kknd not always have to run) if it is a way to execute them
hardware is compatible. In addition, you must ensure that you create a software
which you need special hardware Daryd- for example Mkhzn- to implement a special
program is needed.
76 The Basics of Cloud Computing
-3 expertise required
With private clouds you to specialists in all applications and systems that you want to
implement them need. Requires local experts led training is costly. You are responsible for
installation, maintenance and support of you are, so you should make sure that you know or
that you do have the ability to hire foreign employees and contractors. Creating a cloud
and virtualization. Finding employees who have all this knowledge is very difficult. In addition,
your organization needs people who have specific expertise in cloud platform that you want to
implement.
responsibilities
In a private cloud environment, the division of responsibilities is
simple. Your organization is responsible for end to end solution22Is.
You're responsible for that service systems, Malynt programs, and
provides maintenance of client systems.
Security considerations
By implementing a private cloud, your organization complete control over
the entire system, applications, and data. You can control who has access
to what. Ensuring the security of a private cloud environment is easier.
There have full control over the system, and you can implement any security
tools you want.
In a private cloud environment, you are able to run your security and compliance audits. This
will give you more confidence in knowing that your system is required to give security and
compliance.
Compliance / Compliance
In a private cloud, you're responsible for ensuring that all
compliance rules are respected.
38
end-to-end
Cloud Computing Basics 77
If your organization has the skill and ability to ensure adherence to compliance
regulations, an internal system
وThe data is a big advantage. If this is not the case and you have the skills and
technologies required, you should get them in, otherwise you will encounter big
problems.
The data and your systems are located in a foreign locale compliance can help your
company. You can provide service providers trust your abilities and connoisseurs
ConformityPCIRequire special considerations must for any system that processes credit
provider. If there are security issues and compliance, your company complaints, or at
least your reputation is harmed. Many people do not distinguish between you and the
provider. They will blame you for choosing the wrong provider.
data
In a private cloud environment, you're the owner of the data and the data
system on their own. This will allow you more control over who can
access the data and what they can do to see the data.
Audit
In a private cloud environment, you have full access to all applications and system
inputs. You can see that each one has achieved what thing and what's done with it. The
biggest advantage is that you can see all this in real time, so you'll be able to correct
39
Payment card industry
78 The Basics of Cloud Computing
Some Clouds
A group of public and private clouds, such as clouds are not used much; in fact,
they are a model of cloud deployment and minimal use their fame. In a cloud a
Advantages
These clouds have many advantages. Most of them due to the
fact that infrastructure costs will be shared.
-1 Price
In the cloud group, the cost is shared between the group members. This cost-shared
infrastructure to the purchase of any single organization could provide them leads. In this way,
members of the larger economy. But you must be careful, because these problems that
-2 multitenant
In the cloud group, multi-tenancy is effective in obtaining economic benefits. Your
organization alone may not be so great that some economies bring financial benefits, but
by working with another organization or several organizations, you are so great that the
use of these benefits. In the cloud group, multi-tenancy support and maintenance
Cons
There are potential drawbacks to implementing a cloud. Every time
you have several agencies that work together, there is a possibility
of conflict. Steps to Pyshkyry of this should be taken into account.
-1 ownership
Ownership in the implementation of cloud group should be clearly defined. If you put
agreements for condominium set. In some cases, organizations are put together to
create a cloud that may establish a joint organization can own the resources.
responsibilities
In the cloud teamwork, responsibility is shared between the organizations.
Problems may arise in that everyone is responsible for what, but later it turned
Security considerations
Clouds group a certain set about because several organizations
that are providing security and access control environment.
data
In the cloud group, all participants in the group have access to the
data. For this reason, you do not want to save your data that is limited
to your organization. If so what problems may arise for you.
Conformity
In the cloud group, any organization that is somewhat familiar with compliance
regulations, is responsible for it.
82 The Basics of Cloud Computing
Audit
In the cloud group, member organizations have access to all
applications and systems are shared. You may reject agreements
to specify that anyone should ask what activities they do.
Hybrid Clouds
With full cloud computing over time, hybrid clouds will become the most common
cloud implementation. Partial false impression that there is the hybrid cloud. Many
people think that hybrid cloud is a cloud environment that some elements are private
and others are public. This is incorrect. A hybrid cloud environment, it can see in
Figure 2.0, cloud where several separate cloud environment are connected
together. Hybrid clouds freedom to implement whatever is necessary to meet the
needs of your organization. But the clouds can be very expensive and complicated
to implement.
Advantages
Alh on the benefits achieved through each cloud, hybrid cloud model also finding
increasing flexibility. If your ultimate goal is to move everything provider public cloud,
hybrid cloud allows you to move to a cloud environment in which you have to
Mvmykrdn something until they're not. You may note that the proposed program for
its public service is expensive. You can use this app to keep internally as long as the
cost is reduced. You may also have concerns about the security of public cloud
providers have a number of specific data. Hybrid cloud model allows you to store the
data internally until you make sure it is secure in the public cloud environment.
Many organizations use a hybrid cloud model because the model fault tolerance
and high availability is. You can set certain apps that are in the environment. In this
case, if an environment with criticism, you still have access to the program.
Cons
A hybrid cloud environment can be complex to implement Bashd.malhzat
environment varies according to what you want to implement cloud there.
The whole process and rules will be applied to all environments. You have
different settings for each environment to develop rules and procedures.
-1 Integration
There may be applications that require the same data. In this case, you
have one of the following choices: you can either copy the data to prepare,
that you are required to set up some mechanisms of replication to keep data
synchronized, or you can just data to be transferred . Transfer data in a
cloud environment problems, and you should be concerned about
bandwidth limitations.
80 The Basics of Cloud Computing
Security considerations
Security considerations specific hybrid clouds. You should not only be
concerned about security issues but must also be concerned about the
data
Moving data in cloud environments is very dangerous. You must
make sure that all areas are satisfactory safety data involved. Data
that is constantly moving its safety is difficult. Both sides of a
relationship must apply the same security protocols, and must be
compatible.
Audit
Audit hybrid cloud environments is difficult. User access to internal and
external changes. Following a process from beginning to end may take you
to the internal and external systems. You must have relevant events so that
you can adapt these events at home and abroad together.
Summary
NISTCloud deployment model has four express public, private, and hybrid group.
Public clouds are open to the public. Private clouds are specific to an organization.
mix of cloud-based models. Each model has advantages, problems, and security
• This season:
Software as a Service) Rental software (
Platform as a Service) platform hire (
Infrastructure as a Service) Rental infrastructure
(
Other service models
Introduction
According to the definition of the National Institute of Standards and Technology)NIST(Clear,
three cloud service Home there: software as a service, platform as a service and infrastructure
as a service. But one thing should not be forgotten and that is that since we are the provider
service are handled, should everything be negotiated . change existing services and new
services to meet the needs of the client's existing moderated collection. and with the growth of
cloud markets, must have knowledge of the new services. We offer some of these services
وHas its own unique characteristics. Figure 3.0 shows an overview of related services to the
computer. Each service model, we see them again breaks down the entire stack.
Software as a Service
Many people SaaSKnow the original cloud model. ModelSaaS Similar to the service
provider program.)ASP(But there are some key differences exist. First, the
modelASP
83 The Basics of Cloud Computing
Specification SaaS
Depending on the provider and the services offered, the specification may be
Customization
With implementation SaaS, Service provider often Hmhchyr virtual control program. In many
cases, it is not limited to any customization that can be done. But depending on the
implementation, you may be able to request that the user interface is slightly changed. Most of
the major changes is not possible. In most cases, the customer is not able to make changes,
the provider must make changes. In the environmentSaaSThe possibility of customization can
be very costly for the service provider and the customer. Allows extensive customization
means hosting a separate instance of the application is only for a specific customer. Having
Customization
86 The Basics of Cloud Computing
provider. You do not have to worry about upgrading the software on multiple client. Focused
upgrades allow upgrades to occur more frequently, they are able to fast delivery. Exception to
this rule is when the client software that is used to access centralized applications. But
ProvidersSaaSIn an attempt to access their apps without having to program the client. Focused
upgrades will lead to a problem. When a provider chooses the time to upgrade, you do not
have any help in this case. First, if there is downtime associated with the upgrade, you have to
accept it. In addition, the upgrade may require more user training, so you train your users. The
analysis
Usage statistics and analyzes valuable information about the use of the program
can be used. In implementationsSaaSCheap ability to see user activity and
determine the trend. For large organizations, this information can be valuable. Since
Integration
At SaaS, A provider of data stored on the site. In most cases, the client does not have
direct access to the data. This is problematic when reporting and business intelligence. If
you need to repair or manual data re-load or load your data is also problematic. In some
cases, you can not do anything about it. In some implementations you
Cloud Computing
Basics 87
The ability to move data and transfer them between SaaSAnd your internal enterprise
systems. When this type of operation, you should note bandwidth that is used. In these
cases you must pay costs to the service provider and Internet Service Provider.
responsibilities
In implementations SaaS, More responsibility service provider's neck. This is
one reason that implementationsSaaSIt is famous. Internal resources,
organizations are able to liberate and to do other activities. Figure 3.2 you
an idea about the overall responsibility of the service provider and customer
responsibilities.
Figure 4-3 Responsibilities SaaS
88 The Basics of Cloud Computing
the program is properly assemble31Is. Makes sure that data stored well. The
efficiency of the system and make any adjustments that are needed for control.
In the environmentSaaS, The customer is responsible for client systems. The
customer must ensure that client programSaaSConnections. All the necessary
software must be installed on the client system. Client systems must be
improved at an appropriate level.
Drivers SaaS
Lot of drivers in the development of proposals SaaSGeneral participated. Strong
growth in the creation and consumption of Web-based applications there. More
presentations donorsSaaSOffer their services for web-based applications. The
growing acceptance of web-based applications, servicesSaaSAlso accepted.
See how the program has changed as well as quality and convenience in
application development is also being developed. Full getting older platforms
and the introduction of new platforms diversity of many tools you can use to
build web applications Grfthshvd has created strong. Some of these
toolsHTML2,JavaScript, CSS, Ruby on Rails And PHP are.
challenges SaaS
Although SaaS The most famous cloud service model, but still challenges in
SaaSThere is. ProvidersSaaS Many of these challenges and concerns have
been unable to solve this, but there are still challenges, which is described
in the following sections.
the application must be made over the public internet, sometimes the path is long. It's far
40
patch
Cloud Computing
Basics 89
Multitenant
Multi-tenancy is causing problems. Since the program is shared, generally a little
customization is accomplished. If your organization requires extensive customization,
this could be a problem. Maybe you should select internal program.
Employees provider of direct access to the systems that were in them. One way to
reduce this level of data protection software. You may need to encrypt your data.
Providers SaaS
Providers SaaSThere are many. Here we examine some of them.
Outlook.com
Web-based email is one of the proposals SaaSit is famous. Web-based email providers for a
long time many have suggested. More deals offer free and paid services.Outlook.com Figure
3-3 shows an email client Microsoft's successor Hotmail And Live MailIs. An
emailOutlook.comDefault is free. But if you need the advanced features that include
advertising, you have to upgrade your email account. This by selecting the icongear In the
Google drive
Google drive In the figure) 1-3 (shown, giving you online access to see and create
You can type a document built-inUse or add a new type. To add new document
types,Creat Choose (left) and Connect More AppsChoose. This pageConnect Apps
Salesforce.com
workflows with software to help manage activity and customer information. These
activities may be related to the sale), such as the use of customer information to create a
guide to the future (marketing) such as sales data to develop sales strategy (or
web page and call center30 Go) in the figure)E3-0 is shown. This page contains functions for
managing customer requests, such as recording customer calls, to make the case for support
personnel and search for solutions. This web page includes a number of fever. Shape )E3-0
(fever shows that this support representative to track and manage customer complaints helps.
Visible web page allows us to search for a specific item catalog, or search for one that recently
happened, generate reports, such as total number of cases and more efficient. toolsMass
EmailAllows us to send an email to the email ID that is relevant to the case. The default fields
incentives one can click onCreate New barBe seen to the left of the web page. The bay opens a
41
Call Center Web page
93 The Basics of Cloud Computing
The other tabs are on the page includes interesting functions to manage calls from
employees to customers efficiently. For example, feverSolutionAccess to the
database which contains current solutions for customer Msalhhay is high. The
database is searchable, and allows employees to quickly resolve customer
Msalhhay. The full list of tabs by clicking on the icon"+"To find out more. The
administrator can view the tabs on each page. Web marketing and sales, including
sales and marketing functions efficiently. And such as are call center. In addition,
pagesCommunity And Salesforce Chatter WebTake messaging, forums and other
types of cooperation between the member. We can see that the general business
application program interface is designed for use in a business and thus can be
Sfarshysazay.
Fever Add App Exchange App )Shape )E3-3 enables users to develop
Allows users to create new applications and download them free and purchase
through AppExchangeSuggests. Access the tabs can be controlled by the
administrator. Properties
Cloud Computing
Basics 95
contains fields for assigning work to an organization, set deadlines and so on. We do not
automatically from the web. To create automatic self-service from a web page,
help customer support representatives is carried out. For example, cases can be
developed to automatically extract fields from the mail client. Also features for software
support, teams consisting of employees with different roles, create a dynasty. Details of
link:https://na2.salesforce.com/help/doc/user_ed.jsp?loc=help
Customization Salesforce.com
96 The Basics of Cloud Computing
This feature is very important for multi-tenant support programSaaSIs. Khalshay detail
possible to add specific fields to the catalog. For example, businesses can add fields to a
certain stagnation in Fig.(E3-0)It has been shown that these data to track business is
unique. Fields such as product field, throughpicklistElected, can be the product code.
assignment
98 The Basics of Cloud Computing
0.0 Email alert) that under certain conditions it sends e-mail alerts (
0.0 Updated fields) is, for example, when the contact has expired (
Details
https://login.salesforce.com/help/doc/en/creating_workflow_rules.htm
Is visible.
Finally, administrators and users can customize the application's user interface. This
includes items such as the placement of text and graphics content, name and
number of tabs on each page, and the page layout. The administrator can also allow
employees to customize their personal visions Bdhd.jzyyat more abouthttps: //
na2.salesforce.com / help / doc / user_ed.jsp? loc = help Is. A programSaaS Another
performance like Salesforce.com Is Suger CRMWhich is open source. Comparing
these two software article
http://www.salesforce.com/ap/form/sem/why_salesforce:ondemand.jsp?d
= 11021111111EN0GandDCMP = KNC-Googleandkeyword =
sugar01%CRMandadused = 0213230012andgclid =
CNfqoLK0uaQCFc2R1wod_R2TbQ Is placed.
Platform as a Service
PaaSService whereby customers to use the platform for their computing needs. In most cases,
this platform is used for development. Depending on the provider, the development platform
Specification PaaS
Implementations PaaS Organizations to create and deploy web applications without
integration and test renders. Here we have some of these features in the
some apps and services will also be implemented on the platform. Public providers
control over how the service or the quality of the program or not. In many development
Customization
With PaaS, You will have full control over apps, so you can customize them. The
development platform you may not be able to create a lot of changes. In most
cases, this platform is strictly controlled by the provider. Perhaps there are other
analysis
Since you, the customer, will create programs, you have the ability to see how
plans and determine trends. You will be able to see the elements which are the
most frequently used and which are not, you will be. In the environmentPaaSYou
also have access to the platform. You will be able to determine when a new
system is added to handle the load. Most providers allow you to rotate the new
systems when the current system to the brink of their time has come.
Integration
In the environment PaaS, A provider of data stored on the site, but the client has direct
access to it. Business Intelligence and Reporting Administration should issue from the
perspective of the access point because you may have high levels of data between its
internal environment and the move deals. Therefore raises concern as to efficiency and
Responsibilities PaaS
On offer PaaS, Somewhat responsibilities between the service provider and the customer
distribution) form.) 3.2 deals in platform development and take into consideration everything
development platform. You're responsible for the installation and maintenance of additional
applications that need. This includes Vslhkrdn program and control program. Platform
database may be provided to you, but you are responsible for data
Cloud Computing
Basics 121
Drivers PaaS
There are many drivers of market growth PaaSHave been affected. Many
organizations want to go to the public cloud model, but not the
serviceSaaSGeneral proposed that the program needed to find them.
ModelPaaS Allowing them to move out of the data center infrastructure
and platforms that allow them to develop while the internal is needed.
challenges PaaS
Challenges in environment PaaS There is a public, including
flexibility and security issues.
Flexibility Challenges
You may find difficulties in platform provider that you need to have Bashyd.byshtr
special configuration or special configuration, you are able to find a provider that will
Security challenges
Pltfm management control deals on the operating system and the database. As a
provider of direct access to the system, they have direct access to all applications and
data.
Providers PaaS
A number of providers PaaSThe market will continue to grow. First we look
at the
windows Azure There.
windows Azure
windows Azure Figure 3-01 shown, the first proposalsPaaS On the market.
windows Azure Offers free of charge upgrade that features such as SLAOffers
increased. windows Azure Turning a website or development platform is very
simple. windows Azure Including extensive options such as computing services,
data services, services app And service network.
Cloud Computing
Basics 124
same infrastructure as Google Docs, Google Maps, And Google's other popular services.
AsMicrodoft Azure Platform to build applications .Net Provides the engine of development
and hosting applications written with Java, Python, And other new languages30Makes
sure. The platform also supports Java Virtual Machine implementation time as well as
other languages, such asJruby)Rhino( JavaScript And .ScalaThe engine can run hosted
app and extensible memory, just like Google products. The distributed storage platform
to establish replication and load balancing client requests. It can be easily developed
using the YkparchhsazyshdhyEclipseOccur. This section examines the platform simple to
42
http://golang.org/doc/go_tutorial.html.
123 Cloud Computing Fundamentals
Beginning
Step-by-step instructions for using the Google engine App Is described here,
that these processes on the basis of this book are available.32 First, the
developer will register that use GmailIs performed. ShapeE3-2 shows the
first screening when the application is configured.
Engine Google AppThe newly developed program that allows the developer to be
served to their domain. For example, if the developermyapp As a program is
selected, the program http://myapp.appspot.com to serve The URL can be taken either
publicly or selectively with small groups of members to be shared. Any developer can
program 01 to provide free hosting with 211MB memory definition. The developer must
face to memory and bandwidth sources used by the program beyond the limits of the grant.
Simple dashboard that shows metrics for each program can be seen on the portal, a screen of
the .E3-1
be installed. SDK A plug Eclipse A) a)E3-1 which includes the creation, testing
43
http://code.google.com/appengine/.
Cloud Computing
Basics 125
As a project to create a web application, right-click the project name Google Select
IDEnter a valid plan for the project. After developing the program, we need an ID
Such as the creation of the program, right click on the project name and select
Deploy to App Engine To choose from, and the engine App Upload and deployment
increases.
Another interesting option in the application configuration, the option of creating a Google Web
Toolkit)GWT( Is.GWT Generally allows you to create interactive programs with the possibility
drag And dropPuts a graphical interface to create new custom. The tool then automatically
optionUI To JavaScript AJAX Convert to access logic servant33The server is called. Note that
JavaScript runs inside a browser andAJAXGhyrblvk out a way to provide access to the
The developer can also option Generate GWT Sample Code During the development
of the program that is to create projects Czech welcome) Figure)E3-2. If this option
is not checked, we can codeservlet Write it on your Java engine AppPut. Therefore,
44
backend
128 Cloud Computing Fundamentals
SDKAlong with a local web server for testing deployment. The local Web
server runtime environment safesandbox Engine AppWith limited access to
basic simulation of the operating system. For example, the program can
only useHTTPIs available on a particular port. It can not write to the file
system and can only read files that have been uploaded with the application
code. Another limitationsandbox Program, when accessing the HTTPShould
be sent response code 21. These restrictions essentially to avoid
interference with other applications is a program.
Infrastructure as a Service
IaaSCore services such as computing power, storage, networking and operating systems
provide. Then you can create your own environment at the top of the sources) form.) 00-
3 providerIaaSHardware resources, such as servers as well as for you. These servers are
in a data center provider, but you have direct access to them. Then you can install
anything you want on that server. The high cost is because the provider is not able to
A common model for the presenter IaaSThis is beyond your virtual machine and
provide you anything you feel you can install on the virtual machine. These virtual
machines canWindows, Linux, And other operating systems to run. Because
physical hardware hosting many customers. They can greatly increase their
responsibilities
The establishment IaaSThe customer is responsible for the environment) shape.)
3.00 provider responsible for the hypervisor and below it. This includes physical
hardware, storage, and network. Is stored in the data center physical hardware
provider. But the customer has full access to it.
Drivers
Many organizations IaaSTo expand their capacity. Instead of spending a lot for the
development of the data center and creating a new data center, organizations that rent
require increased capacity. For this reason, they do not want to pay for expensive
permanent solutions.
Challenges
Challenges in IaaSThere is. Many organizations see the benefits, but they are
worried about losing control. The total cost could be a problem. In many
environmentsIaaS, You cost effective use of resources, such as CPU and memory to
you.
Security challenges
Security challenges for environment IaaSThe service provider is like other challenges.
However, since the provider does not have access to the actual operating system) at a
higher level (for they do not need to have a managed account on the system. This
Providers IaaS
Providers IaaSGrowing position in the market and their impact is
increasing. In addition to the demand platformsIaaS As CloudStack
And OpenStackTo create automation and systems have been
developed. Here are two providersIaaS We cover famous, Amazon
EC0.Rackspace
service. Of course, for an offer efficient computing as a service, the possibility of connecting
the tank
45
Amazon Elastic Compute Cloud
110 Cloud Computing Fundamentals
The computing service there) so that results can be stable (. Network virtual is also
needed so as to communicate with the sample computing there. All this together
infrastructure as a service creates. Cloud computing reactionary Amazon, which is
one of the recommendations is known in computing as a service, a simple example
that shows how the proposal StaaSAmazon to create portals that customers can
share their books to be used. Finally, we have an example that illustrates advanced
featuresEC0.
be focused on computing, and other programs focused on the tank. Apps particular
computational clusters need to run efficiently. Networking needs may also be high.
The variety of computing hardware, along with maintenance and ability to manage
scale,EC0 has a unique platform.
Shape E3.2 represents the dashboard consoleECIs 0,That can be used to create a template,
check the user samples, and even terminate a sample to be used. Click onLaunch Instance
Screen user is shown in Fig. E3-01's, where a set of operating system images supported) or
an Amazon Machine ImagesAMIs Called (for selection is shown. When an image is selected,
the wizard sample EC0 to help set up more options to the user, for example, appears, like the
version of the kernelOSSpecifically for use. Then the user should have at least a pair of keys -
a cause for secure connection to the sample to generate a key pair and follow the instructions
to save the file. The key user can also occur when the user is abundant evidence
113 Cloud Computing Fundamentals
enabled. Advanced firewall rules can be applied. The last screening before the launch of
the sample shown in Fig.E3-Is 00. Set up Sample NameDNSPublic that the user can use
to log in automatically if the cloud server and client machines in a network. For example,
to start using Linux client, the user of the directory where the file is stored on the key will
enter the following command. After several confirmation page, the user enters the car to
use Linux commands. For root access, users must commandSudo use.
line command line tools in the cloud computing reference reactionary Amazon32 Is.
Download Tool
Setting environment variables) for example, location)JRE
46
Command-Line
47
http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/
48
http://docs.amazonwebservices.com/AWSEC2/latest/CommandLineReference/
116 Cloud Computing Fundamentals
For Linux:
service can be validated during each iteration. To do this, you need to download
RatingsX.212 and a private key that requestsHTTP Amazon is for validation. X.212
can click on the linkAccount In Fig. E3.2 has been shown to be downloaded, then
Linux / Unix And Windows C: \ ec0, without changing their names. Run the following
commands to set the environment should be given commands Linux and Windows.
Heref0.pem Credit file downloaded from EC0.
Cloud Computing Basics 117
Setting Range: It is the next step, which means the command areaEC0
interacts with, the setting-a place where virtual machinesEC0 must be created.
In summary, each area represents a data centerAWS , And pricing
AWSAccording to a different area. Orderec0-describe-regions Can be ordered at
this point for installation test tool EC0 and list used to access areas. By default
contracted areaUS-East That us-east-1, withURL Service end point http: // ec0.us-
east-0.amazonaws.com But it can be set to any end point That the use of The
following command will do that ENDPOINT_URL domain name is used for us-
east-1 it has been shown.
The next section explains how developers can APIOf EC0S2 To set up a web portal
established to implement simple looked like PortalPustakUse. It is important that we
understand more about the source of what is consumed and the parameters that have
been set for each source, they are described in the next section.
samplesEC0 say, the combined computing power and resources like memory. Examples
Calculate section
118 Cloud Computing Fundamentals
)CU( EC0 is a standardized scale computing power so that the bytes are
standardized scale tank. AEC0 CU Computing power of 0.1-0.0 GHz Processor
Opteron Or CPU XeonProvides. Therefore, if the developer a computational resource
0EC0 CU Is the question, and the source of the CPU 0.3 GHz Placed them 21% of
the CPUTake. This measure allows application developers to standard values
soCPURegardless of the physical hardware. samplesEC0 Amazon for more apps
that belong to the standard samples. Standard samples of properties in tableE3.0
shown,"A variety of standard samples. " EC0 developer can propose a
computational resource) of one of the types of samples by, for example small
calculations, the attributes shown (. Fig.E3.01 shows how we can do with the
consoleAWS let's do.
application software is that Amazon machine images32 are. AMI Required when
sample request EC 0 must be specified. AMIThat a sample EC0 runsAMI root )root
AMI(Called. Operating inAMIIncluding parts of Linux, including Linux Enterprise Red
Hat And SuSE, Windows Server, and SolarisIs. Available software includes
databases such asIBM DB0OracleAnd Windows SQLServer. Applications such
asHadoop, Apache, Ruby on Rails Are also available.
There are two ways for using software that AMIThere are not. Can be aAMIStandard
request and then install the required software. thisAMI Can be a AMIAvailable on
Amazon saved. Another way to insert an imageVmware As a AMI Using the command
ec0-import-instance And ec0-import-disk-imageIs. For more details you
canhttp://aws.amazon.com/ec0/ Faqs / See.
balances the load among multiple servers. The default load balancing policy is such that
independent throughout the requests. Load balancing can also increase or decrease the
number of servers, which depending on the load. It is also used as a policy failure, because
49
Amazon Machine Images (AMIs)
102 Cloud Computing Fundamentals
Elastic load balancing is discovered. If left on the server load is high, elastic
load balancer can set up a new server instance.
Note: storage EC0
وTank used. Using filesS2, such as access to the serverHTTPIs. However, most
programs do multiple disks Mydd input and output, and for efficiency or other
reasons, we should have control over the configuration repository. In this section we
describe how the resources can think physical disks to the serverEC0 configuration
are we) called bulk storage resources (. There are two types of bulk storage: service
resiliency and bulk tank samples.
partitioning default associated with each sample reservoirEC0 standard for the type of
show. The short-term sample storage21 As long as the sample-the EC0 There also exist
and can eachEC0 Ayndksshvd. In addition, if the sampleEC0 end, the sample reservoir to
a halt
50
ephemeral
Cloud Computing
Basics 101
needed. For networking between samplesEC0EC0 offers public and private addresses. It
reasonable, we can create subnets, and it's creating firewall rules show itself. An
sample, this feature can be used to support server failure. And advanced features that
are used to adjust how the network will be listed in the next section.
ports through which any machine that may be available orIPAddresses that can restrict
access to the server. This can for exampleEC0 using security groups used, briefly
mentioned previously. Each security group is a set of network security policies. Different
security groups must be created for a variety of different servers, for example, Web
server security groups can determine who is open port 21 for incoming connections. The
default security group, in setting an exampleECThe samples can connect any address IP
Virtual private cloud: Companies who require more control over the configuration
of your network, they can use a virtual private cloud. Examples of advanced
networking features byVPCWhat is proposed is as follows:
The ability to assign addresses IP Public and private samples from
each address range
103 Cloud Computing Fundamentals
The ability to divide and control the routing between the network and
subnet addresses
The ability to connect to the network EC0 with an intranet using the
tunnelVPN
the details VPCBeyond the scope of this book can be found in the
Amazon Virtual Private Cloud20 find.
A simple example:EC0 Set up a web server
All the terms and concepts described in the previous section we discussed
and give a simple example of creating a web server. Supported by the web
server as an exampleEBS Consequently, the tank periodically to avoid the
necessity of having Bkapgyry in S2. The process is divided into four steps:
0.0 Selection AMI For example
0.0 Instantiate EC0 and install a web server
2. Creating volume EBS For data, such as files HTML Etc
3. Set up networking and access rules
It is assumed that the required data to the web server) files HTML, Scripts
etc. (available to EC0 uploaded. In addition to showing how the software
can be customized to aAMI Standard installed, it is assumed that the web
server should also be required EC0 upload and install.
Selection :AMI Instructions for setting an exampleEC0 Using the ConsoleAWS
Previously described. The user may invoke that stage here. This phase is
described in more detail later for advanced performance.
Use the menus to select the images Amazon and the Amazon Linux Linux provides a list
of images that have been released by Amazon, which in Fig. E3-02 is shown. Here
column indicates that the device is root, root for the imageEBSOr not. Some important
parametersAMIThe description tag is the bottom half of the form. You can see an image
of a 13-bit Amazon Linux image is rooted device/ Dev / sda0EBSIs. Valuetrue Field
51
Amazon Virtual Private Cloud, http://aws.amazon.com/vpc/
Cloud Computing
Basics 105
not installed (security group created a security group is empty, which allows access to the
network input thereto. Similarly, the security team to the possibility HTTP Change appears.
106 Cloud Computing Fundamentals
The key pair of consoles EC0 click on the linkKey Pair Consequently, it
is according to the instructions, and file downloads) in this example,
f0.pem Called. (The following script shows how an environment variable
that EC0-PRIVATE-KEY Torque is set up so that for example EC0 is the
default key pair. For Linux:
For Windows
name DNS For example, recently created from the console AWSAvailable.
Orderec0-describe-instances Can catch up DNS Basic sample is used. Ssh,
PuTTYOr desktop connections remote control can be used to enter the
sample or download software that must be installed are used. After installing
additional software, the image can beEBS As a AMI Using the command ec
0-create-instanceBe saved. ParameterinstanceId Example ID For example,
EC0, and this recipeAMI ID To EBS AMIReturns the newly created. These
steps are shown in the following script: For Linux
$ Ec0din
$ Ssh -if0.pem instance-id
$ Ec0-create-instance -n "Web Server AMI" instanceId
For Vyndrvz
C: \> ec0-describe-instances
C: \ putty
C: \> ec0-create-instance -n "Web Server AMI"instanceId.
form.)E3-02 by clicking the buttonAttach Volume As well as the device name can also be
obtained xvdf( Toxvdp For Windows, / Dev / sdf to / dev / sdp For Linux (. After selecting
108 Cloud Computing Fundamentals
Enable access to the Web server: Since the web server is ready for operation,
external access to it can now be activated. Click on the linkSecurity Groups In the
left pane of the console EC0 a list of all available security groups has been
achieved. ShapeE3-01 shows security groups available, including the newly created
groups and two groups is the default web server. Click on the tabInboundCan not
import rules that specify the type of traffic is active. ShapeE3-01 shows how the new
rules that allow traffic on port 21 provides the addresses of all the add) that
addressIP Zero is specified (. An address IP Can be used to activate a specified
address IPSet to be determined. By clicking the buttonAdd RuleThe new law added.
After all rules are added, by clicking the buttonApply Rule ChangesNew rules are
enabled. This simple web server deployment onEC0EBS Is complete.
142 Cloud Computing Fundamentals
users to create their needs. These services will lead to a new model in addition to
the traditional models. Although the number of models is another service, we are
here we only cover two models: the database as a service and desktop as a service.
Database as a Service)DbaaS(
DbaaSOrganizations to create the database platform to store their data is used. Many
develop platform; they just need a place to store data. In these cases, the optionsDbaaSIs
the perfect choice. Although storage costs have decreased, but the cost is still high. An
implementationDbaaS Platform and repository database, you need to provide a lower cost
Desktop as a Service
DaaSOne of the models of the new service. Generally,DaaSTo provide users a
virtual desktop that can be used for desktop computing. Companies are trying to
discover the best way to provide this type of service, and that the features and
Dakyvmnthayy data about processes, programs and gather your views. It is also possible to
Consul AWS
RESTful API Amazon
SDKFor Ruby And other languages
In addition, since S2 is a storage service, browsersSThere are two different
accounts that enable users to AktzafS2 of them even if the directory is also off.
There are also a number of possibilities for entering commands can also be
used batch scripts at the end of this section will be described.
Starting with:S2 Let's start first with a simple person. Suppose that a user
directory full of personal photos, and wants them in the cloud as a storage
backup. Here's how the cloud will be available at:
Cloud Computing
Basics 144
2. Images and other files are safe on S2 backup and to share withURL Are
available, if the correct permissions are provided.
From the developer perspective, this can be planned for when the
need to add this function to the program, to be carried out.
is based on object names. ObjectsS2 graphics are repeated over several places that this
flexible them against several failure. If versioning is enabled objects, remove and recover from
unwanted changes is possible. objectsS2 can be up to 2TB in size and there is no limit on the
number of objects that can be stored. All objectsS2 must be stored in a bucket. Grab a way to
وSeparate them from other objects. Grab it could be 011 per account and an infinite
number of objects in each bucket. Each object has a key, which could be a path to
the source object in aHTTP URLto be used. For example, if the name of the
bucketjohndoe And the object key resume.doc , Then HTTP URL It http: //
resume.doc keys separated by a slash To create a naming scheme such as directory search
/ file0.c and S2 are not a hierarchical file system. Means that the namespace 20Grab shared
the creation of a bucket with a name that is now used) by user-S2 other (not possible. Note
that entering the URL prior to a searcher as expected will not work, not only the amount of
operational but also if the actual values for the key and bucket been replaced are the result of
error "" HTTP 312 Forbidden. the lack of parameters to identify the URL the objects S2
default are private, and the request must be parameters to authenticate and identify its prove
that the applicant has the right of access to the object or the object permissions for General
de Farina. Generally, library, client, SDK, or program access key AWS and security key
AWS to calculate the signature Drkhvastdhndh identified, or the signature request S2 adds,
are used. For example, S2 Getting Started Guide in the bucket awsdocs the key S2 / latest /
gsg.pdf available.
52
namespace
53
anonymous
Cloud Computing
Basics 145
management :S2In any company, along with policies that place the Drdstrsyshan
data and who can access them and who can not be determined. Security and
compliance with local regulations, it is necessary to audit the activity log can be
enabled and disabled a user's activity to be unintentional.S2 possibilities for all these
cases, provides as follows:
Security: There are two ways users can data securityS2 to ensure. First,S2 provides
control access to objects. Users can set permissions that grant others access to objects
they see. The management consoleAWSIt can be done. Activities menu by right-clicking
on an object provides object) form.)E3-01 grant anonymous read access to the object it
can be read by anyone. For example, this is useful in dynamic content on the Web site.
This optionMake PublicIs performed on the object menu. We can also read and write
access to specific accounts is limited. For this optionPropertiesChoose and then you get
another menu that allows the user to enter a user's email Ydyhay is that they provide
access. It also is possible that grant others the same way we do things in their Bucket. A
common use for this action with the client in such a way that they can determine
Dakyvmnthayy for reform, which they later are written in a different bucket that client
authorizations to remove the document is modified.
Another method is to audit records23 Be collected. S2 allows users to turn on the entry
for a bucket provided, which in this case is stored in clear access for bucket in a different
bucket. This allows the user to see which accountAWS The objects have been achieved,
Data Protection: S2 Double feature to prevent data loss in the offer. by defaultS2
54
audit log
Cloud Computing
Basics 147
Versioning56
If a bucket versioning is available, S2 automatic history of all objects in a
bucket then stores. The object can be restored to the previous version, and
even deletions can be returned again. This ensures that data is never lost
accidentally go.
Areas: For efficiency, regulatory and other reasons, it is preferable that the dataS2
in certain geographic locations run. These can be selected in the bucket through the
area where the bucket is stored during creation, be done. Area corresponding to a
large geographical area, such as America or Europe. The current list of areas on the
websiteS2.21
Large objects and multi-part uploads: Object size limits forS2 of 2 terabytes, which is
more than the amount required to save the movie 0121p HDNon-pressed. If this amount
56
Versioning
57
http://aws.amazon.com/s3
Cloud Computing
Basics 149
Not enough, the object can be stored in small pieces and using the data in the
management program. Although AmazonS2 is a high density of available bandwidth,
but takes time to upload large objects. In addition, if the upload fails, the entire
object must be uploaded again. Multipart upload solves both of these problems.S2
providerAPIThis parallelism to speed uploads can reach the maximum. If part of the
upload fails, only that part should be repeated.S2 01111 section for each object
support.
DB Amazon's Simple: UnlikeS2 Amazon, which is file-level operations,DBA
simple interface which provides simple data repository for key-value
container.SDB )SimpleDB(Capability to store and retrieve a set of properties
is based on a key. Use key-value container relational databases is another
way of applications based onSQLUses. This kind of data repositoryNoSQLIs.
The next section a brief review ofSDB Provides.
Organize and access data: Data onSDB Divided into areas. Each item in a field during the
creation of a unique key that must be provided. Each item can have 021 feature, which pairs
are value-name. Based on the relational model, the primary key for each row and column
names translated to the item name and column names and name-value pairs value for the row
to be translated. For example, if an employee is required to store information that enables you
to store employee by a proper key characteristics shown there as well, such asIDEmployee.
Unlike a relational database management system, features inSDB Can have multiple values,
for example the retailer if a database product list keywords For each item in the product catalog
can be a single value that is stored features corresponding to those keywords, doing so with
RDBMS Is much more complex. SDB Provides a similar languages SQL It is, however, ways to
fetch22There is also an item. Requests from the fact thatSDB Automatically shows all features
are used.
:58 Fetch
132 Cloud Computing Fundamentals
Access SDB And management: SDB Features that, for increasing the
availability and reliability. Data stored inSDBAutomatically stored in different
locations to access high. It also automatically adds computing resources to
the application rate and automatically shows all fields in a dataset for
efficient access.SDB Is unique in that dataset fields can be added when
demand is high.
database in the cloud, especially a sampleMySQLIn the cloud. ExampleRDS Can use the tab
RDS The management console AWS Occur. AWSMany administrative tasks that are
associated with the maintenance of the database for the user does. Database backup in
adjustable intervals, which can Tnavbsh 2 minutes. Data backup can be set for a period of
time can be maintained, which can be up to 2 days. Amazon also Asnpshat provider of
database functionality when needed. All these tasks can be accomplished through a
management consoleAWS
Cloud Computing
Basics 131
Summary
NIST Cloud service has identified three models: SaaS, PaaS, And . IaaS
Model SaaSIs the oldest. Each model has its advantages and disadvantages
service. But you have to select the model to have a lot attentive service.
Whether or not to use a cloud provider, you should always make sure that
you have about the maintenance and management of systems and
applications. The only difference with the cloud model is that there are
certain characteristics that are responsible provider and you should consider
them.
130 Cloud Computing Fundamentals
• This season:
Use clear or not?
Select a model cloud service
Select a cloud deployment model
Introduction
Choosing the right cloud provider is a good scenario for the first time is vital to the
success of the organization. Depending on the provider, when you make your
choice, you may get stuck, because the data transmission to another email provider
is very difficult. If the DepartmentITNot select the correct provider, they threatened
the credibility of the business. One of the disadvantages is that the public cloud
environments, business can directly use the service. They need to dependence on
problem. You can solve some of the technical and operational issues, or you may be trying to
solve problems, how to offer services and new features to your customers. You need to
decide if you need service, you can set yourself. But if you can does not mean you should do
it. Some think that if it is not proposed that the organization is critical or not what the
them regularly, it is best to implement it) is less expensive (. Keep in mind that you pay based
on Astfadhhaytan in the cloud so you use the services on a regular basis is very expensive.
User experience
modelSaaS You have little control over UIYou. Also, you have little opportunity to customize
applications for users. If you intend to implementPaaS Or IaaSUse, you will have full control
over the programs. You can customize your every need for the program
133 Cloud Computing Fundamentals
you have. Other factors such as network bandwidth, have an important role in determining the
user experience.
Security
When talking about public clouds, cloud service models offer various
different security levels. The show is who controls what. There are two
scenarios: first, keep data safe from external threats and potential threats in
the second safe keeping data provider. In the environmentSaaSF provider of
control and full access to all the data, and do little to protect the data there.
But inIaaSDeals with physical access to the data, but there are ways that
they can apply for the protection of data, such as data encryption.
Conformity
Most organizations have compliance regulations that apply to them. Responsibilities for
system compliance regulations canIT And infrastructure ITThe day. Many people use
these rules to adapt to soften up this responsibility. Each cloud service model based on a
degree that will help you comply with the implementing regulations are different. in
responsibility. Your organization may still be responsible in some cases, the provider's
implementing regulations will be provided with a program that develops. Great efforts
responsibility for the customer. But this means that in the modelIaaS The highest
customer confidence in the measures that have been used are consistent.
Cloud Computing
Basics 135
the cloud deployment model. You can make it through hybrid, public, private and select
Grvhyy. Most people believe the hybrid cloud model is a model that will be used in most
organizations. However you have to consider what is best for your organization.
User experience
Different user experiences depending on which cloud deployment model to choose,
suggests. If you choose private cloud, you have full control of the user. And be able to
plan, network and client systems control in many cases. This allows you to regularization
gives everything for the best performance and usability.
But if you choose the public cloud, in many cases you do not have
control over the user experience. Grvhyy or in a group, you control
the user experience depending on your agreement with the other
members of the series.
Security
Security is always a complex matter. Even when you're working with the cloud becomes more
complex.
responsibilities
Different things that you should consider in evaluating different types of deals. Here
Season Tips
Cloud Security Assessment
Czech List for assessing cloud security
Czech metrics lists
Introduction
In this chapter we discuss previous work and will provide the framework for assessing
cloud security. It should be activities that evaluate, certify or validate increase the use of
cloud. The aim of this chapter is organized to equip the reader with a set of tools that can
be used to assess the security of certain public cloud, private, hybrid and Grvhyy is used.
Cloud Security Assessment hybrid cloud management to evaluate two or more samples
using a set of Czech list for each sample well is done. For example, a hybrid of a private
cloud and a public cloud, a private elements by simply using a set of evaluation and
data. Similarly, the owner and operator of a cloud, with responsibility for ensuring that security
measures and standards and procedures are complied shares. We can expect them to come
by and their responsibilities in the requirements document is the official record. Systems that
are run by government agencies must generally with the requirementsNISTOr match the
commitment of cloud security controls Bashnd.matrys the same method used in the
description of the security requirements for cloud implementations. A good starting point when
you need to influence and presence in cloud security measure contains a list of recommended
security controls.
To begin with, there are two features for security controls in cloud implementations.
The first is the existence of control. And the latter's influence and control. In other
words, only the presence of security control is not enough, this control should be
effective. In fact called ahead to this effect control the reliability or accuracy, you can
use this control can be expected. For example, a cloud may be encrypted
connections between the cloud and external users to establish encrypted
connections time- but if we assess the impact of Knymd, to identify the controls fully
designed, implemented and evaluated.
Measuring the effectiveness of security controls and security assessments tend to
do exactly what they are. Security assessments as a guide for planning and
development of the vast amount of security as well as to evaluate whether controls
need to be properly implemented. The evaluations also have the tools to make cloud
services: for example, a cloud provider may decide to use the third person to have a
high level of security assessment. Moreover, if we had to compare two or more
cloud security, we must have a set of criteria for evaluation.
Based on the sensitivity of the data and the expected risk, we must be tolerant phase of basic
requirements where security controls are appropriately identified. If after the evaluation of the
entire decision-making process that led to the identification of controls do it with security
assessment of its impact controls that are implemented together, we have a very good
understanding of whether the cloud service generally good safety against risks be sustained
cloud security, cloud implementation, correct the damage and finish the
guide cloud Vndvrhay cloud to help customers achieve the overall security
Security.
o Advisory for critical areas of focus in cloud computing.
V0.0 was released in December 0112, for an advisory
that a number of areas of cloud computing, however,
these areas including structure, governance, security and
virtualization are traditional.
o Scope: 00 tips to manage identification and access. V0.0 In April
0101 it published a guide that identifies where on the main
management functions have been discussed because they are
associated with cloud computing. This cornerstoneTrusted Cloud
CSA Is.
Audit cloud:22Looking for the tools to measure and compare security cloud services
59
Cloud Audit
Cloud Computing
Basics 154
for a common framework for cloud security product Grvhyy efforts to serve. In other words,
great uncertainty in this area. This indicates that the cloud is hard to applicants who need to
assess the security of their private clouds and Grvhyy as well as for users who need a tool to
Tools
Many tools have been used to test security. These include the following categories.
scanning and NessusAre vulnerable to scan them. In addition, other tools that are powerful
tools that allow a full defense test to identify quality, flexibility
60
Network Mapper
Cloud Computing
Basics 155
Warning
Security testing, penetration testing and testing especially vulnerable,
can easily create a sense of false security. This is for two reasons:
1. Such tests are based on knowledge of the vulnerability to zero and can not be
The vulnerabilities are even very mature systems are also at risk. Again multiple
safety.
In other words, the test target system tests, including tests Nfvz- only at the point of
time and a limited expansion of the test. Systems and configurations tend to change
over time, and new vulnerabilities can appear years after the system was tested and
proved. Security engineers generally agree that such tests are valuable.
An application for Czech list is that the cloud can be used to help assess the security of the
cloud. If a cloud provider such as a check list for reporting framework used cloud security,
future tenants and users can compare the relative safety of different clouds. The Czech public
cloud customer can list a series of questions to questions that are related to the client's
business needs them. Each of the following sections shaped around the needs and controls
related
156 Cloud Computing Fundamentals
Core security
Security policy, organizational requirements or rules defined for security. Security policy
restrictions.
وRequirements that individuals and groups must act under which it defines as the notice of
disposition is used for security management. Due to security measures, they should be
detectable security policy. There are several molasses policy, which includes overall security
policy and policies of an additional restricted areas more checks. Security policies focused on
Such policies are statements of the requirements that are specific areas. These are often
defined as a standard and specific areas such as technical controls or requirements specific
hard cover. A third class guidance documents are less formal and procedural best practices
are more inclined to. They describe or recommendations of exercises that targets the security
policy to support that this is done by describing a framework for implementation processes. In
other words: why expresses a policy statement expresses what is standard, and tips on how
to express. 0-1 checklist covering operational security elements related to policies, standards,
and guidelines are. 1.0 Assessment checklist covers indicators that focus on transparencyCSP
Is.
Cloud Computing
Basics 157
CSPare. Czech List Index for detail 3-1 in the third person expresses
provider.
162 Cloud Computing Fundamentals
Commercial considerations
Several commercial considerations are security considerations we have
with them. Security considerations, including legal issues, business
continuity and supply resources. Evaluation criteria for the consideration
of 2-1 and 1-1 and 1-1 in the Czech list provided.
Cloud Computing
Basics 161
160 Cloud Computing Fundamentals
Business continuity is an issue that the scope is much broader donor complex. In this
context may be interested to learn more on this subject see the following resources:
Break
On 02 February 0100 an online newspaper Zeit reported that an error occurred in the
payment system a cloud provider that accesses a German company email SaaSNalynsh
complicating factor: Many cloud services rely heavily on self-service interfaces. About
radio.d, it has been shown thatCSPSuddenly interrupts radio access. Radio.de can not
seem to manage regionalCSP In Dublin alone, and e-mail CSPFor days they did not fix
the problem. In this case the facts are not clear, therefore,CSPIt is not recognized.
However, if you outsource your critical business functions, make similar situation can
quickly create any moreCSPAgain resolved. This involves doing things before
establishing business relationship with aCSP, Also it is necessary to maintain contact with
the provider, so that you are aware of any changes in contact with are the methods or
Your disaster recovery plan system CSPStored, you do not have a disaster
recovery plan. Resources should ensure that the cloud service is fully funded by
increased customer demand, be done. To do this,CSP Must be a certain size to
deliver successful SLAHave. for exampleCSPIt is possible to add servers or
storage processes have increased demand. Czech List 1-1 lists the evaluation
indicators for resources.
Strong support
Integration and security of a cloud operational integration depending on the
resources that comprise it. Software is a key element for vulnerable and exploited.
Czech List 2-1 to start the evaluation criteria to ensure the software's list.
163 Cloud Computing Fundamentals
This is a powerful technique for improving software security to the developer during the
development process that this power by giving them access to security testing tools is
possible. The best exercise is the development environment of the near final testing, staging
It is the most special aspect of cloud security network implementation. Choices related to
architecture and isolation that have been developed here have far-reaching benefits.
Network choices with physical network and network virtualization capabilities and control
equipment begins and expands. Ayzvlhyazy degree of traffic between different classes of
security requirements in the system and levelsVMCreate problems. Czech List 2-1 lists
Types and degrees of security controls to protect Host VMWhat are required are very broad.
Access management and security for the cloud are critical elements. Czech List 00-1
Evaluation Indicators for management to identify and access lists that are associated with
authentication.
168 Cloud Computing Fundamentals
Cloud Computing
Basics 169
Operational security
Many of the concerns around public cloud in terms of physical security ITThe third person is in
control. With a public cloud, a physical violation of several clients will be affected. Czech
evaluation indices for the physical security of the data center and networking 03-1 lists and
CSPMust complete and current list of all data sources that are used for implementing cloud
hold. A new experience of database management is implemented for storing such information.
Czech List 02-1 lists the criteria for asset management data center.
Effective security is an ongoing process that requires a well-defined processes and roles for
all employees. To be effective, such processes have to anticipate the variety of events.
failures in systems, processes and propose other conditions. Such events and responsibilities
to be recorded. Czech List 01-1 lists the evaluation indices for operational experiences.
170 Cloud Computing Fundamentals
Cloud Computing
Basics 174
Czech List 01-1 in the evaluation criteria listed for incident management.
173 Cloud Computing Fundamentals
well. Certification and Accreditation resulting system is a snapshot in time and change in the
system must be duplicated. These assessments are primarily paper experience that much
effort has been done on them. What is needed is the development of the process itself, and
cloud computing is faced with more automation, because of the nature of the contract
between IT and cloud consumers. First to information security, systems and processes have
been collected in a reservoirC & AThey're more like a database repository is organized as a
traditional formal document. The importance of organizing and gathering information is that
the statements and claims about how to achieve security controls discrete support. Having
cloud, different parts of the infrastructure and use the same controls. Security assessment
should be able to re-use information about this control, and it should be able to re-use
information on the impact of this control. Cloud computing will revolutionize security, and
clearly is to choose a cloud develop and assess security measures and gain security will be in
demand.
Cloud Computing
Basics 175
Summary
Growth in public computing has increased the need for more security. Public
cloud services need to provide cost-effective services and a host of features
that makes it easy to choose, they are. But to meet the requirementsITSo safety
is very important. ThereforeCSPWays to assess products using indicators is
expected. In this chapter, security checklists to guide readers to assess security
in the development LysthayshanCSP Or private cloud data.
tip
Security Assessment interested can join into the following groups:
Cloud Security Alliance10
www.cloudsecurityalliance.org
www.linkedin.com/groups?mostPopular=&gid=0213001
http://groups.google.com/group/cloudsecurityalliance
Endnotes
1. CSA-GRC-Stack-v1.0-README.pdf; www.cloudsecurityalliance.org.
2. Ibid.
3.
Ibid.
61
The Cloud Security Alliance
62
Yerba Shnayar Ynabm
176
Season points:
From architecture to safe and efficient
operations
Activities safe operation
Introduction
Throughout the book, and in many ways we have explained the evolution of cloud computing
models ITIs selected obtained the consequences later. On the one hand we have some
advantages, such as convenient and fast as we develop lower costs. The applicants cloud in
new projectsITFace fewer risks. Using a public cloud, anyone with an idea that needs
Internet connection, a laptop and a credit card you have, you can
infrastructure. On the other hand, the failure to adoption of public cloud services, public cloud
is associated primarily with lower inherent flexibility, coupled with concerns over physical
control of resources is canceled. There is also the factor that all public cloud services to easily
relationship with other business functions not enjoy. In cloud computing service catalog should
that your virtual machine have fast as public clouds. The evolution and self-service nature of
cloud services,ITNeeds to be a business partner. But we should also expect that the growth of
cloud computing and infrastructure changes that are associated with reduced personnelITA.
This is quite normal and the degree Atvmasyvnsazy servicesITShows that obtained by the
Cloud computing and cloud services have defined and evaluated models. We also
discussed the security concerns and most of them with a close examination of the
structure and cloud security were checked. In this chapter we focus on the security
aspect of the operation of a cloud.
The purpose of processing a cloud over cloud services that are safe, efficient, and reliable
regardless of the cost. Reaching this goal may be very difficult, and this package to support
many activities. Leading architecture to implementation and costs, which include costs of
Reactive security measures due to ineffective planning and costly. figure 1-0 indicates the
overall relationship.
Unfortunately, the initial planning and architecture often due to factors hybrids,
are short. Experience shows that investment in planning and operating costs
and protect the structure from the application of unexpected issues that arise
cut. It seems that there are two choices: spend a lot of time planning, or spend
insufficient time for planning and after the crisis and delay.
Hints:
Investment return purposes)ROI(For added security, consider the
following:
Security should reduce the time necessary
180 Cloud Computing Fundamentals
resources when implementing gets older, are. This is a very complex and dynamic
after the clouds online will begin. Planning for safe operations in conjunction with other
aspects of operational planning has been done well. Safe operations not only include areas
63
service desk
Cloud Computing
Basics 184
But security operations often associated with other aspects of operations. Infrastructure
LibraryIT )ITIL(To demonstrate the value proposition in terms of detailed descriptions
experiencesIT The main organization IT In operations encounters with them have been
identified. ITIL In conjunction with the capture and organize all areas of service
management best practices around IT , Development IT, And operations ITIs.
ThereforeITILThat is a good starting point for organizations planning and design phases
of the development of the cloud. The focusITIL The operational and management IT, But
when we're planning to build infrastructure and define processes that will form the
cornerstone of daily operations, it is worthwhile. Security ManagementITILCode for
Support service
Service delivery
Communications and information technology infrastructure
management
Security Management
Commercial aspects
Program management
Asset management program13
Implementation ITIL In a small area
Although parts of its own security, security architecture requires
planning and understanding of other areas. Good security and
precision of a mature security measures that have been merged
with other areas of practice.
64 Software Asset Management
183 Cloud Computing Fundamentals
smoke, humidity and air temperature acquires. These would be additional sensors and high-
resolution cameras are used to seeing lights, visual distance. Reducing the need to reduce the
need for operating personnel to the presence of continuous physical, operational costs
decrease, camera resolution up capital of at least viewed from the data center to support and
recordings from the cameras can if needed as a recording is legal. As the video Tvalnytr be
physical realm is important. The use of authentication systems to define and manage access
to devices and special functions by an efficient way to centralize data access control. The
control logic alone are not restricted to limited access to servers and other cloud infrastructure.
The use of network isolation between different areas of the cloud infrastructure is a long way
to restrict access to the hacker, but isolation also limits the scope for operational personnel. In
fact, the lowest layer of security protection does control, and network isolation mechanism
Security personnel
Not only logical and physical access limited operational personnel, but all the people shall
observe Prnsl policies. Likewise, all personnel policies and procedures must
Cloud Computing
Basics 185
Evaluating continue, especially based on user access rights and privileges. When employees
leave the operation, access should be canceled immediately; doing so effectively requires the
use of centralized management is identified. It should be noted that while security personnel is
essential, internal threats will not stop. What can be done about it? For example, security
administrators should continue its work independently on the expected test results.
Education
Special training for staff ITIt is important for all staff, especially staff Abry- operations support
infrastructure which includes not only employees but also managers and employees are
related to other aspects related operations. Cloud operational staff appropriate training to
ensure that they are adhering to all company policies, including security policies is a must-
have. Despite the large number of virtual servers, multiple servers or indirectly carry the
potential disruption in service cancellation is high.This applies not only when the service is
fully operational, but the initial and ongoing formation also apply. The complexity and scope of
the cloud demands that personnel have the experience than the typical corporate systems
administrator.
Tool
Open source group to various species of cloud computing applications. At first, many
open source projects are hosted in different clouds.Google, AmazonAnd other clouds
Grvhyha active support. Second, many open source projects focused on enabling cloud
computing. These efforts for the development of the software include the following:
Enabling users to create, manage and deploy cloud environments is enabled. Cloud
software activation domain of powerful tools for the field of hybrid clouds, private
elasticity or flexibility or services trade that Amazon EC0 Activate the competition.
Hayprvayzrhayy
Cloud to cloud infrastructure both small and large all the same. This supportive environment is
physically safe. Ibn alone represents a set of issues that should be connected to the Internet,
electricity, and other communication and physical access safe and reliable to be examined.
Physical proximity between the data center and the toolITAlyhhayy have physical access
controls. Similarly, the complex computing and storage infrastructure as well as fixer number
of separate logical layer. Each of these areas of physical and logical obstacle to the
effectiveness of cloud computing, but they and isolation to prevent unauthorized access to
areas that are damaged. This area should be designed not only to protect but also for a fee.
Inefficiencies in the design and operational processes related undermine the cost-
computing and security is very unrealistic. For example, if part of a program to control the
clearly the risk of infrastructure with malware bear it. Since most software used today are
open source are potential installation است امکانپذیر اینترنت از آن مستقیم دانلود با نرمافزار، کنترل بدون
آن امنیت و اعتبار روی موثر. نمیباشد مناسب این میکنیم ایجاد محصولی برای را سیستمی ما که هنگامی در. عملیاتهای
میکنند پشتیبانی را امنیت که هستند پردازشهایی و پروسهها به بسته امنیتی- از پیش حتیEnter the cloud to be
processed.
65
Bootstrapping
188 Cloud Computing Fundamentals
are similar in some ways to fight the fires. Several strategies are possible: we can reduce
flammable elements or center fire not find. Fire prevention is not possible, but if we do
not invest in some type of protection, more time to identify and report fires will spend.
Any computing environment periodically to discover new vulnerabilities. Remove all
vulnerabilities) those that have been discovered (good, but not always logical and
possible.
simplified and be more efficient. For example, one of the periodic activities.
وThe necessary security processes can make them vulnerable scan. After each
scan, the results should be evaluated, including discrete steps, which include the
Figure 0-1 shows the vulnerability scan data is integrated method of management. Note
that the first step in the selection process of scanning parameters that are appropriate for
the environment and aims to scan. گیرد صورت خالص آزمایش محیط برابر در اسکن این اگر، اسکنر
بگیرد نظر در را همهچیز میتواند- نمیباشد تولید محیط آن که زیرا، می که را ارزشمندی اطالعات مخرب تست رو این از
شود برده کار به مشابه تولید محیط در تواند، شدن سخت منظور بهit cut production to prevent previously
disclosed. If the target is scanned, it is reasonable to begin the scan parameters have
already been used. As shown in Figure 0-1, the next step is to start scanning and
collecting scan results. This results not only data but also vulnerable and related results
are a measure of how long it takes to scan. This in itself is useful information. The scan
results are recorded in a database or converting it to analyze the results Akhyrv evaluate
the changes from previous results. This database is simple and otherwise do manually is
very time consuming.
It should be noted that the analysis can be done, can be strongly associated with the
management and security. However, this relationship often becomes mixed methods,
that this is due to the lack of official controls, or ineffective investigations suggested
changes.CMAnd a degree of order in the change control process that includes security
incidents there is demand. For the security engineers involved in the planning, the less
chance there is that such changes have to unwanted security risks. Architects and
engineers can secure steps and processes that can drastically improve operational
security and confidence they identify. In many ways, the operation, security and
integration involved a series of quality that is available. One of the hallmarks of effective
security performance of the economy. Complicated steps and procedures generally are
not optimized, and naturally, they represent a much greater chance for failure and error.
Server infrastructure66
More standard environment for their server infrastructure. For example, by
making Microsoft Windows server, you are faced with a number of options
server with 20 or 13 bits start, and from there you may take one or more of the
internet information server)IIS(File transfer protocol anonymous)FTP(Microsoft
Sylvralyt, Dynamic Host Configuration Protocol)DHCP(Domain name
system)DNS(Install.
66 Server Builds
Cloud Computing
Basics 191
For private cloud, you might want to use the environment set guidelines. For example, a set of
standard operating system structures must be taken into account; they can to ensure that the
user can easily and quickly deploy them to develop and be tested. These hybrid servers as
Server updates
No matter what platform you are running servers, but regular updates for the operating
system and programs will be there. Operational processes to determine how and what
190 Cloud Computing Fundamentals
Time updates on the server do. Depending on the structure of clouds and suppliers, you
may have many servers to patch. However, with a medium ducts, ProgrammingVM Old
VMUpdated better. The operator may consider the applications easier to deploy and
manage individual, especially those who have a certain life. After the end of life, these
virtual servers can be removed and no interaction with the other server program ends.
With programs on and off as needed, internal cloud and external cloud can be created
that works the same way, the overall performance is expected to improve.
Since your cloud-based infrastructure, you have to infer that you have a lot Server for
deployment. Deploy patches require reflection and debate. The overall security of the cloud
must be preserved, but it means all of the patches to be released, is not. For example,
consider Microsoft, the company is waiting for a series of patches per month. The patches by
Microsoft as critical, important, and so ranked; however, because of possible factors, your
company may rank differently in patches. Brvzrsanyhayy the expansion of basic needs 11Are.
Depending on the software that is used virtualization management tools can be used to
using)www.vmware.com( Vmware You can Tools Patch management for patch management
and is a virtual samples based counterparts. If your investment in the internal cloud
infrastructure with a sufficient number of servers for a long time, some types of automation in
business continuity12, A term that refers to a wide range of activities that can be
done continuously. For maintenance services are available, use it. Business
continuity based on standards, guidelines, and processes is estimated that the
possibility of continuing their operations, regardless of the circumstances.
67
rolled out
68
business continuity
Cloud Computing
Basics 194
Disaster recovery is a subset of business continuity and systems ITAnd focuses data.
operational processes connected to other methods, such as continuous backup and data
efficiency reverse recovery systems out of place. Create a backup should be seen as a
continuous insurance. Although the backup data may be stored safely out of place, but
Failures
In early 0221, the Pentagon was classified in a data center, a computer operator
Vzyfhhaysh night at backing up critical system began. Bkapgyry is designed in such a
way that the system must be offline. Backup disc in a drive, then a second will be
installed, and backup program)DSC On Digital Equipment )PDPwill be executed.
whenDSCIs executed, the contents of the source disk or backup target disk will be
copied. Once the process is completed, the original source disk is installed and will be on
the shelves of storage for backup. The disk backup system is rebooted. The aim of this
recognition is that it is leading to a full backup version is acceptable.
Unfortunately, in a situation where the process fails, and the system can be restarted from the
وRecent backup disk receive and install it on another drive and try to launch it. It is also a
failure. Operator is likewise re shelf storage with the new backup. At the same time, shift
supervisors and 01 disk is scattered finds. What has happened is that the original backup
failed because the fall is rare. Disk drive technology has not completely sealed. Breakdown
head scratches
193 Cloud Computing Fundamentals
Will be disk. All these things that Apratvrr has been an error. A non-bootable
disc replacement with a disc, the second disc will he suffer the same
messed up. By moving the head corrupted disk from one drive to another
drive back, he's a bad Paltr introduces the second drive, which is ruining the
drive. Akhyrv put the recovery disk and then one older than that, the
operator ruining all recent backups for the past few days.
A cloud provider should periodically provide services and important functions for the
service that has been created reconsider. Before a new version can be deployed, should
be a test environment. Since an operational cloud for cloud management would require
many separate elements, it will be a long order. Such elements include carrier-class
switches, routers, servers, directory, security infrastructure, are producers and other
can be quite modest. When a new version ready for testing, a test environment are
required. Depending on the nature of the release, the test environment may require
storage. However, the need for dedicated test environments should require considerable
sacrifice percent of revenue from the infrastructure. For a private enterprise cloud, these
issues there. Move a copy of the test to the production of all file errors, scripts and
series.
Cloud Computing
Basics 195
Version Management
Version management for the cloud means ensuring that the correct versions of software,
hardware, configuration files, licenses, and other support processes have been used and they
play their roles properly. Version management goals include effective management of all
phases of the planning version is to develop processes that will be used in planning,
management expects that, together with the customer during planning. Figure 2-1 shows the
steps common version management and represents the basic requirements for configuration
فرآیند در نظم به بسته موفق نسخهی مدیریت، رسمی پروسههای از استفاده، و متعدد بررسیهای و
است پذیرش های دروازه. شکل3-1 است عملیات و نسخه مدیریت بین رابطهی نشاندهندهی نیز،
به میتواند حادثه تحلیل و پاسخ مانند عملیاتی فعالیتهای که باشید داشته توجهChange in the
cloud need help.
Cloud
Cloud Computing
Basics 197
Operating suggests. ACMDB Moreover, it can be used to reflect the current state of
cloud physics element, evaluation, or even management can also enable virtual
physical harm .
many cases, operations and security personnel may not have the expertise to do these things,
in this case should be outsourced to a third party be assigned. If so, it should be ensured that
a third person demonstrable professional skills in this field. Although the majority of cloud
infrastructure to test skills and techniques used are the same, but must specify that testers
penetration test should be aimed not only servers and specific elements. Cloud environment
to enable network elements that must be tested to ensure that security is configured. Switches
and routers can be exploited vulnerabilities have, and if not configured properly, they can
route traffic in a way that is against the need for cloud security. Penetration test
ratings are) critical / high / medium / low (. As a general rule, any vulnerability that a high
degree or life, it must to ensure the security of the entire cloud service will be corrected.
Need to point out that many of the vulnerabilities that are discovered scat or penetration
security requirements for data center management. Run a data center as well as ongoing
monitoring and alerting in case of occurrence of a process is defined. When you grow your
own cloud infrastructure, you need to monitor increases and also increases the complexity of
Video control
Access to inputs12
Water sensors, fire and other environmental sensors
electricity consumption
Use of facilities
These activities are the tasks of data center security staff. You must create processes to
ensure that you have a well-defined ins and video recordings vote so fulfill the security needs
are. This process must be considered when risk assessment is performed, and then all
perceived physical risks should be reduced. Generally, cameras, video recording is now easily
camera-enabled wireless are more common. The way these devices in the Internet involved is
very important. In terms of security and network bandwidth because the video feeds to
consume large amounts of network bandwidth are known. a better approach is to have a
safety net for such outbound traffic as well as to prioritize traffic in the network according to
the needs of the site. cyber control can be divided into three publishing sector:
11
Housekeeping
Monitor threat
Incident response
Housekeeping
Control Housekeeping Including monitoring of all servers to ensure that server-based
patches, antivirus updates, use CPU And RAMEtc. are updated. Here
69
Door access
11Computer operations to get the desired results does not directly help but
Identifying the need to patch systems, all versions and related information can
thatCMDBTo be precise physical and logical environment that reflects the information it
maintains. Do this for the entire cloud discouraged, but must be done for component
have repeated that the audit and sampling. One way to periodically audit the
Threat Control
You control a threat to the structure of hybrid of manual and automatic. At baseline, you must
Hvtds data and alerts from sensorsIDS / IPS, Antivirus records, records of various devices in
your structure and that these are collected in different parts of the season have been
described. With medium to large size data centers, if personnel from manual methods to
collect
وEvaluation of their data, amount of data operations will waste them. Since the amount
of data increases, manual methods require lots of extra heads, or the chance of
increased threats arise. Several automated tools can be used in this context. The tool of
intimidation restrict the system. Basically, this instrument is able to reduce the number of
false positives that occur in raw materials incident. The operator is able to focus on a
smaller number of threats. Moreover, this tool can be designed such that the appropriate
alerts to be sent for example to a group and routing Virus AlertIDSThe other group. The
group can collect data from various sensors and the data in one location are connected.
In the past, control the amount of IT A cloud constituted could include network operations
center10 Be specific and perhaps a security operations center. 10 But today this can be largely
virtual and secure web-based console using a security team to the feasibility of the whole
world
71
network operations center (NOC)
72
security operations center (SOC)
022 Cloud Computing Fundamentals
For complete coverage of the 1.03 to be done. NOC And SOC Do Mqva
Incident response73
Control and explore a potential threat is just the start. After confirming
that this is not a false positive, you have an incident response plan
design. They are made out of different types Lyblgzary high, medium,
low, main / sub, etc. and must be considered for each right answer.
At the lowest level, events, operations staff can be addressed as part of the daily
activities and generally does not need to intensify. This should ensure that no overall
pattern does not exist and ensure that any work track) such as installing patches Matters
(done, must be tracked. Next level incident is when some servers are affected which, like
failure in the power supply on the radio or network failure for a segment of your network.
However, staff operations failed to meet the will, but it is likely that some forms of
communication need to send out Jose employees have.
The main events are at the highest level that a large percentage of users affected, such
events includes an agreement that otherwise affect your credit. Again, in this case
planning is the key to success. Answers often include a greater range of people than just
73
Incident Response
74
Information Security Forum
Cloud Computing
Basics 021
Flexibility in operation
Regardless of business continuity and governance definition of security is difficult. Where
business continuity
وWorking to overcome any major interruption of service) and its consequences (driven
objectives of their organization. To begin with, most systems are really able to withstand
even the failures are trivial to solve without some interruption of service. As reported by
a core competency for operational risk management - are risks of everyday operations.
industries, such as finance Bankdaryv, it is not only a necessary business function but
operational risks, they directly affect operational flexibility. One of the goals of flexibility
inITReduce the impact of failure and disaster. Disaster risk reduction is a fundamental
Summary
Depending on how the cloud model) private, public, and hybrid Grvhyy (and depending on
how the delivery of cloud-based services IaaS(,PaaS, And )SaaS, Cloud computing creates
different opportunities for change. As a new model forIT, Cloud computing benefits of the
various competitors in the same industry, vendors and cloud providers, and consumers
وCommon used. The method by which the cloud's benefits package on how to assess
information and communication resources available and how to deal with the transition to
the computing model. We can use this event to see, and its success depends on an
organization's ability to understand the opportunities and change mappings changes to
the technologies, products and concepts, and emerging and the cloud as a new model of
IT consider. Although large-scale private clouds can reach local customers many
services for this group, but relatively smaller private clouds. One of the advantagesIT
The cloud model is that once the appropriate infrastructure is, the more physical
hardware IT And other networking activities with the problem will not run.
With cloud computing as a model for IT, Organizations can move away from the traditional
that go beyond the structureITThat they use. There are clear interactions which control
programs and data, and compliance with laws and regulations and even security. More
وThere is also greater redundancy. Hybrid needs for computing power, data storage
and bandwidth continue to demand more powerful systems will continue. High-
requirements, the scale of TB in the fall, and soon reserves virtual storage can
scalepetabyteDestroy. In addition to other benefits, cloud computing models such
tip:
Some Internet resources for information professionals and peer sites that
are involved in it. Although many such sites there are several sites that are
only for cloud computing. Below are some of them have explained:
Google Groups, Google, Internet 211 pound gorilla of the Internet,
rich and a great tool for collaboration between a group of people
with common interests has provided. The biggest problem Google
Group is a large number of groups! In many of these groups are
very important leaders in that area are members.
12
Cloud Security Alliance: It seems that the organization
itself has made changes in accreditation organization.
:LinkedInThe professional networking site with about 011 million members,
References
0. Swanson M., Guttman B. NIST SP 211-03, "Generally Accepted
Principals and Practices for Securin g Information Technology Systems,
"National Institute of Standards and Technology, Technology
Administration; 0221.
0. Ibid.
2. Caralli R., Stevens J., Wallen C., Wilson W. Sustaining Operational
Resiliency: A Process Improvement Approach to Security Management.
CMU Networked Systems Survivability Program;0111.
75
The Cloud Security Alliance