0% found this document useful (0 votes)
133 views

Cloud Computing

This document provides an overview of cloud computing basics. It discusses key concepts like cloud deployment models (private, public, hybrid clouds), cloud service models (Infrastructure as a Service, Platform as a Service, Software as a Service), characteristics of cloud computing (on-demand self-service, network access, resource pooling, rapid elasticity, usage-based pricing), and drivers for cloud adoption like agility, scalability, cost savings, and virtualization. The document is intended to help readers understand cloud computing concepts in theory and practice at a high level.

Uploaded by

Yogesh Gupta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views

Cloud Computing

This document provides an overview of cloud computing basics. It discusses key concepts like cloud deployment models (private, public, hybrid clouds), cloud service models (Infrastructure as a Service, Platform as a Service, Software as a Service), characteristics of cloud computing (on-demand self-service, network access, resource pooling, rapid elasticity, usage-based pricing), and drivers for cloud adoption like agility, scalability, cost savings, and virtualization. The document is intended to help readers understand cloud computing concepts in theory and practice at a high level.

Uploaded by

Yogesh Gupta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 257

Cloud Computing Basics

Author:
A smooth-Ileana Kstrylv

Translator
Mohammadi-e-Taiba
Entry
Title and author name
Pub
Appearance
ISBN
Status cataloging
note
note
Issue
Issue
Issue
Issue
Added entry
Congress Classification
Dewey Decimal Classification
National Bibliography Number

Titles Cloud computing basics


Author: In a fluid-Ileana Kstrylv

Tran Mohammadi-e-Taiba
slato
r
Published
Circula 0111 Edition
tion
Publisher
Price
Cloud Computing Basics

Understand the basic concepts of cloud computing in theory and


practice
Cloud Computing Basics 5 

Index
Chapters partnership
.....................................................................................
01
Background 01
...................................................................... .............................
...

Chapter 1. Introduction Cloud ....................................02


Background 01
...................................................................... .............................
...

What is the cloud? 01


...................................................................... ..............................
..

Key characteristics of Cloud 00


...................................................................... ..............................
..

On-demand self-service 00
...................................................................... .........................
.......

Wide network access 02


...................................................................... ........................
........

Resource sharing 02
...................................................................... .........................
.......

Elasticity or flexibility Fast 02


...................................................................... ........................
........

Measured service ......................................................... 01


Cloud deployment models
.....................................................................................
01
General 01
...................................................................... ........................
........
Private 01
...................................................................... .........................
.......

Group 01
...................................................................... ........................
........

Hybrid 01
...................................................................... ........................
........

Cloud service models 02


...................................................................... ..............................
..

Infrastructure as a Service 02
...................................................................... ........................
........

Platform as a Service 02.


...................................................................... ........................
........

Software as a Service 02.


...................................................................... ........................
........

Cloud 02 drivers
...................................................................... ..............................
..

System Drivers 02
...................................................................... ..............................
..
 6 Basics of Cloud Computing

Agility 02
....................................................................... ........................
........

Reliability 21
...................................................................... ........................
........

Scalability and flexibility 21


...................................................................... ........................
........

Efficiency 20
...................................................................... ........................
........

Ease of maintenance 20
...................................................................... ........................
........

Security and compliance) compliance (20


...................................................................... ........................
........

Business drivers 22
....................................................................................................
...

Price 22.
....................................................................... ........................
........

Consumerism 22
...................................................................... ........................
........

Surround technology 23
...................................................................... ........................
........

Virtualization 23
...................................................................... ........................
........

Program structure 23
....................................................................... ........................
........

Bandwidth 22
...................................................................... ........................
........
Cloud providers drivers 22
...................................................................... .............................
...

Economies of scale 22
...................................................................... ........................
........

Alternative income ........................................................ 21


Selecting Cloud obstacles: What prevents the people?
.....................................................................................
21
Ambiguity...................................................................... 21
Concerns about the integrity and growth 21
...................................................................... ........................
........

Service is not strong enough 21


...................................................................... ........................
........

SLAS) Service Level Agreement (21


....................................................................... ........................
........

Consolidation 22
...................................................................... ........................
........

22 security.
...................................................................... ........................
........

Property data 22
...................................................................... ........................
........
Cloud Computing Basics 7 

Audit or investigation 22
...................................................................... ........................
........

Issues of privacy, rights and acceptance) match ( ........... 22


Multitenancy 31
...................................................................... .........................
.......

31 security.
...................................................................... ........................
........

Shortages or lack of customization 31


...................................................................... ........................
........

Technology challenges 30
...................................................................... ........................
........

Change horizontal scale .............................................. 30


Company policies 30
...................................................................... .........................
.......

Flexibility 30
...................................................................... ........................
........

Summary 30
...................................................................... ..............................
..

Season . 0 basic concepts .........................................34


Background 32
...................................................................... .............................
...

Authentication 32
...................................................................... ..............................
..

Identification of the approved 33


...................................................................... .........................
.......

Access 32
...................................................................... ........................
........
Advanced authentication methods 32
...................................................................... ..............................
..

Multi-factor authentication ............................................. 31


Risk-based authentication ............................................. 31
Identity providers
.....................................................................................
31
Credit repository 31
...................................................................... .............................
...

IdPPublic 32
...................................................................... ..............................
..

32
............................................................................. OpenI
D
20
.............................................................................. Goog
le
20
.......................................................................... Faceboo
k
 8 principles of cloud computing

Microsoft account 20
...................................................................... ..............................
..

Federated identity or integrated 20


...................................................................... ..............................
..

Microsoft Access control services 20


............................................................................... )AC
S(
Computing concepts 22
...................................................................... ..............................
..

22 public service calculations.


...................................................................... .............................
...

Servers Commodity Or taking 23


...................................................................... ..............................
..

Autonomous computing 23
...................................................................... ........................
........

Service provider applications 22


...................................................................... ........................
........

Hardware virtualization 22
...................................................................... ..............................
..

Hypervisor) or virtual machine monitors (


.....................................................................................
21
Principles hypervisor .................................................... 21
Of the hypervisor 21
...................................................................... ........................
........

Hypervisor 21
..................................................................................
Xen
22
........................................................................... Hype
r -V
22
............................................................................. vSp
here
22
................................................................................K
VM
Web Developer Technologies 22
...................................................................... ..............................
..

11
.............................................................................. HT
ML
11 .................................................................. Adobe
Flash
10
............................................................................... S
OAP
10
............................................................................... R
EST
10.
.................................................................................. J
ava
JavaScript..................................................................... 10
12
.......................................................................... ASP.
NET
Basics of Cloud 9 

13 ................................................................ Ruby on
Rails
12
.............................................................................. JB
OSS
12.
..................................................................................
PHP
11
................................................................................ JS
ON
Summary
.....................................................................................
11
Chapter 4. cloud deployment models ....................... 67
Introduction
......................................................................................
11
Public Clouds
.....................................................................................
12
Advantages
.....................................................................................
12
-0 access or availability ................................................. 12
-0 scalability .................................................................. 12
-2 Accessibility .............................................................. 12
-3 reduce costs 11
...................................................................... ........................
........
Disadvantages 11
...................................................................... ..............................
..

-0 limitations of consolidation 10
...................................................................... ........................
........

-0 flexibility, decreased 10
...................................................................... ........................
........

2. Disability mandatory 10
...................................................................... ........................
........

Responsibilities 10
...................................................................... .............................
...

Security considerations 10
...................................................................... ..............................
..

Data 12
...................................................................... ..............................
..

Acceptance / compliance 12
...................................................................... ..............................
..

Audit 12
...................................................................... ..............................
..

Private clouds 12
...................................................................... ..............................
..

Advantages
.....................................................................................
13
 12 The Basics of Cloud Computing

13 -0 support and troubleshooting.


...................................................................... ........................
........

-0 maintenance 13
...................................................................... ........................
........

-2 Nzartkrdn 12
...................................................................... ........................
........

Disadvantages 12
...................................................................... ..............................
..

-0 Price 12
...................................................................... ........................
........

-0 hardware and software compatibility 12


...................................................................... ........................
........

-2 expertise required ..................................................... 11


responsibilities
.....................................................................................
11
Security considerations
.....................................................................................
11
Compliance / Compliance
.....................................................................................
11
Data 11
...................................................................... ..............................
..

Audit 11
...................................................................... ..............................
..

Clouds 12
...................................................................... ..............................
..
Benefits 12
...................................................................... ..............................
..

-0 Price 12
...................................................................... ........................
........

-0 multitenant 12
...................................................................... ........................
........

Disadvantages 12
...................................................................... ..............................
..

-0 property ....................................................................12
Responsibilities 12
...................................................................... .............................
...

Security considerations 12
...................................................................... ..............................
..

Data 12
...................................................................... ..............................
..

Compliance 12
...................................................................... ..............................
..

Audit 21
...................................................................... ..............................
..

Hybrid clouds 21
...................................................................... ..............................
..
Cloud Computing Basics 11 

Benefits 20
...................................................................... ..............................
..

Disadvantages 20
...................................................................... ..............................
..

-0 Consolidation 20
...................................................................... ........................
........

Security considerations 20
...................................................................... ..............................
..

Data 20
...................................................................... ..............................
..

Audit 20
...................................................................... ..............................
..

Summary 20
...................................................................... ..............................
..

Chapter 3. cloud service models............................... 84


Background 22
...................................................................... .............................
...

Software as a Service 22
...................................................................... ..............................
..

Features 23
................................................................................. Saa
S
Customization 22
...................................................................... ..............................
..

Support and maintenance


.....................................................................................
21
analysis
.....................................................................................
21
Consolidation
.....................................................................................
21
Responsibilities 21
...................................................................... .............................
...

Drivers 22
................................................................................. Saa
S
Challenges 22
................................................................................. Saa
S
Places) positions (of 22
...................................................................... ........................
........

Multitenant 22
...................................................................... ........................
........

22 other security challenges


...................................................................... ..............................
..

Providers 22
................................................................................. Saa
S
22
...................................................................... Outlook.c
om
21.................................................................. Google
drive
 10 Cloud Computing Basics

20
................................................................... Salesforce.
com
Platform as a Service 22
...................................................................... ..............................
..

Features 22
................................................................................. Paa
S
Customization
................................................................................... 0
11
analysis ..................................................................... .
011

Consolidation
................................................................................... 0
11
Responsibilities 011
................................................................................. Pa
aS
010 drivers
................................................................................. Paa
S
010 Challenges
................................................................................. Paa
S
Flexibility Challenges .................................................. 010
Security challenges .................................................... 010
Providers 010
................................................................................. Paa
S
010. ...........................................................windows
Azure
Engine 012 ..................................................... Google
App
Infrastructure as a Service
................................................................................... 0
12
responsibilities
................................................................................... 0
01
Drivers
................................................................................... 0
00
Challenges
................................................................................... 0
00
Security challenges
................................................................................... 0
00
Providers 000
.................................................................................. Ia
aS
Elastic or flexible cloud computing Amazon 000
................................................................................ )E
C0 (
Other service models
................................................................................... 0
21
021 database as a service
............................................................................. )Db
aaS(
Desktop as a Service .................................................. 021
Cloud Computing Basics 14 

Use storage) storage as a service (


................................................................................... 0
21
Amazon's Simple Storage Service 020
................................................................................... )S
2(
Summary ................................................................... .
030

Chapter 5 decision .................................................... 130


Introduction ............................................................... ..
030

Use clear or not?


................................................................................... 0
30
Select a model cloud service
................................................................................... 0
32
User experience.......................................................... 032
Security....................................................................... 033
Conformity .................................................................. 033
Select a cloud deployment model
................................................................................... 0
32
User experience.......................................................... 032
Security....................................................................... 032
responsibilities ............................................................ 032
Select a service provider's public cloud
................................................................................... 0
31
Choose a provider 031 points
................................................................................. S
aaS
Choose a provider 032 points
................................................................................. P
aaS
Tips for choosing provider 032
.................................................................................. I
aaS
Season 6
Assessing cloud security: a framework for
information security .................................................. 139
Introduction ............................................................... ..
032

Cloud Security Assessment


................................................................................... 0
21
Work on the frameworks of cloud security tips
................................................................................... 0
20
Tools
................................................................................... 0
23
 13 Cloud Computing Basics

Czech List for assessing cloud security


................................................................................... 0
23
Core security
................................................................................... 0
21
Commercial considerations
................................................................................... 0
11
Break
................................................................................... 0
10
Strong support
................................................................................... 0
12
Operational security
................................................................................... 0
12
The criteria for checklist
................................................................................... 0
13
Summary ................................................................... .
012

Chapter 7 Operating the cloud ................................. 182


Introduction ............................................................... ..
021

From architecture to safe and effective operations


................................................................................... 0
20
Planning area
................................................................................... 0
20
Security, ongoing costs and physical access
................................................................................... 0
23
Virtual and logical access
................................................................................... 0
23
Education ................................................................... .
022

Cloud security staff categories


................................................................................... 0
22
Tool
................................................................................... 0
21
From the physical to the logical perimeter
................................................................................... 0
21
Independently set up safe operation
................................................................................... 0
21
Efficiency and cost
................................................................................... 0
22
Security operating activities
................................................................................... 0
21
Server infrastructure
................................................................................... 0
21
Server updates
................................................................................... 0
20
Business Continuity, Backup and Recovery
................................................................................... 0
20
Cloud Computing Basics 15 

Failures
................................................................................... 0
22
Management changes in operating environments
................................................................................... 0
23
Version Management
................................................................................... 0
22
Information about infrastructure: Configuration
Management
................................................................................... 0
21
Vulnerability and penetration tests
................................................................................... 0
21
Response and security surveillance
................................................................................... 0
21
022
.................................................................... Housekeepin
g
Threat Control
................................................................................... 0
22
Incident response
................................................................................... 0
11
Best practices
................................................................................... 0
11
Flexibility in operation
................................................................................... 0
10
Summary ................................................................... .
010

References ................................................................. 024


 16 Cloud Computing Basics

Chapters partnership

Chapters 1 and 1 as well as a small selection of previous seasons, in


Securing the Cloud ) Secure cloud (by Vic Winkler Written and Moving
to the Cloud ) Move to the cloud (written by Dinkar Sitaram And Geetha
Manjunath Used with permission.
Cloud Computing
Basics 17 

Introduction

What is expected from this book?


Comprehensive cloud environments are expected to at least part of the landscape of

future IT organization to host. Basics of cloud computing that will help policy questions

that, at the time of review or set up a pilot project or cloud environment're arise, lead.

Cloud just for large companies and those with big budgets are not available, the

alternative technology with cost savings, is now available in the majority. In some cases,

each organization must decide whether or not to use the advantages of cloud.

Consumers regularly decide whether photos, music and data files stored on your local

system or use of cloud providers. So what do you choose? The simple answer is not. It

all depends on your needs and the resources available to you. The purpose of this book

is to help you in making a decision Gahanhtryn possible in a limited time.

The target audience

These tips for people who want to become familiar with cloud computing
technology. Whether you're looking to get general knowledge and what you
need to decide whether to use cloud environment, this book will guide you.

Why is this information useful?

The decision to move to the cloud should not be ignored. In general, for most

departmentsITAnd organizations using cloud environments to a change in the way business

is. You do not want to neglect your decision. It is important that you have the information
 18 Cloud Computing Basics

You can get more before making a decision, not equipped. This
book will help you in obtaining this important information.
The structure of this book

This book contains seven chapters. Beginning with an overview of cloud technologies that

have formed the start. Then about your options when deploying a cloud environment, we're

talking to them. And then we'll guide you in making decisions. After the decision, some of the

considerations that must be created to implement cloud cover you need.

Chapter 0 introduces the basics of cloud concepts and some of the benefits
that it provides a clear assignment describe arise. Some of the issues and
concerns that some organizations move to the cloud when they need to
cover. And also say how the issues and concerns can be mitigated.

Season 0 technologies and concepts that are used in a cloud environment examine

‫ و‬The authentication concepts of computing, virtualization and web


development technologies are described.
In Chapter 2 we introduce different cloud deployment models. Public clouds,
private, and hybrid describe a group. We examine the advantages and
challenges of each model. Then look at the security implications of each model.
Finally, consider what is involved in maintaining any environment. In chapter 3
different models of cloud cover, we initially start with two main service models:

Software as a Service)Saas ( 0, Platform as a service)PaaS( 0And infrastructure

as a service.)IaaS( 2 Then take a look at the newer service models have been
developed recently.

1
Software as a Service
2
Platform as a Service
3
Infrastructure as a Service
Cloud Computing
Basics 19 

In Chapter 2 we're talking about the decision-making centered on the cloud.


First you have to decide to move to the cloud describe what things you have
to consider. Then we talk about choosing a Service model. The next step is
to choose the deployment model. The cases in which the public must be
considered when choosing a cloud services provider we speak.
In Chapter 1, we talk more about cloud security. We are looking for a framework for evaluation

‫ و‬Security fundamental business considerations, we cover operational and security.


When the cloud is created, you must run it. In Chapter 1, we cover the operation of a
cloud environment
‫ و‬As well as access to the environment, operating procedures and processes we have
described. The cost of season

‫ و‬We also cover efficient. We believe that the issues covered in these chapters you

understand not only clear, but also will help you implement cloud. With the cloud,

like most new technologies, the key to ensuring its correct understanding of what

you're dealing with. You have to understand in order to ensure that the cloud is right

for your organization, you need to. We aim to make sure that you have the

necessary understanding.
 02 The Basics of Cloud Computing

Season 0.1 Introducing Cloud

• This Season
 What is the cloud?

 Cloud drivers)Cloud Drivers(

 Barriers to Cloud Adoption: What is the obstacle?

Introduction
The concept of cloud computing can be very confusing. In this chapter,
we provide an overview of cloud and concepts related to the start. Then
some factors that cloud the organization to speak.

What is the cloud?


Much debate about whether there is a cloud. Many people consider the cloud as a
set of technologies. It is true that there are some common technologies often create
a cloud environment, but the technology itself is not clear. Cloud is in fact a service
or set of services. This is partly because the cloud is hard to define. Cloud as a set
composed of services, technologies and activities will be considered. For users of
the Service, it is clear that what is inside is not known. That's why the name is clear.
Providers providers have realized that although some users do not care about what
happens behind the scenes, but most of them focus on the subject. This has caused
more providers to be prepared for what they do. In many cases, customers are also
allowed to configure their systems management solutions.
Cloud Computing
Basics 01 

Figure 0-0 Cloud Conundrum

For more service, which provides cloud services varies over time. To adapt to rapidly changing

customer needs some service. Think What services have you used), especially related services

technology (which over time has not changed. Certainly the number is not high. If you are a

service provider, you, for this to provide customers with value, you need your services change .

certainly does not exclude the cloud. here is that Gyjknndgy. whenever someone for a clear

definition and thinks it is right, re-change services. many thought that when the National Institute

of Standards

‫ و‬Technology )NIST(A formal definition for cloud computing offer, this


definition will be final. But, as we have seen, evenNISTIts definition has
changed over time. Even with the changes, the definitionNISTThe
standard that most people refer to it when talking about the cloud.
Defining CloudNIST Has three main components which we will discuss:
0. Five key characteristics of cloud
0.0 Four cloud deployment models

0.2 Three cloud service


 00 Cloud Computing Basics

Key Features Cloud


Many companies and service providers seeking to benefit from the popularity of cloud. Many

providers are trying to offer services, however, do not. Just because a web-based application,

it does not mean that it's cloudy. Program and service program must display certain

properties, before they can be considered a true cloud implementation. descriptionNISTCloud

is the cloud computing represent the five characteristics: on-demand self-service, broad

network access, resource sharing, flexible or rapid elasticity and measured service. All five

characteristics must be present to ensure that the proposal, the proposal is expected to be

considered correct.

On-demand self-service
And the application process are completed automatically. The advantages for the

provider and customer service as well.

Implement user self-service customers to provide instant access to the services


that they want to see. The cloud is an attractive feature. This enables the
resources you need quickly and easily. With traditional media, often for weeks
or days when they are complete, and will lead to delays in projects and
initiatives. You should not worry in a cloud environment. User self-service to
reduce the burden to the provider.

User self-service also reduces the liability of managers. Free management of day to day

activities on the creation and management of user requests are. The

employeesITOrganizations to focus on another. Self-service implementations can be used

to create hard, but for cloud providers is definitely worth the time and money. User self-

service user portal is implemented mainly through. Khalqanhay portals that can be used to

provide the required performance, but in some instances, a customized portal


Cloud Computing
Basics 04 

Will be required. Lyalhsab, users with an interface model 3Which allows them to put the right

information that are displayed. At the end of this portal APIs with applications,

management)API(Which communicates by apps and services have been published. If within

the systemAPIOr means for automation and simplification does not exist, causing the problem.

When implementing self-service user, you should be aware of the potential

regulatory issues and agreements. Most of compliance programs2 As )SOX(

Sarbanes -OxleyTo avoid this requires controls that the user is able to use specific
services or carry out certain activities without a license, it is. As a result, some
processes can be fully automated. It is important that you find out which processes
can be implemented and can not be automated self-service environment.

Wide network access


Cloud services must be easily accessible. Users need to have basic network

connections for connecting to the service or program. In most cases, the connection will

be used in some types of Internet connection. Although broadband Internet connections

is growing, but they still are relatively slower than LAN connections. Therefore, the

provider must require users to have plenty of bandwidth to use the service.

Connections that are limited in bandwidth leads to the second part of this requirement are:

cloud services should thin clients 1Require. First, download a fat client1It may take a lot of

time, particularly in connection with low bandwidth. Second, if the application client

relationships require high

4
template interface
5
compliance programs
6 :thin client To Computer Or computer program Apply Is to fulfill
duties Computational related to other computers
1 :fat client in model Client model-Srvysdhndh networks PC, client
Say The abilities Has a lot of server or standalone server acts
 03 The Basics of Cloud Computing

Between a client and a service system, users are faced with the
problems of latency on broadband connections.
This brings us to the third part of this requirement: Cloud services should be able to be

accessed by a wide variety of client devices. Laptops and desktops are not the only

devices that are used to connect to the Internet and networks. Users can also via tablets,

smartphones, and a host of other options are also attached. Cloud services are required

to support all devices. If a service requires a client, the provider may be forced to

develop specific applications for the platforms), Windows,MAC, IOSAnd Android (.

Coercion in the development and maintenance of a number of client applications is

costly, so if the solution is structured in such a way that the user does not need to be

very helpful.

Figure 1-0 Wide Access


Cloud Computing
Basics 05 

Resource sharing
Resource sharing helps reduce costs by providing flexibility creates. Essen resource

sharing based on the fact that the client needs to prove to all the resources available to

them. When resources are not used, instead of being unemployed, they can be used by

other customers. The provider allows more than one customer service provider) If any

customer requires dedicated resources have (. Sharing resources using virtualization

obtained. Virtualization to increase system volume to provide that. In a virtualized

resources on the physical system in a tank Mygyrndkh can be used by multiple virtual

systems.

Elasticity or flexibility fast8


Rapid elasticity or flexibility describes the ability of a cloud environment to grow

comfortable in order to satisfy customer requests. Cloud deployments must have the

necessary infrastructure to expand service capacity. If the system is well designed, this

may only require computer resources, hard disk, and like it. They key is that even if

resources are available, as long as they need not be used. The vendor's storage usage

charges) for example power and cooling (.

Most rapid elasticity or flexibility of automation and synchronization is performed. When the

use of resources is to a certain point, a startup 2Activated. This setup will automatically start

processing capacity expansion. When consumption decreased capacity to ensure that these

resources are not wasted, decreased. This feature enables you to manage the

implementation of cloud what they burst capacity required by many of its users. Continuous

Capacity increased capacity is needed for only a short time. For example, an organization

may need to increase the capacity of the processing order at the end of the financial quarter.

In a traditional system, an organization may need to support the volume of data transfer

8
Rapid Elasticity
9
trigger
 06 The Basics of Cloud Computing

Internal capacity. This means that the resources that are always available, but
in a time interval used. In a cloud environment, the organization of the
advantages of public cloud resources used for a short period of time. It does not
always need to be available internal capacity.

Measured service
Cloud services must be able to measure consumption. The consumer can use different

criteria such as bandwidth, time, and measurement data is used. Service attributes measured

by what characteristics"Payment based on consumption"01Myavrd.hngamy cloud computing

creates a Myarmnasb identification, a determined rate. This rate is used to determine how

customer payments. In this way, the client's bill based on consumption levels. If the service is

not used on a particular day, the customer will not incur charges for that day. If you have to

pay the cost of cloud services, you must ensure that you know exactly which services you are

measuring the resulting costs. In a measured service, it is very important that you understand

the costs associated. If you do not have a good understanding of the costs may be so

unpleasant surprise.

Cloud deployment models


How to use the cloud from one organization to another. Each organization has its
own requirements in a cloud that wants to access what services and how to have

control over the environment, as well. To accommodate these different


requirements, a cloud environment can be implemented using different types of
service. Each model has its own suite of allowances and benefits.
descriptionNISTCloud computing deployment model cloud four different designs: a

public, private, and hybrid group. Here we Khalshay of any offer, but in the next
chapters in more detail to them.

10
pay as you go
Cloud Computing
Basics 07 

General
When most people think about cloud computing, public cloud service model
they think. In the public service, all systems and resources that provide the
service are in a foreign service provider. The service provider is responsible for
managing the systems that have been used to provide services. Client is solely
responsible for any software or application client that is installed on end-user
systems. Links to public cloud providers often occur via the Internet.

Private
In a private cloud, systems, and resources that provide services within the organization

or company from which they are used. The organization responsible for managing the

systems that have been used to provide services. In addition, the organization

responsible for the program and client software that is installed on end-user systems.

Often through private cloudsLAN Local or WANAre available. The user remote control

users, this access via the Internet or through the use of a virtual private network)VPN(

will be provided.

Group
Public clouds are a relatively clear that members of a selected group of organizations is

shared. These organizations are generally the same mission. These organizations do not

want to use the public cloud because it is open to the public. They offer more privacy

than the public cloud what they want. In addition, each organization does not want to be

solely responsible for cloud storage, they are capable of sharing responsibilities with

each other.

hybrid
Hybrid cloud model cloud model is a combination of two or more. The clouds themselves are

not combined, but the clouds parted and they are all connected together. Pchydgy a hybrid
cloud environment more, but it allows more flexibility in meeting the objectives of the

organizations.
 08 The Basics of Cloud Computing

Cloud service models


When you see something deeper that by implementing cloud services you provide,

you start talking about your cloud service models. descriptionNISTCloud computing

basic design of the three service models: Infrastructure as a Service, Platform as a

Service, and Software as a Service. Here is a summary of the models covered in

later chapters, we will discuss more precisely.

Infrastructure as a Service
Infrastructure as a Service, or IaaSProvides infrastructure services to the customer base.

The service includes physical machines, virtual machines, networking, storage, or some

combination of these items. Then you can create whatever you're in the top management

infrastructure need. ImplementationsIaaSAlternative data centers are managed internally.

They allow organizations to have more flexibility, but at a reduced cost.

Platform as a Service
Platform as a Service, or PaaSAn operating system, development platform, and
provides a database platform. ImplementationsPaaSOrganizations to develop
programs without worrying about the infrastructure needed to support the
development environment. However, depending on the implementationPaaS
That you used in tools that you can use to create Brnamhytan are limited.

Software as a Service
Software as a Service or SaaSProvides application and data services. Application,
data,

‫ و‬All platforms and infrastructure are provided by the service


provider. SaaS The main cloud service model is still the most
popular model is recommended by most providers.
Cloud Computing
Basics 09 

Cloud drivers11
Cloud gives people new opportunities. Liable to roll out the program, you must pay

the cost of the system would be correct and well-trained staff. Now, depending on

which provider you choose, it'll be extremely reduced costs. Cloud is a big factor in

the introduction of the new consumer era. End users do not need to use apps that

do not like and does not cover their needs. They can choose another program much

easier to read.

Today, some programs SaaS Are mostly used, customer relationship management)CRM(And

planning company source)ERP(A. ProgramsCRM And ERPCan be very complex and difficult to

implement and support. TodaySaaS Many examples of these programs are hosted by

organizations, that this time, the cost and save a lot.

System drivers
There are many system drivers that organization to the cloud. An organization may

require specific system properties that can provide it with their current structure.

Enterprises may have the knowledge or the budget to determine the characteristics

of the environment do not have internally, so they are looking for a cloud provider to

offer. This includes agility, reliability, scalability and efficiency are.

Agility

Cloud environments can provide great agility. You can easily find them again when the

resources are not appropriate. This allows you to add resources to the system that they

11 CLOUD DRIVERS ) Driver: a set of instructions for the computer to follow up

information transmission to specific peripheral device or restore it is re-formatting (


 42 The Basics of Cloud Computing

Needs and keep them away from a system that does not want
them. You can easily add the systems to develop capacity.
Internal cloud environments to take better advantage of the internal
infrastructure resources. Virtualization uses a cloud infrastructure that
can be used to increase the percentage of Zyrsakhttan help Zrfyttan.
As a result, there is less likely that the system is idle.

Reliability
Confidence in the environment can be very expensive. It often involves having
multiple systems in the data center locations. You should have a disaster

recovery)DR( 00And several planning and continue to do simulation. Many cloud

providers have several place settings, so if you use their services, you can
instantly add reliability to their environment. You may request that the service be
used in several places, but at least it is an option.

Scalability and flexibility


A cloud environment can be automatically scale to meet customer needs. New resources can

be added automatically to increased consumption. This helps in two ways. Increased capacity

to ensure that customer needs are met, will help. The fact that resources can be allocated on

demand to automatically means that they are not always available, which means that the

systems are unemployed and waiting is not required. These systems still use resources. If you

do not have to wait for the system, you can save the consumption of resources such as power

and cooling. This scalability allows you to meet customer needs for the better. You can quickly

expand capacity customers need to add temporary or permanent. you can

12
disaster recovery
Cloud Computing
Basics 41 

The external cloud environment to provide resources to the interim


capacity while you can expand your permanent capacity.

4.1 Continuous capacity

Performance
Efficiency in cloud systems continuously measured and controlled. If efficiency is less

than a certain level, the system can automatically be adjusted to provide more capacity.

The service level agreement also has advantages. ASLA ) Tvaqnamh service level (a

certain level of efficiency is ensured. If this level is created, service provider generally

some levels of productivity and economic efficiency. This efficiency is often in the form of

a refund or reduction in fees. So, although guaranteed performance not possible provide

a guarantee that the cost of lack of efficacy can be reduced.


 40 The Basics of Cloud Computing

Ease of maintenance
Ease of maintenance can be very profitable in cloud computing. If the other person

infrastructures and systems that are used to provide a service management strategy, they are

generally responsible for maintenance. It has several meanings. You do not have to worry

about tracking and Brvzng·hdary with the latest hardware

‫ و‬Be the software. You do not have to worry about spending time trying to
manage multiple servers and many different client systems connect. You should
be concerned about the destruction caused by Windows maintenance. There
are some examples that administrators need a few hours to log in to change the
system. As well as maintenance and support agreements with several vendors
can be very costly. In a cloud environment, you should only deal with the
maintenance of the service provider.

Security and compliance) acceptance (13


Many experts consider that security in a cloud environment for this is that it is much more

secure than traditional environments. Managers and engineers who specialized public

cloud environments should be run, which is in traditional environments. They can be a

type of safety or environmental focus a data type. This focus allows administrators to

spend more time on security measures the better. Additionally, a cloud provider more

money to provide specific problem-solving. They also solve issues for several clients and

not just an organization. Many organizations are looking to the cloud to facilitate

compliance. Compliance constraints can be a great pressure on the environmentITYou

put. They can flexibility and choices that you can do to secure the environment to restrict.

If you are able to outsource certain functions to an external provider, you'll also be able

to reduce compliance organization.


13
Compliance
Cloud Computing
Basics 44 

Business drivers
Cloud can help you deploy and run applications faster. As well as better management
capability

‫ و‬When you consider the benefits you get, you can exchange your business to a simple

architecture and agile. There are other key advantages are the cost and consumerism.

Cost
Cloud environments can be a source of reduced cost. One of the largest reserves
transfer costs from cost of capital is the cost of operations. When setting up a
traditional environment, infrastructure and tools must be purchased ahead of time. It
is often used as part of the capital budget be purchased. In the cloud you should
worry about your equipment, you only pay for the service costs. A service charge is
usually in the operating budget of the organization's account. Generally easier
confirmation confirming the operating cost is the cost of capital. In addition, cloud
environments using traditional storage occur benefits and to calculate benefits.
These are usually cheaper than more specialized components.

Consumerism
Information technology has changed the landscape by signs consumerism.

Consumerism focus on customer needs and demands. Consumers are not limited to a

particular paradigm; they selections. For access and free apps that want to reach the

consumer needs, environment, information technology must be flexible. They may need

to provide a host of several programs that provide a function, they are. It can be difficult

and costly to force in support. Using a cloud environment to provide these services can

make it a lot easier. More cloud environments accessible from various devices such as

computers, laptops, tablets and mobile phones provide. They flexibility to users in any

way that they want to give access to the service.


 43 The Basics of Cloud Computing

Surround technology
Recent advances in technology are a big reason for moving to the cloud. In the past,
the cloud was a good idea but it was a false hope. Technology to bring the dream to
reality was not. Cloud model lacks key components to be an acceptable option. Get
enough servers to serve consumers was very expensive. And you have separate
servers for each client would vote. Integrated program were able to measure
ranges. Most applications require a greater amount of data to transfer between
applications and the client. They must meet all of the services. Now technology has
been developed for many of the shortcomings solution has been created.

virtualization
Virtualization great motivator in moving towards the cloud. In fact, when people think

much about the cloud, they think of virtualization in a cloud environment is a must,

but it is not. Virtualization can be implemented in a wide role cloudy, but not
required. With virtualization, you're able to host multiple virtual machine on a

physical system. This greatly reduces the implementation costs. You do not need a
separate physical systems for each customer in mind. In addition, virtualization lets
you collect and supply the increased consumption of physical systems.

Program structure
There are also changes in the design and program structure. Previously, the program could

serve several client. Another way to prevent a customer or client information was not part of

the program. Now several clients can access a particular instance of the application, but their

interaction is divided. Programs have also started to implement service-oriented

architectures.SOAAllows apps into the elements. These elements are available

separately.SOA Allows applications to allow sharing elements. SOA , APISuch displays that

can be used by systems client or client applications. Open source computing providers the

ability to customize programs


Cloud Computing
Basics 45 

Implementing such sorting technologies03 And hypervisor02To meet the needs


of the catalog. You start with a basic program settings, but you can customize
the program to suit it to the needs of your organization.
In conjunction with web development standards are also improved. This

standardization has led to increased compatibility and interoperability.

increasing bandwidth
Speed access to the Internet) bandwidth (greatly increased. This increases the overall speed

of access to the app. In many cases, the Internet can access based on comparable-based

access LANIs local. Increased bandwidth could mean response time is better. This helps

create growth in usability for web based applications.

Drivers of cloud providers

In recent years, the number of cloud services and cloud providers has increased. There

is relief for consumers and providers. And the reason is that every day there are new

providers. They are benefits that can be achieved by providing cloud services to

consider.

Economies of scale
Cloud providers use a concept known as economies of scale, which is based on the fact that

when you create an infrastructure for application or service, add incremental capacity is only

required Azafhhay. The higher the setting, the greater the potential return on investment is

higher. For example, take a look at our e-mail services. Implementation of e-mail services for

employees in 2111 to about 02 cents for each email box costs internally. Provider

14
orchestration
15
hypervisors
 46 The Basics of Cloud Computing

Implements cloud email services to 011,111 users for each email box
will cost 01 cents. Deals can cost 02 cents for each email box
suggestions. That is where we are all winners. Provider revenue and
cost is also cheaper than what can an organization.

Alternative income
Offer subscription-based services can provide services for the provider with
a stream of periodic income. Alternative income stability to a business adds.
An income stream to help meet earnings estimates and budgeting.

Selecting Cloud obstacles: What prevents the people?


Clear advantage, but everything is not perfect. Problems that
slows the cloud. In this section we describe some of these
problems.

Ambiguity
One of the problems that hinder the clouds in the lack of understanding that
provides cloud services. This lack of understanding causes fear. Most of these fears
about hidden costs, lack of control, integration issues, security concerns and so on.
However, all these problems can be reduced if you Rdk clear understanding of what
you're looking for deals and what to expect in mind. We give you the knowledge
needed to overcome this fear. Many of the concerns only questions that have no
definitive answer. When you are dealing Ksbvkarysh ability to do things your
organization, you must be wary of the unknown. You should not be able to reduce
the risks do that. If you do not know what the risks are, then surely you can not let
them down.
Cloud Computing
Basics 47 

Concerns about the integrity and growth16


Often full of concerns with cloud and cloud providers are different. Many new
providers of public services do not meet the needs of many organizations.
Public service providers must not only meet the demands of customers but also

to properly provide the service levels and to support them.

Services are not strong enough


Many of the services offered by cloud providers are not strong enough to meet

customer needs. Many public cloud services are clear. If your organization requires

a specific service that is provided to a particular species does not, you will not be

able to take advantage of the service. To alternate providers of services or to add it

to meet the needs of our customers.

SLAS) Service Level Agreement (


Many service providers are not at the point where they can SLAActual offer. Some

dealsSLAWould not suggest in any way. OthersSLATo offer, but it ensures that they are

not suitable for many organizations. 03/1 access to your organization may require a

special application or service, the provider can not offer it. One note of this part is that if

your organization can provide a certain level of access) due to technical limitations (the

service provider for a given service or application is faced with the same technical

limitations.

16
Maturity
 48 The Basics of Cloud Computing

Integration
When working with service providers, integration is a key element. Because the system

used by your service providers do not, you will not have direct access to them. No direct

access, some interfaces are provided for making it possible to integrate with other

systems. You may need to integrate data and applications.

Data integration

Data integration between systems and cloud-based reporting and internal

systems01Can be very expensive. You must be a means to copy large amounts of

data from one location to another location discover.Bandwidth used during the copy
process, you will definitely affect the costs of the service. The lack of real-time data
access provider could be issues in many circumstances. Realtime data are often
required to report. Moving data in real-time can have a large bandwidth needs. The
bandwidth consumption can be very expensive.

Integration Application / Service

Sometimes web interface provided by the service provider is not good enough alone.

You may need to program or web service, you must take advantage of other service

providers. Many service providers interface orAPIOffered that can be used to access

performance. Secure access to this interface gives you access to the required function

for programming.

17
on-premises
Cloud Computing
Basics 49 

Security
Although some cloud implementations assume than traditional deployments in some

cases are very safe, but some aspects are less secure and have a higher risk. This

risk stems mainly from the fact that you do not have direct control over the system

and data. You should do what service provider you trust.

Property data
There are many questions about the ownership of data in the cloud. Essen cloud
implementation is a big question is who owns the data? You may now create data,
but the field is sorted in an external service provider. Are you still're the owner?
What happens if the service provider to come out of this business? How can you
access your data? Does that property can be obtained your information? Whether
the company is obliged to give it to you? The questions that you should consider
when they consider a service provider. Different service providers have different
answers to these questions, then you need to be aware of what you expect from a
service provider.

Audit or investigation
Ability to perform appropriate audit among different cloud environments. Depending on the

implementation, you may not have direct access to the systems and applications that you

want to be audited

‫ و‬Or not.

Privacy issues, legal and compliance) compliance (


Privacy is a big problem in cloud implementation. A cloud provider may have direct access to

your organization's data. If the data is private, measures should be worried


 32 The Basics of Cloud Computing

Which is used to keep it private. In certain cases, you may have personal standards

with external data storage provider with the violation.

Legal issues and agreements can be very difficult when working with cloud

implementations. Eligibility yet to be determined. If you're in the United States and

Europe have access to the server, what Mqrrhay apply? General guidance to ensure that

you follow the laws in each jurisdiction. One of the ways that you can to ensure that

providers comply with the appropriate regulations, choose a provider that an

auditorSAS11 Type II Has approved .The audit makes sure that the access provider

required to agree to the index. These audits are conducted by an organization

independent advice to the maintenance of defects.

Multitenancy

Tenants can offer some of your stuff. You should take the time to
various organizations that have a service use the same careful. No
doubt there will be security and customization issues.

Security
With multi-tenancy and you control the people who have little knowledge sharing

systems like the system you have. Your subconscious mind that your competitors can

use the same system. If your competitors are able to extract some security gaps on the

host system, they may also be able to access your environment. This is the same hack.

Hackers also purchase cloud. Their main aim is to find and exploit to gain access to

other peripheral areas on the same host is used.

Shortages or lack of customization


When you plan and you share the system with other organizations, Barry limit the

amount of customization that is done there. In some cases, you may be able to
Cloud Computing
Basics 31 

Customization No other organizations do not impress. In other cases,


the service provider does not want to support customized applications.
You must remember that thousands of service provider customers.
Support customization for each customer it is very costly.
For these reasons, you may be able to use a specific version of a program you want to do for

a while. You may have to get different versions of your app. The new version may need to

have additional training. Cloud affects the productivity of your company.

Technology challenges
Although great improvements in cloud technologies, but there are many ways to

grow. Many technologies have not yet been officially approved as standard. This will

lead to compatibility issues. Authentication in this case is a good example. Although

standard authentication protocols, but they are not widely used.

Change horizontal scale18


Cloud environments generally means commodityFor the infrastructure they use. In many

cases this means adding capacity, because you are a great place to change

02
Change horizontal scale
To change the horizontal scale Scale outAlso called, means an
increase of more nodes to the system. An example would be
increasing the number of Web servers from one to three named.
Change vertical scale
Change the vertical scale Scale up Also called, means to add resources to a

node)Node(The system - for example, promoting the processor or the storage

medium is a computer. Increase resource utilization as well as a vertical scale is

changed. For example, you can add a number of processes running daemon) in

English:)Daemon Apache HTTP PGP) in English:)Apache HTTP Server Mentioned.


 30 Cloud Computing Basics

Horizontal scale need. Change horizontal scale can lead to increased load on a data

center and related expenses increased environmental sources such as cooling and

electric motor.

Company policies
If your company already has used only internal resources, policies and procedures

should be updated in order to consider cloud environments. You may develop

policies that can control when you've completed the cloud environment and when

you have not done this apply. You are policies to determine what can and what can

not be transferred to the cloud need. You are the policies around what the service

provider is expected to need.

flexibility
Select a cloud environment may be somewhat limited. You must consider that if a

service provider are not satisfied with how difficult it is to change provider. Changing

providers is difficult. This is a great concern that the data from one provider to another, to

what extent is difficult. In some cases it is so costly that it is impossible.

Summary
There are five key cloud characteristics: on-demand self-service, broad network
access, resource distribution, flexible Fast and measurement services. A solution
must have five attributes to be considered as a correct solution. There are four cloud
deployment models: public, private, and hybrid Grvhyy. Each model Due to the fact
that the infrastructure environment where it is defined. There cloud service models:
Software as a service, platform as a service and infrastructure as a
service.SaaSCloud cloudy original model but has continued to grow and expand.
Now many service models available. There are many factors to move the
organization to the cloud, as well as many other factors that keep them away from it.
Each organization must evaluate the clouds that is right for them and the best
choices.
Cloud Computing
Basics 34 

Season . 2 Design concepts

• This Season
 identity confirmation

 Computing concepts

 Hardware virtualization

 Web Developer Technologies

Introduction
Cloud is a service, but several technology elements are stacked to enable the cloud.

These technologies and advances in technology are responsible for the rapid growth

of cloud and access cloud applications. We do not talk in detail about technology,

but it is important that you have a common perception of them. Because when you

have one provider and cloud products to choose from, if you can create a distinction

between the technologies and know each offer what is very Mzayamnd.

Authentication
Authentication is the process of identifying those who say that if the same user. In many

systems of access to resources, you must first establish your identity. If sensitive information

is vague, and whenever you need to check, you must create confidence in the person, the

right person is. If you do not, you will not be able to trust the person or even be able to trust

the information provided by them. There are different ways to authenticate a person or object

is used. It is important that you apply the correct authentication


 33 The Basics of Cloud Computing

According to conditions. Authentication is an important part of any environment and the

cloud is not excluded. The authentication in a public cloud environment is more important

than traditional media. The main method of authentication to restrict access to

applications and data. Since public cloud applications are available via the Web, they

can theoretically be available to all. For this reason, the service provider must insure that

the proper precautions to protect applications and user data are used. This process has

been selected to ensure that proper authentication begins. Similarly, when you evaluate

your cloud provider should make sure that they are appropriate measures for

authentication. The information in this section is placed at your disposal to help you

evaluate.

Identify the verification


When you pay to the problem of authentication, you can divide it into elements:
identification and verification. Identifying the processes that will tell you who you are. This
expression can be a user name, email address, or other techniques that identifies you, it
is. Basically, you are saying," I am drountre "or" I am [email protected]"And" I have access
to resources like that for me are available. "This system can not only access to someone who
claims that drountre is provided. The verification must be done. Approved a process by which a
system verify that you really who you say you are concerned. this process is what most people
during authentication to think. they can not understand that the first part of this process that you
have to say about someone that you create. approved the be done in different ways. you provide
software or your PIN, or some type of biometric identifiers That you use.

Think this way: you know that when you attempt a system for authentication

‫ و‬Enter your username and your password, Czech system will tell whether or not the correct

combination. You must enter the correct password corresponding to the username you have

entered is. If one of them is incorrect, authentication will fail. First the system checks whether

the name
Cloud Computing
Basics 35 

User is correct. If not, then an error message is returned. But if the


username is correct, the system checks the password. The correct
combination of these) username and password (required for successful
authentication.

Access19
After the authentication credentials are allowed and licensing begins. Authorization
is the process of determining what a user is allowed to do it. License not only about
the system and access the system. The possibility and capability that permits users
everywhere. Every organization should have a security policy that defines who has
access to what resources and let them do what they have on these resources.
Authorization policies can be anything from concerns about privacy for compliance
with the regulations affected. It is important to have a system that you are able to
apply your license policy, including public cloud-based systems.

Advanced authentication methods


In securing applications, data, user name and password authentication is not
enough. You should be more care in terms of the identification of the person is
important to note, as part of foreign requests internal systems. Public cloud
systems can also represent a serious risk. Since public cloud applications and
data are easily available on the Internet, you may be looking for a provider that
establish the importance of advanced methods to secure them. Two commonly
used methods: multi-factor authentication and risk-based authentication.
19 Authorization
 36 The Basics of Cloud Computing

Multi-factor authentication
One way to ensure the appropriate authentication security using multi-factor authentication is.

Multi-factor authentication because of several factors such uses is called authentication. You

may be a factor to consider a set of authentication. There are three factors that can be used

for authentication: something you Mydaynd, what you are, what you are. Something that you

know the password, birthday, or personal information. What you once used a password, smart

card, and other things that you may have to physically. You are what you are biometric, such

as fingerprints and spoke pattern. Multi-factor authentication in order for something to be

considered, it must use at least two of the three factors mentioned. For example, when a user

attempts to acknowledge that he may enter passwords and codes used once.

Multi-factor authentication offered by the service provider that is growing, especially

those who are storing sensitive data. So if you feel you need multi-objective

authentication, you must request it from the provider.

Risk-based authentication
Risk-based authentication began to acquire a reputation. The authentication due to
increased risks of public programs and website were confronted with was created.
Risk-based authentication of a risk profile to determine the authentication request
can use is suspected. Risk rating given to any attempt authentication. If the score is
risk beyond a certain amount, service provider or a Web site can request more
information before allowing them to access. This information can be traditional or
factor authentication security questions are added.
A risk is calculated based on user and system features. Site profiles for each user based on a

common information such as time of arrival, system or method used to access the site

provides access. When a user attempts to access the site and its recent consumer

characteristics with matching profile no rating change reflects their risk.


Cloud Computing
Basics 37 

Risk-based authentication is common in banking and finance sites. But,


like multi-factor authentication, risk-based authentication does not
advertise, Bnabraym you should ask whether a cloud provider can
provide it.

Identity providers
In the field of authentication, there are certain service provider is a provider of identity.

Identity provider orIdPEntity that maintains and manages identity information. You

canIdPInternally set, or can operate as a service provider. Users, or entities, against

tanks credentialsIdPThere authentication. ThenIdPAccess to information and the user's

identity. It should be noted thatIdPOver performs user authentication. This information

can be sent to anyone who needs it. Generally, this is a service provider, which relies

sector01Called. This is because the service-basedIdP For authentication and

identification information.

Tank credits21
Tank credit, which sometimes store or warehouse user authentication is called, is where the

real user accounts stored in them. Two main types of authentication repository withIdPWhat

used: databases and directories are repositories. In general, the database credit-specific

tables created by the user are stored management. One of the reasons that the database is

often chosen as a credit repositories that most developers experience in database

programming, so write the code for user authentication database is relatively easy. Includes

lightweight directory access protocol tanks Help)LDAP( 00 And implementation are working

directory. LDAP A method based on simple standards for access to the data warehouse

20Relying party
21 Credential Store
22
Lightweight Directory Access Protocol
 38 The Basics of Cloud Computing

Provides credit. Microsoft's Active Directory domain-based methodLDAPIs. Using a


credit reservoirADGenerally require that you use special access techniques. Many
cloud service providers the option to use domestic credit warehouse inventories
Instead of using their third. In this way the user having to remember multiple sets of
credit.
To help you understand this concept, shaped), 0-0) and (0-0 (see. Figure) 0-0

(showing a structure of traditional authentication where the authentication

application directly to the warehouse are. figure) 0-0 (indicating that the IdPWhat

works. Programs withIdP Communicate and IdP Credits associated with the tank.

Figure 0-0 The structure of traditional authentication


Cloud Computing
Basics 39 

Figure 0-0 Structure committed authentication

IdPPublic
Identity providers can be public or private. usingIdPThe public is growing steadily.

Instead of creatingIdP Domestic, many organizations use service provider IdPSelected.

usingIdP Foreign can save time and money for you. IdPAre available for use in different

public. We'll cover some of them.

OpenID
we with OpenID Let's start. OpenIDA standard for authentication. It provides a framework

to ensure interoperability Rahhlhayshan provider can use it.OpenID Technology that

allows you to implement an environment in which


 52 The Basics of Cloud Computing

Authentication is taken of the license. WithOpenIDAuthentication can be separated from

an application and other sources. You can use a central entity, such asIdP, Which for

authentication for several websites and sources. Since theIdP The standard OpenID

Added and service provider supports it, interoperability will work well. OpenIDProvides

several key advantages. First, the authentication service provider should not be worried

about maintenance capabilities. They should Pshtsbany authentication in or create

Srvysshan. They should also be concerned about the maintenance of reservoirs credit or

managing users. Reset Password and things rapidly increases support costs will be

removed. Second,OpenID, The service provider which methods are used for user

authentication is not important. This allows you to select an authentication scheme to the

needs of your organization without having to worry about what your schedule will work or

not, and economic efficiency. You may also change your authentication scheme when
you think you need, you feel more freedom. It can change in theIdP , Or you can create a

IdPSelect the new. Since theIdP , OpenIDYour support, your program to the

authentication mechanism has changed paramount importance. If youIdP Select the new,

you must validate the application or service and new IdPNew, but it does not change the

authentication service or program. This kind of flexibility can be a major advantage in

today's ever-changing landscape.

Figure 4-0 logo OpenID


Cloud Computing
Basics 51 

Google
IdP Standards-based Google OpenIDIs. In accordance withOpenID 0.1. IdP Google

also supports the following extensions: Swap Properties 020.1 OpenID, UI 0.1

OpenID, Hybrid protocol OpenID + OauthAnd expansions provider's authentication


policy.)PAPE(When you use your Google account to log in) like)YouTube, You
actually IdP Google will be using.

Facebook
Facebook An identity provider that is growing strongly. Facebook Recently OAuth 0.1
To provide authentication and authorization data. Facebook several API
‫ و‬The software development kit will be provided to you in integrating Login FacebookWith the

help Brnamhytan. You can javascript client, calls natural Device) Android,IOS

‫ و‬Etc. (or run the server. For more information about the provider Identity Facebook To

the site www.facebook.com / developers See.

Microsoft account
Microsoft has an identity provider, which already named Windows Live Known.

IdPThe default on all websites related to Microsoft is used. It alsoIdP Default

management for Microsoft Access, Microsoft is committed identity service

providers03 is.

23
OpenID Attribute Exchange
24 Microsoft's federated identity provider
service
 50 The Basics of Cloud Computing

Federated identity or integrated


Federated identity or integrated a secure method for different systems in order to obtain
access to your identifying information. But with an integrated identity, other systems can
also achieve such information. Trust is the key to integrating identity. A system that
keeps your information system and your information requests must trust each other. A
system that requests the information should be uploader to ensure that they receive
accurate information, trust.

Basically, a program to the trusted entity, which IdPIs, when the presence of said

user who accepts. In fact, the program itself does not do anything to acknowledge
the user's identity. It is simply what theIdPHe says it. Before the reliability
programIdP, A relationship of trust must be created between them. The program
must addressIdP That trust has to be configured. IdPMust be configured with the

address of the program. In most cases, some key between two entities that
exchange to establish this relationship. This key is used by entities to identify each
other.

Microsoft access control services)ACS(


You may decide that foreign exporters such as hosted Microsoft Access Control Service

option. ACS A cloud-based web service Azure Windows that is used for identification and

access management. ACSFunction can be used to provide authentication and authorization

for Web apps and services will be used. In this way, it functions not directly in the code for

apps and services will be created. A key advantageACSThis is because it is a cloud-based

model, no installation is not required. You still have to implement examples for their

environment, but nothing requires no installation.

ACSIt is very flexible. According to many protocols and environment. This allows you to

easilyACS Operate in their environment. ACS Industry-standard protocols


Cloud Computing
Basics 54 

Supports such Oauth, OpenID, WS-Federation, And .WS-Trust also ACS Several
types of token formats) encryption (also supported. It formats SAML 0.0; SAML
0.1 JWT And SWT supports the. ACSDevelopment using many Web platforms
support. You mayNET, PHP, Python, Java And more. ACS Includes a host of
practices that are committed to further identify critical environments. ACS Allows
you to implement only a function that is essential for the implementation of the
catalog. ACS The following function provides: authentication, authorization,
Mthdsazy, the transfer of password security, trust management, management
and automation.

Computing concepts
Two key concepts in the implementation of cloud computing is
involved. These concepts will help to establish the philosophy of
many cloud implementations.

Calculations public services25


Computing has a long history of public service, but recently used. Public services
operate computing resources such as computing education service has been
measured, we do this for electricity and water. A public service only for you, water
and electricity consumption is calculated. The service provider also calculates the
resources used to you only. The concept of cost calculation methodology based on
the use of public cloud. Resources are available to you, but you must pay for your
used ones. There is also a monthly payment relating to the availability of resources,
but much of the cost is based on your actual usage.
25
Utility:Water, electricity, gas and ...
 53 The Basics of Cloud Computing

Servers Commodity Or consumer


The concept of servers CommodityIncluding the use of non-specialized servers
is to perform a task. Instead of using different servers to do the work, you get
everything you use only one server. Generally, serversCommodityLow-cost
systems are. Instead of putting a lot of tasks on a powerful server, you can
publish your work on a number of less powerful servers. This also is known as
fragmentation rather than raising.
Most of the cloud provider's servers CommodityUse of virtual infrastructure. This is

exactly what Amazon has done to implement Abrysh. In fact, Amazon has been so

successful that other providers are trying to copy this model.

Autonomous computing
Autonomous computing by Paul Horn From IBMIn 0110 presented the vision that
each has its own computing system to automatically manage, and shared.
Key benefits of reduction in the inherent complexity of computing systems,
and more intuitive and easier to calculations by the operators and users. In
this vision of autonomous computing systems, self-optimizing, self-
protection and self-improvement.
Similar efforts to simplify the management of information technology independently led,

like methodologies ITIL ) Infrastructure Library)IT And technologies ITSM ) Service

Management)IT, WSDM ) Management of distributed Web services (and so on. Several

research groups are still on their systems to improve the systems and policies that can

be agreed at LOS complex to enable better decision making, automatically manage

work. Our success with many of the products have obtained and also one of the main

goals of controllability
Cloud Computing
Basics 55 

Us. Given that the purpose of cloud computing to simplify computing system and provide elasticity

in computing and access on the system, any new initiatives more automated machines are added

directly to the cloud infrastructure. Virtualization technologies right level of abstraction for managing

dynamic hardware resources and making changes in the elasticity of demand have provided. To

say that cloud computing vision, autonomous computing sharing is not wrong.

Applications Service Providers


The hosted applications as a service to other applications for use in early 0221 began.
Hosted vendors who use this app with Kalynthayshan made possible only web browsers,
service provider applications were called. By this definition, it is very similar toSaaS It
looks like sellers SaaS they can ASPWhat are Umida. However, when the programs off

the shelf01With a browser-based interface as a hosted service, there were limitations.

Many of these programs customized for each user the ability to manage multi-tenant and
did not use, as well as automatic deployment and elasticity to scale had requested. That
is the modelSaas Cloud computing model ASP Is taken.

To Understanding the differences between models SaaS And ASP


To the site www.luitinfotech.com/kc/saasSee -aspdifference.pdf.

Hardware virtualization
When most people think about the cloud, virtualization In fact, they think. But in fact required

to create virtualized cloud environment. If you think cloud properties, none of them does not

require virtualization. If it is not required, but virtualization has been used in many cloud

implementations. This is because virtualization can increase delivery capability characteristics

required in a cloud environment. For example, increased capacity very cheaply

26
off-the-shelf
 56 The Basics of Cloud Computing

This will be done by adding a new virtual machine and not making physical systems. The most

common type of virtualization hardware virtualization. Hardware virtualization to create a

simulated physical system in a real physical system is used. In many cases there are no

physical systems simulation. In this case, the density of the system and increasing the use of

hardware virtualization to create system is used. The use of virtual machines to share physical

resources. Therefore, when a physical system does not use virtual resources, physical

resources may be used by the system. Is unauthorized in an environment, system resources

will be idle for an extended period. You paid for but not using all its potential.

Hypervisor27 ) Or virtual machine monitors (


Through the use of hardware virtualization hypervisor is performed. Storage virtualization

hypervisor and the network offer, but strong features added by other products. In this section,

some of Hayprvayzrhay commonly used in cloud environments today we cover. Depending on

what service you're using, the hypervisor is very important in your decision. You must ensure

that you create the hypervisor attributes needed to support implementation.

Principles hypervisor
Hypervisor virtualization capabilities provide something. Hypervisor as an
interface between the physical system, host, and virtualized systems, the
guest acts. Hayprvayzrhay different needs are different elements that should
be on providing virtualization host system to be installed. In addition, various
Hayprvayzrhay provide different options for the guest operating systems.

27 Hypervisors
Cloud Computing
Basics 57 

Of hypervisor
There are two types of hypervisor type 0 and 0.0 hypervisor in the stacks are classified

according to their seat. 0 Hayprvayzrhay type generally are directly on top of the hardware

structure. Hypervisor type 0 acts as the operating system itself. This allows them to efficiently

uses system resources are physical. For this reason, many cloud environments are built using

the hypervisor type 0. Hypervisor type 0 is generally at the top of another operating system.

The operating system controls access to physical hardware. The hypervisor as a control

system between the host operating system and guest operating system works. One of the

biggest advantages is that you can generally Hayprvayzrhay type 0 normal desktop install

them on the system. And does not require a separate system be installed hypervisor.

Hypervisor Xen
Two versions of the hypervisor Xen There are versions of open source and
commercial versions proposed by Citrix, The serverXenCalled. In this book
we About serverXenWe'll talk. ServerXenHypervisor type 0 is basically a
customized version of Linux is installed on your server hardware.
Implementing ServerXen Consists of two main entities: the hypervisor server

Xen That the system hardware02 Is installed, and the Central Management
Console Xen Windows is installed on the system.
82
:bare-metal system Only computer hardware)) Programming pure metal
((ie direct control of hardware instead of relying on the operating system services
 58 The Basics of Cloud Computing

Figure 3-0 logo Xen Hypervisor

Hyper-V
Hyper-V0 is a hypervisor type. The hypervisor is installed after the Windows

operating system is activated, and virtual machines based on the Windows

operating system accesses it. But the fact is that when youHyper-VTurn, it puts itself

between the hardware and the world. And you see the problem here is that the OS

is essentially a virtual machine on platformHyper-V Runs.

vSphere
VMWare A hypervisor type 0 suggests that vSphereCalled. The hypervisor is

widely used in enterprises to the private cloud is to provide a virtual


infrastructure performance. But the use of public cloud infrastructure problem,
which is caused partly because of the private nature of it.
Cloud Computing
Basics 59 

Figure 2-0 logo vSphere Hypervisor

KVM
Kernel-based virtual machine, commonly called KVM Known as Is a hypervisor-based

the Linux kernel is open source. KVM It is a core module and loading kvm-ko Name or

platform specific model, or the same kvm-intel.ko Different kvm .kvm-amd.ko The

operating systems Linux and Windows operating systems home support.

Figure 6-0 logo KVM Hypervisor

Web Developer Technologies


Web applications over the Internet, often using the Web browser are available. Web

applications generally do not need to install client. This is one of the things that make

them attractive in the cloud-based scenarios. They can be accessible from anywhere and

in many cases are available from the device, because the device has a suitable web

browser. Independent software vendors)ISVs (Most versions offer web-based

applications. In fact, web applications have become the de facto standard for the

proposed program. Several


 62 The Basics of Cloud Computing

Standards and Technology has made web applications to become a reliable


solution. Here we'll cover a few of them. In addition, it is important to evaluate
platform technologies in web applicationSaaSConsider. Since you PlatformsSaaS
To develop the application you use, it is important that you make sure that the
platform SaaS Your choice of technologies that you intend to use them to
implement the plans have support.

HTML
HyperText Markup Language, a standard has been widespread for a long
time. ActuallyHTMLThe best standard for creating web pages. All web
browsers interpret web pagesHTML Know. HTMLThe tags to format and
add structure to web pages. Tdad tags and functionalityHTMLIs growing. In
fact, the latest version of theHTML2 has causedHTML It is best web
programming language.

Adobe Flash
Adobe Flash A programming language that is used primarily to create animations
and vector graphics. Flash One of the languages is very common on the Internet
programs used for animation needs.
FlashDue to the stability and security not very well known. For these
reasons, some systems that do not support. Developers are looking for
other ways to provide the same performance for them.HTML2 one of the
technologies that have the potential to replace much thoughtFlash Is.
Cloud Computing
Basics 61 

Figure 1-0 logo Adobe Flash

SOAP
SOAP , Soap02, Is a protocol for exchanging data between Web services.

MessagesSOAP The information set XML For Frmtdhy use. SOAPThere is no


need for negotiating and signing the protocols. The application layer protocol
thatSOAP Uses HTTP And SMTPis. Three propertiesSOAP It is interesting that
protocol, neutrality, independence, and expand it.

REST
REST21 A functional structure. RESTExchange program is divided
into server and client. A creature that creates client application
and server application that serves entity.
REST Six constraints on the implementation of the program
defines
 Model client / server.Strict concerns must be differentiated between client
and server.

29
Simple Object Access Protocol
30
Representational State Transfer
 60 The Basics of Cloud Computing

 Public outrage over:20 Applications should be based on state information when


communication with the client.

 Mobility: Contents received by the client must have mobility.

 Systmalyhay: Client can not say whether or not they are directly connected to
the server, so it can be used when necessary interfaces.

 Demand Code: Servers can send executable code to a client.

 Or the same interface standard: A standard interface
between the client and server is used.

Java
Java is an object-oriented programming language. Java applications are
designed to run on any platform. Java code to an intermediate language
called Java bytecode interpretation of that. The byte code is then executed
by the Java Virtual Machine. Since the system running the right versionJVM
It has to be able to run Java programs.

Java Script
JavaScript is a programming language object-oriented lightweight. All versions of

the web browser understands JavaScript. Sometimes you will see that for security

reasons, the implementation of client-side JavaScript is disabled. JavaScript mainly

as a server-side language used, but today it is used for programming the client and

the server. Due to the widespread adoption of Java script, many sites and web

application implementations used.

31
Stateless
Cloud Computing
Basics 64 

Figure 2-0 Java logo

ASP.NET
ASP.NETA server-side web development language developed by Microsoft. It
allows a developer to create dynamic pages thatweb formsIt's called. This
means that the page can be changed according to the specification or
specification requirements.ASP.NET Above the common language
runtime)CLR(Microsoft is created.CLR At the moment of compiling a program
written in any programming language, using the framework .NET Microsoft
gives.
 63 The Basics of Cloud Computing

Figure 2-0 logo Microsoft Net

Ruby on Rails
Ruby on RailsRuby also called, an open source development framework that can be

used to create templates, development, and database query is used. Ruby

controllers vision-model or structureMVCUses. A model is mapped to a table in the

database. View a fileERB The runtime HTMLBecomes. A controller elements that

respond to external requests.

Figure 11-0 logo Ruby and Rails


Cloud Computing
Basics 65 

32JBOSS

JBOSSAn open source application server. For implementation of the Java

platform, corporate version is used.JBOSS Is written in Java, which means that it

can run on a system that supports Java applications.

Figure 10-0 logo JBoss

PHP
PHP Is a programming language and server-side script. PHPFor personal home pages.

Many programming languages server side to a web page need to call a separate file, but

the codePHP Can be embedded directly in the web page.

Figure 12-0 logo PHP

32
JavaBeans Open Source Software Application Server
 66 The Basics of Cloud Computing

JSON
JavaScript object notation)JSON( 22 And data structures used for the display.

JSONWidely used to transfer data between the web server and application. We
should point out that althoughJSONJavascript is taken, but it is a language-
independent. One of the featuresJSON That it is attractive to the developer.

Figure 14-0 logo JSON

Summary
In some cases, you only have to understand the technology behind the clouds
least need. In other cases, you have to understand the broader need. It is
important that you understand what technologies are involved when deciding on
the cloud provider. If you need to integrate cloud implementation in mind,
understand that you must choose which technologies integration is very
important. This might authentication technologies, computing technologies,
virtualization technologies and web development technologies.

33
JavaScript Object Notation
Cloud Computing
Basics 67 

Season 0.3 Cloud deployment models

• This Season
 Public Clouds

 Private Clouds

 Some Clouds

 Hybrid Clouds

Introduction
NIST Four cloud deployment model defines public clouds, private clouds, clouds group 23
‫ و‬Hybrid clouds. A cloud deployment model according to where the infrastructure is
established

‫ و‬Who controls infrastructure that hosts defined. Select which


deployment model you choose, it is important to proceed.
Every organization needs a different cloud deployment models acknowledged, it is

important that you choose a model that you acknowledge the requirements of the model.

More importantly is that head different value proposition of cloud deployment models and

different costs associated with it. Therefore, in many cases, your choice of cloud

deployment model reduces costs. In many cases, to be able to decide whether true, we

must be aware of the unique characteristics of the environment.


34
community clouds
 68 The Basics of Cloud Computing

Public Clouds
Public cloud environments that are fully managed and serviced by a foreign
service provider. When most people think about cloud computing, they are
public clouds. In fact, you'll find more articles and tools that are relevant to
public clouds. This is because the initial public clouds are cloud environments.
Most public cloud deployments are still in cloud environments.

benefits
The number of public cloud implementations because public clouds offer
many advantages it is growing. Very strong value proposition for a public
offer, although there are some problems, which we will study them.

-1 access or availability35
Public cloud deployments finding suggests increased availability. Any organization that

wishes to access a definition of the limits to achieve. Each organizational than access that is

able to reach it. Sometimes these two are matched together, and sometimes not. The problem

is that access is expensive, the cost of software and hardware costs, and the cost of staff.

Many public cloud provider software, hardware and staff are available to offer access to be

high. They may cost a little more to offer Srvysshan that this is more accessible, but it will not

be built like never cost.

‫ و‬High fault tolerance in mind. You should ask Aryhdhndh that with what services are

provided. If added to increase access, you should have when calculating

Availability 35
Cloud Computing
Basics 69 

Know your costs. You should also make sure that your ideal access
portion of the service level agreement)SLA(You.SLA You can give
you the assurance that your access needs may be met.
Be aware that while public clouds can increase your reach, but you must make sure

that you know what will be available. The package is to offer the service. On

offerSaaS, Alone programs will be available. But the proposalPaaS And IaaSAlthough

the platform or infrastructure may be available, but the program will not be available.

Practical problems with a proposalIaaS Or PaaS Will not be reduced.

-2 scalability
Highly scalable public cloud implementations structure suggests. What implementing

public cloud and private clouds that do not offer the ability to scale infrastructure

capabilities your organization without forcing the characters. Public cloud

implementations loading capacity can be temporary or permanent capacity to offer, that

is, depending on what your organization needs. If your organization ServiceSaaSUse, you

can add users without the associated infrastructure. If the serviceIaaS Or PaaS Use, you

will have enhanced capacity to create and your services, but you still need to ensure that

the programs created to manage the increased load.

-3 Accessibility36
Public cloud providers are of great importance to the accessibility. To increase the customer,

they are trying to ensure that service can be different Kalynthay day. The aim is to ensure that

their services may be used by any device on the Internet without having toVPNOr any other

client software is available. Today, the Internet and the Internet only through the browser-

based applications on laptops and computers traditionally do not have access. Persons

Accessibility 36
 72 The Basics of Cloud Computing

There are many choices for web browsers. Tblth and smartphones have many uses.

Although new devices web browser, they are not full web browsers. So to have the

ability to support these devices, applications and web pages should be somewhat

simplified and must adhere to standards development. Support multiple operating

systems and web browsers is very costly. Development and quality assurance costs can

be extremely high. So while many organizations want to provide this type of support for

users, but it is expensive. However, because service providers focus more on offering a

set of services, they are more amenable to adopting such costs.

-4 reduce costs
Public clouds are attractive because of their low cost. But you must consider that this

cost can become so similar that you think is not good. You should not only have a good

understanding about the low price but should be aware of this savings time. Using a

cloud of other organizations should not be worried about the costs for hardware and

software deployments. The customer only uses the cost of the service. More costs are

upfront costs, mainly because of the cost is to buy the hardware. As well as reducing

maintenance and support costs, and environmental costs are also reduced. Since the

servers in the data center you are not, you have the space, cooling and power costs as

you lower. In fact, if you outsource all your apps, you do not need the data center.IT

Outsourcing your work.

Cons
Public cloud implementations advantages and its limitations. Many of these can

be because of the infrastructure for another organization and is controlled by

the organization.
Cloud Computing
Basics 71 

-1 limits of integration
In the clouds SaaSPublic systems are outside your organization, namely the data
outside your organization. Placing the data in an external location or move for you
when reporting to internal systems is a problem for you. If you need to report or
analysis, business intelligence, you can end data transmission over the Internet. The
concerns about the performance and security issues for you. When the data are
reported in the same place, they are delivered quickly.
Consolidation program can also proposals SaaSPublic problematic. In ideal conditions,

different applications can use shared functionality. You do not have to repeat the same

performance in two different programs. Therefore, if the performance of a program, you

need to be able to invoke other applications where performance is in another application.

The public cloud applications a problem. App providers shouldAPIAnd Web services

offer that the customer can use them to do so. Otherwise you may get in a situation

where performance is repeated.

-2 flexibility dropped
When you use a public cloud provider, you're exposed to that provider's upgrade

time. In most cases, when Artqadhy do you usually will not be affected. Many

providers tend to install multiple versions of an application or system not online.

Would increase the administrative burden them. Members are trained in the new

system, which affects productivity.

3. Disability mandatory37
When you're using a public cloud provider, while keeping system
Repair is offline deals

controls it. Maintenance


may in time37 Forced

Downtime
 70 The Basics of Cloud Computing

Doing that is bad for you and your organization. Depending on how the
system is divided, you are able to delay repairs for a short period and agree
on when to organize and the right provider, you will be. However,
maintenance can not be delayed for a long time.

responsibilities
With public clouds, more responsibility service provider's neck. Provider is responsible
for maintenance and support. Provider is also responsible for ensuring that personnel are
well trained. In the public cloud, the service provider is responsible for all the elements
needed to implement the service. These elements are different depending on the
services offered. They can include servers, applications, storage and all. In a public
cloud, the consumer is responsible for everything that is needed to use the service.
There are a few exceptions, such as client-server implementations in an application that
is involved. The consumer is responsible for installing the client and ensure that it works
pretty well. The service provider is responsible for developing the client and offer support
to obtain the best performance.

Customer is responsible for maintaining public client. The customer


must ensure that the necessary updates and required applications
installed on client systems. The customer is responsible for providing the
Internet connection provider.

Security considerations
Ensure security in public cloud scenarios is very difficult. Since you have access
to the system to provide the service do not manage properly, making sure that

they are safe is very difficult. In this case, you must listen closely to provide
guidance and to be assured of its features.
Cloud Computing
Basics 74 

data
The real issue in the case of public cloud providers increases data security.
Questions about the ownership of the data. Since the owner of the service
provider systems that your data are located, a provider of data can be
considered potential owner.
There are also issues about access to data as well. Theoretically, anyone who

works in Arayhydhndhy service can have access to your data.

Compliance / Compliance
Acceptance or compliance concerns can be one of the largest public cloud
service providers.What to do with the fact that you see a bit of what happens
behind the scenes you. In most cases, you must provide the facilities or
equipment that is compatible with their use. Provider may CertificationSAS-11
have no possibility that you will be able to check it yourself. You have to
reviewSAS Trust that it has examined enough.

Audit
In the case of public cloud service providers, you will have a limited audit

capabilities. You will not have direct access to an account or event management

systems. In most cases you will be able to implement its warning of Aqaba or

register and log in again. Then you have to rely on what the vendor provides. Many

public cloud providers give you access to some forms of recorded programs. These

records can be used to view and make decisions with respect to the user access

authorization to be used.

Private Clouds
Private clouds are fully managed and maintained by your organization. View
all the infrastructure needed for your environment in a data center that will
make you control it. Therefore, you are responsible for purchasing,
maintenance and support.
 73 The Basics of Cloud Computing

Many people have a clear understanding that such a belief that private clouds are clouds

really difficult for them. They think they are the only true public cloud cloud. But if you

note the characteristics of the cloud, the cloud will notice that it does not matter where it

is located. Cloud value proposition when you're talking about private clouds as opposed

to public clouds changes, but does not specify that the cloud value proposition or not.

benefits
Private cloud models have many advantages. Most of these benefits

revolves around your ability to control and monitor what is happening

with cloud environment.

-1 support and troubleshooting


Private clouds to public cloud environments Ybyabyshan easier. In a private cloud,

you have direct access to all systems. You can access the records, tracking

performance grid, trace debugging much faster in mind, or you can provide courses

that help to maintain customer satisfaction. Customer satisfaction is important for

the success of your environment.

-2 maintenance
By private clouds, you can control the upgrade cycle. When you do not have to
upgrade the work will be done. If the new version features and functions that you
want to do, you will not be forced to upgrade. If your organization has a specific
schedule for upgrades and maintenance that you can do these things at the time.
This helps to reduce the impact of system outages. In some cases, you may need to
run multiple versions of an app in mind that this is just for compatibility. If you do not
control systems, you will not be able to have access to several versions of the
program. With an internal cloud, you run multiple versions of an application are free.
This flexibility gives you the ability of handling increased for the customer needs.
Cloud Computing
Basics 75 

-3 Nzartkrdn
Since you in your private cloud environment direct access to your system, you are able to

have any regulatory you want. You can monitor anything from applications to hardware

systems. A great advantage of this feature is that you can take preventive measures to avoid

the definitive operate, so you're more active in servicing the customers.

Cons
Although you will control the whole environment Noble is very good but there are

problems. When you implement a private cloud environment, you will face problems

like traditional internal problems, implement solutions. You should consider these

problems and then decide whether an internal cloud is a good choice for you.

-1 Price
Implement a private cloud requires costs. You're forced to deploy infrastructure that can

not only support your current needs, but can also support your future needs. You should

require all parts of the business that will support them to estimate. You should also

implement an infrastructure that can support the peak times. All systems that must

support the peak times Kknd not always have to run) if it is a way to execute them

automatically when needed (.

-2 hardware and software compatibility


You must make your environment to create the software that implements locate the

hardware is compatible. In addition, you must ensure that you create a software

implementation Kalynthay locate your environment is compatible. There are instances in

which you need special hardware Daryd- for example Mkhzn- to implement a special

program is needed.
 76 The Basics of Cloud Computing

-3 expertise required
With private clouds you to specialists in all applications and systems that you want to

implement them need. Requires local experts led training is costly. You are responsible for

installation, maintenance and support of you are, so you should make sure that you know or

that you do have the ability to hire foreign employees and contractors. Creating a cloud

environment requires employees with knowledge of hardware, storage, networking, security

and virtualization. Finding employees who have all this knowledge is very difficult. In addition,

your organization needs people who have specific expertise in cloud platform that you want to

implement.

responsibilities
In a private cloud environment, the division of responsibilities is
simple. Your organization is responsible for end to end solution22Is.
You're responsible for that service systems, Malynt programs, and
provides maintenance of client systems.

Security considerations
By implementing a private cloud, your organization complete control over
the entire system, applications, and data. You can control who has access
to what. Ensuring the security of a private cloud environment is easier.
There have full control over the system, and you can implement any security
tools you want.
In a private cloud environment, you are able to run your security and compliance audits. This

will give you more confidence in knowing that your system is required to give security and

compliance.

Compliance / Compliance
In a private cloud, you're responsible for ensuring that all
compliance rules are respected.
38
end-to-end
Cloud Computing Basics 77 

If your organization has the skill and ability to ensure adherence to compliance
regulations, an internal system

‫ و‬The data is a big advantage. If this is not the case and you have the skills and
technologies required, you should get them in, otherwise you will encounter big
problems.
The data and your systems are located in a foreign locale compliance can help your
company. You can provide service providers trust your abilities and connoisseurs

required. Payment card industry compliance)PCI( 22Is a good example.

ConformityPCIRequire special considerations must for any system that processes credit

card information to be considered. This helps simplify some requirements on some


internal systems. However, you should be wary. You can not fully trust the cloud

provider. If there are security issues and compliance, your company complaints, or at
least your reputation is harmed. Many people do not distinguish between you and the

provider. They will blame you for choosing the wrong provider.

data
In a private cloud environment, you're the owner of the data and the data
system on their own. This will allow you more control over who can
access the data and what they can do to see the data.

Audit
In a private cloud environment, you have full access to all applications and system

inputs. You can see that each one has achieved what thing and what's done with it. The

biggest advantage is that you can see all this in real time, so you'll be able to correct

action needed to ensure the integrity of their systems operate.

39
Payment card industry
 78 The Basics of Cloud Computing

Some Clouds
A group of public and private clouds, such as clouds are not used much; in fact,

they are a model of cloud deployment and minimal use their fame. In a cloud a

cloud by a group of organizations that have a specific goal to be shared.

Advantages
These clouds have many advantages. Most of them due to the
fact that infrastructure costs will be shared.

-1 Price
In the cloud group, the cost is shared between the group members. This cost-shared

infrastructure to the purchase of any single organization could provide them leads. In this way,

members of the larger economy. But you must be careful, because these problems that

everyone should pay the costs of what occurs.

‫ و‬Problems in the field of each element of infrastructure for whom


there is. In the beginning all these issues must be examined
carefully.

-2 multitenant
In the cloud group, multi-tenancy is effective in obtaining economic benefits. Your

organization alone may not be so great that some economies bring financial benefits, but

by working with another organization or several organizations, you are so great that the

use of these benefits. In the cloud group, multi-tenancy support and maintenance

activities also gives you the possibility of sharing.


Cloud Computing
Basics 79 

Cons
There are potential drawbacks to implementing a cloud. Every time
you have several agencies that work together, there is a possibility
of conflict. Steps to Pyshkyry of this should be taken into account.

-1 ownership
Ownership in the implementation of cloud group should be clearly defined. If you put

together several organizations to provide infrastructure, you should reject

agreements for condominium set. In some cases, organizations are put together to

create a cloud that may establish a joint organization can own the resources.

responsibilities
In the cloud teamwork, responsibility is shared between the organizations.

Problems may arise in that everyone is responsible for what, but later it turned

out, it is quite Mzayamnd. This reduces the management of any organization.

Security considerations
Clouds group a certain set about because several organizations
that are providing security and access control environment.

data
In the cloud group, all participants in the group have access to the
data. For this reason, you do not want to save your data that is limited
to your organization. If so what problems may arise for you.

Conformity
In the cloud group, any organization that is somewhat familiar with compliance
regulations, is responsible for it.
 82 The Basics of Cloud Computing

Audit
In the cloud group, member organizations have access to all
applications and systems are shared. You may reject agreements
to specify that anyone should ask what activities they do.

Hybrid Clouds
With full cloud computing over time, hybrid clouds will become the most common
cloud implementation. Partial false impression that there is the hybrid cloud. Many
people think that hybrid cloud is a cloud environment that some elements are private
and others are public. This is incorrect. A hybrid cloud environment, it can see in
Figure 2.0, cloud where several separate cloud environment are connected
together. Hybrid clouds freedom to implement whatever is necessary to meet the

needs of your organization. But the clouds can be very expensive and complicated
to implement.

Figure 1-4 combination or hybrid cloud environment


Cloud Computing
Basics 81 

Advantages
Alh on the benefits achieved through each cloud, hybrid cloud model also finding
increasing flexibility. If your ultimate goal is to move everything provider public cloud,
hybrid cloud allows you to move to a cloud environment in which you have to
Mvmykrdn something until they're not. You may note that the proposed program for
its public service is expensive. You can use this app to keep internally as long as the
cost is reduced. You may also have concerns about the security of public cloud
providers have a number of specific data. Hybrid cloud model allows you to store the
data internally until you make sure it is secure in the public cloud environment.
Many organizations use a hybrid cloud model because the model fault tolerance

and high availability is. You can set certain apps that are in the environment. In this

case, if an environment with criticism, you still have access to the program.

Cons
A hybrid cloud environment can be complex to implement Bashd.malhzat
environment varies according to what you want to implement cloud there.
The whole process and rules will be applied to all environments. You have
different settings for each environment to develop rules and procedures.

-1 Integration
There may be applications that require the same data. In this case, you
have one of the following choices: you can either copy the data to prepare,
that you are required to set up some mechanisms of replication to keep data
synchronized, or you can just data to be transferred . Transfer data in a
cloud environment problems, and you should be concerned about
bandwidth limitations.
 80 The Basics of Cloud Computing

Security considerations
Security considerations specific hybrid clouds. You should not only be

concerned about security issues but must also be concerned about the

problems caused by connecting multiple environments.

data
Moving data in cloud environments is very dangerous. You must
make sure that all areas are satisfactory safety data involved. Data
that is constantly moving its safety is difficult. Both sides of a
relationship must apply the same security protocols, and must be
compatible.

Audit
Audit hybrid cloud environments is difficult. User access to internal and
external changes. Following a process from beginning to end may take you
to the internal and external systems. You must have relevant events so that
you can adapt these events at home and abroad together.

Summary
NISTCloud deployment model has four express public, private, and hybrid group.

Public clouds are open to the public. Private clouds are specific to an organization.

Several shared by a corporate group clouds. Hybrid cloud environments to create a

mix of cloud-based models. Each model has advantages, problems, and security

implications of its own.


Cloud Computing
Basics 84 

Season 0.4 Cloud service models

• This season:
 Software as a Service) Rental software (

 Platform as a Service) platform hire (

 Infrastructure as a Service) Rental infrastructure
(

 Other service models

Introduction
According to the definition of the National Institute of Standards and Technology)NIST(Clear,

three cloud service Home there: software as a service, platform as a service and infrastructure

as a service. But one thing should not be forgotten and that is that since we are the provider

service are handled, should everything be negotiated . change existing services and new

services to meet the needs of the client's existing moderated collection. and with the growth of

cloud markets, must have knowledge of the new services. We offer some of these services

covered in this article. the service model parameters

‫ و‬Has its own unique characteristics. Figure 3.0 shows an overview of related services to the

computer. Each service model, we see them again breaks down the entire stack.

Software as a Service
Many people SaaSKnow the original cloud model. ModelSaaS Similar to the service

provider program.)ASP(But there are some key differences exist. First, the

modelASP
 83 The Basics of Cloud Computing

Most software programs client / server, respectively. Some of client and


specific infrastructures are often required to access programs. But most
programsSaaSToday's web-based and does not require access to the
program. This will simplify the process of accessing the Application. In
addition, the modelASPCustomers often have access to the same programs,
partitions relatively simple program.

Figure 1-3 stack of a computer-based services

Specification SaaS
Depending on the provider and the services offered, the specification may be

different, but here we will cover a number of popular features.


Cloud Computing
Basics 85 

Figure 0-3 services SaaS

Customization
With implementation SaaS, Service provider often Hmhchyr virtual control program. In many

cases, it is not limited to any customization that can be done. But depending on the

implementation, you may be able to request that the user interface is slightly changed. Most of

the major changes is not possible. In most cases, the customer is not able to make changes,

the provider must make changes. In the environmentSaaSThe possibility of customization can

be very costly for the service provider and the customer. Allows extensive customization

means hosting a separate instance of the application is only for a specific customer. Having

Customization
 86 The Basics of Cloud Computing

Extensive can create problems when upgrading the software. Chances


are high that the customizations when upgrading wiped out. Then again
be created by the customer or the provider. This will take time and cost a
lot.

Support and maintenance


In the environment SaaS, Software upgrades centralized and performed by the service

provider. You do not have to worry about upgrading the software on multiple client. Focused

upgrades allow upgrades to occur more frequently, they are able to fast delivery. Exception to

this rule is when the client software that is used to access centralized applications. But

ProvidersSaaSIn an attempt to access their apps without having to program the client. Focused

upgrades will lead to a problem. When a provider chooses the time to upgrade, you do not

have any help in this case. First, if there is downtime associated with the upgrade, you have to

accept it. In addition, the upgrade may require more user training, so you train your users. The

building is damaged or cut.

analysis
Usage statistics and analyzes valuable information about the use of the program
can be used. In implementationsSaaSCheap ability to see user activity and

determine the trend. For large organizations, this information can be valuable. Since

most cloud environments offer pay-per entry, it is important to understand user

trends. Understanding consumer trends and consequently increasing the cost

increases. Further, it is important to understand the overall consumption and at the

same time. You may be able to reduce the license fee.

Integration
At SaaS, A provider of data stored on the site. In most cases, the client does not have

direct access to the data. This is problematic when reporting and business intelligence. If
you need to repair or manual data re-load or load your data is also problematic. In some

cases, you can not do anything about it. In some implementations you
Cloud Computing
Basics 87 

The ability to move data and transfer them between SaaSAnd your internal enterprise

systems. When this type of operation, you should note bandwidth that is used. In these

cases you must pay costs to the service provider and Internet Service Provider.

responsibilities
In implementations SaaS, More responsibility service provider's neck. This is
one reason that implementationsSaaSIt is famous. Internal resources,
organizations are able to liberate and to do other activities. Figure 3.2 you
an idea about the overall responsibility of the service provider and customer
responsibilities.
Figure 4-3 Responsibilities SaaS
 88 The Basics of Cloud Computing

In the environment SaaSDeals generally responsible for everything except the


client systems. It makes sure that the program is up to date. Makes sure that

the program is properly assemble31Is. Makes sure that data stored well. The

efficiency of the system and make any adjustments that are needed for control.
In the environmentSaaS, The customer is responsible for client systems. The
customer must ensure that client programSaaSConnections. All the necessary
software must be installed on the client system. Client systems must be
improved at an appropriate level.

Drivers SaaS
Lot of drivers in the development of proposals SaaSGeneral participated. Strong
growth in the creation and consumption of Web-based applications there. More
presentations donorsSaaSOffer their services for web-based applications. The
growing acceptance of web-based applications, servicesSaaSAlso accepted.
See how the program has changed as well as quality and convenience in
application development is also being developed. Full getting older platforms
and the introduction of new platforms diversity of many tools you can use to
build web applications Grfthshvd has created strong. Some of these
toolsHTML2,JavaScript, CSS, Ruby on Rails And PHP are.

challenges SaaS
Although SaaS The most famous cloud service model, but still challenges in
SaaSThere is. ProvidersSaaS Many of these challenges and concerns have
been unable to solve this, but there are still challenges, which is described
in the following sections.

Places) positions (different


Programs SaaSAre in a foreign locale. This means that communication between the client and

the application must be made over the public internet, sometimes the path is long. It's far
40
patch
Cloud Computing
Basics 89 

Delays in the development of environment. This is a limiting factor for


some applications. Some programs are needed to respond in
milliseconds. These programs do not work in environments where
there is a long delay.

Multitenant
Multi-tenancy is causing problems. Since the program is shared, generally a little
customization is accomplished. If your organization requires extensive customization,
this could be a problem. Maybe you should select internal program.

Multitenant also lead to security issues as well. Because customers


have access to an instance of the program, and the program may allow
a client to achieve other customer data. ProvidersSaaSAre aware of this
problem and fix it there in case.

Other security challenges


One of the biggest concerns that organizations SaaSThere is about data security.

Employees provider of direct access to the systems that were in them. One way to

reduce this level of data protection software. You may need to encrypt your data.

Therefore, it is possible to read data by preventing employees.

Providers SaaS
Providers SaaSThere are many. Here we examine some of them.

Outlook.com
Web-based email is one of the proposals SaaSit is famous. Web-based email providers for a

long time many have suggested. More deals offer free and paid services.Outlook.com Figure

3-3 shows an email client Microsoft's successor Hotmail And Live MailIs. An

emailOutlook.comDefault is free. But if you need the advanced features that include

advertising, you have to upgrade your email account. This by selecting the icongear In the

upper right corner and select


 92 The Basics of Cloud Computing

More Options MailIs possible. Options screenInbox In the figure) 2-3


(shown will appear. Here you an option to upgrade Ad-free OutlookYou.
This takes you to the Microsoft website, where you can have access to
version upgrades of the program.

Google drive
Google drive In the figure) 1-3 (shown, giving you online access to see and create

word processing documents, readings, lectures and a number of other documents.

You can type a document built-inUse or add a new type. To add new document

types,Creat Choose (left) and Connect More AppsChoose. This pageConnect Apps

Bring the figure) 1-3 (is.

Figure 3-3 Outlook email


Cloud Computing
Basics 91 

Figure 5-3 Outlook email inbox options

Shape google Docs : 6-3


 90 The Basics of Cloud Computing

Figure 1-3 Connection window Program

Salesforce.com

Salesforce.comCustomer relationship management program that is known to business

system processes related to personnel, finance and send. ProgramCRMIs a set of

workflows with software to help manage activity and customer information. These

activities may be related to the sale), such as the use of customer information to create a

guide to the future (marketing) such as sales data to develop sales strategy (or

Frahmszay better customer service.Salesforce.com the list


Cloud Computing
Basics 94 

This activity creates comprehensive features for all three types. In


this section the propertiesSalesforce.com For customer support as a
case study in SaaSFocused. Understand a feature
Before a business can Salesforce.com Use a little adjustment phase that business users
can Salesforce.comCustomize it to suit their business needs. The first includes defining
AccountSalesforce.comIs. Second, the system administrator must be current customer
dataSalesforce.com Transfer, some screens Salesforce.comTo customize, and getting
access to appropriate screens define the business is to operate. The following
description details have not mentioned these settings and assumes that the
configuration was required.
After the portal Salesforce.com Was created, customer support representatives can log in to the

web page and call center30 Go) in the figure)E3-0 is shown. This page contains functions for

managing customer requests, such as recording customer calls, to make the case for support

personnel and search for solutions. This web page includes a number of fever. Shape )E3-0

(fever shows that this support representative to track and manage customer complaints helps.

Visible web page allows us to search for a specific item catalog, or search for one that recently

happened, generate reports, such as total number of cases and more efficient. toolsMass

EmailAllows us to send an email to the email ID that is relevant to the case. The default fields

incentives one can click onCreate New barBe seen to the left of the web page. The bay opens a

page) Figure))E3-0 (which can be used by support personnel. FieldsContact Name

‫ و‬Account Name Can by searching the database. Contacts And AccountsBe


found. Many of these fields, for example,Priority And Case Origin, Values
that are selected from a menu. AtSalesforce.com This picklist ) List (say.
Additional fields can be added to the record by the director, so customize
the page to suit the needs of each company.

41
Call Center Web page
 93 The Basics of Cloud Computing

Attention: For performance testing, The websites


www.salesforce.com And to register free account.

Shape Salesforce.com :(E3-0)

The other tabs are on the page includes interesting functions to manage calls from
employees to customers efficiently. For example, feverSolutionAccess to the
database which contains current solutions for customer Msalhhay is high. The
database is searchable, and allows employees to quickly resolve customer
Msalhhay. The full list of tabs by clicking on the icon"+"To find out more. The
administrator can view the tabs on each page. Web marketing and sales, including
sales and marketing functions efficiently. And such as are call center. In addition,
pagesCommunity And Salesforce Chatter WebTake messaging, forums and other
types of cooperation between the member. We can see that the general business
application program interface is designed for use in a business and thus can be
Sfarshysazay.
Fever Add App Exchange App )Shape )E3-3 enables users to develop

performanceSalesforce.comhe does. portalAppExchange And fever Create New App

Allows users to create new applications and download them free and purchase
through AppExchangeSuggests. Access the tabs can be controlled by the

administrator. Properties
Cloud Computing
Basics 95 

The advanced platform using the link Vannd Force.com Are


available, which is described in the next section.
When a new item is created, it can be the IDClick to get you the details. The page also

contains fields for assigning work to an organization, set deadlines and so on. We do not

have to always enter them manually.Salesforce.comFeatures for Creating cases

automatically from the web. To create automatic self-service from a web page,

administrator can create a web script that usingSalesforce.comThe advanced features to

help customer support representatives is carried out. For example, cases can be

developed to automatically extract fields from the mail client. Also features for software

support, teams consisting of employees with different roles, create a dynasty. Details of

these advanced features can be found at the following

link:https://na2.salesforce.com/help/doc/user_ed.jsp?loc=help

Shape :(E3-0) New Sample PageSalesforce.com

Customization Salesforce.com
 96 The Basics of Cloud Computing

Information on the standard features and web pages Salesforce.comTalked. However,

businesses tend to customizeSalesforce.comIt is appropriate to their business processes.

This feature is very important for multi-tenant support programSaaSIs. Khalshay detail

and provided an important customizations are provided below.

Shape : (E3-2 ) The new task page Salesforce.com

Note: Customization Program

  Change the name of the field


  Set the condition to update fields
  Setting conditions for alerts to email
 Customization UI
Cloud Computing
Basics 97 

Shape :E3-3 StoreSalesforce.com

As previously stated, Salesforce.com Businesses to rename fields Salesforce.comIt is also

possible to add specific fields to the catalog. For example, businesses can add fields to a

certain stagnation in Fig.(E3-0)It has been shown that these data to track business is

unique. Fields such as product field, throughpicklistElected, can be the product code.

Workflows) business processes (inSalesforce.comRecorded by a series of rules. For

example, the choice of law)assignment rules(Shown in Fig.(E3-0) For automatic

assignment
 98 The Basics of Cloud Computing

Is about to representatives backup. Updatingassignment rules, Current customers can be


offered to business needs. There are other laws that can be implemented:

0.0 Email alert) that under certain conditions it sends e-mail alerts (
0.0 Updated fields) is, for example, when the contact has expired (

2. Outgoing messages), for example, send a message to the


financial system when an invoice has been approved (

Details
https://login.salesforce.com/help/doc/en/creating_workflow_rules.htm
Is visible.
Finally, administrators and users can customize the application's user interface. This
includes items such as the placement of text and graphics content, name and
number of tabs on each page, and the page layout. The administrator can also allow
employees to customize their personal visions Bdhd.jzyyat more abouthttps: //
na2.salesforce.com / help / doc / user_ed.jsp? loc = help Is. A programSaaS Another
performance like Salesforce.com Is Suger CRMWhich is open source. Comparing
these two software article

http://www.salesforce.com/ap/form/sem/why_salesforce:ondemand.jsp?d
= 11021111111EN0GandDCMP = KNC-Googleandkeyword =
sugar01%CRMandadused = 0213230012andgclid =
CNfqoLK0uaQCFc2R1wod_R2TbQ Is placed.

Platform as a Service
PaaSService whereby customers to use the platform for their computing needs. In most cases,

this platform is used for development. Depending on the provider, the development platform

processing system or a complete development platform, including web servers and


Cloud Computing
Basics 99 

Libraries development. Figure 3.2 provider services that you


canSaaS Expresses expect.

Specification PaaS
Implementations PaaS Organizations to create and deploy web applications without

Zyrsakhtshan to the catalog. PaaSGenerally Sadhsazyhayy for the development,

integration and test renders. Here we have some of these features in the

environmentPaaSIt is our cover. Prior to this, we must first understand the

environmentSaaSwhat will happen. When an organization implementsPaaSChooses,

some apps and services will also be implemented on the platform. Public providers

control over how the service or the quality of the program or not. In many development

deals and offers additional services, which help to deployment.


Figure 8-3 PaaS services
 122 Cloud Computing Fundamentals

Customization

With PaaS, You will have full control over apps, so you can customize them. The

development platform you may not be able to create a lot of changes. In most

cases, this platform is strictly controlled by the provider. Perhaps there are other

configuration options you can set, but customization is limited.

analysis
Since you, the customer, will create programs, you have the ability to see how
plans and determine trends. You will be able to see the elements which are the
most frequently used and which are not, you will be. In the environmentPaaSYou
also have access to the platform. You will be able to determine when a new
system is added to handle the load. Most providers allow you to rotate the new
systems when the current system to the brink of their time has come.

Integration
In the environment PaaS, A provider of data stored on the site, but the client has direct

access to it. Business Intelligence and Reporting Administration should issue from the

perspective of the access point because you may have high levels of data between its

internal environment and the move deals. Therefore raises concern as to efficiency and

access performance concerns are the opposite.

Responsibilities PaaS
On offer PaaS, Somewhat responsibilities between the service provider and the customer

distribution) form.) 3.2 deals in platform development and take into consideration everything

on it.PaaSClient is generally responsible for everything in the operating system and

development platform. You're responsible for the installation and maintenance of additional

applications that need. This includes Vslhkrdn program and control program. Platform

database may be provided to you, but you are responsible for data
Cloud Computing
Basics 121 

Are. In implementationPaaS, You have direct access to the data. If there is a

problem with the data, you're able to implement a repair directly.

Drivers PaaS
There are many drivers of market growth PaaSHave been affected. Many
organizations want to go to the public cloud model, but not the
serviceSaaSGeneral proposed that the program needed to find them.
ModelPaaS Allowing them to move out of the data center infrastructure
and platforms that allow them to develop while the internal is needed.

Figure 9-3 PaaS responsibilities


 120 Cloud Computing Fundamentals

challenges PaaS
Challenges in environment PaaS There is a public, including
flexibility and security issues.

Flexibility Challenges
You may find difficulties in platform provider that you need to have Bashyd.byshtr

Providers PaaSProposals to restrict certain platform configurations. If you need

special configuration or special configuration, you are able to find a provider that will

not be something that you want to offer.

Security challenges
Pltfm management control deals on the operating system and the database. As a

provider of direct access to the system, they have direct access to all applications and

data.

Providers PaaS
A number of providers PaaSThe market will continue to grow. First we look
at the
windows Azure There.

windows Azure
windows Azure Figure 3-01 shown, the first proposalsPaaS On the market.
windows Azure Offers free of charge upgrade that features such as SLAOffers
increased. windows Azure Turning a website or development platform is very
simple. windows Azure Including extensive options such as computing services,
data services, services app And service network.
Cloud Computing
Basics 124 

The Windows Azuro: 12-3

Engine Google App


Engine Google App A solution PaaS That enable users to host their applications on the

same infrastructure as Google Docs, Google Maps, And Google's other popular services.
AsMicrodoft Azure Platform to build applications .Net Provides the engine of development

and hosting applications written with Java, Python, And other new languages30Makes

sure. The platform also supports Java Virtual Machine implementation time as well as
other languages, such asJruby)Rhino( JavaScript And .ScalaThe engine can run hosted

app and extensible memory, just like Google products. The distributed storage platform
to establish replication and load balancing client requests. It can be easily developed
using the YkparchhsazyshdhyEclipseOccur. This section examines the platform simple to

do and gives you the key points.

42
http://golang.org/doc/go_tutorial.html.
 123 Cloud Computing Fundamentals

Beginning
Step-by-step instructions for using the Google engine App Is described here,
that these processes on the basis of this book are available.32 First, the
developer will register that use GmailIs performed. ShapeE3-2 shows the
first screening when the application is configured.
Engine Google AppThe newly developed program that allows the developer to be
served to their domain. For example, if the developermyapp As a program is
selected, the program http://myapp.appspot.com to serve The URL can be taken either
publicly or selectively with small groups of members to be shared. Any developer can
program 01 to provide free hosting with 211MB memory definition. The developer must
face to memory and bandwidth sources used by the program beyond the limits of the grant.
Simple dashboard that shows metrics for each program can be seen on the portal, a screen of
the .E3-1

Note: the engine of development Google App


0.0 Download SDK
0. create " Web Application Project " new
2. Configuration Program
3. Code development
2. Tests on the engine App Simulated
1. Deployment Engine Google App

Developing an engine Google App


For Java application development, software development kits Engine AppMust

be installed. SDK A plug Eclipse A) a)E3-1 which includes the creation, testing

and deployment environment and inhttp:

//dl.google.com.eclipse/plugin/2.xAvailable. To start a new project

43
http://code.google.com/appengine/.
Cloud Computing
Basics 125 

As a project to create a web application, right-click the project name Google Select

IDEnter a valid plan for the project. After developing the program, we need an ID

during deploymentAppFor our program. For the establishment of the engineApp,

Such as the creation of the program, right click on the project name and select

Deploy to App Engine To choose from, and the engine App Upload and deployment

increases.

Shape :E3-Google App Engine 5: Configuration Program


 126 Cloud Computing Fundamentals

Shape : E3-6 dashboard app for Google App Engine

Shape :E3-7 plugEclipse Google App Engine


Cloud Computing
Basics 127 

Another interesting option in the application configuration, the option of creating a Google Web

Toolkit)GWT( Is.GWT Generally allows you to create interactive programs with the possibility

drag And dropPuts a graphical interface to create new custom. The tool then automatically

optionUI To JavaScript AJAX Convert to access logic servant33The server is called. Note that

JavaScript runs inside a browser andAJAXGhyrblvk out a way to provide access to the

minister, the overall effect is good experience in response to an interactive application. A

skeleton code forGWT Caused by using the following command:

webAppCreator -out myFirstApp com.cloudbook.myFirstApp

The developer can also option Generate GWT Sample Code During the development

of the program that is to create projects Czech welcome) Figure)E3-2. If this option

is not checked, we can codeservlet Write it on your Java engine AppPut. Therefore,

any application written in Java can be certain the engineApp Be.

44
backend
 128 Cloud Computing Fundamentals

Shape :E3-8 Google App Engine application deployment

SDKAlong with a local web server for testing deployment. The local Web
server runtime environment safesandbox Engine AppWith limited access to
basic simulation of the operating system. For example, the program can
only useHTTPIs available on a particular port. It can not write to the file
system and can only read files that have been uploaded with the application
code. Another limitationsandbox Program, when accessing the HTTPShould
be sent response code 21. These restrictions essentially to avoid
interference with other applications is a program.

Infrastructure as a Service
IaaSCore services such as computing power, storage, networking and operating systems

provide. Then you can create your own environment at the top of the sources) form.) 00-

3 providerIaaSHardware resources, such as servers as well as for you. These servers are

in a data center provider, but you have direct access to them. Then you can install

anything you want on that server. The high cost is because the provider is not able to

make use of multi-tenancy. Therefore, customers should analyze all costs.


Cloud Computing
Basics 129 

Figure 11-3 Service IaaS

A common model for the presenter IaaSThis is beyond your virtual machine and

provide you anything you feel you can install on the virtual machine. These virtual
machines canWindows, Linux, And other operating systems to run. Because

virtualization are able to take advantage of multi-tenant provider. The system is on a

physical hardware hosting many customers. They can greatly increase their

capacity. And reduces costs.


 112 Cloud Computing Fundamentals

responsibilities
The establishment IaaSThe customer is responsible for the environment) shape.)
3.00 provider responsible for the hypervisor and below it. This includes physical
hardware, storage, and network. Is stored in the data center physical hardware
provider. But the customer has full access to it.

Customer is responsible for detailed things such as operating system


and application maintenance. However, it should be considered special
cases, such as antivirus. The customer is responsible for ensuring that
the system has antivirus update.
Figure 10.3 RESPONSIBILITIES IaaS
Cloud Computing
Basics 111 

Drivers
Many organizations IaaSTo expand their capacity. Instead of spending a lot for the

development of the data center and creating a new data center, organizations that rent

systems providerIaaShas been prepared. Some organizations only on certain conditions

require increased capacity. For this reason, they do not want to pay for expensive

permanent solutions.

Challenges
Challenges in IaaSThere is. Many organizations see the benefits, but they are

worried about losing control. The total cost could be a problem. In many

environmentsIaaS, You cost effective use of resources, such as CPU and memory to

you.

Security challenges
Security challenges for environment IaaSThe service provider is like other challenges.

However, since the provider does not have access to the actual operating system) at a

higher level (for they do not need to have a managed account on the system. This

makes it more secure.

Providers IaaS
Providers IaaSGrowing position in the market and their impact is
increasing. In addition to the demand platformsIaaS As CloudStack
And OpenStackTo create automation and systems have been
developed. Here are two providersIaaS We cover famous, Amazon
EC0.Rackspace

Elastic or flexible cloud computing Amazon)EC2 ( 45


Another important IaaSIs calculated as a service, which will offer computing resources as a

service. Of course, for an offer efficient computing as a service, the possibility of connecting

the tank

45
Amazon Elastic Compute Cloud
 110 Cloud Computing Fundamentals

The computing service there) so that results can be stable (. Network virtual is also
needed so as to communicate with the sample computing there. All this together
infrastructure as a service creates. Cloud computing reactionary Amazon, which is
one of the recommendations is known in computing as a service, a simple example
that shows how the proposal StaaSAmazon to create portals that customers can

share their books to be used. Finally, we have an example that illustrates advanced
featuresEC0.

Check EC0 Amazon


EC0 Amazon corporations to define the virtual server, the virtual networking with
‫ و‬Virtual tank. Companies can be very large computing needs, some programs may

be focused on computing, and other programs focused on the tank. Apps particular

company may require certain software environments; other applications to

computational clusters need to run efficiently. Networking needs may also be high.

The variety of computing hardware, along with maintenance and ability to manage
scale,EC0 has a unique platform.

Shape :E3-9 consoleAWS


Cloud Computing
Basics 114 

Shape :E3-12 Create sampleEC0 Using the ConsoleAWS

Access to EC0 Using the ConsoleAWS


As S2,EC0 can be accessed via web services such as Amazon's.http://aws.amazon.com/console

Shape E3.2 represents the dashboard consoleECIs 0,That can be used to create a template,

check the user samples, and even terminate a sample to be used. Click onLaunch Instance

Screen user is shown in Fig. E3-01's, where a set of operating system images supported) or

an Amazon Machine ImagesAMIs Called (for selection is shown. When an image is selected,

the wizard sample EC0 to help set up more options to the user, for example, appears, like the

version of the kernelOSSpecifically for use. Then the user should have at least a pair of keys -

a cause for secure connection to the sample to generate a key pair and follow the instructions

to save the file. The key user can also occur when the user is abundant evidence
 113 Cloud Computing Fundamentals

Reuse) using the username and password for access to a car is


the same as (.
The security groups, for example, can be used to ensure that the required ports are open
or bulk) for example (to be adjusted. For example, the configuration Web ServerPort 21 is

enabled. Advanced firewall rules can be applied. The last screening before the launch of
the sample shown in Fig.E3-Is 00. Set up Sample NameDNSPublic that the user can use

to log in automatically if the cloud server and client machines in a network. For example,
to start using Linux client, the user of the directory where the file is stored on the key will
enter the following command. After several confirmation page, the user enters the car to
use Linux commands. For root access, users must commandSudo use.

ssh -i my_keypair.pem ec0-11-010-10- 000.compute-0.amazonaws.com


For Windows, the user must file my_keypair.pem Unlock button Get
Windows Password That the sample page AWSThere are not used.
Password management console that can be used to connect to the
sample using a remote desktop application used to back) oftenStart->
All Programs -> Accessories -> Remote Desktop Connection Is (.

Shape :E3-11 samples wizard toEC0


Cloud Computing
Basics 115 

Shape :E3-00 parameters that can be used to sampleEC0 activated

Access to EC0 using the command line tools31


Amazon also providing a command-line interface for EC0 is theEC0 API To
implement certain operations that can console AWSDo not use it. The following
briefly describes how to set up and install the server command line. More detail on
computing user guidance calculation of reactionary Amazon31Is. Details command

line command line tools in the cloud computing reference reactionary Amazon32 Is.

Note: Install Command Line Tools EC0

  Download Tool
 Setting environment variables) for example, location)JRE

46
Command-Line
47
http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/
48
http://docs.amazonwebservices.com/AWSEC2/latest/CommandLineReference/
 116 Cloud Computing Fundamentals

  Set the security environment) For example, the credit (


 Zone
Setting environment variables
The first command environment variable regulator that signified the directory that it
creates Java) during execution (. PATHNAME The full name of the directory path to
the file java.exeThere it is. The second command specifies the directory where
toolsEC0 areTOOLS_PATHNAME The full path to the directory. ec0-api-tools-AB-
nnn In which tools have been decompress. A( AndB And nnn Dyjtalhayy who are
different based on the version used (. Third applicable route command to add the
directory where the command Tools EC0 Sets are shown.

For Linux:

$ Export JAVA_HOME = PATHNAME


$ export EC0_TOOLS = TOOLS_PATHNAME
$ Export PATH = $ PATH: $ EC0_HOME / bin
For Windows:
C: \> SET JAVA_HOME = PATHNAME
C: \> SET EC0_TOOLS = TOOLS_PATHNAME
C: \> SET PATH =% PATH%,% EC0_HOME% \ bin

Set the security environment: Next set of command-line environment so that

service can be validated during each iteration. To do this, you need to download
RatingsX.212 and a private key that requestsHTTP Amazon is for validation. X.212
can click on the linkAccount In Fig. E3.2 has been shown to be downloaded, then

click on the linkSecurity Credentials,And follow the instructions to create a new


account. Credit files to the directory.ec0 downloaded) in the directory)home On Linux

Linux / Unix And Windows C: \ ec0, without changing their names. Run the following

commands to set the environment should be given commands Linux and Windows.
Heref0.pem Credit file downloaded from EC0.
Cloud Computing Basics 117 

$ Export EC0-CERT = ~ / .ec0/ F0.pem


Or
C: \> set EC0-CERT = ~ / .ec0/ F0 .pem

Setting Range: It is the next step, which means the command areaEC0
interacts with, the setting-a place where virtual machinesEC0 must be created.
In summary, each area represents a data centerAWS , And pricing
AWSAccording to a different area. Orderec0-describe-regions Can be ordered at
this point for installation test tool EC0 and list used to access areas. By default
contracted areaUS-East That us-east-1, withURL Service end point http: // ec0.us-
east-0.amazonaws.com But it can be set to any end point That the use of The
following command will do that ENDPOINT_URL domain name is used for us-
east-1 it has been shown.

$ Export EC0-URL = https: // <ENDPOINT_URL>


Or
C: \> set EC0-URL = https: // <ENDPOINT_URL>

The next section explains how developers can APIOf EC0S2 To set up a web portal
established to implement simple looked like PortalPustakUse. It is important that we
understand more about the source of what is consumed and the parameters that have
been set for each source, they are described in the next section.

Computing resources EC0


In this section Khalshay computing resources available on the EC0
there.
Computational resources: Computing resources available onEC0, which gives them

samplesEC0 say, the combined computing power and resources like memory. Examples

of Amazon's computing powerEC0 measures the calculations in terms of calculationEC0.

Calculate section
 118 Cloud Computing Fundamentals

)CU( EC0 is a standardized scale computing power so that the bytes are
standardized scale tank. AEC0 CU Computing power of 0.1-0.0 GHz Processor
Opteron Or CPU XeonProvides. Therefore, if the developer a computational resource
0EC0 CU Is the question, and the source of the CPU 0.3 GHz Placed them 21% of
the CPUTake. This measure allows application developers to standard values
soCPURegardless of the physical hardware. samplesEC0 Amazon for more apps
that belong to the standard samples. Standard samples of properties in tableE3.0
shown,"A variety of standard samples. " EC0 developer can propose a
computational resource) of one of the types of samples by, for example small
calculations, the attributes shown (. Fig.E3.01 shows how we can do with the
consoleAWS let's do.

Table E3-0 standard sample types


EC0
Platform Local repository Memory Computing capacity Sample Type
20 bit 011 GB 0.1 GB A virtual cores Little
A CU
13 bit 221 GB 1/2 GB Two virtual cores, the big
Each two CU
3 virtual cores,
13 bit 0121 GB 02 GB each Very big
Which two CU

In other instances or databases available on Amazon for applications that


require a lot of memory, it is appropriate, samples that CPU Need a lot of
computing-oriented programs are examples of high-performance computer
cluster computing is appropriate, as well as for samples GPU Cluster, which
consists of graphics processing for applications HiPC That GPUNeed.
Cloud Computing
Basics 119 

software: Amazon certain standard combinations of operating system and

application software is that Amazon machine images32 are. AMI Required when

sample request EC 0 must be specified. AMIThat a sample EC0 runsAMI root )root
AMI(Called. Operating inAMIIncluding parts of Linux, including Linux Enterprise Red
Hat And SuSE, Windows Server, and SolarisIs. Available software includes
databases such asIBM DB0OracleAnd Windows SQLServer. Applications such
asHadoop, Apache, Ruby on Rails Are also available.
There are two ways for using software that AMIThere are not. Can be aAMIStandard
request and then install the required software. thisAMI Can be a AMIAvailable on
Amazon saved. Another way to insert an imageVmware As a AMI Using the command
ec0-import-instance And ec0-import-disk-imageIs. For more details you
canhttp://aws.amazon.com/ec0/ Faqs / See.

Available spaces and areas: AreasEC0 offers, such as spaces thatS2


suggests. In one area, there are several available space, that every available
space corresponding to the virtual data center is one that is isolated from other
spaces available. So the company wants samples of computingEC0 herself
inEurope Be able to " "Europe When creating samples EC0 of choices. By
creating two spaces available in two different configurations can now have
access to high error tolerance in any space is available.
Load balancing and Mqyaskrdn: EC0 reactionary load balancing provides a service that

balances the load among multiple servers. The default load balancing policy is such that

independent throughout the requests. Load balancing can also increase or decrease the

number of servers, which depending on the load. It is also used as a policy failure, because

failure looked server

49
Amazon Machine Images (AMIs)
 102 Cloud Computing Fundamentals

Elastic load balancing is discovered. If left on the server load is high, elastic
load balancer can set up a new server instance.
Note: storage EC0

  S2 Amazon store objects with high access


  Service Bulk Stretch: Sustainable bulk tank
 Tank examples: bulk tank fleeting
Storage:EC0As mentioned earlier, computing resources and network resources can

‫ و‬Tank used. Using filesS2, such as access to the serverHTTPIs. However, most
programs do multiple disks Mydd input and output, and for efficiency or other
reasons, we should have control over the configuration repository. In this section we
describe how the resources can think physical disks to the serverEC0 configuration
are we) called bulk storage resources (. There are two types of bulk storage: service
resiliency and bulk tank samples.

Bulk Service reactionary :)EBS(


The same way S2 provides file storage service,EBS Also for bulk storage service
EC0 provides. On a volume of disk sizeEBS Provided the volume to one or several
of EC0 Ayndkskrd the use ofIDDuring the development of the returned sample is
taken. Unlike the examplesEC0 during instantiationEC0 elected, volumeEBS
Examples EC0 independence, which the survival data will be discussed later in
detail is essential.
Tank examples: Each sampleEC0 a local repository that can be configured as part of a

computational resource) Figure)E3:01, which refers to the sample reservoir. TableE3.0

partitioning default associated with each sample reservoirEC0 standard for the type of

show. The short-term sample storage21 As long as the sample-the EC0 There also exist

and can eachEC0 Ayndksshvd. In addition, if the sampleEC0 end, the sample reservoir to

a halt

50
ephemeral
Cloud Computing
Basics 101 

A. To overcome this limitation, the developer canEBS Or S2 for the


reservoir sustainable use and sharing.

Table : E3-2 Comparison of sample


reservoirEBS
Tank
Reservoir EBS examples
create
Independent samples When the sample EC0
EC0 It is created automatically,
Has been created.
Is formed. Sharing
Can be between samples You can sample EC0 of
EC0 Which formed Is
To be shared.
Indexed.
By default, the sample By default, the sample Annex
Of EC0 not indexed Of S2 is indexed and
Would be examples
EBS
Is. Also Durability
Ayndksshvd.
Examp
Is not fixed, if le Snap Shot
Even if the sample EC0 expires,
EC0 also terminates
End, is fixed.
Will.
Can S2 Snap Shot Can S2 Snap Shot
Be. Be.
Example AMI, Configuration files, and each file can be viable S2 saved, and
during processing, snapshot data may be used for some time andS2 sent. If you
need to share data. This can be accomplished through files stored inS2 done. A
tankEBS Can be attached to an arbitrary sample.
Table E3.0 Some of the main differences and similarities between the two types
summarizes the tank.
 100 Cloud Computing Fundamentals

Examples of supported by S4 in the samples supported byEBS


EC0 of computing and storage resources that belong to the rootAMI For example in
Amazon S2 or reactionary bulk services Amazon is stored. The samplesS2-backed
And EBS-backedCalled. In a sampleS2-backedRoots AMI At S2 is stored, it's file
repository. Hence it should be rooted device in caseEC0 before the sampleEC0 to
boot, to be copied. However, because the sample reservoir is not permanent, any
changes made on samplesS2-backedDevelop, will not be sustainable beyond the
lifetime of the sample. In addition, since the sample reservoir defaults to a
sampleS2-backed Is joined, by default the repository samples to samples EBS-backed
Attachments will not be published.

Networking resources EC0


In addition to computing and storage resources, networking resources for programs are

needed. For networking between samplesEC0EC0 offers public and private addresses. It

is also a servicesDNS To manage names DNS Associated with these addresses

IPSuggests. Access to these addressesIPIs controlled by policies. Virtual private cloud to

provide secure communication between intranet and networkEC0 items. It is quite

reasonable, we can create subnets, and it's creating firewall rules show itself. An

interesting feature of otherEC0 AddressesIPReactionary, which is independent of the

sample, this feature can be used to support server failure. And advanced features that

are used to adjust how the network will be listed in the next section.

Note: networking EC0

  Addresses IP For each sample of public and private


  Addresses IP Reactionary unrelated cases
 Routing DNS 22 URLEnables simple) for
example)www.mywebsite.com

 Security groups for networking security policy
Cloud Computing
Basics 104 

Sample addresses: Each sampleEC0 of addressIP That is connected to:


addressIP Public addressIPPrivate. AddressIP Private and name DNS Can
only be in the cloud EC0 resolved. For communication between
samplesEC0 addressesIPInterior efficient, because the message when it is
sent entirely to Amazon's network. AddressIP General and name DNS Can
be used to communicate outside the Amazon cloud.
Addresses IP Stretch: AddressesIP But independent of the samples associated
with the accountEC0 certain Amazon and can be assigned dynamically to each
sample. Therefore, to implementfailoverAre useful. As a result of the failure of a
sampleEC 0, address IP Rebound can dynamically sample EC0 be assigned.
Contrary addressesIP Sample addresses IP Reactionary automatically allocated;
they occur in the time required.
Routing :54Companies may be interested in creating a Uniform Resource
Location)URL(Forwww.myenterprise.com For example EC0 are. thisBy default
possible Not because samples EC0 in fieldAmazon.comAre. Routing Server
22DNS That can be used to Communicating IP Reactionary or address IP
General name for www.myenterprise.com Be used.
Security groups: For network security, define security policies is a common networking

ports through which any machine that may be available orIPAddresses that can restrict

access to the server. This can for exampleEC0 using security groups used, briefly

mentioned previously. Each security group is a set of network security policies. Different

security groups must be created for a variety of different servers, for example, Web

server security groups can determine who is open port 21 for incoming connections. The

default security group, in setting an exampleECThe samples can connect any address IP

But does not allow incoming connections to external.

Virtual private cloud: Companies who require more control over the configuration
of your network, they can use a virtual private cloud. Examples of advanced
networking features byVPCWhat is proposed is as follows:
 The ability to assign addresses IP Public and private samples from
each address range
 103 Cloud Computing Fundamentals

 The ability to divide and control the routing between the network and
subnet addresses

 The ability to connect to the network EC0 with an intranet using the
tunnelVPN
the details VPCBeyond the scope of this book can be found in the
Amazon Virtual Private Cloud20 find.
A simple example:EC0 Set up a web server
All the terms and concepts described in the previous section we discussed
and give a simple example of creating a web server. Supported by the web
server as an exampleEBS Consequently, the tank periodically to avoid the
necessity of having Bkapgyry in S2. The process is divided into four steps:
0.0 Selection AMI For example
0.0 Instantiate EC0 and install a web server
2. Creating volume EBS For data, such as files HTML Etc
3. Set up networking and access rules
It is assumed that the required data to the web server) files HTML, Scripts
etc. (available to EC0 uploaded. In addition to showing how the software
can be customized to aAMI Standard installed, it is assumed that the web
server should also be required EC0 upload and install.
Selection :AMI Instructions for setting an exampleEC0 Using the ConsoleAWS
Previously described. The user may invoke that stage here. This phase is
described in more detail later for advanced performance.
Use the menus to select the images Amazon and the Amazon Linux Linux provides a list

of images that have been released by Amazon, which in Fig. E3-02 is shown. Here

column indicates that the device is root, root for the imageEBSOr not. Some important

parametersAMIThe description tag is the bottom half of the form. You can see an image

of a 13-bit Amazon Linux image is rooted device/ Dev / sda0EBSIs. Valuetrue Field

devices in the Balkans, flag DeleteUponTerminateIs. By clicking the buttonLaunch Setup

wizard is provided, which requires a series of operations before

51
Amazon Virtual Private Cloud, http://aws.amazon.com/vpc/
Cloud Computing
Basics 105 

Set an example EC0 carried out. However, in this case a way to


instantiateEC0 fixed with rooted devices from the consoleAWSDoes not
exist. The next section describes how a sampleEC0 with the command line
we operate.

Shape :E3-14 aAMI

Create an example examples:EC0Two other important steps


during instantiation is done as follows:
0.0 Generate a key pair that access to servers EC0 provides
that occur
0.ayjad security groups that are associated with the sample
and networking define access rules.
In our example, since that instance of the software needed to be) means that, by default, is

not installed (security group created a security group is empty, which allows access to the

network input thereto. Similarly, the security team to the possibility HTTP Change appears.
 106 Cloud Computing Fundamentals

The key pair of consoles EC0 click on the linkKey Pair Consequently, it
is according to the instructions, and file downloads) in this example,
f0.pem Called. (The following script shows how an environment variable
that EC0-PRIVATE-KEY Torque is set up so that for example EC0 is the
default key pair. For Linux:

$ Export EC0-PRIVATE-KEY = ~ / .ec0/ F0.pem $ ec0addgrp "Web


Server" -d "Security Group for Web Servers" $ ec0run ami-13f1110d
-b dev / sda0= :: false -kf0 .pem -g "Web Server"

For Windows

C: \> set EC0-PRIVATE-KEY = C: \. Ec0\ F0 .pem C: \> ec0addgrp "Web Server" -d


"Security Group for Web Servers" C: \> ec0run ami-13f1110d -b "xvda = :: false" -
kf0.pem -g "Web Server" In this example, the command ec0addgrp The shortened
version of ec0-create-group Is a security group that Web ServerIs created and
disables all external access. As previously stated, this rule later to enable
accessHTTPit will change. Then orderedec0run The shortened version of ec0-
run-instances To begin with the root volume EBSStill used. This parameterAMI ID
To AMI Selected in Fig. EIs 3.02. the amount offalse The flag -b Indicates that
the flag DeleteUponTerminate For this volume falseit is set. It is pointed out that
even if the sampleEC0 end of the volume will be deleted. Parameters-k And -
gKey pairs that are able to communicate with the sample and the sample used
for security. The number of samples must be set to 0 by default. Groups can
use a parameter-instance-countTo be determined. More details about all
Options for ECAmazon Elastic Cloud computing is 0 in reference
commands.
Cloud Computing
Basics 107 

name DNS For example, recently created from the console AWSAvailable.
Orderec0-describe-instances Can catch up DNS Basic sample is used. Ssh,
PuTTYOr desktop connections remote control can be used to enter the
sample or download software that must be installed are used. After installing
additional software, the image can beEBS As a AMI Using the command ec
0-create-instanceBe saved. ParameterinstanceId Example ID For example,
EC0, and this recipeAMI ID To EBS AMIReturns the newly created. These
steps are shown in the following script: For Linux

$ Ec0din
$ Ssh -if0.pem instance-id
$ Ec0-create-instance -n "Web Server AMI" instanceId

For Vyndrvz

C: \> ec0-describe-instances
C: \ putty
C: \> ec0-create-instance -n "Web Server AMI"instanceId.

Attach one volume EBS


Since pages HTML That the web portal is funded should be flat, have a volume
EBS For pages HTMLWhich should be used by web servers to be created.
VolumesEBS Can console EC0 click on the linkVolumesBe created. This is a list
of all volumesEBSThey have been recently provided to the user. Click on the
buttonCreate Volume Screen Fig. E3-03 provides that the size of the required
volume can be determined prior to the establishment.
New volume that is created in the form of screening Volumes Shown or form is active)

form.)E3-02 by clicking the buttonAttach Volume As well as the device name can also be

obtained xvdf( Toxvdp For Windows, / Dev / sdf to / dev / sdp For Linux (. After selecting
 108 Cloud Computing Fundamentals

Appropriate, by clicking the button AttachAyndksmyknd virtual


volume to sample. At this stage, the sampleEC0 occur, the web
server is installed, and a separate fixed tank onEBS Ayndksmyshvd.

Shape : E3-03 creates a volumeEBS

Shape :E3-02 index of a volumeEBS To sample EC0


Cloud Computing
Basics 109 

Shape :E3-16 Change a security group

Enable access to the Web server: Since the web server is ready for operation,
external access to it can now be activated. Click on the linkSecurity Groups In the
left pane of the console EC0 a list of all available security groups has been
achieved. ShapeE3-01 shows security groups available, including the newly created
groups and two groups is the default web server. Click on the tabInboundCan not
import rules that specify the type of traffic is active. ShapeE3-01 shows how the new
rules that allow traffic on port 21 provides the addresses of all the add) that
addressIP Zero is specified (. An address IP Can be used to activate a specified
address IPSet to be determined. By clicking the buttonAdd RuleThe new law added.
After all rules are added, by clicking the buttonApply Rule ChangesNew rules are
enabled. This simple web server deployment onEC0EBS Is complete.
 142 Cloud Computing Fundamentals

Other service models


As previously stated, clouds collection of service. Always providing new services for

users to create their needs. These services will lead to a new model in addition to

the traditional models. Although the number of models is another service, we are

here we only cover two models: the database as a service and desktop as a service.

Database as a Service)DbaaS(
DbaaSOrganizations to create the database platform to store their data is used. Many

providersPaaSAlso provides database services, but many of these organizations need to

develop platform; they just need a place to store data. In these cases, the optionsDbaaSIs

the perfect choice. Although storage costs have decreased, but the cost is still high. An

implementationDbaaS Platform and repository database, you need to provide a lower cost

of implementation of its interior.

Desktop as a Service
DaaSOne of the models of the new service. Generally,DaaSTo provide users a

virtual desktop that can be used for desktop computing. Companies are trying to

discover the best way to provide this type of service, and that the features and

functionality they need. One of the biggest questions is whether user-specific

desktops or desktops connected better.

Use storage) storage as a service (


Data is the lifeblood of the company. Companies have different requirements for the data,

including structured data in relational databases, powerful e-business and non-structured

Dakyvmnthayy data about processes, programs and gather your views. It is also possible to

store objects may also be required, such as a photo album online or


Cloud Computing
Basics 141 

Platform collaborative editing of documents. In addition, some data may


be confidential and should be well protected, other data must be easily
sharing. In these cases, critical business data should be secure and
available when needed hardware and software failure.
Notes: Amazon storage services

  Simple storage service :)S2 (a repository of object


  DBSimple: Tank key-value
  Relational database service :)RDS(SampleMySQL
 

Amazon's Simple Storage Service)S3 (


Amazon Web Services, the Amazon.com, A series of products have been very
popular cloud service that searches for standardization de facto To deliver IaaShave.
ShapeE3:01 screenshots fromAWS Shows the viewer products IaaS Multiple tabs is
different S2 (,EC0,.)CloudWatch Amazon SS2 there. Advanced uses ofS2 In the next
sections on AmazonEC0 is provided with an example of howAPIOf S2 can be
combined to form a solution by the developer at Amazon computing other
servicesIaaS All used.

First, an example of how we can S2 Bbnvan a simple cloud


storage is used to upload files.
access :S2 can be used in three waysS2 used. The most common
operations from the consoleAWS Done, interface GUI To AWS That
could be http: // aws.amazon.com/consoleIs available. for useS 2 In the
application, Amazon REST-ful API Has provided operations HTTP
Familiarity like GET, PUT, DELETE, And HEADhas it. The library
andSDKSuch that the operation for different languages and a summary
of the analysis as well.
 140 Cloud Computing Fundamentals

Shape :E3-17 consoleAWS

Note: The access methods S4

  Consul AWS
  RESTful API Amazon
 SDKFor Ruby And other languages
In addition, since S2 is a storage service, browsersSThere are two different
accounts that enable users to AktzafS2 of them even if the directory is also off.
There are also a number of possibilities for entering commands can also be
used batch scripts at the end of this section will be described.
Starting with:S2 Let's start first with a simple person. Suppose that a user
directory full of personal photos, and wants them in the cloud as a storage
backup. Here's how the cloud will be available at:
Cloud Computing
Basics 144 

0. To S2http: // aws.amazon.com/s2/ register. When you register, AWS Access Key


and AWS Secret Key is obtained. These are such as user ID and password that is
used to identify all transactions with Web services Amazon.

0.bh AWS Management Console via


https://console.aws.amazon.com / s2 / home Enter
2. The name and geographic location which can be a storage
bucketCreate. AtS2 All filesbucket Their storage, which shows a
set of related objects.Bucket And objects later in "Organize Data
S2, Bhakti, objects and keys." Are described.
3. Button Upload Click and go for upload instructions.

2. Images and other files are safe on S2 backup and to share withURL Are
available, if the correct permissions are provided.

From the developer perspective, this can be planned for when the
need to add this function to the program, to be carried out.

Organize data:S4Bucket, objects and keys.


Files in S2 are called objects. Referred to objects with keys - essentially a name chosen path

is based on object names. ObjectsS2 graphics are repeated over several places that this

flexible them against several failure. If versioning is enabled objects, remove and recover from

unwanted changes is possible. objectsS2 can be up to 2TB in size and there is no limit on the

number of objects that can be stored. All objectsS2 must be stored in a bucket. Grab a way to

insert related objects provide in one place

‫ و‬Separate them from other objects. Grab it could be 011 per account and an infinite

number of objects in each bucket. Each object has a key, which could be a path to

the source object in aHTTP URLto be used. For example, if the name of the

bucketjohndoe And the object key resume.doc , Then HTTP URL It http: //

s2.amazonaws.com / johndoe / resume.doc Or. http: //johndoe.s2.amazonaws.com /

resume.doc keys separated by a slash To create a naming scheme such as directory search

engines such as S2 AWS Console


 143 Cloud Computing Fundamentals

Use be. To Example We Can


URL As
http: //johndoe.s2.amazon.aws.com / project0 / file0.c ,
http: //johndoe.s2.amazon.aws.com / project0 / file 0.c and
http://johndoe.s2.amazon.aws.com / project0 / have. However, theseFiles with keys project0

/ file0.c and S2 are not a hierarchical file system. Means that the namespace 20Grab shared

the creation of a bucket with a name that is now used) by user-S2 other (not possible. Note
that entering the URL prior to a searcher as expected will not work, not only the amount of
operational but also if the actual values for the key and bucket been replaced are the result of
error "" HTTP 312 Forbidden. the lack of parameters to identify the URL the objects S2
default are private, and the request must be parameters to authenticate and identify its prove
that the applicant has the right of access to the object or the object permissions for General
de Farina. Generally, library, client, SDK, or program access key AWS and security key
AWS to calculate the signature Drkhvastdhndh identified, or the signature request S2 adds,
are used. For example, S2 Getting Started Guide in the bucket awsdocs the key S2 / latest /

s2-gsg.22 Saved from Hence it is for all http://s2.amazonaws.com/awsdocs/S2 / latest / s2-

gsg.pdf available.

52
namespace
53
anonymous
Cloud Computing
Basics 145 

Shape :E3-18 createdBucket

Shape :E3-19 update objects


 146 Cloud Computing Fundamentals

management :S2In any company, along with policies that place the Drdstrsyshan
data and who can access them and who can not be determined. Security and
compliance with local regulations, it is necessary to audit the activity log can be
enabled and disabled a user's activity to be unintentional.S2 possibilities for all these
cases, provides as follows:
Security: There are two ways users can data securityS2 to ensure. First,S2 provides

control access to objects. Users can set permissions that grant others access to objects
they see. The management consoleAWSIt can be done. Activities menu by right-clicking
on an object provides object) form.)E3-01 grant anonymous read access to the object it

can be read by anyone. For example, this is useful in dynamic content on the Web site.
This optionMake PublicIs performed on the object menu. We can also read and write
access to specific accounts is limited. For this optionPropertiesChoose and then you get

another menu that allows the user to enter a user's email Ydyhay is that they provide
access. It also is possible that grant others the same way we do things in their Bucket. A
common use for this action with the client in such a way that they can determine
Dakyvmnthayy for reform, which they later are written in a different bucket that client
authorizations to remove the document is modified.

Another method is to audit records23 Be collected. S2 allows users to turn on the entry

for a bucket provided, which in this case is stored in clear access for bucket in a different
bucket. This allows the user to see which accountAWS The objects have been achieved,

address IPAccess it happened. Sign the Management ConsoleAWS Activated)

form.)E3.00 The input can be activated while creating the bucket.

Data Protection: S2 Double feature to prevent data loss in the offer. by defaultS2

repeats the data in a storage device. It is also possible for data

54
audit log
Cloud Computing
Basics 147 

Non-critical storage decreased plugin)RRS( 22We ask. dataRRS Are


repeated twice and are designed to survive after a defeat.
It should be noted that Amazon does not guarantee consistency
between iterations, meaning that if there are three replications of
data, a program that reads a repetition of the update delay, older
versions can read the data.

Shape :E3-01 AmazonS2) Take actions on objects (


55
Reduced Redundancy Storage
 148 Cloud Computing Fundamentals

Shape : E3-01 picturesAmazon S4 bucket

Versioning56
If a bucket versioning is available, S2 automatic history of all objects in a
bucket then stores. The object can be restored to the previous version, and
even deletions can be returned again. This ensures that data is never lost
accidentally go.
Areas: For efficiency, regulatory and other reasons, it is preferable that the dataS2
in certain geographic locations run. These can be selected in the bucket through the
area where the bucket is stored during creation, be done. Area corresponding to a
large geographical area, such as America or Europe. The current list of areas on the

websiteS2.21
Large objects and multi-part uploads: Object size limits forS2 of 2 terabytes, which is

more than the amount required to save the movie 0121p HDNon-pressed. If this amount

56
Versioning
57
http://aws.amazon.com/s3
Cloud Computing
Basics 149 

Not enough, the object can be stored in small pieces and using the data in the
management program. Although AmazonS2 is a high density of available bandwidth,
but takes time to upload large objects. In addition, if the upload fails, the entire
object must be uploaded again. Multipart upload solves both of these problems.S2
providerAPIThis parallelism to speed uploads can reach the maximum. If part of the
upload fails, only that part should be repeated.S2 01111 section for each object
support.
DB Amazon's Simple: UnlikeS2 Amazon, which is file-level operations,DBA
simple interface which provides simple data repository for key-value
container.SDB )SimpleDB(Capability to store and retrieve a set of properties
is based on a key. Use key-value container relational databases is another
way of applications based onSQLUses. This kind of data repositoryNoSQLIs.
The next section a brief review ofSDB Provides.
Organize and access data: Data onSDB Divided into areas. Each item in a field during the

creation of a unique key that must be provided. Each item can have 021 feature, which pairs

are value-name. Based on the relational model, the primary key for each row and column

names translated to the item name and column names and name-value pairs value for the row

to be translated. For example, if an employee is required to store information that enables you

to store employee by a proper key characteristics shown there as well, such asIDEmployee.

Unlike a relational database management system, features inSDB Can have multiple values,

for example the retailer if a database product list keywords For each item in the product catalog

can be a single value that is stored features corresponding to those keywords, doing so with

RDBMS Is much more complex. SDB Provides a similar languages SQL It is, however, ways to

fetch22There is also an item. Requests from the fact thatSDB Automatically shows all features

are used.

:58 Fetch
 132 Cloud Computing Fundamentals

Access SDB And management: SDB Features that, for increasing the
availability and reliability. Data stored inSDBAutomatically stored in different
locations to access high. It also automatically adds computing resources to
the application rate and automatically shows all fields in a dataset for
efficient access.SDB Is unique in that dataset fields can be added when
demand is high.

Shape :E3-00 console:AWS Relational database service

Amazon Relational Database Service :)RDS(This service provides an abstraction traditional

database in the cloud, especially a sampleMySQLIn the cloud. ExampleRDS Can use the tab

RDS The management console AWS Occur. AWSMany administrative tasks that are

associated with the maintenance of the database for the user does. Database backup in

adjustable intervals, which can Tnavbsh 2 minutes. Data backup can be set for a period of

time can be maintained, which can be up to 2 days. Amazon also Asnpshat provider of

database functionality when needed. All these tasks can be accomplished through a

management consoleAWS
Cloud Computing
Basics 131 

Done) form.)E3-00 also include a custom tool that works


throughAPIOf RDS Amazon is developed.

Summary
NIST Cloud service has identified three models: SaaS, PaaS, And . IaaS
Model SaaSIs the oldest. Each model has its advantages and disadvantages
service. But you have to select the model to have a lot attentive service.
Whether or not to use a cloud provider, you should always make sure that
you have about the maintenance and management of systems and
applications. The only difference with the cloud model is that there are
certain characteristics that are responsible provider and you should consider
them.
 130 Cloud Computing Fundamentals

Season 5 Decision making

• This season:
 Use clear or not?

 Select a model cloud service

 Select a cloud deployment model

Introduction
Choosing the right cloud provider is a good scenario for the first time is vital to the

success of the organization. Depending on the provider, when you make your

choice, you may get stuck, because the data transmission to another email provider
is very difficult. If the DepartmentITNot select the correct provider, they threatened

the credibility of the business. One of the disadvantages is that the public cloud

environments, business can directly use the service. They need to dependence on

departmentIT Not internal.

Use clear or not?


The first step in evaluating the use of the cloud to determine what you're going to solve the

problem. You can solve some of the technical and operational issues, or you may be trying to

solve problems, how to offer services and new features to your customers. You need to

decide if you need service, you can set yourself. But if you can does not mean you should do

it. Some think that if it is not proposed that the organization is critical or not what the

organization can do it well, so should


Cloud Computing
Basics 134 

Transfer service provider. It is very expensive to maintain and


support services that are right.
You need to decide which provider you what to expect. You should choose
a provider that can meet your needs. Sometimes you are so unrealistic
expectations that no provider can meet them.
Another key point is that you should consider how often you want to use a service. If you use

them regularly, it is best to implement it) is less expensive (. Keep in mind that you pay based

on Astfadhhaytan in the cloud so you use the services on a regular basis is very expensive.

Select a cloud service model


After specifying the principles you do what you want, you must specify which
model better service your needs cover. This is not as simple as you think. For
example, just because you need to plan services provider does not mean that
you shouldSaaSChoose. Your provider mayPaaSBrnamhytan to choose your
own. Therefore, review the items that you have to consider when choosing a
service model we have.

User experience

User experience can have an important role in decision-making. In


general, your ultimate goal is to serve the client. If you are not
satisfied Kalynthay, you will not be successful implementations.
If you control the user experience is important, model SaaSBasic is not a good option. in

modelSaaS You have little control over UIYou. Also, you have little opportunity to customize

applications for users. If you intend to implementPaaS Or IaaSUse, you will have full control

over the programs. You can customize your every need for the program
 133 Cloud Computing Fundamentals

you have. Other factors such as network bandwidth, have an important role in determining the
user experience.

Without broadband, the system will look.

Security
When talking about public clouds, cloud service models offer various
different security levels. The show is who controls what. There are two
scenarios: first, keep data safe from external threats and potential threats in
the second safe keeping data provider. In the environmentSaaSF provider of
control and full access to all the data, and do little to protect the data there.
But inIaaSDeals with physical access to the data, but there are ways that
they can apply for the protection of data, such as data encryption.

Conformity
Most organizations have compliance regulations that apply to them. Responsibilities for

system compliance regulations canIT And infrastructure ITThe day. Many people use

these rules to adapt to soften up this responsibility. Each cloud service model based on a

degree that will help you comply with the implementing regulations are different. in

modelSaaSProvider will assume a larger proportion of the range of applicability.

Depending on the implementation requirements, AzayhdhndhySaaSMay assume

responsibility. Your organization may still be responsible in some cases, the provider's

responsibility to ensure the implementation of the system. in

modelPaaSMyshvnd.msrfknndh must ensure responsibility sharing, which the

implementing regulations will be provided with a program that develops. Great efforts

should be made to determine whether implementation is consistent. in modelIaaSMore

responsibility for the customer. But this means that in the modelIaaS The highest

customer confidence in the measures that have been used are consistent.
Cloud Computing
Basics 135 

Select a cloud deployment model


After selecting a cloud service models that cover your needs in the best way, you must specify

the cloud deployment model. You can make it through hybrid, public, private and select

Grvhyy. Most people believe the hybrid cloud model is a model that will be used in most

organizations. However you have to consider what is best for your organization.

User experience
Different user experiences depending on which cloud deployment model to choose,
suggests. If you choose private cloud, you have full control of the user. And be able to
plan, network and client systems control in many cases. This allows you to regularization
gives everything for the best performance and usability.

But if you choose the public cloud, in many cases you do not have
control over the user experience. Grvhyy or in a group, you control
the user experience depending on your agreement with the other
members of the series.

Security
Security is always a complex matter. Even when you're working with the cloud becomes more
complex.

It's more about trust. Most organizations rely less on third.

responsibilities

What is clear responsibilities depending on the model is different.


This can be a key factor again. In fact, one of the biggest drivers of
public clouds is the tendency of organization to reduce its internal
responsibilities.
Jdvvlhay on show that each person is responsible for what in any
environment. Table 0-2 provider responsibilitiesSaaS Expresses.
 136 Cloud Computing Fundamentals

Table 1-5 Responsibilities SaaS By cloud


deployment models

Table 0-5 deals responsibilities of PaaS


Cloud Computing
Basics 137 

Table 4-5 provider responsibilities IaaS

Select a service provider's public cloud


If you decide to use a public cloud provider, need to decide what you want to use.

Different things that you should consider in evaluating different types of deals. Here

are some important factors expressed.

Choose a provider Tips SaaS

In most cases, providers SaaSDifferent programs offer. This means


that you must evaluate your service provider and program. The
following questions should be when a providerSaaS Considering just
ask yourself:

  How will you charge?


 Does the entry and exit of data blocks can be done?
 138 Cloud Computing Fundamentals

  What data migration is being managed?


 If you require a transfer to another service provider how difficult it
is?


Understand what capabilities are sure to customize
 programs
 What SLAThere are penalties for violation of the SLAWhat?
 Can you control your mind and collect metrics?

Choose a provider Tips PaaS


Although service providers offer different platforms, but PaaSYou must realize
that the same platform can be downloaded from different providers. When a
providerPaaS You must consider the following questions:

  How do you charge?


 What platforms, database, development and operating system provider will
offer?

 SLAEfficiency and Access What are the penalties for violations of
them?

 Are you able to control your mind and collect metrics?

Tips to Choose a provider IaaS


 More Providers IaaSPlatforms offer the same infrastructure. The key point is
to find a provider that offers the service you requested is more. In the
serviceIaaSIt is better to note the following questions. How do you charge?

 What platforms, database, development and operating system provider will
offer?

 SLAEfficiency and Access What are the penalties for violations of
them?

 Are you able to control your mind and collect metrics?

 Whether the software will be added as part of the program?
 How data migration is being managed?
Cloud Computing
Basics 139 

Season 6 Assessing cloud security: a framework for


information security

Season Tips
 Cloud Security Assessment

 Czech List for assessing cloud security

 Czech metrics lists

Introduction
In this chapter we discuss previous work and will provide the framework for assessing

cloud security. It should be activities that evaluate, certify or validate increase the use of

cloud. The aim of this chapter is organized to equip the reader with a set of tools that can

be used to assess the security of certain public cloud, private, hybrid and Grvhyy is used.

Cloud Security Assessment hybrid cloud management to evaluate two or more samples

using a set of Czech list for each sample well is done. For example, a hybrid of a private

cloud and a public cloud, a private elements by simply using a set of evaluation and

assessment lists Czech border separating elements are made public.


 152 Cloud Computing Fundamentals

Assessing cloud security


More users cloud, the public cloud or private cloud, security considerations have their own

data. Similarly, the owner and operator of a cloud, with responsibility for ensuring that security

measures and standards and procedures are complied shares. We can expect them to come

by and their responsibilities in the requirements document is the official record. Systems that

are run by government agencies must generally with the requirementsNISTOr match the

commitment of cloud security controls Bashnd.matrys the same method used in the

description of the security requirements for cloud implementations. A good starting point when

you need to influence and presence in cloud security measure contains a list of recommended

security controls.

To begin with, there are two features for security controls in cloud implementations.
The first is the existence of control. And the latter's influence and control. In other
words, only the presence of security control is not enough, this control should be
effective. In fact called ahead to this effect control the reliability or accuracy, you can
use this control can be expected. For example, a cloud may be encrypted
connections between the cloud and external users to establish encrypted
connections time- but if we assess the impact of Knymd, to identify the controls fully
designed, implemented and evaluated.
Measuring the effectiveness of security controls and security assessments tend to
do exactly what they are. Security assessments as a guide for planning and
development of the vast amount of security as well as to evaluate whether controls
need to be properly implemented. The evaluations also have the tools to make cloud
services: for example, a cloud provider may decide to use the third person to have a
high level of security assessment. Moreover, if we had to compare two or more
cloud security, we must have a set of criteria for evaluation.
Based on the sensitivity of the data and the expected risk, we must be tolerant phase of basic

requirements where security controls are appropriately identified. If after the evaluation of the

entire decision-making process that led to the identification of controls do it with security

assessment of its impact controls that are implemented together, we have a very good
understanding of whether the cloud service generally good safety against risks be sustained

or not it will be estimated.


Cloud Computing
Basics 151 

A) 0-1 (indicating the relationship between requirements, evaluating

cloud security, cloud implementation, correct the damage and finish the

show configuration management controls.


Figure 1-6 of the requirements and evaluation to continuously
improve security
 150 Cloud Computing Fundamentals

Work on the framework or cloud security tips


In recent years, cloud computing as a new model for ITIs used,
efforts have been made to help with cloud security. These efforts
include:
 Cloud security commitments)CSA .)CSA Has been active on
many occasions, including as follows:
o Cloud Controls Matrix :)CCM(This is for providing basic security principles to

guide cloud Vndvrhay cloud to help customers achieve the overall security

risk of a cloud provider is designed. Cloud Controls Matrix framework 

Provides controls that provide an accurate understanding of security


concepts

‫و‬ It also provides principles that are in


line with guidance commitment cloud security in 02
constituencies.
o Questionnaires to assess innovative partnership: in this case focus on
providing industry-accepted ways to Dakyvmntsazy security controls in
IaaS, PaaS And SaaS It is also aimed at providing transparency and
control

Security.
o Advisory for critical areas of focus in cloud computing.
V0.0 was released in December 0112, for an advisory
that a number of areas of cloud computing, however,
these areas including structure, governance, security and
virtualization are traditional.
o Scope: 00 tips to manage identification and access. V0.0 In April
0101 it published a guide that identifies where on the main
management functions have been discussed because they are
associated with cloud computing. This cornerstoneTrusted Cloud
CSA Is.
 Audit cloud:22Looking for the tools to measure and compare security cloud services

to applicants and operator. The definition of a namespace and interface to provider

59
Cloud Audit
Cloud Computing
Basics 154 

Cloud computing allows automation of audit, verification, assessment and


assurance)A1 (of infrastructure)IaaS(, Platform )PaaS(And the
environment)SaaS(Carried out. [2]

 Organization of information security and network Europe :)ENISA(Resulting


in an advisory efforts in Europe,ENISAPublished in conjunction with the
guidance has published several to choose Rayash cloud is secure. These
include the following:

oCloud computing: the reliability of information. Which


was published in November 0112. Select Compute
Cloud represents a set of indicators to ensure that
risk is assessed.
oCloud Computing: Benefits, risks and
recommendations for information security. It is

published in November 0112.
o Evaluation and authorization by the Security Council,
CIOSupercomputer for the US government. Its main
importance is that the security controlsNIST 211-22R2
for Cloud Computing systems are low risk and
moderate-generation. [3]

 Trusted Computing Group.)TCG(In September 0101,TCGThe working group's
trusted multitenant infrastructure that have a tendency to develop a security
framework for cloud computing. Working Group trusted multitenant
infrastructure standards

To define end security for cloud computing in a framework that can


serve as the basis for compliance and auditing is used.
All these efforts are relatively new and should gain wide acceptance.
More than this, these are the basic activities that tend to official business or as a starting point

for a common framework for cloud security product Grvhyy efforts to serve. In other words,

great uncertainty in this area. This indicates that the cloud is hard to applicants who need to
assess the security of their private clouds and Grvhyy as well as for users who need a tool to

assess the security of cloud service is also difficult.

Today, user standards and common tools to assess the security of


their cloud. Cloud security is growing rapidly and all that we have
mentioned in the book between 0112 and 0101 has been made.
 153 Cloud Computing Fundamentals

Tools
Many tools have been used to test security. These include the following categories.

  Port scanning to open and respond to services


  Scanning Simple Network Management Protocol
  Counting or indexing device
  Host vulnerability scans
  Analysis Network
 And passing the acceptance test password
There are basic tools that have been tested. These include network Ngashtknndhy 11 For port

scanning and NessusAre vulnerable to scan them. In addition, other tools that are powerful
tools that allow a full defense test to identify quality, flexibility

‫ و‬Security vulnerabilities are related. The appropriate tests for a wide


range of tools they need to offer cloud networks.

Czech listings for assessing cloud security


Czech tendency to develop a list of cloud security assessment of a series of
cloud security tools to identify and characterize ensure a CSPIt is about security.
But, as also mentioned in the introduction, such Chklysthayy by users or
customers can compare to cloud security options used by different providers. In
the Czech part of the offer lists that have been derived from several sources,
including cloud controls matrix [2]CSA Frymkary secure cloud computing data
[1] NIST's [1] 211-22 R2.

60
Network Mapper
Cloud Computing
Basics 155 

Warning
Security testing, penetration testing and testing especially vulnerable,
can easily create a sense of false security. This is for two reasons:
1. Such tests are based on knowledge of the vulnerability to zero and can not be

calculated on that periodically arise. New vulnerabilities are discovered daily.

The vulnerabilities are even very mature systems are also at risk. Again multiple

layers of defense is a good strategy against zero-day exploit.

2. Qbs health vulnerability and penetration testing that includes processes

and controls-a very detailed operational programs depending on them-

the security information can not be measured as a measure of overall

safety.

In other words, the test target system tests, including tests Nfvz- only at the point of

time and a limited expansion of the test. Systems and configurations tend to change

over time, and new vulnerabilities can appear years after the system was tested and

proved. Security engineers generally agree that such tests are valuable.

An application for Czech list is that the cloud can be used to help assess the security of the

cloud. If a cloud provider such as a check list for reporting framework used cloud security,

future tenants and users can compare the relative safety of different clouds. The Czech public

cloud customer can list a series of questions to questions that are related to the client's

business needs them. Each of the following sections shaped around the needs and controls

related
 156 Cloud Computing Fundamentals

has taken. A) 0-1 (showing a summary of the evaluation checklist


and Lystkrdn controls or requirements for each part.

Core security
Security policy, organizational requirements or rules defined for security. Security policy
restrictions.
‫ و‬Requirements that individuals and groups must act under which it defines as the notice of

disposition is used for security management. Due to security measures, they should be

detectable security policy. There are several molasses policy, which includes overall security

policy and policies of an additional restricted areas more checks. Security policies focused on

achieving optimal results, not just one particular implementation, it is.

Such policies are statements of the requirements that are specific areas. These are often

defined as a standard and specific areas such as technical controls or requirements specific

hard cover. A third class guidance documents are less formal and procedural best practices

are more inclined to. They describe or recommendations of exercises that targets the security

policy to support that this is done by describing a framework for implementation processes. In

other words: why expresses a policy statement expresses what is standard, and tips on how

to express. 0-1 checklist covering operational security elements related to policies, standards,

and guidelines are. 1.0 Assessment checklist covers indicators that focus on transparencyCSP

Is.
Cloud Computing
Basics 157 

Figure 0.0-6 review evaluation checklist


 158 Cloud Computing Fundamentals

Security employees to a cloud operating basis by which the security is


established. Stock assessment checklist 2-1 lists the security-related staff.
Cloud Computing
Basics 159 

CSPare. Czech List Index for detail 3-1 in the third person expresses
provider.
 162 Cloud Computing Fundamentals

Commercial considerations
Several commercial considerations are security considerations we have
with them. Security considerations, including legal issues, business
continuity and supply resources. Evaluation criteria for the consideration
of 2-1 and 1-1 and 1-1 in the Czech list provided.
Cloud Computing
Basics 161 
 160 Cloud Computing Fundamentals

Business continuity is an issue that the scope is much broader donor complex. In this
context may be interested to learn more on this subject see the following resources:

0. .ANSI / ASIS SPC.0-0112 organizational adaptation: systems


management, security, preparedness and continuity, with tips for
using American National Standards
0. National Institute of Science and Technology)NIST(Special
Publication 23-211, Contingency Planning Guide for
Information Technology Systems
0.2 Good practice guidelines that can www.thebcicertificate.org /
bci_gpg.html be downloaded.
0.3 Business Continuity Institute, the. www.thebci.org

Break
On 02 February 0100 an online newspaper Zeit reported that an error occurred in the
payment system a cloud provider that accesses a German company email SaaSNalynsh

documents to the public and is disabled..Cloud services model to earn second

complicating factor: Many cloud services rely heavily on self-service interfaces. About
radio.d, it has been shown thatCSPSuddenly interrupts radio access. Radio.de can not

seem to manage regionalCSP In Dublin alone, and e-mail CSPFor days they did not fix

the problem. In this case the facts are not clear, therefore,CSPIt is not recognized.

However, if you outsource your critical business functions, make similar situation can
quickly create any moreCSPAgain resolved. This involves doing things before

establishing business relationship with aCSP, Also it is necessary to maintain contact with

the provider, so that you are aware of any changes in contact with are the methods or

details. Finally, it should be considered that if


Cloud Computing
Basics 164 

Your disaster recovery plan system CSPStored, you do not have a disaster
recovery plan. Resources should ensure that the cloud service is fully funded by
increased customer demand, be done. To do this,CSP Must be a certain size to
deliver successful SLAHave. for exampleCSPIt is possible to add servers or
storage processes have increased demand. Czech List 1-1 lists the evaluation
indicators for resources.

Strong support
Integration and security of a cloud operational integration depending on the

resources that comprise it. Software is a key element for vulnerable and exploited.

Czech List 2-1 to start the evaluation criteria to ensure the software's list.
 163 Cloud Computing Fundamentals

This is a powerful technique for improving software security to the developer during the

development process that this power by giving them access to security testing tools is

possible. The best exercise is the development environment of the near final testing, staging

and production environments.

It is the most special aspect of cloud security network implementation. Choices related to

architecture and isolation that have been developed here have far-reaching benefits.

Network choices with physical network and network virtualization capabilities and control

equipment begins and expands. Ayzvlhyazy degree of traffic between different classes of

security requirements in the system and levelsVMCreate problems. Czech List 2-1 lists

the network security index.


Cloud Computing
Basics 165 

Types and degrees of security controls to protect Host VMWhat are required are very broad.

As Attafpzyry more controls are further remedial level

‫ و‬VMIs required. Czech List 01-1 Assessment index for home


security andVM To the list.
 166 Cloud Computing Fundamentals

CSPOften are responsible for platform software stack, including security.


Although aCSP May not want details about security stack PaaS To provide a
CSPShfafythayy should be about security and security control areas. 1:00
checklist evaluation indices for securityPaaS And SaaS Lists.
Cloud Computing
Basics 167 

Access management and security for the cloud are critical elements. Czech List 00-1

Evaluation Indicators for management to identify and access lists that are associated with

authentication.
 168 Cloud Computing Fundamentals
Cloud Computing
Basics 169 

Encryption and key management must be managed carefully,


otherwise it will quickly slipped encryption for security. Czech 02-1
List of security measures for this area listed.

Operational security
Many of the concerns around public cloud in terms of physical security ITThe third person is in

control. With a public cloud, a physical violation of several clients will be affected. Czech

evaluation indices for the physical security of the data center and networking 03-1 lists and

lists the data center power.


 172 Cloud Computing Fundamentals
Cloud Computing
Basics 171 

CSPMust complete and current list of all data sources that are used for implementing cloud

hold. A new experience of database management is implemented for storing such information.

Czech List 02-1 lists the criteria for asset management data center.

Effective security is an ongoing process that requires a well-defined processes and roles for

all employees. To be effective, such processes have to anticipate the variety of events.

Process should be sufficient guidance to allow employees to investigate a wide range of

failures in systems, processes and propose other conditions. Such events and responsibilities

to be recorded. Czech List 01-1 lists the evaluation indices for operational experiences.
 170 Cloud Computing Fundamentals
Cloud Computing
Basics 174 

Czech List 01-1 in the evaluation criteria listed for incident management.
 173 Cloud Computing Fundamentals

The criteria for checklist


Checklist alone have the ability to judge the security of a cloud, public
cloud and owners of private cloud customer should want to know the
following:

  How safe is implemented?


  Is CSP Best practices for security is used?
 CSP How to obtain discrete requirements and security
 controls?
 How the service compared with other similar services?
According to the Czech lists 0 -1 to 01-1, with a nice variety of controls that can be
implemented to be seen. This makes identification difficult metric for each question.
Assessing the security of an implementation as well as time-consuming as well as costly as

well. Certification and Accreditation resulting system is a snapshot in time and change in the

system must be duplicated. These assessments are primarily paper experience that much

effort has been done on them. What is needed is the development of the process itself, and

cloud computing is faced with more automation, because of the nature of the contract

between IT and cloud consumers. First to information security, systems and processes have

been collected in a reservoirC & AThey're more like a database repository is organized as a

traditional formal document. The importance of organizing and gathering information is that

the statements and claims about how to achieve security controls discrete support. Having

such information in the database, it is useful for several entities. In an implementation of

cloud, different parts of the infrastructure and use the same controls. Security assessment

should be able to re-use information about this control, and it should be able to re-use

information on the impact of this control. Cloud computing will revolutionize security, and

clearly is to choose a cloud develop and assess security measures and gain security will be in

demand.
Cloud Computing
Basics 175 

Summary
Growth in public computing has increased the need for more security. Public
cloud services need to provide cost-effective services and a host of features
that makes it easy to choose, they are. But to meet the requirementsITSo safety
is very important. ThereforeCSPWays to assess products using indicators is
expected. In this chapter, security checklists to guide readers to assess security
in the development LysthayshanCSP Or private cloud data.

tip
Security Assessment interested can join into the following groups:
 Cloud Security Alliance10
www.cloudsecurityalliance.org
www.linkedin.com/groups?mostPopular=&gid=0213001
http://groups.google.com/group/cloudsecurityalliance

  Audit the Cloud


  
www.cloudaudit.org
http://groups.google.com/group/cloudaudit
 Trusted Computing Group10
www.trustedcomputinggroup.org/solutions/cloud_security
www.linkedin.com/groups?mostPopular=&gid=2023003
)http://cloudsecurity.org/forum/index.php (CloudSecurity.org Not very active,
but the potential is an independent association to collaborate on cloud

security testing.

Endnotes

1. CSA-GRC-Stack-v1.0-README.pdf; www.cloudsecurityalliance.org.
2. Ibid.

3.
 Ibid.


61
The Cloud Security Alliance
62
Yerba Shnayar Ynabm
 176

4. Proposed Security Assessment & Authorization for US Government


Cloud Computing, Draft version 0.90, CIO Council, US Federal
Government; 2010.
5. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
0. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009 [accessed 24.03.11].
7. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
8. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
9. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
10. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
11. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
12. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
13. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
14. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
15. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
10. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
17. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
18. Catteddu D, Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
19. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
20. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
177  Yerba Shnayar Ynabm

21. Catteddu D, Hogben G. Cloud Computing Information Assurance


Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
22. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
23. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
24. Catteddu D, Hogben G. Cloud Computing Information Assurance
Framework, European
Network and Information Security Agency (ENISA).
www.enisa.europa.eu; 2009.
25. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal
Information Systems and Organizations; 2009.
20. Asendorpf D. "Ab in die Wolken", Zeit Online, 2011;
www.zeit.de/2011108/ Cloud Computing; 2011 [accessed 24.03.11].
27. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
28. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
29. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
30. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
31. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
32. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
33. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
34. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
35. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
30. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
Yerba Shnayar Ynabm
 178

37. Catteddu D., Hogben G. Cloud Computing Information Assurance


Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
38. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
39. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
40. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
41. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
42. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
43. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
44. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
45. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
40. Catteddu D, Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
47. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
48. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
49. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
50. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
51. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
52. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
53. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
54. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
179  Yerba Shnayar Ynabm

55. Catteddu D., Hogben G. Cloud Computing Information Assurance


Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
50. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
57. Controls Matrix (CM), Cloud Security Alliance V1.0; 2010.
58. Catteddu D., Hogben G. Cloud Computing Information Assurance
Framework, European Network and Information Security Agency
(ENISA). www.enisa.europa.eu; 2009.
59. NIST Special Publication 800-53 Revision 3, Recommended Security
Controls for Federal Information Systems and Organizations; 2009.
 182 Cloud Computing Fundamentals

Season 7 Operating the cloud

Season points:
 From architecture to safe and efficient
operations

 Activities safe operation

Introduction
Throughout the book, and in many ways we have explained the evolution of cloud computing

models ITIs selected obtained the consequences later. On the one hand we have some

advantages, such as convenient and fast as we develop lower costs. The applicants cloud in

new projectsITFace fewer risks. Using a public cloud, anyone with an idea that needs

infrastructureITThere can be no gain infrastructure and staffing to achieve. If you have an

Internet connection, a laptop and a credit card you have, you can

InfrastructuresITUnprecedented access and waiting time is much lower than traditional

infrastructure. On the other hand, the failure to adoption of public cloud services, public cloud

is associated primarily with lower inherent flexibility, coupled with concerns over physical

control of resources is canceled. There is also the factor that all public cloud services to easily

transfer data to other providers do not. Most conventional technology of a synergistic

relationship with other business functions not enjoy. In cloud computing service catalog should

be defined precisely becauseSLATo together. In private clouds, consumer servicesITExpect

that your virtual machine have fast as public clouds. The evolution and self-service nature of

cloud services,ITNeeds to be a business partner. But we should also expect that the growth of

cloud computing and infrastructure changes that are associated with reduced personnelITA.

This is quite normal and the degree Atvmasyvnsazy servicesITShows that obtained by the

cloud. In previous seasons we


Cloud Computing
Basics 181 

Cloud computing and cloud services have defined and evaluated models. We also
discussed the security concerns and most of them with a close examination of the
structure and cloud security were checked. In this chapter we focus on the security
aspect of the operation of a cloud.
The purpose of processing a cloud over cloud services that are safe, efficient, and reliable

regardless of the cost. Reaching this goal may be very difficult, and this package to support

many activities. Leading architecture to implementation and costs, which include costs of

operational security. Safe and effective processing is possible by a detailed program.

Reactive security measures due to ineffective planning and costly. figure 1-0 indicates the

overall relationship.

Unfortunately, the initial planning and architecture often due to factors hybrids,
are short. Experience shows that investment in planning and operating costs
and protect the structure from the application of unexpected issues that arise
cut. It seems that there are two choices: spend a lot of time planning, or spend
insufficient time for planning and after the crisis and delay.

Figure 1-7 overall security operations and affect decisions

Hints:
Investment return purposes)ROI(For added security, consider the
following:
 Security should reduce the time necessary
 180 Cloud Computing Fundamentals

 Security technologies and processes to reduce the overall


 cost
 Security management system must be able to function and
to enable the
If you have to define a number of rules for support ROI We must start with the following items:

 Security should increase revenue by increasing customer


 satisfaction

  Security must reduce staff time on urgent reforms


  Security should reduce the amount of resources available
 Security must be risk of regulatory intervention, including fines and reduce
business disruption.

From architecture to safe and effective operations


Security is a key factor that is associated with all aspects of cloud operations.
Before a security engineer at a former employee to disable the account
infrastructure, vulnerability scan results to examine the effect of these measures
is considered operational. When the cloud architecture is defined by the next
operational processes, is determined. It is quite true that a cloud in the
departmental level or prototype can be designed and therefore have operations
with continuous efforts.
Security problems can easily be intensified and demand a lot of attention and

resources when implementing gets older, are. This is a very complex and dynamic

combination that works on various technologies and components is possible.

Fashion design, implementation and configuration, a long way towards enabling

efficient operation and safety.

The area planned


It's great to architectural planning phase and as a cloud with operational activities that occur

after the clouds online will begin. Planning for safe operations in conjunction with other
aspects of operational planning has been done well. Safe operations not only include areas

such as configuration management, service desk 12, Problem management, capacity

management and service delivery,

63
service desk
Cloud Computing
Basics 184 

But security operations often associated with other aspects of operations. Infrastructure
LibraryIT )ITIL(To demonstrate the value proposition in terms of detailed descriptions
experiencesIT The main organization IT In operations encounters with them have been
identified. ITIL In conjunction with the capture and organize all areas of service
management best practices around IT , Development IT, And operations ITIs.
ThereforeITILThat is a good starting point for organizations planning and design phases
of the development of the cloud. The focusITIL The operational and management IT, But
when we're planning to build infrastructure and define processes that will form the
cornerstone of daily operations, it is worthwhile. Security ManagementITILCode for

information security management must be concluded. Security Management aims at


ensuring the security of information; in other words, ensure the confidentiality, integrity
and availability of information.ITILAs a series of books that have been published as a
book cover unique experiences. Of the aggregate to eight sets is organized logically
grouped according to policies related processing. Now versionITIL 0 is as follows:

  Support service
  Service delivery
 Communications and information technology infrastructure
 management
  Security Management
  Commercial aspects
  Program management
 Asset management program13
 Implementation ITIL In a small area
Although parts of its own security, security architecture requires
planning and understanding of other areas. Good security and
precision of a mature security measures that have been merged
with other areas of practice.
64 Software Asset Management
 183 Cloud Computing Fundamentals

Security costs and ongoing physical access


To reduce operating costs to the lowest possible level, physical access to infrastructure
ITShould be based on documented need not be limited. But even escorted access also
has its risks. What is interesting here is that when the cloud infrastructure is designed
and developed) for operational efficiency (then all physical access is not required daily.
Large data centers with video surveillance equipment, and environmental sensors are water,

smoke, humidity and air temperature acquires. These would be additional sensors and high-

resolution cameras are used to seeing lights, visual distance. Reducing the need to reduce the

need for operating personnel to the presence of continuous physical, operational costs

decrease, camera resolution up capital of at least viewed from the data center to support and

recordings from the cameras can if needed as a recording is legal. As the video Tvalnytr be

kept better because at least one operational team may be needed.

Virtual and logical access


Since clouds on the network are managed, physical access control and restrict access to the

physical realm is important. The use of authentication systems to define and manage access

to devices and special functions by an efficient way to centralize data access control. The

control logic alone are not restricted to limited access to servers and other cloud infrastructure.

The use of network isolation between different areas of the cloud infrastructure is a long way

to restrict access to the hacker, but isolation also limits the scope for operational personnel. In

fact, the lowest layer of security protection does control, and network isolation mechanism

provides secondary protection.

Security personnel
Not only logical and physical access limited operational personnel, but all the people shall

observe Prnsl policies. Likewise, all personnel policies and procedures must
Cloud Computing
Basics 185 

Evaluating continue, especially based on user access rights and privileges. When employees

leave the operation, access should be canceled immediately; doing so effectively requires the

use of centralized management is identified. It should be noted that while security personnel is

essential, internal threats will not stop. What can be done about it? For example, security

administrators should continue its work independently on the expected test results.

Education
Special training for staff ITIt is important for all staff, especially staff Abry- operations support

infrastructure which includes not only employees but also managers and employees are

related to other aspects related operations. Cloud operational staff appropriate training to

ensure that they are adhering to all company policies, including security policies is a must-

have. Despite the large number of virtual servers, multiple servers or indirectly carry the

potential disruption in service cancellation is high.This applies not only when the service is

fully operational, but the initial and ongoing formation also apply. The complexity and scope of

the cloud demands that personnel have the experience than the typical corporate systems

administrator.

Cloud security staff categories


Below are the kinds of security personnel associated with the
operation are clear:

  Physical security and data center staff


 Security analysts are responsible for or associated with a
Security Operations Center are physical or virtual.

  Scanning and penetration testing of employees
  Engineer or architect safety systems
  Security officers and other security management roles
 Analysis search of safety, security and automation
developers, developers, content security
 186 Cloud Computing Fundamentals

Tool
Open source group to various species of cloud computing applications. At first, many
open source projects are hosted in different clouds.Google, AmazonAnd other clouds
Grvhyha active support. Second, many open source projects focused on enabling cloud
computing. These efforts for the development of the software include the following:

 Configuration Management: This tool includes Chef And


 Cfengine Are.
 Supervision: Zenoss, collectd , CloudStatus In the context of
 monitoring are
 Management: This category includes OpenQRM, Bitnami
 And ControlTier Is
 Enable Cloud software: software that efforts have been made in the field

Enabling users to create, manage and deploy cloud environments is enabled. Cloud

software activation domain of powerful tools for the field of hybrid clouds, private

‫ و‬Below are some of them that have been expressed publicly:


 Cloud stack, a software platform IaaS The private development cloud computing

elasticity or flexibility or services trade that Amazon EC0 Activate the competition.

Cloud platform includes a management server stack management and

Hayprvayzrhayy

‫ و‬Implementing Cloud IaaS Is.


 : Eucalyptus A source infrastructure for implementing cloud computing on
clusters require the

‫ و‬It is also compatible with Amazon EC0S2EBS Is.
 :OpenNebula It is rarely possible to create a tool that gives private and public
cloud deployments

‫و‬ It also manages virtual infrastructure.
ButOpenNebula Beyond these issues and supports different
cloud models, including the hybrid cloud deployment.
 Computing platform exclusive elasticity or flexibility: To design, deploy, and
manage virtual cloud infrastructure can be used for planning.

 Enterprise cloud: Ubuntu Consolidation is a lot of open source

projects, as well as the possibility of deploying a private cloud

also gives easy.


Cloud Computing
Basics 187 

From physical to logical environment


Physical data center environments to a cloud to serve as the supporting structure is essential.

Cloud to cloud infrastructure both small and large all the same. This supportive environment is

physically safe. Ibn alone represents a set of issues that should be connected to the Internet,

electricity, and other communication and physical access safe and reliable to be examined.

Physical proximity between the data center and the toolITAlyhhayy have physical access

controls. Similarly, the complex computing and storage infrastructure as well as fixer number

of separate logical layer. Each of these areas of physical and logical obstacle to the

effectiveness of cloud computing, but they and isolation to prevent unauthorized access to

areas that are damaged. This area should be designed not only to protect but also for a fee.

Inefficiencies in the design and operational processes related undermine the cost-

effectiveness of dynamic cloud management. If you want to Karamdyhayy cloud has

previously promised to reach them must be well designed.

Set up independent65 Safe operation


Assuming a cloud without identifying the source of many of the components of cloud

computing and security is very unrealistic. For example, if part of a program to control the

underlying cloud infrastructure to be introduced) without security assessment (we so

clearly the risk of infrastructure with malware bear it. Since most software used today are

open source are potential installation ‫است امکانپذیر اینترنت از آن مستقیم دانلود با نرمافزار‬، ‫کنترل بدون‬

‫آن امنیت و اعتبار روی موثر‬. ‫نمیباشد مناسب این میکنیم ایجاد محصولی برای را سیستمی ما که هنگامی در‬. ‫عملیاتهای‬

‫میکنند پشتیبانی را امنیت که هستند پردازشهایی و پروسهها به بسته امنیتی‬- ‫ از پیش حتی‬Enter the cloud to be

processed.

65
Bootstrapping
 188 Cloud Computing Fundamentals

Efficiency and cost


Processing and security operations, several types of activities that are time consuming,
yet are largely avoidable. Security activities are not avoidable, but can also be simplified.
In the first human ability to invent unnecessary work can explain only part of the
problem.Identification, assessment, detection, correction and reporting of vulnerabilities

are similar in some ways to fight the fires. Several strategies are possible: we can reduce
flammable elements or center fire not find. Fire prevention is not possible, but if we do
not invest in some type of protection, more time to identify and report fires will spend.
Any computing environment periodically to discover new vulnerabilities. Remove all
vulnerabilities) those that have been discovered (good, but not always logical and
possible.

Scanning code for vulnerabilities in the development cycle is a


proven method to reduce security costs.
As mentioned above, security processing activities are not inevitable, but most of them can be

simplified and be more efficient. For example, one of the periodic activities.

‫ و‬The necessary security processes can make them vulnerable scan. After each

scan, the results should be evaluated, including discrete steps, which include the

identification of false positives. This process can be managed as a series of

unstructured activity, or the process can be more mature and easier.


Cloud Computing
Basics 189 

Figure 0-1 Data management, vulnerability scans

Figure 0-1 shows the vulnerability scan data is integrated method of management. Note
that the first step in the selection process of scanning parameters that are appropriate for
the environment and aims to scan. ‫گیرد صورت خالص آزمایش محیط برابر در اسکن این اگر‬، ‫اسکنر‬
‫بگیرد نظر در را همهچیز میتواند‬- ‫نمیباشد تولید محیط آن که زیرا‬، ‫می که را ارزشمندی اطالعات مخرب تست رو این از‬
‫شود برده کار به مشابه تولید محیط در تواند‬، ‫ شدن سخت منظور به‬it cut production to prevent previously
disclosed. If the target is scanned, it is reasonable to begin the scan parameters have
already been used. As shown in Figure 0-1, the next step is to start scanning and
collecting scan results. This results not only data but also vulnerable and related results
are a measure of how long it takes to scan. This in itself is useful information. The scan
results are recorded in a database or converting it to analyze the results Akhyrv evaluate
the changes from previous results. This database is simple and otherwise do manually is
very time consuming.
It should be noted that the analysis can be done, can be strongly associated with the

development of the database, if routines as well as access to information CMDB Management

will have about cloud infrastructure.


 192 Cloud Computing Fundamentals

In this way, information with address IP

Security operating activities


A direct link between release management, configuration management, change

management and security. However, this relationship often becomes mixed methods,

that this is due to the lack of official controls, or ineffective investigations suggested

changes.CMAnd a degree of order in the change control process that includes security

incidents there is demand. For the security engineers involved in the planning, the less

chance there is that such changes have to unwanted security risks. Architects and

engineers can secure steps and processes that can drastically improve operational

security and confidence they identify. In many ways, the operation, security and

integration involved a series of quality that is available. One of the hallmarks of effective

security performance of the economy. Complicated steps and procedures generally are

not optimized, and naturally, they represent a much greater chance for failure and error.

Atmytr can be simpler and more reliable in front of the steps.

Server infrastructure66
More standard environment for their server infrastructure. For example, by
making Microsoft Windows server, you are faced with a number of options
server with 20 or 13 bits start, and from there you may take one or more of the
internet information server)IIS(File transfer protocol anonymous)FTP(Microsoft
Sylvralyt, Dynamic Host Configuration Protocol)DHCP(Domain name
system)DNS(Install.

66 Server Builds
Cloud Computing
Basics 191 

For private cloud, you might want to use the environment set guidelines. For example, a set of

standard operating system structures must be taken into account; they can to ensure that the

user can easily and quickly deploy them to develop and be tested. These hybrid servers as

well as Linux and Microsoft Windows, such as:

  Making Linux: Red Hat Server MySQL


  Making Linux: Ubuntu With the web server Apache
  Microsoft Windows Server 0112
 Microsoft Windows Server 0112
Each of these applications provides a standard that prefabricated and installed,
such as antivirus, patch updates, software audit and so on. Khalshay about
development environments: simply nothing to take, there is no disconnect
between development and production environments.
Cloud computing an effective response to this problem is ongoing. Each server must
be scaled up to ensure that it puts the limit. Embed the high virtual instances on a
serverCPU All to a customer CPUNeed a lot of results are not satisfactory. User
requests to showCPUStorage and memory capacity and projected without limitation
set or charge is unlikely to be successful.

Server updates
No matter what platform you are running servers, but regular updates for the operating

system and programs will be there. Operational processes to determine how and what
 190 Cloud Computing Fundamentals

Time updates on the server do. Depending on the structure of clouds and suppliers, you
may have many servers to patch. However, with a medium ducts, ProgrammingVM Old
VMUpdated better. The operator may consider the applications easier to deploy and
manage individual, especially those who have a certain life. After the end of life, these
virtual servers can be removed and no interaction with the other server program ends.
With programs on and off as needed, internal cloud and external cloud can be created
that works the same way, the overall performance is expected to improve.
Since your cloud-based infrastructure, you have to infer that you have a lot Server for

deployment. Deploy patches require reflection and debate. The overall security of the cloud

must be preserved, but it means all of the patches to be released, is not. For example,

consider Microsoft, the company is waiting for a series of patches per month. The patches by

Microsoft as critical, important, and so ranked; however, because of possible factors, your

company may rank differently in patches. Brvzrsanyhayy the expansion of basic needs 11Are.

Depending on the software that is used virtualization management tools can be used to

enable various automatic patch update process to be used. For example

using)www.vmware.com( Vmware You can Tools Patch management for patch management

and is a virtual samples based counterparts. If your investment in the internal cloud

infrastructure with a sufficient number of servers for a long time, some types of automation in

the process of updating may be effective.

Business continuity, backup and recovery


To ensure that cloud services are available to customers and users, from

business continuity12, A term that refers to a wide range of activities that can be

done continuously. For maintenance services are available, use it. Business
continuity based on standards, guidelines, and processes is estimated that the
possibility of continuing their operations, regardless of the circumstances.

67
rolled out
68
business continuity
Cloud Computing
Basics 194 

Disaster recovery is a subset of business continuity and systems ITAnd focuses data.

From an operational perspective, the activities related to business continuity and

operational processes connected to other methods, such as continuous backup and data

efficiency reverse recovery systems out of place. Create a backup should be seen as a

continuous insurance. Although the backup data may be stored safely out of place, but

the reconstruction of a system of such a repository is very time consuming.

Failures
In early 0221, the Pentagon was classified in a data center, a computer operator
Vzyfhhaysh night at backing up critical system began. Bkapgyry is designed in such a
way that the system must be offline. Backup disc in a drive, then a second will be
installed, and backup program)DSC On Digital Equipment )PDPwill be executed.
whenDSCIs executed, the contents of the source disk or backup target disk will be

copied. Once the process is completed, the original source disk is installed and will be on
the shelves of storage for backup. The disk backup system is rebooted. The aim of this
recognition is that it is leading to a full backup version is acceptable.
Unfortunately, in a situation where the process fails, and the system can be restarted from the

disk backup. The operator goes to the shelf storage

‫ و‬Recent backup disk receive and install it on another drive and try to launch it. It is also a

failure. Operator is likewise re shelf storage with the new backup. At the same time, shift

supervisors and 01 disk is scattered finds. What has happened is that the original backup

failed because the fall is rare. Disk drive technology has not completely sealed. Breakdown

head scratches
 193 Cloud Computing Fundamentals

Will be disk. All these things that Apratvrr has been an error. A non-bootable
disc replacement with a disc, the second disc will he suffer the same
messed up. By moving the head corrupted disk from one drive to another
drive back, he's a bad Paltr introduces the second drive, which is ruining the
drive. Akhyrv put the recovery disk and then one older than that, the
operator ruining all recent backups for the past few days.

Management changes in operating environments

A cloud provider should periodically provide services and important functions for the

service that has been created reconsider. Before a new version can be deployed, should

be a test environment. Since an operational cloud for cloud management would require

many separate elements, it will be a long order. Such elements include carrier-class

switches, routers, servers, directory, security infrastructure, are producers and other

infrastructure. Several strategies can achieve an improvement of the system is estimated

to be involved. A simple approach is to develop, test, staging, and operating

environments are quite distinct. To support the infrastructure development environments

can be quite modest. When a new version ready for testing, a test environment are

required. Depending on the nature of the release, the test environment may require

expensive infrastructure to be certain some-like entrance router or a large sample

storage. However, the need for dedicated test environments should require considerable

sacrifice percent of revenue from the infrastructure. For a private enterprise cloud, these

issues there. Move a copy of the test to the production of all file errors, scripts and

displays the configuration procedures. Unless it is modified version of the previous

series.
Cloud Computing
Basics 195 

Version Management
Version management for the cloud means ensuring that the correct versions of software,

hardware, configuration files, licenses, and other support processes have been used and they

play their roles properly. Version management goals include effective management of all

phases of the planning version is to develop processes that will be used in planning,

management expects that, together with the customer during planning. Figure 2-1 shows the

steps common version management and represents the basic requirements for configuration

management to support a new version.

‫فرآیند در نظم به بسته موفق نسخهی مدیریت‬، ‫رسمی پروسههای از استفاده‬، ‫و متعدد بررسیهای و‬
‫است پذیرش های دروازه‬.‫ شکل‬3-1 ‫است عملیات و نسخه مدیریت بین رابطهی نشاندهندهی نیز‬،
‫ به میتواند حادثه تحلیل و پاسخ مانند عملیاتی فعالیتهای که باشید داشته توجه‬Change in the
cloud need help.

Shape :Basic steps in the management of version 4.7


 196 Cloud Computing Fundamentals

Figure 3-7 The relationship between process and version


management.

Features can include major or minor hardware and software


modifications are necessary or Asalhhay. Asalhhay must check
often limited to a small number of issues identified or security
patches.

Information about infrastructure: Configuration Management


Cloud complex is an implementation of several categories of information. These
range planning and design data to the cloud configuration information. However,
due to the dynamic of the cloud and because of high automation in operationsITThis
type of data on the cloud must be available to manage the process. Focus on
physical infrastructure) which includes the hardware computing and storage
resources and networking is (one of them may be tempted to use a computer
drawing program)CAD(To show servers, storage and networks, along with power
cables and physical infrastructure and use.
Prior to this role of CMDBKM is about the configuration of an authentication elements,

relationships and characteristics they talked. As discussed,CMDB Many benefits to the

Cloud
Cloud Computing
Basics 197 

Operating suggests. ACMDB Moreover, it can be used to reflect the current state of

cloud physics element, evaluation, or even management can also enable virtual

cloud elements. CMDB Needless to information storage virtual resources, but we

need virtual domain knowledge and resource management CMDB Traditional

physical harm .

Vulnerability and penetration tests


Vulnerability and penetration testing cloud infrastructure must be done on a regular basis. In

many cases, operations and security personnel may not have the expertise to do these things,

in this case should be outsourced to a third party be assigned. If so, it should be ensured that

a third person demonstrable professional skills in this field. Although the majority of cloud

infrastructure to test skills and techniques used are the same, but must specify that testers

have an understanding of virtualization and cloud regularization. Zysakht entire cloud

penetration test should be aimed not only servers and specific elements. Cloud environment

to enable network elements that must be tested to ensure that security is configured. Switches

and routers can be exploited vulnerabilities have, and if not configured properly, they can

route traffic in a way that is against the need for cloud security. Penetration test

‫ و‬More vulnerabilities discovered vulnerability scanning. Vulnerability discovered the

ratings are) critical / high / medium / low (. As a general rule, any vulnerability that a high

degree or life, it must to ensure the security of the entire cloud service will be corrected.

Need to point out that many of the vulnerabilities that are discovered scat or penetration

test, due to the weak development programs and programming.

Response and security surveillance


Overall supervision can be divided into two areas: physical and cyber. There are definitely

security requirements for data center management. Run a data center as well as ongoing

monitoring and alerting in case of occurrence of a process is defined. When you grow your
own cloud infrastructure, you need to monitor increases and also increases the complexity of

doing so. Depending on the size and location


 198 Cloud Computing Fundamentals

Cloud facility, you may need a specific staff and Equipment.


Physical monitoring include the following:

  Video control
 Access to inputs12
  Water sensors, fire and other environmental sensors
  electricity consumption
 Use of facilities
These activities are the tasks of data center security staff. You must create processes to

ensure that you have a well-defined ins and video recordings vote so fulfill the security needs

are. This process must be considered when risk assessment is performed, and then all

perceived physical risks should be reduced. Generally, cameras, video recording is now easily

throughout Transfer Protocol Control Protocol / Internet Protocol)TCP / IP(Available with

camera-enabled wireless are more common. The way these devices in the Internet involved is

very important. In terms of security and network bandwidth because the video feeds to

consume large amounts of network bandwidth are known. a better approach is to have a

safety net for such outbound traffic as well as to prioritize traffic in the network according to

the needs of the site. cyber control can be divided into three publishing sector:

11
 Housekeeping
  Monitor threat
 Incident response

Housekeeping
Control Housekeeping Including monitoring of all servers to ensure that server-based

patches, antivirus updates, use CPU And RAMEtc. are updated. Here

again,CMDBRepresents an opportunity to increase the impact on operations. Instead of

scanning every system

69
Door access
11Computer operations to get the desired results does not directly help but

essential part of an application such as the introduction of Chinese and


clearing operations
Cloud Computing
Basics 199 

Identifying the need to patch systems, all versions and related information can

CMDBKept, that this to create quick search. Periodically, it is important to verify

thatCMDBTo be precise physical and logical environment that reflects the information it

maintains. Do this for the entire cloud discouraged, but must be done for component

management infrastructure. In addition, we can compute servers for career] andVMWe

have repeated that the audit and sampling. One way to periodically audit the

environment of the software logic is Katalvgsazy.Nessus A good example is the security

known to many engineers.

Threat Control
You control a threat to the structure of hybrid of manual and automatic. At baseline, you must

Hvtds data and alerts from sensorsIDS / IPS, Antivirus records, records of various devices in

your structure and that these are collected in different parts of the season have been

described. With medium to large size data centers, if personnel from manual methods to

collect

‫ و‬Evaluation of their data, amount of data operations will waste them. Since the amount
of data increases, manual methods require lots of extra heads, or the chance of
increased threats arise. Several automated tools can be used in this context. The tool of
intimidation restrict the system. Basically, this instrument is able to reduce the number of
false positives that occur in raw materials incident. The operator is able to focus on a
smaller number of threats. Moreover, this tool can be designed such that the appropriate
alerts to be sent for example to a group and routing Virus AlertIDSThe other group. The

group can collect data from various sensors and the data in one location are connected.
In the past, control the amount of IT A cloud constituted could include network operations

center10 Be specific and perhaps a security operations center. 10 But today this can be largely

virtual and secure web-based console using a security team to the feasibility of the whole

world

71
network operations center (NOC)
72
security operations center (SOC)
 022 Cloud Computing Fundamentals

For complete coverage of the 1.03 to be done. NOC And SOC Do Mqva

= L, but the scale of infrastructure investment must adjust or risk.

Incident response73
Control and explore a potential threat is just the start. After confirming
that this is not a false positive, you have an incident response plan
design. They are made out of different types Lyblgzary high, medium,
low, main / sub, etc. and must be considered for each right answer.
At the lowest level, events, operations staff can be addressed as part of the daily
activities and generally does not need to intensify. This should ensure that no overall
pattern does not exist and ensure that any work track) such as installing patches Matters
(done, must be tracked. Next level incident is when some servers are affected which, like
failure in the power supply on the radio or network failure for a segment of your network.
However, staff operations failed to meet the will, but it is likely that some forms of
communication need to send out Jose employees have.
The main events are at the highest level that a large percentage of users affected, such

events includes an agreement that otherwise affect your credit. Again, in this case

planning is the key to success. Answers often include a greater range of people than just

the staff and the need to manage carefully their events.

The best experiences


In late 0221, ISF13 Standard good practice SoGPReleased, in which a set of efficient
information security practices were identified. In 0111 the collection was updated
SoGP. The complex research and studies in the areas of security and
disaster management was developed efficient experience.SoGP Often
used in conjunction with other standards, such as the ISO / IEC And
01110. COBIT

73
Incident Response
74
Information Security Forum
Cloud Computing
Basics 021 

In 0221, Marianne Swanson And Barbara Guttman, Generally


accepted principles and practices for the security of information
technology systems issued. They have identified eight the
following principle:

  Computer security of mission support


 Computer security is an integral element of good
 management
 System owners a safe responsibilities outside of their
organizations.

 Computer security should be clear responsibilities and
 Paskhgvyyhay
 Computer security requires a complex procedure and is
integrated.

  Computer security should be periodically reassessed.
 Computer security factors of the group.

Flexibility in operation
Regardless of business continuity and governance definition of security is difficult. Where
business continuity

‫ و‬Working to overcome any major interruption of service) and its consequences (driven

information technology department of a form of command and control ITIs. Admissibility

of a process or series of actions that aim to deliver resultsITIs expected. Organizations

by creating multiple obstacles in securing a contributing factor to achieve the overall

objectives of their organization. To begin with, most systems are really able to withstand

even the failures are trivial to solve without some interruption of service. As reported by

the UniversityCarnegie MellonExpressed support for the operational flexibility needs to be

a core competency for operational risk management - are risks of everyday operations.

Operational risk management is important to ensure mission success. For some

industries, such as finance Bankdaryv, it is not only a necessary business function but

also a tool to be considered regularization. Activities such as security, business

continuity and operations managementITBecause the fundamental purpose to identify,


analyze and mitigate operational risks, they are important. In turn, because they support

operational risks, they directly affect operational flexibility. One of the goals of flexibility

inITReduce the impact of failure and disaster. Disaster risk reduction is a fundamental

objective, but equally important is the ability to cover the disaster.


 020 Cloud Computing Fundamentals

Summary
Depending on how the cloud model) private, public, and hybrid Grvhyy (and depending on

how the delivery of cloud-based services IaaS(,PaaS, And )SaaS, Cloud computing creates

different opportunities for change. As a new model forIT, Cloud computing benefits of the

various competitors in the same industry, vendors and cloud providers, and consumers

‫ و‬Common used. The method by which the cloud's benefits package on how to assess
information and communication resources available and how to deal with the transition to
the computing model. We can use this event to see, and its success depends on an
organization's ability to understand the opportunities and change mappings changes to
the technologies, products and concepts, and emerging and the cloud as a new model of
IT consider. Although large-scale private clouds can reach local customers many
services for this group, but relatively smaller private clouds. One of the advantagesIT

The cloud model is that once the appropriate infrastructure is, the more physical
hardware IT And other networking activities with the problem will not run.
With cloud computing as a model for IT, Organizations can move away from the traditional

aspects of hardware-centric to service-based strategies to move. Clouds offer many benefits

that go beyond the structureITThat they use. There are clear interactions which control

programs and data, and compliance with laws and regulations and even security. More

scalable cloud model also associated, and usingfail in placeCloud reliability

‫ و‬There is also greater redundancy. Hybrid needs for computing power, data storage

and bandwidth continue to demand more powerful systems will continue. High-

intensity applications depend on access to scale storage. Ptbayt-scale storage

requirements, the scale of TB in the fall, and soon reserves virtual storage can
scalepetabyteDestroy. In addition to other benefits, cloud computing models such

large-scale storage is more feasible.


Cloud Computing
Basics 024 

tip:
Some Internet resources for information professionals and peer sites that
are involved in it. Although many such sites there are several sites that are
only for cloud computing. Below are some of them have explained:
 Google Groups, Google, Internet 211 pound gorilla of the Internet,
rich and a great tool for collaboration between a group of people
with common interests has provided. The biggest problem Google
Group is a large number of groups! In many of these groups are
very important leaders in that area are members.

12
 Cloud Security Alliance: It seems that the organization
 itself has made changes in accreditation organization.
 :LinkedInThe professional networking site with about 011 million members,

more than 011 professionals in the country. This is a very effective

networking tool to find potential customers of a product, provider and expert

in the field. groupsLinkedIn 

References
0. Swanson M., Guttman B. NIST SP 211-03, "Generally Accepted
Principals and Practices for Securin g Information Technology Systems,
"National Institute of Standards and Technology, Technology
Administration; 0221.
0. Ibid.
2. Caralli R., Stevens J., Wallen C., Wilson W. Sustaining Operational
Resiliency: A Process Improvement Approach to Security Management.
CMU Networked Systems Survivability Program;0111.

75
The Cloud Security Alliance

You might also like