Bit 2.2 Cloud Computing Intro
Bit 2.2 Cloud Computing Intro
Cloud Computing 1
Content
n Principles, concepts, tools and technologies applied in
Cloud Computing
n Issues related to this new computing model
¨ Ethics
¨ Security
¨ Confidentiality
¨ Migration
¨ Dispossession
This course is partially based on the content of the the book Cloud Computing:
Theory and Practice of Dan Marinescu ; The Cloud Computing tutorial and the
USA National Institute of Standards and Technology (NIST)
Introduction
From http://bestcloudservershosting.com/
Software SaaS
Collaboration: Collaboration:
Software Exchange Google Apps
Package Lotus
ERP: ERP:
SAP Salesforce
n Network-centric
n Utility model
n Virtualization
n Autonomic computing
n Multi-tenancy
Examples of tenancy
n Salesforce.com
¨ For 72.500 customers, supported by 8 to 12 multi-tenant
instances (meaning IaaS/PaaS instances): a 1:5000 ratio
¨ Each multi-tenant instance supports 5.000 tenants who share
the same database schema
n Intacct, a SaaS financial system
¨ More than 2.500 customers who share 10 instances in a 1:250
ratio
n On-demand self-service
¨ A consumer can unilaterally provision computing capabilities,
such as server time and network storage, as needed
automatically without requiring human interaction with each
service provider or its intervention
n Broad network access
¨ Capabilities are available over the network and accessed
through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g., mobile phones,
tablets, laptops, and workstations)
n Measured service
¨ Cloud systems automatically control and optimize resource use
by leveraging a metering capability at some level of abstraction
appropriate to the type of service (e.g., storage, processing,
bandwidth, and active user accounts)
¨ Resource usage can be monitored, controlled, and reported,
providing transparency for both the provider and consumer of the
utilized service
Platform-as-a-Service (PaaS)
n Allows a cloud user to deploy consumer-created or acquired
applications using programming languages and tools supported by
the service provider
n Provides specific programming languages support, operating
systems, APIs, development environments, database instances,
computation instances, application server instances
n The user
¨ Has control over the deployed applications and, possibly, application
hosting environment configurations
¨ Does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage
n Not particularly useful when
¨ Proprietary programming languages are used
¨ The hardware and software must be customized to improve the
performance of the application
Catarina FERREIRA DA SILVA Cloud Computing 40
Infrastructure-as-a-Service (IaaS)
n The user is able to deploy and run arbitrary software, which can
include operating systems and applications
n The user does not manage or control the underlying cloud
infrastructure but
n The user has control over operating systems, storage, deployed
applications, and possibly limited control of some networking
components, e.g., host firewalls
n Services offered by this delivery model include: server hosting, Web
servers, storage, computing hardware, operating systems, virtual
instances, load balancing, Internet access, and bandwidth
provisioning
n Availability of service
¨ What happens when the service provider cannot deliver?
n Diversity of services, data organization, user interfaces available
at different service providers limit user mobility
¨ Once a customer is hooked to one provider it is hard to move to another
¨ Standardization efforts, namely at NIST, Open Cloud Computing Interface,…
n Vendor lock-in
¨ It is very difficult for the customers to switch from one Cloud Service Provider
(CSP) to another
¨ It results in dependency on a particular CSP
Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Utility computing. Pay-per-usage
Resources
Accessible via the Internet
Compute & storage servers
Networks Services Elasticity
Applications
http://siliconangle.com
Catarina FERREIRA DA SILVA Cloud Computing 59
Ethical issues
n Paradigm shift with implications on computing ethics
n The control is relinquished to third party services
n Different laws in different countries
¨ The data is stored on multiple sites administered by several
organizations
¨ Multiple services interoperate across the network
n Privacy and data confidentiality
n Implications
n Unauthorized access
n Data corruption
n Infrastructure failure, and service unavailability
n Identity fraud and theft are made possible by the unauthorized access
to personal data in circulation and by new forms of dissemination
through social networks
¨ These could also pose a danger to cloud computing
Privacy issues
n Such events can affect the Internet domain name servers and
prevent access to a cloud or make the service unavailable
n in 2004 an attack at Akamai caused a domain name outage and a
major blackout that affected Google, Yahoo, and other sites
n in 2009, Google was the target of a denial of service attack which
took down Google News and Gmail for several days
n in 2012 lightning caused a prolonged down time at Amazon
n Data confidentiality
n Legislative conformity
n Rejection from clients
n Data confidentiality
n Dispossession of work station
Cloud activities
n http://cloud-computing.softwareinsider.com/
n https://www.cloudorado.com/
Further reading
n Mandatory
¨ http://en.wikipedia.org/wiki/Cloud_computing
¨ Cloud Computing Tutorial, Simple easy learning,
tutorialspoint.com
¨ The NIST Definition of Cloud Computing
¨ NIST Cloud Computing Standards Roadmap, 2013
n Recommended
¨ Cloud Computing Bible, Barrie Sosinsky, Wiley Publishing, Inc.
2011
¨ NIST Cloud Computing Reference Architecture
¨ NIST Cloud Computing Standards Roadmap
¨ A View of Cloud Computing, ACM, vol. 53, nº 4, 2010
¨ Cloud Computing, ACM, vol. 51, nº 7, 2008
Stage - Sujet 2
Blockchain