Cloud Computing Architecture& Services: Manju Sharma, Sadia Husain, Halah Zain
Cloud Computing Architecture& Services: Manju Sharma, Sadia Husain, Halah Zain
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. III (Mar.-Apr. 2017), PP 13-18
www.iosrjournals.org
Abstract: With the invention of new technology and the need of data storage cloud computing has become a
scalable services in consumption and delivery in the field of Computing. Technically the goals of Cloud
Computing include Service-Oriented Architecture (SOA) and Virtualizations of hardware and software. The
Cloud Computing is to basically concern with the sharing of resources among the cloud service consumers,
partners, and vendors in the cloud value chain. The resource sharing at various levels results in various cloud
offerings such as infrastructure cloud, software cloud, application cloud (e.g., Application as a Service), and
business cloud (e.g., business process as a service).Using cloud help us sharing the hardware and software
resources which reduces the management and resources cost and gives good potential to the business.
Keywords: Cloud computing, Cloud Service Models, Service Model Architectures,Cloud Deployment Models,
challenges & issues.
I. Introduction
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or service provider interaction [1].
In recent years, cloud computing as a new kind of advanced technology accelerates the innovation for
the computer industry. Cloud computing is a computing model based on networks, especially based on the
Internet, whose task is to ensure that users can simply use the computing resources on demand and pay money
according to their usage by a metering pattern similar to water and electricity consumption. Therefore, it brings
a new business model, where the services it provides are becoming computing resources [2].
Cloud computing is highly scalable and creates virtualized resources that can be made available to
users. Users do not require any special knowledge about the concept of Cloud computing to connect their
computers to the server where applications have been installed and use them. Users can communicate through
Internet with remote servers. These servers can exchange their computing slots themselves [3]. “Comes from
the early days of the Internet where we drew the network as a cloud… we didn‟t care where the messages
went… the cloud hid it from us” – Kevin Marks, Google
• First cloud around networking (TCP/IP abstraction)
• Second cloud around documents (WWW data abstraction)
• The emerging cloud abstracts infrastructure complexities of servers, applications, data, and heterogeneous
platforms [4].
In this paper will present the basic literature needed to understand the cloud infrastructure and its deployment
models. Accordingly the paper is organized into sections, starting with introduction,the details of Cloud
Infrastructures, explanation of different deployment models, data security,conclusion and future work.
We should rush to the cloud because there is valid and significant business and IT reasons for the cloud
computing paradigm shift. The fundamentals of outsourcing as a solution apply:
• Reduced cost: Cloud computing can reduce both capital expense (CapEx) and operating expense (OpEx) costs
because resources are only acquired when needed and are only aid for when used.
• Refined usage of personnel: Using cloud computing frees valuable personnel allowing them to focus on
delivering value rather than maintaining hardware and software.
• Robust scalability: Cloud computing allows for immediate scaling, either up or down, at any time without
long-term commitment [5].
3.2 Platform as a service (PaaS): Platform as a Service (PaaS) is another application delivery model. PaaS
supplies all the resources required to build applications and services completely from the Internet, without
having to download or install software. It allows customers to develop new applications using API deployed and
configurable remotely. The platforms offered include development tools, configuration management, and
deployment platforms. Examples are Microsoft Azure, Force and Google App engine. PaaS, you have to look at
which applications are most appropriate for maintenance on the cloud. It will obviously differ from organization
to organization, but you likely won‟t move your key mission-critical tasks to the cloud. For instance, a company
that develops software for healthcare providers is going to have different needs than a financial advisor, for
instance. But even within the same industry, different organizations will get different things out of the cloud.
Hence the difference between SaaS and PaaS is that SaaS only hosts completed cloud applications
whereas PaaS offers a development platform that hosts both completed and in-progress cloud applications. This
requires PaaS, in addition to supporting application hosting environment, to possess development infrastructure
including programming environment, tools, configuration management, and so forth. An example of PaaS is
Google AppEngine [6].
3.3 Infrastructure as service (IaaS): Itprovides virtual machines and other abstracted hardware and operating
systems which may be controlled through a service API. Examples include Amazon EC2 and S3, Terremark
Enterprise Cloud, Windows Live Skydrive and Rackspace Cloud. as a Service (HaaS) is the next form of service
available in cloud computing. Where SaaS and PaaS are providing applications to customers, HaaS doesn‟t. It
simply offers the hardware so that your organization can put whatever they want onto it.The basic strategy of
virtualization is to set up independent virtual machines (VM) that are isolated from both the underlying
hardware and other VMs. Notice that this strategy is different from the multi-tenancy model, which aims to
transform the application software architecture so that multiple instances (from multiple cloud consumers) can
run on a single application (i.e. the same logic machine). An example of IaaS is Amazon's EC2 [6].
3.4 Database as a Services (DaaS):Another service offering that is becoming prevalent in the world of cloud
computing is Database as a Service (DaaS). The idea behind DaaS is to avoid the complexity and cost of
running your own database. DaaS allows consumers to pay for what they are actually using rather than the site
license for the entire database. In addition to traditional storage interfaces such as RDBMS and file systems,
some DaaS offerings provide table-style abstractions that are designed to scale out to store and retrieve a huge
amount of data within a very compressed timeframe, often too large, too expensive or too slow for most
commercial RDBMS to cope with. Examples of this kind of DaaS include Amazon S3, Google BigTable, and
Apache HBase, etc. [6], [10].
Figure3.Deployment Models
enterprise such as remote access to IT infrastructure (in case of emergencies etc) or online document
collaboration from multiple locations.
The facets from which the security threat might be introduced into a cloud environment are numerous
ranging from database, virtual servers, and network to operating systems, load balancing, memory management
and concurrency control (Hamlen et al., 2010). Data segregation and session hijacking are two potential and
unavoidable security threats for cloud users. One of the challenges for cloud computing is in its level of
abstraction as well as dynamism in scalability
which results in poorly defined security or infrastructural boundary. Privacy and its underlying concept
might significantly vary in different regions and thus it may lead to security breach for cloud services in specific
contexts and scenarios (Chen & Zhao, 2012). Data loss and various botnets can come into action to breach
security of cloud servers. Besides, multi-tenancy model is also an aspect that needs to be given attention
(Kuyoro et al., 2011; Ogigau-Neamtiu, 2012) when it comes to security. Security in the data-centres of cloud
providers are also within the interests of security issues, as a single physical server would hold many clients'
data (Okuhara, Shiozaki& Suzuki, 2010) making it a common shared platform in terms of physical server or
operating system. The storage security at the cloud service providers data centres are also directly linked with
the security of the cloud services (Mircea, 2012). All the traditional security risks are thus applicable with added
degree of potency in a cloud infrastructure which makes the ongoing success of cloud computing a quite
challenging one. Confidentiality, availability and integrity are the generalized categories into which the security
concerns of a cloud environment falls. Threats for a cloud infrastructure are applicable both to data and
infrastructure (Agarwal&Agarwal, 2011).[15]
References
[1]. P. Mell and T. Grance, "Draft nist working definition of cloud computing - v15," 21. Aug 2009, 2009.
[2]. Z. Chengyun, “Cloud Security: The security risks of cloud computing, models and strategies”, Programmer, May.2010, pp.71-73.
[3]. B. Hayes, "Cloud computing," Comm. Acm, vol. 51, no. 7, pp. 9– 11, 2008.
[4]. Effectively and Securely Using the Cloud Computing Paradigm - Peter Mell, Tim GranceNIST, Information Technology
Laboratory 10-7-2009
[5]. Cloud computing fundamentals - A different way to deliver computer resources Skill Level: Introductory Grace Walker IT
Consultant Walker Automated Services.
[6]. Cloud Computing: Issues and Challenges Tharam Dillon Digital Ecosystems and Business Intelligence Institute Curtin University
of Technology Perth, Australia [email protected] Chen Wu and Elizabeth Chang Digital Ecosystems and Business
Intelligence Institute Curtin University of Technology Perth, Australia{chen.wu, change}@curtin.edu.au.
[7]. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, "Above the
clouds: A 32Berkeley view of cloud computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-
2009-28, 2009.
[8]. M. N. Huhns and M. P. Singh, "Service-Oriented Computing: Key Concepts and Principles," IEEE Internet Computing, vol. 09,
pp. 75 - 81, 2005.
[9]. Quail MA, Smith M, Coupland P, Otto TD, Harris SR, Connor TR, et al. A tale of three next generation sequencing platforms:
comparison of Ion Torrent, Pacific Biosciences and IlluminaMiSeq sequencers. BMC Genomics 2012;13:341.
[10]. M. N. Huhns and M. P. Singh, "Service-Oriented Computing: Key Concepts and Principles," IEEE Internet Computing, vol. 09, pp.
75 - 81, 2005.
[11]. I. Foster and C. Kesselman, The Grid: Blueprint for a New Computing Infrastructure : Morgan Kaufmann, 1998.
[12]. J. Napper and P. Bientinesi, "Can cloud computing reach the top500?," in Combined Workshops on UnConventional High
Performance Computing Workshop plus Momory Access Workshop, 2009, pp. 17-20
[13]. techtarget.com/definition/private-cloud.
[14]. ManjuSharma, Sadia Husain, Shazia Ali, International Journal of Latest Research in Science and Technology ISSN (Online):2278-
5299Volume 6, Issue 1: Page No.52-56,January-February 2017 CLOUD COMPUTING RISKS AND RECOMMENDATIONS
FOR SECURITY.
[15]. Monjur Ahmed1 and Mohammad Ashraf Hossain, CLOUD COMPUTING AND SECURITY ISSUES IN THECLOUD,
International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014