Cloud Computing
Cloud Computing
S
IM
M
N
COURSE DESIGN COMMITTEE
S
IM
Author: Charu Verma
M
Copyright:
2017 Publisher
ISBN:
978-93-86052-11-7
Address:
4435/7, Ansari Road, Daryaganj, New Delhi–110002
Only for
NMIMS Global Access - School for Continuing Education School Address
V. L. Mehta Road, Vile Parle (W), Mumbai – 400 056, India.
S
4 Technology Platforms for Cloud Computing 77
c u rr i c u l u m
Introduction to Cloud Computing: Introduction; Cloud Service Models; Cloud Deployment Models;
Exploring the uses of cloud; Cloud computing Features; Cloud Characteristics (On-demand usage ,
Ubiquitous Access, Resource pooling, Elasticity, Measured usage, Resiliency) ; Common use cases of
cloud Computing
Cloud Service Models: Infrastructure as a service (IaaS); Platform as a service (PaaS); Software as a
service (SaaS), Everything as a Service (XaaS)
S
Technology platforms for Cloud Computing: AWS, Azure, Google App Engine, Blue Cloud, Force.com
etc.
IM
Challenges of Cloud Adoption: Performance; Reliability; Security and Privacy; Bandwidth costs
Design Requirements and Providers; Virtualization at OS level; Middleware support for Virtualization
Cloud Computing Key Business Drivers: Cloud computing and out-sourcing; Scalability: Types of
Scalability; time to Market Benefits; Distribution over Internet
N
Securing the Cloud: Basic Terms and Concepts, Confidentiality, Integrity, Authenticity, Availability,
Threat, Vulnerability, Risk, Security Controls, Security Mechanisms, Security Policies, Threat Agents
, Anonymous Attacker, Malicious Service Agent, Trusted Attacker , Malicious Insider ,Cloud Security:
Threats , Traffic Eavesdropping, Malicious Intermediary, Denial of Service, Insufficient Authorization,
Virtualization Attack, Overlapping Trust Boundaries
Mobile Cloud Introduction: Definition; Architecture; Benefits; challenges; Computing in mobile and
at cloud shield
CONTENTS
S
1.1 Introduction
1.2 Cloud
IM
1.2.1 Cloud and Other Similar Configurations
1.2.2 Cloud Characteristics
1.2.3 Exploring the Uses of Cloud
Self Assessment Questions
Activity
1.3 Cloud Service Models
M
Activity
1.5 Cloud Computing
1.5.1 Cloud computing Features
1.5.2 Components of Cloud Computing
1.5.3 Common Use Cases of Cloud Computing
1.5.4 Myths and Truths of Cloud Computing
Self Assessment Questions
Activity
1.6 Impact of Cloud Computing on Businesses
Self Assessment Questions
Activity
1.7 Summary
1.8 Descriptive Questions
1.9 Answers and Hints
1.10 Suggested Readings & References
Introductory Caselet
n o t e s
S
to build IT infrastructure, which was required for administrative
tasks as well as for performing intricate surgeries. Therefore, the
IT infrastructure had to be scalable and robust to achieve better
results and provide satisfactory treatment to patients.
IM
However, the hospital was not specialised in setting up the IT in-
frastructure that could support surgeries and other regular func-
tionalities in the hospital. Besides, Narayana Hrudayalaya was
not interested in hiring and retaining IT-skilled people who could
build the required infrastructure. Raman was also concerned that
M
n o t e s
learning objectives
1.1 INTRODUCTION
The present-day business environment provides numerous challeng-
S
es related to the use of IT hardware and software resources by an or-
ganization. For example, if a small-sized organisation needs to expand
its employee base, then it would require additional hardware and soft-
ware resources for the new employees.
IM
Ensuring that these new hardware and software resources are com-
patible with the requirements of the employees as well as cost-efficient
often proves to be a challenge for the organisation. During the course
of its expansion, the organisation may be required to purchase costly
hardware and software resources, which, when used in isolation, may
not fulfill all the requirements. In such cases, the organisation might
M
Now consider a situation where the organisation while going for ex-
pansion, has the option of a dynamically scalable and virtual comput-
ing environment provided over the Internet. Such a virtual computing
environment would not only be scalable to accommodate increased
requirements, but would also cost less (only once, perhaps) even when
the organisation decides to expand multiple times. This is exactly what
the concept of cloud computing offers.
n o t e s
1.2 Cloud
A cloud is defined as an integration of hardware, networks, storage,
services, and interfaces that enables you to deliver and access com-
puting as a service. The three main users of cloud computing are
end-user, business management user, and cloud service provider. The
end-user utilizes the cloud services. The business management user
takes the responsibility of the cloud data and services. The cloud ser-
vice provider is responsible for the maintenance of the cloud’s IT as-
sets.
S
The cloud acts as a common location which is capable of fulfilling the
computing needs of organisations and the users linked to it. The best
IM
feature of the cloud is that it is scalable, which means it can easily ex-
pand and contract. The scalability allows provision of additional cloud
resources to the user whenever needed and releasing or reverting
the resources when they are no longer needed by the user. The cloud
expands to fulfill the demand for additional resources and contracts
when the additional resources are released.
M
provider company to know the extent of the usage of the service and
also saves cost for the company, as it has to spend less for advertising
the software. To the client company, the cloud saves new expenditure
which they would incur on purchasing the new software whenever
their requirement changes. They can utilise the other services that are
based on the changed requirements using the billing model feature.
This billing model helps in calculating the cost of the usage of the ser-
vice by a particular client.
The cloud offers the services that execute in the cloud environment
and fulfill the needs of HR management, financial analysis, invento-
ry management, and risk management for the clients. It has now be-
come a popular way of selling the software as service. To understand
this, let’s reconsider the case of Narayana Hrudayalaya hospital again,
which aiming to help poor children afflicted with heart problems. In
2010, the hospital decided to increase the number of beds from 5000
to 30000 in coming five years for patient treatments. They required
finding a way to create IT infrastructure, which had to be scalable and
robust to achieve better results and provide satisfactory treatment to
patients. Therefore, they decided to use the data hosting services of-
n o t e s
fered by the cloud. Using cloud has raised the healthcare standards
in the hospital. Now, the database of Narayana Hrudayalaya resides
on the cloud, which can be referred by patients easily across different
branches of hospital. In addition, cloud has provided is the high level
of security to the database of Narayana Hrudayalaya.
S
use these applications over the Internet and would be billed for
the amount of utilisation.
Autonomic computing: It is a group of self-managing features of
IM
distributed computing resources that can function on the basis of
a group of pre-defined policies. This type of computing is capa-
ble of self-healing (that is, discovering and correcting their faults),
self-configuration of their components, self-optimisation of their
resources, and self-protection from malware and attacks.
Cluster: It is a group of networked systems sharing the same set of
M
resources, where all the nodes are actively working or some nodes
are in the standby mode, waiting to take over after the failure of
an active node.
Distributed computing: This is an implementation technique
N
n o t e s
width more effectively. At that time, they used the cloud symbol to
demarcate the points between the networks that were the responsi-
bility of the provider and the points that were the responsibility of the
consumer.
Peer-to-Peer Architecture
S
A peer-to-peer architecture is a network of hosts in which sharing of
resources, processing, and communications control are fully decen-
tralised. Each host acts as a server or provider of certain services.
However, it relies on other hosts within the network for other services.
IM
Each client present on the network is considered equal in terms of
using resources, and users are verified by each individual machine.
Figure 1.1 shows the peer-to–peer architecture:
Peer 2
Peer 1
M
Peer 3
N
n o t e s
Client–Server Architecture
S
hosting and support is the responsibility of the cloud service provider,
and the amount of available resources appears to be infinite to the
consumer. Figure 1.2 shows the client-server architecture:
IM
File Server
Databse Server
M
Grid Computing
In the early 1990s, Carl Kesselman and Ian Foster formulated the
concept of grid computing as a cluster of computer systems that were
geographically distributed but worked together to perform a common
task. In a grid, a cluster of loosely coupled computers work together
to solve a single problem that involves massive amounts of numerical
calculation and compute cycles. Grid computing uses grid-controlling
software that splits the work into smaller fragments and allocates each
fragment to a collection of thousands of computers. The controlling
unit later assembles the results to build the output. Grids are usually
used to harness idle computer power.
n o t e s
Grid
Control
Server
Client 1
Task 1
S
Task 2
Cluster of Grid Nodes
Client 2
IM
Figure 1.3: The Grid Computing Architecture
n o t e s
S
er or other disruption.
can be overcome by using the cloud, as you can store large files
on the cloud and can share them by downloading at any location,
whenever required.
2. Data management: Data is of prime importance for any
N
n o t e s
S
1. The cloud service provider is responsible for maintaining the
IT assets of the cloud. (True/False)
2. HPC stands for _______ Performance __________.
IM
3. The __________ allows provision of additional cloud resources
to the user whenever needed and releasing or reverting these
resources when they are no longer needed by the user.
M
Activity
With the help of the Internet, search the basic architecture of the
cloud.
N
n o t e s
For all the cloud service models described above, you pay a monthly
fee to the cloud provider for the hardware or applications you use.
Figure 1.4 shows the projected global market size for the public cloud
by the end of this decade:
S
IM
Figure 1.4: Global Public Cloud Market Size, 2011–2020
Source: Forest Research Inc.
Never Be the Same,” it was said that the SaaS revenue will grow by
Compound Annual Growth Rate (CAGR) of around 26% up to 2014.
Traditional ERP projects and sales would be, in particular, badly hit
with traditional ERP upgrades being delayed or cancelled and would
grow at a CAGR of just 5%.
N
It was also said that software vendors will be looking at new routes to
market their products and services. The IDC survey found that most
SaaS was being delivered to US companies (they currently had 71% of
the market), but by 2014 it would become more global.
The PaaS market size was expected to grow at a CAGR of 26% and
grow from US$ 810 million in 2010 to US$ 1.8 billion by 2015 and
evolve into a strong alternative to traditional internal development
platforms. Many Independent Software Developers (ISVs) have been
using PaaS since 2010; however, corporate software developers and
service providers have started engaging more with PaaS from 2012
only.
For SaaS, the volume is more than that for IaaS or PaaS. Total revenue
for 2011 was close to US$ 21 billion. Forrester Research had predicted
that SaaS revenues would reach US$ 92 billion by 2016 and account
for 26% of the software market. This would create some saturation,
and growth would likely to be slow between 2016 and 2020.
n o t e s
Activity
S
1.4 Cloud Deployment Models
Generally, cloud deployment models can be classified on the basis of
IM
either location or the type of service being provided. On the basis of
location, cloud deployment models can be classified as public cloud,
private cloud, hybrid cloud, and community cloud. Let’s learn about
each model in detail:
Public clouds: These type of clouds are accessed or used by gen-
eral masses. Public clouds are hosted, maintained as well as man-
M
Company X
Cloud
Services
Public Cloud (IaaS/ Company Y
PaaS/
SaaS)
Company Z
n o t e s
S
Cloud
Private
IM
Services
Cloud (IaaS/PaaS/
SaaS)
Community Community
Cloud for Level A Cloud for Level B
n o t e s
S
the entire or a part of an application to a public cloud during peak
periods. Figure 1.8 shows the implementation of a hybrid cloud:
IM
Public Cloud
Migrated Application
M
Private
Cloud
Organisation X Organisation Y
N
Cloud Services
(IaaS/PaaS/SaaS)
n o t e s
Activity
Exhibit
Limitations of cloud
S
know that you will be surrendering all your company’s pri-
vate and confidential data to a third-party cloud service pro-
vider. This could potentially put your company to greatest risk.
Therefore, you must select the most reliable service provider,
IM
who could keep your information totally secure.
Prone to attack: Storing information in the cloud could make
your company’s vulnerable for external hacking attacks and
threats. As there is nothing on the Internet is completely secure,
so there is always a possibility of stealing of confidential data.
M
n o t e s
S
ing, which include features, types, modes, benefits, comparisons, and
stakeholders:
IM
Various Aspects of Cloud Computing
M
Cloud
N
Systems
n o t e s
S
cally feasible in context of its use, it will definitely decay within a small
time period. So in developing cloud applications or data centers, eco-
nomic feasibility must be considered.
IM
Besides economic feasibility, some more important features that are
considered in cloud computing are as follows:
Quality of service: In cloud computing, the Quality of Services
(QoS) at the resources level guarantees the basic quality of ser-
vices. Cisco, Amazon EC2 and Amazon S3 are the example of such
kind of system.
M
n o t e s
S
bilities. With advent of cloud systems, a company can convert their
CAPEX to OPEX by using cloud resources and applications.
Multi-tenancy: It is regarded as one of the essential attribute in
IM
cloud computing concept which allows multiple users from differ-
ent domains to access single resource or service of their images si-
multaneously. In a multitenant architecture, a service or resource
is implemented as virtually partitioned and each user can access
an instance of a customised virtual application. Multi-tenancy also
supports image separation, general data management, and instan-
tiation that improve overall availability of resources to users.
M
n o t e s
S
work services, such as encryption and compression, during transit
will benefit both the service provider and the user.
Cloud Application Programming Interface (API): A cloud API is
IM
a set of programming instruction and tool that provides abstrac-
tions over a specific provider cloud. It includes a custom or unique
provider call that can be used to enhance the amount of control
over a cloud implementation. These calls can be used to build ap-
plications for accessing and communicating with the cloud ser-
vices. APIs help programmers to have a common mechanism for
M
n o t e s
Many businesses are opting for private cloud over public cloud. It is a
cloud like environment, where virtualised resources are available in a
pool with pay-per-use billing for internal business units. The applica-
tion, data, and underlying infrastructure are usually housed within the
enterprise and protected by the corporate firewalls. Data safety, pro-
cess compliance, and service availability remain in full control of the
internal IT staff. However, the private cloud takes away the real benefit
of a cloud, where you do not have to pay for the capital expenses for
the hardware and software and do not have to spend on configura-
tion maintenance. With a private cloud, these benefits go away. You are
burdened with the procurement expenses and recurring maintenance.
This again robs a business manager of peace of mind. As such, it is
important to keep a tab on the expenses related to a private cloud. To
partially offset the expenses of a private cloud, owners can take advan-
tage of a virtual private or hybrid cloud, where a public cloud provider
S
uses its public resources to create a private cloud for the enterprise.
Customer Datacenter A
Private Cloud
VPN links
Cloud Provided Datacenter Y
Internet
Customer Datacenter B
Secure bridge
Private Cloud between Customer
and provider’s Cloud Provided Datacenter Z
datacenters
There are several apprehensions of the impact of the cloud and how
this disruptive technology will impact individuals, corporate IT teams,
n o t e s
S
Level Agreement (SLA) with the Cloud Service
Provider (CSP), and working on escalations to the
CSP.
2. My organisation
IM
You will still be responsible for the integrity, secu-
will lose control rity, and backups, regardless of whether the user
over the user data is on-premise or off-premise. The most suc-
data. cessful cloud deployment is a hybrid cloud, where
you can keep critical data on-premise and use the
cloud during the peak-load period and for less crit-
ical applications.
M
n o t e s
Activity
S
In any case, IT managers around the world are excited by the poten-
tial of cloud computing, but at the same time, are apprehensive of the
IM
security and compliance concerns around it. Despite this, senior man-
agement and business owners want to go for cloud, as it allows them
to get rid of the IT infrastructure and focus on expanding their core
competencies and revenue verticals. They look forward to pay-per-
use invoices and on-demand resource provisioning for meeting peak
loads, without having to buy and manage resources for use during
temporary peak-load periods.
M
insiders who manage their hardware platform. All these factors are
expected to have an impact on the availability and quality of services
provided by IT managers to corporate users, for which the IT manag-
ers are ultimately liable and answerable. As such, cloud service should
not be considered similar to traditional hosting. A cloud service has a
few salient features that distinguish it from hosting services. These
features are given as follows:
Cloud services are sold on demand, typically by the minute, hour,
or month.
You as a user can use as much or as little of a service as you want
at any time.
The service can be an application or even hardware resources,
such as storage capacity or compute power.
The service and underlying infrastructure is fully managed by the
provider. All you need is a Web browser and an Internet connec-
tion.
n o t e s
S
self assessment Questions
Activity
1.7 SUMMARY
The cloud can be defined as an integration of hardware, networks,
storage, services, and interfaces that allows in offering the com-
puting as service.
The cloud is helpful to both the provider company, which provides
the cloud services, and the client company, which uses the services
on the cloud.
In the private cloud, the cloud computing infrastructure is sole-
ly designed for a single organisation and cannot be accessed or
shared with other organisations.
The cloud environment in which various internal or external ser-
vice providers provide services to many organisations is known as
hybrid cloud.
The cloud computing is fully based on the Internet.
n o t e s
The cloud computing uses the cloud which provides the mecha-
nism to provide the services as per the needs of the client at any
location and time.
The cloud computing allows the organisations to treat their re-
sources as a pool, and not independently.
key words
S
Community Cloud: A type of cloud that is shared among vari-
ous organisations with a common tie.
Cloud Computing: A kind of computing which makes the organ-
IM
isations treat their resources as a pool, and not independently.
n o t e s
S
resources you use and the benefits you get from the cloud. Refer
to Section 1.3 Cloud Service Models.
3. Generally, cloud deployment models can be classified either on
IM
the basis of location or the type of service being provided. Refer
to Section 1.4 Cloud Deployment Models.
4. Cloud computing is completely based on the Internet and is
considered as the next phase in the development of the Internet.
Refer to Section 1.5 Cloud Computing.
M
SUGGESTED READINGS
Murugesan, S., & Bojanova, I. (2016). Encyclopedia of Cloud Com-
puting. Chichester, West Sussex: John Wiley & Sons.
Hurwitz, J. (2010). Cloud Computing for Dummies. Hoboken, NJ:
Wiley.
E-REFERENCES
(n.d.).Internet and Technology. Retrieved February 21, 2017, from
https://www.ibm.com/developerworks/community/blogs/722f6200-
f4ca-4eb3-9d64-8d2b58b2d4e8/entry/4_Types_of_Cloud_Comput-
ing_Deployment_Model_You_Need_to_Know1?lang=en
How the cloud is improving healthcare in remote populations.
(n.d.). Retrieved February 21, 2017, from http://www.cloudcom-
puting-news.net/news/2017/jan/16/how-cloud-improving-health-
care-remote-populations/
CONTENTS
S
2.1 Introduction
2.2 Infrastructure as a Service (IaaS)
IM
Self Assessment Questions
Activity
2.3 Platform as a Service (PaaS)
2.3.1 Leveraging PaaS for Productivity
2.3.2 Guidelines for Selecting a PaaS Provider
2.3.3 Concerns with PaaS
M
Introductory Caselet
n o t e s
S
Joe Harrow, Director of Customer Service of Groupon decided
to find some Web-based solution to this problem, and for this he
chose to take the services of Zendesk, a company providing en-
IM
terprise level software solutions.
Zendesk support is a customer service platform, based on the
Software As A Service (SaaS) cloud service model, which pro-
vides help desk solutions to the companies from small size to me-
dium size. As a customer, you do not need to install it, because it
is available on one easy monthly subscription.
M
n o t e s
learning objectives
2.1 INTRODUCTION
In the previous chapter, we have discussed various cloud-based ser-
S
vices briefly. You have seen that these end-services are at least, to
some extent, similar to what IT managers offer from internally-host-
ed, traditional infrastructure. Both cloud-based services and the ser-
vices provided by IT managers offer computing power and storage, an
IM
application-development and hosting platform, which users can use
with little or no customisation.
But the services offered by the cloud are more beneficial in compari-
son to services provided by IT managers. For example, the virtualised
(and usually vast) resource pooling and self-service characteristics are
fundamental aspects of the services offered by the cloud. In a public
M
monthly basis (or whatever the billing period is) for the actual amount
of resources used for that month. It is just like a utility bill that a user
might get at home for phone or electricity usage.
The cloud services have been in use for years before the term “cloud
computing” was coined. In fact, all services available in the cloud have
been available since the dawn of computing. But now, the cost of set-
ting up cloud infrastructure has become cheaper, the cloud delivery
mechanisms have become more convenient to use, and the related
bandwidth has become more widespread and affordable.
n o t e s
For larger businesses, several of their internal business units will move
towards the cloud, unless compelled by government regulations to
keep the data and applications within their internal premises. There
are three key types of cloud-based service mechanisms:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
S
2.2 INFRASTRUCTURE AS A SERVICE (IAAS)
IaaS is a model in which you, as a customer, pay for the resources
(such as computing power, memory, storage, bandwidth, security de-
IM
vices, load balancers, etc.) kept at the provider’s facility or wherever
the provider keeps its hardware. The provider owns the equipment
and maintains it at a level specified in the previously-agreed upon
Service Level Agreement (SLA). As a customer, all you need to do
is to pay for the part of the resources dedicated permanently to your
account or resources that you acquire temporarily to meet the short-
M
term needs. The customer can install OS, applications, libraries, and
other software within the virtual machine and has limited control on
networking and security equipment, such as host firewalls.
Since the early 1980s, various offerings such as mainframes and thin
computing (which are similar to today’s IaaS and private clouds) have
been built. One of the innovations of IaaS was a storage provider
known as Storage Networks, which was built in late 90s in Waltham,
Massachusetts. They offered storage-as-a-utility along with pay-per-
n o t e s
use billing model. They provided a list of services, for example, data
archiving, backups, and replication. The user community was, howev-
er, not ready for the services and they were unfortunately far ahead of
their times to be commercially successful.
In July 2003, its Board of Directors announced the closure of the busi-
ness and approved a plan to liquidate the company. The company re-
tained only a small transition team to oversee the wind down of the
business and terminated rest of the employees working in the com-
pany.
S
coined. However, today, with robust virtualisation technologies (such
as Xen from Citrix, Hyper-V from Microsoft, vSphere from VMware
and open source software), high-speed broadband, and shrinking cor-
IM
porate budgets for IT, businesses are looking to buy or rent only what
they need for the day. IaaS is the solution for them. To be commercial-
ly successful, the IaaS service must include the following:
Utility-style computing service with pay-per-use billing
Superior, world-class IT infrastructure and support
M
As a user, you need to be sure that your IaaS provider has the
above-mentioned attributes. Here is a list of questions to ask your
provider:
1. What does the provider have in place to protect non-IT
infrastructure, such as its datacenter, UPS, diesel generator,
racks, and air-conditioners, and IT infrastructure, such as
servers and storage?
2. How does it configure the security of the virtual machines?
3. How does the provider validate the integrity of the Virtual
Machine Images (VMIs)?
4. How does it protect customer data, applications, and
infrastructure from attacks by other tenants in the same cloud?
5. What tools does the provider use to detect security flaws?
n o t e s
6. What are the physical locations where data will be stored? This
is required for compliance with certain regulations that need
data to be in the same country.
7. How and at what frequency are the backups provided? Is backup
data encrypted?
8. What are the DR and BCP plans?
S
a. Service Level Agreement b. Server Level Agreement
c. Service Less Agreement d. Services Level Agreements
IM
3. One of the innovations of IaaS was a storage provider known
as _______.
4. Xen from Citrix, Hyper-V from Microsoft and vSphere from
VMware are _______ technologies.
M
Activity
Find out about three types of IaaS cloud offerings and discuss with
your friends.
N
n o t e s
S
Deployment Deployment and scalability Scalability, failover, and
are left for installation and load-balancing are the
go-live phases. basic building blocks.
Runtime Moni-
IM
Development solutions are Built-in monitoring avail-
toring usually not related with able with the develop-
runtime monitoring. ment platform.
Virtual Ma- Multiple options are availa- Need to work with the
chines, Servers, ble and can be customised infrastructure offered by
Storage, Data- to meet any user require- PaaS providers.
bases ment.
M
n o t e s
S
scale, and manage the applica-
tions.
n o t e s
S
Identity management: Developers in a PaaS or traditional envi-
ronment need to authenticate and manage users within their ap-
plications. Each user has a set of privileges managed by a role-
IM
based access mechanism. The PaaS cloud must support federated
identity management system where a user, once authenticated, is
given credentials to access services within the application as well
as on other clouds. APIs with the PaaS should cache, use, and de-
lete credentials as needed.
Messaging: PaaS cloud must provide ability to APIs to manage
M
Besides the above-mentioned features, you must make sure that the
PaaS environment meets your specific programming needs.
n o t e s
S
Does the provider have sound intrusion detection or prevention
systems?
What about change management? Does the provider have a ro-
IMbust, centralised mechanism for maintenance without incurring
downtime or performance degradations?
What are the provisions for backups and DR?
How does the cloud vendor ensure that application flaws of one
customer do not impact the shared infrastructure or someone
else’s data?
M
Can the public PaaS provider offer the services within a hybrid
cloud model? This will assure enhanced security and flexibility.
Out of all the applications you have to develop, some will not be suit-
N
able for PaaS. For example, if you need to develop and test on a main-
frame or Unix system, that is not offered by PaaS provider, you will
need to set up and use an internal environment. For other applica-
tions, you can use environments offered by PaaS providers.
n o t e s
S
With the ephemeral nature of cloud businesses, make sure that the
provider has a reliable set of partners, satisfied customers, and a
IM
sound financial base and can continue to survive even in harsh times.
The convenience attained with PaaS (as per the above points) leads to
a great loss of control over the environment and security. The follow-
ing are the drawbacks of using PaaS:
M
ally banned.
Portability/Interoperability with applications on another cloud:
Unlike IaaS, where OS images can be moved between clouds, ap-
plications developed on a PaaS involve cloud-provider’s APIs and
customised language extensions. This makes porting of applica-
tions difficult.
Security: Some PaaS providers include built-in security services,
but the end-user has no information on the implemented security
mechanisms. The customers cannot install host-level security ap-
plications for antivirus, WAF (python-based framework for config-
uring, compiling, and installing applications), host-based firewalls
or disable services or ports.
Security for development code: Since the development code re-
sides on a third-party, shared infrastructure, the customers are
wary of security and privacy of the code, which is the prime In-
tellectual Property (IP) for the Independent Software Vendors
(ISVs).
n o t e s
Select a PaaS provider with the right type of orientation and support
for various software languages that will help to build a flexible and
portable application:
Programming-language specific PaaS: These were common in
the early 2000s but are now less in number. They support one
language, be it Java, Ruby on Rails, Python or .NET or any an-
other language. The advantages they provide are the use of lan-
guage-specific tools, customised support, extensive libraries, and
specific code to run computing-intensive tasks in the clouds. It
allows scientists and analysts to access extensive computing re-
quirements they are comfortable with and need from, within a de-
velopment and test environment.
S
Language-agnostic providers: They were designed for developers
working with multiple programming languages, databases, and
frameworks. For example, they offer support for various languag-
es, such as Python, Java, .NET, and Ruby, and databases, such as
IM
MS SQL, MySQL, Postgres, and MongoDB. Potential drawbacks
are that you may not find the same degree of language-specific
customisations or libraries to distribute your code to several other
clouds.
Hybrid PaaS: It is a cloud service that gives you the freedom to
work with a complex mix of off-premises and on-premises applica-
M
tions and data. They abstract the infrastructure layer and on-prem-
ise resources. For example, if you have a large, on-premise Oracle
database that you do not want to replicate to a public cloud for its
size, security or cost reasons, you can access it from applications
in a hybrid PaaS. However, a potential drawback of hybrid PaaS
N
The PaaS market is fast maturing with several commercial PaaS pro-
viders. Your selection would depend on your need for a single lan-
guage, mix of stack component and several languages or a PaaS that
would allow you to access in-house data or applications.
n o t e s
Activity
S
SaaS provides several benefits. Users get to use the application over
the Internet without the onus of buying, implementing or managing
the software. Similar to IaaS and PaaS, the fee is charged according to
IM
the usage-basis, whereby customers purchase rights to use some or all
modules as needed. Although SaaS and ASP may seem similar, they
are different in many ways.
n o t e s
S
But SaaS needs cautious thinking and a well-planned deployment.
There must be a tested confidence that organisational data is secure
in the remote site. The issue of confidentiality, integrity, and service
IM
availability has to be addressed by the provider. Authentication to the
application needs to be tightly protected using tested Identity Access
Management (IdAM) applications. Here is a list of questions you need
to ask your SaaS provider:
How does the provider make sure that the users who sign up are
not fraudsters and will not start malicious activity?
M
n o t e s
S
based on HTTP (Hyper Text Transfer Protocol), REST (Represen-
tational State Transfer) and SOAP (Simple Object Access Proto-
col).
IM
Collaborative functionality: SaaS applications are inspired by web
2.0 functionality and the success of online social networks, so that
these applications allow its users to collaborate and share infor-
mation.
8. In SaaS, users can only get to use the application over the
Internet after buying, implementing or managing the software.
(True/False)
N
Activity
Do SaaS providers also exist in India? If yes, find out some of them.
n o t e s
S
Estimate your needs: Calculate what you will really need. It is ex-
pensive to add resources incrementally in real-time to meet load
spikes.
IM
Vendor and community support: Ask the cloud provider for refer-
ences and take time to speak with them. Check if the provider has
a capable team, which is willing to help you with technical issues
on a 24/7 basis. Make sure that the database has support from an
active user community and user forums.
API support for databases: Make sure that your provider supports
M
and that you use APIs that will work on other clouds. This lets you
focus on your application without worrying about infrastructure
and compatibility.
Price: Cost for cloud databases run from free versions to variable
pay-per-use to fixed monthly fee option. Open-source solutions are
N
n o t e s
Activity
S
2.6 EVERYTHING AS A SERVICE (XaaS)
XaaS refers to everything as a service or anything as a service. It makes
IM
use of three services IaaS, PaaS and SaaS to facilitate the user under
a single package according to his/her requirements. A most common
and popular example of XaaS service is Desktop as a Service (DaaS).
With the rise of Internet based services, different service providers are
expected to grow in large numbers. As per the demand, the compo-
sition of these providers needs to be changed dynamically. Moreover,
M
The two popular vendors of XaaS are Citrix and CloudFX. Citrix pro-
vides Cloud Portal Business Manager solution and CloudFX provides
CloudConsult, Cloud Select, CloudData &Analytics.
n o t e s
Activity
S
Besides popular cloud services like SaaS, PaaS and IaaS, there are
other specialised cloud services, such as Distributed Computing as a
IM
Service and Parallelism as a Service. Distributed Computing as a Ser-
vice is a method of performing a single, common job by engaging vari-
ous geographically-dispersed resources. It is a Web-based service that
makes it easy and convenient to process massive amounts of data and
perform computing-intensive tasks. The service check for available
resources across the network splits a job to run on different servers
and later collects and assembles the results. It helps reduce process-
M
ing time, improves the performance of the system, allows use of mul-
tiple resources and reduces the cost of computation.
n o t e s
Activity
2.8 SUMMARY
In the cloud, it takes a short time (for example, a few hours) to set
up servers with required storage, OS, database, and development
tools that you want to use.
IaaS is a model in which you, as a customer, pay for the resources
(such as computing power, memory, storage, bandwidth, security
devices, load balancers, etc.) kept at the provider’s facility or wher-
ever the provider keeps its hardware.
S
PaaS is a cloud service where a client gets a set of applications and
product development tool hosted on the provider’s infrastructure.
Developers
IM
on the PaaS platform develop applications on the
cloud platform with the help of APIs, website portals or gateway
software deployed on the cloud servers.
SaaS provides the capability to utilise the provider’s applications
executing on a cloud infrastructure.
Cloud Backup Services replicate its data to a provider’s datacen-
M
key words
n o t e s
S
while selecting a DBaaS provider.
6. Discuss different types of specialised cloud services.
IM
2.10 ANSWERS AND HINTS
4. Virtualisation
Platform as a Service 5. PaaS
(PaaS)
6. True
7. Hybrid
Software as a Service 8. False
(SaaS)
9. b. Identity Access Management
Database as a Service 10. True
(DBaaS)
11. Sharding
Everything as a Service 12. True
(XaaS)
13. Capital
Specialised Cloud Services 14. Distributed Computing as a Ser-
vice (DCaaS)
n o t e s
S
sole or key offering. Refer to Section 2.3 Platform as a Service
(PaaS).
4. SaaS is the capability to use the provider’s applications running
IM
on a cloud infrastructure. Refer to Section 2.4 Software as a
Service (SaaS).
5. Database is an essential component for all enterprise applications.
Database services for on-premise applications are configured
using internal, purchased servers and database. Refer to Section
2.5 Database as a Service (DBaaS).
M
SUGGESTED READINGS
Salam, A., Gilani, Z., & Haq, S. U. (2015). Deploying and managing
a cloud infrastructure: real world skills for the CompTIA Cloud
certification and beyond. Indianapolis: John Wiley.
Technological innovation for cyber-physical systems: 7th ifip wg 5.
(2016). Place of publication not identified: Springer.
E-REFERENCES
IaaS, PaaS, SaaS (Explained and Compared). (n.d.). Retrieved
February 27, 2017, from https://apprenda.com/library/paas/iaas-
paas-saas-explained-compared/
XaaS - Everything as a service. (2016, December 02). Retrieved
February 27, 2017, from https://networks.nokia.com/services/
xaas-everything-service
n o t e s
S
IM
M
N
CONTENTS
S
3.1 Introduction
3.2 Private Cloud
IM
3.2.1 Components of a Private Cloud
3.2.2 Implementation Phases of a Private Cloud
3.2.3 Hardening a Private Cloud
3.2.4 What is Not a Private Cloud
3.2.5 Use Cases of a Private Cloud
Self Assessment Questions
M
Activity
3.3 Public Cloud
3.3.1 When to Avoid Public Clouds
3.3.2 Cloud APIs
N
Introductory Caselet
n o t e s
S
versity physically. VCL allows the Information Technology (IT)
staff of the lab to simplify IT-support operations and reduce costs
by consolidating computer labs through the private IaaS cloud. At
present, there are 2000 IBM blade servers, VMware, open-source
IM
KVM software, and storage hardware components in the univer-
sity’s VCL.
n o t e s
learning objectives
3.1 INTRODUCTION
In the previous chapter, you have learned about different types of ser-
vices offered in cloud computing. Now, let us move forward and ac-
S
quaint ourselves with the different types of cloud computing models.
The adoption and use of cloud computing are evolutionary. The initial
goal can be to provide a few services using cloud computing. Later,
when users become more comfortable, more services can be provided
using cloud computing. The advantages of cost, convenience, avail-
ability, and scalability depend on the type of cloud users plan to deploy.
N
This chapter first discusses private cloud, its components, and its use
cases. The chapter next explains public cloud, and finally it discusses
community and hybrid clouds.
n o t e s
The end-users are business units within the corporation, who get a
report of the resource utilisation and the associated bill. The following
are the benefits of a private cloud:
Allows more control to the organisation
Enables virtualisation advantages, such as high availability, power
savings, and dynamic resource scheduling, to meet peak require-
ments and higher resource utilisation
Provides convenient pay-per-use billing for internal business units
S
ise (a data center or a server room) or at a hosting or space provider’s
premises. However, the latter may not satisfy the government or reg-
ulatory requirements. The factors to consider when co-locating the
IM
private cloud at a hosting or space provider’s premises can be in the
form of the following questions:
Is the corporate network connected to the space provider’s net-
work over a private or public network?
Will the space provider be held responsible if Service Level Agree-
ments (SLA) are not met?
M
Who owns and controls the server, network, and security infra-
structure?
Although a private cloud does not free you from the onus of procuring
and administering IT resources, there are many reasons why enter-
prises need a private cloud rather than a public one. Some of them are
the following:
Need for capabilities not available in a public cloud: You may
have a need for a specific application or vendor product, or you
might need uptime guarantees not offered by public cloud provid-
ers.
n o t e s
S
Private cloud implementations merely supplement the internal hard-
ware. At best, it is a mechanism that provides load-optimised and us-
IM
er-initiated service. When a business unit needs more computing re-
sources, it can easily take more from the internal resource pool. For
example, the accounting department of a company may need more
resources during tax filing, or the online store division of a website
may need more resources to accommodate load spikes before Christ-
mas or Thanksgiving.
M
utilised. This helps to avoid the complexities and time associated with
purchase, implementation, and the go-live scenario of a traditional
physical infrastructure. However, a private cloud implementation also
includes the challenges of integrating components of complex hard-
ware and software obtained from several vendors. Unless properly
planned, a private cloud can be expensive and difficult to implement
and manage, thus, minimising the original goals.
n o t e s
S
tion since the days of mainframes in the 1970s and 1980s. Howev-
er, VMs in a cloud offer more convenience, options, features, and
control to the end-users to match workloads and their application
IM
needs than what was possible during the mainframe era.
Service catalog: A cloud service catalog is a menu of applications
or resources that customers can choose from. It helps to stan-
dardise the offerings, so that meeting each user requirement does
not become an expensive, time-consuming, one-off project for the
cloud administrator or the user.
M
n o t e s
After you have calculated the requirements and components, you can
S
plan the deployment phases of your internal cloud.
Phase 1
Document Expectations Requirements of
Private Cloud
Phase 2
N
Phase 3
Phase 4
Automated Provisioning
Phase 5
Phase 6
Online Billing
n o t e s
S
Phase 3 - Implement a self-service-portal: In this phase, the por-
tal helps users to find a list of standard offerings within the private
cloud. It should be an easy-to-use interface with a list of your offer-
IM
ings, prices, online ordering, and billing. It should have details on
pricing options and SLAs for the hosted services.
Phase 4 - Automated provisioning: This is a continuing exercise.
You can start by automating a few services and offerings, adding
more later. You can initially offer one or two services and offer
more after the user is comfortable. As much as possible, the user’s
M
The key reason stated by users for preferring a private cloud over a
public cloud is security or the need for compliance with regulations
that require data to be kept within the corporate premises. However,
security is not a crucial part in the private cloud checklist, especially
n o t e s
S
Public
Confidential
IM
Private
n o t e s
Although private clouds are our new-era solution for all IT problems,
there are several factors that they do not include. They are the follow-
ing:
1. Private cloud is not just virtualisation: As described earlier,
virtualisation is a building block for private clouds. These
include:
Hardware abstraction for server, network, and storage
OS abstraction for grid computing and horizontal scaling
Middleware and application virtualisation
Besides self-service portal, scalability, and multi-tenancy are key
components.
S
2. Private cloud is about increased expenses: A private cloud
can improve resource utilisation by judiciously distributing
virtualised resources to workloads that need more of those.
IM However, it requires significant upfront expenses for hardware,
software, cloud software, and for the ongoing management.
3. Private cloud is not always on-premise: A private cloud is not
about location, management, or ownership responsibility. While
most private clouds are on-premise, a growing percentage is
hosted at a data center provider’s premises. Such private clouds
M
n o t e s
Exhibit
S
Broad network access
Shared resource pool
Ability to elastically scale resources
IM
Metered services and resource utilisation
Private clouds can be used in several ways. The following are a few
M
use cases:
Marketing teams: When marketing teams need to launch a new
marketing campaign, they need a few servers such as a Web server,
a collaboration server, a content management server, and a Cus-
N
n o t e s
Although private clouds have all these benefits, they attract criticism.
This is because the organisation has to buy, build, and manage the in-
frastructure. The capital expenses to procure non-IT components for
the data center and IT hardware and software are often prohibitive,
especially for Small and Medium Enterprises (SMEs).
The organisations that operate on private clouds have to pay the An-
nual Maintenance Contracts (AMCs) to the manufacturers. With a pri-
vate cloud, there is less opportunity to enjoy the economies of scale
and cost savings offered by a large, highly-automated public cloud
provider. There are several providers of private cloud software. They
are the following:
Eucalyptus (http://www.eucalyptus.com/): Offers the product Eu-
calyptus Enterprise Edition, which allows you to build and man-
age a private cloud.
S
VMware: Offers the product, vCloud Director, that is built
on the well-tested, industry leading vSphere and is com-
patible with several applications. It uses the Open Virtual-
IM
isation Format (OVF) standard, which is a platform-inde-
pendent, efficient, extensible, and open packaging format
for VMs.
IBM: Offers a well-tested product, IBM CloudBurst, which allows
providers to create service platforms that are integrated, flexible,
and optimised for production use.
M
BMC: Offers the product, BSM for Cloud Computing, works with
VMware, Microsoft, and Citrix, and helps you build a private or
hybrid cloud. It enables secure multi-tenancy in the cloud environ-
ment through an integrated network container provisioning and
N
management.
Activity
n o t e s
S
Figure 3.2 depicts the public clouds used within an organisation by
individual devices:
IM
Amazon
Zoho AWS
M
Vmware
vCloud Saleforce
Express
GoGrid
Google
N
Users in an AppEngine
Organization
n o t e s
S
It provides easy, Web-based, anytime-anywhere access to services
and improved employee productivity.
IM
Energy savings as sharing and higher utilisation percentage lead
to lower power and cooling requirements (when compared to each
customer having its own dedicated server rooms).
Load
Balancers
Firewalls
LAN
Switches
n o t e s
IaaS
PaaS
S
IM
SaaS
M
n o t e s
Despite all these advantages, users may not want to put sensitive and
highly-confidential data on a public cloud, until they have tested and
are sure of the security features implemented by the cloud provider.
Another concern users might have is compliance. Government regu-
lations and agreements with clients may impose a set of requirements
that are not met by the public cloud infrastructure. These requirements
S
include Payment Card Industry Data Security Standards (PCI DSS,
https://www.pcisecuritystandards.org/security_standards/pci_dss.sht-
ml), the Sarbanes-Oxley Act (http://www.soxlaw.com/), etc. There are
IM
various risks associated with public cloud. There could be several situ-
ations where you cannot use a public cloud, such as the following:
Lack of interoperability: Each cloud provider has a set of propri-
etary technologies. This is due to a lack of standards commonly
adopted by providers. If you have two applications or databases
that communicate with each other, you cannot put one in the cloud
M
and the other in-house. Technically it is possible, but you will face
latency, user access, and security issues.
Portability problems: If you need to move from one provider to
another, it is better to stay in-house. Switching between providers
N
n o t e s
S
and processes. This is inherently at odds with a public cloud, which
is supposed to be a ‘black box’ of IT resources accessible through
APIs offered by the cloud provider.
IM
Geo-political concerns: Some industry regulations require that
data should be resident within the geographical boundaries of the
country. In such a case, a cloud user in Canada, for example, can-
not put his/her data on a service provider’s data center that has no
presence in Canada.
Unsafe APIs and interfaces: The cloud provider gives a set of APIs
M
n o t e s
Note that all the above risks are common within traditional and inter-
nal networks as well, however, their resolution and control are more
crucial within a shared cloud. Some of the risks mentioned above can
be addressed by tightening network and host and application securi-
ty. However, the other risks, such as lost encryption keys, corrupted
backups, and weak passwords, can be mitigated if cloud users adopt
and maintain higher security practices than they would for internally
hosted infrastructure or applications. When migrating from internal-
ly-hosted applications to an external cloud, users must plan to transi-
tion one application at a time to a public cloud. This allows users and
S
providers to assess the security in the provider’s infrastructure.
n o t e s
Based on the information you need, the following three API categories
exist:
Infrastructure cloud APIs: These provide a way to manage VM
images and infrastructure details. They can be used, for example,
to create, upload, reboot, copy, or delete virtual machines. They are
S
also used to configure attributes of the architecture, change CPU
or memory allocation, set up network parameters, or modify stor-
age settings. These APIs are used to develop programs to automate
IM
the interaction between infrastructure resources, for example, be-
tween VMs and memory or between storage units and network
ports They are commonly used by systems, storage, or network ad-
ministrators who work for the customer, and they are also used by
cloud providers to deploy and maintain the cloud infrastructure.
Platform cloud APIs: These provide an interface into specific ap-
M
There are four levels of APIs that can be used by a developer, men-
tioned as follows:
Wire-level APIs: These allow a developer to write directly to the
wire format of the service request. Most services are REST or
SOAP-based. REST-based services are relatively straight forward,
and, hence, the APIs enable development of efficient code. The
developer creates the required HTTP headers and payload for the
request. In response to the HTTP connection, the REST-based ser-
vice returns a response code. For SOAP-based services, the devel-
oper creates the proper SOAP envelope, SOAP headers, and data
payload. The service responds with a SOAP envelope containing
the results of the request.
n o t e s
S
Although the developer focuses on business processes and objects, as
in the case of service-specific APIs, he or she does not have to consid-
er where the program will be used. These levels require the developer
to concentrate on different tasks and data structures.
IM
self assessment Questions
gateways.
Activity
n o t e s
S
fication.
Some fields that are greatly impacted by the community cloud strat-
egy are:
IM
Healthcare
The federal government
Financial services
Interaction-heavy use cases
M
There are differences between public and community clouds. Any user
can sign up and start using a public cloud. The services are paid for
N
whatever is used. Table 3.1 shows the key differences between the two:
n o t e s
Exhibit
S
models to predict the weather. The underlying idea of NWP is to
take a sample of the atmospheric thermal and fluid state at a given
instant and use thermo-dynamics and fluid dynamics to estimate
their state at some time in the future. NWP algorithms produce an
IM
enormous number of datasets, which require hours or days of high-
ly-intensive mathematical analysis to arrive at near and long-term
predictions of weather.
Weather forecasting institutions can use public clouds. The elas-
ticity and the pay-for-what-you-use model provide more benefits
to them than to commercial organisations such as banks, Indepen-
M
dent Software Vendors (ISV), etc. The two key requirements for
them are:
Need for large compute resources: They require the availabil-
ity of hundreds to thousands of high-memory, high-CPU VMs.
N
n o t e s
Activity
S
3.5 HYBRID CLOUDS
IM
A hybrid cloud comprises two or more clouds, private, community,
and public. Each cloud retains its features but can share data, if re-
quired. Several organisations choose to use a hybrid cloud, consisting
of a set of private and public clouds, as shown in Figure 3.5. The pri-
vate cloud is used for applications and data that require a high degree
of compliance and security such as enterprise HR, CRM, financial,
M
n o t e s
A few public cloud providers, such as Terremark and Savvis, have de-
ployed WMwarevCloud Express (from VMware) in their data centers,
enabling organisations using VMware’s hypervisor to easily extend
internal private clouds to their data centers.
Figure 3.5 shows a hybrid cloud. The private cloud can extend to use
S
parts of a public cloud, either temporarily during times of peak load or
permanently for certain services:
IM
Hybrid Cloud
Public
Public
Private Cloud Cloud A
Cloud B
M
Public Public
Cloud C Cloud D
Users in an
N
Organization
Figure 3.5: Hybrid Cloud with Public and Private Clouds Being Used
for Different Applications
n o t e s
Table 3.2 lists the differences between private cloud and hybrid cloud:
S
Capital Ex- It is as expensive as an It is less expensive.
pense internal IT infrastruc-
ture.
IM
self assessment Questions
b. Public
c. Community
d. Hybrid cloud
N
Activity
3.6 SUMMARY
Clouds are broadly grouped as private, community, public, or hy-
brid clouds.
A private cloud is a proprietary network within a corporate data
center that supplies hosted services to a limited set of users such
as employees, customers, vendors, and partners.
A private cloud has a virtualised hardware resource pool (from a
set of existing or new heterogeneous servers, storage, and network
n o t e s
S
mon concerns such as security, compliance, jurisdiction, and stan-
dards.
The cost for implementing and managing a community cloud is
IMspread over fewer users than for a public cloud and, therefore, has
less economy of scale than a public cloud.
In a public cloud, services are sold to anyone on the Internet.
A public cloud has advantages such as convenience, significant
cost savings from economies of scale, no upfront expenses, on-de-
mand allocation of resources to meet varying workloads, and utili-
M
where they can leverage their private cloud for sensitive, criti-
cal applications, and use one or more public clouds temporarily
during periods of peak demand or permanently for backups, DR,
e-mail archiving, etc.
key words
n o t e s
S
ANSWERS TO SELF ASSESSMENT QUESTIONS
Topic Q. No.
IM Answers
Private Cloud 1. True
2. Virtual Machines
3. Open Virtualisation Format
Public Cloud 4. True
M
5. Slows
6. REST
Community Cloud 7. community
N
8. False
9. expensive
Hybrid Clouds 10. d. Hybrid cloud
11. bursting
n o t e s
SUGGESTED READINGS
Smoot, S. R., & Tan, N. K. (2012). Private cloud computing: con-
solidation, virtualization, and service-oriented infrastructure.
Waltham, MA: Morgan Kaufmann.
S
Hurwitz, J., Kaufman, M., Halper, F., & Kirsch, D. (2012). Hybrid
cloud for dummies. Hoboken, NJ: John Wiley & Sons, Inc.
E-REFERENCES
IM
Financial Times. (n.d.). Retrieved March 01, 2017, from https://
www.ft.com/content/9d547d7c-95dc-11e1-9d9d-00144feab49a
What is a Private Cloud? (n.d.). Retrieved March 01, 2017, from
http://www.interoute.com/cloud-article/what-private-cloud
Maguire, J. (2016, August 08). What is Private Cloud? Retrieved
M
CONTENTS
S
4.1 Introduction
4.2 AWS
IM
Self Assessment Questions
Activity
4.3 Azure
Self Assessment Questions
Activity
4.4 Google App Engine
M
Activity
4.6 Force.com
Self Assessment Questions
Activity
4.7 Summary
4.8 Descriptive Questions
4.9 Answers and Hints
4.10 Suggested Readings & References
Introductory Caselet
n o t e s
S
Award and in 2015, it received the Hong Kong ICT Gold Award for
Best Smart HK – Big Data Application. Now, the company op-
erates in 16 countries, and has headquarters in Hong Kong and
IM
additional offices in the United States and India.
In 2012, Cenique started its expansion in Asia and United States
and faced a major problem of interruption as well as of slow con-
nection speed while providing Internet-based services to its cli-
ents. Cenique was trying to compete in the new field of real-time
analytics. Therefore, the slow connection speed and service delay
M
Introductory Caselet
n o t e s
S
IM
M
Source: https://aws.amazon.com/solutions/case-studies/cenique/)
n o t e s
learning objectives
4.1 INTRODUCTION
The advent of the cloud-computing platform has lead to major chang-
S
es both within and across enterprises. The cloud-computing platform
has enabled the developers to code the application programs which
can run in the cloud environment. In other words, cloud-computing
platform is a virtual system on which various applications can be de-
IM
veloped or run. Some key cloud platforms are Amazon Web Service
(AWS), Microsoft’s Azure, Google App Engine (GAE), IBM’s blue
cloud and force.com. Amazon Web Service (AWS) is a generalised
cloud-computing platform that offers many cloud-computing services.
Microsoft Azure is a platform that can support public as well as private
clouds. Google App Engine (GAE) is usually developed for Web appli-
M
negative impact.
This chapter familiarises you with Amazon Web Service (AWS) and
Microsoft Azure. You will also study about the feature of Google App
Engine (GAE) and blue cloud. Towards the end of the chapter, you will
study about force.com platform.
4.2 AWS
Amazon Web Service (AWS) is a cloud-service platform that is ex-
tremely secure and offers database storage, content delivery and oth-
er functions. It is provided by Amazon.com. It was first launched in
2006 in order to provide online services for websites and client-side
applications.
n o t e s
S
grams and serves as an unlimited set of Virtual Machine (VM).
Mechanical turk: It is an Application Program Interface (API).
The function of this API is to integrate human intelligence into
Remote Procedure Calls (RPCs).
IM
RedShift: It is a data warehouse service which is basically de-
signed for analytical workloads. It is also connected to standard
SQL-based client as well as various business intelligence tools.
Simple Storage Service (S3): It is a service that is highly scalable,
has high speed and involves less cost. It is basically designed to
M
keep the online backup and archive the data and application pro-
grams.
n o t e s
Activity
Suppose you are using AWS. What should you do to access a video
from any device that is connected to the Web?
4.3 AZURE
Azure is a cloud-computing service which was created by Microsoft
and released on 1st February, 2010. Initially, it was called Windows
Azure, but it was renamed as Microsoft Azure on 25th March, 2014.
Microsoft Azure was mainly developed for creating, setting and man-
aging applications through its data centres. It provides many software
applications, platforms, infrastructures and is compatible with many
programming languages, tools and frameworks.
S
It is basically known for its Platform as a Service (PaaS) and Infra-
structure as a Service (IaaS). The following are the key products of
Microsoft Azure:
IM
Compute: It is a service that provides Virtual Machine (VM), In-
frastructure as a Service (IaaS). It also offers batch-processing and
access to remote application.
Web and mobile: It is a service that allows the development and
deployment of Web and mobile applications. It also provides fea-
tures that are helpful in API management, notification and report-
M
ing.
Data storage: It is a service that includes Database as a Service
(DaaS). It supports NoSQL, SQL, unstructured and cached cloud
storage.
N
n o t e s
S
5. Microsoft Azure is basically known for its _________ and
______________.
6. Which of the following products of Azure are helpful in API
IM
management, notification and reporting?
a. Compute b. Web and Mobile
c. Data Storage d. Analytics
M
Activity
You are a Java application developer. You want to share the code of
your program with another developer. How will you use Microsoft
Azure to perform the task?
N
n o t e s
Google App Engine (GAE) can be run in the two following environ-
ments:
Flexible environment: Flexible environment is best suited for the
application whose source code is written in any version of Java,
Python, Go, Node.js and Ruby. Applications that can run in flexi-
S
ble environment can access all the resources or services of cloud
platform.
Standard environment: Standard environment should be pre-
IMferred for the applications that require faster scale-up times. In
this environment, applications run in a specialised sandbox. Stan-
dard applications are best suited for the applications whose source
codes are written in Java 7, PHP 5.5, Python 2.7, Go 1.7.
Exhibit
M
n o t e s
S
preferred when applica- gramming languages.
tions can have sudden These type of applica-
and extreme spikes of tions also depend upon
traffic and require im- other software, includ-
IM
mediate scaling. ing operating system
packages. In addition,
such applications can
access the resources or
services of a Cloud Plat-
form project containing
in the Compute Engine
network.
M
Source: cloud.google.com
7. Google App Engine (GAE) does not offer automatic scaling for
Web applications. (True/False)
8. Google App Engine (GAE) allows users to sign in with the
existing Google account but it addresses users with a new and
unique ____________.
9. The application whose source code is written in any version of
Java, Python, Go, Node.js and Ruby is suited for ___________
environment.
10. __________ environment should be preferred for the
applications that require faster scale-up times.
Activity
You have developed a Web application and its source code is writ-
ten in Java 7. Now you want to host it in Google App Engine (GAE).
How can you perform the task?
n o t e s
Virtual Linux images are used by blue cloud and the most remarkable
S
thing is that it can schedule parallel workloads. Hundreds of devel-
opers supported the concept of Blue cloud all over the world and it
employs a lot of open source software and standard technologies.
IM
Blue cloud is a ready-to-use cloud computing that consists of the fol-
lowing leading massive computing technologies:
Parallel sysplex: It is a cluster of IBM mainframe systems that
work together as a single system in order to share the workload for
high performance and availability.
M
Blue cloud is used in various types of services that are used by health-
care professionals, healthcare organizations, research site organiza-
tions, and etc. Some examples of such services are:
BlueCloud Directories
BlueCloud Education Network
BlueCloud Staff Learning System
BlueCloud Purchasing Club
BlueCloud Surveys
BlueCloud CME Management System (For Accrediting Vendors)
BlueCloud e-Commerce Management System
n o t e s
Activity
Suppose you are an employee of IBM and you do not want to per-
form your task on remote or individual servers. What will you do to
S
perform your task on distributed computing?
IM
4.6 FORCE.COM
Force.com is a platform that helps the user to create and deploy a
secure and scalable cloud application. In the force.com platform, de-
velopers do not need to buy any software or server, rather they can
mainly concentrate on building apps that will include built-in mobile
functionality. Once the app is built, it can be run on a secure platform
M
of force.com that will scale, tune as well as keep the backup of data
automatically.
Force.com also provides some essential tools and services that are re-
quired to automate the business process and integrate with external
N
n o t e s
S
or the entire organisation without surrendering administrative
control over the sensitive data.
The following are some technologies that play a big role behind force.
IM
com platform:
Multitenant architecture: It is a type of architecture with the help
of which the same infrastructure and same version of force.com
platform can be used by all users. It allows the upgradation au-
tomatically and simultaneously for all users. Thus, in this archi-
tecture, the latest patch is always installed in the application. The
M
n o t e s
S
16. __________ is a type of architecture with the help of which the
same infrastructure and same version of force.com platform
can be used by all users.
IM
17. Apex is a cloud-programming language introduced by
salesforce.com. (True/False)
Activity
M
You are an app developer. You want to make an app where you can
get an advance result just by issuing a single query. How can you
perform the task by using force.com platform?
N
4.7 SUMMARY
Amazon Web Service (AWS) is a cloud service platform that is ex-
tremely secure and offers database storage, content delivery and
other functions.
AWS is operated from 16 geographical locations across the world.
These locations are eastern and western USA, Canada, South
America, Brazil, Ireland, Germany, United Kingdom, Israel, Sin-
gapore, South Africa, Dubai, Japan, South Korea, India, China
and Australia.
Azure is a cloud-computing service which was created by Micro-
soft and released on 1st February, 2010.
Microsoft Azure was mainly created for creating, setting and man-
aging applications through its data centres.
Azure is basically known for its Platform as a Service (PaaS) and
Infrastructure as a Service (IaaS).
n o t e s
S
have consistent information. These types of data-centric apps can
be found in databases like MS Access or FileMaker.
Apex is a cloud-programming language introduced by salesforce.
IM
com. It is the most popular and widely used language for Web pag-
es that can run on force.com platform.
key words
the users can upload as well as access any music, images, vid-
eos, documents from any device that is connected to Web.
Collaborative app: It refers to the type of app that can be shared
by multiple users in multiple locations.
N
n o t e s
S
Azure 4. False
5. Platform as a Service (PaaS), Infra-
IM
structure as a Service (IaaS)
6. Web and Mobile
Google App Engine 7. False
8. identifier
9. flexible
M
10. Standard
Blue Cloud 11. IBM
12. Blue Gene/L, Blue Gene/P and
Blue Gene/Q
N
13. True
14. supercomputers
Force.com 15. b. Collaborative
16. Multitenant architecture
17. True
n o t e s
3. GAE allows users to sign-in with the existing Google account but
it addresses the user with new and unique identifiers. Refer to
Section 4.4 Google App Engine.
4. Google App Engine (GAE) can be run in the following two
environments, i.e. in flexible environment and standard
environment. Refer to Section 4.4 Google App Engine.
5. Blue cloud is a ready-to-use cloud computing that consists of
some leading massive computing technologies. Refer to Section
4.5 Blue Cloud.
6. Data-centric is one of the apps that can be built on force.com
platform. Refer to Section 4.6 Force.com.
7. Multitenant architecture is a type of architecture with the help
of which the same infrastructure and same version of force.com
S
platform can be used by all users. Refer to Section 4.6 Force.
com.
E-REFERENCES
Amazon Web Services. (2017, March 01). Retrieved March 03, 2017,
from https://en.wikipedia.org/wiki/Amazon_Web_Services
Microsoft Azure. (2017, March 01). Retrieved March 03, 2017, from
https://en.wikipedia.org/wiki/Microsoft_Azure
BlueCloud Technologies. (n.d.). Retrieved March 03, 2017, from
http://www.bluecloudcorp.com/
Google App Engine. (2017, March 01). Retrieved March 03, 2017,
from https://en.wikipedia.org/wiki/Google_App_Engine
Force.com - Create Mobile Apps for Your Business – Salesforce
Europe. (n.d.). Retrieved March 03, 2017, from https://www.sales-
force.com/eu/platform/products/force/
CONTENTS
S
5.1 Introduction
5.2 Challenges of Cloud Adoption
IM
5.2.1 Performance
5.2.2 Reliability
5.2.3 Security and Privacy
5.2.4 Bandwidth
Self Assessment Questions
Activity
M
Introductory Caselet
n o t e s
S
Around 33 percent of IT leaders use the cloud for cost effective-
ness by reducing the unnecessary expenses. The companies also
adopt cloud to accelerate product innovation.
IM
“We see the demand for cloud adoption growing rapidly. The CIO
sees pressure from the CFO to optimise the legacy IT, while IT also
needs to support the rapid pace of the business and implement new
capabilities at the right cost”, says Pierre Champigneulle, a princi-
pal in KPMG’s Advisory Services practice.
Introductory Caselet
n o t e s
S
IM
M
N
n o t e s
learning objectives
S
5.1 INTRODUCTION
IM
In the previous chapter, you studied about technology platforms for
cloud computing. Now, let us move forward and acquaint ourselves
with challenges related to the adoption of cloud in small and medium
business organisations.
ees. Most business owners are adopting cloud computing for its econ-
omies of scale, ease of use, and low cost. They find the cloud to be a
great business-enabler but still have doubts and questions about its
use. Some of the challenges being faced by SMBs regarding the adop-
tion of cloud computing are:
N
n o t e s
use model. SMBs are poised to benefit most from cloud computing, as
compared to large enterprises. Many SMBs have been on the leading
edge of public cloud advocacy and adoption. A survey by Dell of more
than 400 small and mid-sized businesses with less than 999 employees
showed that 69% of the business owners and leaders wanted to pur-
chase and adopt cloud applications. Also, most of them showed a pref-
erence for applications from a single trusted cloud vendor. The survey
also showed that SMBs using the cloud planned to add an average of
three more cloud services in the near future.
In this chapter, you will first learn about challenges related to cloud
adoption. Further, the chapter will discuss about the pace of adoption
of public cloud by SMBs. The chapter will also discuss about cloud
vendor responsibilities in encountering challenges related to adoption
of cloud. In the end, the chapter discusses about success factors for
S
cloud consumers.
To setup an open cloud system, cloud vendors will also have to solve
issues related to vendors that offer organisation specific services.
They can refuse to stop developing requirement specific services due
to commercial gains and be competitive. However, many companies
also signed Open Cloud Manifesto (OCM). The most important issue
that has to be solved in developing open cloud system is interopera-
bility, but it cannot be easily solved using common interfaces. It af-
fects different technologies like interfaces for IaaS, PaaS, and SaaS.
n o t e s
5.2.1 PERFORMANCE
S
in terms of the maximum response time experienced by the end user.
This must be a key metric for the performance of applications and an
important SLA criterion.
IM
Another performance impact is from the number of hops. Within a
cloud datacenter, resources need to communicate and the number
of network hops between the resources and applications add signifi-
cantly to response delays. Cloud performance must be monitored.
A robust performance monitoring system provides benefits such as
tracking work load patterns, identifying peak resource utilisation, and
isolating potential problems and their causes.
M
trol depends on the cloud service offered. For PaaS, for example, the
provider controls the hardware, network, security, servers, operating
system, patches, development environment, database configuration,
and compilers.
5.2.2 RELIABILITY
n o t e s
S
Any organisation, who wants to implement the cloud computing must
think about the security of the data first irrespective of the nature of
the cloud. Without securing the data in the cloud environment, no or-
IM
ganisation can dare to implement the cloud. Even if the organisation
has well defined security of the data, different issues occur with cloud
computing while managing the data. The organisation must make
sure that the IT security strategy should be lined up with cloud data
security strategy and also ensures the right balance of protection, pri-
vacy, governance, and accessibility to its key resources in the cloud
M
ployees because the data in the cloud is managed by them in the da-
tacenter of the cloud. The cloud provider company and clients must
implement some plan to deal with inside as well as outside threats to
save the data.
n o t e s
Cloud secures the data using firewall which can also be used to secure
any number of applications and processes. The data security and pri-
vacy is a big issue for companies; therefore, they test data on public
cloud environments with smaller and constrained implementations.
Different types of validations are made to ensure the completeness
S
and accuracy of the data that is either entered, retrieved or processed.
The input validation ensures that the input data to the application
must be complete, accurate and reasonable.
IM
The output validation allows the access of data to the authorised users
and the change management ensures the modification of data only by
the authenticated users. Backup and recovery measures create the
copy of data to recover the data in case of data loss. The data destruc-
tion validation ensures deletion of data from everywhere on the phys-
ical storage medium in case of permanent deletion of data from the
M
database. The security of data during its transfer from one location to
another location is very important and is managed by using VPN by
changing the public network of organisation as private network. The
VPN encrypts the sensitive data of the organisation while transferring
it by using the firewall that acts as a barrier between the public Inter-
N
5.2.4 BANDWIDTH
Web Browsing
Voice Calling
File Transferring
Processing Credit Cards/e-Commerce
Accessing Cloud Applications
Social Media
Video Conferencing
n o t e s
S
tion. Selecting the appropriate bandwidth and bearing cost for a high-
er bandwidth are some challenges faced by both client and provider
organisations.
IM
self assessment Questions
Activity
Exhibit
n o t e s
Memory leaks with cloud VMs can lead to a gradual loss of avail-
able, free memory and eventually make the virtual machine unable
to function. As such, the cloud provider must implement robust
memory-leak detection mechanisms within the operating system
and continuously monitor such problems.
S
CHALLENGES IN CLOUD ADOPTION
Cloud computing environment includes many technical challenges in
order to implement cloud systems safely and globally. Some import-
IM
ant technical issues in developing, implementing and adopting cloud
applications are as follows:
Challenges with virtualisation: It is the most important feature
of any cloud system that hides the technical complexities like rout-
ing, data, aggregation and translation of the system from the end
users. Virtualisation also enhances the flexibility of cloud systems.
M
n o t e s
S
APIs and interfaces, we need to follow a more advanced approach
to manage resources, advanced infrastructure and prospective
quality of services. The future cloud model should be developed
IM
on more advanced programming models instead of existing typical
programing models. The new programming model for cloud sys-
tem must be compatible with movability of applications through
networks to provide more reliable distributed execution and com-
munication model within and between the applications.
Going green: The feature is important in reducing the additional
M
ing nature related problems like carbon emission. Apart from soft-
ware services, there are a number of issues that are considered in
achieving Green IT at the hardware level of development.
Interoperability between clouds: Without interoperable features
and the ability to exchange data, the use of cloud services would be
significantly reduced. Therefore, the goal of the various standards
is to facilitate interoperability. One way to do this is to create and
provide an orchestration layer. This layer will help to enhance the
usage of various clouds by forming a federated cloud environment.
The cloud orchestration mechanism was initiated by various cloud
service providers to form a single management platform, where
the services of a federated cloud can be centrally assembled and
managed. The interoperability features can resolve the problem of
vendor lock-in, and accelerate the integration amongst cloud ser-
vice providers. The end result is a set of integrated cloud services
where data can be easily interchanged. However, the service pro-
viders need to implement standards in their services.
n o t e s
S
Providing a unified interface for the infrastructure stack, and
merging cloud centric technologies
Serving as a common interface for interactions between net-
IM
work, applications, servers, systems, identity, and data
Successful cloud deployment: Several problems can surface
during the deployment of a cloud which poses a challenge for or-
ganisation in adopting cloud services. The cloud service provider
must work with the user organisation to understand the root cause
of these problems and implement ways to mitigate their impact.
M
n o t e s
Besides this, cloud computing system must satisfy the economic con-
siderations in order to achieve business oriented goals in real life sce-
narios. To exist in today’s business environment, economical issues
are the most important thing to consider. If anything is not economi-
cally feasible in context of its use, it will definitely decay within a small
time period. So, in developing cloud applications or datacenters, eco-
nomic feasibility must be considered.
S
infrastructure maintenance. Cost reduction includes scalability of
the system and pay per use billing model for services or informa-
tion. In addition, developing and implementing a cloud system in-
volves additional cost in integrating the business logic on the cloud
IM
host interfaces or improving the local infrastructure to effectively
use the hosted cloud service or data.
Effective billing model: In a cloud environment, variety of data
and applications are available for different types of users. Thus,
need of an effective billing model is necessary to make cloud envi-
ronment economically feasible for consumers. Pay per use is the
M
n o t e s
S
users to ensure features like privacy, security, and compliance in a
cloud environment.
IM
self assessment Questions
Activity
n o t e s
S
7 billion on Managed Services between 2001 and 2012, and this figure
will continue to grow in double digits for next several years. The re-
searchers had also predicted that SMBs globally will be spending US$
IM
11 billion on cloud computing in 2011, and this is expected to grow
annually at a rate of 12% till 2015.
cloud market and growth of 25 to 35% per year, outpacing the growth
of large enterprises in this area. McKinsey’s research states that by
2018, SMB cloud computing is expected to represent a global market
of more than US$ 40 billion.
Activity
n o t e s
S
To overcome the above handicaps, SMBs have made cloud as their first
or default choice for IT services or infrastructure. Another distinct ad-
vantage is the availability of applications that were earlier expensive
to buy and install in-house. These include CRM and Enterprise Re-
IM
source Planning (ERP) applications, which are now available on pub-
lic clouds as a pay-per-use model. Several efficient SaaS services have
been made available for the SMBs. The prominent applications are
as follows:
Google apps for email, collaboration, video conferencing, etc.
M
SMBs see a clear benefit from improved operational efficiency and the
pay-per-use commercial model. These benefits include automation
of tasks and processes, easy availability of information and reduced
manual processes. Besides the ease of anytime-anywhere access, abil-
ity to collaborate and view updated data in real-time provides SMBs a
level playing field with enterprises.
For SMBs, the public cloud provides the following benefits:
Better resource utilisation: With in-house IT infrastructure, the
mean utilisation of resources is only 20 – 30%, because capacity
planning must be provided enough to meet peak loads. But with
real-time scalability of public clouds, you get to use and pay for
what you need at any time. Figure 5.1 shows allotted resources and
required resources to meet user loads:
n o t e s
140
120
Alloted Resources
100
80
60
40
20 Required Resources
to meet user loads
0
S
Figure 5.1: Allotted Resources and Required Resources
to Meet User Loads
Converting CapEx to OpEx (Capital Expense to Operating Ex-
IM
pense): SMBs do not need to buy or manage hardware and soft-
ware. Instead, they pay a predictable, monthly fee to the cloud pro-
vider. Figure 5.2 shows two scenarios for in-house IT expenses and
Public Cloud expense.
M
N
n o t e s
most-deployed use cases for public clouds. This helps SMBs that
do not have CapEx for best backup hardware and software.
Business continuity for SMBs: Unexpected downtime or lost cus-
tomer data can shutdown emerging businesses or start-ups. How-
ever, cloud data is replicated to datacenters in different parts of
the country and world, thus providing easy access to online data
from multiple sources, even if a certain site or datacenter is inac-
cessible.
Level playing field with the enterprises: With cloud, smaller or-
ganisations can take on global enterprises. The cloud provides
SMBs with the ability to deliver services to customers anywhere in
the world and the agility to compete with global establishments. It
saves SMBs from large up-front procurement costs and from man-
aging hardware, databases, and applications. If a business grows,
S
SMBs can expand their infrastructure quickly with low, additional
OpEx. The adoption rate of cloud amongst SMBs is estimated to
be twice that of large enterprises.
IM
Use of mobile computing: With the steadily increasing use of mo-
bile devices (smart-phones, iPads, tablets, etc.) by employees and
customers to access data, on-premise data, and applications; large
organisations have a sharply shrinking audience. On the other
hand, SMBs can get 24/7 access to their cloud-based applications
from any device or location. This allows them to easily increase
their customer reach and revenues.
M
Activity
Find out the data about SMBs that are moving to cloud due to data
storage facility.
n o t e s
S
being used within their organisations, survey respondents expressed
the greatest need for storage space and data backup/resiliency. Over-
all, the respondents were willing to consider purchasing cloud solu-
IM
tions for a broad range of IT infrastructure and business application
needs; however, actual consideration levels remain just over 50%.
The following are a few guidelines for SMBs to ensure that they get
the most out of their cloud:
Start small: Provide time for your employees to familiarise them-
selves with the services provided by the cloud. Start with one ap-
M
plication at a time and give some weeks for employees to get accus-
tomed to the environment. Once they are at ease, add more cloud
services. Keep the old system available for use as a backup in case
you encounter a show-stopper impediment.
N
But think big: Make sure that the cloud service you adopt can be
scaled up to a desired level across time zones, types of services,
and can serve employees and customers alike.
Ability to export your data in standard formats: You may want to
export your data to common applications such as Microsoft Word/
Excel or database files for Oracle, MS SQL, or MySQL. This will
allow you to have backup of your data and move to another cloud,
if required.
SLA: The Service Level Agreement (SLA) describes the refund
for service outage, termination procedures, fees, Disaster Recov-
ery (DR), backup and Business Continuity Planning (BCP) that
will be provided by the vendor. You must read and understand the
terms and know how it impacts your business.
Look for free or inexpensive cloud options: Several free cloud
computing options exist for emails, document management, and
even CRM and ERP. You need to pay only if you exceed a number
of user counts or storage space. There are free trial periods. Make
sure you review the services before deciding to buy.
n o t e s
Figure 5.3 shows the phases that one has to go through while selecting
and transitioning the services to the cloud. Throughout the adoption
process, you need to focus on the areas of trust, security, legal compli-
ance, and organisational issues.
Analysis
Phase 1:
impact of migrating to the cloud; and do an analysis
of the existing systems, application and business
processes
S
computing. The management team choose the
platforms for deployment and the infrastructure
finance, plans, security and legal issue
IM Adoption
Exhibit
An SLA is a contract between the user and the cloud service provid-
er. It defines the terms of responsibility of the cloud service provid-
er and the service credits (penalty or fee-reduction) if the provider
is unable to meet the terms. The SLA document between the user
and the cloud service provider is critical, because after the user
starts using the public cloud, data security, privacy, and application
availability are usually beyond the user’s control.
However, you, as a user who has outsourced the services and data
to an external provider, continue to be answerable for service
n o t e s
availability and privacy. The cloud service provider controls the us-
erdata and services, thus, in case the cloud service provider does
not perform according to an agreement, you can use the previous-
ly-agreed-upon SLA to hold the provider liable for breaches.
S
and the cloud service provider. An SLA must contain the following:
List of services the provider offered to you along with a defini-
tion of each service
IM
Easy-to-understand metrics to evaluate if the provider is deliv-
ering the service at the promised levels
Mechanism to monitor the service
Customer responsibilities such as using licensed and tested
applications on IaaS Virtual Machines (VM), storing legitimate
M
n o t e s
The SLOs you need depend on your applications and your use of
the cloud. This is an internal, enterprise document with business
goals such as operational cost savings, ongoing control over IT in-
frastructure, budget changes, and move decision making from IT
teams to individual Business Units (BUs). These internal goals
form the basis for the SLA with the cloud service provider.
S
99.5% or higher. For mission-critical services, the uptime must
be 99.9%. Credits are given to you only if the actual uptime is
lower than the one in the SLA. Following are the few areas that
IM need careful perusing:
Specify how the provider will inform you about the uptime.
Ideally, it should be for each billing period, which is usually
monthly.
Specify the minimum outage duration to qualify as down-
time. For example, 5 minutes, 10 minutes, 20 minutes, or
M
n o t e s
replicate data to the new AZ. If not, even if all your AZs and data
are down, you will be not be eligible for credits.
Downtime credits: The provider may put a cap on the percent-
age (for example, 20%) of a customer’s bill that can be reduced
for downtime credits. The credits, if capped, are usually meager
and less than the hard and soft losses such as lost sales opportu-
nity, goodwill, brand image, morale, or productivity.
Credit initiation: Note who has the burden of initiating a credit.
Most providers put the onus on the user. This is a problem with
SLAs. Besides, the SLA may require you to initiate the credit
request within a specific time, for example, within 30 days of
the outage or 10 days of receiving a bill. Also, note the credit
processing time in the SLA. Determine if the credit will show on
your next month’s bill or after 6 months.
S
Mean time to repair: Some SLAs may give you a Mean Time To
Repair (MTTR) for issues. Insist that your provider give you an
MTTR in the SLA. If the time taken is more than the MTTR, the
IM
provider must issue you credits for the extra time taken.
Data protection: The SLA should specify details for your data
backups such as frequency, storing tapes offsite, etc. It should
also specify if the data is replicated to remote sites for DR.
Data encryption: SLA must specify if the data-at-rest and
M
n o t e s
S
up of your data must also be specified.
Hidden costs: Read the SLA for hidden costs. Your SLA may
have a clause that if a reported problem is found to be due to
IM
the consumer’s fault, the consumer can be billed for the time
and material used to investigate the issue. In such a case, there
might be no upper limit on the bill amount or any statement on
how to decide if the reported problem is due to a consumer’s
fault.
Floating terms: Normally, SLAs are paper documents signed by
M
both parties, however, they may refer to policies and terms that
are published on a website. That should be considered an area
for concern. The files on the websites can change. The cloud
provider may not be required to inform customers of changes to
the terms. Sometimes, cloud providers may need the flexibility
N
You should be aware of the local laws where the data center and the
cloud provider are located. If law enforcement agencies seize the
cloud provider’s equipment or the cloud provider goes bankrupt,
they should give you enough notice to save or migrate your data
to your enterprise or to another cloud provider. Moreover, there
are certain important aspects that cannot be specified in an SLA.
For example, will the cloud provider be in business in three or five
years from now? You need to be comfortable with the financial sta-
bility of the cloud provider.
n o t e s
S
Activity
Find out how content filtering is beneficial for SMBs in cloud adoption.
IM
CLOUD VENDOR RESPONSIBILITIES IN
5.7
ENCOUNTERING CHALLENGES
Both the consumer and the provider need to know the overall business
environment. Providers must appreciate the need of the consumers,
M
and also customers must be aware of the limitations that the providers
work under. The key requirements of the consumers are:
Security to save cloud data and applications and denial of access
to unauthorised users
N
Providers, on the other hand, work to provide the best features and
conveniences to their customers to encourage them to use cloud ser-
vices which includes:
Offering the most competitive prices
Scalability and elasticity
Self-service portal for users to automate the provision of resources
The cloud vendor has extensive responsibilities due to the nature and
requirement of shared infrastructure. The responsibilities, the extent
n o t e s
S
Cloud vendors must regularly upgrade their systems and keep up with
the latest security versions and anti-malware patches. They must in-
form cloud users and application developers about software installa-
IM
tion and upgrade plans. The vendor must provide a test environment
with the new software, where the developers can test their applica-
tions. Later when the cloud production environment is upgraded, the
developers must, in turn, update their software for their customers.
11. It is required that the consumer and the provider must know
the overall business environment to get the maximum benefits
of cloud. (True/False)
12. Cloud _____ must regularly upgrade their systems and keep
N
Activity
Find out the type of questions that a cloud vendor must ask before
providing services to a client for better experience.
Exhibit
n o t e s
S
platforms.
Data security, privacy, and history of security breaches.
Compliance with legal and regulatory requirements.
IM
Historical performance of service uptime, security, and IT reli-
ability.
Quality of infrastructure, security monitoring and Network Op-
erating Center (NOC) operations.
Performance of the IT and datacenter infrastructure.
M
n o t e s
Activity
S
selection of a cloud partner.
IM
Exhibit
Sharding also helps reduce the size of the database index, thus de-
creasing the time needed for searches within the database. To fur-
ther improve performance and availability, providers offer a hori-
zontally-scaled server environment, where it is quick and easy to
bring up more virtual machines to meet higher workloads. Besides
performance, providers focus upon improving database integrity
by using database profilers.
n o t e s
5.9 SUMMARY
A Small and Medium Business (SMB) typically has 1 to 1,000 em-
ployees.
Data management, resource control, virtualisation, and security
are the some key areas that must be addressed in near future with
respect to the cloud computing.
Itis a big issue for all cloud providers to decide whether moving
on cloud infrastructure from the existing system is economically
feasible or not.
A robust performance monitoring system provides benefits such
as tracking work load patterns, identifying peak resource utilisa-
tion, and isolating potential problems and their causes.
S
Data management includes data consistency over a distributed en-
vironment of replicated data.
Ina cloud environment, variety of data and applications are avail-
IM
able to different types of users.
Up-scaling of the system also balanced quite carefully in order to
make system economically feasible as well as fixing nature related
problems like carbon emission.
key words
M
n o t e s
S
Topic Q.No. Answers
Challenges of Cloud Adoption 1. c. Open Cloud Manifesto
IM
2. True
Technical and Economic Chal- 3. d. Unable to Implement
lenges In Cloud Adoption interoperability
4. Cloud APIs
Challenges and Pace of Adoption 5. SaaS
of Public Cloud by SMBs
M
6. True
Public Cloud Benefits for SMBs 7. b. Enterprise Resource
Planning
8. d. Box.net
N
n o t e s
S
6. Providers must appreciate the need of the consumers, and also
customers must be aware of the limitations that the providers
work under. Refer to Section 5.7 Cloud Vendor Responsibilities
in Encountering Challenges.
IM
5.12 SUGGESTED READINGS & REFERENCES
SUGGESTED READINGS
Murugesan, S., & Bojanova, I. (2016). Encyclopedia of Cloud Com-
M
E-REFERENCES
Novikoff, E. (n.d.). Articles. Retrieved March 03, 2017, from http://
enki.co/blog/reliability-and-cloud-computing.html
Sabahi, F. (2012, September 21). International Journal on Advanc-
es in ICT for Emerging Regions (ICTer). Retrieved March 03, 2017,
from http://icter.sljol.info/articles/abstract/10.4038/icter.v4i2.4673/
Stability and Reliability of Public Cloud Storage. (2014, April 03).
Retrieved March 03, 2017, from http://www.cloudcomputingadmin.
com/articles-tutorials/public-cloud/stability-and-reliability-pub-
lic-cloud-storage.html
OpenStack cloud adoption continues to rise but challenges remain.
(n.d.). Retrieved March 03, 2017, from http://www.cloudcomput-
ing-news.net/news/2016/mar/10/openstack-cloud-adoption-contin-
ues-rise-challenges-remain/
VIRTUALISATION
CONTENTS
S
6.1 Introduction
6.2 Benefits of Virtualilsation
IM
Self Assessment Questions
Activity
6.3 Implementation Levels of Virtualisation
6.3.1 Comparison between the Implementation Levels of Virtualisation
6.3.2 Virtualisation Design Requirements
6.3.3 Virtualisation Providers
M
Activity
6.5 Middleware Support for Virtualisation
Self Assessment Questions
Activity
6.6 Virtualisation Mechanisms
Self Assessment Questions
Activity
6.7 Summary
6.8 Descriptive Questions
6.9 Answers and Hints
6.10 Suggested Readings & References
Introductory Caselet
n o t e s
iTricity has five huge physical data centers. The company wanted
to combine these data centers into one virtual network that would
provide its customers greater speed. The chief executive officer
of iTricity, Robert Rosier, says “Our vision was to create a comput-
ing cloud whose virtualised services meant that we would be able
S
to meet customers’ needs for services ‘on demand’. To do this, we
needed to move away from traditional silo infrastructures to create
a very flexible and secure environment, where increasing levels of
service automation will eventually see customers themselves initi-
IM
ate the services they need.”
Introductory Caselet
n o t e s
S
IM
M
N
n o t e s
learning objectives
6.1 INTRODUCTION
Virtualisation has added a new dimension to the field of Information
S
Technology (IT). You can implement, test, and run various large-sized
applications with virtualisation, which is not possible to implement
on physical hardware alone. Virtualisation technology, in computing
terms, allows the creation of virtual versions of hardware platforms,
IM
Operating Systems (OSs), networking resources, or storage devices.
It supports multiple-guest OSs to be run on a single physical machine,
called the host machine and multiple guest applications on a single
server, called the host server.
for businesses are also well handled by it. It helps organisations save
by removing the physical infrastructure to a large extent, taking care
of capital costs that need to be invested in availing and maintaining
the infrastructure. Moreover, other costs, such as maintenance and
N
In this chapter, you will study about virtualisation and its benefits.
In addition, you will also study about the implementation levels of vir-
tualisation. You will also study about the virtualisation at OS level and
middleware support for virtualisation. Towards the end of the chapter,
you will study about virtualisation mechanisms.
n o t e s
Virtualisation
S
Figure 6.1: A Typical Virtualisation Structure
n o t e s
S
ent levels of security without being utilised to their full capacity.
Activity
Suppose you are the owner of a company. How can you reduce the
hardware costs of your company by implementing virtualisation?
IMPLEMENTATION LEVELS OF
6.3
VIRTUALISATION
Virtualisation is implemented at various levels by emulating specific
structures into corresponding software that appears to be working the
same way as a physical structure does. The levels at which virtualisa-
tion is implemented are shown in Figure 6.2:
n o t e s
Application level
JVM/.NET CLR/Panot
WINE/WABI/LXrUN/Visual MainWin/vCUDA
S
Instruction set architecture (ISA) Level
Bochs/Crusoe/QEMU/BIRD/Dynamo
IM
Figure 6.2: Implementation Levels of Virtualisation
n o t e s
S
similarities that exist between the architectures of the systems.
Virtualisation utilises the native hardware for all its computation
and processing by mapping the virtual resources into physical
resources. Virtualisation at HAL is the most common technique
IM
used in computers on x86 platforms, which increases the
efficiency of the virtual machine in handling various tasks. Using
this architecture becomes relatively economical and practically
useful. In case emulator communication with critical processes
is required, the simulator assumes the tasks and performs
appropriate multiplexing.
M
n o t e s
Application Application
S
PC Hardware
Stand Alone Virtual Machine
IM
Figure 6.3: Virtualisation at HAL
3. Virtualisation at the OS level: Virtualisation at the level of HAL
is laced with various noticeable properties. It supports multiple
OSs and applications to be run simultaneously, which require
no system reboot or dual-boot setup. It gives the appearance of
having multiple separate machines, each of which can be used as
M
n o t e s
between the real and Virtual Environments (VEs). The key idea
behind implementing OS-level virtualisation is that the VE
remains indistinguishable from the real one. The virtualisation
layer replicates the operating environment, which is established
on the physical machine to provide a VE for the application
by creating partitions for each virtual system, whenever
demanded. A systematic and properly managed partitioning and
multiplexing technique enables you to export complete operating
environments that are separated from the physical machine, as
well as from each other.
4. Virtualisation at the programming language level or library
level: Programming the applications in most systems requires
an extensive list of Application Program Interfaces (APIs) to be
exported by implementing various libraries at the user-level.
These APIs are used to save users from the minute details
S
entailed with programming related to the OS and enable
programmers to write programs easily. This, however, is taken
as a new opportunity by the virtualisation community. At the
IM
user-level library implementation, a different VE is provided
in this kind of abstraction. This VE is created above the OS
layer, which can expose a different class of binary interfaces
altogether. This type of virtualisation may, otherwise, be defined
as an implementation of a different set of Application Binary
Interfaces (ABIs) and/or APIs being implemented through the
base system and performing the function of ABI/API emulation.
M
n o t e s
Applications
Independent Root/User/Groups
Independent Network/Processes/Files
S
6.3.1 COMPARISON BETWEEN THE IMPLEMENTATION
LEVELS OF VIRTUALISATION
IM
Various implementation levels of virtualisation carry their own set of
merits and demerits. For example, ISA-level virtualisation provides
high flexibility for applications, but its performance is a matter of great
concern. Likewise, other levels of virtualisation (HAL-level, OS-level,
library-level, and application-level) also carry both positives and neg-
atives. HAL-level and OS-level virtualisations are best on the perfor-
M
formance as its plus points, but low flexibility and poor isolation fea-
tures are its negatives. The relative merits and demerits of different
levels of virtualisation implementation are summarised in Table 6.1:
TABLE 6.1: RELATIVE MERITS AND DEMERITS OF DIF-
FERENT LEVELS OF VIRTUALISATION IMPLEMENTATION
Imple- Performance Applica- Implementa- Applica-
mentation tion Flexi- tion Complex- tion Isola-
Level bility ity tion
ISA Very Poor Per- Excellent Medium Medium
formance
HAL Excellent Per- Medium High Very Good
formance
OS-Level Excellent Per- Low Medium Very Poor
formance
Library Medium Perfor- Low Low Very Poor
Level mance
Application Poor Perfor- Low High Excellent
Level mance
n o t e s
S
Efficiency requirement: While taking the route of virtualisation,
the virtual machine must be as efficient in its performance as a
real system. Virtualisation is primarily done with a purpose of get-
ting efficient software without the physical hardware.
IM
Resource control requirement: A typical computer system is a
combination of various resources, including processors, memory,
and I/O devices. All these resources must be managed and con-
trolled effectively by the VMM. The VMM must be in a state of
enforcing isolation between the virtualised systems. The virtual
machines or VMMs should not face any interference in their oper-
M
n o t e s
S
VMware: VMware has, over the years, been synonymous to virtuali-
sation. Such is the popularity of this system that, today, any mention
about virtualisation instantly brings VMware’s name to the mind.
IM
The commoditisation of virtualisation enabled organisations to
think that virtualisation can help them avoid various risks and costs
associated with physical infrastructure, reduce complexity, and im-
prove resource availability. The following are the VMware products:
VMware workstation: VMware released a virtualisation plat-
form, VMware Workstation, in the year 1999. Its features, such
M
n o t e s
Apart from these renowned vendors and platforms, Parallels and Xen
are two of the most used platforms that provide virtualisation support
for systems.
S
self assessment Questions
Activity
n o t e s
S
CPU Hotplug Support
PCI Hotplug Support
vmchannel
IM
Migration
vhost
SCSI Disk Emulation
Virtio Devices
M
CPU Clustering
Xen: Xen hypervisor is the only bare-metal hypervisor available
as open source. Through Xen, a VM (or a host) can run a num-
ber of OS images or multiple different OSs in parallel. Various
N
n o t e s
S
images or Windows OS images without modification.
IM
Activity
Suppose you use Linux operating system in your office. How will
you provide virtualisation at the OS level with open-source tech-
nologies?
M
n o t e s
S
a server is virtualised by the Ensim VPS with the objective of par-
titioning the OS into separate environments that can be used for
computational purposes. These separate environments are known
IM
as virtual private servers, and the independent operation of these
servers makes the complete Ensim VPS. The OS views the VPS
as an application, whereas the applications view the VPS as the
native OS resulting into the VPS, appearing and operating in the
form of a physical server for the users.
The Ensim VPS is implemented rather strongly than the other two vir-
M
Activity
Suppose you are using Linux operating system in your office. What
techniques will you use to implement middleware support for vir-
tualisation?
n o t e s
S
Switching the control between virtual machines and VMMs results
in a degradation in the performance. To overcome this, the virtual-
isation software processes a group of instructions simultaneously.
The impact on the performance of the system can be reduced by
IM
reducing the number of times (and/or the duration of it) the VMM
interferes with the virtual machine execution.
Binary translation in combination with the direct execution tech-
nique can be used by VMware to virtualise seemingly any OS on
x86 platforms. In this approach, as shown in Figure 6.5, non-virtu-
alised instructions are replaced by translating the kernel code into
M
Direct
N
n o t e s
S
modification in the VM code during its execution, which causes
the performance of the system being degraded. To improve on that
aspect, a new virtualisation approach, which is known as the hard-
ware assist technique, is followed. This is a new processor tech-
IM
nology that avoids change in the system state and calls the VMM
directly, as and when required. Two of the most popular processor
development companies, namely Intel and AMD, use this technolo-
gy to develop processors, called Intel-VT and AMD-V, respectively.
But the VMM interrupts the execution of the VM code every time
it finds a privileged instruction and hence causes severe impacts
M
Direct
Non-root Ring 2 Execution of
Mode
User Requests
Privilege
Levels Ring 1
OS Requests Trap
Ring 0 Guest OS
to VMM without
Binary Translation or
Root Mode
VMM Paravirtualisation
Privilege Levels
n o t e s
S
Ring 3 User Apps
Direct
IM
Ring 2 Execution of
User Requests
Ring 1
Paravirtualised
Ring 0
Guest OS ‘Hypercalls’ to
M
the Virtualisation
Layer replace Non-
Virtualisation Layer
virtualisable OS
Instructions
Host Computer System
Hardware
N
n o t e s
S
self assessment Questions
Activity
How can you improve the performance and efficiency of virtual sys-
tems? Discuss in your class.
6.7 SUMMARY
Virtualisationtechnology, in computing terms, allows the creation
of virtual versions of hardware platforms, Operating Systems
(OSs), networking resources, or storage devices.
Virtualisation technology separates the primary functions of com-
puters, i.e., computing and technology implementation, from the
physical infrastructure and hardware resources with the help of a
technology called Virtual Machine Monitor (VMM).
n o t e s
S
Virtualisation at the OS level is a technique in which physical oper-
ating environments are separated from their virtual counterparts
by a separation layer known as the virtualisation layer.
IM
The binary translation method is used by the VMM that directs I/O
requests to the appropriate system thereby preventing individual
virtual machines from causing any conflicts.
In a full virtualisation technique, the OS has no awareness of being
virtualised; whereas, paravirtualisation involves making the OS
M
key words
n o t e s
S
Topic Q. No. Answers
Benefits of Virtualilsation 1. d. Virtual Machine Monitor
IM
2. True
Implementation Levels of 3 Sun Microsystems, Innotek
Virtualisation
4. True
Virtualisation at the OS 5. c. Paravirtualisation
M
Level
6. Kernel-based Virtual Machine
(KVM)
Middleware Support for 7. middleware support
N
Virtualisation
8. a. Jail
Virtualisation Mechanisms 9. c. VMware
10. VMM
11. True
n o t e s
SUGGESTED READINGS
S
Dhamdhere, S. N. (2014). Cloud Computing and Virtualization Tech-
nologies in Libraries. Hershey, PA: Information Science Reference.
Josyula, V., Orr, M., & Page, G. (2012). Cloud Computing: Automat-
IM
ing the Virtualized Data Center. Indianapolis, IN: Cisco.
Jamsa, K. A. (2013). Cloud Computing. Burlington, MA: Jones &
Bartlett Learning.
E-REFERENCES
M
CONTENTS
S
7.1 Introduction
7.2 Key Drivers for Cloud Computing
IM
Self Assessment Questions
Activity
7.3 Cloud Computing and Outsourcing
Self Assessment Questions
Activity
7.4 Types of Scalability
M
Activity
7.6 Variable Operating Costs using Cloud Computing
Self Assessment Questions
Activity
7.7 Time-to-market Benefits of Cloud Computing
Self Assessment Questions
Activity
7.8 Distribution over the Internet
Self Assessment Questions
Activity
7.9 Levels of Business Value from Cloud Computing
Self Assessment Questions
Activity
7.10 Summary
7.11 Descriptive Questions
7.12 Answers and Hints
7.13 Suggested Readings & References
Introductory Caselet
n o t e s
S
with their friends to get instant feedback from them. The app has
now become shoppers’ best companion as it allowed them to shop
from any place and at any time.
IM
The VIZL app uses the visualiser technology which provides a
digital dressing room to shoppers where they can try apparel,
jewellery on the pictures of their own, friends or family members.
Moreover, the app also provides colour search and digital clos-
et which enables the camera of the shopper’s smartphone to be
converted in a digital stylist. The related pictures of new fashion
discoveries in store or by shopper’s friends are shared with shop-
M
pers.
Introductory Caselet
n o t e s
S
IM
M
N
n o t e s
learning objectives
S
7.1 INTRODUCTION
The previous chapter discusses the concept of virtualisation in cloud
IM
computing. Now, let us move forward and acquaint ourselves with
cloud computing and business value.
In this chapter, you will first study about key drivers for cloud com-
puting. Next the chapter will discuss about cloud computing and out-
sourcing. The chapter will further discuss about different types of
scalability that exists in cloud computing. Further, the chapter also
discusses about the usage of load balancers to enhance scalability. You
next learn about the variable operating costs using cloud computing.
Finally, you will study about time-to market benefits of cloud comput-
ing and its distribution over the Internet.
n o t e s
They are expected to offer a broad range of solutions and play key
roles in the cloud market.
S
No ongoing onsite IT personnel, Opportunity to use low-cost com-
power, and other data centerrelated modity servers, storage, etc. to form
expenses redundant IT infrastructure
Flexibility and on-demand provi-
IM
Ability to provide multiple services
sioning of computing and storage from a single IT infrastructure
resources
Pay-per-use model where payment Increased resource utilisation due
is made only for the time of use to a multi-tenant model
Large corporations use public clouds for less critical applications such
M
as Disaster Recovery (DR) and backups. However, now, they are eval-
uating or using cloud computing for mission-critical services such as
Customer-Relationship Management (CRM) and Enterprise Resource
Planning (ERP). They are also motivated by the cloud’s large-scale,
on-demand resource availability and ease of use. The key benefits for
N
n o t e s
S
Exhibit
IM
Cloud makes for a green earth
n o t e s
Activity
S
Cloud-sourcing can provide substantial economic benefits, but it also
has some disadvantages such as security, loss of control, and perfor-
mance. However, it is important to understand the similarities and
differences between the two, as shown in Table 7.2:
IM
Table 7.2: Comparison of IT Outsourcing and
Cloud Computing
S. Criteria IT Outsourcing Cloud Computing
No.
1. Vendor Lock-in Yes and transition to anoth- Yes, however, with
M
n o t e s
S
It is important to realise that there are compliance and government
regulations for location of data, and it applies to both cloud computing
and outsourcing.
IM
Some other concerns related to cloud computing and outsourcing are:
Security at a vendor site
Loss of control
Latency of using an application at a remote site
M
n o t e s
S
Activity
tions and must not bother about the location of data it requires. The
service also does not bother about the programming functionality re-
quired to retrieve the data from the database and the server on which
it is executing. Whatever the kind of data is required, the message is
passed to the service and service passes this information to the appro-
priate database server to fetch the required data.
n o t e s
S
B 4 CPUs
IM
A 2 CPUs
pooled
physical
servers
n o t e s
Activity
S
USE OF LOAD BALANCERS TO ENHANCE
7.5
SCALABILITY
IM
Load balancers can be used to efficiently manage and spread incom-
ing user traffic among multiple servers. A load balancer monitors the
traffic and available servers, and uses a round-robin algorithm where
the idlest server is allocated the load. It improves performance for the
user. It also protects against server failure. If a server fails, the other
M
Load balancers are commonly used for services such as Domain Name
N
n o t e s
server availability
load Server
service
1
request
service
Client Load request
balancer
Server
server availability n
load
Figure 7.3: The Classic Load Balancing Architecture (or Load Dis-
patcher)
S
Source: http://www.javaworld.com/article/2077921/architecture-scalability/server-load-balanc-
ing-architectures--part-1--transport-level-load-balancing.html
You can decide the best load balancer architecture (Figure 7.3) by con-
sidering two terms, availability and scalability. The availability of a
IM
server can be defined by uptime which is the time between failures.
During the uptime, the system must provide response to each request
within a well-defined and predetermined time. If the time gets in-
creased then the client judges it as the malfunctioning of the server.
High availability is achieved when one server fails and another server
takes its place and therefore, the failure of the server remains hidden
M
On the other hand, scalability means that the system can handle a
single client as well as thousands of clients simultaneously by meeting
quality-of-service needs like response time. When the load of the net-
N
work traffic is high, the scalable system can increase the throughput
by adding hardware resources. In Figure 7.3, you can see that the high
scalability can be achieved by passing the incoming request to serv-
ers. When the load is high, more servers can be added as long as the
load balancer does not get locked. The load balancer must verify the
server status to avoid forwarding the incoming request to dead serv-
ers or to the overloaded servers.
n o t e s
Activity
Find out the features of NGINX Plus as your load balancing soft-
ware.
S
Organisations can experiment with technical ideas and create proof of
business concepts using cloud resources. If a business idea does not
IM
seem feasible to continue, it can be quickly be withdrawn from the
cloud. The cloud provides an agile platform on a pay-per-use basis. It
is responsive to changing market needs. The enhanced utilisation of
cloud resources helps reduce the cost per user. Smart, power-saving
technologies turn off resources during periods of low-load, thus, sav-
ing on power-related costs.
M
Activity
Enlist the differences between fixed cost model and variable cost
model.
n o t e s
S
13. Cloud helps in _____ engineering time to create and deploy
new services.
14. Cloud provides pay-per-use billing for development and
IM production. (True/False)
Activity
Most cloud providers have multiple data centers for DR and better per-
formance, and provide the most reliable user experience. Optimising
the above factors yield the highest ROI on data center costs for cloud
providers. Greenfield sites are preferred, because they save money on
land acquisition costs and are usually eligible for tax rebates.
n o t e s
S
d. All of these
16. The data center must be earthquake-free or built on low
seismic zone. (True/False)
IM
Activity
n o t e s
S
resources in the cloud. It facilitates better
collaboration between geographically-dis-
persed teams and users with mobile and
IM remote access.
3. Advanced Level (Busi- The business innovation level aims to
ness Innovation Level create new value chains between organisa-
Value) tions and customers and novel and pio-
neering business models. This is achieved
by rewiring the way organisations can op-
erate using cloud resources, making choic-
M
business eco-systems.
Activity
Find out how cloud computing is helpful even for a small organisa-
tion.
n o t e s
7.10 SUMMARY
Cloud computing offers organisations a creative way to address
how they utilise IT, which in turn allows them to focus on their
business objectives.
The cost and convenience benefits have prompted organisations
of all sizes to consider adopting cloud computing.
The hype about cloud computing has created unrealistic expecta-
tions about what cloud computing can deliver, making improbable
promises such as high ROI, reduced overall costs, and improved
revenue.
While the immediate cloud benefits of not having to deal with buy-
ing and managing your own infrastructure and data center is ap-
pealing, the Total Cost of Ownership (TCO) of renting for a long-
S
term is almost the same as owning.
Although using public clouds is similar to outsourcing IT services,
there are notable differences in terms of ease of entering into and
IM
exiting from contracts, scaling up or down, and location of data
and services.
Clouds have vertical (add more resources to an existing server),
horizontal (add more servers), or diagonal (do both) scalability.
Use of load balancers improves performance and availability for
M
cloud services.
Use of cloud to develop, test, and deploy applications helps in fast-
er time to market e-services.
There are three distinct levels of value derived from using cloud:
N
key words
n o t e s
S
7.12 ANSWERS AND HINTS
IM
ANSWERS FOR SELF ASSESSMENT QUESTIONS
3. True
Cloud Computing and Out- 4. IT Outsourcing, Cloud Computing
sourcing
5. c. Data Center as a Service
N
6. True
Types of Scalability 7. horizontal
8. threshold value
Use of Load Balancers to 9. d. All of these
Enhance Scalability
10. True
Variable Operating Costs 11. variable
using Cloud Computing
12. False
Time-to-market Benefits 13. reducing
of Cloud Computing
14. True
Distribution over the 15. d. All of these
Internet
n o t e s
S
7.2 Key Drivers for Cloud Computing.
3. The justification for IT outsourcing and cloud computing
has been instrumental in lowering of costs. Refer to Section
IM
7.3 Cloud Computing and Outsourcing.
4. The main advantage of cloud computing is that it can scale
services and applications quickly as per the requirement of
customer. Refer to Section 7.4 Types of Scalability.
5. Load balancers can be used to efficiently manage and spread
incoming user traffic among multiple servers. Refer to Section
M
SUGGESTED READINGS
Weinman, J. (2012). Cloudonomics: The Business Value of Cloud
Computing. Hoboken, NJ: Wiley.
Harding, C., Isom, P., & Skilton, M. (2011). Cloud Computing for
Business: The Open Group Guide. Zaltbommel: Van Haren Publish-
ing.
n o t e s
E-REFERENCES
Twitter as a scalability case study. (n.d.). Retrieved March 08, 2017,
from http://natishalom.typepad.com/nati_shaloms_blog/2008/05/
twitter-as-an-e.html
Cloud - Re-Platforming to AWS Cloud for Increased Scalabil-
ity, Availability and Manageability. (n.d.). Retrieved March
08, 2017, from http://www.ust-global.com/cloud-re-platform-
ing-aws-cloud-increased-scalability-availability-and-manageabili-
ty
Cisco Services Follow. (2011, December 02). The Business Value
of Cloud Computing. Retrieved March 08, 2017, from https://www.
slideshare.net/CiscoIBSG/why-cloud-why-now-10440473
S
IM
M
N
CLOUD ARCHITECTURES
CONTENTS
S
8.1 Introduction
8.2 Workload Distribution Architecture
IM
Self Assessment Questions
Activity
8.3 Resource Pooling Architecture
Self Assessment Questions
Activity
8.4 Dynamic Scalability Architecture
M
Activity
8.6 Service Load Balancing Architecture
Self Assessment Questions
Activity
8.7 Cloud Bursting Architecture
Self Assessment Questions
Activity
8.8 Elastic Disk Provisioning Architecture
Self Assessment Questions
Activity
8.9 Redundant Storage Architecture
Self Assessment Questions
Activity
8.10 Summary
8.11 Descriptive Questions
8.12 Answers and Hints
8.13 Suggested Readings & References
Introductory Caselet
n o t e s
Company Profile
S
Limited, India infoline Insurance brokers Ltd., India Infoline
Commodities Ltd., IIFL Assets Management Company & IIFL
MF, IIFL Private Wealth Management Ltd., IIFL (Asia) Pte Ltd.,
IIFL Inc. (US) investment Advisors Ltd., IIFL (UK), IIFL Multi
IM
National Company, 5Paisa Capital Ltd.
Problem
Solution
Introductory Caselet
n o t e s
cation ran fine during migration. It was a tough call when it came
to procuring 70 more servers to run the new application in parallel,”
says Sankarson Banerjee, Chief Information Officer, IIFL Ltd.
S
Thus, Netmagic Solution makes it possible for India Infoline to
bring down its physical server requirement to a mere 30%. Net-
magic automated all the IT environment of India Infoline seam-
IM
lessly. With the help of Netmagic Solution, India Infoline now gets
more time to focus on its core business processes, application de-
velopment and innovation.
n o t e s
learning objectives
S
>> Describe open-source OpenStack cloud architecture
8.1 INTRODUCTION
IM
Cloud computing architecture is the structure of the cloud system.
Cloud computing architecture is generally composed of the various
components and subcomponents that are needed for cloud comput-
ing. These components may be at the front end or back end platform.
It can also be a network. The front end of cloud computing architec-
ture is called as cloud clients or simply clients. The main function of
M
the client is to interact with cloud data storage with the help of ap-
plication, browser or virtual session. The various types of clients are
fat client, thin client zero client, tablet and mobiles. Cloud computing
architecture also consists of cloud resource, middleware and software
N
components.
WORKLOAD DISTRIBUTION
8.2
ARCHITECTURE
In workload distribution architecture, there is a load balancer and vir-
tual server. The load balancer distributes the workload consistently
among the IT resources that are available. Then the over utilization
and underutilization of IT resources can be reduced to some extent.
However, this reduction totally depends on load balancing algorithm
as well as runtime logic.
n o t e s
load
Cloud Virtual
balancer
Service Server
A A
Cloud Virtual
cloud service Service Server
consumers A A
S
Source: http://www.informit.com/articles/article.aspx?p=2093407
Activity
n o t e s
S
sioned physical servers.
Figure 8.2 shows a sample resource pool that is composed of four sub-
pools – CPU pool, memory pool, storage pool and network pool:
IM
CPU pool memory pool storage pool network pool
M
The hierarchical structure can form parent, sibling or nested pools that
can help an organization to get the various needs of resource pooling.
The hierarchical resource pooling architecture is shown in Figure 8.3:
Pool A
Pool B
Pool C
n o t e s
In Figure 8.3, Pool A is a parent pool. Pool B and Pool C are two sibling
pools that are taken from the parent pool, Pool A. Sibling resource
pools are generally taken from a group of physical IT resources that
are always kept isolated from each other.
Pool A
Pool B
S
virtual server pool CPU pool memory pool
IM
Pool C
In Figure 8.4, Pool A.1 and Pool A.2 are nested pools, which contains
the same type of IT resources as that of Pool A but in varying quanti-
N
ties.
Activity
You are given a sample of a resource pool that consists of CPU pool,
memory poll, network pool and storage pool. Divide the resource
pool into three smaller pools. All the pools should consist of same
resources that may differ in quantities.
n o t e s
S
resources and provide the resources based on the requirements
and permissions.
Dynamic vertical scaling: In this type of scaling, the resources are
IMscaled up and down at the time when it is required to adjust the
processing capacity of a single resource.
cloud
service
instances
N
virtual
server
automated host
cloud service scaling
consumers listener
In Figure 8.5, it is seen that the consumers of cloud service are send-
ing request to a cloud service and the automated scaling listener mon-
itors the cloud service in order to determine whether the capacity of
predefined thresholds are being exceeded or not.
If the capacity of the predefined threshold exceeds its limit, the auto-
mated scaling listener will go for the next course of action on the basis
of the predefined scaling policy, as shown in Figure 8.6:
n o t e s
cloud
service
instances
virtual
server
automated host
cloud service scaling
consumers listener
S
Figure 8.6: Cloud server overloaded with request
Source: http://www.informit.com/articles/article.aspx?p=2093407&seqNum=3
When the cloud server is overloaded with request, a signal will be sent
IM
to resource replication mechanism by the automated scaling listener.
The resource replication mechanism will create more instances of the
cloud services as shown in Figure 8.7:
virtual
M
cloud service
consumers
resource
replication
n o t e s
Activity
The scaling technology uses resource pool which can interact with hy-
S
pervisor or Virtualized Infrastructure Management (VIM) in order to
retrieve and return the resources of CPU and RAM at runtime. In or-
der to leverage the additional processing power of virtual server from
the resource pool dynamically, it is required to monitor the processing
IM
of the virtual server. Then the virtual server, its hosted applications
and resources will be scaled.
and CPU
sub-pools
cloud
service
cloud service
consumers
hypervisor
intelligent
automation engine
n o t e s
In Figure 8.8, it is seen that requests are sent actively to a cloud ser-
vice and are being monitored by an automated scaling listener. An in-
telligent automated engine has been deployed with the workflow logic
which will notify about the resource pool.
automated scaling
listener resource pool
with memory
and CPU
S
cloud
sub-pools
service
cloud service
IM
consumers
hypervisor
M
N
intelligent
automation engine
Then the additional CPU and RAM will be allocated to the virtual serv-
er. It will enable the architecture to handle the increased workload.
n o t e s
Activity
Search and enlist reasons behind the creation of the elastic re-
source capacity architecture.
S
ly of the cloud services and host servers as shown in Figure 8.10:
load
balancer
N
In Figure 8.10, it is seen that the messages sent by the cloud server
consumers are intercepted by the load balancer. The load balancer
n o t e s
then forwards the message to the virtual server in order to process the
workload horizontally.
S
IM
Cloud Cloud Cloud
Service Service Service
A A A
Virtual
Virtual Server C
Virtual
M
Server B
Server A
N
n o t e s
Activity
Using the Internet, collect the information about cloud usage mon-
itor and resource cluster mechanisms of the service load balancing
architecture and discuss in your class.
S
architecture. It provides the option of using the cloud based resources
only when the usage demand is high.
n o t e s
Activity
S
IM
M
N
In Figure 8.13, it is seen that the cloud consumer request for a virtual
server that has three 50 GB hard drives. Thus the virtual server will
have a total disk space of 150 GB. It is seen that the used space is cur-
rently 0. This is because the cloud consumer has not installed any soft-
ware till now. But the cloud consumer will be charged for all the three
hard drives, i.e., for 150 GB even if he needs only 20 GB storage space.
n o t e s
thin provisioning
program
hypervisor
cloud pay-per-use
consumer monitor
S
Figure 8.14: Allocating the storage capacity
IM Source: http://www.informit.com/articles/article.aspx?p=2093407&seqNum=7
In Figure 8.14, it is seen that the virtual server receives a request from
the cloud consumer. The virtual server then starts the provisioning
process. There is a hypervisor in the architecture. The hypervisor cre-
ates thin disks for the virtual server by calling the dynamic disk allo-
cation component. The virtual server disks are created with the help
M
of the thin provisioning program. The virtual server disks are saved
in a folder whose size is almost zero. But the size of the disk increases
gradually as operating applications and files are copied on to the vir-
tual server.
N
Activity
n o t e s
S
primary
storage
device
secondary storage
IM device
storage
service
gateway
M
In Figure 8.15, it is seen that data of the primary storage device is reg-
N
secondary
storage
device
primary storage
device
storage
service
gateway
n o t e s
Since the secondary storage device has all the data of the primary
storage device, it can allow the cloud consumers to access the data.
S
b. Redundant storage architecture
c. Cloud bursting architecture
IM
d. Service load balancing architecture
17. In redundant storage architecture, there is a ________ which
will direct the request of the cloud consumers to the secondary
device at the time of the failure of the primary device.
M
Activity
8.10 SUMMARY
Cloud computing architecture is the structure of the cloud system.
It is generally composed of the various components and subcom-
ponents that are needed for cloud computing.
In workload distribution architecture, workload distribution can
be carried out in distributed virtual servers, cloud storage devices
and cloud services.
A storage pool consists of file-based or block-based storage struc-
ture. It contains an empty or filled cloud storage device.
A network pool is composed of various network connectivity de-
vices that are already configured.
Dynamic scalability architecture is an architectural model in which
we can allocate resources from the resource pool dynamically. In
this architecture there is an automatic scaling listener.
Elastic resource capacity architecture is an architectural model
which is mainly related dynamic provision of virtual servers. It
n o t e s
uses a system which can allocate and reclaim CPU and RAM when
there is a requirement of resources.
Service load balancing architecture is specialized workload distri-
bution architecture used for scaling the implementation of cloud
service.
Inelastic disk provisioning architecture, the cloud consumers are
charged for the whole disk storage allocation and not for the actual
data storage consumption.
Redundant storage architecture is a unique architectural model
that has a duplicate cloud storage device.
key words
S
of various network connectivity devices that are already config-
ured.
CPU pool: It refers to the resource pool that can be allocated to
IM
virtual servers and can also be broken into individual process-
ing cores.
Dynamic horizontal scaling: It refers to the dynamic scaling in
which the resources are scaled in and out in order to handle the
fluctuating workloads.
M
n o t e s
S
4. b. CPU pool
Dynamic Scalability Architecture 5. True
6. Dynamic horizontal
IM
Elastic Resource Capacity 7. Workflow
Architecture
8. True
Service Load Balancing 9. False
Architecture
10. Load balancing system
M
n o t e s
S
issues, hardware failure, security breaches and for many other
reasons, cloud storage devices fail or disrupt. Refer to Section
8.9 Redundant Storage Architecture.
IM
8.13 SUGGESTED READINGS & REFERENCES
SUGGESTED READINGS
Reese, G. (2009). Cloud Application Architectures: Sebastopol (Cal-
M
E-REFERENCES
Cloud computing architecture. (2017, February 05). Retrieved Feb-
ruary 25, 2017, from https://en.wikipedia.org/wiki/Cloud_comput-
ing_architecture.
Seshachala, S. (2016, October 31). Cloud Computing Architecture:
an overview. Retrieved February 25, 2017, from http://cloudacade-
my.com/blog/cloud-computing-architecture-an-overview/.
How Cloud Computing Works. (2008, April 08). Retrieved February
25, 2017, from http://computer.howstuffworks.com/cloud-comput-
ing/cloud-computing1.htm.
Kenzie, A. (n.d.). Components on Cloud Computing Architecture.
Retrieved February 25, 2017, from http://cloud-computing-wiki.
blogspot.in/2015/06/components-on-cloud-computing.html.
CONTENTS
S
9.1 Introduction
9.2 Basic Terms and Concepts
IM
Self Assessment Questions
Activity
9.3 Threats in Cloud Security
9.3.1 Traffic Eavesdropping
9.3.2 Malicious Intermediary
9.3.3 Denial of Service
M
Activity
9.4 Challenges with Cloud Data
Self Assessment Questions
Activity
9.5 Challenges with Data Security
Self Assessment Questions
Activity
9.6 Data Confidentiality and Encryption
Self Assessment Questions
Activity
9.7 Data Availability
Self Assessment Questions
Activity
9.8 Data Integrity
Self Assessment Questions
Activity
9.9 Cloud Data Management Interface
CONTENTS
S
9.13.1 Security Controls
9.13.2 Security Mechanisms
9.13.3 Security Policies
IM
Self Assessment Questions
Activity
9.14 Summary
9.15 Descriptive Questions
9.16 Answers and Hints
9.17 Suggested Readings & References
M
N
Introductory Caselet
n o t e s
S
by taking necessary security measures. Internet is the backbone
of Dootall as most of the activities of the company are managed
through it. Therefore, ensuring security of the Internet is also im-
IM
portant for Dootall.
and confidential data which is stored in the cloud has always been
a high priority to us.”
Introductory Caselet
n o t e s
S
es and attacks it was facing in managing the client’s data. Soon,
Dootall realised that these appliances were not providing the
types of security that the company is looking for. They failed to
IM
block the Gumblar and Conficker threats effectively because of
limited IPS and anti-virus definition. The search of the compa-
ny again started for new security appliances that can have bet-
ter IPS and antivirus definitions. Moreover, the security solution
should be cost-effective, which means they are capable of offering
more features in the same price. The company then replaced the
Sonicwall devices with Cyberoam 1500i UTM appliances because
M
n o t e s
learning objectives
S
>> Describe cloud storage gateways (CSGs)
>> Explain cloud firewall
>> Elucidate virtual firewall
IM
>> Describe application security in the cloud
9.1 INTRODUCTION
In the previous chapter, you have studied about different types of
architectures of cloud. Security in cloud is of utmost importance ir-
M
There are some steps that should be followed to reduce the security
breaches, which are given as follows:
Authenticate all the users before giving them access to the network
n o t e s
Store all the access permissions so that the user can have access
only to that data and applications for which they have granted ac-
cess permission
Authenticate all software executing on any system and all the mod-
ifications to the software
Formalise the process of requesting permissions to access data or
applications
Create a log of all the unusual activities by monitoring the network
Create a log of user and program activities and analyse any unex-
pected behavior
Encrypt the important data that needs additional protection
Check the modifications in the software exposed to any external
S
users on the Internet regularly
Monitor all IT assets related to cloud regularly
Manage the licenses of the services
IM
Create administration of new resources allocated to customers
Establish a software for tracking the devices on the network
n o t e s
S
Working group on information-sharing, security, and clouds:
Focuses on standards and standards-based architecture to share
the information between clouds. It emphasises on clouds which
IM
belong to various organisations and is subject to various policies.
The group also verifies security in the cloud.
The Cloud Security Alliance (CSA) is formed in late 2008. The CSA
promotes a set of best methodologies for providing security assurance
in cloud computing. Some objectives of CSA are as follows:
M
n o t e s
automated tools and code for hacking a system on the Internet has
also increased the need to secure a system against potential threats.
Some common terminologies related to security of data or computer
are as follows:
Threat: Refers to an action that might cause harm to the security
of networks or information systems. A threat is a potential breach
of security. Malicious hackers and their hacking techniques pose
threat to information system security
Vulnerability: Refers to a weakness or implementation error in
an information system. It can also refer to the insufficient mea-
sures taken to safeguard the information systems against possible
threats. The vulnerabilities can be found in hardware, operating
systems, and applications.
Risk: Refers to the probable chances of loss or harm to informa-
S
tion system or network.
Target of Evaluation (TOE): Represents an IT element, product,
or system that is identified to have a security evaluation or attack.
IM
Attack: Refers to an action that violates the information system
security policies usually resulting from a threat realised.
Exploit: Refers to a way of manipulating the vulnerability or weak-
ness of an IT system to violate its security or integrity.
Confidentiality: Refers to hiding system information or resources
M
n o t e s
S
as a threat. They may exploit the assets of an organisation or use
them against the organisation. The threat agents may perform dif-
ferent actions, which include unuthorised access, misuse, disclo-
IM
sure of sensitive information, unauthorised changes to asset and
denial of access of resources.
Anonymous attacker: Refers to the attackers that have no access
permissions of cloud-based resources. These generally exist as
a software program and can attack virtual servers by using the
public network. They have very little knowledge about the securi-
M
n o t e s
1. Which of the following terms can be used for the technique that
is used for the authorisation of unique human characteristics?
a. Reconnaissance b. Biometric systems
c. Firewall d. Availability
2. _____ refers to a computer expert who uses his/her computer
skills to exploit the security system of a computer for personal
gains and harmful purposes.
Activity
S
than those discussed in the chapter.
IM
9.3 THREATS IN CLOUD SECURITY
A threat is an illegal activity that can cause damages, such as loss of
information and data corruption to the cloud-provider organisation.
Broadly, there are two basic types of threats—accidental threat and
intentional threat. Accidental threat is an activity that occurs acciden-
tally and its occurrence is not dependent on any entity. It can occur
M
9.3.1 TRAFFIC EAVESDROPPING
n o t e s
Traffic
Cloud eavesdropper
consumer
cloud
Service
Copied message
S
In Figure 9.1, you can see that an external malicious service agent
carries out a traffic eavesdropping attack by intercepting data sent
to the cloud service by its consumer. The service agent can create an
IM
unauthorised copy of the data or information before sending it to its
original path towards the cloud service.
9.3.2 MALICIOUS INTERMEDIARY
Malicious
Cloud service
intermediary
consumer
In Figure 9.2, the malicious service agent has intercepted and modified
a message sent to the cloud service by the consumer of a cloud service
being hosted on a virtual server. Because malicious data is embedded
into the message, the virtual server’s security gets compromised.
n o t e s
9.3.3 DENIAL OF SERVICE
The successful DoS attacks may lead to server degradation and/or fail-
S
ure, as shown in Figure 9.3:
Cloud service
IM Consumer A
(attacker)
Overload
A
M
Cloud service
N
Consumer B
In Figure 9.3, you can see that cloud service consumer A is sending
numerous messages to a cloud service which is being hosted on Vir-
tual Server A. This leads to overloading of the capacity of the primary
physical server, which leads to outages with Virtual Servers A and B.
Due to this, authorised cloud service consumers, like cloud service
consumer B, unable to interact with any cloud services present on
Virtual Servers A and B.
9.3.4 INSUFFICIENT AUTHORISATION
n o t e s
Cloud Service
Consumer B
Cloud Service
Consumer A
(attacker)
S
Figure 9.4: Displaying an example of insufficient
authorisation attack
Source: http://fac.ksu.edu.sa/sites/default/files/chapter_6._fundamental_cloud_security.pdf
IM
In Figure 9.4, you can see that cloud service consumer A gets accessi-
bility of the database that was presumed to be only accessed by using
a Web service with a published service contract based on cloud service
consumer B.
9.3.5 VIRTUALISATION ATTACK
M
Trusted cloud
service consumer
(attacker)
n o t e s
S
result of this attack can impact some cloud service consumers or all.
Moreover, the attackers can use the IT resources for harming other
cloud service consumers that are sharing the same trust boundary.
Figure 9.6 shows an example in which two cloud service consumers
IM
share virtual servers hosted by the same physical server and, as a re-
sult, their individual trust boundaries overlap:
Cloud Service
Consumer A
M
(attacker)
N
Cloud Service
Consumer B
n o t e s
Activity
S
The different types of data-related challenges in the cloud and effec-
tive mitigation measures are as follows:
Challenges with data redundancy: The multiple copies of data
IM
must be stored at various locations and replicated in synchro-
nous (for data sets that are geographically closer) or asynchronous
modes (for data sets located across the country or in different con-
tinents). When replicating across data centres, the system must
be aware of the data location, latency, user workload, and activi-
ty such as backup, report generation, application testing, etc. To
M
so that users have ready access to data sets that are geograph-
ically closest.
Data consistency must be maintained implicitly over a wide
distribution of replicated data sources.
Each data set must have internal redundancy, which enables
the system to rebuild the entire data set even if some compo-
nents are temporarily damaged, unavailable, powered off, or
inaccessible due to connectivity problems.
Challenges with disaster recovery: Disaster Recovery (DR) in
cloud computing is one of the most vital selection criteria when
evaluating cloud providers. On the one hand, DR with cloud com-
puting has several benefits, such as cost-effectiveness, ease of
implementation, scalability, and quick provisioning; on the other
hand, there are numerous issues with cloud-based DR, which are
as follows:
Initial data copy for existing data: For large sets (TBs or many
GBs), it is not possible to make the initial data copy over the
n o t e s
S
data, owned DR site is more cost-effective.
Supplier issues: Some cloud providers do not put in the re-
quired effort and time to understand customer-specific needs.
IM
They, therefore, cannot justifiably meet all the DR require-
ments of the customer.
Challenges with data backup: There are several problems related
to backing up of cloud data. The following are some of them:
If you download cloud data to your in-house hard disk or tape,
M
n o t e s
S
a concern because of several reasons. Some of them are as follows:
Heterogeneous hardware and software components
Connectivity
IM
over multi-vendor WAN
Massive user-base sharing the same resource pool
Ease of access for users
Challenges with data fragmentation: With numerous users simul-
taneously working on different datasets in the cloud, the user data
M
fragmentation.
Challenges with data integration: Various factors lead to chal-
lenges in cloud data integration, such as the following:
Content distribution: Contents of a file reside in different data
centers and various storage subsystems in the same data cen-
tre.
Exchange of data: The cloud data interacts with applications
residing on other public or private clouds. This exchange of
data between cloud applications presents the challenge of hav-
ing a compatible data format and application interfaces.
Speed of change: There are innumerable changes in the data
per second and keeping track of the data poses a tough chal-
lenge for its integration.
Distributed control: The control over data is shared between
the cloud provider and the consumer. This increases the inte-
gration challenges.
n o t e s
S
ous sets is a challenge.
Implementation issues: Data transformation can be expen-
sive. To make it affordable and convenient, the transformation
IM
and tracking of various sets must be automated.
Challenges with data migration: After you decide to roll out a
cloud service within your organisation, you need to migrate some
user login, profile details, user data, and corporate information to
the cloud. Cloud providers must have templates and procedures to
conveniently migrate in-house data to public clouds. However, you
M
lesser than the data value or the efforts needed to fix data loss
or integrity problems.
Compliance concerns: The cloud provider must comply with
various regulatory and legal requirements, such as the Feder-
al Information Security Management Act (FISMA), the Health
Insurance Portability and Accountability Act (HIPAA), and the
International Organisation for Standardisation (ISO), mandat-
ed by your business vertical for data protection and privacy.
Connectivity concerns: There can be several faults in the WAN
links between the consumer and the provider. It is supported
by various connectivity providers and is outside the control of
the consumer or the provider.
Despite these challenges, cloud data and traffic are rising rapidly and
are expected to grow at a Compound Annual Growth Rate (CAGR) of
31% between 2011 and 2016.
n o t e s
Activity
S
9.5 CHALLENGES WITH DATA SECURITY
Due to inherent multi-tenancy and ease of access within a cloud, the
IM
data is subjected to various security risks, which continues to be a se-
rious concern. The major problems are as follows:
Snooping: The access of each tenant should be limited to his/her
own data. A tenant in the cloud should not gain access to another
tenant’s data. Any mechanism to connect to another tenant’s data,
such as mounts, shares, and symbolic links, should be limited to
M
ing that no cloud tenant can adopt the identity of another tenant.
Accidental or malicious deletion: No user (except the data owner)
should be able to delete the data belonging to another tenant.
Denial-of-service attacks: Other cloud users should not be able to
launch denial of service attacks on the shared storage volumes of
another customer’s data. Normal or abnormal application errors
of one user should not cause an I/O storm on the shared volume of
another customer’s storage.
Another concern with the data security in cloud is the quality of ser-
vice provided to consumers. Apprehensions about performance, long
response time, and WAN-induced latency inhibit many potential cus-
tomers from readily accepting cloud services. The cloud provider must
be able to ensure that response time and performance do not pose any
impediment to cloud adoption. There are several other challenges in
implementing high levels of service uptime and security, which are as
follows:
n o t e s
S
7. When the cloud tenant assumes the identity of another tenant,
it is known as ________.
8. Data should be invisible to all tenants except the owner. (True/
IM
False)
Activity
Search and find out the information about the concept of data loss
M
prevention (DLP).
n o t e s
There are two common ways to encrypt data. They are as follows:
Asymmetric encryption: In asymmetric encryption, different keys
are used for encrypting and decrypting, such as a public and a pri-
vate key, as shown in Figure 9.7:
Sender Recipient
Internet
$$#@][!_
+<.IBzANB? $$#@][!_
Plain text + *&%@ + +<.IBzANB? = Plain text
document *&%@ document
Encrypted
message
Public key Public key
Sender uses Recipient uses its own
recipient’s public private key to
S
key to encrypt message decrypt message
The public key can be freely available to others within and outside
the cloud. It is used by anyone who wants to encrypt documents be-
fore transmitting the encrypted documents to the user. The user must
keep the private key a secret and use it to decrypt the encrypted doc-
uments. However, a limitation of the asymmetric encryption is that it
M
is slow and takes too much computing resources. It is, therefore, not
commonly used within a cloud, wherein users pay for data processing
and bandwidth.
Symmetric encryption: This is an old and tested technique,
N
which can be used for at-rest and in-transit cloud data. It uses a
shared secret key to encrypt as well as decrypt data, as shown in
Figure 9.8:
Sender Recipient
Internet
$$#@][!_
Plain text +<.IBzAN Plain text
B?*&%@[]
document document
Encrypted
Sender uses Message Recipient uses
shared secret shared secret
key to key to
encrypt message decrypt message
n o t e s
Exhibit
S
digital signatures.
DES/3DES: The Data Encryption Standard (DES) was devel-
oped by the US government in 1977. The new version 3DES
IM encrypts the data three times, using a different, unique key at
least in one of the three passes.
IDEA: International Data Encryption Algorithm (IDEA) was
developed in the early 1990s by Dr. X. Lai and Prof. J. Massey in
Switzerland, initially to replace the DES algorithm. It uses the
same secret key for encryption and decryption. It uses a 128-bit
M
key. It is fast and can be used for cloud data. It operates on 64-bit
blocks at a time.
Blowfish: Blowfish is another symmetric block-cipher algo-
rithm (like DES and IDEA) developed by Bruce Schneier in
N
n o t e s
Activity
S
9.7 DATA AVAILABILITY
After security and quality of service, another big concern is data avail-
IM
ability. After a customer starts using cloud services and data, there are
chances of unexpected downtime. There have been several outages at
cloud providers despite their redundancy and replication.
The most important lesson learnt from the history of outages at the
world’s leading data centres is that there is no single-server data cen-
tre or Business Continuity Planning (BCP) process that guarantees a
M
If the user keeps the data confidential and secure, it must also remain
N
available to them whenever they need it. The SLAs with your cloud-
provider must have data uptime agreements. Data or service avail-
ability can be specified as a percentage of uptime in a given year or
month.
Table 9.1 shows the downtime that is allowed for any given percentage
of availability:
n o t e s
The SLA with the cloud service provider must refer to monthly al-
lowed downtime. If the downtime is more on a monthly or annual ba-
sis, the SLA must specify how much of the extra downtime is convert-
ed to service credits and how it is converted.
If the data in the cloud is not accessible, the services are down. Down-
time leads to soft and hard costs, which are explained as follows:
Soft cost: Loss in customer confidence and employee morale.
S
Hard cost: Loss due to employee productivity and customer reve-
nue during the outage window.
Table 9.2 shows an estimate of a hard loss of US$ 30,646 due to service
IM
outage for a cloud-based mid-sized organisation with an annual on-
line revenue of US$ 100 million and employee salary of US$ 50 million:
When financial losses due to service outage are high, the user must
have an SLA of a few minutes of downtime per year. This requires
that the SLAs have 4-5-nines of availability. Figure 9.9 shows common
reasons for service outages:
n o t e s
Client
software Server
Network 5% software
software 5% 30%
Hardware
10%
5% Environment
15%
People 30%
Planned
downtime
S
Cloud service providers must make sure that the data is accessible
at all times. Besides uptime, you need to consider if the cloud service
provider will remain in business in future. What is their business via-
IM
bility? Given the competition and low margins, many cloud-providers
have gone out of business. Many service providers may or may not
send a notice to clients to retrieve and save their data before shutting
down the services.
Activity
n o t e s
For securing the cloud data, the user needs to ask the provider the
following questions:
Are there known loopholes to comprise data integrity?
What processes does the provider follow to assure data integrity?
How does the provider report the success or failure of data integ-
rity?
What is the maximum loss that can occur to a user if the data in the
cloud lacks integrity?
To detect if the data has been modified or tampered with, users need
to have data origin authentication. According to this method, the data
bits are replaced during transit within the cloud. In such a case, the
receiver decrypts the message, but the data is different from the orig-
inal data. Without data origin authentication, the recipient does not
S
become aware that the received data is different. That is why, regular
backups are important to reactively replace tampered data. There are
many proactive measures that the cloud provider can take to ensure
IM
data integrity, such as the following:
They must control the access to data using mechanisms, such as
Role-Based Access Control (RBAC).
They must design and implement user interfaces that prevent in-
put of invalid data.
M
12. The cloud provider can provide the access to data using
mechanisms such as _______-based access control.
Activity
Find out the role of Third Party Auditor (TPA) that carries out all
auditing processes in cloud-computing.
n o t e s
S
around the globe.
Figure 9.10 shows the basic data flow between clients and cloud stor-
age with the implementation of SNIA’s CDMI standards:
IM
CDMI Client issues requests
storage
with CDMI
implementation
CDMI Implementation issue responses
HTTP STTAUS
(200 OK, 201 Created, etc.)
N
Activity
n o t e s
ing, compressing, and archiving data sets before moving the data to
a cloud.
Cloud storage
provider A
Read-ahead
CSG VPN to
data and
Vendor public cloud
metadata
Initial
configuration
credentials
Deduplicated
Call-home compressed,
S
Billing encrypted,
incremental updates Cloud storage
CSG with provider A
cache Corporate
IM
office
Cloud users
A CSG at the corporate office intercepts and manages all the I/O be-
M
tween the users and the cloud storage providers. A CSG could also be
a downloadable software program that can be installed on a server
at the customer location. CSGs have a local cache to store data tem-
porarily. Users can download the CSG software and configure a local
storage device as the cache. CSGs eliminate the issue of vendor lock-
N
in, because they support various formats and facilitate data backup.
n o t e s
S
pull the entire file. After the entire file is retrieved, it is stored in
the cache and the user has the advantage of wire-speed I/O rates.
Intelligent pre-fetching algorithms: CSG must monitor read pat-
IM
terns and intelligently pre-fetch data from the cloud to the cache
before the user requests the data. It must use the read history to
establish a pattern to predict what the user may request next and
proactively fetch the data into the cache. CSG must measure its
success rate and regulate its algorithm in real-time to improve
cache hit rates.
M
Original
data
Chunked Deduplicated Compressed Encrypteded
data
n o t e s
S
tunnel to the cloud. At the other end of the VPN tunnel, the cloud
provider’s employees cannot decipher the data, because it is en-
crypted.
IM
Data compression: It helps reduce bandwidth and storage space
utilisation.
CSG tuning parameters: The CSG must allow its administrator to
tune certain parameters such as maximum bandwidth utilisation
during certain time periods and cache push intervals. For example,
if the cloud bandwidth utilisation is high from 10 a.m. to 12 a.m.,
M
Activity
Research and enlist the benefits of using the CTERA cloud storage
gateways.
n o t e s
S
Activity
Enlist the points that help you to replace your traditional firewall
IM
with a cloud firewall.
In the bridge mode, the firewall acts like a physical firewall that works
with a physical or virtual switch to intercept network traffic destined
for other network segments.
Activity
n o t e s
S
fer a set of APIs for customers. These tools help them integrate
cloud applications to their internal services and processes. For ex-
ample, they can be used to configure login for all cloud activities
IM
and extend and use their internal identity user authentication pro-
cesses for cloud applications. The security mechanism for cloud
applications must be flexible and easy to manage. It should be eas-
ily scalable to accommodate more applications and users.
A Web Application Firewall (WAF) is typically used to protect and
secure Web applications. A WAF is a hardware appliance or a soft-
M
ware program that applies a set of rules to data transfer for Web
applications. It protects against common attacks, such as Cross-
Site Scripting (XSS) and Structured Query Language (SQL) injec-
tion. The rules can be customised to protect against more threats.
It should not be limited by hardware boundaries but readily scale
N
n o t e s
S
as follows:
Deterrent controls: Refer to controls that are used for reducing
the attacks on cloud system. These controls acts a warning sign,
IM
which means they reduce the level of threat by providing warning
to the potential attackers that they may face adverse consequences
if they continue to proceed.
Preventive controls: Refer to controls which are used to enhance
the strength of the cloud system against incidents not by com-
pletely eliminating the vulnerabilities but by reducing them. Im-
M
n o t e s
S
signed to a message which is being transmitted and considered in-
valid if the message is modified or altered during the transmission.
Public Key Infrastructure (PKI): Refers to a mechanism which
IM
exists as a set of rules, protocols, data formats and practices en-
abling the large-scale systems to use the public key cryptography
securely. This mechanism relies mainly on using the digital certif-
icates that can be defined as the digitally signed data structures
used for binding the public keys with identities of certificate own-
er and associated information like validity periods.
M
n o t e s
S
self assessment Questions
IM
17. ________ controls are used for reducing the impact of an
incident, generally by controlling the damage.
Activity
in an IaaS environment.
9.14 SUMMARY
N
n o t e s
key words
S
9.15 DESCRIPTIVE QUESTIONS
IM
1. What do you understand by a threat? Discuss different types of
threats that exist in cloud.
2. List and explain different types of challenges related to cloud
data.
3. Describe the challenges related with data security in cloud.
4. Explain the concept of data confidentiality and encryption in
M
n o t e s
S
organisation. Refer to Section 9.3 Threats in Cloud Security.
2. The different types of data-related challenges are Data
Redundancy, Disaster Recovery, etc. Refer to Section
IM
9.4 Challenges with Cloud Data.
3. Due to inherent multi-tenancy and ease of access within a cloud,
the data is subjected to various security risks, which continues to
be a serious concern. Refer to Section 9.5 Challenges with Data
Security.
M
SUGGESTED READING
Deka, G. C., & Bakshi, S. (2015). Handbook of research on securing
cloud-based databases with biometric applications. Hershey, PA:
Information, Science, Reference.
n o t e s
E-REFERENCES
Velazquez, M. (n.d.). Securing the Cloud. Retrieved March 27, 2017,
from https://f5.com/resources/white-papers/securing-the-cloud
How to Secure Cloud Computing – Information Security Maga-
zine. (n.d.). Retrieved March 27, 2017, from http://searchsecurity.
techtarget.com/magazineContent/How-to-Secure-Cloud-Comput-
ing
Henry, A. (2014, September 10). The Start-to-Finish Guide to Se-
curing Your Cloud Storage. Retrieved March 27, 2017, from http://
lifehacker.com/the-start-to-finish-guide-to-securing-your-cloud-
S
IMstorag-1632901910
M
N
MOBILE CLOUD-COMPUTING
CONTENTS
S
10.1 Introduction
10.2 Definition of Mobile Cloud Computing
IM
Self Assessment Questions
Activity
10.3 Architecture of Mobile Cloud Computing
Self Assessment Questions
Activity
10.4 Benefits of Mobile Cloud Computing
M
Activity
10.5 Mobile Cloud Computing Challenges
10.5.1 Challenges at Cloud End
Self Assessment Questions
Activity
10.6 Computing in Mobile and at Cloud Shield
Self Assessment Questions
Activity
10.7 Summary
10.8 Descriptive Questions
10.9 Answers and Hints
10.10 Suggested Readings & References
Introductory Caselet
n o t e s
The company used to provide the data card to its insurance agents
to access Internet for the business purposes. The data card usage
for accessing Internet was quite high and, therefore, the compa-
S
ny had to pay huge bills of Internet of their agents. Because of
this, the company felt the need of monitoring the Internet usage of
their agents. Although the data card provider company had pro-
IM
vided Unified Threat Management (UTM) box for filtering and
monitoring the data accessed by the agents, but it was working
as per the expectation of the company. In fact, the company also
wanted to monitor how much time their agent spends on the In-
ternet for official work and their personal work.
Apart from that, the company was also concerned about the secu-
M
contents which are prohibited under the Indian Law. For this pur-
pose, the company had blocked a few sites over its LAN, but there
was no way to control agents accessing Internet using the data
card. In other words, it was very difficult for the management to
monitor and control the usage patterns of the data card. Finally,
the company decided to outsource the monitoring, security and
usage of the Internet to the leading IT security service provider
called Netmagic.
Introductory Caselet
n o t e s
S
IM
M
N
n o t e s
learning objectives
10.1 INTRODUCTION
Mobile devices, such as cell phones, tablets, and laptops have become
an integral part of human life over the years. These devices offer
S
various advantages and are proving to be an excellent platform for
communication, learning, and research. They also erase the barriers
of time and distance by allowing people to connect with one another
IM
anytime and anywhere, effortlessly.
n o t e s
In this chapter, you will study about mobile cloud computing. You will
also learn about the architecture of mobile cloud computing. In addi-
tion, you will also study about the benefits of mobile cloud computing.
You will also study about the challenges of mobile cloud computing.
Towards the end of the chapter, you will study about computing in
mobile and at cloud shield.
S
With the development of cloud computing, the use of the technology
in MCC was inevitable. MCC has attracted the attention of entrepre-
IM
neurs, mobile users, and researchers alike. While business organisa-
tions find MCC profitable since it cuts down the cost of developing
and running mobile applications, mobile users find MCC attractive as
it provides them an economical way of accessing various mobile ser-
vices. For researchers, MCC is a source through which powerful and
promising green IT solutions can be obtained.
M
MCC has found different applications across diverse fields. This has
led to MCC being defined in different ways by different people and
organisations.
N
n o t e s
Servers and
VMs
Internet (Cloud)
Mobile
devices
S
As you can see in Figure 10.1, Virtual Machines (VMs) are provided on
the cloud and they can be accessed by mobile devices through wire-
less access points.
IM
MCC, in general terms, can be treated as a new paradigm for mobile
application users. They can now access the powerful cloud platform,
which makes use of centralised remote servers and other physical re-
sources. Once in the cloud, mobile users can use their devices to ac-
cess applications developed and deployed at a centralised location, by
using Web browsers or through a native thin client connected in the
M
wireless mode.
MCC combines the two most powerful technologies, mobile Web com-
puting and cloud-computing services. MCC is a technology that pro-
vides access to the best resources and applications by using mobile
N
Activity
Explore the Internet and find out how cloud computing can be used
to access the applications and services available on the Internet.
n o t e s
Mobile network A
Mobile Network
Service Data centre owners or
Satellite cloud service providers
Database
HA
S
Access Servers
Point AAA
Central
Processors Cloud Computing
BTS
Mobile
devices
IM
Internet
Cloud Cloud
controller controller
Mobile network B Data centre
Data centre
Mobile Network Cloud A Cloud B
Service
Satellite
Database
HA
Access
M
Servers
Point AAA
Central
Processors
BTS
Mobile Application
devices servers
Internet service
N
As you can see in Figure 10.2, base stations connect mobile devices to
network services used by mobile devices. These base stations can be
Base Transceiver Stations (BTs), access points, or satellites. They are
used for establishing and controlling the connectivity and functional
interfaces required for communicating between the mobile devices
and the networking services.
A cloud receives the requests from subscribers over the Internet. The
requests made by mobile users are processed by the cloud controllers
n o t e s
who then provide them the requested cloud services. Utility comput-
ing, virtualisation, and service-oriented architecture form the basis
for the development of cloud services.
S
ure 10.3:
IM
SaaS : Software as a Service
Data Centres
N
n o t e s
IaaS: Refers to the layer on top of the data centre layer. This layer
facilitates the clients to store servers and hardware components.
You need to pay for only the services you use. Also, you can expand
or shrink the infrastructure dynamically. This is particularly use-
ful when your requirements change with time. Amazon’s Simple
Storage Service (S3) and Economic Compute Cloud (EC2) are two
examples of IaaS.
PaaS: Refers to an advanced environment that enables you to
build, test, and deploy custom applications. This environment
provides integration facilities, especially during the development
stage. Some examples of PaaS include Azure from Microsoft, Goo-
gle Apps Engine from Google, and MapReduce/S3 from Amazon.
SaaS: Refers to the layer that supports the software applications
that have specific requirements of their own. Users use the Inter-
S
net to access applications available on this layer from remote lo-
cations. Similar to IaaS, the users need to pay according to their
usage. Examples of SaaS include Microsoft’s Live Mesh and Sales-
force.
IM
The division of cloud computing into the four layers as discussed
above is only a simple abstraction of the vast cloud-computing con-
cept. Therefore, it does not mean that the top layer has to be built
directly on the layer beneath it. For example, you can deploy your
SaaS applications on IaaS straightaway without PaaS coming into the
M
Activity
Explore the Internet and find out which architecture is used for
market-oriented cloud creation or for the services delivered through
the Web for organisations.
n o t e s
One of the biggest concerns about mobile computing is the battery life
of mobile devices. Cloud services are used with the mobile environ-
S
ment in order to reduce power consumption significantly. The cloud
helps in this aspect by providing intelligently developed solutions to
enhance the performance of the Central Processing Unit (CPU), man-
age disk storage, and adjust the size of the screen. These solutions,
IM
however, require some changes to be made in the structure of mobile
devices or inclusion of new hardware components into the devices.
This may incur some cost and may also not be feasible for all devices.
One way of reducing power consumption is through the use of the
computation offloading technique. In this technique, the computa-
tional tasks are migrated from devices with limitation of resources to
M
n o t e s
S
MCC allows vast amounts of data from mobile devices to be stored on
the cloud. In addition, you can run various applications on the cloud.
This invariably helps in improving the reliability of the mobile devic-
IM
es. For example, to avoid any chances of data or application loss, nu-
merous distributed computers are used for backing up the data.
Apart from reliability, the MCC model provides data security to ser-
vice providers and users. An example of data security on the cloud is
the protection of digital content with a copyright against unauthorised
M
The following are some additional advantages of MCC for mobile ser-
vices:
a. Dynamic provisioning: Resources are provided dynamically,
whenever required. Therefore, service providers and users do
not need to book them beforehand.
b. Scalability: The flexible provision of resources helps developers
to deploy and scale mobile applications for meeting the
unpredictable demands of the users. Service providers have
the facility to add and expand applications and services easily
without resource-usage constraints.
c. Multi-tenancy: Sharing of cost among multiple service providers
helps to provide various applications to a large number of users.
d. Ease of integration: MCC permits easy integration of multiple
services from different cloud service providers through the cloud
and the Internet services. In this way, MCC is able to meet the
demands of the mobile and cloud users.
n o t e s
Activity
Explore the Internet and find out the various options to share pho-
tos instantly through the cloud.
S
10.5
CHALLENGES
As stated earlier, mobile cloud computing is the integration of the mo-
IM
bile computing environment with cloud computing services. As such,
there are challenges at both the mobile end and the cloud end.
The challenges associated with MCC at the mobile end are as follows:
M
n o t e s
S
Heterogeneity of platforms, devices, and service providers: An-
other issue at the mobile end of MCC is heterogeneity. There are
so many platforms, types of mobile devices, and service providers
IM
that are offering wireless networking services. Therefore, han-
dling the issue of heterogeneity is very crucial and extremely chal-
lenging in MCC.
Synchronous
communication
Context Context
customer provider
Synchronous and
asynchronous Synchronous
communication communication
n o t e s
As shown in Figure 10.4, there are three main components of the CMA
architecture: context provider, context broker, and context consumer.
This architecture needs a context quality enabler so that the opera-
tions of other components can be facilitated.
After receiving the request for the context from a user, the context
quality enabler filters out the URIs of the context providers that do
not suit the required level of quality. Therefore, the CMA architecture
provides control over the quality of the context on the basis of the re-
S
quirements of a user.
n o t e s
Application
binary
Application Binary
binary rewriter
S
Profile Network
analysis data
IM
Binary Best
rewriter distribution
Distributed
application
M
n o t e s
S
the entire application needs to be available on both the mobile
side and the cloud side. During execution of the application, the
servicer decides which part of the code (after it is divided) is to
be executed on the client side and which on the cloud side. The
IM
next step involves selecting a partitioning choice that suitably
fits the situation and minimises the consumption of energy. In
the last step, the modules involving sensitive data are executed
locally, so that security issues can be sorted out. Considering
both the security and partitioning issues, this technique proves
fruitful in various cases, but the lack of accuracy makes it less
M
preferable.
Other efficient models have also been proposed to overcome
the concerns related to dynamic offloading, but this issue still
remains a challenge for MCC.
N
n o t e s
S
also improve. This is a big challenge for service providers.
Apart from the specific issues at the mobile end and cloud end, there
are several open issues also. Some of the open issues are listed as fol-
IM
lows:
1. Issue of seamless integration of the mobile and cloud computing
technologies
2. Issue of low bandwidth, which involves user mobility and the
increasing demands of mobile users.
M
Activity
Explore the Internet and find out how the issue of handover in
MCC can be solved.
n o t e s
A layer of private routing table is provided by cloud shield that can ob-
scure traffic on the Internet. Cloud shield allows only that traffic that
is approved to pass through the accurate service port on the public
interface. With the help of platform-as-a-service, cloud shield offers
the benefits of a private network in cloud computing.
S
Multi-tier Web services: There are many persons who need to
keep sensitive data in their mobile. Cloud shield provides packet
filtering in which the access of private systems is totally prevented.
IM
Datacentre to Web connection: Cloud shield uses both private
and public subnets. Thus, it can route the traffic to the systems in
remote locations through VPN. It can offer a secure pipe for using
data in large transactional processing system.
Content repositories: Sometimes customer wants to connect the
website to the central content repository or backend data store.
M
In such cases, cloud shield can provide security and network level
isolation.
Activity
Explore the Internet and find out how sensitive data in mobile can
be protected with the help of cloud shield.
10.7 SUMMARY
Mobile computing refers to the use of small-sized handheld mo-
bile devices for running or accessing standalone or remote appli-
cations through a wireless network.
MCC, in general terms, can be treated as a new paradigm for mo-
bile application users. They can now access the powerful cloud
platform, which makes use of centralised remote servers and other
physical resources.
n o t e s
S
and offloading the computation. The computational task is migrat-
ed from resource-limited devices to resource-rich systems through
the offloading.
IM
Mobile users face challenges involving application security and
privacy of their data. Running antivirus applications can help
them avoid their applications from getting corrupt, but the lim-
itations of capacity and processing power of a system are serious
issues resulting in security threats.
The location-based services running through the Global Position-
M
ing System (GPS) pose a security threat. This issue can be ad-
dressed by the application called Location Trusted Service (LTS),
which does not involve private information about the users.
Cloud shield offers a remote private network in mobile comput-
N
key words
n o t e s
S
Topic Q. No. Answers
Definition of Mobile Cloud 1. True
IM
Computing
2. Mobile Cloud Computing (MCC)
Architecture of Mobile Cloud 3. a. Data Centre
Computing
4. Authentication, Authorisation,
M
n o t e s
S
5. Some of these issues at the cloud end are as follows:
Computing offload: The technique of offloading computa-
IM
tional tasks from mobile devices to efficient remote servers
saves computational effort and energy of mobile devices.
Refer to Section 10.5 Mobile Cloud Computing Challenges.
SUGGESTED READINGS
Khanna, A. (2016). Mobile cloud computing. Place of publication
not identified: I K International Publisher.
N
E-REFERENCES
Mobile Cloud Computing - Washington University in St.
Louis. (n.d.). Retrieved March 20, 2017, from http://www.
bing.com/cr?IG=35D64B9475D74821854F7F58ECEEEB -
1C&CID=06747FEA6BC760453C3675A16AF661FB&rd=1&h
=90rz-w6lEddH1Dz5QWJHcVLXwLQ1xmLDRUWgN9-rYL-
w & v = 1 & r = h t t p % 3 a % 2 f % 2 f w w w. c s e . w u s t l . e d u % 2 f % 7 e -
jain%2fcse574-10%2fftp%2fcloud%2findex.html&p=DevEx,5064.1
What is mobile cloud computing architecture? (2014, November
24). Retrieved March 20, 2017, from http://www.rmdstudio.com/
mobile-cloud-computing-architecture/
n o t e s
S
IM
M
N
CASE STUDIES
S
CONTENTS
Case Study 1 Metro Bank Reduced its Production Time by using Rackspace-
Managed Cloud
IM
Case Study 2 SaaS Provider: Citrix Online
Case Study 3 Private Cloud for Central and State Governments
Case Study 4 Microsoft Azure Helps Shephertz Technology to Provide Back-End
Solutions for Apps
Case Study 5 Hr Information Systems in the Cloud
Case Study 6 Taiwan Taxi Ensures Smooth Operation by Introducing Cloud
M
Case study 1
n o t e s
This Case Study explains how Metro Bank has reduced its produc-
tion time by using the cloud services provided by Rackspace. It is
with respect to Chapter 1 of the book.
S
IM
Metro Bank, established in 2010, operates in the field of retail
banking in United Kingdom (UK). The bank is associated with
London Stock Exchange and FTSE 250 index. It has approxi-
mately 48 stores till the end of 2016 and provides services to both
individual and business customers. The bank is authorised by
M
Case study 1
n o t e s
vices, scalability and flexibility to the bank. So, the bank decid-
ed to move to Rackspace which now hosts around 70 percent of
applications of Metro bank. Young said, “We also recognised that
there was quite significant benefit in new hardware. We were look-
ing for a partner – a hosting partner is such a critical component
of an IT operation, particularly one like ours, where we tend to use
partners more than some other institutions.”
S
are happier than before with kind of support given by the Rack-
space. Rackspace also helped the bank in making changes in their
firewall by providing necessary services for it in order to improve
IM
the security.”
questions
Case study 2
n o t e s
This Case Study discusses how a SaaS provider overcame the chal-
lenges of an organisation. It is with respect to Chapter 2 of the book.
S
port:
Round-the-clock accessibility of technical specialist for solv-
ing computing problems
IM
Basic telephone support
In-store Tech Clinics
Home assistance
The customer only had to pay £89.99 a year to get the assistance
from DSG international related to their computing problems.
M
Case study 2
n o t e s
The technical staff can determine and rectify the problems se-
curely from a remote location.
The GoToAssist service has reporting tools which displays re-
port of customer satisfaction instantly which enables DSGi
to get the accurate idea of its successes and highlight those
areas which requires a lot of improvement. This also helped
managers of DSGi to take prompt action on the services pro-
viding to customers and check whether the quality goals get-
ting achieved or not on the basis of the valuable feedback of
customers.
GoToAssist is a hosted service, therefore, it provides flexibility
to scale up and down as per the need and demand of custom-
ers.
S
Assisting customers was a high priority at DSGi that was achieved
with the help of GoToAssist. This software-based service placed
TechFriend as a premium service and helped in ensuring its prop-
IM
er growth.
questions
Case study 3
n o t e s
S
IM
The central government of India has several thousands of serv-
ers for various ministries such as power, defense, and telecom.
It has become a nightmare to maintain and upgrade each IT and
DC infrastructure for each application. While some environments
may be low on resources and must be upgraded, others may have
M
Case study 3
n o t e s
Central Government
Private Cloud
S
IM
State A Private Cloud State B Private Cloud
The local government of each state will use the services of a state
private cloud or use the available infrastructure to host its own
applications. Each state’s private cloud will have a VPN to the
M
central cloud. Single Sign-On (SSO) will enable some users at the
state level to automatically access and use the applications on the
central government cloud. This will help to lower Total Cost of
Ownership (TCO), save energy, and secure communication be-
tween the state and the central government.
N
questions
Case study 4
n o t e s
Company Background
S
Web, social, SaaS, TV or gaming app developers to fulfil their
cloud service requirements related to their apps development. An
additional advantage of ShepHertz’s solution is that they are as-
IM
sociated with the Microsoft India datacentre.
Company Challenge
on the User Interface (UI) at the front end, and the entire app
can be developed within 3 months approximately. This is one of
the essential requirements also to stay competitive in a market
of having around 2 million apps. Chandurkar says, “Our products
help developers go to market faster. Apps today are developed for the
omni-channel environment, whether it is for mobile, Facebook, etc.
There is a need for a platform that can support all channels.”
In these days, only a few apps retain their customers and are suc-
cessful in the market for a long time. Apps generally generate a
huge amount of data, which should be managed properly. For in-
stance, if an app has 2 million users all over the world, it might
generate a billion data points showing different user behaviours.
ShepHertz’s providing solutions like App42 can manage such type
Case study 4
n o t e s
Solution
S
rected to msn.com/en-in. This means there is a replication and we
are routed to the closest server available due to latency. If the server
is not in India, the latency increases. If an app has maximum cus-
tomers in India, getting the data from an offshore server will not
IM
make sense for business.”
Case study 4
n o t e s
questions
S
(Hints: Unparalleled support, responsiveness, and busi-
ness growth)
IM
M
N
Case study 5
n o t e s
This Case Study discusses about the need of a customer who wants
to put all the HR information in the cloud and know how it is done.
This case study is related to Chapter 5.
S
large upfront expenses.
Identity management-as-a-
service provider
Public Cloud
Remote users
HR app HR app HR app HR app
VPN to public cloud VM1 OS VM1 OS VM1 OS VM1 OS
Corporate
network
Case study 5
n o t e s
S
it to several cloud service providers. Compare the technical
strengths, offerings, and prices of the providers.
Research the cloud market and compare the available options.
IMContact customer references as part of the research.
Devise a cost-effective, non-disruptive, phased project plan to
migrate applications to the cloud.
Negotiate and execute a primary contract, an SLA, and a
maintenance contract.
M
questions
Case study 6
n o t e s
This Case Study discusses how Taiwan Taxi was able to ensure
smooth operation and brought efficiency in the IT framework by in-
troducing the concept of cloud computing and virtualization. It is
with respect to Chapter 6 of the book.
S
services to meet its daily needs.
out new IT services, but the hardware was not capable enough to
support these IT services. Moreover, due to the limited manpow-
er, overcoming of these challenges was a big concern for Taiwan
Taxi. Due to the expansion of IT framework, Taiwan Taxi started
searching for new solutions which can overcome their challenges.
Since the company has been able to roll out new IT services, but
the hardware was not capable enough to support these IT ser-
vices.
Case study 6
n o t e s
S
grated all its systems onto the cloud platform. It has also start-
ed migration of its customer service systems, driver membership
management systems and the information systems to cloud plat-
IM
form. Moreover, it also helped Taiwan taxi to share its resources
on cloud. Customers of Taiwan taxi can now access any relevant
service from their mobile phones. Cloud computing and virtual-
ization have enabled Taiwan Taxi to get closer to their customers
and offer a high level of service to them.
cessors for our cloud system. These features are essential in order to
provide the best services for our drivers and passengers.”
questions
Case study 7
n o t e s
S
Delbart was established in the year 2014 with the aim of creating
rich and intriguing online content. The revenue will be obtained
through online advertising in the process of providing the online
IM
content. To fulfill the aim of providing content, Delbart chose the
WordPress content management system which was already man-
aging hundreds of websites. Initially, Delbart’s site was deployed
on a shared hosting environment. When the number of visitors
kept on increasing, the site failed to handle the load and provide
quick response to visitors of sites. In other words, the site faced
M
load on the server at peak time was also a big issue. The verti-
cal scaling cannot be implemented here as the maximum size of
the server is already allocated to Delbart. Therefore, a permanent
and scalable solution is required to handle the issues faced by
Delbart. Delbart was looking for a provider which is proficient
in providing auto-scaling facility and has deep understanding of
WordPress deployment to get rid of the performance issues.
Case study 7
n o t e s
S
Provided environment is highly dynamic and easier in scaling
as per any metric
Cache-friendly system by removing the performance offend-
IM
ers
Increased Page view performance
Reducing the time to get the HTML page from the server by
a factor of 10
New system can be scaled out to meet performance demands
M
in a few minutes
Downtime and performance falls got reduced greatly due to
auto-scaling
Predictive auto-scaling makes sure that adequate server ca-
N
questions
Case study 8
n o t e s
S
tecture that allows dynamic modification of resources.
The cloud environment provides three kinds of services: Infra-
structure as a Service (IaaS), Platform as a Service (PaaS), and
IM
Software as a Service (SaaS). A client needs to use a Web brows-
er or a mobile app to use these cloud services. Some examples
of software services provided by the cloud are CRM, Email, Vir-
tual Desktop, Communication and Games. An infrastructure of
a cloud includes virtual machines, servers, storage, load balanc-
ers, network, etc.
M
Storage External
network network
Storage VM
NIC NIC
iSCSI
Host
filer
SMAPI
Admin Admin
network XAPI
NIC
Control Virtual Virtual
domain machine machine
XenCenter Xen
Case study 8
n o t e s
Management Kit
Application
Management Administration
Software Development Kit Studio Portal
Design SLa-Negotiation Management
APIs
Explorer Web Services Web Services
Container
Programming Models
Task Thread Map Reduce Other
Model Model Model Model
Persistence
Securitty
Foundation Services
Membership Reservation Storage License Accounting
Services Services Services Services Services
Fabric Services
Dynamic Resource Provisioning Services
S
Hardware Profile Services
Infrastructure
.NET @ Windows Mono @ Linux
Physical Machines/ Virtual Machines
IM Amazon
Private Cloud Microsoft Google
IBM
Source: https://image.slidesharecdn.com/5-virtualmachinesprovisioningandmigration-
services-131130041332-phpapp02/95/cloud-computing-principles-and-paradigms-5-virtu-
M
al-machines-provisioning-and-migration-services-25-638.jpg?cb=1385784873
questions
1. What is Aneka?
(Hint: Aneka is a platform and a framework that is used to
develop distributed applications using cloud computing.)
2. How can green computing be achieved in Aneka?
(Hint: By implementing the concept of master and slaves
nodes.)
Case study 9
n o t e s
S
Security of data of its customers has always been considered as
a significant element in the service offerings by SCHMIEDER
IT-solutions.
IM
For security of their Web and e-mail services, the SCHMIEDER
IT-solutions depended upon the antivirus and anti-malware pro-
vided by the Trend Micro, which is a well-known security solution
provider.
Case study 9
n o t e s
S
new cloud service BaWü-Cloud. Being a “vCloud Powered” cer-
tified service provider, it can now offer an extension of data cen-
tre, communication and cooperation, backup and recovery of
IM
data, and security on subscription basis. Some more benefits for
SCHMIEDER IT-solutions are as follows:
Simplified security within virtualised environments
More efficient utilisation of server resources
Flexibility of integrating security into cloud services
M
“With its centralised approach, Deep Security is the only way for
us to offer our customers a truly secure environment that performs
well,” said Mr. Schmieder.
questions
Case study 10
n o t e s
This case study discusses how Fujitsu’s IaaS cloud computing plat-
form helped in overcoming the challenges of Heilongjiang Mobile. It
is related to chapter 10 of the book.
S
a huge wastage of resources. The existing IT resources consisted
of complex hardware and software models. It was getting difficult
for the company to manage its IT resources due to rapid increase
in the amount of users. Apart from that, it also needs a huge space
IM
for setting up a data centre. Thus, the company needed a new IT
support that can enhance its IT management, reduce the mainte-
nance cost, save energy and emit less carbon.
computing platform.
Case study 10
n o t e s
questions
S
saving, etc.)
IM
M
N
Case study 11
n o t e s
This case study discusses how 91 App ensured a stable online pay-
ment service through AWS cloud computing architecture. It is with
respect to Chapter 4 of the book.
Problem
S
91 App wanted to conceptualise, plan and develop the ecom-
merce app in the cloud. For this, it needed a partner who can help
it to develop the app in the cloud. The chief product officer of
91 App said, “We felt applications provided a better user experience
IM
in the early days of the mobile internet, and drove higher customer
engagement and higher customer conversion rates. However, to re-
alise these benefits, we needed an infrastructure that could deliv-
er sustained, secure availability, and maintain performance at all
times regardless of how many users were browsing or checking out
from e-commerce services.” 91 App also required a cost-effective
M
infrastructure that will minimise the load and make the business
viable, flexible and easy to maintain.
Solution
N
Case study 11
n o t e s
S
questions
form through which you can save the stealing of the sensi-
tive information of your company.)
2. What are the various ways to offer a stable online pay-
ment service to customers? Support your answer with
N
valid reasons.
(Hint: Cloud computing architecture can be used to offer
a stable online payment service to your customers.)
Case study 12
n o t e s
S
Mobius Knowledge Service provides end-to-end data services to
many leading companies. Thus, automation plays a very import-
ant role in its business. Managing and maintaining the complex
IM
data is very crucial for the enterprise.
Mobius created a data acquisition product to make the processes
of data collection and presentation automated. The product ac-
quires data from public Internet data sources and puts the ac-
quired data into datasets for clients for analysing process.
M
Case study 12
n o t e s
Mobius selected Microsoft Azure because it was suiting all its re-
quirements including cost benefits. In comparison to Microsoft
Azure, other services providers were not only costly but lacked
integration ability with their current platform.
S
“Microsoft Azure made it easy to integrate with any platform. Earli-
er, it took two months to do this. Now, Microsoft Azure takes just one
week, giving us more time to enhance our core services,” according
IM
to Karthik Karunakaran.
questions