CC Chapter-1 Material
CC Chapter-1 Material
1.1 INTRODUCTION
Cloud computing is a technology which utilizes the Internet and central isolated
servers in order to sustain applications and data. Users can access applications and data
at any workstation through the Internet. This technology permits much more proficient
computing by consolidating bandwidth, processing, and storage memory. Cloud offers
robust memory administration, thus there is no necessity to sustain memory on a personal
system. It alters the means by which the Internet and computer are used.
As cloud computing is a recent technology, different people have different views about it.
Cloud computing meets the overall software and hardware demand of an organization, user,
or company.
It reduces the total investment in hardware and software charges of a corporation. Some of
the benefits of cloud computing are given here:
1. It improves parallelism and allocation of resources for fast accessing
2. One may acquire software services, networked storage space, computer resources,
and various other services at a single place
3. An additional company hosts a set of applications, get software renewals (with no
charge), and so on
4. It improves monetary burden such as operational expenses, renewing charge, and
capital expenses
Hotmail, Gmail, Yahoo email, etc., are all simple illustrations of cloud computing. The email
administration software and server are on the cloud and are completelycontrolled by the cloud
service suppliers, Google and Yahoo, among many others. The customer may usemodernized
software and have the advantages of cloud computing. Cloud computing is an array of net-
work, hardware, storage, interfaces, and services which facilitate the various services. We can
also say that the term ‘cloud’ is a set of hardware, network, storage, services, and interfaces
that facilitate the service.
In cloud architecture, there are generally five main components of cloud infrastructure.
• Front-end interface for users for simple access and for using cloud resources
• Management for handling networking resources
• Storage for virtual machine
• Constant storage tool that may be organized within working virtual machines
• Monitoring tools for initiating virtual machines on the cloud
There are two types of a cloud environment:
1. The end user who has no idea about cloud complexity
2. The cloud service provider who has the liability of controlling the complete cloud
environment and offer services to the consumer. One of the jobs of the supplier is safety,
and it assures the consumers the degree to which their data is protected. The cloud
service supplier is also accountable for IT resources, uploading, and other services
offered to the user. Various services and resources are provided to users by the cloud
provider, as suggested and managed by the cloud administrator, in the cloud
environment, as shown in Fig. 1.2.
Cloud computing gives users the option of accessing information from any place at any
point of time. To access the conventional computer system, you should be in a similar
physical position as your data
storage tool. The cloud eradicates this barrier. Suppliers of clouds offer you the obligatory
software and hardware for operating your company or home applications.
It is required to pay for storage space, hardware, and software for a business or
corporation if they are using cloud resources provided by cloud providers. Small
corporations as well may save their information on the cloud, which will lessen the price
of buying hardware and memory tools. They only need to purchase a specific volume of
storage space, as per the requirement.
You require an Internet connection to access the cloud. The benefit of this is that you
can access that record from anywhere, by any tool that can access the Internet. Workers at
distinct sites can access similar data on the cloud and any tool may be used (e.g., a laptop,
desktop, mobile phone, or tablet). Cloud computing involves a cloud consumer, cloud
provider, cloud auditor, cloud broker, and cloud carrier, as shown in Table 1.1.
Cloud computing offers services to users for storing software and files distantly, instead
of on a server or a hard drive at their workplace. Every corporation must possess its own
personal cloud that may be adapted according to the users’ demands.
Through the Internet, employees may access information from home, on the way, from a
customer’s office, or from a smartphone such as an iPhone or a BlackBerry. Employees
may also jointly work on documents and files, even when they are not physically all together.
Everyone can work mutually even if they are physically far from each other. Concurrently,
documents can be seen and proofread even though they are in remote areas.
Cloud computing may be extremely fast and simple to operate. Since downloading and
deploying of software needs time, clouds maintain everything up to date. Cloud computing
is cheaper as well. There is no requirement of purchasing and deploying costly software as
it is already deployed online and you operate it from there. Cloud computing provides
agility and it may be easily and swiftly scaled up and down as per the requirement.
One of the chief benefits of using cloud computing for various corporations is that it
provides nearly infinite storage, in contrast to a server, and takes into consideration the
limits of a hard drive as it is online. There is no requirement to pay for enormous disk space
and devices.
There are many challenges associated with a conventional infrastructure are
Software licensing and support For every application and data center, licensing is
needed. However, in cloud computing, for allocated data centers, only a single license is
needed for the application.
Scalability Conventional infrastructure cannot extend easily at a particular instance of
time, and scal- ability requires variation with time. It has to regularly improve in order to
face the challenges.
Accountability The application in conventional infrastructure never has vital liability and
power.
Modifiability When alteration is needed, the application constantly needs and sustains extra
charge.
Physical security It is tough to uphold security, and therefore, security is still a serious
issues related to cloud computing.
Cost-effective management To make the application significantly accessible, the
replication of data is required from time to time, which is very cost effective for a
organization.
Cloud computing is a new trend in computing due to its many benefits that are
1. Reduced Costs
2. Scalability : More information can be saved, when compared to personal computer
systemsby companies. Some of the important advantages of scalability are
• One of the biggest advantages of cloud computing is that a business pays only
for the services it avails. In a conventional infrastructure and technology,
businesses should invest in advanced storage tools and servers which normally
occurs at fixed prices. Cloud computing is exclusively scalable and flexible,
functioning on the basis of usefulness and permitting businesses to pay as per work
and the resources they use.
• Since cloud computing is based on virtualized technology, RAM space, storage,
etc., are simple and swift to use and append. The requirements of a business can
be accomplished in hours rather than days.
• In a cloud environment, scalability is a benefit. With the expansion of the business,
further resources are included already to support the progress of the business. In
association with SaaS, businesses have to pay according to their demand, that is, pay
more for more demand and less for less demand.
3. Remote Access : Through cloud computing, it becomes very easy to synchronize data
access between international offices. Once data is virtually stored, it can be shared
effortlessly between offices that are far from each other through isolated access. The
advantages of isolated access are that any tool can be used, any time and at any place. Users
would have access to their software, attributing the newest information and data on any
venture. Users can do the following:
• Access project reports and data, alter orders, etc.
• Sense the ‘always on’ benefit of being capable of giving up one zone and
carry on even on yoursmart cell phone.
• Expand your trade and support your cell phone sales strength as everybody
has 24 × 7 access tothe cloud any time, from any mobile tool or desktop.
4. Disaster Relief : Natural calamities such as earthquakes, floods, internal troubles, and
wars might result not only in the loss of data of e-governance applications but also in
unavailability of services. In a different geographical locality, multiple set-ups along
with total backup and retrieval explanations should survive. Disaster recovery control
measures should be put in place and exercised from time to time. Data and applications
should be surplus and must be accessible at short notice to switch from one data center
to another. Cloud virtualization techniques permit restoration and backup. As compared
to a conventional data center, it provides flawless migration of applications.
5. Ease of Implementation
Cloud computing has many benefits over other conventional ways of hosting and
networking. These benefits are particularly noticeable for small ventures which
require the strength of business services, but the finances are unavailable for
purchasing computers, paying workers, and executing the technology.
For those who do not have the knowledge of modern technology, executing cloud
computing services might tend to be a little inconvenient on home networks. However,
this can be accomplished easily with an Internet connection and a cloud computing
host. With this benefit, it becomes easy for small-scale company owners to set up
services even if they are unaware of the execution of modern technology.
With the help of these benefits, anybody can get started on cloud computing.
The benefits are particularly useful for small enterprises; nevertheless big
corporations may also benefit from cloud computing. Cloud applications do not need
to be upgraded, fixed, or downloaded. It is easy to learn and use applications and
several of these are accessible at a cost-free trial, to check if it suits some small
enterprises or not. For small enterprises, various cloud-based software and
applications are offered, which are beneficial for smooth running of businesses.
6. Skilled Vendors : Cloud computing business models need suppliers to appoint, teach,
and maintain highly talented workers to maintain the quality of service. Cloud computing
suppliers maintain a professional’s requirements at their end.
7. Response Time : Cloud computing achieves an improved response, compared to other
types of computing. The response time, is faster when compared to normal hardware and
server. At present, cloud computing is growing in a totally new manner, as businesses
of every range and form are getting used to this recent technology. Cloud computing is
used for data storage services and software applications which are sent in real time over
networks, generally, the Internet. These services principally comprise everything you
may perform on a PC— data storage, email, and productivity and conversion
applications. The advantages of cloud computing can comprise improved cooperation,
cheaper rates, and better mobility. Cloud computing has significantly lower costs than
the equivalent user licences and desktop software. The subscription services provide the
best features and priority consumer support although they are paid as per usage.
Possessing such kind of productivity applications and storage ‘in the cloud’ facilitates
access to your files anywhere and anytime. It makes it easier to work on projects
regardless of locality and time zones. Industrial cloud service suppliers must have very
strong data backup systems. Through cloud computing, it is improbable that your data will
be lost since service suppliers will usually have data retrieval systems in place.
Nevertheless, accessibility is a more common drawback. Round-the-clock access is one
of the assurances of cloud computing, but the truth is that it is not possible every time.
Even chief suppliers own services that can go offline owing to system maintenance or
failures from time to time. You would require steady Internet access at your end so as to
ascertain your access to the existing services.
8. Easy to Customize : Customization may be possible for easy access of resources to
some degree, as per our need. Physical servers or virtual servers may be customized to
distinct schemes via a control panel. Other than these, there are various other benefits
of cloud hosting over isolated hosting:
• Pre-configured operating system—A variety of famous Linux
allocations (Debian, Red Hat, Ubuntu, Arch, Fedora Enterprise
Linux, and several editions of Windows-based servers)
• Committed IP addresses for cloud servers
• Conversion amid servers in the similar cloud, free of conversion
expenses and at high speed
• Allocation or replication over many remote sites
9. Virtual Provisioning
A novel technology used in storage is the fact that storage space is allocated on
demand to various devices on the virtual storage network. There is a virtualized
environment for controlling, monitoring, and maintaining a physical disk storage that is
connected with virtual machines.
Thin provisioning is another term used for virtual provisioning. Virtual provisioning
is mainly used in a virtual environment, whereas thin provisioning is generally used in a
physical computing environment. Virtual provisioning does not ensure the assigning of a
higher storage capacity to VMs. It offers physical storage to each unit of virtual memory,
based on the demands of the user.
10. Fully automated storage tiering (FAST) : FAST mechanically shifts active data to
storage tiers with high- performance computing and stationary data to different storage
spaces at low cost. It is useful to increase the performance of the applications, compared
to other traditional technologies like Serial Advanced Technology Attachment
(SATA). It is difficult to do the same optimization in data storage with a manual system.
By continuously monitoring FAST, one can easily identify active or inactive data. On
the basis of set principles, the administrator can control and manage systems
automatically. It is an optimized method that does not add any extra expenditure and
burden on the system.
1.4 HISTORY OF CLOUD COMPUTING
Cloud computing is an Internet-based service that has evolved after going through a number
of phases, for example, grid and utility computing, SaaS, etc.
In 1999, Salesforce.com came into the market. This was a pioneer of cloud computing.
After that, Amazon Web Services was launched in 2002, which provided customized cloud-
based services including storage, computation, etc., to the cloud users. Another big invention
in cloud computing was in 2009, as Web 2.0 and Google services, through Google Apps.
The following sections show the historical evolution of computing.
1.4.1 Client-Server Technology
Client-Server is the technology behind cloud computing. Client-Server technology is shown
in Fig. 1.4. In this, multiple computers perform collectively to augment computing power.
The server is the prime regulator wherein software applications and data are kept for
access. If a user requires to operate a program or access precise data, he/she needs to connect
to the server, to get suitable access and to perform various operations whilst renting the data
or program from the server.
The client may request to be associated to the server, to which the server replies
appropriately. This is known as dumb terminal as it does not have high processing power,
storage space, or memory. The client is simply a tool which is associated with the user for
facilitation.
Cl
Server
Centralized control There is a centralized power used in the client-server model. Servers assist
in control- ling the complete system. Access acceptance of distinct users and resource
allotment is made by servers.
Administration managed File administration turns out to be trouble-free since every file
is saved at a single place.
Replication for backup Since complete data is saved on the server, it is easy to create a
back-up of it. During the time of recovering the missing data, it performs a vital role.
Easy updating possible Variations may be made simply by mere advancement of the server.
Remote service Access of distant server is possible to accomplish the needs of consumers
and support distinct network.
Secure and safe For any computing, safety is a vital feature. Safety convention and access
privileges may be termed at the time of association of server.
Disadvantages of Client–Server Networks
1. If the server is unable to tackle countless requests from the consumers, it might lead
to congestion with data getting missed.
2. In case you are downloading a file from the server and if, because of some fault, it
gets discarded, download too discontinues.
3. Administration and deployment is extremely costly for such computing.
4. Expert IT populaces are forever required for maintaining servers and other
technological particulars of the network. It needs unique guidance for the upholding
of server.
1.4.2 Peer-to-Peer Approach
Peer-to-Peer (P2P) is a decentralized approach and it encompasses no principal server. It is
a design in which every computer has equal responsibilities and facilities.
In client–server technology, the consumer is the entire time strike server for diverse
requests. In conventional design of a client server, one or more computers are devoted to
serving the others. In a P2P setting, there is no master (boss) and slave. P2P facilitates
straight swap of services and resources. No one lingers on for others to react since all are
masters (boss) and there is no need for a principal server as any of the computers may
perform in that capability, when called on to do so. This kind of network is not simple to
manage.
Disadvantages of Peer-to-Peer Networks
1. It is not easy to administer this type of network.
2. Safety matters are forever on this network and it cannot be tackled appropriately.
3. Backup or data revival is not simple. Every computer must have its personal imitation
system.
1.4.3 Distributed Computing
To amplify the throughput and for the utmost exploitation of the computing power of a
system in a network, we may utilize distributed computing. A system is not completely
busy all the time; several systems remain idle many times, so if the idle time of various
systems is integrated and used for compu- tation, which functions for the highest
consumption, it is known as distributed computing. Distributed computing utilizes those
idle resources that are not utilized for some reason or the other. Figure 1.5 shows distributed
computing.
other in an organization
Nodes
Communication Virtual
network server
Physical server
Virtual
server
Grid with large
computation power
network; there is one administrator to control the servers and so, services are accessed by
the clients on the network.
There are numerous reasons as to why you could decide to perform an application on a grid
instead of a high performance computing (HPC). Additional savings or money, and data
accessibility—both kinds of resolution need enormous sums of computing strength.
Grid technology supports application-oriented inter domain business, so the purpose of grid
security infrastructure is to protect shared resources from unintended users and also support
fundamental feature of security like authentication and authorization. Authentication means
that the entity has to prove that it is really what it claims to be and authorization means
access permission of shared resources under different conditions given to different users.
Authentication Infrastructure
The generally used authentication infrastructure is public key infrastructure, which is
based on pub- lic key cryptography. A third-party mediator is involved for this
authentication process, that issues certificate to users as grid identity that allows users to
use shared resource in the grid infrastructure. Another user authentication is done through
Kerberos. Session key is issued to the users by the authentication servers for accessing
resources in the grid. Security key means special token issued to the users.
A different method, Athens, is also used, which maintains separate user account for each
resource they want to access and users’ accounts are managed centrally by an account server.
One level authentication technique is used, which is based on user name and password.
Authorization Infrastructure
Akeni authorization infrastructure method issues users’ certificate to access a shared
resource under different condition. A trusted entity is defined to gain access of shared
resource. Use condition on resource is also defined for every stake holder, for keeping data
safe and unreached from each other. Another method is privilege and role management, in
which for accessing resource, users have to present role- based certificate that defines user
role and attribute. One of the important methods is virtual organization membership service
that maintains all information about users centrally through a virtual organization
administrator. Certificate needs to be present for accessing a shared resource, and only after
checking the validity of certificate users are allowed to access resources.
Other method of access control of user identity is grid map files. A distinguished list is
prepared for shared resources used by particular user accounts and the list is shared on each
resource. Generally, user mechanisms of security in grid computing are authentication and
authorization and these are termed as hard security, whereas other method, trust
management based system, is called as soft security.
Trust between two parties is a bidirectional relationship, which decides extent up to
which one party depends or relies on the other. Trust management consists of a trustor and
a trustee. Mutual trust relationship is of the following types:
1. Provision trust—It describes a user’s trust on a service provider or service.
2. Access trust—It describes service provider trust in the user access on provided
resource.
3. Identity trust—It describes trust on identity claimed by the user.
4. Delegation trust—It describes trust on someone which acts and makes decision on
behalf of some other.
Goal of trust model is to support decision making for various interactions. Trust values are
calculated for prediction of future possibilities. Depending upon application trust value, trust
model is of three types:
1. Fuzzy logic model
2. Probability theory model
3. Mathematical method model
Fuzzy logic uses linguistic terms for calculating trust value that explains its believe on the
other entity. In probability-based model, trust is calculated on the basis of previous
experience that determines future actions. In mathematical method, calculated index value
determines the level of belief on the other entity.
1.4.5 Autonomic Computing
This is a system that supports computing to perform and work without any outer control or
intervention. The phrase is on the basis of the autonomic nervous system of the human
body that manages heart functioning, breathing, and many other functions. The aim of
autonomic computing is to have the computer carry out versatile and critical functions
without any interference by a user. Each task may be programmed, with orders given
according to necessity, and evading user interference as per the need.
1.4.6 Platform Virtualization
Virtualization is a base for clouds, irrespective of whether you are heading towards
constructing a mini- cloud in a prevailing data center or want to place your applications on
a complete cloud.
A virtual picture offers an undefined number of hardware resources for strengthening the
accessibility and functioning of an application; the choice on which resources to virtualize
is normally handled down to a query of the resources previously being utilized on a variety
of accessible servers. Each user acquires a service according to the requisites in
virtualization.
The unused time of a server is involved in waiting for output or input, or is devoted to an
assignment, working for lesser consumption of CPU and rotating its computational power
for new assignment to be completed. Virtualization is a proficiency which conceals
physical resources and emerges as virtual resources for users. Organizations have to carry
out many steps in order to accept cloud computing. In a conventional data center, resources
are devoted for every business application or entities. IBMS/360-67 supports up to four
processors. It, in fact, supports dynamic address translation (DAT) to perform with
competent paging.
Virtualization makes physical resources look like virtual resources in front of users.
Virtualization is founded on the perception of a virtual machine working on a physical
computing platform. Virtualization is managed by a Virtual Machine Monitor (VMM),
called a hypervisor. An open-source hypervisor, Xen, is broadly utilized for cloud
computing.
1.4.7 Service Oriented Architecture—SOA
A software allocation and installation module are that in which applications are offered to
consumers as a service. The applications may work on the computing systems of users or the
web servers of suppliers. A variety of software is easily accessible on the cloud and
instantaneously accessed by several users.
An array of services can communicate with one another. Cloud computing is Internet-based
computing, where mutual information, software, and resources are offered to consumers on-
need, for example, a public utility.
In cloud computing, service level agreements (SLAs) are mandatory to manage the usage of
resources. In the negotiation process, a joint decision is made between the parties, service
provider, and service consumer in the context of cloud computing. Quality of service (QoS) is the
ability to offer various priorities to dependents based on applications and consumers, and
guarantees a certain level of performance. QoS norms are rich and are extremely dependent on
the application
The general service arrangement is as follows:
1. Loss—Chance that a flow’s data is missing
2. Delay—Time it acquires a package’s flow in order to find it from source to target
3. Bandwidth—Greatest speed at which the source may transmit data
Service condition in the cloud relies on the SLAs which represent a contract made between
the customer and the service provided as well as non-functional necessities of the service,
in particular, QoS. SLA considers its responsibility, service charge, and fine in case of
violations of the agreement.
1.4.8 Utility Computing
Utility computing disburses resources as a metered service when required. The aim is to
utilize services resourcefully and efficiently, which lessens related expenses as well.
Utility computing is the procedure of offering computing services via an on-demand,
pay-per-use invoicing system. It is a computing enterprise module where the supplier
possesses, works, and controls the computing resources and infrastructure, and is accessed
by subscribers as and when needed on a metered and leasing basis. Utility computing is one
among the most famous IT services’ modules, basically due to the economy and elasticity
offered by it. This module is based on the one used by traditional utilities such as gas,
electricity, and telephonic services. The customer has access to a
virtually infinite delivery of computing resolutions over the virtual private network or the
Internet that may be sourced; supply is managed by the service providers. Utility computing
may offer virtual software, virtual storage, virtual servers, and other IT resolutions. Managed
IT services, grid computing, and cloud computing are based on the idea of utility computing.
Like other kinds of on-demand computing, for example, grid computing, the utility module
looks to raise the effective use of resources or/and reduce related prices.
1.4.9 Web 2.0
Web 2.0 represents a change in technology in the world of the World Wide Web. It is
usually designed to increase data security and customization of application as per the
requirement with improved functionality.
Web-based service hosting, main social networking, sharing videos, etc., are important
provisions provided by Web 2.0. In Web 2.0, the world wide web (WWW) puts stress to
generate content by the user, and easy access and other operations on the content.
The important features of Web 2.0 are as follows:
1. Easy to access
2. User interaction and participation
3. Rich customization features
4. Easy communication through video chatting, instant messaging facilities, etc.
5. User-friendly writing tools and applications
6. Data management and analysis
7. Multimedia supporting tools
8. Web application and hosting
1.4.10 Parallel Computing
Parallel computing supports a type of computation which is helpful for carrying out
computation of a program simultaneously. It is based on the principle that a single large
problem is divided into small parts and parallelly runs different parts on different machines.
Distributed or grid computing is also a special type of parallel computing in which
computers are connected on a network. Geographically dispersed computer resources are
used for a common purpose. Different parts of the same problem run in parallel for faster
and easy processing. It is cost effective to run a program on a super computer. Grid
infrastructure supports different parts of the same problem to be run on multiple machines
at the same time. This is also helpful in removing complications related with many
instances of the same program sharing memory and space at the same time.
Parallel computing simultaneously uses various computing resources for solving a
computational problem:
1. Discrete parts of a broken problem can be solved in parallel
2. Further, every part is broken down into a series of instructions
3. Different processors are used to execute the instructions in parallel
4. Coordination method works behind parallel computing
Parallel computing supports applications that require processing of a large problem in a
sophisticated way. Some of the examples are:
• Big data problem
• Data mining
•Search engines
•Medical diagnosis
•Virtual reality
•Multimedia
1.5 BUSINESS AND INFORMATION TECHNOLOGY PERSPECTIVE
Cloud computing technology is valuable to both end users and developers. Cloud
computing offers the developer an augmented quantity of storage and added strength. It is
simple for them to operate the application. It is a creative method for accessing
information, and for processing and evaluating data. It unites resources and people from
any place. Users are no more constrained by physical restrictions.
Cloud computing proposes various advantages to the user. An individual using a web-based
application is not physically compelled to one PC, network, or location. Users can record and
applications can be accessed from anywhere, at any time.
Cloud service providers propose a number of advantages over and above those provided
by remote hosting:
1. Accessibility of data all over
2. Physical servers or virtual servers
3. Servers’ interaction within similar clouds
4. Allocation or imitation of resources at numerous physical regions
5. Strength offered by different cloud storage capacities
Other services provided by cloud computing are discussed in the following sections.
1.5.1 Electronic Faxing
Secure faxes are transmitted to specific telephone number and are directed to an e-mail
address as PDF attachments. Outgoing messages are transmitted through e-mail and
conveyed to fax machines all around the world.
1.5.2 Voice on Clouds
Cloud-founded Google Voice can deal with calls, in case the call is made by an user on a
published phone number. The call can be acknowledged from any telephone number
associated to Google voice.
1.5.3 Commerce on Clouds
Businesses can be tackled via clouds, for example, the sale and purchase of items. A few
books are accessible for sale as downloadable e-books on websites. The numerous sites
interrelate flawlessly. Online buying, screening of items, and entire transactions may be
handled effortlessly.
1.5.4 Distributed Hosting on Clouds
Godaddy.com is faultlessly hosted and provides services in this context. You might have
utilized Rack space, Amazon, and many other websites for availing services.
1.5.5 Accounting and Online Banking
The online banking system offers convenient banking, encompassing numerous
characteristics such as amount transfer and balance enquiry, among others. You might have
applied on CapitalOne bank instead of QuickBooks; or NetSuite Small Business or other
new excellent cloud-based alternatives. Consecutively, the web-based, bill-paying
application of banks is dealt by a different cloud-based dealer which interfaces with the
cloud-based Automated Clearing House (ACH) system for delivering and disbursing dues.
1.6 NEWS ON CLOUDS
moreover performing computation with the encoded data must utilize more computing
resources.
5. The user encodes the data earlier to upload it to the cloud. When specific data is needed,
the token creator is used by the user to produce a token as well as decryption key. The
token is transmitted to the cloud, the chosen encoded file(s) are downloaded, and after
that these files are confirmed locally and decrypted using the key. Sharing is facilitated
by transmitting the decryption key and token to the other user with whom you wish to
cooperate.
1.8.4 Privilege Neglect
Companies sometimes take advantage of the liberty given to them. They disclose sensitive
data of their company to others for some benefits. The threat of a malicious insider with
access to confidential data is a concern for any outsourced computation model. Miscreants
might affect and harm the consumer’s fame and brand or openly harm the consumer.
Mistreatment of opportunity not only spoils brand name, but may also place protected data
in the hand of competitive attackers. It must be observed that similar kinds of attacks may
be taken out by in-house workers in a conventional infrastructure too.
1.8.5 Scaling Resources
A web application designer who hosts its service on a cloud can view how the reply time gradually
increases when usage of the application rises since the cloud does not scale up resources rapidly
enough. The capa- bility of scaling resources up and down to meet workload is one of the chief
benefits of cloud computing. Resource pooling through multitenancy is also an important element
that is managed by the cloud provider. Separate storage devices are provided to every client on
the cloud network, called a single tenant; and in a multi-tenant environment, a single storage
device is shared by more than one cloud user as shown in Fig. 1.8. In the figure, there are
two consumers 1 and 2, who are sharing a single shared storage for storing data, so there is
the risk of interchanging or
cloud applications within their accessible IT environment. Windows Azure offers both
IaaS and PaaS services and is categorized as the ‘public cloud’ in cloud computing policy of
Microsoft, with its SaaS offering, Microsoft Online Services.
The following new characteristics were released by Windows Azure:
• Websites permit designers to develop sites using PHP, Node.js, or
ASP.NET and may be installed using TFS, FTP, etc.
• Virtual machines permit designers to drift infrastructure and
applications without altering the existing code and may operate
both Linux virtual machines and the Windows Server.
• Cloud services is a platform of Microsoft as a Service environment
which is used to generate scalable services and applications.
Supports automated installations and multi-tier states.
• Data management, an SQL database once recognized as SQL
Azure Database, performs to gen- erate, scale, and expand
applications into the cloud by using Microsoft SQL Server
techniques. It amalgamates with System Center and Active
Directory.
• Media service is a PaaS-based service that may be used for content
security, encoding, analytics and/or streaming.
The Windows Azure platform, which became available in the market in 2010, offers an
API devel- oped on XML, REST, and HTTP, which facilitates a designer to interrelate
with the services offered by Windows Azure. Microsoft also offers a consumer-side
operated class library which summarizes and customizes interrelating services as per
user requirement. It also amalgamates with Eclipse, GIT, and Microsoft Visual Studio as
it may be used as the integrated development environment (IDE) to build and print Azure-
hosted applications.
4. Rackspace—Cloud Hosting
Rackspace is the service head in Cloud Computing and an initiator of OpenStack, an open
source cloud platform. The San Antonio-based vendor, which operates around more than
thousand enterprises, offers dedicated support to its consumers, athwart a variety of IT
services, comprising cloud computing and managed hosting. Their exclusive consumer
service policy has benefited them in getting the faith of their customers. Rackspace has been
identified by Bloomberg Business Week as a ‘Top Hundred Functioning Technology
Corporations’ and was highlighted in the list of Fortune. The corporation was also placed in
the Leaders for Cloud Infrastructure under Service and Web Hosting.
5. Salesforce.com—SaaS, PaaS
Salesforce is a supplier of SaaS-based goods, along with having a PaaS offering,
Force.com. It is a universal venture software corporation with headquarters in San
Francisco, United States, California. Salesforce is best identified for its consumer
relationship management (CRM). It was in graded position in Fortune’s 100 Best
Corporations.
social purposes, or both. The programs show the connections among people and ease the
ability of new links. Examples of social networking include LinkedIn, Facebook, etc. A
social networking website is an online podium which permits customers to build a public
profile and interact with other users on the website. Generally, social networking websites
have a new record of people with whom they share a link and then permit the people in the
record to verify or reject the link. After the establishment, the new customers may explore
the networks of their links for making further links. Social networking sites have various
rules for setting links, but they frequently permit customers to examine the links of a
confirmed link and even advise further links on the basis of an established network of a
person. Some social networking websites like LinkedIn are used for creating professional
links, whereas sites such as Facebook are on both sides of the line (i.e., professional and
private). There are also networks that are created for a particular customer base, like
political or cultural groups within a specified region or even dealers in economic markets.
collaborate with its trading partners and work together as a ‘virtual enterprise network’.
In this way, they can share the information and communication resources, without
actually owning it all. This also helps in lowering costs.
As shown in Fig. 1.9, an enterprise with n numbers of hosts can connect through
cloud services and different types of services supported by cloud network such as database,
servers, and various applications.