Cloud Compution MST2
Cloud Compution MST2
MST 2
Cloud Computing
Unit-3
- Service monitoring
• Cloud monitoring is a method of reviewing, observing and managing the
operational work ow in a cloud-based IT infrastructure. These can be
done both manually or automatically which helps predicting the possible
vulnerabilities to future issues.
- Webistie Monitoring
- This tracks processes, tra c, availability, and resource utilisation of
cloud-hosted websites.
1
fl
ffi
fi
- Virtual Machine Monitoring
- This is a simulation of a computer within a computer. Its usually used in
IaaS as virtual server that hosts several virtual desktops.
- This tracks the users, tra c and status of each machine
• Bene ts of Monitoring:
- Scaling is seamless and works in any size of organisation.
- Dedicated tools and hardwares are maintained by the host.
- Tools are used across several types of devices like desktops, tablets,
etc.
- Installation is simple.
- System doesn’t su er interruptions when local problem emerges.
- Low cost
- Load Balancing
• It is de ned as the method of splitting workloads and computing
properties in a cloud computing. It allows to manage workload demands
or application demands by distributing resources among numerous
computers, networks or servers.
• This is bene cial with almost any type of service like HTTPS, SMTPS,
DNS, FTP, etc.
2
fi
fi
fi
ff
ffi
ff
ffi
ffi
- Software-based load balancers - This run on standard hardware and
standard OS.
- Hardware-based load balancer - These are dedicated boxes which include
Application Speci c Integrated Circuits (ASICs) adapted for a particular
use.ASICs allows high speed promoting network tra c and are frequently
used for transport-level load balancing as it is faster.
- Database recovery
• Cloud backup and recovery preserves copies of data in a secondary,
o site storage location. The cloud provider o ers access to the storage
and additional managed backup and recovery services.
- Backup management
• Cloud backup is a strategy for sending a copy of a physical or virtual le
database to a secondary location for preservation in case of equipment
failure. The secondary server or data storage system is usually hosted by
a third-party service provider, who charges for the services provided.
3
ff
ff
fi
fi
ff
ffi
fi
- Virtual machine management
• It is a software that interfaces with virtual environments and underlying
physical hardware to simplify resource administration, enhance data
analyses, and streamline operations.
• Virtual management systems are unique but most have easy user
interface, streamline VM creation process, monitor virtual environments,
allocate resources, compile reports and automatically enforce rules.
• Example: some SLA may state that the application’s server will be
available 99.9% of the key business hours of application’s end users
called core time and 85% of the non-core time.
4
fi
ffi
fi
ff
- Metrics - They are de nition of values of service properties that are
measured from a service-providing system or computed from other
metrics and constants.
- Function - It speci es how to compute a metrics’s value from the values
of other metrics and constants.
- Measurement Directives - Speci es how to measure a metric.
• There are two types of SLAs:
• Infrastructure SLA
- It manages and o ers guarantees on availability of the infrastructure,
server machine, power, network connectivity, etc.
- The machine are leased to the customer and are isolated from the
machines of other customers.
• Application SLA
- The server capacity is available to the applications based solely on their
resource demands.
- The service providers are exible in allocating and de-allocating
resources among the co-located applications. They are also responsible
for ensuring to meet their customer’s application SLOs.
• The MSP analyses the application before it goes live. However, the
subsequent operations by the customer’s to their application can impact
the performance of the application.
• The risk of capacity planning is with the service provider instead of the
customer.
5
fi
fi
ff
fi
fi
fl
fi
fi
ff
- Publishing and discovery -> Advertising base services o erings
through standard publication media and the customer should be able to
locate the service provider by searching the catalog.
- Production -> The application is made accessible to its end users under
the agreed SLA. There could be a chance that the managed application
tends to behave di erently in a production environment compared to the
preproduction environment. This may cause breach to the SLAs terms
and conditions allowing the customer to request the MSP for inclusion of
new terms and conditions.
6
ff
fi
fi
fi
ff
• It is the process of moving a VM from one host server or storage location
to another.
- Security
• It involves con dentiality, integrity and availability which aid the
development of secure systems.
7
ff
ff
fi
fi
ff
fi
ff
fi
fi
• It is the biggest management issue with cloud computing.
• Applications and data being hosted are prone to vulnerabilities
from unauthorised parties thus measures should be taken to
prevent unauthorised access to data, applications, software and
hardware.
• Con dentiality means that only authorised person will have the
access to data. The unauthorised access increases by the
increase in the number of users using the same resources.
- Data Lock-In
• The APIs for cloud computing are not standardised and moves
from one service provider to another might be di cult. The lack of
user standardisation gives rise to management issues like fear of
uncertainty that the provider might go out of business, price might
increase as well as reliability issues.
- Customisation
8
ff
fi
fi
ff
ffi
ffi
• It is also an IS management issues as organisations like to
customise their applications and services in order to make them
unique and gives them a competitive edge over rivals.
- Technological Bottlenecks
• As new data structure are being introduced which makes the
provider to upgrade their services accordingly which raises the
management issue that involves them to e ciently and
economically achieve this without incurring too much cost
- Strategy Issues
• As cloud computing will be introduced to di erent parts of the
organisation which will arise strategy issues like What type of
cultural changes will the organisation need and how will the
change be addressed and how the organisation will prevent
employee resistance of cloud computing.
- Change Management
• The implementing of cloud computing brings about a lot of
change in the way organisation works. This change management
is a serious management issue as it will determine the success of
the implementation.
- Implementation Issues
• Organisations will nd it di cult to determine how they should
move their data into the cloud and what datas should be moved.
• They will also face the integration issue and how they have to
change their working way after the implementation.
- Transparency
9
fi
ff
ffi
ff
ffi
ff
ff
• Cloud service provider does not disclose their security policies,
design, practices and relevant security measures in daily
operations to their customers as this helps gain trust.
Unit-4
- Various issues in cloud
- Security & Privacy
- This is the biggest challenge to cloud computing and this can be
overcome by employing encryption, security hardware and security
applications.
- Portability
- Applications should be easily migrated from one cloud provider to
another which is not yet possible in cloud computing as each of the
provider uses di erent standard languages for their platform.
- Interoperability
- It means app on one platform should be able to incorporate services
from other platforms which is possible via web services but it is very
complex.
- Computing Performance
- Data intensive app on cloud requires high network bandwidth which
results in high cost and low bandwidth does not meet the desired
performance.
10
fi
ff
various di erent challenges and keeping their data safe has become
critical.
- Most of the cloud service providers follow best security practices and
take active steps to protect the integrity of their servers however, the
organisation need to make their own actions to protect their data, apps
and workloads on the cloud.
- Security threats are advancing as more organisation are joining these
services and makes their data vulnerable due to lack of visibility in data
access and movement.
- Multi-tenancy
- Public cloud has multiple users infrastructures under the same cloud so
it’s possible your hosted service can get compromised by malicious
attackers.
- Compliance
- Regulatory compliance management can be a source of confusion for
enterprises using public or hybrid cloud. Heavy reliance on third party
solutions to manage their data can lead to costly compliance issues.
- Miscon gurations
11
fi
ff
fi
- This includes leaving default administrative passwords in place, or not
creating appropriate privacy settings can be a challenge.
- Network security
• Cloud network security is the area of cybersecurity focused on
minimising the chances that malicious attacker can access, change or
destroy the information on a cloud network.
12
fi
• This is more exible and dynamic than the traditional hardware security
which is helpful for securing hybrid and multi-cloud environments where
data and workloads migrate around a complicated ecosystem.
- Threats
- Account Hijacking
• An account theft can be performed by di erent ways such as social
engineering and weak credentials. After gaining access to a users account
the attacker can access sensitive data, manipulate data and redirect
transactions.
- Data Scavenging
• Attackers maybe be able to recover data as datas cannot be completely
removed.
- Data Leakage
• It happens when the data gets into the wrong hands while it is being
transferred, stored, audited or processed.
- Denial of Service
• Malicious users my take all the possible resources thus system cannot
satisfy any request from other legit users as resource being unavailable.
- Customer-data manipulation
• Users attack web apps by manipulating data sent from their application
component to the server’s app.
- VM escape
13
fl
ff
ff
• Designed to exploit the hypervisor in order to take control of the
infrastructure.
- VM hopping
• It happens when a VM is able to gain access to another VM.
- Malicious VM creation
• Attackers with a valid account can create a VM image contains malicious
code like Trojan.
- Insecure VM migration
• Live migration exposes the contents of the VM to the network which the
attacker can access illegally or transfer a VM to untrusted host or cause
disruption.
14
fi