Cloud Computing-2
Cloud Computing-2
Ans:1 The term cloud refers to a network or the internet. Cloud computing is a
technology that allows users to access and use computing resources, such as
servers, storage, databases, networking, software, and more, over the internet.
Instead of owning and maintaining physical hardware and software, users can rent
these resources from cloud service providers. It simply provides lower power
expenses, no capital costs, no redundancy, lower employee costs, increased
collaboration, etc. It makes us more efficient, more secure, and provide greater
flexibility.
Advantages of Cloud Computing :
Scalability: Cloud computing allows organizations to easily scale their
computing resources up or down as their needs change, without having to
purchase and manage additional hardware.
Cost Savings: Using cloud computing can be more cost-effective than
maintaining on-premises IT infrastructure, as it eliminates the need for costly
hardware, software, and maintenance expenses.
Accessibility: Cloud computing enables remote access to applications
and data, allowing users to work from anywhere with an internet connection.
Reliability: Cloud providers offer high levels of uptime and redundancy,
ensuring that applications and data are available even in the event of hardware
failure.
Flexibility: Cloud computing offers a wide range of deployment options,
including public, private, and hybrid clouds, which can be tailored to meet the
unique needs of an organization.
Ans: 2 There are the following three types of cloud service models -
Characteristics of IaaS
There are the following characteristics of IaaS -
Advantages of IaaS:
1. Cost-Effective: Eliminates capital expense and reduces ongoing cost and IaaS
customers pay on a per-user basis, typically by the hour, week, or month.
2. Website hosting: Running websites using IaaS can be less expensive than
traditional web hosting.
3. Security: The IaaS Cloud Provider may provide better security than your
existing software.
4. Maintenance: There is no need to manage the underlying data center or the
introduction of new releases of the development or underlying software. This is
all handled by the IaaS Cloud Provider.
5.
The various companies providing Infrastructure as a service are Amazon web
services, Bluestack, IBM, Openstack, Rackspace, and Vmware.
Disadvantages of laaS :
Characteristics of PaaS
There are the following characteristics of PaaS -
Advantages of PaaS:
1. Simple and convenient for users: It provides much of the infrastructure and
other IT services, which users can access anywhere via a web browser.
2. Cost-Effective: It charges for the services provided on a per-use basis thus
eliminating the expenses one may have for on-premises hardware and software.
3. Efficiently managing the lifecycle: It is designed to support the complete web
application lifecycle: building, testing, deploying, managing, and updating.
4. Efficiency: It allows for higher-level programming with reduced complexity
thus, the overall development of the application can be more effective.
The various companies providing Platform as a service are Amazon Web services
Elastic Beanstalk, Salesforce, Windows Azure, Google App Engine, cloud Bees
and IBM smart cloud.
Disadvantages of Paas:
Characteristics of SaaS
There are the following characteristics of SaaS -
Disadvantages of Saas :
Q:3 Popularly used cloud computing services?
Cloud Storage
Computer hard drives can store a finite amount of data but cloud storage enables
users to store huge volumes of data in an off-site location that you access through
the public internet or a dedicated private network connection. Cloud storage
providers host, manage, maintain, and secure the servers and related infrastructure
to ensure that you have access to the data whenever required. Cloud storage is a
cost-effective and scalable way to store, access, and retrieve your files from any
web-enabled interface.
Cloud-based software testing is faster, easier, and less expensive. It offers cloud
environments and infrastructure to simulate realistic user traffic scenarios. It helps
businesses measure software performance and functionality.
Big Data Analytics
Big Data analytics refers to the complex process of examining large and diverse
data sets to find information, such as correlations, hidden patterns, market trends,
and more. The main purpose of big data analytics is to extract value from data and
improve decision-making. Big data analytics requires networks, storage, and
servers. This is why many businesses are outsourcing it to the cloud.
Cloud-based big data analytics enable businesses to perform better analysis from
large amounts of structured and unstructured data. Big data analysis using the
cloud is cheaper, flexible, and makes data integration from numerous sources
easier for businesses.
Without a doubt, cloud computing makes big data analytics simple, useful and
inexpensive. For more information, Amazon Web Services (AWS) offer several
analytics services for various use cases.
Disaster Recovery
Data backup is crucial for businesses of all sizes that operate with large volumes of
information. Manually backing up data is a complex and time-consuming task that
requires companies to maintain a set of drives, manually collect them, and dispatch
them to a backup facility.
Social Networking
Social media platforms are developed to help you find people you know – or
connect with those you don’t know. They also give you many tools for sharing
information and data such as tweets, photos, instant messages and posts.
Along with cloud storage, social networking is one of the most common use cases
for consumer-driven usage of cloud services.
9. Business process
Data of a single
Data of multiple Data is stored in the
organization is
organizations is public cloud, and
Tenancy stored in a
stored in the provide security in the
clouds the public
public cloud public cloud.
cloud
Q:5 How does Cloud Security work? what are primarily concerns?
Ans:5 Cloud Security is the technology and best practices designed to protect data
and information within a cloud architecture. Cloud security is a critical component
of any IT infrastructure strategy that uses the cloud. Cloud security ensures data
privacy and compliance around data stored in the cloud.
Private clouds, public clouds, and hybrid clouds (combinations of both private and
public cloud platforms have all grown in popularity, as well as the use of multiple
public clouds in a multi-cloud strategy. Because of cloud computing’s distributed
and dynamic nature, there are unique considerations when it comes to securing
data within the cloud.
Responsibility for cloud security is shared between cloud providers (which offer a
number of security tools and services to customers) and the enterprise to which the
data belongs. There are also many third-party solutions available to provide
additional security and monitoring.
Cloud computing creates a number of other unique security issues and challenges.
For example, t is difficult to identify users when addresses and ports are assigned
dynamically, and virtual machines are constantly being spun up. In addition,
multitenant environments in public cloud environments mean that an
organization’s data shares space with the data of other organizations. Thus, it is
important for public cloud providers to keep tenants isolated.
Primary Cloud Computing Security challenges
Three primary challenges in securing clouds include:
1. Data that passes among data centers and clouds over a public network
is vulnerable while en route, especially when there is a lack of clear
responsibility for data security at different points in the journey.
2. Multiple tenants on shared public servers bring additional security
risks. Tenants must be kept isolated to prevent unauthorized sharing of
information.
3. Security controls can differ in multi-cloud environments and hybrid
cloud environments, leaving gaps or leading to configuration confusion.
Cloud computing provides various advantages.But there are also security risks in
cloud computing.Some most common Security Risks of Cloud Computing are
given below-
Data Loss
Data Breach
Vendor lock-in
Vendor lock-in is the of the biggest security risks in cloud computing.
Organizations may face problems when transferring their services
from one vendor to another. As different vendors provide
differentplatforms, that can cause difficulty moving one cloud to
another.
Spectre & Meltdown allows programs to view and steal data which is
currently processed on computer. It can run on personal computers,
mobile devices, and in the cloud. It can store the password, your
personal information such as images, emails, and business documents
in the memory of other running programs.
Denial of service (DoS) attacks occur when the system receives too
much traffic to buffer the server. Mostly, DoS attackers target web
servers of large organizations such as banking sectors, media
companies, and government organizations. To recover the lost data,
DoS attackers charge a great deal of time and money to handle the
data.
Account hijacking
Account hijacking is a serious security risk in cloud computing. It is
the process in which individual user's or organization's cloud account
(bank account, e-mail account, and social media account) is stolen by
hackers. The hackers use the stolen account to perform unauthorized
activities.
Ans:6 Before emerging the cloud computing, there was Client/Server computing
which is basically a centralized storage in which all the software applications, all
the data and all the controls are resided on the server side.
If a single user wants to access specific data or run a program, he/she need to
connect to the server and then gain appropriate access, and then he/she can do
his/her business.
Then after, distributed computing came into picture, where all the computers are
networked together and share their resources when needed.
On the basis of above computing, there was emerged of cloud computing concepts
that later implemented.
In 2002, Amazon started Amazon Web Services, providing services like storage,
computation and even human intelligence. However, only starting with the launch
of the Elastic Compute Cloud in 2006 a truly commercial service open to
everybody existed.
Of course, all the big players are present in the cloud computing evolution, some
were earlier, some were later. In 2009, Microsoft launched Windows Azure, and
companies like Oracle and HP have all joined the game. This proves that today,
cloud computing has become mainstream.