Unit 4
Unit 4
1. Virtualization:
- Creates virtual versions of physical resources like servers and storage.
- Allows multiple applications to share the same resources, improving
efficiency.
2. Infrastructure:
- Comprises physical servers, storage, and networking gear (e.g., routers,
switches).
- Forms the backbone of cloud services.
3. Middleware:
- Enables communication between networked computers and applications.
- Includes databases and communication software.
4. Management Tools:
- Monitor cloud performance, track usage, and deploy applications.
- Ensure disaster recovery from a central console.
5. Automation Software:
- Automates resource scaling, app deployment, and IT governance.
- Reduces costs and streamlines operations.
+--------------------+
| Front-End |
| Platform |
| (User's Device) |
+--------------------+
|
| (Interaction)
v
+--------------------+
| Network |
| (Communication |
| Medium) |
+--------------------+
|
| (Connection)
v
+------------------------+ +--------------------+
| Back-End |<--------> | Delivery Model |
| Platform | (SaaS, | (SaaS, PaaS, IaaS) |
| (Servers, Databases | PaaS, +--------------------+
| etc.) | IaaS)
+------------------------+
Diagram: Basic Cloud Computing Architecture
Explanation of Diagram:
- Front-End Platform: Represents the user's device interacting with the cloud.
- Back-End Platform: Houses resources like databases and servers.
- Network: Connects the client to cloud services.
- Delivery Model: Provides services like SaaS, PaaS, or IaaS.
Design Principles of Cloud Computing Architecture:
1. Operational Excellence:
- Automate processes for monitoring and improving performance.
2. Security:
- Implement data protection, access control, and risk management.
3. Reliability:
- Design systems to recover from failures and meet demand.
4. Performance Efficiency:
- Optimize resources and adapt to changing requirements.
5. Cost Optimization:
- Use cost-effective solutions and scale resources efficiently.
This architecture defines the standard structure and components used to design
cloud solutions.
Components:
1. Service Oriented Architecture (SOA):
- Breaks down applications into smaller, reusable services.
2. Resource Pooling:
- Virtualized resources shared among multiple users.
3. Dynamic Scalability:
- Resources scale up or down automatically based on demand.
4. Multi-Tenancy:
- Multiple users share the same resources securely.
The design principles ensure that cloud services are reliable, secure, and
efficient:
1. Elasticity:
- Automatically scales resources as per user needs.
2. Availability:
- Ensures uptime for uninterrupted access to services.
3. Interoperability:
- Services can work across various platforms and environments.
4. Pay-as-You-Go Model:
- Users pay only for the resources they consume.
5. Security:
- Data protection and compliance with security standards.
6. Resilience:
- Systems recover quickly from disruptions.
1. Front-End Platform:
- This is the user interface (UI) through which users interact with cloud
services. It can be a web browser, mobile app, or any device that allows users to
access the cloud.
- Example: A user accessing a Google Drive account via a web browser.
2. Back-End Platform:
- This includes the cloud server, storage systems, and databases that provide
resources to the front-end platform. It is the backbone of the cloud
infrastructure and hosts the actual services.
- Example: Amazon Web Services (AWS) or Google Cloud, which provide the
infrastructure and databases behind cloud services.
3. Network:
- A communication medium that connects the front-end and back-end
platforms. It enables users to access cloud services over the internet. This can
be through wired or wireless networks.
- Example: Internet service providers (ISPs) that allow cloud services to be
accessible to users.
1. Virtualization:
- Virtualization is a core technology in cloud computing. It enables the creation
of virtual instances of physical hardware (servers, storage devices, etc.),
allowing multiple virtual machines to run on a single physical machine.
- Advantage: It increases the efficiency and utilization of resources.
2. Infrastructure:
- This is the physical hardware, such as servers, storage devices, and
networking equipment, that form the foundation of cloud computing. The
infrastructure is hosted in data centers managed by cloud providers.
- Example: AWS's data centers or Google's data centers.
3. Middleware:
- Middleware is software that acts as a bridge between the operating system
and applications, allowing them to communicate with each other. It includes
components like databases and communication protocols that enable networked
computers to interact seamlessly.
- Example: Database systems like MySQL or communication protocols like
HTTP.
4. Management Tools:
- These tools allow the cloud provider or user to monitor the performance,
availability, and health of the cloud environment. IT teams use these tools for
tasks such as managing applications, ensuring disaster recovery, and tracking
usage.
- Example: AWS CloudWatch for monitoring or Google Cloud's operations
suite.
5. Automation Software:
- Automation software helps in automating repetitive tasks, such as scaling up
resources, deploying applications, or applying policies across the cloud
infrastructure. It reduces human intervention and improves operational
efficiency.
- Example: AWS Lambda for serverless operations or Google Cloud Functions.
To build robust cloud solutions, it’s essential to follow certain design principles
that ensure the system is secure, reliable, cost-efficient, and scalable. These
principles include:
1. Operational Excellence:
- Cloud systems should be designed for continuous monitoring and
improvement. Automation and predefined policies help manage operational tasks
and enhance system performance.
- Example: Automating scaling of resources in response to user demand.
2. Security:
- Security should be integrated into the design of cloud systems. This includes
protecting data from unauthorized access, ensuring privacy, and setting up
access control mechanisms.
- Example: Implementing strong encryption for data at rest and in transit.
3. Reliability:
- Cloud systems must be resilient to failures and designed to recover quickly.
Redundancy, fault tolerance, and disaster recovery mechanisms should be in
place to ensure high availability.
- Example: Using multi-region deployment to ensure availability in case of a
data center failure.
4. Performance Efficiency:
- Cloud systems should be optimized for performance, ensuring that resources
are allocated effectively and that the system can scale based on changing
demand.
- Example: Scaling compute resources dynamically during high traffic periods
to maintain performance.
5. Cost Optimization:
- Cloud solutions should minimize wasteful spending by scaling resources as
needed and using the most cost-effective services.
- Example: Using spot instances (cheaper compute resources) for non-critical
workloads.
2. Resource Pooling:
- Resources are pooled together and shared across multiple users, allowing for
efficient resource utilization and reducing costs.
- Example: Multiple organizations using the same cloud resources for storage
and computation.
3. Dynamic Scalability:
- Cloud systems can scale up or down based on demand. This ensures that
resources are available when needed and are efficiently managed during low-
demand periods.
- Example: Automatically scaling web servers during traffic spikes.
4. Multi-Tenancy:
- Cloud resources are shared among multiple users while keeping each user's
data and configurations isolated. This helps maximize the utilization of
resources while ensuring privacy.
- Example: A cloud database service hosting data for multiple clients.
1. Elasticity:
- Cloud services should automatically scale up or down to accommodate
fluctuations in demand. This elasticity helps ensure optimal resource utilization
and cost-efficiency.
- Example: Autoscaling web servers during peak hours.
2. Availability:
- Cloud services must ensure high availability, providing uninterrupted access
to resources and services.
- Example: Load balancing across multiple servers to ensure availability even
during hardware failure.
3. Interoperability:
- Cloud services should be compatible with other systems and platforms. This
ensures that users can integrate cloud services into their existing IT
infrastructure.
- Example: Using APIs to connect different cloud platforms or services.
4. Pay-as-You-Go Model:
- Users should only pay for the resources they consume, ensuring that costs
are proportional to usage.
- Example: Paying for compute instances only when they are running, and
pausing them when not in use.
5. Security:
- Security should be integrated into every layer of the cloud service, from the
network to the data storage.
- Example: Implementing multi-factor authentication (MFA) for secure user
access.
6. Resilience:
- Cloud systems must be designed to recover quickly from disruptions, ensuring
that services remain available even in the event of failures.
- Example: Using data replication across different regions to ensure data
availability during a disaster.
The cloud computing lifecycle begins when a user requests a service from the
cloud service provider after initial setup and sign-up. The lifecycle involves three
primary methods for interaction:
- Features:
- Turn services on/off.
- Request additional resources or time.
- Customize services like resource size, service tier, and application stacks.
- Approval Process:
- Managed by IT, may be automated or manual based on the service type.
- Features:
- Offers command-based interaction.
- Executes complex tasks with minimal clicks.
Example: Google Cloud CLI enables users to list, install, or update components
efficiently.
- Features:
- Enables integration with external systems.
- Simplifies resource management through automation.
Lifecycle Steps
1. Service Request
- Users request services via portals, CLI, or APIs.
- Approval follows IT-defined processes (manual/automated).
2. Service Provisioning
- Once approved, the service is provisioned with server, storage, and network
resources.
- Middleware, applications, and other software are also provisioned as needed.
3. Operational Phase
- Includes daily performance monitoring, capacity management, and compliance
checks.
4. Service Decommissioning
- When services are no longer required, they are discontinued.
- Decommissioning ensures cost efficiency by stopping charges for unused
resources.
Diagram Explanation :
1. End User: Requests services.
2. Self-Service Portal: Provides a user interface for service requests.
3. Service Catalog: Lists available services.
4. Public Cloud: External infrastructure supporting service requests.
5. CMS/CMDB: Manages service configuration.
6. Physical Components: Includes servers, storage, and networks.
7. IT Controls: Ensures compliance, cost management, and performance
monitoring.
Definition
SOA (Service-Oriented Architecture) is a design pattern that allows services
(self-contained business functionalities) to communicate with each other over a
network. It enables reusability, scalability, and interoperability in software
systems.
Explanation of Components :
1. Service Provider:
- Hosts and provides the service.
- Publishes service details to the Service Registry.
- Example: A payment service hosted on the cloud.
2. Service Consumer:
- Requests and consumes services provided by the Service Provider.
- It could be an application, system, or user.
- Example: A shopping app using a payment gateway service.
3. Service Registry:
- Acts as a directory that stores service details like name, location, and
description.
- Helps the Service Consumer discover the required service.
- Example: UDDI (Universal Description Discovery and Integration).
Working Process:
1. The Service Provider publishes its service in the Service Registry.
2. The Service Consumer finds the service using the Service Registry.
3. Once discovered, the consumer directly communicates with the provider.
Characteristics of SOA
1. Loose Coupling:
- Services are independent and interact without tight dependency.
2. Reusability:
- Services can be reused across different applications.
3. Interoperability:
- Allows services to work on different platforms and languages.
4. Scalability:
- Services can scale independently based on demand.
5. Standardized Interfaces:
- Uses standard protocols like HTTP, SOAP, or REST for communication.
6. Discoverability:
- Services can be located easily using the service registry.
Diagram: Fundamental Components of SOA
+------------------+
| Service |
| Consumer |
+------------------+
|
v
+------------------+
| Service |
| Registry |
+------------------+
^ |
| v
+------------------+
| Service |
| Provider |
+------------------+
Labelled Explanation:
1. Service Provider: Shown as a block offering services.
2. Service Registry: A central directory. Arrows connect the provider to the
registry for publishing services.
3. Service Consumer: A block connected to the registry for service discovery
and to the provider for consuming the service.
Introduction
Cloud service providers (CSPs) manage and deliver cloud-based services like
storage, computing, and networking. However, security is a significant concern
for CSPs as they must ensure the confidentiality, integrity, and availability of
customer data while maintaining the overall infrastructure.
1. Data Security
- Explanation:
CSPs store vast amounts of sensitive data. Unauthorized access, data
breaches, or accidental deletion can compromise user information.
- Example: A hacker gaining access to customer data stored on the cloud.
- Mitigation: Encryption, access control, and secure authentication methods.
3. Insider Threats
- Explanation:
Employees or contractors within the organization may misuse their access
privileges to compromise data.
- Example: An employee intentionally exposing sensitive data to competitors.
- Mitigation: Role-based access control and monitoring of user activity logs.
4. Denial of Service (DoS) Attacks
- Explanation:
Attackers flood the network or servers with traffic, making services
unavailable to legitimate users.
- Example: A website becoming inaccessible due to excessive traffic
generated by attackers.
- Mitigation: Firewalls, traffic monitoring, and scalable architecture.
5. Multi-Tenancy Issues
- Explanation:
Cloud environments are shared by multiple users (tenants). If one tenant's
data is not isolated properly, another tenant might access it.
- Example: A user accidentally viewing another tenant's private files due to a
misconfiguration.
- Mitigation: Data isolation, strict access control policies, and secure
hypervisors.
6. Insecure APIs
- Explanation:
Cloud services use APIs to interact with applications and users. Weak or
improperly configured APIs can expose vulnerabilities.
- Example: An API allowing unauthorized users to modify cloud resources.
- Mitigation: Use secure API design practices, authentication, and encryption.
Introduction
Cloud computing security architecture refers to the framework designed to
secure the cloud environment. It focuses on protecting cloud services, data, and
infrastructure against cyber threats while ensuring confidentiality, integrity,
and availability (CIA) of resources.
1. Data Security
- Explanation: Ensures the protection of sensitive data through encryption,
secure access control, and regular backups.
- Example: Encrypting data before storing it in the cloud prevents
unauthorized access.
2. Network Security
- Explanation: Secures communication between the cloud infrastructure and
users by using firewalls, VPNs, and intrusion detection systems (IDS).
- Example: Preventing unauthorized access to a virtual machine through secure
network protocols.
3. Identity and Access Management (IAM)
- Explanation: Manages user identities and their access rights to cloud
resources. Includes multi-factor authentication (MFA) and role-based access
control (RBAC).
- Example: Allowing only authorized personnel to access sensitive files.
4. Application Security
- Explanation: Focuses on protecting applications hosted in the cloud from
vulnerabilities such as SQL injection or cross-site scripting.
- Example: Regularly updating cloud applications to fix known security issues.
6. Physical Security
- Explanation: Protects the physical infrastructure of the cloud, such as
servers, data centers, and storage devices.
- Example: Securing data centers with surveillance systems, biometric locks,
and restricted access.
+---------------------------------------------------------------+
| Cloud Security Architecture |
+---------------------------------------------------------------+
| |
| +-------------------+ +---------------------------+ |
| | Data Security | | Network Security | |
| |-------------------| |---------------------------| |
| | - Data Encryption | | - Firewalls | |
| | - Secure Storage | | - IDS(Intrusion Detection)| |
| +-------------------+ +---------------------------+ |
| |
| +-------------------+ +---------------------------+ |
| | IAM | | Application Security | |
| |-------------------| |---------------------------| |
| | - Role-based | | - Security Protocols | |
| | Access Control | | - Application Layer | |
| | - Multi-Factor | +---------------------------+ |
| | Authentication | |
| +-------------------+ |
| |
| +-------------------+ +---------------------------+ |
| | Compliance | | Physical Security | |
| |-------------------| |---------------------------| |
| | - Policies | | - Data Center | |
| | - Legal Framework | | - Restricted Access | |
| +-------------------+ +---------------------------+ |
| |
+---------------------------------------------------------------+
- Components in Diagram:
1. Data Security: Show data encryption and secure storage.
2. Network Security: Represent firewalls and IDS.
3. IAM: Illustrate role-based access control and MFA.
4. Application Security: Depict application layer with security protocols.
5. Compliance: Represent policies and legal frameworks.
6. Physical Security: Show a data center with restricted access.
Host Security
Host security refers to the protection of the physical and virtual servers (hosts)
used in cloud computing. It includes securing the hardware, operating system,
and virtual machines running on the host.
2. Patch Management
- Regularly updating the operating system and software to fix vulnerabilities.
- Example: Installing security updates for Linux or Windows servers.
4. Host Firewall
- Monitors and controls incoming/outgoing network traffic.
- Example: Configuring firewall rules to allow only trusted IP addresses.
+------------------------+
| Host Hardware |
| (Physical Server) |
+------------------------+
|
v
+------------------------+
| Virtualization Layer |
| (Hypervisor) |
+------------------------+
|
+---------------------+----------------------+
| |
+------------+ +------------+
| Virtual | | Virtual |
| Machine 1 | | Machine 2 |
| | | |
| +------+ | | +------+ |
| | Access| | | | Access| |
| | Control| | | | Control| |
| |Firewall| | | |Firewall| |
| |Monitor | | | |Monitor | |
+------------+ +------------+
| |
+-----------+ +-----------+
| Firewall | | Firewall |
| Antivirus | | Antivirus |
+-----------+ +-----------+
| |
+-----------------+ +---------------+
|Monitoring Tools | | Monitoring Tool|
+-----------------+ +--------------+
Diagram for Host Security
- Diagram Components:
1. Host hardware.
2. Virtualization layer (hypervisor).
3. Virtual machines with access control, firewall, and monitoring.
Data Security
Data security involves protecting data stored, processed, or transmitted in the
cloud. It ensures that data remains confidential, available, and unaltered.
2. Access Control
- Restricts access to data based on user roles.
- Example: Ensuring that only the HR team can access employee data.
4. Data Masking
- Hides sensitive information by replacing it with dummy data.
- Example: Masking credit card details while processing transactions.
5. Secure Transmission
- Protects data during transmission using secure protocols like HTTPS and
VPNs.
+----------------------------+
| Encrypted Data |
| Storage |
+----------------------------+
|
v
+-------------------------------+
| Data in Transit (HTTPS/VPN) |
+-------------------------------+
|
v
+-----------------------------+
| Backup & Recovery Mechanisms |
+-----------------------------+
- Diagram Components:
1. Encrypted data storage.
2. Data in transit with HTTPS/VPN.
3. Backup and recovery mechanisms.
1. Data Breaches
- Description:
A data breach occurs when unauthorized individuals gain access to sensitive
information stored in the cloud, such as personal details, financial records, or
intellectual property.
- Security Goal Affected:
Confidentiality.
The unauthorized access to sensitive data compromises its confidentiality,
violating the principle that only authorized parties should have access to certain
information.
- Impact:
Data breaches can lead to identity theft, financial loss, and a damaged
reputation for both the cloud service provider and its customers.
2. Data Loss
- Description:
Data loss happens when cloud providers experience unexpected data deletion
or corruption, often due to inadequate backup procedures or malicious attacks.
- Security Goal Affected:
Availability.
Data loss impacts the availability of the cloud service, making important data
inaccessible to users.
- Impact:
Loss of data can disrupt business operations, result in downtime, and prevent
users from accessing critical files and applications.
- Impact:
DoS attacks can cripple cloud services by rendering them temporarily
unavailable, causing downtime and affecting user productivity.
4. Account Hijacking
- Description:
Account hijacking occurs when attackers gain control of a cloud user’s account,
enabling them to manipulate, steal, or delete data. This can be achieved through
phishing attacks or exploiting weak passwords.
- Security Goal Affected:
Confidentiality and Integrity.
Attackers can access confidential data and modify it, affecting both
confidentiality and the integrity of the system.
- Impact:
Account hijacking allows malicious users to steal sensitive data, manipulate
cloud services, or even disrupt the business operations of the compromised
organization.
1. Data Breaches
- Description:
CSA identifies data breaches as a top threat due to the vast amount of
sensitive data stored in the cloud. Breaches can lead to unauthorized access,
data theft, or loss of confidentiality.
- Security Goal Affected:
Confidentiality.
When data is exposed to unauthorized parties, the confidentiality of that data
is compromised.
A Firewall is a security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. Firewalls are essential
components in any network security architecture, providing a barrier between a
trusted internal network and untrusted external networks such as the internet.
Firewalls help prevent unauthorized access and can block potentially harmful
activities.
Types of Firewalls
There are several types of firewalls, each offering different methods of
controlling network traffic:
3. Proxy Firewall
- Description:
A proxy firewall acts as an intermediary between the user and the service they
wish to access. The proxy firewall makes the request to the destination server
on behalf of the client, and the server responds to the proxy, which then
forwards the response back to the client. This prevents direct communication
between the client and the server, ensuring privacy and security.
- Function:
Proxy firewalls provide anonymity, content filtering, and can perform deep
packet inspection. They are highly secure but can add latency due to the extra
step in communication.
Functions of Firewalls
1. Traffic Filtering
- Description:
Firewalls filter network traffic based on rules and policies. They analyze
incoming and outgoing packets and either allow or block them based on criteria
such as IP address, protocol, and port number.
- Example:
A firewall may allow traffic from a trusted IP but block all traffic from
untrusted sources.
2. Network Segmentation
- Description:
Firewalls help segment networks into different zones, such as a public zone
(DMZ), private zone, and internal network. This segmentation makes it easier to
protect critical resources by isolating them from less trusted parts of the
network.
- Example:
A firewall might place web servers in a DMZ so that they are isolated from the
internal network, reducing the risk of attacks.
4. VPN Support
- Description:
Many firewalls support Virtual Private Networks (VPNs), allowing secure
remote access to internal resources. A VPN ensures that data transmitted
between a user and the network is encrypted, preventing unauthorized access.
- Example:
A company can provide secure remote access to employees working from home
using VPN functionality supported by the firewall.
+---------------------+
| INTERNET |
| (External Network) |
+---------------------+
|
|
v
+---------------------+
| FIREWALL |
| (Security Barrier) |
+---------------------+
/ \
/ \
v v
+------------------+ +---------------------+
| INTERNAL | | VPN (Secure) |
| NETWORK | | (Remote Access) |
| (Private Network)| +---------------------+
+------------------+
|
v
+---------------------+
| Logs & Monitoring |
| (Traffic Analysis) |
+---------------------+
Diagram Explanation
1. Internet: The external network (public) where potential threats originate.
2. Firewall: The security barrier that checks all incoming and outgoing traffic.
3. Internal Network: The protected network (private) that contains sensitive
information.
4. VPN: Secure channel allowing authorized users to access the internal network
remotely.
5. Logs and Monitoring: The firewall keeps records of all traffic to help identify
unusual or malicious activity.