0% found this document useful (0 votes)
17 views40 pages

Basics of Cloud Computing

Cloud computing refers to the storage and access of data and programs on remote servers via the internet, allowing for services like data backup, software delivery, and application development. Key components of cloud architecture include front-end clients, back-end servers, and various services such as SaaS, PaaS, and IaaS. The advantages of cloud computing include scalability, security, and ease of collaboration, while it also presents challenges like dependency on internet connectivity and potential data security concerns.

Uploaded by

mikyrayan532
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views40 pages

Basics of Cloud Computing

Cloud computing refers to the storage and access of data and programs on remote servers via the internet, allowing for services like data backup, software delivery, and application development. Key components of cloud architecture include front-end clients, back-end servers, and various services such as SaaS, PaaS, and IaaS. The advantages of cloud computing include scalability, security, and ease of collaboration, while it also presents challenges like dependency on internet connectivity and potential data security concerns.

Uploaded by

mikyrayan532
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

BASICS OF CLOUD

COMPUTING
I- Introduction

☞ Why the Name Cloud?


The term “Cloud” came from a network design that was
used by network engineers to represent the location of various
network devices and their inter-connection. The shape of this
network design was like a cloud.

☞ What is Cloud Computing?


Cloud computing means storing and accessing the
data and programs on remote servers that are hosted on the
internet instead of the computer’s hard drive or local server.
Cloud computing is also referred to as Internet-based
computing, it is a technology where the resource is provided
as a service through the Internet to the user. The data which
is stored can be files, images, documents, or any other
storable document.
Some operations which can be performed with cloud computing are –
• Storage, backup, and recovery of data
• Delivery of software on demand
• Development of new applications and services
• Streaming videos and audio
Cloud Computing Service Provider’s :
Cloud computing is in huge demand so, big organization providing the service
like Amazon AWS, Microsoft Azure, Google Cloud, Alibaba cloud etc. are some
Cloud Computing service Provider.

II- Cloud Computing Architecture:


Cloud computing architecture refers to
the components and sub-components required
for cloud computing. These components
typically refer to:
1. Front end (fat client, thin client)
2. Back-end platforms (servers, storage)
3. Cloud-based delivery and a network
(Internet, Intranet, Intercloud)

☞ Front End:

The client uses the front end, which contains a client-side interface and
application. Both of these components are important to access the Cloud computing
platform. The front end includes web servers (Chrome, Firefox, Opera, etc.), clients, and
mobile devices.

☞ Back End:
The backend part helps you manage all the resources needed to provide Cloud
computing services. This Cloud architecture part includes a security mechanism, a large
amount of data storage, servers, virtual machines, traffic control mechanisms, etc.

Backend refers to the cloud itself which is used by the service provider. It contains the
resources as well as manages the resources and provides security mechanisms. Along with
this, it includes huge storage, virtual applications, virtual machines, traffic control
mechanisms, deployment models, etc.

1. Application– Application in backend refers to a software or platform to which


client accesses. Means it provides the service in backend as per the client requirement.
2. Service – Service in backend refers to the major three types of cloud-based services
like SaaS, PaaS and IaaS. Also manages which type of service the user accesses.
3. RuntimeCloud- Runtime cloud in backend provides the execution and Runtime
platform/environment to the Virtual machine.
4. Storage– Storage in backend provides flexible and scalable storage service and
management of stored data.
5. Infrastructure– Cloud Infrastructure in backend refers to the hardware and
software components of cloud like it includes servers, storage, network devices, virtualization
software etc.
6. Management– Management in backend refers to management of backend
components like application, service, runtime cloud, storage, infrastructure, and other security
mechanisms etc.
7. Security– Security in backend refers to implementation of different security
mechanisms in the backend for secure cloud resources, systems, files, and infrastructure to
end-users.
8. Internet– Internet connection acts as the medium or a bridge between frontend and
backend and establishes the interaction and communication between frontend and backend.
9. Database– Database in backend refers to provide database for storing structured
data, such as SQL and NOSQL databases. Example of Databases services include Amazon
RDS, Microsoft Azure SQL database and Google CLoud SQL.
10. Networking– Networking in backend services that provide networking
infrastructure for application in the cloud, such as load balancing, DNS and virtual private
networks.
11. Analytics– Analytics in backend service that provides analytics capabillities for
data in the cloud, such as warehousing, bussness intellegence and machine learning.

III- Important Components of Cloud Computing


Architecture
Here are some important components of Cloud computing architecture:

1. Client Infrastructure

Client Infrastructure is a front-end component that provides a GUI. It helps users to


interact with the Cloud.

2. Application

The application can be any software or platform which a client wants to access.

3. Service

The service component manages which type of service you can access according to
the client’s requirements.

Three Cloud computing services are:

• Software as a Service (SaaS)


• Platform as a Service (PaaS)
• Infrastructure as a Service (IaaS)

4. Runtime Cloud

Runtime cloud offers the execution and runtime environment to the virtual machines.

5. Storage

Storage is another important Cloud computing architecture component. It provides a


large amount of storage capacity in the Cloud to store and manage data.

6. Infrastructure

It offers services on the host level, network level, and application level. Cloud
infrastructure includes hardware and software components like servers, storage, network
devices, virtualization software, and various other storage resources that are needed to support
the cloud computing model.

7. Management

This component manages components like application, service, runtime cloud,


storage, infrastructure, and other security matters in the backend. It also establishes
coordination between them.

8. Security

Security in the backend refers to implementing different security mechanisms for


secure Cloud systems, resources, files, and infrastructure to the end-user.

9. Internet

Internet connection acts as the bridge or medium between frontend and backend. It
allows you to establish the interaction and communication between the frontend and backend.

IV- Characteristics of Cloud Computing


There are many characteristics of Cloud Computing here are few of them:
1. On-demand self-services: The Cloud computing services does not require any human
administrators, user themselves are able to provision, monitor and manage computing
resources as needed.
2. Broad network access: The Computing services are generally provided over standard
networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT resources that are able to
scale out and in quickly and on as needed basis. Whenever the user require services it is
provided to him and it is scale out as soon as its requirement gets over.
4. Resource pooling: The IT resource (e.g., networks, servers, storage, applications, and
services) present are shared across multiple applications and occupant in an uncommitted
manner. Multiple clients are provided service from a same physical resource.
5. Measured service: The resource utilization is tracked for each application and
occupant; it will provide both the user and the resource provider with an account of what has
been used. This is done for various reasons like monitoring billing and effective use of
resource.
6. Multi-tenancy: Cloud computing providers can support multiple tenants (users or
organizations) on a single set of shared resources.
7. Virtualization: Cloud computing providers use virtualization technology to abstract
underlying hardware resources and present them as logical resources to users.
8. Resilient computing: Cloud computing services are typically designed with
redundancy and fault tolerance in mind, which ensures high availability and reliability.
9. Flexible pricing models: Cloud providers offer a variety of pricing models, including
pay-per-use, subscription-based, and spot pricing, allowing users to choose the option that
best suits their needs.
10. Security: Cloud providers invest heavily in security measures to protect their users’
data and ensure the privacy of sensitive information.
11. Automation: Cloud computing services are often highly automated, allowing users to
deploy and manage resources with minimal manual intervention.
12. Sustainability: Cloud providers are increasingly focused on sustainable practices,
such as energy-efficient data centers and the use of renewable energy sources, to reduce their
environmental impact.
Fig – characteristics of cloud computing

V- Advantages of Cloud Computing:


1. Scalability: One of the best advantages of cloud computing is scalability. Maintaining a
business, organization, or another element is trying in ideal circumstances. Whether you need
to develop forcefully or carefully or downsize decisively during seasons of unrest, cloud
computing is a business resource you pay for just as and when you want it.
2. Security: According to certain reports, small private companies are multiple times more
likely to suffer a cyberattack than large organizations. That most likely shocks numerous
owners of companies. The reasons are obvious, but — only 33% of organizations with four
or fewer representatives register hacks as a danger.
3. Accessible to modern technology: Cloud computing is far more than an internet-based
storage service for data. Organizations worldwide currently use cutting-edge technologies
they need to get done with their responsibilities and run their business over the web utilizing
the cloud. Some technology available on a cloud platform includes Artificial Intelligence and
Machine Learning, Data Analytics, Data Visualization, Containerization, etc.
4. Cheaper: The cloud computing model is based on the ‘pay-as-you-go’ principle and offers
a possibly less expensive way for organizations to remain coordinated and online.
Organizations don’t have to look at, search for, and buy actual physical infrastructure when
they have a dependable cloud computing partner.
5. Mobility: One of the main advantages of cloud computing is mobility. Employees have the
option to compute heavy tasks from anywhere. Work-life balance and working from home on
everyone’s brains nowadays, information and workflow through the cloud introduces itself
as a sensible investment.
6. Easy Collaboration: A benefit of distributed computing firmly connected with mobility is
simple collaboration. It’s one thing to take your platform, administration, and information
mobile. It’s one more challenge to gather all the data gathered by your company’s agents,
organize it, and ensure there are no errors or duplicates. Cloud services mean less complex
and less mistake-inclined coordination between organizations, departments, clients,
customers, etc. There’s less time expected to exchange information and reach a significant
conclusion from it, and everyone works from a similar single source of truth.
7. Prediction ability: Data analytics deserves more consideration. Cloud computing
has accomplished more powerful predictive analytics than other technologies.

VI- Cloud Storage


In Cloud Computing, Cloud storage is a virtual locker where we can remotely stash any
data. When we upload a file to a cloud-based server like Google Drive, OneDrive, or iCloud
that file gets copied over the Internet into a data server that is cloud-based actual physical
space where companies store files on multiple hard drives.

☞ The key features of cloud computing are as follows.

• It has a greater availability of resources.


• Easy maintenance is one of the key benefits of using Cloud computing.
• Cloud computing has a Large Network Access.
• It has an automatic system.
• Security is one of the major components and using cloud computing you can
secure all over the networks.

☞ There are 3 types of storage systems in the Cloud as follows.

➢ Block-Based Storage System

• Hard drives are block-based storage systems. Your operating system like Windows or
Linux actually sees a hard disk drive. So, it sees a drive on which you can create a volume,
and then you can partition that volume and format them.
• For example, If a system has 1000 GB of volume, then we can partition it into 800 GB
and 200 GB for local C and local D drives respectively.
• Remember with a block-based storage system, your computer would see a drive, and
then you can create volumes and partitions.

➢ File-Based Storage System

• In this, you are actually connecting through a Network Interface Card (NIC). You are
going over a network, and then you can access the network-attached storage server (NAS).
NAS devices are file-based storage systems.
• This storage server is another computing device that has another disk in it. It is already
created a file system so that it’s already formatted its partitions, and it will share its file
systems over the network. Here, you can actually map the drive to its network location.
• In this, like the previous one, there is no need to partition and format the volume by
the user. It’s already done in file-based storage systems. So, the operating system sees a file
system that is mapped to a local drive letter.

➢ Object-Based Storage System

• In this, a user uploads objects using a web browser and uploads an object to a container
i.e., Object Storage Container. This uses the HTTP Protocols with the rest of the APIs (for
example: GET, PUT, POST, SELECT, DELETE).
• For example, when you connect to any website, you need to download some images,
text, or anything that the website contains. For that, it is a code HTTP GET request. If you
want to review any product then you can use PUT and POST requests.
• Also, there is no hierarchy of objects in the container. Every file is on the same level
in an Object-Based storage system.

1- Avantages of Cloud Storage


• Scalability – Capacity and storage can be expanded and performance can be enhanced.
• Flexibility – Data can be manipulated and scaled according to the rules.
• Simpler Data Migrations – As it can add and remove new and old data when required
and eliminates disruptive data migrations.
• Recovery -In the event of a hard drive failure or other hardware malfunction, you can
access your files on the cloud.

2- Disadvantages of Cloud Storage


• Data centers require electricity and proper internet facility to operate their work,
failing which system will not work properly.
• Support for cloud storage isn’t the best, especially if you are using a free version of a
cloud provider.
• When you use a cloud provider, your data is no longer on your physical storage.
• Cloud-based storage is dependent on having an internet connection. If you are on a
slow network, you may have issues accessing your storage.

3- How Cloud Storage Benefits Businesses


Businesses with handling of the data storage and its needs to save a significant amount
of space and money by eliminating the need for data storage infrastructure on business
premises. All necessary hardware and software data are maintained with the help of the
storage provider so the cloud users don’t have to. Cloud Storage benefits businesses in all
possible ways i.e., ease of work, data retention, data security and employee benefits are also
a perk of using cloud storage.
Cloud has helped employees to collaborate and work with their colleagues, also remote
work is benefited by the cloud even in business hours at the personal level, cloud storage
allows mobile data and enables digital life in the holistic way we live it today. Without the
cloud, smartphones would not be able to be the interface of so much data (photos, documents,
information on the go. Cloud storage is used usually to store files and can also have a positive
effect on the environment since it cuts down energy consumption.
VII- Cloud infrastructure
Cloud infrastructure consists of servers, storage, network, management software, and
deployment software and platform virtualization.

HYPERVISOR
Hypervisor is a firmware or low-level program that acts as a Virtual Machine
Manager. It allows to share the single physical instance of cloud resources between several
tenants.

MANAGEMENT SOFTWARE
Management Software helps to maintain and configure the infrastructure.

DEPLOYMENT SOFTWARE
Deployment software helps to deploy and integrate the application on the cloud.

NETWORK
Network is the key component of cloud infrastructure. It allows to connect cloud
services over the Internet. It is also possible to deliver network as a utility over the Internet,
i.e., the consumer can customize the network route and protocol.

SERVER
Server helps to compute the resource sharing and offer other services such as resource
allocation and deallocation, monitoring resources, security, etc.

STORAGE
Cloud uses distributed file system for storage purpose. If one of the storage resource
fails, then it can be extracted from another one which makes cloud computing more reliable.
Infrastructural Constraints: Fundamental constraints that cloud
infrastructure should implement are shown in the following diagram:

TRANSPARENCY
Since virtualization is the key to share resources in cloud environment. But it is not possible
to satisfy the demand with single resource or server. Therefore, there must be transparency
in resources, load balancing and application, so that we can scale them on demand.
SCALABILITY
Scaling up an application delivery solution is not that easy as scaling up an application
because it involves configuration overhead or even re-architecting the network. So,
application delivery solution is need to be scalable which will require the virtual
infrastructure such that resource can be provisioned and de-provisioned easily.
INTELLIGENT MONITORING
To achieve transparency and scalability, application solution delivery will need to be
capable of intelligent monitoring.
SECURITY
The mega data center in the cloud should be securely architected. Also, the control node, a
entry point in mega data center also needs to be secure.
Cloud Deployment Models
and Services
I- What is a Cloud Deployment Model?
Cloud Deployment Model functions as a virtual computing environment with a
deployment architecture that varies depending on the amount of data you want to store and
who has access to the infrastructure.

II- Types of Cloud Computing Deployment


Models
The cloud deployment model identifies the specific type of cloud environment based
on ownership, scale, and access, as well as the cloud’s nature and purpose. The location of
the servers you’re utilizing and who controls them are defined by a cloud deployment model.
It specifies how your cloud infrastructure will look, what you can change, and whether you
will be given services or will have to create everything yourself. Relationships between the
infrastructure and your users are also defined by cloud deployment types. Different types of
cloud computing deployment models are described below.
• Public Cloud
• Private Cloud
• Hybrid Cloud
• Community Cloud
• Multi-Cloud

1- Public Cloud
The public cloud makes it possible for anybody to access systems and services. The public
cloud may be less secure as it is open to everyone. The public cloud is one in which cloud
infrastructure services are provided over the internet to the general people or major industry
groups. The infrastructure in this cloud model is owned by the entity that delivers the cloud
services, not by the consumer. It is a type of cloud hosting that allows customers and users to
easily access systems and services. This form of cloud computing is an excellent example of
cloud hosting, in which service providers supply services to a variety of customers. In this
arrangement, storage backup and retrieval services are given for free, as a subscription, or on
a per-user basis. For example, Google App Engine etc.

Public Cloud

Advantages of the Public Cloud Model

• Minimal Investment: Because it is a pay-per-use service, there is no substantial


upfront fee, making it excellent for enterprises that require immediate access to
resources.
• No setup cost: The entire infrastructure is fully subsidized by the cloud service
providers, thus there is no need to set up any hardware.
• Infrastructure Management is not required: Using the public cloud does not
necessitate infrastructure management.
• No maintenance: The maintenance work is done by the service provider (not
users).
• Dynamic Scalability: To fulfill your company’s needs, on-demand resources are
accessible.
Disadvantages of the Public Cloud Model

• Less secure: Public cloud is less secure as resources are public so there is no
guarantee of high-level security.
• Low customization: It is accessed by many public so it can’t be customized
according to personal requirements.

2- Private Cloud

The private cloud deployment model is the exact opposite of the public cloud deployment
model. It’s a one-on-one environment for a single user (customer). There is no need to share
your hardware with anyone else. The distinction between private and public clouds is in how
you handle all of the hardware. It is also called the “internal cloud” & it refers to the ability
to access systems and services within a given border or organization. The cloud platform is
implemented in a cloud-based secure environment that is protected by powerful firewalls and
under the supervision of an organization’s IT department. The private cloud gives greater
flexibility of control over cloud resources.

Private Cloud

Advantages of the Private Cloud Model

• Better Control: You are the sole owner of the property. You gain complete
command over service integration, IT operations, policies, and user behavior.
• Data Security and Privacy: It’s suitable for storing corporate information to
which only authorized staff have access. By segmenting resources within the same
infrastructure, improved access and security can be achieved.
• Supports Legacy Systems: This approach is designed to work with legacy
systems that are unable to access the public cloud.
• Customization: Unlike a public cloud deployment, a private cloud allows a
company to tailor its solution to meet its specific needs.
Disadvantages of the Private Cloud Model

• Less scalable: Private clouds are scaled within a certain range as there is less
number of clients.
• Costly: Private clouds are more costly as they provide personalized facilities.

3- Hybrid Cloud

By bridging the public and private worlds with a layer of proprietary software, hybrid
cloud computing gives the best of both worlds. With a hybrid solution, you may host the app
in a safe environment while taking advantage of the public cloud’s cost savings.
Organizations can move data and applications between different clouds using a combination
of two or more cloud deployment methods, depending on their needs.

Hybrid Cloud

Advantages of the Hybrid Cloud Model

• Flexibility and control: Businesses with more flexibility can design personalized
solutions that meet their particular needs.
• Cost: Because public clouds provide scalability, you’ll only be responsible for
paying for the extra capacity if you require it.
• Security: Because data is properly separated, the chances of data theft by attackers
are considerably reduced.
Disadvantages of the Hybrid Cloud Model

• Difficult to manage: Hybrid clouds are difficult to manage as it is a combination of


both public and private cloud. So, it is complex.
• Slow data transmission: Data transmission in the hybrid cloud takes place through
the public cloud so latency occurs.

4- Community Cloud
It allows systems and services to be accessible by a group of organizations. It is a
distributed system that is created by integrating the services of different clouds to address the
specific needs of a community, industry, or business. The infrastructure of the community
could be shared between the organization which has shared concerns or tasks. It is generally
managed by a third party or by the combination of one or more organizations in the
community.

Community Cloud
Advantages of the Community Cloud Model

• Cost Effective: It is cost-effective because the cloud is shared by multiple


organizations or communities.
• Security: Community cloud provides better security.
• Shared resources: It allows you to share resources, infrastructure, etc. with
multiple organizations.
• Collaboration and data sharing: It is suitable for both collaboration and data
sharing.
Disadvantages of the Community Cloud Model

• Limited Scalability: Community cloud is relatively less scalable as many


organizations share the same resources according to their collaborative interests.
• Rigid in customization: As the data and resources are shared among different
organizations according to their mutual interests if an organization wants some
changes according to their needs they cannot do so because it will have an impact
on other organizations.

5- Multi-Cloud

We’re talking about employing multiple cloud providers at the same time under this
paradigm, as the name implies. It’s similar to the hybrid cloud deployment approach, which
combines public and private cloud resources. Instead of merging private and public clouds,
multi-cloud uses many public clouds. Although public cloud providers provide numerous
tools to improve the reliability of their services, mishaps still occur. It’s quite rare that two
distinct clouds would have an incident at the same moment. As a result, multi-cloud
deployment improves the high availability of your services even more.

Multi-Cloud
Advantages of the Multi-Cloud Model

• You can mix and match the best features of each cloud provider’s services to suit
the demands of your apps, workloads, and business by choosing different cloud
providers.
• Reduced Latency: To reduce latency and improve user experience, you can
choose cloud regions and zones that are close to your clients.

• High availability of service: It’s quite rare that two distinct clouds would have
an incident at the same moment. So, the multi-cloud deployment improves the high
availability of your services.

Disadvantages of the Multi-Cloud Model

• Complex: The combination of many clouds makes the system complex and
bottlenecks may occur.
• Security issue: Due to the complex structure, there may be loopholes to which a
hacker can take advantage hence, makes the data insecure.

III- What is the Right Choice for Cloud


Deployment Model?
As of now, no such approach fits picking a cloud deployment model. We will always
consider the best cloud deployment model as per our requirements. Here are some factors
which should be considered before choosing the best deployment model.

• Cost: Cost is an important factor for the cloud deployment model as it tells how
much amount you want to pay for these things.
• Scalability: Scalability tells about the current activity status and how much we
can scale it.
• Easy to use: It tells how much your resources are trained and how easily can you
manage these models.
• Compliance: Compliance tells about the laws and regulations which impact the
implementation of the model.
• Privacy: Privacy tells about what data you gather for the model.
Each model has some advantages and some disadvantages, and the selection of the
best is only done on the basis of your requirement. If your requirement changes, you can
switch to any other model.
IV- Overall Analysis of Cloud Deployment Models
The overall Analysis of these models with respect to different factors is described below.

Private Community Hybrid


Factors Public Cloud Cloud Cloud Cloud

Complex, Complex, Complex,


requires a requires a requires a
Initial Setup Easy
professional professional professional
team to setup team to setup team to setup

Scalability
and High High Fixed High
Flexibility

Distributed cost Between


Cost-
Cost-Effective Costly among public and
Comparison
members private cloud

Reliability Low Low High High

Data
Low High High High
Security

Data
Low High High High
Privacy
Models of Cloud Computing
Services
Cloud Computing helps in rendering several services according to roles, companies, etc.
Cloud computing models are explained below.

• Infrastructure as a service (IaaS)


• Platform as a service (PaaS)
• Software as a service (SaaS)

1. Infrastructure as a service (IaaS)

Infrastructure as a Service (IaaS) helps in delivering computer infrastructure on an


external basis for supporting operations. Generally, IaaS provides services to networking
equipment, devices, databases, and web servers.
Infrastructure as a Service (IaaS) helps large organizations, and large enterprises in managing
and building their IT platforms. This infrastructure is flexible according to the needs of the
client.
Advantages of IaaS
• IaaS is cost-effective as it eliminates capital expenses.
• IaaS cloud provider provides better security than any other software.
• IaaS provides remote access.
Disadvantages of IaaS
• In IaaS, users have to secure their own data and applications.
• Cloud computing is not accessible in some regions of the World.

Characteristics
Here are the characteristics of IaaS service model:
• Virtual machines with pre-installed software.
• Virtual machines with pre-installed Operating Systems such as Windows, Linux, and
Solaris.
• On-demand availability of resources.
• Allows to store copies of particular data in different locations.
• The computing resources can be easily scaled up and down.

2. Platform as a service (PaaS)

Platform as a Service (PaaS) is a type of cloud computing that helps developers to build
applications and services over the Internet by providing them with a platform.
PaaS helps in maintaining control over their business applications.

Advantages of PaaS
• PaaS is simple and very much convenient for the user as it can be accessed via a
web browser.
• PaaS has the capabilities to efficiently manage the lifecycle.
Disadvantages of PaaS
• PaaS has limited control over infrastructure as they have less control over the
environment and are not able to make some customizations.
• PaaS has a high dependence on the provider.

Characteristics
Here are the characteristics of PaaS service model:
• PaaS offers browser-based development environment. It allows the developer to
create database and edit the application code either via Application Programming Interface
or point-and-click tools.
• PaaS provides built-in security, scalability, and web service interfaces.
• PaaS provides built-in tools for defining workflow and approval processes and
defining business rules.
• It is easy to integrate with other applications on the same platform.
• PaaS also provides web services interfaces that allow us to connect the applications
outside the platform.

3. Software as a service (SaaS)

Software as a Service (SaaS) is a type of cloud computing model that is the work of
delivering services and applications over the Internet. The SaaS applications are called Web-
Based Software or Hosted Software.
SaaS has around 60 percent of cloud solutions and due to this, it is mostly preferred by
companies.

Advantages of SaaS
• SaaS can access app data from anywhere on the Internet.
• SaaS provides easy access to features and services.
Disadvantages of SaaS
• SaaS solutions have limited customization, which means they have some
restrictions within the platform.
• SaaS has little control over the data of the user.
• SaaS are generally cloud-based, they require a stable internet connection for
proper working.

Characteristics

Here are the characteristics of SaaS service model:

• SaaS makes the software available over the Internet.

• The Software are maintained by the vendor rather than where they are running.

• The license to the software may be subscription based or usage based. And it is
billed on recurring basis.
• SaaS applications are cost effective since they do not require any maintenance at
end user side.

• They are available on demand.

• They can be scaled up or down on demand.

• They are automatically upgraded and updated.

• SaaS offers share data model. Therefore, multiple users can share single instance of
infrastructure. It is not required to hard code the functionality for individual users.

• All users are running same version of the software

Cloud Management in Cloud


Computing
Cloud computing management is maintaining and controlling the cloud services and
resources be it public, private or hybrid. Some of its aspects include load balancing,
performance, storage, backups, capacity, deployment etc. To do so a cloud managing
personnel needs full access to all the functionality of resources in the cloud. Different
software products and technologies are combined to provide a cohesive cloud management
strategy and process.

1- Need of Cloud Management:


Cloud is nowadays preferred by huge organizations as their primary data storage. A
small downtime or an error can cause a great deal of loss and inconvenience for the
organizations. So as to design, handle and maintain a cloud computing service specific
members are responsible who make sure things work out as supposed and all arising issues
are addressed.

2- Cloud Management Platform:


A cloud management platform is a software solution that has a robust and extensive
set of APIs that allow it to pull data from every corner of the IT infrastructure. A CMP
allows an IT organization to establish a structured approach to security and IT governance
that can be implemented across the organization’s entire cloud environment.

3- Cloud Management Tasks:


The below figure represents different cloud management tasks:

Cloud Management Tasks


• Auditing System Backups: It is required to audit the backups from time to
time to ensure restoration of randomly selected files of different users. This might be done by
the organization or by the cloud provider.
• Flow of data in the system: The managers are responsible for designing a data
flow diagram that shows how the data is supposed to flow throughout the organization.
• Vendor Lock-In: The managers should know how to move their data from a
server to another in case the organization decides to switch providers.
• Knowing provider’s security procedures: The managers should know the
security plans of the provider, especially Multitenant use, E-commerce processing, Employee
screening and Encryption policy.
• Monitoring the Capacity, Planning and Scaling abilities: The manager
should know if their current cloud provider is going to meet their organization’s demand in
the future and also their scaling capabilities.
• Monitoring audit log: In order to identify errors in the system, logs are audited
by the managers on a regular basis.
• Solution Testing and Validation: It is necessary to test the cloud services and
verify the results and for error-free solutions.

Virtualization in Cloud
Computing and Types
Virtualization is a technique how to separate a service from the underlying physical
delivery of that service. It is the process of creating a virtual version of something like
computer hardware. It was initially developed during the mainframe era. It involves using
specialized software to create a virtual or software-created version of a computing resource
rather than the actual version of the same resource. With the help of Virtualization, multiple
operating systems and applications can run on the same machine and its same hardware at the
same time, increasing the utilization and flexibility of hardware.
In other words, one of the main cost-effective, hardware-reducing, and energy-saving
techniques used by cloud providers is Virtualization. Virtualization allows sharing of a single
physical instance of a resource or an application among multiple customers and organizations
at one time. It does this by assigning a logical name to physical storage and providing a pointer
to that physical resource on demand. The term virtualization is often synonymous with
hardware virtualization, which plays a fundamental role in efficiently delivering
Infrastructure-as-a-Service (IaaS) solutions for cloud computing. Moreover, virtualization
technologies provide a virtual environment for not only executing applications but also for
storage, memory, and networking .

• Host Machine: The machine on which the virtual machine is going to be built is
known as Host Machine.
• Guest Machine: The virtual machine is referred to as a Guest Machine

I. Work of Virtualization in Cloud Computing


Virtualization has a prominent impact on Cloud Computing. In the case of cloud
computing, users store data in the cloud, but with the help of Virtualization, users have the
extra benefit of sharing the infrastructure. Cloud Vendors take care of the required physical
resources, but these cloud providers charge a huge amount for these services which impacts
every user or organization. Virtualization helps Users or Organisations in maintaining those
services which are required by a company through external (third-party) people, which helps
in reducing costs to the company. This is the way through which Virtualization works in
Cloud Computing.

Benefits of Virtualization
• More flexible and efficient allocation of resources.
• Enhance development productivity.
• It lowers the cost of IT infrastructure.
• Remote access and rapid scalability.
• High availability and disaster recovery.
• Pay peruse of the IT infrastructure on demand.
• Enables running multiple operating systems.

Drawback of Virtualization
• High Initial Investment: Clouds have a very high initial investment, but it is also
true that it will help in reducing the cost of companies.
• Learning New Infrastructure: As the companies shifted from Servers to Cloud, it
requires highly skilled staff who have skills to work with the cloud easily, and for
this, you have to hire new staff or provide training to current staff.
• Risk of Data: Hosting data on third-party resources can lead to putting the data at
risk, it has the chance of getting attacked by any hacker or cracker very easily.

II. Characteristics of Virtualization


• Increased Security: The ability to control the execution of a guest program in a
completely transparent manner opens new possibilities for delivering a secure,
controlled execution environment. All the operations of the guest programs are
generally performed against the virtual machine, which then translates and applies
them to the host programs.
• Managed Execution: In particular, sharing, aggregation, emulation, and isolation
are the most relevant features.
• Sharing: Virtualization allows the creation of a separate computing environment
within the same host.
• Aggregation: It is possible to share physical resources among several guests, but
virtualization also allows aggregation, which is the opposite process.
III. Types of Virtualizations
1. Application Virtualization
2. Network Virtualization
3. Desktop Virtualization
4. Storage Virtualization
5. Server Virtualization
6. Data virtualization

1. Application Virtualization: Application virtualization helps a user to have remote access


to an application from a server. The server stores all personal information and other
characteristics of the application but can still run on a local workstation through the internet.
An example of this would be a user who needs to run two different versions of the same
software. Technologies that use application virtualization are hosted applications and
packaged applications.
2. Network Virtualization: The ability to run multiple virtual networks with each having a
separate control and data plan. It co-exists together on top of one physical network. It can be
managed by individual parties that are potentially confidential to each other. Network
virtualization provides a facility to create and provision virtual networks, logical switches,
routers, firewalls, load balancers, Virtual Private Networks (VPN), and workload security
within days or even weeks.
3. Desktop Virtualization: Desktop virtualization allows the users’ OS to be remotely stored
on a server in the data center. It allows the user to access their desktop virtually, from any
location by a different machine. Users who want specific operating systems other than
Windows Server will need to have a virtual desktop. The main benefits of desktop
virtualization are user mobility, portability, and easy management of software installation,
updates, and patches.
4. Storage Virtualization: Storage virtualization is an array of servers that are managed by a
virtual storage system. The servers aren’t aware of exactly where their data is stored and
instead function more like worker bees in a hive. It makes managing storage from multiple
sources be managed and utilized as a single repository. storage virtualization software
maintains smooth operations, consistent performance, and a continuous suite of advanced
functions despite changes, breaks down, and differences in the underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the masking of server
resources takes place. Here, the central server (physical server) is divided into multiple
different virtual servers by changing the identity number, and processors. So, each system can
operate its operating systems in an isolated manner. Where each sub-server knows the identity
of the central server. It causes an increase in performance and reduces the operating cost by
the deployment of main server resources into a sub-server resource. It’s beneficial in virtual
migration, reducing energy consumption, reducing infrastructural costs, etc.
6. Data Virtualization: This is the kind of virtualization in which the data is collected
from various sources and managed at a single place without knowing more about the technical
information like how data is collected, stored & formatted then arranged that data logically
so that its virtual view can be accessed by its interested people and stakeholders, and users
through the various cloud services remotely. Many big giant companies are providing their
services like Oracle, IBM, At scale, Cdata, etc.

IV. Uses of Virtualization


• Data-integration
• Business-integration
• Service-oriented architecture data-services
• Searching organizational data

V. Hardware Based Virtualization


A platform virtualization approach that allows efficient full virtualization with the help of
hardware capabilities, primarily from the host processor is referred to as Hardware based
virtualization in computing. To simulate a complete hardware environment, or virtual
machine, full virtualization is used in which an unchanged guest operating system (using the
common instruction set as the host machine) executes in sophisticated isolation.

The different logical layers of operating system-based virtualization, in which the VM is


first installed into a full host operating system and subsequently used to generate virtual
machines.

An abstract execution environment in terms of computer hardware in which guest OS can


be run, referred to as Hardware-level virtualization. In this, an operating system represents
the guest, the physical computer hardware represents a host, its emulation represents a virtual
machine, and the hypervisor represents the Virtual Machine Manager. When the virtual
machines are allowed to interact with hardware without any intermediary action requirement
from the host operating system generally makes hardware-based virtualization more efficient.
A fundamental component of hardware virtualization is the hypervisor, or virtual machine
manager (VMM).

Basically, there are two types of Hypervisors which are described below:
The hypervisor is a firmware or low-level program that acts as a Virtual Machine Manager.
There are two types of hypervisors:

• Type-I hypervisors: Hypervisors of type I run directly on top of the hardware. As


a result, they stand in for operating systems and communicate directly with the
ISA interface offered by the underlying hardware, which they replicate to allow
guest operating systems to be managed. Because it runs natively on hardware, this
sort of hypervisor is also known as a native virtual machine.
• Type-II hypervisors: To deliver virtualization services, Type II hypervisors
require the assistance of an operating system. This means they’re operating
system-managed applications that communicate with it via the ABI and simulate
the ISA of virtual hardware for guest operating systems. Because it is housed
within an operating system, this form of hypervisor is also known as a hosted
virtual machine.

A hypervisor has a simple user interface that needs some storage space. It exists as a thin
layer of software and to establish a virtualization management layer, it does hardware
management function. For the provisioning of virtual machines, device drivers and support
software are optimized while many standard operating system functions are not implemented.
Essentially, to enhance performance overhead inherent to the coordination which allows
multiple VMs to interact with the same hardware platform this type of virtualization system
is used.

Hardware compatibility is another challenge for hardware-based virtualization. The


virtualization layer interacts directly with the host hardware, which results that all the
associated drivers and support software must be compatible with the hypervisor. As hardware
devices drivers available to other operating systems may not be available to hypervisor
platforms similarly. Moreover, host management and administration features may not contain
the range of advanced functions that are common to the operating systems.

features of hardware-based virtualization are:

➢ Isolation: Hardware-based virtualization provides strong isolation between virtual


machines, which means that any problems in one virtual machine will not affect other virtual
machines running on the same physical host.
➢ Security: Hardware-based virtualization provides a high level of security as each
virtual machine is isolated from the host operating system and other virtual machines, making
it difficult for malicious code to spread from one virtual machine to another.
➢ Performance: Hardware-based virtualization provides good performance as the
hypervisor has direct access to the physical hardware, which means that virtual machines can
achieve close to native performance.
➢ Resource allocation: Hardware-based virtualization allows for flexible allocation of
hardware resources such as CPU, memory, and I/O bandwidth to virtual machines.
➢ Snapshot and migration: Hardware-based virtualization allows for the creation of
snapshots, which can be used for backup and recovery purposes. It also allows for live
migration of virtual machines between physical hosts, which can be used for load balancing
and other purposes.
➢ Support for multiple operating systems: Hardware-based virtualization supports
multiple operating systems, which allows for the consolidation of workloads onto fewer
physical machines, reducing hardware and maintenance costs.
➢ Compatibility: Hardware-based virtualization is compatible with most modern
operating systems, making it easy to integrate into existing IT infrastructure.
➢ Advantages of hardware-based virtualization –
It reduces the maintenance overhead of paravirtualization as it reduces (ideally, eliminates)
the modification in the guest operating system. It is also significantly convenient to attain
enhanced performance. A practical benefit of hardware-based virtualization has been
mentioned by VMware engineers and Virtual Iron.
➢ Disadvantages of hardware-based virtualization –
Hardware-based virtualization requires explicit support in the host CPU, which may not
available on all x86/x86_64 processors. A “pure” hardware-based virtualization approach,
including the entire unmodified guest operating system, involves many VM traps, and thus a
rapid increase in CPU overhead occurs which limits the scalability and efficiency of server
consolidation. This performance hit can be mitigated by the use of para-virtualized drivers;
the combination has been called “hybrid virtualization”.

Cloud Security
Cloud security is the set of strategies and practices for protecting data and applications
that are hosted in the cloud. Like cyber security, cloud security is a very broad area, and it is
never possible to prevent every variety of attack. However, a well-designed cloud security
strategy vastly reduces the risk of cyber-attacks.

Even with these risks, cloud computing is often more secure than on-premise
computing. Most cloud providers have more resources for keeping data secure than individual
businesses do, which let’s cloud providers keep infrastructure up to date and patch
vulnerabilities as soon as possible. A single business, on the other hand, may not have enough
resources to perform these tasks consistently.

Note: Cloud security is not the same thing as Security-as-a-Service (SECaaS or SaaS),
which refers to security products hosted in the cloud.

I- main cloud security risks

Most cloud security risks fit into one of these general categories:

➢ Data is exposed or leaked


➢ An unauthorized user from outside the organization has access to internal data
➢ An internal, authorized user has too much access to internal data
➢ A malicious attack, such as a DDoS attack or a malware infection, cripples or destroys
cloud infrastructure

The goal of a cloud security strategy is to reduce the threat posed by these risks as much
as possible by protecting data, managing user authentication and access, and staying
operational in the face of an attack.

II- Key technologies for cloud security

A cloud security strategy should include all of the following technologies:

Encryption: Encryption is a way of scrambling data so that only authorized parties


can understand the information. If an attacker hacks into a company's cloud and finds
unencrypted data, they are able to do any number of malicious actions with the data: leak it,
sell it, use it to carry out further attacks, etc. However, if the company's data is encrypted, the
attacker will only find scrambled data that cannot be used unless they somehow discover the
decryption key (which should be almost impossible). In this way, encryption helps prevent
data leakage and exposure, even when other security measures fail.

Data can be encrypted both at rest (when it is stored) or in transit (while it is sent from
one place to another). Cloud data should be encrypted both at rest and in transit so that
attackers cannot intercept and read it. Encrypting data in transit should address both data
traveling between a cloud and a user, and data traveling from one cloud to another, as in a
multi-cloud or hybrid cloud environment. Additionally, data should be encrypted when it is
stored in a database or via a cloud storage service.

Identity and access management (IAM): Identity and access management (IAM)
products track who a user is and what they are allowed to do, and they authorize users and
deny access to unauthorized users as necessary. IAM is extremely important in cloud
computing because a user's identity and access privileges determine whether they can access
data, not the user's device or location.

IAM helps reduce the threats of unauthorized users gaining access to internal assets
and authorized users exceeding their privileges. The right IAM solution will help mitigate
several kinds of attacks, including account takeover attacks and insider threats (when a user
or employee abuses their access in order to expose data).

IAM may include several different services, or it may be a single service that combines
all of the following capabilities:

Identity providers (IdP) authenticate user identity

▪ Single sign-on (SSO) services help authenticate user identities for multiple
applications, so that users only have to sign in once to access all their cloud services
▪ Multi-factor authentication (MFA) services strengthen the user authentication
process
▪ Access control services allow and restrict user access

Firewall: A cloud firewall provides a layer of protection around cloud assets by blocking
malicious web traffic. Unlike traditional firewalls, which are hosted on-premise and defend
the network perimeter, cloud firewalls are hosted in the cloud and form a virtual security
barrier around cloud infrastructure.

Cloud firewalls block DDoS attacks, malicious bot activity, and vulnerability
exploits. This reduces the chances of a cyber-attack crippling an organization's cloud
infrastructure.

III- What other practices are important for


keeping cloud data secure?

Implementing the above technologies (plus any additional cloud security products) is
not enough, on its own, to protect cloud data. In addition to standard cyber security best
practices, organizations that use the cloud should follow these cloud security practices:

☞ Proper configuration of security settings for cloud servers: When a company does
not set up their security settings properly, it can result in a data breach. Misconfigured cloud
servers can expose data directly to the wider Internet. Configuring cloud security settings
properly requires team members who are experts in working with each cloud, and may also
require close collaboration with the cloud vendor.
☞ Consistent security policies across all clouds and data centers: Security measures
have to apply across a company's entire infrastructure, including public clouds, private clouds,
and on-premises infrastructure. If one aspect of a company's cloud infrastructure — say, their
public cloud service for big data processing — is not protected by encryption and strong user
authentication, attackers are more likely to find and target the weak link.
☞ Backup plans: As with any other type of security, there must be a plan for when things
go wrong. To prevent data from getting lost or tampered with, data should be backed up in
another cloud or on-premise. There should also be a failover plan in place so that business
processes are not interrupted if one cloud service fails. One of the advantages of multi -cloud
and hybrid cloud deployments is that different clouds can be used as backup — for instance,
data storage in the cloud can back up an on-premise database.
☞ User and employee education: A large percentage of data breaches occur because a
user was victimized by a phishing attack, unknowingly installed malware, used an outdated
and vulnerable device, or practiced poor password hygiene (reusing the same password,
writing their password down in a visible location, etc.). By educating their internal employees
about security, businesses that operate in the cloud can reduce the risk of these occurrences.
(The Cloudflare Learning Center is a good resource for security education.)

Cloud Computing Operations


Cloud computing operation refers to delivering superior cloud service. Today, cloud
computing operations have become very popular and widely employed by many of the
organizations just because it allows to perform all business operations over the Internet.
These operations can be performed using a web application or mobile based
applications.
Cloud can perform some operations. These are listed below:

• Electronic Mail (E-mail)


• Content Management
• Human Resource (HR) management
• Accounting Services
• Online Marketplace
• Systemwide Reporting
• Security

Managing Cloud Operations


There are several ways to manage day-to-day cloud operations, as shown in the
following diagram:

• Always employ right tools and resources to perform any function in the cloud.
• Things should be done at right time and at right cost.
• Selecting an appropriate resource is mandatory for operation management.
• The process should be standardized and automated to manage repetitive tasks.
• Using efficient process will eliminate the waste of efforts and redundancy.
• One should maintain the quality of service to avoid re-work later.

You might also like