0% found this document useful (0 votes)
22 views26 pages

CC - UNIT II Notes

Cloud computing architecture combines Service Oriented Architecture (SOA) and Event Driven Architecture (EDA), consisting of frontend and backend components. The frontend includes client infrastructure and user interfaces, while the backend encompasses resources, management, security, and storage. Key benefits of cloud computing include improved data processing, high security, modularity, disaster recovery, and reduced IT costs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views26 pages

CC - UNIT II Notes

Cloud computing architecture combines Service Oriented Architecture (SOA) and Event Driven Architecture (EDA), consisting of frontend and backend components. The frontend includes client infrastructure and user interfaces, while the backend encompasses resources, management, security, and storage. Key benefits of cloud computing include improved data processing, high security, modularity, disaster recovery, and reduced IT costs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

UNIT II

Cloud Computing Architecture


Architecture of cloud computing is the combination of both SOA(Service
Oriented Architecture) and EDA (Event Driven Architecture). Client
infrastructure, application, service, runtime cloud, storage, infrastructure,
management and security all these are the components of cloud computing
architecture.
The cloud architecture is divided into 2 parts, i.e.
1. Frontend
2. Backend
The below figure represents an internal architectural view of cloud
computing.

Frontend
Frontend of the cloud architecture refers to the client side of cloud computing
system. Means it contains all the user interfaces and applications which are
used by the client to access the cloud computing services/resources. For
example, use of a web browser to access the cloud platform.
2. Backend
Backend refers to the cloud itself which is used by the service provider. It
contains the resources as well as manages the resources and provides
security mechanisms. Along with this, it includes huge storage, virtual
applications, virtual machines, traffic control mechanisms, deployment
models, etc.
Components of Cloud Computing Architecture
Following are the components of Cloud Computing Architecture
1. Client Infrastructure – Client Infrastructure is a part of the frontend
component. It contains the applications and user interfaces which are
required to access the cloud platform. In other words, it provides a GUI(
Graphical User Interface ) to interact with the cloud.
2. Application : Application is a part of backend component that refers to a
software or platform to which client accesses. Means it provides the
service in backend as per the client requirement.
3. Service: Service in backend refers to the major three types of cloud
based services like SaaS, PaaS, IaaS Also manages which type of
service the user accesses.
4. Runtime Cloud: Runtime cloud in backend provides the execution and
Runtime platform/environment to the Virtual machine.
5. Storage: Storage in backend provides flexible and scalable storage
service and management of stored data.
6. Infrastructure: Cloud Infrastructure in backend refers to the hardware
and software components of cloud like it includes servers, storage,
network devices, virtualization software etc.
7. Management: Management in backend refers to management of
backend components like application, service, runtime cloud, storage,
infrastructure, and other security mechanisms etc.
8. Security: Security in backend refers to implementation of different
security mechanisms in the backend for secure cloud resources, systems,
files, and infrastructure to end-users.
9. Internet: Internet connection acts as the medium or a bridge between
frontend and backend and establishes the interaction and communication
between frontend and backend.
10. Database: Database in backend refers to provide database for storing
structured data, such as SQL and NOSQL databases. Example of
Databases services include Amazon RDS, Microsoft Azure SQL database
and Google CLoud SQL.
11. Networking: Networking in backend services that provide networking
infrastructure for application in the cloud, such as load balancing, DNS
and virtual private networks.
12. Analytics: Analytics in backend service that provides analytics
capabilities for data in the cloud, such as warehousing, business
intelligence and machine learning.
Benefits of Cloud Computing Architecture
 Makes overall cloud computing system simpler.
 Improves data processing requirements.
 Helps in providing high security.
 Makes it more modularized.
 Results in better disaster recovery.
 Gives good user accessibility.
 Reduces IT operating costs.
 Provides high level reliability.
 Scalability.

Cloud Computing which is one of the demanding technology of current


scenario and which has been proved as a revolutionary technology trend for
businesses of all sizes. It manages a broad and complex infrastructure setup
to provide cloud services and resources to the customers. Cloud
Infrastructure which comes under the backend part of cloud architecture
represents the hardware and software component such as server, storage,
networking, management software, deployment software and virtualization
software etc. In backend, cloud infrastructure enables the complete cloud
computing system.
Why Cloud Computing Infrastructure:
Cloud computing refers to providing on demand services to the customer
anywhere and anytime irrespective of everything where the cloud
infrastructure represents the one who activates the complete cloud
computing system. Cloud infrastructure has more capabilities of providing
the same services as the physical infrastructure to the customers. It is
available for private cloud, public cloud and hybrid cloud systems
with low cost, greater flexibility and scalability.
Cloud infrastructure components :
Different components of cloud infrastructure supports the computing
requirements of a cloud computing model. Cloud infrastructure has number
of key components but not limited to only server, software, network and
storage devices. Still cloud infrastructure is categorized into three parts in
general i.e.
1. Computing
2. Networking
3. Storage
The most important point is that cloud infrastructure should have some basic
infrastructural constraints like transparency, scalability, security and
intelligent monitoring etc.
The below figure represents components of cloud infrastructure
Hypervisor :
Hypervisor is a firmware or a low level program which is a key to enable
virtualization. It is used to divide and allocate cloud resources between
several customers. As it monitors and manages cloud services/resources
that’s why hypervisor is called as VMM (Virtual Machine Monitor) or (Virtual
Machine Manager).
2. Management Software :
Management software helps in maintaining and configuring the
infrastructure. Cloud management software monitors and optimizes
resources, data, applications and services.
3. Deployment Software :
Deployment software helps in deploying and integrating the application on
the cloud. So, typically it helps in building a virtual computing environment.
4. Network :
It is one of the key component of cloud infrastructure which is responsible for
connecting cloud services over the internet. For the transmission of data and
resources externally and internally network is must required.
5. Server :
Server which represents the computing portion of the cloud infrastructure is
responsible for managing and delivering cloud services for various services
and partners, maintaining security etc.
6. Storage :
Storage represents the storage facility which is provided to different
organizations for storing and managing data. It provides a facility of
extracting another resource if one of the resource fails as it keeps many
copies of storage.
Along with this, virtualization is also considered as one of important
component of cloud infrastructure. Because it abstracts the available data
storage and computing power away from the actual hardware and the users
interact with their cloud infrastructure through GUI (Graphical User
Interface).
Virtualization is used to create a virtual version of an underlying service
With the help of Virtualization, multiple operating systems and applications
can run on the same machine and its same hardware at the same time,
increasing the utilization and flexibility of hardware. It was initially developed
during the mainframe era.
It is one of the main cost-effective, hardware-reducing, and energy-saving
techniques used by cloud providers. Virtualization allows sharing of a single
physical instance of a resource or an application among multiple customers
and organizations at one time. It does this by assigning a logical name to
physical storage and providing a pointer to that physical resource on
demand. The term virtualization is often synonymous with hardware
virtualization, which plays a fundamental role in efficiently delivering
Infrastructure-as-a-Service (IaaS) solutions for cloud computing. Moreover,
virtualization technologies provide a virtual environment for not only
executing applications but also for storage, memory, and networking.

 Host Machine: The machine on which the virtual machine is going to be


built is known as Host Machine.
 Guest Machine: The virtual machine is referred to as a Guest Machine.
Work of Virtualization in Cloud Computing
Virtualization has a prominent impact on Cloud Computing. In the case of
cloud computing, users store data in the cloud, but with the help of
Virtualization, users have the extra benefit of sharing the infrastructure.
Cloud Vendors take care of the required physical resources, but these cloud
providers charge a huge amount for these services which impacts every user
or organization. Virtualization helps Users or Organisations in maintaining
those services which are required by a company through external (third-
party) people, which helps in reducing costs to the company. This is the way
through which Virtualization works in Cloud Computing.
Benefits of Virtualization
 More flexible and efficient allocation of resources.
 Enhance development productivity.
 It lowers the cost of IT infrastructure.
 Remote access and rapid scalability.
 High availability and disaster recovery.
 Pay peruse of the IT infrastructure on demand.
 Enables running multiple operating systems.
Drawback of Virtualization
 High Initial Investment: Clouds have a very high initial investment, but it
is also true that it will help in reducing the cost of companies.
 Learning New Infrastructure: As the companies shifted from Servers to
Cloud, it requires highly skilled staff who have skills to work with the cloud
easily, and for this, you have to hire new staff or provide training to
current staff.
 Risk of Data: Hosting data on third-party resources can lead to putting
the data at risk, it has the chance of getting attacked by any hacker or
cracker very easily.
Characteristics of Virtualization
 Increased Security: The ability to control the execution of a guest
program in a completely transparent manner opens new possibilities for
delivering a secure, controlled execution environment. All the operations
of the guest programs are generally performed against the virtual
machine, which then translates and applies them to the host programs.
 Managed Execution: In particular, sharing, aggregation, emulation, and
isolation are the most relevant features.
 Sharing: Virtualization allows the creation of a separate computing
environment within the same host.
 Aggregation: It is possible to share physical resources among several
guests, but virtualization also allows aggregation, which is the opposite
process.
Types of Virtualization
1. Application Virtualization
2. Network Virtualization
3. Desktop Virtualization
4. Storage Virtualization
5. Server Virtualization
6. Data virtualization

Application Virtualization: Application virtualization helps a user to have


remote access to an application from a server. The server stores all personal
information and other characteristics of the application but can still run on a
local workstation through the internet. An example of this would be a user
who needs to run two different versions of the same software. Technologies
that use application virtualization are hosted applications and packaged
applications.
2. Network Virtualization: The ability to run multiple virtual networks with
each having a separate control and data plan. It co-exists together on top of
one physical network. It can be managed by individual parties that are
potentially confidential to each other. Network virtualization provides a facility
to create and provision virtual networks, logical switches, routers, firewall
load balancers, Virtual Private Networks, and workload security within days
or even weeks.
Desktop Virtualization: Desktop virtualization allows the users’ OS to be
remotely stored on a server in the data center. It allows the user to access
their desktop virtually, from any location by a different machine. Users who
want specific operating systems other than Windows Server will need to
have a virtual desktop. The main benefits of desktop virtualization are user
mobility, portability, and easy management of software installation, updates,
and patches.
4. Storage Virtualization: Storage virtualization is an array of servers that
are managed by a virtual storage system. The servers aren’t aware of
exactly where their data is stored and instead function more like worker bees
in a hive. It makes managing storage from multiple sources be managed and
utilized as a single repository. storage virtualization software maintains
smooth operations, consistent performance, and a continuous suite of
advanced functions despite changes, breaks down, and differences in the
underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the masking
of server resources takes place. Here, the central server (physical server) is
divided into multiple different virtual servers by changing the identity number,
and processors. So, each system can operate its operating systems in an
isolated manner. Where each sub-server knows the identity of the central
server. It causes an increase in performance and reduces the operating cost
by the deployment of main server resources into a sub-server resource. It’s
beneficial in virtual migration, reducing energy consumption, reducing
infrastructural costs, etc.

Data Virtualization: This is the kind of virtualization in which the data is


collected from various sources and managed at a single place without
knowing more about the technical information like how data is collected,
stored & formatted then arranged that data logically so that its virtual view
can be accessed by its interested people and stakeholders, and users
through the various cloud services remotely. Many big giant companies are
providing their services like Oracle, IBM, At scale, Cdata, etc.

Uses of Virtualization
 Data-integration
 Business-integration
 Service-oriented architecture data-services
 Searching organizational data
Security In Cloud Computing :
Cloud computing which is one of the most demanding technology of the
current time, starting from small to large organizations have started using
cloud computing services. Where there are different types of cloud
deployment models are available and cloud services are provided as per
requirement like that internally and externally security is maintained to keep
the cloud system safe. Cloud computing security or cloud security is an
important concern which refers to the act of protecting cloud environments,
data, information and applications against unauthorized access, DDOS
attacks, malwares, hackers and other similar attacks. Community Cloud
: These allow to a limited set of organizations or employees to access a
shared cloud computing service environment.
Planning of security in Cloud Computing :
As security is a major concern in cloud implementation, so an organization
have to plan for security based on some factors like below represents the
three main factors on which planning of cloud security depends.
 Resources that can be moved to the cloud and test its sensitivity risk are
picked.
 The type of cloud is to be considered.
 The risk in the deployment of the cloud depends on the types of cloud and
service models.
Types of Cloud Computing Security Controls :
There are 4 types of cloud computing security controls i.e.
1. Deterrent Controls : Deterrent controls are designed to block nefarious
attacks on a cloud system. These come in handy when there are insider
attackers.
2. Preventive Controls : Preventive controls make the system resilient to
attacks by eliminating vulnerabilities in it.
3. Detective Controls : It identifies and reacts to security threats and
control. Some examples of detective control software are Intrusion
detection software and network security monitoring tools.
4. Corrective Controls : In the event of a security attack these controls are
activated. They limit the damage caused by the attack.
Importance of cloud security :
For the organizations making their transition to cloud, cloud security is an
essential factor while choosing a cloud provider. The attacks are getting
stronger day by day and so the security needs to keep up with it. For this
purpose it is essential to pick a cloud provider who offers the best security
and is customized with the organization’s infrastructure. Cloud security has a
lot of benefits –
 Centralized security : Centralized security results in centralizing
protection. As managing all the devices and endpoints is not an easy task
cloud security helps in doing so. This results in enhancing traffic analysis
and web filtering which means less policy and software updates.
 Reduced costs : Investing in cloud computing and cloud security results
in less expenditure in hardware and also less manpower in administration
 Reduced Administration : It makes it easier to administer the
organization and does not have manual security configuration and
constant security updates.
 Reliability : These are very reliable and the cloud can be accessed from
anywhere with any device with proper authorization.
When we are thinking about cloud security it includes various types of
security like access control for authorized access, network segmentation for
maintaining isolated data, encryption for encoded data transfer, vulnerability
check for patching vulnerable areas, security monitoring for keeping eye on
various security attacks and disaster recovery for backup and recovery
during data loss.
There are different types of security techniques which are implemented to
make the cloud computing system more secure such as SSL (Secure Socket
Layer) Encryption, Multi Tenancy based Access Control, Intrusion Detection
System, firewalls, penetration testing, tokenization, VPN (Virtual Private
Networks), and avoiding public internet connections and many more
techniques.
But the thing is not so simple how we think, even implementation of number
of security techniques there is always security issues are involved for the
cloud system. As cloud system is managed and accessed over internet so a
lot of challenges arises during maintaining a secure cloud. Some cloud
security challenges are
 Control over cloud data
 Misconfiguration
 Ever changing workload
 Access Management
 Disaster recovery
What Is CPU Virtualization In Cloud Computing?
A single CPU can run numerous operating systems (OS) via CPU
virtualization in cloud computing. This is possible by creating virtual machines
(VMs) that share the physical resources of the CPU. Each Virtual Machine
can’t see or interact with each other’s data or processes.

CPU virtualization is very important in cloud computing. It enables cloud


providers to offer services like –

 Virtual private servers (VPSs)


 Cloud storage (EBS)
 Cloud computing platforms (AWS, Azure and Google Cloud)
Consider an example to understand CPU virtualization. Imagine we have a
physical server with a single CPU. We want to run two different operating
systems on this server,
Windows & Linux. So it can easily be done by creating two Virtual Machines
(VMs), one for Windows and one for Linux.

The virtualization software will create a virtual CPU for each VM. The
virtualization software will create a virtual CPU for each VM. The virtual CPUs
will execute on the physical CPU but separately. This means the Windows
Virtual Machine cannot view or communicate with the Linux VM, and vice
versa.

The virtualization software will also allocate memory and other resources to
each VM. This guarantees each VM has enough resources to execute. CPU
virtualization is made difficult but necessary for cloud computing.

How CPU Virtualization Works? In Step By Step Process


Step 1: Creating Virtual Machines (VMs)

 Let’s take an example you have a powerful computer with a CPU, memory, and other
resources.
 To start CPU virtualization, you use special software called a hypervisor. This is like the
conductor of a virtual orchestra.
 The hypervisor creates virtual machines (VMs) – these are like separate, isolated
worlds within your computer.
 The “virtual” resources of each VM include CPU, memory, and storage. It’s like having
multiple mini-computers inside your main computer.
Step 2: Allocating Resources

 The hypervisor carefully divides the real CPU’s processing power among the VMs. It’s
like giving each VM its own slice of the CPU pie.
 It also makes sure that each Virtual memory (VM) gets its share of memory, storage,
and other resources.
Step 3: Isolation and Independence

Each VM operates in its own isolated environment. It can’t see or interfere


with what’s happening in other VMs.

Step 4: Running Operating Systems and Apps

 Within each Virtual Machine, you can install & run different operating systems (like
Windows, Linux) and applications.
 The VM thinks it’s a real computer, even though it’s sharing the actual computer’s
resources with other VMs.
Step 5: Managing Workloads

 The hypervisor acts as a smart manager, deciding when each VM gets to use the real
CPU.
 It ensures that no VM takes up all the CPU time, making sure everyone gets their turn to
work.
Step 6: Efficient Use of Resources

 Even though there’s only one physical CPU, each VM believes it has its own dedicated
CPU.
 The hypervisor cleverly switches between VMs so that all the tasks appear to be
happening simultaneously.

Advantages Of CPU Virtualization In Cloud Computing

1) Efficient Resource Utilization


CPU virtualization lets one powerful machine handle multiple tasks simultaneously. This
maximizes the use of h/w resources and reduces wastage.

2) Cost Savings
By running multiple virtual machines on a single physical server, cloud providers save on
hardware costs, energy consumption, and maintenance.

3) Scalability
CPU virtualization allows easy scaling, adding or removing virtual machines according to
demand. This flexibility helps businesses adapt to changing needs as per requirements.

4) Isolation and Security


Each Virtual Machine (VM) is isolated from others, providing a layer of security. If one VM has
a problem, it’s less likely to affect others.

5) Compatibility and Testing


Different operating systems (OS) & applications can run on the same physical hardware (h/w),
making it easier to test new software without affecting existing setups.

Disadvantages Of CPU Virtualization In Cloud Computing:

1) Overhead
The virtualization layer adds some overhead, which means a small portion of CPU power is used
to manage virtualization itself.

2) Performance Variability
Depending on the number of virtual machines and their demands, performance can vary. If one
VM needs a lot of resources, others might experience slower performance.

3) Complexity
Handling multiple virtual machines and how they work together needs expertise. Creating and
looking after virtualization systems can be complicated.
4) Compatibility Challenges
Some older software or hardware might not work well within virtualized environments.
Compatibility issues can arise.

5) Resource Sharing
While CPU virtualization optimizes resource usage, if one VM suddenly requires a lot of
resources, it might impact the performance of others.

What is a Hypervisor in Cloud Computing?

A hypervisor is a software that allows us to construct and manage virtual machines. Hypervisors
are often referred to as virtual machine monitors (VMMs). A hypervisor allows a single host
computer to handle numerous guest virtual machines (VMs) by dividing resources such as
memory and computation. When utilized as a hypervisor, the hardware is referred to as the host,
and the multiple VMs that utilize its resources are referred to as guests.

The actual hardware is divided throughout the virtualization process such that each division
functions as a distinct, independent virtual computer. Here is when the hypervisor comes into
play. The hypervisor controls the scheduling of the resources assigned to each virtual machine
concerning the physical resources. It also distributes the resources to each virtual machine.

Why is a Hypervisor Important?

One of the key benefits of the hypervisor in cloud computing is that it allows the utilization of
more of a system's available resources and provides greater IT adaptability because the guest
virtual machines are not dependent on the host hardware. To put it another way, they can be
instantly swapped across servers. Multiple virtual machines can run on a single hardware server
because a hypervisor enables this through one of its unique features. Because a hypervisor allows
numerous virtual computers to operate on one physical server, it reduces:

 Space

 Energy

 Requirements for upkeep

How Does a Hypervisor Work?


By abstracting a computer's programme from its hardware, hypervisors enable the development
and control of virtual machines (VMs). Hypervisors enable virtualization by converting requests
between real and virtual resources. Instead of running across the OS and an application,
hypervisors build a layer for virtualization that sits between the server hardware and the
operating system. They separate the host machine, which houses the operating system and
programmes, from the virtual machines that utilize its resources.

The hypervisor suggests a shared pool of resources, including a CPU, storage spaces and
memory, which may be shared across guest virtual machines by hiding the real hardware
components of the actual server from the divided virtual machines.

The hypervisor is thus in charge of managing and allocating shared physical resources from the
host computer to the guest virtual machines and scheduling processes to prevent resource
overuse by competing VMs. The hypervisor facilitates the function of guest VMs by
encapsulating and sharing host resources, allowing them to be free of host hardware and execute
their programmes.

Types of the Hypervisor in Cloud Computing


The fundamental operation is the same regardless of the hypervisor you use. You can build
virtual machines on all types of hypervisors. Each virtual machine will be given its share of the
infrastructure's resources and have its operating system. In cloud computing, there are two types
of hypervisors.

Type 1 Hypervisor

Type 1 hypervisors run on physical hosts. Because of this, it is sometimes referred to as a bare
metal hypervisor. A Type 1 hypervisor is often installed on a physical host first, so it behaves
much like the host's operating system. This hypervisor is commonly seen in business data centers
and other server-based systems.
A Type 1 hypervisor thus has full access to the resources of the actual physical host, such as the
CPU, storage spaces, and network interface. Type 1 hypervisor functions similarly to a minimal
operating system running entirely on the host's hardware.

Type 2 Hypervisor

An operating system called the host is used by a Type 2 hypervisor. It is sometimes referred to as
a hosted hypervisor for this reason. So, before installing a Type 2 hypervisor, users must initially
set up a host OS on the actual host. It operates by separating the host and guest operating
systems. The hosting operating system, which is subsequently performed against the hardware, is
scheduled against virtual machine resources.

Type 2 hypervisors are often easy to configure and utilize. They are, therefore, more prevalent
among end users. Individuals who want to run different operating systems on their machines are
better suited for a type 2 hypervisor. A type 2 hypervisor, like other computer programmes,
works as a software layer on top of an operating system.

Traditional Software Development


Traditional Software Development is the software development process used to design and
develop simple software. It is used when the security and many other factors of the software are
not much important. It is used by freshers to develop the software. It consists of five phases:

1. Requirements analysis
2. Design
3. Implementation
4. Coding and Testing
5. Maintenance
Advantages of Traditional Software Development
 Well-Established Methodology: Traditional software development follows a well-
established methodology that is widely understood and documented.
 Clear Requirements: Traditional software development relies on clear and detailed
requirements, which helps to ensure that the final product meets the customer’s needs.
 Structured Approach: Traditional software development follows a structured approach,
with clear phases and milestones, which helps to ensure that the project stays on track.
 Proven Success: Traditional software development has a proven track record of success and
is widely used in many industries.
 Quality Control: Traditional software development typically includes extensive testing and
quality control processes, which helps to ensure that the final product is of high quality.
Disadvantages of Traditional Software Development
 Slow Process: Traditional software development can be a slow process, with lengthy
planning and design phases.
 Lack of Flexibility: Traditional software development can be inflexible, with changes to
requirements or design difficult to implement once development has begun.
 High Cost: Traditional software development can be expensive, particularly if the project is
large or complex.
 Limited Customer Involvement: Traditional software development often limits customer
involvement to the planning and design phases, which can result in a product that does not
fully meet their needs.
 Limited Innovation: Traditional software development can be conservative and risk-averse,
which can limit innovation and the development of new ideas.

What is a Cloud Deployment Model?

 Cloud Deployment Model functions as a virtual computing environment with a deployment


architecture that varies depending on the amount of data you want to store and who has
access to the infrastructure.
 Types of Cloud Computing Deployment Models
 The cloud deployment model identifies the specific type of cloud environment based on
ownership, scale, and access, as well as the cloud’s nature and purpose. The location of the
servers you’re utilizing and who controls them are defined by a cloud deployment model. It
specifies how your cloud infrastructure will look, what you can change, and whether you will
be given services or will have to create everything yourself. Relationships between the
infrastructure and your users are also defined by cloud deployment types. Different types of
cloud computing deployment models are described below.
 Public Cloud
 Private Cloud
 Hybrid Cloud
 Community Cloud
 Multi-Cloud
 Public Cloud
The public cloud makes it possible for anybody to access systems and services. The public cloud
may be less secure as it is open to everyone. The public cloud is one in which cloud
infrastructure services are provided over the internet to the general people or major industry
groups. The infrastructure in this cloud model is owned by the entity that delivers the cloud
services, not by the consumer. It is a type of cloud hosting that allows customers and users to
easily access systems and services. This form of cloud computing is an excellent example of
cloud hosting, in which service providers supply services to a variety of customers. In this
arrangement, storage backup and retrieval services are given for free, as a subscription, or on a
per-user basis. For example, Google App Engine etc.

Advantages of the Public Cloud Model


 Minimal Investment: Because it is a pay-per-use service, there is no substantial upfront fee,
making it excellent for enterprises that require immediate access to resources.
 No setup cost: The entire infrastructure is fully subsidized by the cloud service providers,
thus there is no need to set up any hardware.
 Infrastructure Management is not required: Using the public cloud does not necessitate
infrastructure management.
 No maintenance: The maintenance work is done by the service provider (not users).
 Dynamic Scalability: To fulfill your company’s needs, on-demand resources are accessible.
Disadvantages of the Public Cloud Model
 Less secure: Public cloud is less secure as resources are public so there is no guarantee of
high-level security.
 Low customization: It is accessed by many public so it can’t be customized according to
personal requirements.
Private Cloud
The private cloud deployment model is the exact opposite of the public cloud deployment model.
It’s a one-on-one environment for a single user (customer). There is no need to share your
hardware with anyone else. The distinction between private and public clouds is in how you
handle all of the hardware. It is also called the “internal cloud” & it refers to the ability to access
systems and services within a given border or organization. The cloud platform is implemented
in a cloud-based secure environment that is protected by powerful firewalls and under the
supervision of an organization’s IT department. The private cloud gives greater flexibility of
control over cloud resources.

Advantages of the Private Cloud Model


 Better Control: You are the sole owner of the property. You gain complete command over
service integration, IT operations, policies, and user behavior.
 Data Security and Privacy: It’s suitable for storing corporate information to which only
authorized staff have access. By segmenting resources within the same infrastructure,
improved access and security can be achieved.
 Supports Legacy Systems: This approach is designed to work with legacy systems that are
unable to access the public cloud.
 Customization: Unlike a public cloud deployment, a private cloud allows a company to
tailor its solution to meet its specific needs.
Disadvantages of the Private Cloud Model
 Less scalable: Private clouds are scaled within a certain range as there is less number of
clients.
 Costly: Private clouds are more costly as they provide personalized facilities.
Hybrid Cloud
By bridging the public and private worlds with a layer of proprietary software, hybrid cloud
computing gives the best of both worlds. With a hybrid solution, you may host the app in a safe
environment while taking advantage of the public cloud’s cost savings. Organizations can move
data and applications between different clouds using a combination of two or more cloud
deployment methods, depending on their needs.
Advantages of the Hybrid Cloud Model
 Flexibility and control: Businesses with more flexibility can design personalized solutions
that meet their particular needs.
 Cost: Because public clouds provide scalability, you’ll only be responsible for paying for the
extra capacity if you require it.
 Security: Because data is properly separated, the chances of data theft by attackers are
considerably reduced.
Disadvantages of the Hybrid Cloud Model
 Difficult to manage: Hybrid clouds are difficult to manage as it is a combination of both
public and private cloud. So, it is complex.
 Slow data transmission: Data transmission in the hybrid cloud takes place through the
public cloud so latency occurs.
Community Cloud
It allows systems and services to be accessible by a group of organizations. It is a distributed
system that is created by integrating the services of different clouds to address the specific needs
of a community, industry, or business. The infrastructure of the community could be shared
between the organization which has shared concerns or tasks. It is generally managed by a third
party or by the combination of one or more organizations in the community.
Advantages of the Community Cloud Model
 Cost Effective: It is cost-effective because the cloud is shared by multiple organizations or
communities.
 Security: Community cloud provides better security.
 Shared resources: It allows you to share resources, infrastructure, etc. with multiple
organizations.
 Collaboration and data sharing: It is suitable for both collaboration and data sharing.
Disadvantages of the Community Cloud Model
 Limited Scalability: Community cloud is relatively less scalable as many organizations
share the same resources according to their collaborative interests.
 Rigid in customization: As the data and resources are shared among different organizations
according to their mutual interests if an organization wants some changes according to their
needs they cannot do so because it will have an impact on other organizations.
Multi-Cloud
We’re talking about employing multiple cloud providers at the same time under this paradigm, as
the name implies. It’s similar to the hybrid cloud deployment approach, which combines public
and private cloud resources. Instead of merging private and public clouds, multi-cloud uses many
public clouds. Although public cloud providers provide numerous tools to improve the reliability
of their services, mishaps still occur. It’s quite rare that two distinct clouds would have an
incident at the same moment. As a result, multi-cloud deployment improves the high availability
of your services even more.
Advantages of the Multi-Cloud Model
 You can mix and match the best features of each cloud provider’s services to suit the
demands of your apps, workloads, and business by choosing different cloud providers.
 Reduced Latency: To reduce latency and improve user experience, you can choose cloud
regions and zones that are close to your clients.
 High availability of service: It’s quite rare that two distinct clouds would have an incident at
the same moment. So, the multi-cloud deployment improves the high availability of your
services.
Disadvantages of the Multi-Cloud Model
 Complex: The combination of many clouds makes the system complex and bottlenecks may
occur.
 Security issue: Due to the complex structure, there may be loopholes to which a hacker can
take advantage hence, makes the data insecure.
What is the Right Choice for Cloud Deployment Model?
As of now, no such approach fits picking a cloud deployment model. We will always consider
the best cloud deployment model as per our requirements. Here are some factors which should be
considered before choosing the best deployment model.
 Cost: Cost is an important factor for the cloud deployment model as it tells how much
amount you want to pay for these things.
 Scalability: Scalability tells about the current activity status and how much we can scale it.
 Easy to use: It tells how much your resources are trained and how easily can you manage
these models.
 Compliance: Compliance tells about the laws and regulations which impact the
implementation of the model.
 Privacy: Privacy tells about what data you gather for the model.
Key Drivers– Organizations Adopting Cloud Services:

Understanding the ground for business is the vital need to step up the pace with technology.
When the organizations decide to cull the adoption of cloud, rather than swinging on ruthless
options, sinking the money and efforts of an individual.
Let’s discuss 5 key drivers, driving the need to escalate the business with the
implementation of cloud services:
Business Hike:
 Analyzing your moves gives fabricated results. Thus, if you view a certain range of hike in
your business, it might be one of the cloud drivers. The growth in business is one of the
major obligations, that any organization could ever rate.
 Therefore, based on the steps of the plan for driving the cloud services, it is prominent to boil
out the business strategy by the consideration of cloud adoption.
Balanced Cost Structure:
 This is one of the most recognized factors, acting as a driver for cloud adoption. The number
of organizations has witnessed that employing the cloud bolsters in cutting the cost, resulting
in turning down of license for legacy systems.
 Depending on the cloud for acquiring cloud storage services, reduction in office space and
attaining the quality, domes as the driver for cloud adoption.
Improvised Productivity:
 When the organizations are adopting the means of fabricated technology, it is believed to
view tremendous change in the range of productivity.
 Productivity is the factor, often considered as a driver of cloud adoption. If the cloud is
structured at a significant rate, it could produce imitable results, in favour of an organization.
Efficiency:
 Improved Efficiency, with minimal errors, is one of the key drivers, propagating the reasons
for adoption of the cloud.
 When the organization adopts any newer means of technology, it always has an underlying
motive to access the medium for fulfilling the business requirement, with a hike in business
and optimized cloud solutions.
Scalability:
 The scalable service of the cloud is one the biggest key driver, acting in the favour of
organizations. The cloud-enabled services are swaddled in such a manner that one can scale
the range of services as per its requirement.
 One can add on more number of services with customized features if the organization feels
ready to step up. Also, the organization can step down in terms of services, if it finds it as the
far-reaching target.

Cloud computing has a significant impact on users, both individuals and organizations. These
impacts include a wide range of benefits and advantages that have transformed the way people
access and use technology. Here are some key impacts of cloud computing on users:

1. Accessibility:Cloud computing enables users to access their data, applications, and


services from virtually anywhere with an internet connection. This accessibility
promotes remote work, collaboration, and flexibility.
2. Cost Savings:Cloud services often follow a pay-as-you-go model, allowing users to
avoid large upfront capital expenditures. This cost-effective approach is particularly
beneficial for small businesses and startups.
3. Scalability:Cloud resources can be easily scaled up or down based on demand. Users
can quickly add or reduce computing power, storage, or other resources as needed,
ensuring efficient resource utilization.
4. Automatic Updates:Cloud service providers handle software updates, patches, and
maintenance, reducing the burden on users and ensuring that applications are up to date
and secure.
5. Collaboration:Cloud-based collaboration tools, such as Google Workspace and
Microsoft 365, facilitate real-time document sharing and simultaneous editing,
enhancing teamwork and productivity.
6. Data Backup and Recovery:Cloud providers offer robust data backup and disaster
recovery solutions. Users can easily recover data in case of hardware failure, data loss,
or natural disasters.
7. Security:Cloud providers invest heavily in security measures, including data
encryption, access controls, and threat detection. Users benefit from these advanced
security features without needing to manage them themselves.
8. Reduced IT Management:Cloud computing offloads much of the infrastructure
management and maintenance tasks from users. This allows organizations to focus on
their core business activities rather than IT administration.
9. Global Reach:Cloud services are accessible worldwide, making it easier for businesses
to expand globally and serve customers in different regions.
10. Innovation:Cloud computing encourages innovation by providing access to cutting-
edge technologies such as artificial intelligence (AI), machine learning, and Internet of
Things (IoT) platforms. Users can leverage these technologies without significant
upfront investments.
11. Resource Efficiency:Cloud computing promotes resource efficiency by allowing
multiple users to share the same physical infrastructure. This reduces energy
consumption and environmental impact.
12. Device Independence:Users can access cloud-based applications and data from a
variety of devices, including smartphones, tablets, laptops, and desktops, without being
tied to a specific machine.
13. Competitive Advantage:Cloud computing levels the playing field for businesses of all
sizes. Smaller organizations can access the same technology and resources as larger
enterprises, giving them a competitive edge.
14. Simplified Software Licensing:Cloud providers often offer subscription-based software
licensing models, making it easier for users to manage software costs and compliance.
15. Data Analytics:Cloud-based data analytics tools provide users with the ability to
analyze large datasets and gain valuable insights, facilitating data-driven decision-
making.
16. Education and Training:Cloud-based e-learning platforms and training resources make
education and skill development more accessible to users worldwide.
17. Entertainment and Media:Cloud-based streaming services for music, movies, and TV
shows have revolutionized the entertainment industry, providing on-demand access to
content.
While cloud computing offers numerous benefits, users should also be aware of potential
challenges, such as data privacy concerns, security risks, and the need for a reliable internet
connection. Effective management and governance of cloud resources are essential to maximize
the positive impacts while mitigating potential drawbacks.

Cloud Governance and Its Need

Cloud Governance :
 It is the set of policies or principles that act as the guidance for the adoption use, and
management of cloud technology services.
 It is an ongoing process that must sit on top of existing governance models.
 It is a set of rules you create to monitor and amend as necessary in order to control costs,
improve efficiency, and eliminate security risks.

Need for Cloud Governance :


By implementing cloud governance, organizations can avoid the following issues as follows.
1. Security and privacy risks :
 This issue may arise due to unauthorized downloads/ installation of software, storage of
illegal data, and access to restricted sites by users.
 Cloud Governance solutions cover multiple cloud security components. For example,
Encryption, Security groups, Audit trails, Application access rules, Access controls.
2. Vendor lock-in :
 Many vendors opt for this, as this clause causes organizations to depend on the cloud service
provider (or vendor) for products and services.
 This can be avoided by making changes to the SLA suitably and reduce dependencies on a
single vendor, thus ensuring freedom to the organization.
3. Cloud Sprawl :
 This happens when employees of different departments use different programs and cloud
infrastructure from third-party providers without involving the IT department and getting
necessary approvals.
 If not detected and restricted, crowd sprawl may lead to fragmented, redundant, inefficient,
and unmanaged cloud programs sitting on the enterprise cloud and unnecessarily creating
trouble.
4. Shadow IT and unwarranted usage of cloud resources :
 This happens when employees in various departments do not follow the rules and regulations
as imposed by the IT department on cloud usage resulting in security breaches and
fragmented control throughout the organization.
 This leads to not getting sufficient results from the cloud in the long run.
5. Lack of data portability and interoperability :
 This happens when the cloud service provider or the inbuilt cloud infrastructure is incapable
of connecting well with other software and products outside the organization.
 This may also lead to modules not compatible with each other and hence chaos in the cloud
due to an inefficient system.

You might also like