Unit 1 - Intro To Cloud Computing - 2024
Unit 1 - Intro To Cloud Computing - 2024
Syllabus
Unit 1 :- Introduction to Cloud Computing
Unit 1
Introduction to Cloud computing, origins
History and Evolution of Cloud Computing
Properties, characteristics of Cloud computing
3) Excellent accessibility → Cloud allows us to quickly and easily access store information anywhere,
anytime in the whole world, using an internet connection. An internet cloud infrastructure increases
organization productivity and efficiency by ensuring that our data is always accessible.
4) Low maintenance cost →Cloud computing reduces both hardware and software
maintenance costs for organizations.
5) Mobility → Cloud computing allows us to easily access all cloud data via mobile.
6) Services in the pay-per-use model → Cloud computing offers
Application Programming Interfaces (APIs) to the users for access
services on the cloud and pays the charges as per the usage of service.
Security in the
Lack of Support
Cloud
Possible
Cost
Downtime
Some most common Security Risks of Cloud Computing are given below-
• Data Loss
Data loss is the most common cloud security risks of cloud computing. It is also
known as data leakage. Data loss is the process in which data is being deleted,
corrupted, and unreadable by a user, software, or application. In a cloud
computing environment, data loss occurs when our sensitive data is somebody
else's hands, one or more data elements can not be utilized by the data owner,
hard disk is not working properly, and software is not updated.
• Hacked Interfaces and Insecure APIs
As we all know, cloud computing is completely depends on Internet, so it is
compulsory to protect interfaces and APIs that are used by external users. APIs
are the easiest way to communicate with most of the cloud services. In cloud
computing, few services are available in the public domain. These services can be
accessed by third parties, so there may be a chance that these services easily
harmed and hacked by hackers.
• Data Breach
Data Breach is the process in which the confidential data is viewed,
accessed, or stolen by the third party without any authorization, so
organization's data is hacked by the hackers.
• Vendor lock-in
Vendor lock-in is the of the biggest security risks in cloud computing.
Organizations may face problems when transferring their services from
one vendor to another. As different vendors provide different platforms,
that can cause difficulty moving one cloud to another.
• Increased complexity strains IT staff
Migrating, integrating, and operating the cloud services is complex for
the IT staff. IT staff must require the extra capability and skills to
manage, integrate, and maintain the data to the cloud
• Spectre & Meltdown
Spectre & Meltdown allows programs to view and steal data which is
currently processed on computer. It can run on personal computers,
mobile devices, and in the cloud. It can store the password, your personal
information such as images, emails, and business documents in the
memory of other running programs.
• Denial of Service (DoS) attacks
Denial of service (DoS) attacks occur when the system receives too much
traffic to buffer the server. Mostly, DoS attackers target web servers of
large organizations such as banking sectors, media companies, and
government organizations. To recover the lost data, DoS attackers charge
a great deal of time and money to handle the data.
• Account hijacking
Account hijacking is a serious security risk in cloud computing. It is
the process in which individual user's or organization's cloud
account (bank account, e-mail account, and social media account)
is stolen by hackers. The hackers use the stolen account to
perform unauthorized activities.
Cloud Computing Challenges:
Data
Data
Recovery and
Protection
Availability
Regulatory
Management and
Capabilities Compliance
Restrictions
Cloud Computing -- Clients
Clients are, in a cloud computing architecture, the exact
same things that they are in a simple everyday local area
network (LAN). They are, typically, the computers that just
sit on your desk. But they might also be laptops, tablet
computers, mobile phones, or PDAs—all big drivers for
cloud computing because of their mobility. Clients are the
devices that the end users interact with to manage their
information on the cloud.
Clients generally fall into three categories:-
Thin
Mobile
Clients are computers Thick
Mobile
that do not have This type of client is
devices include
internal hard a regular computer,
PDAs or
drives, but using a web browser
smartphones, like a
rather let the like Firefox
Blackberry,
server do all the or Internet Explorer
Windows Mobile
work, but then to connect to the
Smartphone, or an
display the cloud
iPhone.
information.
Data centre
Virtualization
Virtualization is the process of creating a virtual
environment to run multiple applications and operating
systems on the same server. The virtual environment can
be anything, such as a single instance or a combination of
many operating systems, storage devices, network
application servers, and other environments.
The concept of Virtualization in cloud computing increases
the use of virtual machines. A virtual machine is a software
computer or software program that not only works as a
physical computer but can also function as a physical
machine and perform tasks such as running applications or
programs as per the user's demand.
Hardware Virtualization
Cloud computing services are usually backed by large-
scale data centers composed of thousands of computers.
Such data centers are built to serve many users and host
many disparate applications. For this purpose, hardware
virtualization can be considered as a perfect fit to
overcome most operational issues of data center building
and maintenance. The idea of virtualizing a computer
system’s resources, including processors, memory, and
I/O devices, has been well established for decades,
aiming at improving sharing and utilization of computer
systems.
Hardware virtualization allows running multiple operating
systems and software stacks on a single physical platform.
As depicted in figure , a software layer, the virtual machine
monitor (VMM), also called a hypervisor, mediates access
to the physical hardware presenting to each guest
operating system a virtual machine (VM), which is a set of
virtual platform interfaces
Cloud computing in a nutshell
When plugging an electric appliance into an outlet, we care
neither how electric power is generated nor how it gets to
that outlet. This is possible because electricity is virtualized;
that is, it is readily available from a wall socket that hides
power generation stations and a huge distribution grid.
When extended to information technologies, this concept
means delivering useful functions while hiding how their
internals work. Computing itself, to be considered fully
virtualized, must allow computers to be built from
distributed components such as processing, storage, data,
and software resources.
Technologies such as cluster, grid, and now, cloud computing,
have all aimed at allowing access to large amounts of
computing power in a fully virtualized manner, by aggregating
resources and offering a single system view. In addition, an
important aim of these technologies has been delivering
computing as a utility. Utility computing describes a business
model for on-demand delivery of computing power; consumers
pay providers based on usage (“pay-as-you-go”), similar to the
way in which we currently obtain services from traditional
public utility services such as water, electricity, gas, and
telephony.
Cloud computing has been coined as an umbrella term to
describe a category of sophisticated on-demand computing
services initially offered by commercial providers, such as
Amazon, Google, and Microsoft. It denotes a model on which a
computing infrastructure is viewed as a “cloud,” from which
businesses and individuals access applications from anywhere in
the world on demand . The main principle behind this model is
offering computing, storage, and software “as a service.”
Computing delivered as a utility can be defined as “on demand
delivery of infrastructure, applications, and business processes in
a security-rich, shared, scalable, and based computer
environment over the Internet for a fee”
History and evolution of cloud computing
• Before emerging the cloud computing, there was Client/Server
computing which is basically a centralized storage in which all
the software applications, all the data and all the controls are
resided on the server side.
• If a single user wants to access specific data or run a program,
he/she need to connect to the server and then gain appropriate
access, and then he/she can do his/her business.
• Then after, distributed computing came into picture, where all
the computers are networked together and share their
resources when needed.
• On the basis of above computing, there was emerged of cloud
computing concepts that later implemented.
At around in 1961, John MacCharty suggested in a speech that
computing can be sold like a utility, just like a water or electricity. It
was a brilliant idea, but like all brilliant ideas, it was ahead if its time,
as for the next few decades, despite interest in the model, the
technology simply was not ready for it.
In 1999, Salesforce.com started delivering of applications to users
using a simple website. The applications were delivered to
enterprises over the Internet, and this way the dream of computing
sold as utility were true.
In 2002, Amazon started Amazon Web Services, providing services
like storage, computation and even human intelligence. However,
only starting with the launch of the Elastic Compute Cloud in 2006 a
truly commercial service open to everybody existed.
In 2009, Google Apps also started to provide cloud
computing enterprise applications.
Of course, all the big players are present in the cloud
computing evolution, some were earlier, some were
later. In 2009, Microsoft launched Windows Azure,
and companies like Oracle and HP have all joined the
game. This proves that today, cloud computing has
become mainstream.
• Cloud Computing provides the facility to a wide range of
services stored in the cloud or Internet. The Services
provided by cloud computing are computer resources, data
storage, applications, servers, developmental tools, and
networking protocols. It is most popularly used by IT firms
and for business requirements. The term “Cloud
Computing” gives internet-related services and it emerged
from distributed computing to the current technology
called cloud computing. Amazon, Google, and Microsoft are
some examples of cloud services.
Cloud computing is the services provided on the Internet to
store a vast amount of data in one place and can be used
from anywhere and from any place. This minimizes the cost
of the physical installation of the data centers and servers.
Some examples of cloud computing are −
Dropbox − It is a one-stop solution for all the services like
file storage, sharing, and managing the system.
Microsoft Azure − It provides a wide range of services like
the backup of data and any sudden recovery from any type of
disaster.
How does cloud computing work
Assume that you are an executive at a very big corporation.
Your particular responsibilities include to make sure that all
of your employees have the right hardware and software
they need to do their jobs. To buy computers for everyone
is not enough. You also have to purchase software as well
as software licenses and then provide these software's to
your employees as they require. Whenever you hire a new
employee, you need to buy more software or make sure
your current software license allows another user.
So, instead of installing a suite of software for each
computer, you just need to load one application. That
application will allow the employees to log-in into a Web-
based service which hosts all the programs for the user that
is required for his/her job. Remote servers owned by
another company and that will run everything from e-mail
to word processing to complex data analysis programs. It is
called cloud computing, and it could change the entire
computer industry.
In a cloud computing system, there is a significant workload
shift. Local computers have no longer to do all the heavy
lifting when it comes to run applications. But cloud
computing can handle that much heavy load easily and
automatically. Hardware and software demands on the
user's side decrease. The only thing the user's computer
requires to be able to run is the cloud computing interface
software of the system, which can be as simple as a Web
browser and the cloud's network takes care of the rest.
Computing delivered as a utility can be defined as “on
demand delivery of infrastructure, applications, and
business processes in a security-rich, shared, scalable,
and based computer environment over the Internet
for a fee”
The main elements comprising cloud computing platforms
include computer hardware, storage, infrastructure,
computer software, operating systems, and platform
virtualization.
Bandwidth is measured by calculating the total
amount of data transferred in and out of platform
service through transaction and batch processing.
Generally, data transfer between services within the
same platform is free in many platforms
Compute is measured as the time units needed to run
an instance, or application, or machine to servicing
requests.
Cloud security audit