Deployment Models-Cloud Comp
Deployment Models-Cloud Comp
Deployment Models
[email protected]
Cloud Computing
We covered so far…………….
Cloud Computing
Essential Characteristics
On-demand self-service: (Service On demand)
Broad network access
Resource polling
Measured service: Pay what I have use
Rapid elasticity
Cloud Computing Architecture
Cloud computing stack
Service Models
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a service (SaaS)
Cloud Computing
We covered so far…………….
Deployment Models
Public Cloud
Private Cloud
Community Cloud
Hybrid Cloud
Advantages and Disadvantages of CC
High Level Architectural Approach
Major building blocks of CC Architecture
Technical Architecture
Deployment Operation Architecture
CC Architecture vs. XaaS
XaaS Stack Views: Customer View vs. Provider View
Cloud Computing
We covered so far…………….
XaaS
Common Examples
Other Examples
Classical Service Model
Key Impact of Cloud Computing For IT Function:
From Legacy IT to Evergreen IT
Client Sever Model vs. Cloud Model
SaaS, PaaS/ and IaaS Characteristics:
Scenarios where they are useful
Common / Well-known Providers
“XaaS” different stacks
Important Statements
Network dependency:
Subscribers still need IT skills:
Workload locations are hidden from clients:
Risks from multi-tenancy: (hard chnc of unwntd access)
Data import/export, and performance limitations:
Elasticity: illusion of unlimited resource availability:
Up-front costs to migrate into the cloud:
Potentially strong security from external threats:
Limited visibility and control over data:
Service Level Agreement:
5
General Cloud and Subscriber View
6
Scope and Applicability
7
General Statements
Network dependency:
The subscribers, need a working and secure network to access a cloud.
If the network is not reliable, the cloud will not be reliable from the
subscriber's point of view.
Visibility:
the ability to monitor,, the status of a subscriber's data and programs
and how subscriber data and programs are being accessed by others 10
Understanding Who Controls
Resources in a Cloud
Security perimeter:
It is a barrier to access: the entities that are located outside the
perimeter may access the resources inside only if allowed by a
boundary controller that enforces a policy over access.
It describes the boundaries between different privilege levels of running
software, e.g., between applications and operating systems.
11
Public Cloud
Public Cloud - the cloud infrastructure is made available to
the general public or a large industry group. It is owned and
managed by the organization selling the cloud services. It
exists on the premises of the Cloud provider.
13
Public Cloud
Workload locations are hidden from clients (public):
A provider may migrate a subscriber's workload, whether
processing or data, at any time.
Workload can be transferred to data centers where costs
is low.
Workload may be relocated anywhere at anytime unless
provider has offered (optional) location restriction policies
Risks from multi-tenancy (public):
A single machine may be shared by the workloads of any
combination of subscribers (a subscriber's workload may
be co-resident with the workloads of competitors or
adversaries)
Introduces both reliability and security risk
14
Public Cloud
Network dependency (public):
Subscribers connect to providers via the public Internet.
17
Private Cloud
18
On-site Private Cloud
The security perimeter extends around both the
subscriber's on-site resources and the private cloud's
resources.
Security perimeter does not guarantee control over the
private cloud's resources but subscriber can exercise
control over resources.
19
On-site Private Cloud
Network dependency (on-site-private):
May be limited, because it depending on N/W resources,
over which a subscriber has control
Subscribers still need IT skills (on-site-private):
Subscriber organizations will need the traditional IT skills
required to manage user devices that access the private
cloud, and will require cloud IT skills as well.
Workload locations are hidden from clients (on-site-private):
To manage hardware resources, a private cloud must be
able to migrate workloads between machines without
inconveniencing clients.
However, a subscriber organization chooses the physical
infrastructure, but individual clients still may not know where
their workloads physically exist within the subscriber
20
organization's infrastructure.
On-site Private Cloud
Risks from multi-tenancy (on-site-private):
Workloads of different clients may reside concurrently on the
same systems and local networks, separated only by access
policies implemented by a cloud provider's software.
A flaw in the software or the policies could compromise the
security of a subscriber organization by exposing client
workloads to one another.
Limited resources :
An on-site private cloud, at any specific time, has a fixed
computing and storage capacity that has been sized to
correspond to anticipated workloads and cost
restrictions.
missing power of illusion of
Owing to the
unlimited resource availability
23
Outsourced Private Cloud
Cloud is private but outsource it in term of like maintaining
and installing etc
25
Outsourced Private Cloud
Network dependency (outsourced-private):
In the outsourced private scenario, subscribers may have
an option to provision unique protected and reliable
communication links with the provider.
Workload locations are hidden from clients (outsourced-
private):
The implications are the same as those for an on-site
private cloud.
however, provides an opportunity for the subscriber's
organization to have some visibility and control regarding
workload locations.
Risks from multi-tenancy (outsourced-private):
The implications are the same as those for an on-site
private cloud. 26
Outsourced Private Cloud
Data import/export, and performance limitations
(outsourced-private):
On-demand bulk data import/export is limited by the
network capacity between provider and subscriber, and
real-time or critical processing may be problematic
because of networking limitations.
27
Outsourced Private Cloud
Modest-to-significant up-front costs to migrate
into the cloud (outsourced-private):
In the outsourced private cloud scenario, the resources
are provisioned by the provider.
29
Outsourced Private Cloud
31
Community Cloud
Community Cloud is made up of a set of participant
organizations.
Each participant organization may provide cloud services,
consume cloud services, or both.
It is necessary for at least one community member to
provide cloud services for a community cloud to be
functional.
Assuming that each organization implements a security
perimeter,
the participant organizations are connected via links
between the boundary controllers that allow access through
their security perimeters.
32
Community Cloud
The access policy of a community cloud may be complex:
33
Community Cloud
34
Community Cloud
On-site Community Cloud is applies to community clouds
implemented on the premises of the customers composing
a community cloud.
35
On-site Community Cloud
Network dependency (on-site-community):
The subscribers in an on-site community cloud need to
either provision controlled inter-site communication links
or use cryptography over a less controlled
communications media (such as the public Internet).
The reliability and security of the community cloud will
depend on the reliability and security of the
communication links.
Subscribers still need IT skills (on-site-community):
Organizations that provide cloud resources, the IT skills
required are similar to those required for the on-site
private cloud scenario except that the overall cloud
configuration may be more complex and hence require a
higher skill level.
36
On-site Community Cloud
Identity and access control configurations among the
participant organizations may be complex;
organizations considering a community cloud should
ensure that the IT staff from the participant organizations
negotiate and clearly document the access policies that
are planned within the community cloud.
37
On-site Community Cloud
Data import/export, and performance limitations
(on-site-community):
The communication links between the various participant
organizations in a community cloud can be provisioned
to various levels of performance, security and reliability,
based on the needs of the participant organizations.
The network-based limitations are thus similar to those of
the outsourced-private cloud scenario.
38
On-site Community Cloud
Potentially strong security from external threats
(on-site-community):
The security of a community cloud from external threats
depends on the security of all the security perimeters of
the participant organizations and the strength of the
communications links.
These dependencies are essentially similar to those of
the outsourced private cloud scenario, but with possibly
more links and security perimeters..
39
On-site Community Cloud
Highly variable up-front costs to migrate into the cloud
(on-site-community):
The up-front costs of an on-site community cloud for a
participant organization depend greatly on whether the
organization plans to consume cloud services only or also
to provide cloud services.
For the consume-only scenario, the up-front costs appear
to be similar to those for an outsourced private cloud (i.e.,
modest-to-significant).
For a participant organization that intends to provide cloud
services within the community cloud, the costs appear to
be similar to those for the on-site private cloud scenario
(i.e., significant-to-high).
40
Outsourced Community Cloud
This scenario is very similar to the outsourced private cloud
scenario:
42
Outsourced Community Cloud
Network dependency (outsourced-community):
The network dependency of the outsourced community
cloud is similar to that of the outsourced private cloud.
The primary difference is that multiple protected
communications links are likely from the community
members to the provider's facility..
Workload locations are hidden from clients (outsourced-
community):
Same as for the outsourced private cloud scenario.
43
Outsourced Community Cloud
Data import/export, and performance limitations
(outsourced-community):
Same as for the outsourced private cloud scenario.
44
Hybrid Cloud
Hybrid Cloud
–The cloud infrastructure is a composition of two or more
clouds (private, community, or public) that remain unique
entities but are bound together by standardized or proprietary
technology that enables data and application portability.
Interpretability has high degree of importance
Examples:
Windows Azure
VMware vcloud
45
Hybrid Cloud
The a hybrid cloud is composed of two or more private,
community, or public clouds.
46
Hybrid Cloud
Why hybrid cloud is useful or important.
It depends, what are the uses patterns we have ? Like
If more critical mission, security issues involved than keep it private
In university, labs of students for computing (less security) can be
made public while students record and examinations cannot be
outsourced, ( even more economical) so it is combination of private
and public cloud.
It is difficult to handle or manage the categorization of data
and applications in case of hybrid cloud.
These applications and data belongs to public etc
47
Hybrid Cloud
48