Unit 4 F
Unit 4 F
Digital Notes
[Department of Computer Science Engineering]
Course : B.TECH
Branch : CSE 4th Yr
• 1. Peer-to-Peer Inter-Cloud
Federation: Clouds work together
directly, but they may also utilize
distributed entities as directories or
brokers. Clouds communicate and
engage in direct negotiation without the
use of intermediaries. The peer-to-peer
federation intercloud projects are
RESERVOIR (Resources and Services
Virtualization without Barriers Project)
. Centralized Inter-Cloud
Federation:
• In the cloud, resource sharing is
carried out or facilitated by a central
body. The central entity serves as a
registry for the available cloud
resources. The inter-cloud initiatives
Dynamic Cloud Collaboration (DCC),
and Federated Cloud Management
leverage centralized inter-cloud
federation
3. Multi-Cloud Service:
• Clients use a service to access
various clouds. The cloud client hosts
a service either inside or externally.
The services include elements for
brokers. The inter-cloud initiatives
OPTIMUS, contrail, MOSAIC,
STRATOS, and commercial cloud
management solutions leverage
multi-cloud services
Difficulties with Inter-Cloud
Research
• The needs of cloud users frequently call for various resources, and the needs are
often variable and unpredictable. This element creates challenging issues with
resource provisioning and application service delivery. The difficulties in
federating cloud infrastructures include the following:
• Prediction of Application Service Behaviour: It is essential that the system
be able to predict customer wants and service Behaviour. It cannot make rational
decisions to dynamically scale up and down until it has the ability to predict. It is
necessary to construct prediction and forecasting models. Building models that
accurately learn and fit statistical functions suited to various behaviors is a
difficult task. Correlating a service’s various behaviors can be more difficult.
• Flexible Service-Resource Mapping: Due to high operational expenses and
energy demands, it is crucial to enhance efficiency, cost-effectiveness, and
usage. A difficult process of matching services to cloud resources results from
the system’s need to calculate the appropriate software and hardware
combinations. The QoS targets must be met simultaneously with the highest
possible system utilization and efficiency throughout the mapping of services.
• Techniques for Optimization Driven by Economic Models: An approach to
decision-making that is driven by the market and looks for the best possible
combinations of services and deployment strategies is known as combinatorial
optimization. It is necessary to create optimization models that address both
resource- and user-centered QoS objectives.
• Integration and Interoperability: SMEs may not be able to migrate to the
cloud since they have a substantial number of on-site IT assets, such as
business applications. Due to security and privacy concerns, sensitive data in
an organization may not be moved to the cloud. In order for on-site assets and
cloud services to work together, integration and interoperability are required. It
is necessary to find solutions for the problems of identity management, data
management, and business process orchestration.
• Monitoring System Components at Scale: In spite of the distributed nature
of the system’s components, centralized procedures are used for system
management and monitoring. The management of multiple service queues and
a high volume of service requests raises issues with scalability, performance,
and reliability, making centralized approaches ineffective. Instead,
decentralized messaging and indexing models-based architectures are required,
which can be used for service monitoring and management services.
Identity and Access Management(IAM)
IAM
• Identity and Access Management (IAM) is a combination of
policies and technologies that allows organizations to identify
users and provide the right form of access as and when required.
• There has been a burst in the market with new applications, and the
requirement for an organization to use these applications has
increased drastically. The services and resources you want to access
can be specified in IAM.
• IAM doesn’t provide any replica or backup. IAM can be used for
many purposes such as, if one want’s to control access of individual
and group access for your AWS resources. With IAM policies,
managing permissions to your workforce and systems to ensure
least-privilege permissions becomes easier. The AWS IAM is a global
service.
Components of Identity and Access Management (IAM)
• Users
• Roles
• Groups
• Policies
IAM Identities Classified As
• IAM Users
• IAM Groups
• IAM Roles
• Root User: The root user will automatically be created and
granted unrestricted rights. We can create an admin user
with fewer powers to control the entire Amazon account.
• IAM Users: We can utilize IAM users to access the AWS
Console and their administrative permissions differ from
those of the Root user and if we can keep track of their
login information.
Example
• With the aid of IAM users, we can accomplish our goal of giving a specific person
access to every service available in the Amazon dashboard with only a limited set of
permissions, such as read-only access. Let’s say user-1 is a user that I want to have
read-only access to the EC2 instance and no additional permissions, such as create,
delete, or update. By creating an IAM user and attaching user-1 to that IAM user, we
may allow the user access to the EC2 instance with the required permissions.
• IAM Groups: A group is a collection of users, and a single person can be a member
of several groups. With the aid of groups, we can manage permissions for many
users quickly and efficiently.
• Example
• Consider two users named user-1 and user-2. If we want to grant user-1 specific
permissions, such as the ability to delete, create, and update the auto-calling group
only, and if we want to grant user-2 all the necessary permissions to maintain the
auto-scaling group as well as the ability to maintain EC2,S3 we can create groups
and add this user to them. If a new user is added, we can add that user to the
required group with the necessary permissions.
IAM Roles
• Access management
• Federation
• RBAC/EM
• Multi-Factor authentication
• Access governance
• Customer IAM
• API Security
• IDaaS – Identity as a service
• Granular permissions
• Privileged Identity management – PIM (PAM or PIM is the
same)
Benefits of IAM Systems
• Security: IAM makes certain that only the right people are given access to
core systems and information and thus safeguards organizations from
threats within and outside.
• Regulatory Compliance: IAM aids organizations in compliance with the
legal and industry-compliant requirements based on the accessibility and
the log records of the user activities.
• Operational Efficiency: IAM provides means of minimizing workload to IT
teams by automating tasks such as onboarding, offboarding, and shifts in
user roles.
• Risk Mitigation: IAM also helps in combating data breaches and
cyber attacks since it has strict measures towards providing access to users.
• User Experience: It provides easier access to the firm’s partners,
employees, and customers in interacting with the systems with increased
security, thus enhancing productivity and customer satisfaction.
IAM and Compliance Regulations
• Access Control: IAM helps in authorizing only the right people access
to information; this complies with data protection laws such as GDPR
and HIPAA.
• Audit Trails: Saves a rich history of users activities to assist in audits
and other reporting requirements.
• Segregation of Duties: Implements strict access control with respect
to the roles that inhabitants are to undertake to avoid breaching
conflict of interest rules as provided by SOX and its equivalents.
• Data Protection: Enhances data protection; the program is useful in
supporting compliance with Data Security policies in line with
PCI-DSS and other standards.
• User Authentication: Provides multi-factor authentication, thus
satisfies security standards for many compliance programs.
IAM Technologies and Tools
• Single Sign-On (SSO): A choice that lets a user login and use multiple
applications at once, as well as give more security to the
services. Example: Its competitors include Okta and Microsoft Azure
AD.
• Multi-Factor Authentication (MFA): A second one is that you must
verify your account with two or more ways to boost its security.
Example: Some of the examples of Two Factor Authentication
applications are Duo Security and Google Authenticator.
• Role-Based Access Control (RBAC): Secures the system based on
employees’ roles, where the user will have the least privilege to access
the system. Example: IBM Security Identity Manager.
• Privileged Access Management (PAM): Performs functions associated
with obtaining and maintaining high levels of accessible (“privileged”)
computing resources. Example: CyberArk, BeyondTrust.
Resource Access Control
• Identity and access management (IAM) will allows you to manage the
permissions to the resources in the AWS cloud like users who can access
particular serivce to which extent and also instead of mantaing the permissions
individually you can manage the permissions to group of users at a time.
• Managing permissions: For example you want to assign an permission to the
user that he/her can only perform restart the instance task on AWS EC2 instance
then you can do using AWS IAM.
• Implemneting role-based access control(RBAC): Identity and Access
Management (IAM) will helps you to manage the permissions based on roles
Roles will helps to assign the the permissions to the resourcesw in the AWS like
which resources can access the another resource according to the requirement.
• Enabling single sign-on (SSO): Identity and Access Management will helps you to
maintain the same password and user name which will reduce the effort of
remembering the different password.
IAM Features
• Lack of Skill –
While working, shifting to another service provider, need an extra feature, how to use a
feature, etc. are the main problems caused in IT Companies who doesn’t have skilled
Employees. So it requires a skilled person to work with Cloud Computing.
• Denial of Service (DoS) attack –
This type of attack occurs when the system receives too much traffic.
Mostly DoS attacks occur in large organizations such as the banking
sector, government sector, etc. When a DoS attack occurs, data is lost. So,
in order to recover data, it requires a great amount of money as well as
time to handle it.
• Shared Resources: Cloud computing relies on a shared infrastructure. If
one customer’s data or applications are compromised, it may potentially
affect other customers sharing the same resources, leading to a breach of
confidentiality or integrity.
• Compliance and Legal Issues: Different industries and regions have
specific regulatory requirements for data handling and storage. Ensuring
compliance with these regulations can be challenging when data is stored
in a cloud environment that may span multiple jurisdictions.
• Data Encryption: While data in transit is often encrypted, data at rest can be susceptible to
breaches. It’s crucial to ensure that data stored in the cloud is properly encrypted to prevent
unauthorized access.
• Insider Threats: Employees or service providers with access to cloud systems may misuse their
privileges, intentionally or unintentionally causing data breaches. Proper access controls and
monitoring are essential to mitigate these threats.
• Data Location and Sovereignty: Knowing where your data physically resides is important for
compliance and security. Some cloud providers store data in multiple locations globally, and
this may raise concerns about data sovereignty and who has access to it.
• Loss of Control: When using a cloud service, you are entrusting a third party with your data
and applications. This loss of direct control can lead to concerns about data ownership, access,
and availability.
• Incident Response and Forensics: Investigating security incidents in a cloud environment can
be complex. Understanding what happened and who is responsible can be challenging due to
the distributed and shared nature of cloud services.
• Data Backup and Recovery: Relying on cloud providers for data backup and recovery can be
risky. It’s essential to have a robust backup and recovery strategy in place to ensure data
availability in case of outages or data loss.
• Vendor Security Practices: The security practices of cloud
service providers can vary. It’s essential to thoroughly assess
the security measures and certifications of a chosen provider
to ensure they meet your organization’s requirements.
• IoT Devices and Edge Computing: The proliferation of IoT
devices and edge computing can increase the attack surface.
These devices often have limited security controls and can be
targeted to gain access to cloud resources.
• Social Engineering and Phishing: Attackers may use social
engineering tactics to trick users or cloud service providers
into revealing sensitive information or granting unauthorized
access.
Yo u
nk
T ha