ganesh_kavhar

cloud computing by ganesh kavhar

Jan 10th, 2019
137
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 33.68 KB | None | 0 0
  1. What is Cloud?
  2. The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something which is present at remote location. Cloud can provide services over network i.e. on public networks or on private networks i.e. WAN, LAN or VPN.
  3.  
  4. Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud.
  5. What is Cloud Computing?
  6. Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
  7.  
  8. cloud_computing Tutorial
  9. We need not to install a piece of software on our local PC and this is how, the cloud computing overcomes platform dependency issues. Hence, the Cloud Computing is making our business application mobile and collaborative.
  10. Cloud Computing Technologies
  11. There are certain technologies that are working behind the cloud computing platforms making cloud computing flexible, reliable, usable. These technologies are listed below:
  12.  
  13. Virtualization
  14.  
  15. Service-Oriented Architecture (SOA)
  16.  
  17. Grid Computing
  18.  
  19. Utility Computing
  20.  
  21. Virtualization
  22. Virtualization is a technique which allows to share single physical instance of an application or resource among multiple organizations or tenants(customers). It does so by assigning a logical name to a physical resource and providing a pointer to that physical resource when demanded.
  23.  
  24. cloud_computing Tutorial
  25. The Multitenant architecture offers virtual isolation among the multiple tenants and therefore, the organizations can use and customize the application as though, they each has its own instance running.
  26.  
  27. Service-Oriented Architecture(SOA)
  28. Service-Oriented Architecture helps to use applications as a service for other applications regardless type of vendor, product or technology. Therefore it is possible to exchange of data between applications of different vendors without additional programming or making changes to services.
  29.  
  30. cloud_computing-service_oriented_architecture cloud_computing Tutorial
  31. Grid Computing
  32. Grid Computing refers to distributed computing in which a group computers from multiple locations are connected with each other to achieve common objective. These computer resources are heterogeneous and geographically dispersed.
  33.  
  34. Grid Computing breaks complex task into smaller pieces. These smaller pieces are distributed to CPUs that reside within the grid.
  35.  
  36. cloud_computing Tutorial
  37. Utility Computing
  38. Utility computing is based on Pay per Use model. It offers computational resources on demand as a metered service. Cloud computing, grid computing, and managed IT services are based on the concept of Utility computing
  39.  
  40. Cloud Computing Architecture
  41. The Cloud Computing architecture comprises of many cloud components, each of them are loosely coupled. we can broadly divide the cloud architecture into two parts:
  42.  
  43. Front End
  44.  
  45. Back End
  46.  
  47. Each of the ends are connected through a network, usually via. Internet. The following diagram shows the graphical view of cloud computing architecture:
  48.  
  49. cloud_computing Tutorial
  50. Front End
  51. Front End refers to the client part of cloud computing system. It consist of interfaces and applications that are required to access the cloud computing platforms. Eg. Web Browser
  52.  
  53. Back End
  54. Back End refers to the cloud itself. It consist of all the resources required to provide cloud computing services. It comprises of huge data storage, virtual machines, security mechanism, services, deployment models, servers etc.
  55.  
  56. Cloud Infrastructure Components
  57. Cloud infrastructure consist of servers, storage, network, management software, and deployment software and platform virtualization.
  58.  
  59. cloud_computing Tutorial
  60. Hypervisor
  61. Hypervisor is a firmware or low level program that acts as a Virtual Machine Manager. It allows to share the single physical instance of cloud resources between several tenants.
  62.  
  63. Management Software
  64. Management Software helps to maintain and configure the infrastructure.
  65.  
  66. Deployment Software
  67. Deployment software helps to deploy and integrate the application on the cloud.
  68.  
  69. Network
  70. Network is the key component of cloud infrastructure. It allows to connect cloud services over the internet. It is also possible to deliver network as a utility over the internet i.e. the consumer can customize the network route and protocol.
  71.  
  72. Server
  73. Server helps to compute the resource sharing and offer other services such as resource allocation and de allocation, monitoring resources, security etc.
  74.  
  75. Storage
  76. Cloud uses distributed file system for storage purpose. If one of the storage resource fails then it can be extracted from another one, which makes cloud computing more reliable.
  77.  
  78. Cloud Deployment Models
  79. Foloowing are the cloud deployment models:
  80.  
  81. Public Cloud Model
  82.  
  83. Private Cloud Model
  84.  
  85. Hybrid Cloud Model
  86.  
  87. Community Cloud Model
  88.  
  89. Public Cloud Model
  90. The Public Cloud Model allows systems and services to be easily accessible to general public. e.g. Google, Amazon, Microsoft offers cloud services via internet.
  91.  
  92. cloud_computing Tutorial
  93. BENEFITS
  94. Cost Effective
  95.  
  96. Reliability
  97.  
  98. Flexibility
  99.  
  100. Location Independence
  101.  
  102. Utility Style Costing
  103.  
  104. High Scalability
  105.  
  106. DISADVANTAGES
  107. Low Security
  108.  
  109. Less customizable
  110.  
  111. Private Cloud Model
  112. The Private Cloud allows systems and services to be accessible with in an organization. The Private Cloud is operated only within a single organization. However, It may be managed internally or by third-party.
  113.  
  114. cloud_computing Tutorial
  115. BENEFITS
  116. Here are the benefits of deploying cloud as private cloud model.
  117.  
  118. Higher Security and Privacy
  119.  
  120. More Control
  121.  
  122. Cost and energy efficiency
  123.  
  124. DISADVANTAGES
  125. Here are the disadvantages of using private cloud model:
  126.  
  127. Restricted Area
  128.  
  129. Inflexible Pricing
  130.  
  131. Limited Scalability
  132.  
  133. Additional Skills
  134.  
  135. Hybrid Cloud Model
  136. The Hybrid Cloud is mixture of public and private cloud. Non Critical activities are performed using public cloud while the critical activities are performed using private cloud.
  137.  
  138. BENEFITS
  139. Here are the benefits of deploying cloud as hybrid cloud model:
  140.  
  141. Scalability
  142.  
  143. Flexibility
  144.  
  145. Cost Efficiencies
  146.  
  147. DISADVANTAGES
  148. Here are the disadvantages of Hybrid Cloud Model:
  149.  
  150. Networking Issues
  151.  
  152. Security Compliance
  153.  
  154. Infrastructural Dependency
  155.  
  156. Community Cloud Model
  157. The Community Cloud allows system and services to be accessible by group of organizations. It shares the infrastructure between several organizations from a specific community. It may be managed internally or by the third-party.
  158.  
  159. cloud_computing Tutorial
  160. BENEFITS
  161. Here are the benefits of deploying cloud as community cloud model:
  162.  
  163. Cost effective
  164.  
  165. Sharing Between Organizations
  166.  
  167. Security
  168.  
  169. ISSUES
  170. Since all data is housed at one location, therefore one must be careful in storing data in community cloud because it might be accessible by others.
  171.  
  172. It is also challenging to allocate responsibilities of governance, security and cost.
  173.  
  174. Cloud Service Models
  175. Following are the cloud service models:
  176.  
  177. Infrastructure as a Service(IaaS) Model
  178.  
  179. Platform as a Service(PaaS) Model
  180.  
  181. Software as a Service(SaaS) Model
  182.  
  183. Identity as a Service(IDaaS) Model
  184.  
  185. Network as a Service(NaaS) Model
  186.  
  187. Infrastructure as a Service(IaaS)
  188. IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage etc. Apart from these resource the IaaS also offers:
  189.  
  190. Virtual machine disk storage
  191.  
  192. Virtual local area network (VLANs)
  193.  
  194. Load balancers
  195.  
  196. IP addresses
  197.  
  198. Software bundles
  199.  
  200. All of the above resources are made available to end user via server virtualization. Moreover, these resources are accessed by the customers as if they own them.
  201.  
  202. cloud_computing Tutorial
  203. BENEFITS
  204. IaaS allows the cloud provider to freely locate the infrastructure over the internet in cost-effective manner. Some of the key benefits of IaaS are listed below:
  205.  
  206. Full Control of the computing resources through Administrative Access to VMs.
  207.  
  208. Flexible and Efficient renting of Computer Hardware.
  209.  
  210. Portability, Interoperability with Legacy Applications.
  211.  
  212. ISSUES
  213. Here are the issues associated with IaaS:
  214.  
  215. Compatibility with Legacy Security Vulnerabilities
  216.  
  217. Virtual Machine Sprawl
  218.  
  219. Robustness of VM-level Isolation
  220.  
  221. Data Erase Practices
  222.  
  223. CHARACTERISTICS
  224. Here are the characteristics of IaaS service model:
  225.  
  226. Virtual machines with pre-installed software.
  227.  
  228. Virtual machines with pre-installed Operating Systems such as windows, Linux, and Solaris.
  229.  
  230. On-demand availability of resources.
  231.  
  232. Allows to store copies of particular data in different locations.
  233.  
  234. The computing resources can be easily scaled up and down.
  235.  
  236. Platform as a Service(PaaS)
  237. PaaS offers the run time environment for applications. It also offers development & deployment tools, required to develop applications. PaaS has a feature of point-and-click tools that enables non-developers to create web applications.
  238.  
  239. The following diagram shows how PaaS offers an API and development tools to the developers and how it helps the end user to access business applications.
  240.  
  241. cloud_computing Tutorial
  242. BENEFITS
  243. Following are the benefits of PaaS model:
  244.  
  245. Lower administrative overhead
  246.  
  247. Lower total cost of ownership
  248.  
  249. Scalable Solutions
  250.  
  251. More current system software
  252.  
  253. ISSUES
  254. Like SaaS, PaaS also place significant burdens on consumer's browsers to maintain reliable and secure connections to the provider systems. Therefore, PaaS shares many of the issues of SaaS. However, there are some specific issues associated with PaaS as listed below:
  255.  
  256. Lack of portability between PaaS clouds
  257.  
  258. Event Based Processor Scheduling
  259.  
  260. Security Engineering of PaaS applications
  261.  
  262. Software as a Service (SaaS)
  263. Software as a Service(SaaS) model allows to provide software applications as a service to the end users. It refers to a software that is deployed on a hosted service and is accessible via internet. There are several SaaS applications. Some of them are listed below:
  264.  
  265. Billing and Invoicing System
  266.  
  267. Customer Relationship Management (CRM) applications
  268.  
  269. Help Desk Applications
  270.  
  271. Human Resource (HR) Solutions
  272.  
  273. CHARACTERISTICS
  274. Here are the characteristics of SaaS service model:
  275.  
  276. SaaS makes the software available over the internet.
  277.  
  278. The Software are maintained by the vendor rather than where they are running.
  279.  
  280. The license to the software may be subscription based or usage based. And it is billed on recurring basis.
  281.  
  282. SaaS applications are cost effective since they do not require any maintenance at end user side.
  283.  
  284. They are available on demand.
  285.  
  286. They can be scaled up or down on demand.
  287.  
  288. They are automatically upgraded and updated.
  289.  
  290. SaaS offers share data model. Therefore multiple users can share single instance of infrastructure. It is not required to hard code the functionality for individual users.
  291.  
  292. All users are running same version of the software.
  293.  
  294. BENEFITS
  295. Using SaaS has proved to be beneficial in term of scalability, efficiency, performance and much more. Some of the benefits are listed below:
  296.  
  297. Modest Software Tools
  298.  
  299. Efficient use of Software Licenses
  300.  
  301. Centralized Management & Data
  302.  
  303. Platfrom responsibilities managed by provider
  304.  
  305. Multitenant solutions.
  306.  
  307. ISSUES
  308. There are several issues associated with SaaS. Some of them are listed below:
  309.  
  310. Browser based risks
  311.  
  312. Network dependence
  313.  
  314. Lack of portability between SaaS clouds
  315.  
  316. Identity as a Service(IDaaS)
  317. OVERVIEW
  318. Employees in a company require to login to system to perform various tasks. These systems may be based on local server or cloud based. Following are the problems that an employee might face:
  319.  
  320. Remembering different username and password combinations for accessing multiple servers.
  321.  
  322. If an employee leaves the company, It's required to ensure that each of the user's account has been disabled. This increases workload on IT staff.
  323.  
  324. To solve above problems, a new technique emerged which is known as Identity as a Service (IDaaS).
  325.  
  326. IDaaS offers management of identity (information) as a digital entity. This identity can be used during electronic transactions.
  327.  
  328. IDENTITY
  329. Identity refers to set of attributes associated with something and make it recognizable. All objects may have some same attributes but their identity can not be the same. This unique identity is assigned through unique identification attribute.
  330.  
  331. There are several identity services that have been deployed to validate services such as validating web sites, transactions, transaction participants, client etc. Identity as a Service may include the following:
  332. Directory Services
  333.  
  334. Federated Services
  335.  
  336. Registration
  337.  
  338. Authentication Services
  339.  
  340. Risk and Event monitoring
  341.  
  342. Single sign-on services
  343.  
  344. Identity and Profile management
  345.  
  346. SINGLE SIGN-ON (SSO)
  347. To solve the problem of using different username & password combination for different servers, companies now employ Single Sign-On software, which allows the user to login only one time and manages the user's access to other systems.
  348.  
  349. SSO has single authentication server, managing multiple access to other systems, as shown in the following diagram:
  350.  
  351. cloud_computing Tutorial
  352. SSO WORKING
  353. There are several implementations of SSO. Here, we discuss the common working of SSO:
  354.  
  355. cloud_computing Tutorial
  356. Following steps explain the working of Single Sign-On software:
  357.  
  358. User logs into the authentication server using a username and password.
  359.  
  360. The authentication server returns the user's ticket.
  361.  
  362. User sends the ticket to intranet server.
  363.  
  364. Intranet server sends the ticket to the authentication server.
  365.  
  366. Authentication server sends the user's security credentials for that server back to the intranet server.
  367.  
  368. If an employee leaves the company, then it just required to disable the user at the authentication server, which in turn disable the user's access to all the systems.
  369. FEDERATED IDENTITY MANAGEMENT(FIDM)
  370. FIDM describes the technologies and protocols that enable a user to package security credentials across security domains. It uses Security Markup Language (SAML) to package a user's security credentials as shown in the following diagram:
  371.  
  372. cloud_computing Tutorial
  373. OPENID
  374. It offers users to login multiple websites with single account. Google, Yahoo!, Flickr, MySpace, WordPress.com are some of the companies that support OpenID.
  375.  
  376. BENEFITS
  377. Increased site conversation rates.
  378.  
  379. Access to greater user profile content.
  380.  
  381. Fewer problems with lost passwords.
  382.  
  383. Ease of content integration into social networking sites.
  384.  
  385. Network as a Service(NaaS)
  386. OVERVIEW
  387. Networks as a Service allows us to access to network infrastructure directly and securely. NaaS makes it possible to deploy custom routing protocols.
  388.  
  389. NaaS uses virtualized network infrastructure to provide network services to the consumer. It is the responsibility of NaaS provider to maintain and manage the network resources, which decreases the workload from the consumer. Moreover, NaaS offers network as a utility.
  390.  
  391. NaaS is also based on pay-per-use model.
  392. HOW NAAS IS DELIVERED?
  393. To use NaaS model, the consumer is required to logon to the web portal, where he can get on line API. Here, the consumer can customize the route.
  394.  
  395. In turn, consumer has to pay for the capacity used. It is also possible to turn off the capacity at any time.
  396.  
  397. MOBILE NAAS
  398. Mobile NaaS offers more efficient and flexible control over mobile devices. It uses virtualization to simplify the architecture to create more efficient processes.
  399.  
  400. Following diagram shows the Mobile NaaS service elements:
  401.  
  402. cloud_computing Tutorial
  403. NAAS BENEFITS
  404. NaaS offers a number of benefits, some of the are discussed below:
  405.  
  406. Independence
  407.  
  408. Analytics
  409.  
  410. Resilience
  411.  
  412. Ease of Adding new Service Elements
  413.  
  414. Isolation of customer traffic
  415.  
  416. Support Models
  417.  
  418. Cloud Management Tasks
  419. Cloud Management involves a number of tasks to be performed by the cloud provider to ensure efficient use of cloud resources. Here, we will discuss some of these tasks:
  420.  
  421. Audit System Backups
  422.  
  423. System's Data Flow Management
  424.  
  425. Ensuring no Vendor Lock-in
  426.  
  427. Provider's security procedures
  428.  
  429. Monitor Capacity Planning and Scaling Capabilities
  430.  
  431. Monitor Audit-Log Use
  432.  
  433. Solution testing and Validation
  434.  
  435. Cloud Data Storage
  436. Cloud Storage is a service that allows to save data on offsite storage system managed by third party and is made accessible by a web services API.
  437.  
  438. Storage Devices
  439. Storage devices can be broadly classified into two categories:
  440.  
  441. Block Storage Devices
  442.  
  443. File Storage Devices
  444.  
  445. BLOCK STORAGE DEVICES
  446. Block Storage Devices offers the raw storage to the clients. This raw storage can be partitioned to create volumes.
  447.  
  448. FILE STORAGE DEVICES
  449. File Storage Devices offers storage to clients in form of files, maintaining its own file system. This storage is in the form of Network Attached Storage (NAS).
  450.  
  451. Cloud Storage Classes
  452. Cloud Storage can be broadly classified into two categories:
  453.  
  454. Unmanaged Cloud Storage
  455.  
  456. Managed Cloud Storage
  457.  
  458. UNMANAGED CLOUD STORAGE
  459. Unmanaged Cloud Storage means that the storage is preconfigured for the consumer. The consumer can not format nor the consumer can install own file system or change drive properties.
  460.  
  461. MANAGED CLOUD STORAGE
  462. Managed Cloud Storage offers online storage space on demand. Managed cloud storage system presents what appears to the user to be a raw disk that the user can partition and format.
  463.  
  464. Creating Cloud Storage System
  465. The cloud storage system stores multiple copes of data on multiple servers and in multiple locations. If one system fails then it only requires to change the pointer to stored object's location.
  466.  
  467. To aggregate storage assets into cloud storage systems, the cloud provider can use storage virtualization software, StorageGRID. It creates a virtualization layer that fetches storage from different storage devices into a single management system. It can also manage data from CIFS and NFS file system over the Internet. The following diagram shows how SystemGRID virtualizes the storage into storage clouds:
  468.  
  469. cloud_computing Tutorial
  470. Virtual Storage Containers
  471. Virtual storage containers offer high performance cloud storage systems. Logical Unit Number (LNU) of device, files and other objects are created in virtual storage containers. Following diagram shows a virtual storage container, defining a cloud storage domain:
  472.  
  473. cloud_computing Tutorial
  474. Challenges
  475. Storing the data in cloud is not that simple task. Apart from its flexibility and convenience, it also has several challenges faced by the consumers. The consumers require ability to:
  476.  
  477. Provision additional storage on demand.
  478.  
  479. Know and restrict the physical location of the stored data.
  480.  
  481. Verify how data was erased?
  482.  
  483. Have access to a documented process for surely disposing of data storage hardware.
  484.  
  485. Administrator access control over data.
  486.  
  487. Virtualization Concept
  488. Creating a virtual machine over existing operating system and hardware is referred as Hardware Virtualization. Virtual Machines provide an environment that is logically separated from the underlying hardware.
  489.  
  490. The machine on which the virtual machine is created is known as host machine and virtual machine is referred as a guest machine. This virtual machine is managed by a software or firmware which is known as hypervisor.
  491.  
  492. Hypervisor
  493. Hypervisor is a firmware or low level program that acts as a Virtual Machine Manager. There are two types of hypervisor:
  494.  
  495. Type 1 hypervisor runs on bare system. LynxSecure, RTS Hypervisor, Oracle VM, Sun xVM Server, VirtualLogic VLX are examples of Type 1 hypervisor. The following diagram shows the Type 1 hypervisor.
  496.  
  497. cloud_computing Tutorial
  498. The type1 hypervisor does not have any host operating system because they are installed on a bare system.
  499. Type 2 hypervisor is a software interface that emulates the devices with which a system normally interacts. Containers, KVM, Microsoft Hyper V, VMWare Fusion, Virtual Server 2005 R2, Windows Virtual PC and VMWare workstation 6.0 are examples of Type 2 hypervisor. The following diagram shows the Type 2 hypervisor.
  500.  
  501. cloud_computing Tutorial
  502. Types of Hardware Virtualization
  503. Here are the three types of hardware virtualization:
  504.  
  505. Full Virtualization
  506.  
  507. Emulation Virtualization
  508.  
  509. Paravirtualization
  510.  
  511. Full Virtualization
  512. In Full Virtualization, the underlying hardware is completely simulated. Guest software do not require any modification to run.
  513.  
  514. cloud_computing Tutorial
  515. Emulation Virtualization
  516. In Emulation, the virtual machine simulates the hardware and hence become independent of the it. In this, the guest operating system does not require modification.
  517.  
  518. cloud_computing Tutorial
  519. Paravirtualization
  520. In Paravirtualization, the hardware is not simulated. The guest software run their own isolated domains.
  521.  
  522. cloud_computing Tutorial
  523. VMware vSphere is highly developed infrastructure that offers a management infrastructure framework for virtualization. It virtualizes the system, storage and networking hardware.
  524. Securing the Cloud
  525. Security in cloud computing is a major concern. Data in cloud should be stored in encrypted form. To restrict client from direct accessing the shared data, proxy and brokerage services should be employed.
  526.  
  527. Security Planning
  528. Before deploying a particular resource to cloud, one should need to analyze several attributes about the resource such as:
  529.  
  530. Select which resources, he is going to move to cloud and analyze its sensitivity to risk.
  531.  
  532. Consider cloud service models such as IaaS, PaaS, and SaaS. These models require consumer to be responsible for security at different level of service.
  533.  
  534. Consider which cloud type such as public, private, community or hybrid.
  535.  
  536. Understand the cloud service provider's system that how data is transferred, where it is stored and how to move data into and out of cloud.
  537.  
  538. Mainly the risk in cloud deployment depends upon the service models and cloud types.
  539. Understanding Security of Cloud
  540. Security Boundaries
  541. A particular service model defines the boundary between the responsibilities of service provider and consumer. Cloud Security Alliance (CSA) stack model defines the boundaries between each service model and shows how different functional units relate to each other. The following diagram shows the CSA stack model:
  542.  
  543. cloud_computing Tutorial
  544. KEY POINTS TO CSA MODEL:
  545. IaaS is the most basic level of service with PaaS and SaaS next two above level of service.
  546.  
  547. Moving upwards each of the service inherits capabilities and security concerns of the model beneath.
  548.  
  549. IaaS provides the infrastructure, PaaS provides platfrom development environment and SaaS provides operating environment.
  550.  
  551. IaaS has the least level of integrated functionalities and integrated security while SaaS has the most.
  552.  
  553. This model describes the security boundaries at which cloud service provider's responsibility ends and the consumer's responsibilities begin.
  554.  
  555. Any security mechanism below the security boundary must be built into the system and above should me maintained by the consumer.
  556.  
  557. Although each service model has security mechanism but security needs also depends upon where these services are located, in private, public, hybrid or community cloud.
  558. Understanding Data Security
  559. Since all the data is transferred using internet, therefore, data security is of major concern in cloud. Here are key mechanisms for protecting data mechanisms listed below:
  560.  
  561. Access Control
  562.  
  563. Auditing
  564.  
  565. Authentication
  566.  
  567. Authorization
  568.  
  569. All of the service model must should incorporate security mechanism operating in all above mentioned areas.
  570.  
  571. Isolated Access to Data
  572. Since data stored in the cloud can be accessed from anywhere, therefore, in order to protect the data, we must have a mechanism to protect it from the client direct access.
  573.  
  574. Brokered Cloud Storage Access is one of the approach for isolating the storage in cloud. In this approach two services are created:
  575.  
  576. A broker with full access to storage but no access to client.
  577.  
  578. A proxy with no access to storage but access to both client and broker.
  579.  
  580. working of Brokered Cloud Storage Access system
  581. When the client issue request to access data:
  582.  
  583. The client data request goes to proxy's external service interface.
  584.  
  585. The proxy forwards the request to the broker.
  586.  
  587. The broker requests the data from cloud storage system.
  588.  
  589. The cloud storage system returns the data to the broker.
  590.  
  591. The broker returns the data to proxy.
  592.  
  593. Finally the proxy sends the data to the client.
  594.  
  595. All of the above steps are shown in the following diagram:
  596.  
  597. cloud_computing Tutorial
  598. Encryption
  599. Encryption helps to protect data from being compromised. It protects data that is being transferred as well as data stored in the cloud. Although encryption helps to protect data from any unauthorized access, it does not prevent from data loss.
  600.  
  601. Cloud Computing Operations
  602. Overview
  603. Cloud computing operation refers to delivering superior cloud service. Today cloud computing operations have become very popular and widely employed by many of the organizations just because, it allows to perform all business operations over the internet.
  604.  
  605. These operations can be performed using a web application or mobile based applications. There are a number of operations that are performed in cloud, some of them are shown in the following diagram:
  606.  
  607. cloud_computing Tutorial
  608. Managing Cloud Operations
  609. There are several ways to manage day to day cloud operations, as shown in the following diagram:
  610.  
  611. cloud_computing Tutorial
  612. Always employ right tools and resources to perform any function in the cloud.
  613.  
  614. Things should be done at right time and at right cost.
  615.  
  616. Selecting an appropriate resource is mandatory for operation management.
  617.  
  618. The process should be standardized and automated to avoid repetitive tasks.
  619.  
  620. Using efficient process will eliminate the waste and redundancy.
  621.  
  622. One should maintain the quality of service to avoid re-work later.
  623.  
  624. Cloud Applications
  625. Cloud Computing has its applications in almost all the fields such as business, entertainment, data storage, social networking, management, entertainment, education, art and global positioning system etc. Some of the widely famous cloud computing applications are discusses here in this tutorial:
  626.  
  627. Business Applications
  628. Cloud computing has made business more collaborative and easy by incorporating various apps such as MailChimp, Chatter, Google Apps for business, and Quickbooks.
  629.  
  630. SN Application Description
  631. 1 MailChimp
  632. It offers an email publishing platfrom. It is widely employed by the businesses to design and send their email campaigns.
  633. 2 Chatter
  634. Chatter app helps the employee to share important information about organization in real time. One can get the instant feed regarding any issue.
  635. 3 Google Apps for Business
  636. Google offers creating text documents, spreadsheets, presentations etc. on Google Docs which allows the business users to share them in collaborating manner.
  637. 4 Quickbooks
  638. It offers online accounting solutions for a business. It helps in monitoring cash flow, creating VAT returns and creating business reports.
  639. Data Storage and Backup
  640. Box.com, Mozy, Joukuu are the applications, offering data storage and backup services in cloud.
  641.  
  642. SN Application Description
  643. 1 Box.com
  644. Box.com offers drag and drop service for files. It just required to drop the files into Box and access from anywhere.
  645. 2 Mozy
  646. Mozy offers online backup service for files during a data loss.
  647. 3 Joukuu
  648. Joukuu is a web based interface. It allows to display a single list of contents for files stored to Google Docs, Box.net and Dropbox.
  649. Management Applications
  650. There are apps available for management task such as time tracking, organizing notes. Applications performing such tasks are discussed below:
  651.  
  652. SN Application Description
  653. 1 Toggl
  654. It helps in tracking time period assigned to a particular project.
  655. 2 Evernote
  656. Evernote is an application that organizes the sticky notes and even can read the text from images which helps the user to locate the notes easily.
  657. 3 Outright
  658. It is an accounting app. It helps to track income, expenses, profits and losses in real time.
  659. Social Applications
  660. There are several social networking services providing websites such as Facebook, Twitter etc.
  661.  
  662. SN Application Description
  663. 1 Facebook
  664. Facebook offer social networking service. One can share photos, videos, files, status and much more.
  665. 2 Twitter
  666. Twitter helps to interact directly with the public. Once can follow any celebrity, organization and any person who is on twitter and can have latest updates regarding the same.
  667. Entertainment Applications
  668. SN Application Description
  669. 1 Audiobox.fm
  670. It offers streaming service i.e. music can be stored online and can be played from cloud using service's own media player.
  671. Art Applications
  672. SN Application Description
  673. 1 Moo
  674. It offers art services such as designing and printing business cards, poscards and minicards.
  675. Cloud Providers
  676. Various Cloud Computing platforms are available today. The following table contains the popular Cloud Computing platforms:
  677.  
  678. SN Platforms Description
  679. 1 Salesforce.com
  680. This is a Force.com development platfrom. This provide a simple user interface and lets users log in, build an app and push it in the cloud.
  681. 2 Appistry
  682. The Appistry's CloudQ platform is efficient in delivering a run-time application platform. This platform is very useful to create scalable and service oriented applications.
  683. 3 AppScale
  684. The AppScale is an open source platform for Google App Engine applications.
  685. 4 AT&T
  686. The AT&T allows access to virtual servers and manages the virtualization AT&T The AT&T allows access to virtual servers and manages the virtualization infrastructure. This virtualization infrastructure includes network, server and storage.
  687. 5 Engine Yard
  688. The Engine Yard is a Rails Application cloud computing platform.
  689. 6 Enomaly
  690. Enomaly's provides the Infrastructure-as-a-Service platform.
  691. 7 FlexiScale
  692. The FlexiScale offers a cloud computing platform that allows flexible, scalable and automated cloud infrastructure.
  693. 8 GCloud3
  694. The GCloud3 offers private cloud solution in its gPlatform.
  695. 9 Gizmox
  696. The Gizmox Visual WebGUI platfrom is best suited for developing new web apps and modernize the legacy apps based on ASP.net, DHTML etc.
  697. 10 GoGrid
  698. The GoGrid platform allows the users to deploy web and database cloud services.
  699. 11 Google
  700. The Google's App Engine, let the users build, run and maintain their applications on Google's infrastructure.
  701. 12 LongJump
  702. The LongJump offers a Business Application Platform, a platform-as-a-Service (PaaS).
  703. 13 Microsoft
  704. The Microsoft's Windows Azure is a cloud computing platform, offering an environment to create cloud apps and services.
  705. 14 OrangeScape
  706. OrangeScape is offers a Platform-as-a-Service (Paas) for non programmers. Building an app is as easy as spreadsheet.
  707. 15 RackSpace
  708. The RackSpace provide servers-on-demand via a cloud-driven platfrom of virtualized servers.
  709. 16 Amazon EC2
  710. The Amazon EC2 (Elastic Compute Cloud) lets the users configure and control computing resources while running them on Amazon's environment.
  711. Cloud Computing Challenges
  712. Cloud computing, an emergence technology, have placed many challenges in different aspects. Some of these are shown in the following diagram:
  713.  
  714. cloud_computing Tutorial
  715. Security & Privacy
  716. Security and Privacy of information is the biggest challenge to cloud computing. To get out of security and privacy issues can be over come by employing encryption, security hardware and security applications.
  717.  
  718. Portability
  719. This is another challenge to cloud computing that applications should easily be migrated form one cloud provider to another. There should not be vendor-lock in. However, it is not yet made possible because each of the cloud provider use different standard languages for their platforms.
  720.  
  721. Interoperability
  722. Application on one platform should be able to incorporate services from other platfrom. It is made possible via web services. But this writing such web services is very complex.
  723.  
  724. Computing Performance
  725. To deliver data intensive applications on cloud requires high network bandwidth which result in high cost. If done at low bandwidth, then it does not meet the required computing performance of cloud application.
  726.  
  727. Reliability and Availability
  728. It is necessary for cloud systems to be reliable and robust because most of the business are now becoming dependent on services provided by third party.
  729.  
  730. Mobile Cloud Computing
  731. Cloud Computing offers such smartphones that have rich internet media experience and require less processing, less power. In term of Mobile Cloud Computing, processing is done in cloud, data is stored in cloud. And the mobile devices serve as a media for display.
  732.  
  733. Today smartphones are employed with rich cloud services by integrating applications that consume web services. These web services are deployed in cloud.
  734.  
  735. There are several Smartphone operating systems available such as Google's Android, Apple's iOS, RIM BlackBerry, Symbian, and Windows Mobile Phone. Each of these platform support third party applications that are deployed in cloud.
  736.  
  737. Architecture
  738. MCC includes four types of cloud resources:
  739.  
  740. Distant mobile cloud
  741.  
  742. Distant immobile cloud
  743.  
  744. Proximate mobile computing entities
  745.  
  746. Proximate immobile computing entities
  747.  
  748. Hybrid
  749.  
  750. The following diagram shows the framework for mobile cloud computing architecture:
  751.  
  752. cloud_computing Tutorial
  753. Issues
  754. Despite of having significant development in field of mobile computing, there still exists many issues:
  755.  
  756. Emergency efficient transmission
  757. There should be a frequent transmission of information between cloud and the mobile devices.
  758.  
  759. Architectural Issues
  760. Mobile cloud computing is required to make architectural neutral because of heterogeneous environment.
  761.  
  762. Live VM migration
  763. It is challenging to migrate an application which is resource-intensive to cloud and to execute it via. Virtual Machine .
  764.  
  765. Mobile Communication Congestion
  766. Due to continuous increase demand for mobile cloud services, the workload to enable smooth communication between cloud and mobile devices has been increased.
  767.  
  768. Security and Privacy
  769. This is one of the major issue because mobile users share their personal information over the cloud.
Add Comment
Please, Sign In to add comment