SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
© Peter R. Egli 2015
1/31
Rev. 2.41
Cloud Computing indigoo.com
Peter R. Egli
INDIGOO.COM
OVERVIEW OF CLOUD COMPUTING
PRINCIPLES AND TECHNOLOGIES
CLOUD
COMPUTING
© Peter R. Egli 2015
2/31
Rev. 2.41
Cloud Computing indigoo.com
Contents
1. What is cloud computing?
2. Why cloud computing?
3. Typical IaaS, PaaS, SaaS providers
4. Cloud provider landscape
5. Technology foundation of cloud computing
6. Cloud computing versus outsourcing
7. Hybrid clouds
8. Cloud scalability
9. Cloud security
10. Cloud risk management
11. Cloud certifications
12. Cloud standards
13. More cloud service models
14. Cloud management platforms (CMP)
© Peter R. Egli 2015
3/31
Rev. 2.41
Cloud Computing indigoo.com
1. What is cloud computing? (1/5)
Could computing definition by NIST:
NIST (National Institute of Standards and Technology, US non-regulatory federal agency)
published a widely used and accepted definition of cloud computing:
«Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction».
Source: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
NIST defines cloud computing around
5 essential characteristics
3 service models
4 deployment models
© Peter R. Egli 2015
4/31
Rev. 2.41
Cloud Computing indigoo.com
1. What is cloud computing? (2/5)
5 essential key characteristics of clouds:
On-demand self-service computing resources (elasticity):
• Automatic provisioning without human interaction with service provider.
Broad network access:
• Availability of cloud resources through various platforms (desktops, mobiles, workstations).
Resource pooling:
• Sharing of provider resources among customers (multi-tenant model).
• Location transparency (customer is not aware of the location of the server resources).
Rapid elasticity:
• Resources can be allocated and released to scale according to demand.
Measured service:
• Monitoring resource usage, service assurance (SLA – Service Level Agreement).
© Peter R. Egli 2015
5/31
Rev. 2.41
Cloud Computing indigoo.com
1. What is cloud computing? (3/5)
3 service models (1/2):
3 service models define the level of cloud service.
IaaS
PaaS
SaaS
IaaS – Infrastructure as a Service:
IT infrastructure is provided as a service.
IaaS comprises resources such as servers, network
and simple mass storage.
SaaS - Software as a Service:
SaaS builds on top of PaaS and provides application-level
services such as collaboration, ERP and
document management.
PaaS - Platform as a Service:
PaaS provides platforms and run-time environments
including middleware, messaging, databases and
identity management.
© Peter R. Egli 2015
6/31
Rev. 2.41
Cloud Computing indigoo.com
1. What is cloud computing? (4/5)
3 service models (2/2):
IaaS, PaaS and SaaS define different levels of cloud services with regard to the traditional
IT stack that is entirely managed by the inhouse IT department.
Applications
Data
Runtime
Middleware
OS
Virtualization
Servers
Storage
Networking
Traditional IT
Applications
Data
Runtime
Middleware
OS
Virtualization
Servers
Storage
Networking
IaaS
Applications
Data
Runtime
Middleware
OS
Virtualization
Servers
Storage
Networking
PaaS
Applications
Data
Runtime
Middleware
OS
Virtualization
Servers
Storage
Networking
SaaS
Cloudprovidermanaged
Cloudprovidermanaged
Cloudprovider
managed
ITmanaged
ITmanaged
IT
managed
© Peter R. Egli 2015
7/31
Rev. 2.41
Cloud Computing indigoo.com
1. What is cloud computing? (5/5)
4 cloud deployment models:
Private cloud:
• Cloud is enterprise owned or leased.
• Cloud is used by a single enterprise or organization.
• Cloud equipment may exist on- or off-premise.
• Private cloud may be internal (company premises) or external (provider hosted).
• Typically operated by a third-party with the required skills to lower operating costs.
Community cloud:
• Shared infrastructure for a specific community.
• May exist on- or off-premise.
Public cloud:
• Cloud is sold to the public, mega-scale infrastructure.
• Exists on premises of cloud provider.
Hybrid cloud:
• Different cloud types combined.
• Typically the base load is covered by a private cloud, load bursts handled by a public cloud
computing resources («cloud bursting», «pay-as-you-go» cost model).
© Peter R. Egli 2015
8/31
Rev. 2.41
Cloud Computing indigoo.com
Fixed costs (CapEx)
2. Why cloud computing? (1/3)
The rationale of cloud computing (for the customer) is reduced and linearly scaling costs.
Cloud computing allows allocating required computing resources dynamically to demand.
It scales linearly with the number of users, i.e. incurs no or little capital expenses (capex),
only operating expenses (opex).
Traditional IT: Cloud computing:
Users / usage
Costs
Fixed costs
(CapEx)
Variable
costs (OpEx)
Users / usage
Costs
Data centers, servers etc. require
a large up-front investment (CapEx).
The infrastructure must be dimensioned
to accommodate a certain peak load.
Variable costs incur on top of CapEx
(run-time licenses for users etc.).
Fixed costs are transferred to the cloud
provider and thus largely reduced for the customer
(customer infrastructure reduced to network,
workstations).
Variable costs vary according to usage demand.
The variable costs are reduced since the cloud provider
exploits economy of scale.
Variable
costs (OpEx)
© Peter R. Egli 2015
9/31
Rev. 2.41
Cloud Computing indigoo.com
2. Why cloud computing? (2/3)
By means of pooling, a reduced number of servers can deliver the processing power demands
of multiple customers (scaling effect) because customer’s processing demands are distributed
over time (statistical multiplexing).
Time
Demand
Time
Demand
Time
Demand
Customer 1
Customer 2
Customer 3
Combined processing power
demand profile.
Provisioned server performance
can accommodate peak demands
of customers.
 «Peak of sums < sum of peaks».
Peak demand that can not be serviced
Peak demand
Average processing power
demand
Unused (wasted) processing
power
© Peter R. Egli 2015
10/31
Rev. 2.41
Cloud Computing indigoo.com
2. Why cloud computing? (3/3)
Business drivers for cloud computing:
• High costs due to high server performance requirements to meet peak demands (low
average server capacity usage: 15%).
• Avoidance of CapEx.
• Need for reduction of data center energy consumption.
• High IT maintenance costs (IT staff, licenses).
• Meet compliance requirements (data protection, security, data center access etc.).
• Need for flexible data center usage arrangments (scale up when need arises for peak
performance demands).
Potential cost savings with cloud computing 50 – 90%.
© Peter R. Egli 2015
11/31
Rev. 2.41
Cloud Computing indigoo.com
3. Typical IaaS, PaaS, SaaS providers
Some key players in the cloud market:
IaaS
PaaS
SaaS
Simple storage.
Content Delivery Network.
Cloud servers.
OS, node.js platform.
Google App Engine (Java platform).
Development and hosting platform.
MS Office and collaboration appl.
Cloud based CRM.
Cloud based ERP.
© Peter R. Egli 2015
12/31
Rev. 2.41
Cloud Computing indigoo.com
4. Cloud provider landscape (1/2)
Cloud Service Providers (CSP):
CSPs offer IaaS, PaaS and SaaS services as private, hybrid or public clouds.
Cloud Service Brokers (CSB):
CSBs resell and sometimes integrate CSP cloud services. CSBs focus on consultancy services,
(help customers choose the right cloud solution, provide best practices for cloud deployment).
Cloud Service Aggregators (CSA):
CSAs integrate cloud services into value-added services, e.g. bundling storage services from
different CSPs into a high-availability offering.
CSB
(Broker)
CSP
CSA
(Aggr.)
CSP
CSP
Customer
© Peter R. Egli 2015
13/31
Rev. 2.41
Cloud Computing indigoo.com
4. Cloud provider landscape (2/2)
IaaS, PaaS and SaaS Cloud Service Providers (CSP):
Private Cloud Hybrid Cloud Public Cloud
IaaS
PaaS
SaaS
© Peter R. Egli 2015
14/31
Rev. 2.41
Cloud Computing indigoo.com
5. Technology foundation of cloud computing (1/2)
Cloud computing is based on and made possible by a number of technologies.
Virtualization:
Virtualization (VMs – Virtual Machines) is a crucial technology to completely decouple OS and
software from the underlying hardware. This allows running multiple OS instances on a single
server hardware.
Grid technology:
Often cloud computing is based on some kind of grid computing where a large number of
physical servers is available to host and run cloud infrastructures, platforms and applications.
When demand arises, services can be moved around the grid environment.
Broadband network access:
Diminishing differences in network bandwidth between LAN and WAN access make it possible
to move entire applications to clouds.
Distributed computing:
Middleware and particularly web services provide the necessary interoperability for cloud-
based distributed applications.
© Peter R. Egli 2015
15/31
Rev. 2.41
Cloud Computing indigoo.com
5. Technology foundation of cloud computing (2/2)
Web technologies:
Web technologies, namely the HTTP/HTML/CSS/Javascript combo, define an interoperable
standard client interface.
Security protocols and technologies:
Security is essential for cloud computing. The necessary technologies for authentication,
privacy, authorization, key distribution and trust federation are available on different platforms.
Service orientation:
SOA as a core architectural principle allows to compose applications of a collection of
services, each of which can be hosted in a cloud-based environment.
Open source software (OSS):
Clouds need tons of software. A wealth of open source software for virtually every aspect in
cloud infrastructures is available and allows cloud providers to deliver high-level cloud
services at reasonable costs.
© Peter R. Egli 2015
16/31
Rev. 2.41
Cloud Computing indigoo.com
6. Cloud computing versus outsourcing
Outsourcing:
In a typical outsourcing arrangement, the providers offers a service according to the conditions
of the customer.
Usually the contracts and SLAs are different for each customer.
Cloud:
Typical cloud providers have a standard offering, usually high-volume commoditized services
without the possibility for custom specific extensions.
Provider Customer
Contract
Cloud
Provider
Customer
Standard
offering Customer
© Peter R. Egli 2015
17/31
Rev. 2.41
Cloud Computing indigoo.com
7. Hybrid clouds (1/2)
Why hybrid clouds?
Hybrid clouds combine the benefits of private and public clouds.
Private clouds:
• Mainstay IT resources
• Privacy and security
• Enhanced control
Public clouds:
• Absorb temporal processing demand bursts (cloud bursting, load balancing)
• Provide business continuity in case of private cloud outages (disaster recovery)
• Help smooth out private cloud investments over time
Public
Private
Burst out
additional demand
Smoother buildup
of private
cloud infrastructure
© Peter R. Egli 2015
18/31
Rev. 2.41
Cloud Computing indigoo.com
7. Hybrid clouds (2/2)
Criteria for offloading to a public cloud:
While combining private and public clouds may bring overall benefit, a number of criteria need
to be carefully assessed prior to deploying hybrid clouds.
a. Level of security provided by public cloud provider
b. SLA provided by public cloud provider (availability, recovery etc.)
c. Compliance with data security regulations such as PCI DSS (Payment Card Industry)
d. Network bandwidth demands between clients, servers and databases
e. Platform requirements (Linux, Windows, software stacks, middleware and platforms)
f. Compatibility of authentication, authorization and identity management between private and
public cloud
g. Unified management and administration of private and public clouds
© Peter R. Egli 2015
19/31
Rev. 2.41
Cloud Computing indigoo.com
8. Cloud scalability
There are two main models for accommodating increased processing demand in clouds:
A. Scale-up (vertical scaling):
Increases in processing demand are accommodated by more powerful cloud server instances
(virtual machines).
B. Scale-out (horizontal scaling):
Demand is accommodated with more instances (VMs).
Scale-outScale-out
Scale-up
© Peter R. Egli 2015
20/31
Rev. 2.41
Cloud Computing indigoo.com
9. Cloud security (1/2)
Typical cloud security concerns of customers:
• Trust (do we trust the cloud provider?).
• Data ownership issues (what happens if cloud provider goes bancrupt?).
• Loss of physical control of data, infrastructure.
• Customer isolation (how good are customers technically isolated from each other).
• Legality of data transfer to an offshore cloud provider (see also «safe harbor»).
• Concern about moving data to cloud providers that are attractive targets for hackers and
crackers (high value targets).
• Security of software components in the cloud infrastructure (are the components secure?
Are they regularly updated with the latest security patches?).
• Availability concerns (cloud infrastructure outage may bring operations of a company
down).
• Compliance and regulatory issues (HIPAA, SoX, ISO 27001, Basel II etc.).
© Peter R. Egli 2015
21/31
Rev. 2.41
Cloud Computing indigoo.com
9. Cloud security (2/2)
Cloud security advantages:
Concerning security, clouds may also have advantages.
• Dedicated security team (people trained for the purpose).
• Defined and standardized security, ideally an integrated part of the SLA (service level
agreement).
• When customers use multiple cloud providers, applications are better isolated and protected
than would be the case with BYO (build your own) IT infrastructure.
• Greater resilience to outages (often intrinsically supported by cloud infrastructure).
• Fault and redundancy mechanisms provided as part of the cloud offering.
• Compliance delivered by cloud provider as part of the offering.
• Defined monitoring and auditing of services by cloud provider.
© Peter R. Egli 2015
22/31
Rev. 2.41
Cloud Computing indigoo.com
10. Cloud risk management (1/2)
What are the risks in clouds?
Traditional IT has its own set of risks to be addressed.
On top of these risks, cloud computing adds many more risks in various fields such as IT
fragmentation ("shadow IT"), infrastructure security, compliance, business continuity and data
management.
Deloitte's «Cloud Computing Risk Intelligence Map» provides an excellent overview of potential
cloud risk areas.
Risk management frameworks:
A holistic approach for risk management is a must in every cloud strategy.
Risk management frameworks provide a structured and disciplined approach for managing ICT
risks including:
a. risk identification
b. risk analysis and evaluation
c. risk classification and prioritization
d. risk mitigation and control measures
e. risk monitoring
© Peter R. Egli 2015
23/31
Rev. 2.41
Cloud Computing indigoo.com
10. Cloud risk management (2/2)
Risk management frameworks:
Existing IT management frameworks address cloud risks to a varying degree:
Framework Title Risk Management
Audit, certification &
attest for organizations
COBIT 5
Control Objectives for Information
and Related Technology
Risk IT Framework (addresses
all IT related risks)
Yes (COBIT assessment)
ITIL V3
Information Technology
Infrastructure Library
Yes (risk management for IT
services)
No
ISO/IEC
2700X
Information Security Management
Systems
(Series of standards)
Information security risk
management (ISO/IEC 27005)
Yes
PCI DSS
Payment Card Industry Data Security
Standard
No, but requires a process for
risk management
Yes
CSA Cloud Security Alliance
GRC Stack (Governance, Risk,
Compliance)
STAR Self-assessment
STAR Certification
STAR Attestation
COSO ERM
Committee of Sponsoring
Organizations of the Treadway
Commission
ERM – Enterprise Risk
Management
No
OCTAVE
Operationally Critical Threat, Asset,
and Vulnerability Evaluation
Information Security Risk
Management
No
© Peter R. Egli 2015
24/31
Rev. 2.41
Cloud Computing indigoo.com
11. Cloud certifications
To date, there is no single certification program in place for approving cloud provider's (CSPs)
adherence to security and confidentiality guidelines.
A number of programs and certifications exist that may help to evaluate a CSPs compliance
with security best practices.
Certification Authority / Issuer Scope Applicability
IEC27001 IEC / 3rd party audit Information Security Management CSPs
HIPAA US Government, 3rd party audit
Protection of health-related
information
Health Care Providers
PCI DCS
Payment Card Industry Security
Standards Council
IT security Payment Service Providers
FedRAMP
Federal Risk and Authorization
Management Program
Central certification agency for U.S.
agencies. Defined and required
criteria for U.S. gov. agencies to use
a cloud provider.
US agencies
EU
SafeHarbor
Compliance
Self-certification
Data protection, information
security
All companies exchanging
data with the US
SSAE 16,
SOC 1-3
Service Organization Control
Operational Controls, Security,
Privacy, Confidentiality
Most applicable for CSPs that
do financial data processing
EuroCloud
Star Audit
Cloud Security Alliance
Self-assessment, certification,
attestation
Only general statement on cloud
provider quality (1-5 stars)
CSPs
© Peter R. Egli 2015
25/31
Rev. 2.41
Cloud Computing indigoo.com
12. Cloud standards (1/3)
Clouds still are mostly based on proprietary technology.
However, standards are emerging to improve interoperability between customer, CSP and CSA.
Auth.
Service
Cloud
Infrastructure
Management
Layer
(e.g. CMP)
Customer
Cloud
Infrastructure
Mgt.
CDMI
Virtualization
Layer
IaaS, PaaS,
SaaS
Cloud
Infrastructure
Stack
OVF
Service
Front
End
Customer
Users
CIM, CIMI
Service
Front
End
SAML,
XACML
Service
Abstraction
Layer
TOSCA,
CAMP
Customer
Cloud
Service
Mgt.
Occi
CSP
© Peter R. Egli 2015
26/31
Rev. 2.41
Cloud Computing indigoo.com
12. Cloud standards (2/3)
Body Standard Scope / goal Link
Distributed
Management Task
Force (DMTF)
OVF – Open Virtualization
Format
Portability and deployment of virtual
applicances (VMs)
http://dmtf.org/standards/ovf
OASIS SAML, XACML
Access Control based on XML
(authorization of data access)
https://www.oasis-
open.org/standards
Open Grid Forum
(OGF)
Occi – Open Cloud
Computing Interface
Open and standard API for
customers to access and manage
(mostly) IaaS-type services
(infrastructure)
http://occi-wg.org/
Storage
Networking
Industry
Association
(SNIA)
CDMI – Cloud Data
Management Interface
Standard interface for applications
to access data elements (store,
retrieve, update, delete)
http://www.snia.org/cdmi
Cloud
Management
Working Group
(CMWG)
CIMI – Cloud Infrastructure
Management Interface
CIM – Common Information
Model
Standard cloud management
interface
http://dmtf.org/
© Peter R. Egli 2015
27/31
Rev. 2.41
Cloud Computing indigoo.com
12. Cloud standards (3/3)
Body Standard Scope / goal Link
OASIS
TOSCA – Topology and
Orchestration Specification
for Cloud Applications
Standardization of higher level cloud
services so these are easily portable
across providers (e.g. standardized
storage service, service
choreography)
https://www.oasis-
open.org/committees/tc_ho
me.php?wg_abbrev=tosca
OASIS
CAMP – Cloud Application
Management for Platforms
Standardization of interfaces (API)
for self-provisioning, monitoring and
control of cloud services.
While CAMP defines the interface
(API), TOSCA defines the
implementation.
https://www.oasis-
open.org/committees/tc_ho
me.php?wg_abbrev=camp
© Peter R. Egli 2015
28/31
Rev. 2.41
Cloud Computing indigoo.com
13. More cloud service models
In addition to the IaaS, PaaS and SaaS trinity, specialized cloud service models offer more
specific customer services. However, these models are not always strictly cloud services as
per NIST's cloud definition.
Cloud service
model
Description Examples
iPaaS
Integration Platform as a Service.
Cloud-based integration platform that connects private servers and
cloud-based processes, data and applications.
Cloud-based ESB
(Enterprise Service Bus)
Cloud-based SOA
BaaS
MBaaS
Backend as a Service or Mobile Backend as a Service.
BaaS is something between a PaaS and SaaS in that it provides higher
level functionality such as push notifications to (mobile) clients, user
management, storage services and integration with social media
services.
parse.com
Microsoft Azure
DaaS
Desktop as a Service.
Technologically the same as VDI (Virtual Desktop Infrastructure), but
virtualized desktops are provided by a cloud provider.
Amazon Workspace
STaaS
Storage as a Service.
Mass storage in the cloud.
Amazon S3
DBaaS
DataBase as a Service.
Relational DB and NoSQL-based databases run in cloud instances.
Amazon SimpleDB
© Peter R. Egli 2015
29/31
Rev. 2.41
Cloud Computing indigoo.com
14. Cloud management platforms (CMP) (1/3)
CMPs provide tools for managing various aspects of clouds in a single integrated suite.
Gartner's IT glossary provides a concise definition of CMPs as shown below:
Self service
interface
System image
provisioning
Metering &
billing
Management
console
Workload optimization (policies)
Storage
resources
Network
resources
Service catalogs
(templates)
Interface to enterprise management
Enterprise
management
Basic
CMP
Advanced
CMP
© Peter R. Egli 2015
30/31
Rev. 2.41
Cloud Computing indigoo.com
14. Cloud management platforms (CMP) (2/3)
Self-service interface:
Portal through which user manages the cloud intrastructure.
System image provisioning:
This component lets users choose, create, provision and deploy images (VMs) in the cloud.
Metering & billing:
Measuring infrastructure consumption is crucial for optimization (e.g. infrastructure usage trends) and billing
purposes. E.g. a company may use this information for billing the services to internal departments based on usage.
Workload optimization:
Workload can be optimized e.g. through defining policies such as "automatically deploy another VM in case the load
in a VM exceeds 70%". This allows optimizing resource usage and thus drive down (or at least curtail) costs
(electricity, physical CPUs).
Storage and network resources:
Almost any cloud service needs some form of storage and network services. This component provides different
choices for storage (NAS, SAN, DAS etc.) and network services to be used by cloud services.
Service catalogs:
This component provides a set of readily available and prefabricated templated services to choose from as well as
customizing these to the user's needs.
Enterprise management interface:
Connector to existing management tools such as service management, workflow management and network
management to provide a unified and integrated view of the IT infrastructure.
© Peter R. Egli 2015
31/31
Rev. 2.41
Cloud Computing indigoo.com
14. Cloud management platforms (CMP) (3/3)
Important OSS and commercial CMPs:
In order to address the various management challenges that clouds entail, different commercial
and OSS (Open Source Software) CMPs have emerged of which a few are listed below:
CMP Comment License model
Backed by HP, IBM, Rackspace, Redhat, Suse
OSS
Apache 2.0 license
Developed by Citrix
OSS
Apache 2.0 license
Developed by Eucalyptus Systems Inc.
OSS
GPL 3 license
Backed by C12G Labs.
OSS
Apache 2.0 license
(ICE)
Netflix provides some tools for managing
specific aspects of clouds. Not a full-blown
CMP.
OSS
Apache 2.0 license

Weitere ähnliche Inhalte

Was ist angesagt?

Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing
Cloud computingCloud computing
Cloud computingkanchu17
 
IBM Cloud Introduction
IBM Cloud IntroductionIBM Cloud Introduction
IBM Cloud IntroductionRavi Pandit
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consAmritpal Singh Bedi
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedMd. Hasibur Rashid
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud ComputingNephoScale
 
Cloud management (IBM)
Cloud management (IBM)Cloud management (IBM)
Cloud management (IBM)Vivek Trivedi
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptPravesh ARYA
 
Eucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud ComputingEucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud Computingelliando dias
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
Data warehouse and User interface
Data warehouse and User interface Data warehouse and User interface
Data warehouse and User interface RabiaIftikhar10
 

Was ist angesagt? (20)

Software as a service
Software as a serviceSoftware as a service
Software as a service
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IBM Cloud Introduction
IBM Cloud IntroductionIBM Cloud Introduction
IBM Cloud Introduction
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree compared
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
Cloud management (IBM)
Cloud management (IBM)Cloud management (IBM)
Cloud management (IBM)
 
PPT on Hadoop
PPT on HadoopPPT on Hadoop
PPT on Hadoop
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Eucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud ComputingEucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Data warehouse and User interface
Data warehouse and User interface Data warehouse and User interface
Data warehouse and User interface
 
Mobile databases
Mobile databasesMobile databases
Mobile databases
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
Presentation on Cloud computing
Presentation on Cloud computingPresentation on Cloud computing
Presentation on Cloud computing
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 

Andere mochten auch

Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computingHaslina
 
Ymens - Cloud Identity Crisis - Dev Talks 2015
Ymens - Cloud Identity Crisis - Dev Talks 2015Ymens - Cloud Identity Crisis - Dev Talks 2015
Ymens - Cloud Identity Crisis - Dev Talks 2015Vlad Mihnea
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Cloud Computing Opportunities for SMEs Towards AEC 2015
Cloud Computing Opportunities for SMEs  Towards AEC 2015Cloud Computing Opportunities for SMEs  Towards AEC 2015
Cloud Computing Opportunities for SMEs Towards AEC 2015Software Park Thailand
 
Cloud Computing Architecture Primer
Cloud Computing Architecture PrimerCloud Computing Architecture Primer
Cloud Computing Architecture PrimerIlham Ahmed
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB ResultsSymantec
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the CloudsAndy Piper
 
What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?Amazon Web Services
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey ResultsMichael Skok
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemReuven Lerner
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Tom Raftery
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the EnterpriseWSO2
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSun Digital, Inc.
 

Andere mochten auch (20)

Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Ymens - Cloud Identity Crisis - Dev Talks 2015
Ymens - Cloud Identity Crisis - Dev Talks 2015Ymens - Cloud Identity Crisis - Dev Talks 2015
Ymens - Cloud Identity Crisis - Dev Talks 2015
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Cloud Computing Opportunities for SMEs Towards AEC 2015
Cloud Computing Opportunities for SMEs  Towards AEC 2015Cloud Computing Opportunities for SMEs  Towards AEC 2015
Cloud Computing Opportunities for SMEs Towards AEC 2015
 
Cloud Computing Architecture Primer
Cloud Computing Architecture PrimerCloud Computing Architecture Primer
Cloud Computing Architecture Primer
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the Clouds
 
What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, Jerusalem
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the Enterprise
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBs
 

Ähnlich wie Overview of Cloud Computing

Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computingTarek Nader
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing Sanjiv Pradhan
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam mayNguyen Duong
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentationshilpa bojji
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.Minor33
 
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업OpenStack Korea Community
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computingDan Morrill
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101 Predrag Mitrovic
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 

Ähnlich wie Overview of Cloud Computing (20)

Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computing
 
Cloud computing What Why How
Cloud computing What Why HowCloud computing What Why How
Cloud computing What Why How
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Cloud
CloudCloud
Cloud
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam may
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
G017324043
G017324043G017324043
G017324043
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
 
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
 
Cloud Computing Strategy and Architecture
Cloud Computing Strategy and ArchitectureCloud Computing Strategy and Architecture
Cloud Computing Strategy and Architecture
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 

Mehr von Peter R. Egli

Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking ConceptsPeter R. Egli
 
Communication middleware
Communication middlewareCommunication middleware
Communication middlewarePeter R. Egli
 
Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Peter R. Egli
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Peter R. Egli
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET PlatformPeter R. Egli
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyPeter R. Egli
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development KitPeter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingPeter R. Egli
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBAPeter R. Egli
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Peter R. Egli
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging ServicePeter R. Egli
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Peter R. Egli
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State TransferPeter R. Egli
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented MiddlewarePeter R. Egli
 

Mehr von Peter R. Egli (20)

Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
 
Communication middleware
Communication middlewareCommunication middleware
Communication middleware
 
Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET Platform
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technology
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development Kit
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Web services
Web servicesWeb services
Web services
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message Queueing
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging Service
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State Transfer
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented Middleware
 

Kürzlich hochgeladen

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Kürzlich hochgeladen (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Overview of Cloud Computing

  • 1. © Peter R. Egli 2015 1/31 Rev. 2.41 Cloud Computing indigoo.com Peter R. Egli INDIGOO.COM OVERVIEW OF CLOUD COMPUTING PRINCIPLES AND TECHNOLOGIES CLOUD COMPUTING
  • 2. © Peter R. Egli 2015 2/31 Rev. 2.41 Cloud Computing indigoo.com Contents 1. What is cloud computing? 2. Why cloud computing? 3. Typical IaaS, PaaS, SaaS providers 4. Cloud provider landscape 5. Technology foundation of cloud computing 6. Cloud computing versus outsourcing 7. Hybrid clouds 8. Cloud scalability 9. Cloud security 10. Cloud risk management 11. Cloud certifications 12. Cloud standards 13. More cloud service models 14. Cloud management platforms (CMP)
  • 3. © Peter R. Egli 2015 3/31 Rev. 2.41 Cloud Computing indigoo.com 1. What is cloud computing? (1/5) Could computing definition by NIST: NIST (National Institute of Standards and Technology, US non-regulatory federal agency) published a widely used and accepted definition of cloud computing: «Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction». Source: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf NIST defines cloud computing around 5 essential characteristics 3 service models 4 deployment models
  • 4. © Peter R. Egli 2015 4/31 Rev. 2.41 Cloud Computing indigoo.com 1. What is cloud computing? (2/5) 5 essential key characteristics of clouds: On-demand self-service computing resources (elasticity): • Automatic provisioning without human interaction with service provider. Broad network access: • Availability of cloud resources through various platforms (desktops, mobiles, workstations). Resource pooling: • Sharing of provider resources among customers (multi-tenant model). • Location transparency (customer is not aware of the location of the server resources). Rapid elasticity: • Resources can be allocated and released to scale according to demand. Measured service: • Monitoring resource usage, service assurance (SLA – Service Level Agreement).
  • 5. © Peter R. Egli 2015 5/31 Rev. 2.41 Cloud Computing indigoo.com 1. What is cloud computing? (3/5) 3 service models (1/2): 3 service models define the level of cloud service. IaaS PaaS SaaS IaaS – Infrastructure as a Service: IT infrastructure is provided as a service. IaaS comprises resources such as servers, network and simple mass storage. SaaS - Software as a Service: SaaS builds on top of PaaS and provides application-level services such as collaboration, ERP and document management. PaaS - Platform as a Service: PaaS provides platforms and run-time environments including middleware, messaging, databases and identity management.
  • 6. © Peter R. Egli 2015 6/31 Rev. 2.41 Cloud Computing indigoo.com 1. What is cloud computing? (4/5) 3 service models (2/2): IaaS, PaaS and SaaS define different levels of cloud services with regard to the traditional IT stack that is entirely managed by the inhouse IT department. Applications Data Runtime Middleware OS Virtualization Servers Storage Networking Traditional IT Applications Data Runtime Middleware OS Virtualization Servers Storage Networking IaaS Applications Data Runtime Middleware OS Virtualization Servers Storage Networking PaaS Applications Data Runtime Middleware OS Virtualization Servers Storage Networking SaaS Cloudprovidermanaged Cloudprovidermanaged Cloudprovider managed ITmanaged ITmanaged IT managed
  • 7. © Peter R. Egli 2015 7/31 Rev. 2.41 Cloud Computing indigoo.com 1. What is cloud computing? (5/5) 4 cloud deployment models: Private cloud: • Cloud is enterprise owned or leased. • Cloud is used by a single enterprise or organization. • Cloud equipment may exist on- or off-premise. • Private cloud may be internal (company premises) or external (provider hosted). • Typically operated by a third-party with the required skills to lower operating costs. Community cloud: • Shared infrastructure for a specific community. • May exist on- or off-premise. Public cloud: • Cloud is sold to the public, mega-scale infrastructure. • Exists on premises of cloud provider. Hybrid cloud: • Different cloud types combined. • Typically the base load is covered by a private cloud, load bursts handled by a public cloud computing resources («cloud bursting», «pay-as-you-go» cost model).
  • 8. © Peter R. Egli 2015 8/31 Rev. 2.41 Cloud Computing indigoo.com Fixed costs (CapEx) 2. Why cloud computing? (1/3) The rationale of cloud computing (for the customer) is reduced and linearly scaling costs. Cloud computing allows allocating required computing resources dynamically to demand. It scales linearly with the number of users, i.e. incurs no or little capital expenses (capex), only operating expenses (opex). Traditional IT: Cloud computing: Users / usage Costs Fixed costs (CapEx) Variable costs (OpEx) Users / usage Costs Data centers, servers etc. require a large up-front investment (CapEx). The infrastructure must be dimensioned to accommodate a certain peak load. Variable costs incur on top of CapEx (run-time licenses for users etc.). Fixed costs are transferred to the cloud provider and thus largely reduced for the customer (customer infrastructure reduced to network, workstations). Variable costs vary according to usage demand. The variable costs are reduced since the cloud provider exploits economy of scale. Variable costs (OpEx)
  • 9. © Peter R. Egli 2015 9/31 Rev. 2.41 Cloud Computing indigoo.com 2. Why cloud computing? (2/3) By means of pooling, a reduced number of servers can deliver the processing power demands of multiple customers (scaling effect) because customer’s processing demands are distributed over time (statistical multiplexing). Time Demand Time Demand Time Demand Customer 1 Customer 2 Customer 3 Combined processing power demand profile. Provisioned server performance can accommodate peak demands of customers.  «Peak of sums < sum of peaks». Peak demand that can not be serviced Peak demand Average processing power demand Unused (wasted) processing power
  • 10. © Peter R. Egli 2015 10/31 Rev. 2.41 Cloud Computing indigoo.com 2. Why cloud computing? (3/3) Business drivers for cloud computing: • High costs due to high server performance requirements to meet peak demands (low average server capacity usage: 15%). • Avoidance of CapEx. • Need for reduction of data center energy consumption. • High IT maintenance costs (IT staff, licenses). • Meet compliance requirements (data protection, security, data center access etc.). • Need for flexible data center usage arrangments (scale up when need arises for peak performance demands). Potential cost savings with cloud computing 50 – 90%.
  • 11. © Peter R. Egli 2015 11/31 Rev. 2.41 Cloud Computing indigoo.com 3. Typical IaaS, PaaS, SaaS providers Some key players in the cloud market: IaaS PaaS SaaS Simple storage. Content Delivery Network. Cloud servers. OS, node.js platform. Google App Engine (Java platform). Development and hosting platform. MS Office and collaboration appl. Cloud based CRM. Cloud based ERP.
  • 12. © Peter R. Egli 2015 12/31 Rev. 2.41 Cloud Computing indigoo.com 4. Cloud provider landscape (1/2) Cloud Service Providers (CSP): CSPs offer IaaS, PaaS and SaaS services as private, hybrid or public clouds. Cloud Service Brokers (CSB): CSBs resell and sometimes integrate CSP cloud services. CSBs focus on consultancy services, (help customers choose the right cloud solution, provide best practices for cloud deployment). Cloud Service Aggregators (CSA): CSAs integrate cloud services into value-added services, e.g. bundling storage services from different CSPs into a high-availability offering. CSB (Broker) CSP CSA (Aggr.) CSP CSP Customer
  • 13. © Peter R. Egli 2015 13/31 Rev. 2.41 Cloud Computing indigoo.com 4. Cloud provider landscape (2/2) IaaS, PaaS and SaaS Cloud Service Providers (CSP): Private Cloud Hybrid Cloud Public Cloud IaaS PaaS SaaS
  • 14. © Peter R. Egli 2015 14/31 Rev. 2.41 Cloud Computing indigoo.com 5. Technology foundation of cloud computing (1/2) Cloud computing is based on and made possible by a number of technologies. Virtualization: Virtualization (VMs – Virtual Machines) is a crucial technology to completely decouple OS and software from the underlying hardware. This allows running multiple OS instances on a single server hardware. Grid technology: Often cloud computing is based on some kind of grid computing where a large number of physical servers is available to host and run cloud infrastructures, platforms and applications. When demand arises, services can be moved around the grid environment. Broadband network access: Diminishing differences in network bandwidth between LAN and WAN access make it possible to move entire applications to clouds. Distributed computing: Middleware and particularly web services provide the necessary interoperability for cloud- based distributed applications.
  • 15. © Peter R. Egli 2015 15/31 Rev. 2.41 Cloud Computing indigoo.com 5. Technology foundation of cloud computing (2/2) Web technologies: Web technologies, namely the HTTP/HTML/CSS/Javascript combo, define an interoperable standard client interface. Security protocols and technologies: Security is essential for cloud computing. The necessary technologies for authentication, privacy, authorization, key distribution and trust federation are available on different platforms. Service orientation: SOA as a core architectural principle allows to compose applications of a collection of services, each of which can be hosted in a cloud-based environment. Open source software (OSS): Clouds need tons of software. A wealth of open source software for virtually every aspect in cloud infrastructures is available and allows cloud providers to deliver high-level cloud services at reasonable costs.
  • 16. © Peter R. Egli 2015 16/31 Rev. 2.41 Cloud Computing indigoo.com 6. Cloud computing versus outsourcing Outsourcing: In a typical outsourcing arrangement, the providers offers a service according to the conditions of the customer. Usually the contracts and SLAs are different for each customer. Cloud: Typical cloud providers have a standard offering, usually high-volume commoditized services without the possibility for custom specific extensions. Provider Customer Contract Cloud Provider Customer Standard offering Customer
  • 17. © Peter R. Egli 2015 17/31 Rev. 2.41 Cloud Computing indigoo.com 7. Hybrid clouds (1/2) Why hybrid clouds? Hybrid clouds combine the benefits of private and public clouds. Private clouds: • Mainstay IT resources • Privacy and security • Enhanced control Public clouds: • Absorb temporal processing demand bursts (cloud bursting, load balancing) • Provide business continuity in case of private cloud outages (disaster recovery) • Help smooth out private cloud investments over time Public Private Burst out additional demand Smoother buildup of private cloud infrastructure
  • 18. © Peter R. Egli 2015 18/31 Rev. 2.41 Cloud Computing indigoo.com 7. Hybrid clouds (2/2) Criteria for offloading to a public cloud: While combining private and public clouds may bring overall benefit, a number of criteria need to be carefully assessed prior to deploying hybrid clouds. a. Level of security provided by public cloud provider b. SLA provided by public cloud provider (availability, recovery etc.) c. Compliance with data security regulations such as PCI DSS (Payment Card Industry) d. Network bandwidth demands between clients, servers and databases e. Platform requirements (Linux, Windows, software stacks, middleware and platforms) f. Compatibility of authentication, authorization and identity management between private and public cloud g. Unified management and administration of private and public clouds
  • 19. © Peter R. Egli 2015 19/31 Rev. 2.41 Cloud Computing indigoo.com 8. Cloud scalability There are two main models for accommodating increased processing demand in clouds: A. Scale-up (vertical scaling): Increases in processing demand are accommodated by more powerful cloud server instances (virtual machines). B. Scale-out (horizontal scaling): Demand is accommodated with more instances (VMs). Scale-outScale-out Scale-up
  • 20. © Peter R. Egli 2015 20/31 Rev. 2.41 Cloud Computing indigoo.com 9. Cloud security (1/2) Typical cloud security concerns of customers: • Trust (do we trust the cloud provider?). • Data ownership issues (what happens if cloud provider goes bancrupt?). • Loss of physical control of data, infrastructure. • Customer isolation (how good are customers technically isolated from each other). • Legality of data transfer to an offshore cloud provider (see also «safe harbor»). • Concern about moving data to cloud providers that are attractive targets for hackers and crackers (high value targets). • Security of software components in the cloud infrastructure (are the components secure? Are they regularly updated with the latest security patches?). • Availability concerns (cloud infrastructure outage may bring operations of a company down). • Compliance and regulatory issues (HIPAA, SoX, ISO 27001, Basel II etc.).
  • 21. © Peter R. Egli 2015 21/31 Rev. 2.41 Cloud Computing indigoo.com 9. Cloud security (2/2) Cloud security advantages: Concerning security, clouds may also have advantages. • Dedicated security team (people trained for the purpose). • Defined and standardized security, ideally an integrated part of the SLA (service level agreement). • When customers use multiple cloud providers, applications are better isolated and protected than would be the case with BYO (build your own) IT infrastructure. • Greater resilience to outages (often intrinsically supported by cloud infrastructure). • Fault and redundancy mechanisms provided as part of the cloud offering. • Compliance delivered by cloud provider as part of the offering. • Defined monitoring and auditing of services by cloud provider.
  • 22. © Peter R. Egli 2015 22/31 Rev. 2.41 Cloud Computing indigoo.com 10. Cloud risk management (1/2) What are the risks in clouds? Traditional IT has its own set of risks to be addressed. On top of these risks, cloud computing adds many more risks in various fields such as IT fragmentation ("shadow IT"), infrastructure security, compliance, business continuity and data management. Deloitte's «Cloud Computing Risk Intelligence Map» provides an excellent overview of potential cloud risk areas. Risk management frameworks: A holistic approach for risk management is a must in every cloud strategy. Risk management frameworks provide a structured and disciplined approach for managing ICT risks including: a. risk identification b. risk analysis and evaluation c. risk classification and prioritization d. risk mitigation and control measures e. risk monitoring
  • 23. © Peter R. Egli 2015 23/31 Rev. 2.41 Cloud Computing indigoo.com 10. Cloud risk management (2/2) Risk management frameworks: Existing IT management frameworks address cloud risks to a varying degree: Framework Title Risk Management Audit, certification & attest for organizations COBIT 5 Control Objectives for Information and Related Technology Risk IT Framework (addresses all IT related risks) Yes (COBIT assessment) ITIL V3 Information Technology Infrastructure Library Yes (risk management for IT services) No ISO/IEC 2700X Information Security Management Systems (Series of standards) Information security risk management (ISO/IEC 27005) Yes PCI DSS Payment Card Industry Data Security Standard No, but requires a process for risk management Yes CSA Cloud Security Alliance GRC Stack (Governance, Risk, Compliance) STAR Self-assessment STAR Certification STAR Attestation COSO ERM Committee of Sponsoring Organizations of the Treadway Commission ERM – Enterprise Risk Management No OCTAVE Operationally Critical Threat, Asset, and Vulnerability Evaluation Information Security Risk Management No
  • 24. © Peter R. Egli 2015 24/31 Rev. 2.41 Cloud Computing indigoo.com 11. Cloud certifications To date, there is no single certification program in place for approving cloud provider's (CSPs) adherence to security and confidentiality guidelines. A number of programs and certifications exist that may help to evaluate a CSPs compliance with security best practices. Certification Authority / Issuer Scope Applicability IEC27001 IEC / 3rd party audit Information Security Management CSPs HIPAA US Government, 3rd party audit Protection of health-related information Health Care Providers PCI DCS Payment Card Industry Security Standards Council IT security Payment Service Providers FedRAMP Federal Risk and Authorization Management Program Central certification agency for U.S. agencies. Defined and required criteria for U.S. gov. agencies to use a cloud provider. US agencies EU SafeHarbor Compliance Self-certification Data protection, information security All companies exchanging data with the US SSAE 16, SOC 1-3 Service Organization Control Operational Controls, Security, Privacy, Confidentiality Most applicable for CSPs that do financial data processing EuroCloud Star Audit Cloud Security Alliance Self-assessment, certification, attestation Only general statement on cloud provider quality (1-5 stars) CSPs
  • 25. © Peter R. Egli 2015 25/31 Rev. 2.41 Cloud Computing indigoo.com 12. Cloud standards (1/3) Clouds still are mostly based on proprietary technology. However, standards are emerging to improve interoperability between customer, CSP and CSA. Auth. Service Cloud Infrastructure Management Layer (e.g. CMP) Customer Cloud Infrastructure Mgt. CDMI Virtualization Layer IaaS, PaaS, SaaS Cloud Infrastructure Stack OVF Service Front End Customer Users CIM, CIMI Service Front End SAML, XACML Service Abstraction Layer TOSCA, CAMP Customer Cloud Service Mgt. Occi CSP
  • 26. © Peter R. Egli 2015 26/31 Rev. 2.41 Cloud Computing indigoo.com 12. Cloud standards (2/3) Body Standard Scope / goal Link Distributed Management Task Force (DMTF) OVF – Open Virtualization Format Portability and deployment of virtual applicances (VMs) http://dmtf.org/standards/ovf OASIS SAML, XACML Access Control based on XML (authorization of data access) https://www.oasis- open.org/standards Open Grid Forum (OGF) Occi – Open Cloud Computing Interface Open and standard API for customers to access and manage (mostly) IaaS-type services (infrastructure) http://occi-wg.org/ Storage Networking Industry Association (SNIA) CDMI – Cloud Data Management Interface Standard interface for applications to access data elements (store, retrieve, update, delete) http://www.snia.org/cdmi Cloud Management Working Group (CMWG) CIMI – Cloud Infrastructure Management Interface CIM – Common Information Model Standard cloud management interface http://dmtf.org/
  • 27. © Peter R. Egli 2015 27/31 Rev. 2.41 Cloud Computing indigoo.com 12. Cloud standards (3/3) Body Standard Scope / goal Link OASIS TOSCA – Topology and Orchestration Specification for Cloud Applications Standardization of higher level cloud services so these are easily portable across providers (e.g. standardized storage service, service choreography) https://www.oasis- open.org/committees/tc_ho me.php?wg_abbrev=tosca OASIS CAMP – Cloud Application Management for Platforms Standardization of interfaces (API) for self-provisioning, monitoring and control of cloud services. While CAMP defines the interface (API), TOSCA defines the implementation. https://www.oasis- open.org/committees/tc_ho me.php?wg_abbrev=camp
  • 28. © Peter R. Egli 2015 28/31 Rev. 2.41 Cloud Computing indigoo.com 13. More cloud service models In addition to the IaaS, PaaS and SaaS trinity, specialized cloud service models offer more specific customer services. However, these models are not always strictly cloud services as per NIST's cloud definition. Cloud service model Description Examples iPaaS Integration Platform as a Service. Cloud-based integration platform that connects private servers and cloud-based processes, data and applications. Cloud-based ESB (Enterprise Service Bus) Cloud-based SOA BaaS MBaaS Backend as a Service or Mobile Backend as a Service. BaaS is something between a PaaS and SaaS in that it provides higher level functionality such as push notifications to (mobile) clients, user management, storage services and integration with social media services. parse.com Microsoft Azure DaaS Desktop as a Service. Technologically the same as VDI (Virtual Desktop Infrastructure), but virtualized desktops are provided by a cloud provider. Amazon Workspace STaaS Storage as a Service. Mass storage in the cloud. Amazon S3 DBaaS DataBase as a Service. Relational DB and NoSQL-based databases run in cloud instances. Amazon SimpleDB
  • 29. © Peter R. Egli 2015 29/31 Rev. 2.41 Cloud Computing indigoo.com 14. Cloud management platforms (CMP) (1/3) CMPs provide tools for managing various aspects of clouds in a single integrated suite. Gartner's IT glossary provides a concise definition of CMPs as shown below: Self service interface System image provisioning Metering & billing Management console Workload optimization (policies) Storage resources Network resources Service catalogs (templates) Interface to enterprise management Enterprise management Basic CMP Advanced CMP
  • 30. © Peter R. Egli 2015 30/31 Rev. 2.41 Cloud Computing indigoo.com 14. Cloud management platforms (CMP) (2/3) Self-service interface: Portal through which user manages the cloud intrastructure. System image provisioning: This component lets users choose, create, provision and deploy images (VMs) in the cloud. Metering & billing: Measuring infrastructure consumption is crucial for optimization (e.g. infrastructure usage trends) and billing purposes. E.g. a company may use this information for billing the services to internal departments based on usage. Workload optimization: Workload can be optimized e.g. through defining policies such as "automatically deploy another VM in case the load in a VM exceeds 70%". This allows optimizing resource usage and thus drive down (or at least curtail) costs (electricity, physical CPUs). Storage and network resources: Almost any cloud service needs some form of storage and network services. This component provides different choices for storage (NAS, SAN, DAS etc.) and network services to be used by cloud services. Service catalogs: This component provides a set of readily available and prefabricated templated services to choose from as well as customizing these to the user's needs. Enterprise management interface: Connector to existing management tools such as service management, workflow management and network management to provide a unified and integrated view of the IT infrastructure.
  • 31. © Peter R. Egli 2015 31/31 Rev. 2.41 Cloud Computing indigoo.com 14. Cloud management platforms (CMP) (3/3) Important OSS and commercial CMPs: In order to address the various management challenges that clouds entail, different commercial and OSS (Open Source Software) CMPs have emerged of which a few are listed below: CMP Comment License model Backed by HP, IBM, Rackspace, Redhat, Suse OSS Apache 2.0 license Developed by Citrix OSS Apache 2.0 license Developed by Eucalyptus Systems Inc. OSS GPL 3 license Backed by C12G Labs. OSS Apache 2.0 license (ICE) Netflix provides some tools for managing specific aspects of clouds. Not a full-blown CMP. OSS Apache 2.0 license