SlideShare a Scribd company logo
1 of 26
POINTS OF DISCUSSION

 INTRODUCTION
 NEED OF CLOUD COMPUTING
 EVOLUTION
 ARCHITECTURES
 CHARACTERISTICS
 SECURITY ISSUES
 SECURITY REQUIREMENTS

                              2
WHAT IS CLOUD COMPUTING ?


• Cloud computing is delivery of computing as service rather
  than as a product.
• Enables on-demand network access to a shared pool.
• Requires minimal management effort or service provider
  interaction.
• It is UTILITY based system comprising of:




                                                               3
• It is collection of virtualized computers connected under
  SERVICE LEVEL AGREEMENT (SLA).

• A service-level agreement is a part of a service contract
  where the level of service is formally defined.

• It defines the role of third party control which includes:
   Negotiation of contract.
   Fulfillment in real time.
   QoS parameter.
   Monitoring.
   Enforcement.



                                                               4
NEED OF CLOUD COMPUTING


• Cloud computing is a compelling paradigm.
• The mission is to take computing on retail basis.
• Making internet the ultimate resource of all
  computing needs.
• Services are sold on a subscription or pay-per usage
  basis over internet.



                                                         5
6
Fig1:flow diagram of need of cloud computing [ref 2]
Evolution of cloud computing




                                          7
Fig2: Cloud computing evolution [ref 1]
8
Fig3: classification of cloud [ref 2]
Cloud Computing Architecture




                               9
SERVICE ORIENTED ARCHITECTURE (SOA)
 •   SOA is an architectural pattern that guides business solutions to create,
     organize and reuse its computing components.
 •   It is having a layered architecture each layer meant for performing
     different tasks.




Fig 4 : Basic Architecture diagram of service oriented architecture [ref 2]   10
DETAILED SOA ARCHITECTURE DESCRIPTION




Fig 5: detailed service oriented architecture description including all layers and their components.[ref 1]   11
• Individual Cloud Provider Layer:
 Each provider builds a data center that powers the cloud
  services it provides.
 Within each cloud there is request dispatcher working with
  virtual machine monitor to allocate the requests to available
  resources.


• Cloud Ontology Mapping Layer:
 It masks the differences among the different cloud providers.
 Helps in migration of cloud application from one cloud to
  another.
 Storage ontology
 Computing ontology
 Communication ontology

                                                                  12
• Cloud Broker Layer:
 It serves as an agent between individual CSP and SOA layer.
 It needs to fulfill following tasks:
   CLOUD PROVIDER INFORMATION PUBLISHING
   RANKING
   DYNAMIC SLA NEGOTIATION
   ON-DEMAND PROVISION MODEL


• SOA Layer:
 Services are published as re-deployable packages.
 It contains following information and files:
 COMPILED CODE
 SOURCE CODE
 CONFIGURATION FILE


                                                                13
CHARACTERISTIC OF CLOUD COMPUTING




Fig 6 : Various characteristics of cloud computing [ref 8]
                                                             14
CONCEPTUAL CHARACTERISTICS




                             15
SERVICE CATEGORIES

 The service provider provides services under
 following categories:




Software is
                        Provides a               Virtualizes
presented to the end
                        development              computing power,
user on demand,
                        platform with a set of   storage and
usually in a browser.
                        services to assist on    network
                        cloud                    connectivity
                                                                    16
Fig 7: service categories in a cloud with various components implemented at various levels [ref 6]   17
TECHINICAL CHARACTERISTICS
     LOOSE COUPLING:

      Through virtualization or other
     technologies, the infrastructures are separated in logic.

     Users sets Uset1 , Uset2 , …, Usetm where (m ≥1).

     Providers sets Pset1 , Pset2 ,…, Psetn where ( n ≥1 ).

     Useti loose coupling with provider setj: Set (Useti Psetj ).

     User sets are independent: Useti ∩ Usetj =φ ( 0 ≤ i, j ≤ m , i ≠ j ).

     Provider sets are independent: Pseti ∩ Psetj =φ ( 0 ≤ i, j ≤ m , i ≠ j ).

     The loose coupling (cloud user connects to cloud
     Provider) sets are independent: Set (Useti1, Psetj1 )∩ (Useti2, Psetj2 )
        =φ.
Set (Usetgoogle ,Psetgoogle ) ∩ Set (Usetyahoo ,Psetyahoo) ∩ (Usetbing ,Psetbing ) =φ
                                                                                        18
Fig 8: Result of a survey conducted among IT giants to find out most crucial element that   19
they are concerned about in cloud computing [ref 4 ]
 SECURITY:              In cloud, data is distributed
                        regardless of where your base
                         repository of data is finally
                                    stored
                      Personal data may be scattered in
 PRIVACY:            various virtual data centers, even
                         across the national borders.

                         Servers in cloud have same
                        problems as resident servers
 RELIABILITY:           experiencing downtimes and
                                 slowdowns.

                        By unthoughtful data sharing,
                         various laws and government
 LEGAL ISSUES           regulations may be violated.

                     Data in the cloud should never
                      become invalid even when the
                     service provider go broke and
 LONG TERM   VIABILITY:
                      swallowed by other company.
Fig 9: information security requirements in various service categories of different computing models of cloud
computing [ref 7]                                                                                               21
•   Identification & Authentication:
 Users must be validated by username-password authentication.
•   Authorization:
 Exerting control and privilege over information flow in the cloud.
•   Confidentiality:
 Information security protocols must be enforced at various layers of
  cloud architecture.
•   Integrity:
 Applying the due diligence within the cloud domain when accessing the
  data.
•   Non-repudiation:
 Applying traditional security protocols and token provisioning to data
  transfer.
•   Availability:
 Most critical security requirement as it is a key decision factor when
  choosing among different cloud models.



                                                                           22
 Cloud computing is an emerging technology having many
  features from earlier technologies like grid and cluster
  computing.
 It brings infinite computability, good scalability, service on-
  demand, etc.
 The reliability, availability and other non functional properties
   are very good.
 There are still many challenges regarding security of data but
  that can be solved.
References
[1] Wei-Tek Tsai, Xin Sun, Janaka Balasooriya “Service-Oriented Cloud Computing Architecture”
     in 2010 international conference on information technology, pp 684-689, © IEEE 2010.
[2] Manish Pokharel, YoungHyun Yoon, Jong Sou Park, “Cloud Computing in System
     Architecture”, in Computer Network and Multimedia Technology (CNMT), 2009 , © IEEE
     2009 .
[3] Jianfeng Yang, Zhibin Chen, “Cloud computing research and security issues”, in
     International Conference on Computational Intelligence and Software Engineering (CiSE),
     2010 , © IEEE 2010 .
[4] Krešimir Popović, Željko Hocenski, “Cloud computing security issues and challenges” in
     MIPRO, 2010 Proceedings of the 33rd International Convention, pp 344-349 , © IEEE 2010.
[5] Ilango Sriram, Ali Khajeh-Hosseini, “Research Agenda in Cloud Technologies”, © IEEE 2010.
[6] Wikipedia- Cloud computing.
[7] Ramgovind S, Eloff MM, Smith E, “The Management of Security in Cloud Computing”, © IEEE
     2010.
[8] Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu Gong “The Characteristics of
     Cloud Computing” in 39th International Conference on Parallel Processing Workshops
     (ICPPW), 2010




                                                                                          24
25
26

More Related Content

What's hot

Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Cloud computing vs grid computing
Cloud computing vs grid computingCloud computing vs grid computing
Cloud computing vs grid computing8neutron8
 
Cloud computing
Cloud computingCloud computing
Cloud computingRobbySahoo
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introductionguest90f660
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGAtul Chounde
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptYogi Dadhich
 
Cloud computing
Cloud computingCloud computing
Cloud computingArar Fahem
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingsolarisyougood
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Seminar On Cloud Computing
Seminar On Cloud ComputingSeminar On Cloud Computing
Seminar On Cloud ComputingSHAILESH WAGHOLE
 
Advanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingAdvanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingSwwapnil Saali
 
Cloud computing
Cloud computingCloud computing
Cloud computingRam Sharma
 
Introduction To Cloud Computing
Introduction To  Cloud ComputingIntroduction To  Cloud Computing
Introduction To Cloud Computingacemindia
 

What's hot (20)

Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing vs grid computing
Cloud computing vs grid computingCloud computing vs grid computing
Cloud computing vs grid computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Seminar On Cloud Computing
Seminar On Cloud ComputingSeminar On Cloud Computing
Seminar On Cloud Computing
 
Advanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingAdvanced Concepts of Cloud Computing
Advanced Concepts of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Introduction To Cloud Computing
Introduction To  Cloud ComputingIntroduction To  Cloud Computing
Introduction To Cloud Computing
 
Presentation cloud computing
Presentation cloud computingPresentation cloud computing
Presentation cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Similar to Cloud computing architecture and vulnerabilies

Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingSuman Jha
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingEditor IJCATR
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.IRJET Journal
 
Cloud-Computing-ppt by Banshidhar Behra.pptx
Cloud-Computing-ppt by Banshidhar Behra.pptxCloud-Computing-ppt by Banshidhar Behra.pptx
Cloud-Computing-ppt by Banshidhar Behra.pptxsubhalaxmibarik478
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questionspiyushchawala
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 

Similar to Cloud computing architecture and vulnerabilies (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
176
176176
176
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
Cloud-Computing-ppt by Banshidhar Behra.pptx
Cloud-Computing-ppt by Banshidhar Behra.pptxCloud-Computing-ppt by Banshidhar Behra.pptx
Cloud-Computing-ppt by Banshidhar Behra.pptx
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
489 493
489 493489 493
489 493
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questions
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Cloud computing architecture and vulnerabilies

  • 1.
  • 2. POINTS OF DISCUSSION  INTRODUCTION  NEED OF CLOUD COMPUTING  EVOLUTION  ARCHITECTURES  CHARACTERISTICS  SECURITY ISSUES  SECURITY REQUIREMENTS 2
  • 3. WHAT IS CLOUD COMPUTING ? • Cloud computing is delivery of computing as service rather than as a product. • Enables on-demand network access to a shared pool. • Requires minimal management effort or service provider interaction. • It is UTILITY based system comprising of: 3
  • 4. • It is collection of virtualized computers connected under SERVICE LEVEL AGREEMENT (SLA). • A service-level agreement is a part of a service contract where the level of service is formally defined. • It defines the role of third party control which includes:  Negotiation of contract.  Fulfillment in real time.  QoS parameter.  Monitoring.  Enforcement. 4
  • 5. NEED OF CLOUD COMPUTING • Cloud computing is a compelling paradigm. • The mission is to take computing on retail basis. • Making internet the ultimate resource of all computing needs. • Services are sold on a subscription or pay-per usage basis over internet. 5
  • 6. 6 Fig1:flow diagram of need of cloud computing [ref 2]
  • 7. Evolution of cloud computing 7 Fig2: Cloud computing evolution [ref 1]
  • 10. SERVICE ORIENTED ARCHITECTURE (SOA) • SOA is an architectural pattern that guides business solutions to create, organize and reuse its computing components. • It is having a layered architecture each layer meant for performing different tasks. Fig 4 : Basic Architecture diagram of service oriented architecture [ref 2] 10
  • 11. DETAILED SOA ARCHITECTURE DESCRIPTION Fig 5: detailed service oriented architecture description including all layers and their components.[ref 1] 11
  • 12. • Individual Cloud Provider Layer:  Each provider builds a data center that powers the cloud services it provides.  Within each cloud there is request dispatcher working with virtual machine monitor to allocate the requests to available resources. • Cloud Ontology Mapping Layer:  It masks the differences among the different cloud providers.  Helps in migration of cloud application from one cloud to another.  Storage ontology  Computing ontology  Communication ontology 12
  • 13. • Cloud Broker Layer:  It serves as an agent between individual CSP and SOA layer.  It needs to fulfill following tasks:  CLOUD PROVIDER INFORMATION PUBLISHING  RANKING  DYNAMIC SLA NEGOTIATION  ON-DEMAND PROVISION MODEL • SOA Layer:  Services are published as re-deployable packages.  It contains following information and files:  COMPILED CODE  SOURCE CODE  CONFIGURATION FILE 13
  • 14. CHARACTERISTIC OF CLOUD COMPUTING Fig 6 : Various characteristics of cloud computing [ref 8] 14
  • 16. SERVICE CATEGORIES The service provider provides services under following categories: Software is Provides a Virtualizes presented to the end development computing power, user on demand, platform with a set of storage and usually in a browser. services to assist on network cloud connectivity 16
  • 17. Fig 7: service categories in a cloud with various components implemented at various levels [ref 6] 17
  • 18. TECHINICAL CHARACTERISTICS LOOSE COUPLING:  Through virtualization or other technologies, the infrastructures are separated in logic. Users sets Uset1 , Uset2 , …, Usetm where (m ≥1). Providers sets Pset1 , Pset2 ,…, Psetn where ( n ≥1 ). Useti loose coupling with provider setj: Set (Useti Psetj ). User sets are independent: Useti ∩ Usetj =φ ( 0 ≤ i, j ≤ m , i ≠ j ). Provider sets are independent: Pseti ∩ Psetj =φ ( 0 ≤ i, j ≤ m , i ≠ j ). The loose coupling (cloud user connects to cloud Provider) sets are independent: Set (Useti1, Psetj1 )∩ (Useti2, Psetj2 ) =φ. Set (Usetgoogle ,Psetgoogle ) ∩ Set (Usetyahoo ,Psetyahoo) ∩ (Usetbing ,Psetbing ) =φ 18
  • 19. Fig 8: Result of a survey conducted among IT giants to find out most crucial element that 19 they are concerned about in cloud computing [ref 4 ]
  • 20.  SECURITY: In cloud, data is distributed regardless of where your base repository of data is finally stored Personal data may be scattered in  PRIVACY: various virtual data centers, even across the national borders. Servers in cloud have same problems as resident servers  RELIABILITY: experiencing downtimes and slowdowns. By unthoughtful data sharing, various laws and government  LEGAL ISSUES regulations may be violated. Data in the cloud should never become invalid even when the service provider go broke and  LONG TERM VIABILITY: swallowed by other company.
  • 21. Fig 9: information security requirements in various service categories of different computing models of cloud computing [ref 7] 21
  • 22. Identification & Authentication:  Users must be validated by username-password authentication. • Authorization:  Exerting control and privilege over information flow in the cloud. • Confidentiality:  Information security protocols must be enforced at various layers of cloud architecture. • Integrity:  Applying the due diligence within the cloud domain when accessing the data. • Non-repudiation:  Applying traditional security protocols and token provisioning to data transfer. • Availability:  Most critical security requirement as it is a key decision factor when choosing among different cloud models. 22
  • 23.  Cloud computing is an emerging technology having many features from earlier technologies like grid and cluster computing.  It brings infinite computability, good scalability, service on- demand, etc.  The reliability, availability and other non functional properties are very good.  There are still many challenges regarding security of data but that can be solved.
  • 24. References [1] Wei-Tek Tsai, Xin Sun, Janaka Balasooriya “Service-Oriented Cloud Computing Architecture” in 2010 international conference on information technology, pp 684-689, © IEEE 2010. [2] Manish Pokharel, YoungHyun Yoon, Jong Sou Park, “Cloud Computing in System Architecture”, in Computer Network and Multimedia Technology (CNMT), 2009 , © IEEE 2009 . [3] Jianfeng Yang, Zhibin Chen, “Cloud computing research and security issues”, in International Conference on Computational Intelligence and Software Engineering (CiSE), 2010 , © IEEE 2010 . [4] Krešimir Popović, Željko Hocenski, “Cloud computing security issues and challenges” in MIPRO, 2010 Proceedings of the 33rd International Convention, pp 344-349 , © IEEE 2010. [5] Ilango Sriram, Ali Khajeh-Hosseini, “Research Agenda in Cloud Technologies”, © IEEE 2010. [6] Wikipedia- Cloud computing. [7] Ramgovind S, Eloff MM, Smith E, “The Management of Security in Cloud Computing”, © IEEE 2010. [8] Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu Gong “The Characteristics of Cloud Computing” in 39th International Conference on Parallel Processing Workshops (ICPPW), 2010 24
  • 25. 25
  • 26. 26