CHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS
|
|
- Kory Horn
- 6 years ago
- Views:
Transcription
1 CHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS CLOUD SERVICE MODELS The Cloud Service Models can be categorized into three main categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) [36][3]. Apart from this another cloud service is Storage as a Service (StaaS) which allows user to store their data and access these anytime via internet. Example: Amazon S3, Nirvanix etc. Any cloud service provider can provide any one of the services or all three services together. There are many more service models evolving around the cloud world, however, in this thesis we will also look in to the advantages of having Risk Assessment as a Service and Encryption as a Service (EaaS) as an additional security methodology. Table 2.1 Cloud Service Models Cloud Service Models SaaS Software as a Service PaaS Platform as a Service IaaS Infrastructure as a Service Definition Applications that are deployed over a network, typically the web, accessible via browser or program interface; sometimes referred to as software on demand A platform on which users can build applications using languages, libraries, services and tools supported by the provider Processing and storage capacity, networking and other computing resources where the user has control over operating systems and deployed applications; sometimes referred to as utility computing Examples Facebook, Google Apps ( , calendar, documents), Salesforce.com, Twitter, ZenDesk, Zoho Office Force.com, Google App Engine, Red Hat OpenShift, Windows Azure Amazon Web Services (EC2, S3, DynamoDB, others), GoGrid, ServePath, FlexiScale, Rackspace Mosso
2 PLATFORM-AS-A-SERVICE (PaaS) PaaS type of cloud computing offers a full or partial product development tools or environment that users can access and utilize online, even in collaboration with others and hosted on the provider's infrastructure. In PaaS developers create applications on the service provider's platform over the Internet or web. PaaS service providers may use Application Program Interfaces (APIs), gateway software or website portals installed on the customer's premises. GoogleApps and Force.com (an outgrowth of Salesforce.com) are good examples of PaaS. At present in cloud computing there is no standards for interoperability or data portability for developers [36]. SOFTWARE-AS-A-SERVICE (SaaS) SaaS type of cloud computing model offers users the hardware infrastructure, the software product and interrelates with the users through a front-end gateway or portal. Here a provider authorizes an application to clients either as a service on demand in a "pay-as-yougo" model or at no charge by a subscription. These applications can be accessed from various thin client interfaces such as web browsers. A user for this service need not maintain, manage or control the underlying cloud infrastructure (i.e. network, operating systems, storage etc.) [2]. Examples for SaaS cloud's are Salesforce, NetSuite [36]. INFRASTRUCTURE-AS-A-SERVICE (IaaS) The IaaS type of cloud computing distributes a full computer infrastructure via the web or Internet. Most popular IaaS providers like Amazon Web Services offer virtual server instances with unique IP addresses and block of storage on demand. In IaaS customers usually use the service providers (SP) application program interface (API) to start, stop, access, modify and configure their virtual servers and storage as is needed. Examples for IaaS cloud's are Eucalyptus (The Eucalyptus Opensource Cloud-computing System), Amazon EC2, Rackspace, Nimbus [2] [36].
3 PRIVACY AND ANONYMIZATION AS A SERVICE (PAaaS) This service is proposed as a demonstration model to provide data privacy and protection in a particular organization. It also proposes a work-flow oriented approach to manage data in cloud [37][38]. HARDWARE AS A SERVICE (HAAS) The idea of buying a hardware or an entire datacenter with a pay-as-you-use scheme which can scale up and down as per user requirements can be termed as Hardware as a Service (HaaS) [39]. Examples for HaaS cloud's are Amazon EC2, IBM's Blue Cloud Project, Nimbus, Eucalyptus, Enomalism [38]. IDENTITY AS A SERVICE (IDaaS) This service is targeted for third party service providers who provide Identity and access control functions (including users life cycle and sign-on process). This can be used in combination with various other services (software, platform or infrastructure services) and also for public and private clouds [42]. DATA STORAGE AS A SERVICE (DaaS) This service allows user to pay for the amount of data storage he/she is using. With this service there is a separate cloud formed which provides storage as a service [45]. Examples of such kinds of users are Amazon S3, Google Bigtable, Apache Hbase, etc [38]. SECURITY AS A SERVICE (SaaS) This service allows users to create their own security policies and risk frameworks. In this kind of service cloud users must identify, assess, measure and prioritize system risks [9]. ANYTHING AS A SERVICE (XaaS) This is more general form of representing deployment of a service. These services could be of any type and `X' in XaaS can be substituted by software, hardware, infrastructure, data, business, IT, Security, monitoring, etc. These days new service models are being developed [39][3]. Examples are: IT as a service [18], Cloud as a Service (CaaS) [3], Management as a Service (MaaS) [3], Models like Backup as a Service (BaaS), Computing as a Service (CaaS), Authentication as a Service (AaaS), Desktop as a Service (DaaS), Hardware
4 Solutions as a Service (HSaaS) and Disaster Recovery as a Service (DRaaS), etc., provided by Various Hosing providers in the IT Market. Some of the most important services are lined up in the figure 2.1. Figure 2.1 Cloud Computing Separation of Responsibilities ( pros-2-3.aspx) In a traditional on-premise IT Environment, the customer manages everything, starting with network and finishing with apps. When customers use some IaaS cloud service (think Amazon EC2) vendor does all hardware management for the customer. But customer will still be responsible for all software layers: operating system, database, frameworks, runtimes etc. PaaS is higher level option where vendor provides customer with fully configured platform that runs the required applications (usually it means customer might have to adopt their apps somehow, but cost of adoption usually is not so big). SaaS is top-level service option: vendor manages all components of customer s IT stack. All three models are useful while they have different goals and user audience.
5 CLOUD DEPLOYMENT SERVICES According to deployment model, cloud computing can be categorized into four categories, Refer Figure 2.2 [30]: Figure 2.2 Cloud Service and Deployment Models ( PUBLIC CLOUD A public cloud or external cloud is one base on the usual mainstream model, in which service provider makes resources, such as storage and application, obtainable to the general public over the Internet or via web applications/web services. Maybe public cloud services are free or offered on a pay-as-you-go model. In public cloud hardware, application and bandwidth costs are covered by the service provider so it is easy and inexpensive set-up to the user. Using pay-as-you-go model it may save resource from wasting [35][36]. IBM's Blue Cloud, Sun Cloud, Google AppEngine, Windows Azure Services Platform, Amazon Elastic Compute Cloud (EC2) are good example of public clouds [36]. PRIVATE CLOUD The term Private Cloud is also referred to as internal cloud or corporate cloud. Here the provider provides services to a limited number of users behind a firewall or users access is limited to mitigate the security risk [35][36]. For proprietary computing architecture it
6 could be a marketing term where marketing media uses the words private cloud to offer organization that needs more control over their data than using a third-party hosted service [36]. Private cloud is good for companies' own privacy policies however, from up-front capital cost, it is not that much beneficial still it cost money to buy, build and manage [35]. Amazon s Elastic Compute Cloud (EC2) or Simple Storage Service (S3) is example of Private Cloud [36]. HYBRID CLOUD A hybrid cloud environment is the combination of public and private cloud where the infrastructure partially hosted inside the organization and externally in a public cloud [35]. For example, an organization might use Amazon Simple Storage Service (Amazon S3) as public cloud service to records their data but at the same time continue in-house storage for instant access operational customer data. Hybrid storage clouds are often valuable for record keeping and backup function. It is a good approach for a business to take advantage of the cost effectiveness and scalability [36]. COMMUNITY CLOUD A community cloud can be recognized where a number of organizations have comparable necessities and very willing to share infrastructure so as to take in the benefits of cloud computing. Here costs increase than a public cloud and sometimes can be more expensive but may offer a higher level of privacy and security. Google's "Gov Cloud" is a good example of community cloud [35]. 2.3 CHOICE OF RIGHT DEPLOYMENT / DELIVERY MODEL The choice of the right deployment model is influenced by a number of factors including cost, manageability, integration, security, compliance and quality of service. Table 2.2 summarizes how each deployment model compares on the influencing attributes.
7 Table 2.2 Comparison of Deployment Models Deployment Models Attribute Private Hybrid Cloud / Public On Cloud Community Cloud Cloud Premise Upfront Costs High Medium Low High Ongoing Costs Low Medium High High Security High Medium Low High Compliance High Medium Low High Quality of Service High Medium Low High Integration High Medium Low High Configurability Medium Medium Low High Based on the above it can be inferred that although cloud computing offers compelling benefits in terms of high availability, elastic scalability and fast deployments, risks associated with the adoption cannot be completely eliminated but can be carefully mitigated with extra measures. EXISTING PROBLEMS IN CLOUD COMPUTING Cloud computing has turned into a standard information technology operation for many small or large businesses. It offers many considerable advantages, including probable expenditure savings. There are, however, major risk and disadvantages related with cloud computing. Its dislocated nature is a benefit in many cases however can also be disadvantageous because the user has no supreme control over the software applications including secret data. Client has to depend on the provider to update, upgrade maintain and administer it. The user does not have direct access to the software to fix the problems while something goes wrong in any application and must rely on the service provider. The user can experience significant problems when the cloud provider is uncaring or incapable to fix the problem quickly.
8 With respect to privacy, there is the possibility that cloud computing may lead to commingling of information assets with other cloud customers, including competitors [23]. With respect to security, Viega (2009) [25] foresees that data and code residing in cloud computing environments will become more tempting targets to hackers. With respect to reliability, Armbrust.M et al. (2009) [27] argue that few non-cloud IT infrastructures are asrobust as cloud computing service offerings, but organizations are still concerned about availability in light of recent outages from Amazon and Google. The Cloud Security Alliance (2009) [6] eschews the notion that cloud computing should be viewed as a black box. The Information Systems Audit and Control Association (ISACA) (2009a) [23] recommends that organizations need to conduct business impact analyses and risk assessments as part of a major cloud computing governance initiative. As noted by Leavitt (2009) [7], organizations are now evaluating both the risks and rewards of cloud computing. The assumption underlying this study is that this is essential, especially in light of the statement by Nelson (2009) [12] that it is feasible that within the next 5 years, more than 80% of the world s computing and data storage could occur in the Cloud. The public cloud computing IT-related risks are organized and presented by their potential to align with three primary risk categories as identified by the European Network and Information Security Agency (ENISA) which are: (a) policy and organizational risks, (b) technical risks, and (c) legal risks (ENISA, 2009) [5]. In the same way, if a company becomes reliant on cloud-based services and the provider is unable to continue with their services, you will rapidly run into trouble. This trouble would quickly turn into much worse if the provider was not sincere to give any prior notice in time to allow your business to take an alternative cloud service. In today s unstable economic climate, cloud providers may face financial problems or impoverishment which could critically spoil or remove the provider s name from cloud provider list. These kinds of financial problems may come suddenly and company will often have inadequate alternative in these situations. Cloud computing can also mean big risks in the integrity, privacy areas and also greatly in users authentication. Using a cloud system, company s susceptible data and information will be stored on third-party servers, and user will possibly have very inadequate
9 understanding or control regarding this information. If the provider has insufficient security, or a violation of encryption systems or procedures are performed for different reasons, thus compromised company s private and confidential data. This could have devastating consequences, and could cause lawful problems for company if third party private information (for example, customer information) is negotiated. Entrepreneurs and small firms face special problems when using the cloud systems. Small size and limited resources of these companies make these much more vulnerable to the risks related with cloud use. For example, if a cloud service provider unable or won t be willing to provide service, the user s best option may be urgent legal action. Many small companies are not competent to activate their lawyers effectively in this way and thus they may not be capable to promptly mitigate such service interruption by the provider. Same fact is for the privacy and security risks that have been mentioned above a small company can rapidly get into significant difficulty if a security violation occurs from use of cloud-based systems and they may not have the assets to effectively tackle such a situation. [29] Organizations are increasingly looking to cloud computing to improve operational efficiency, reduce headcounts, and help with the bottom line. But security and privacy concerns present a strong barrier-to-entry. In an age when the consequences and potential costs of mistakes are rising fast for companies that handle confidential and private customer data, IT security professionals must develop better ways of evaluating the security and privacy practices of cloud services. The security and legal landscape for cloud computing is rife with mishaps and uncertainties. In the long run, however, cloud operators will continue to find economies of scale, not only in their core services, but also in their treatment of security. To take full advantage of the power of cloud computing, end users need to attain assurance of the cloud's treatment of security, privacy, and compliance issues. To that end, we need an industry with open standards, clearer regulations, and community-driven interoperability. A standards-based approach will make it easier for vendors to support flexibility, agility, and expanded cloud service offerings such as collaboration, and it will also make it easier for customers to evaluate cloud vendors and build trust in its privacy and security promises. There are several problems in cloud computing and this thesis work is mainly focused on authentication based security issues in cloud computing and how it can be mitigated, the
10 main focus of this thesis is to mitigate the risk of safeguarding data at rest using a hybrid new technique. CLOUD ADOPTION BARRIERS Cloud computing has created a fundamental shift in how information technology infrastructure is run and managed, changing both the business and technology sides of IT. But, as with any major change in history, there are supporters and skeptics. Transferring enterprise IT to the cloud is a complex task that includes both technical and organizational challenges. The cloud is a new paradigm that doesn t have a clear onesentence definition; it includes multiple factors, and therefore transformation to a cloud-based process may seem confusing. Figure 2.3 Cloud Adoption Barriers
11 This complexity paired with uncertainty creates a number of organizational cloudadoption barriers. According to a survey conducted by KPMG (Figure 2.3 [6]), security, cost uncertainty, and loss of control are the top three cloud-adoption barriers. Data security is by far the most challenging barrier to cloud adoption. Data is the most precious corporate asset, and companies want to know that their data is safe. Companies feel confident when they store data internally because they have full control over it. Although there is no guaranty that data is better protected internally comparing to public cloud. In fact, there is a possibility that data could be even safer in the public cloud because public cloud providers may possess higher level of data security expertise comparing to their customers. When stored at public cloud, data can be compromised at several different datalifecycle stages: during transfer from the internal company network to the public cloud, when data is stored in the public cloud, and during data backup and restore processes. There are fundamental questions to ask in order to ensure data security in a public cloud: 1. Who has access to the data? What are the access-control policies? Do we have full visibility into information regarding these access-control policies? 2. Is data encrypted during transfer from the internal network to the public cloud? What is the encryption algorithm? Can data be encrypted when stored in the cloud? Who holds the encryption keys? 3. If a cloud provider is not supposed to have access to the data, encryption keys should be held only by the company that owns the data. Some of the compliance standards mandate full data encryption, and do not permit cloud providers to hold encryption keys. 4. What is the disaster-recovery process? Does the cloud provider replicate data across multiple datacenters? Are these datacenters located in different geographical locations? 5. If data is stored in only one datacenter and the cloud provider doesn t have the capability to replicate it at other datacenters, this should raise a red flag. 6. What is the data-backup process? Who has access to the backup data? Where is the backup data stored? 7. What is the data-recovery process? How long does data recovery take?
12 8. What is the security-breach investigation process? Does the cloud provider have security-breach investigation capabilities? This question is often forgotten, but it is very important if data is compromised, the cloud provider will be the only source of information for any investigation.
CHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationCloud Computing Overview. The Business and Technology Impact. October 2013
Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility
More informationMitigating Risks with Cloud Computing Dan Reis
Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution
More informationIn this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,
In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided
More informationIntroduction to Cloud Computing. [thoughtsoncloud.com] 1
Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:
More informationCLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department
1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationEY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services
EY Norwegian Cloud Maturity Survey 2019 Current and planned adoption of cloud services Contents 01 Cloud maturity 4 02 Drivers and challenges 6 03 Current usage 10 04 Future plans 16 05 About the survey
More informationDanish Cloud Maturity Survey 2018
Danish Cloud Maturity Survey 2018 Current and planned adoption of cloud services Danish Cloud Maturity Survey 2018 1 Early days for cloud adoption with concerns for security and expertise, and complexity
More informationCLOUD COMPUTING-ISSUES AND CHALLENGES
CLOUD COMPUTING-ISSUES AND CHALLENGES Asstt. Prof.Vandana S.D.S.P.Memorial College for Women, Rayya (India) ABSTRACT Cloud computing is a multifaceted technological paradigm that is outgrowth of decades
More informationCLOUD COMPUTING ABSTRACT
Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationCloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing.
Cloud Computing By: Muhammad Naseem Assistant Professor Department of Computer Engineering, Sir Syed University of Engineering & Technology, Web: http://sites.google.com/site/muhammadnaseem105 Email: mnaseem105@yahoo.com
More informationEY Norwegian Cloud Maturity Survey 2018
EY Norwegian Cloud Maturity Survey 2018 Current and planned adoption of cloud services EY Norwegian Cloud Maturity Survey 2018 1 It is still early days for cloud adoption in Norway, and the complexity
More informationCloud Computing Briefing Presentation. DANU
Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities
More informationBRINGING CLARITY TO THE CLOUD
BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationThe case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
More informationHow unified backup and cloud enable your digital transformation success
Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationProgramowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając
Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared
More informationDEEP DIVE INTO CLOUD COMPUTING
International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationCLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to
CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.
More informationJourney to the Cloud. Jeff Hoehing, Principal Consultant
Journey to the Cloud Jeff Hoehing, Principal Consultant Agenda! Industry/Business Trends! Cloud and DR in the Cloud! Verizon Terremark Overview! Q&A The World in which we Operate has Changed Consumerization
More informationCloud Computing introduction
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationTransform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date
Transform Your Business To An Open Hybrid Cloud Architecture Presenter Name Title Date Why You Need To Transform Your Business Public cloud performance setting new expectations for: IT speed, flexibility
More informationCLOUD COMPUTING. Supporting Enterprises Enhance IT Capabilities and Business Agility.
CLOUD COMPUTING Supporting Enterprises Enhance IT Capabilities and Business Agility www.veritis.com Contents Abstract... 1 Introduction... 1 Overview of Cloud Computing... 1 Why Choose Cloud Computing
More informationShaping the Cloud for the Healthcare Industry
Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More informationCS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12,
CS 6393 Lecture 10 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, 2013 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1 The Cloud The Network is the Computer - Sun
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationCloud Computing. Technologies and Types
Cloud Computing Cloud Computing Technologies and Types Dell Zhang Birkbeck, University of London 2017/18 The Technological Underpinnings of Cloud Computing Data centres Virtualisation RESTful APIs Cloud
More informationCloud for Government: A Transformative Digital Tool to Better Serve Communities
Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationCloud Computing in the enterprise: Not if, but when and how?
The Dbriefs Technology Executives series presents: Cloud Computing in the enterprise: Not if, but when and how? John Hagel, Director, Deloitte Consulting LLP Chris Weitz, Director, Deloitte Consulting
More informationSIEMLESS THREAT DETECTION FOR AWS
SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting
More information1-2-3 Webinar: Demystifying the Cloud
1-2-3 Webinar: Demystifying the Cloud Presented by: Kristi Robison, Paintrock Consulting Services Kristi.Robison@outlook.com Sponsored by Wyoming Entrepreneur Small Business Development Center in conjunction
More informationNATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES
NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda
More informationCompleting your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT
Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,
More informationA Ready Business rises above infrastructure limitations. Vodacom Power to you
A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic
More informationCHAPTER 2 BASICS OF CLOUD COMPUTING
69 CHAPTER 2 BASICS OF CLOUD COMPUTING 2.1 CLOUD COMPUTING Cloud computing is a distributed computing paradigm that focuses on providing a wide range of users with distributed access to scalable, virtualized
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationHosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution.
Hosted Azure for your business Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Azure is approximately 50 percent cheaper than other cloud services
More informationERP Solution to the Cloud
IT s Not so Scary: Moving your Onprem ERP Solution to the Cloud Lizza Novo Mission Furthering your success through the alignment of strategy, people, processes and technology. What is the Term Cloud? Server
More informationSEEM3450 Engineering Innovation and Entrepreneurship
SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)
More informationComputing as a Service
Cloud Computing? Dipl. Ing. Abdelnasser Abdelhadi Islamic University Gaza Department of Computer Engineering April 2010 Computing as a Service Business Processes Collaboration Industry Applications Software
More informationChapter 4. Fundamental Concepts and Models
Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas
More informationCloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson
Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider
More informationCIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud
CIO Guide: Disaster recovery solutions that work Making it happen with Azure in the public cloud Consult Build Transform Support When you re considering a shift to Disaster Recovery as a service (DRaaS),
More informationGetting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption
Getting Hybrid IT Right A Softchoice Guide to Hybrid Cloud Adoption Your Path to an Effective Hybrid Cloud The hybrid cloud is on the radar for business and IT leaders everywhere. IDC estimates 1 that
More informationCloud Computing, SaaS and Outsourcing
Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud
More informationCloud Computing Introduction & Offerings from IBM
Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?
More informationContents. Contents (ix) Chapter 1 EVOLUTION OF CLOUD COMPUTING. Chapter 2 INTRODUCTION TO CLOUD COMPUTING. (ix)
(ix) Preface... (v) Acknowledgment... (vii) Abbreviations... (xvii) Chapter 1 EVOLUTION OF CLOUD COMPUTING 1.1 Chapter Overview... 1 1.2 Distributed System... 1 1.2.1 Examples of Distributed Systems...
More informationHow to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
More informationProtecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series
Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationLeveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group
Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline
More informationI. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25
RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,
More informationADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI Adaptive Authentication in IBM Tivoli Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective
More informationCopyright 2011 EMC Corporation. All rights reserved.
1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145
More informationArchitectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
More informationFuture Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013
Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013
More informationCloud Computing and Its Impact on Software Licensing
Cloud Computing and Its Impact on Software Licensing By Gretchen Kwashnik & Jim Cecil January 25, 2012 What is Cloud Computing? Cloud computing is a model for enabling: on-demand network access to a shared
More informationMulticloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges
Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges An IDC InfoBrief, Sponsored by Cisco March 2018 EXECUTIVE SUMMARY Cloud is a key enabler of
More informationThe Challenge of Cloud Security
The Challenge of Cloud Security Dr. Ray Klump Chair, Mathematics & Computer Science Director, MS in Information Security Lewis University Poll Question #1: What type of cloud service are you
More informationCloud Computing Technologies and Types
Cloud Computing Technologies and Types Jo, Heeseung From Dell Zhang's, Birkbeck, University of London The Technological Underpinnings of Cloud Computing Data centers Virtualization RESTful APIs Cloud storage
More informationChoosing the Right Cloud. ebook
Choosing the Right Cloud ebook Contents Choosing the Right Cloud...3 The Cloud Explained: Public Cloud...4 The Cloud Explained: Private Cloud...5 Assessing Workload Characteristics...6 Right Application.
More informationRSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
More informationCLOUD COMPUTING PRIMER
CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS
More informationKroll Ontrack VMware Forum. Survey and Report
Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions
More informationHow to avoid storms in the cloud. The Australian experience and global trends
How to avoid storms in the cloud The Australian experience and global trends Discussion Topics 1. Understanding Cloud and Benefits 2. KPMG research The Australian Experience and Global Trends 3. Considerations
More informationCloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed
Cloud Infrastructure and Operations Chapter 2B/8 Page 1 Chapter 2: Cloud Layer Setup and Maintenance Topics covered: 2.1 Basic Cloud Computing Concept 2.2 Benefits of Cloud Computing 2.3 Main concept from
More informationCloud Computing Concepts, Models, and Terminology
Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and
More informationEvolved Backup and Recovery for the Enterprise
Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than
More information[MS10992]: Integrating On-Premises Core Infrastructure with Microsoft Azure
[MS10992]: Integrating On-Premises Core Infrastructure with Microsoft Azure Length : 3 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom) Course
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationCloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION
Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%
More informationCHALLENGES GOVERNANCE INTEGRATION SECURITY
CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises
More information2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud
Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google
More informationSecure Messaging as a Service
Security Infrastructure Management the way we do it Secure Messaging as a Service in collaboration with Insert partner logo Messaging as a Service (MaaS) In today s complex technological society, diversity
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?
DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided
More informationPUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS
PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud
More informationEnabling Hybrid Cloud Transformation
Enterprise Strategy Group Getting to the bigger truth. White Paper Enabling Hybrid Cloud Transformation By Scott Sinclair, ESG Senior Analyst November 2018 This ESG White Paper was commissioned by Primary
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationHow Credit Unions Are Taking Advantage of the Cloud
2013 CliftonLarsonAllen LLP How Credit Unions Are Taking Advantage of the Cloud CUNA Technology Council Conference September 2013 CLAconnect.com Randy Romes, CISSP, CRISC, MCP, PCI-QSA Principal, Information
More informationThe 7 Habits of Highly Effective API and Service Management
7 Habits of Highly Effective API and Service Management: Introduction The 7 Habits of Highly Effective API and Service Management... A New Enterprise challenge has emerged. With the number of APIs growing
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare
More informationDATACENTER AS A SERVICE. We unburden you at the level you desire
DATACENTER AS A SERVICE We unburden you at the level you desire MARKET TREND BY VARIOUS ANALYSTS The concept of flexible and scalable computing is a key reason to create a Cloud based architecture 77%
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationBusiness Technology Briefing: Fear of Flying, And How You Can Overcome It
Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May
More informationAdaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief
Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More information