International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN STUDY ON CLOUD COMPUTING

Similar documents
Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Benefits of Cloud Computing

Kusum Lata, Sugandha Sharma

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Research Article Volume 6 Issue No. 5

Multi Packed Security Addressing Challenges in Cloud Computing

Re-allocation of Tasks according to Weights in Cloud Architecture

Analytics in the Cloud Mandate or Option?

Computing as a Service

How to avoid storms in the cloud. The Australian experience and global trends

DEEP DIVE INTO CLOUD COMPUTING

ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast

Cloud Computing and Its Impact on Software Licensing

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

Assistant Professor, School of Computer Applications,Career Point University,Kota, Rajasthan, India Id

CHEM-E Process Automation and Information Systems: Applications

Fundamental Concepts and Models

1/10/2011. Topics. What is the Cloud? Cloud Computing

Building your Castle in the Cloud for Flash Memory

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

Cloud Computing and Service-Oriented Architectures

Privacy hacking & Data Theft

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

JOURNEY TO CLOUD (J2C) CONSUMING TECHNOLOGY, NOT OWNING IT

Why the cloud matters?

Cloud Computing in the enterprise: Not if, but when and how?

Cloud Computing Concepts, Models, and Terminology

Cloud Computing Overview. The Business and Technology Impact. October 2013

Chapter 4. Fundamental Concepts and Models

Introduction To Cloud Computing

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

AN ANALYSIS OF DEPLOYMENT MODELS IN CLOUD COMPUTING

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Article Summary of: Understanding Cloud Computing Vulnerabilities. Michael R. Eldridge

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

Data Security: Public Contracts and the Cloud

Building Trust in the Era of Cloud Computing

CompTIA Cloud Essentials Certification Exam Objectives EXAM NUMBER: CLO-001

Cloud Computing and Service-Oriented Architectures

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

Computing Power at the push of a button: Dynamic Services for Infrastructure.

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results

Practical Guide to Cloud Computing Version 2. Read whitepaper at

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

Accelerate Your Enterprise Private Cloud Initiative

The Challenge of Cloud Security

CompTIA Cloud Essentials Certification Exam Objectives EXAM NUMBER: CLO-001

AES and DES Using Secure and Dynamic Data Storage in Cloud

Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida

Cloud Computing, SaaS and Outsourcing

10 Cloud Myths Demystified

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Load Balancing Algorithms in Cloud Computing: A Comparative Study

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25

Cloud Computing Introduction & Offerings from IBM

Analysis of Cloud Computing Delivery Architecture Models

Key words: Cloud computing, Reverse Proxy, SaaS, PaaS, IaaS and Security threats

Developing, Deploying and Managing Applications on the Cloud

Solution Brief: VMware vcloud Director and Cisco Nexus 1000V

Cloud-Security: Show-Stopper or Enabling Technology?

ACCENTURE & RED HAT ACCENTURE CLOUD INNOVATION CENTER

A guide for IT professionals. implementing the hybrid cloud

Security Camp 2016 Cloud Security. August 18, 2016

Chapter. Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop

CS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12,

CompTIA CV CompTIA Cloud+ Certification. Download Full Version :

OpenStack Seminar Disruption, Consolidation and Growth. Woodside Capital Partners

10 Cloud Myths Demystified

Cloud Mobile Computing

Enabling Seamless Sharing of Data among Organizations Using the DaaS Model in a Cloud

to know how and when to apply which Microsoft technology. In many cases, you can combine multiple

Deploying to the Cloud: A Case study on the Development of EHNAC s Cloud Enabled Accreditation Program (CEAP)

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

IBM Bluemix compute capabilities IBM Corporation

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

VMware Hybrid Cloud Solution

ABSTRACT I. INTRODUCTION

A Holistic View of Telco Clouds

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist

Third Party Cloud Services Its Adoption in the New Age

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

OPENSTACK PRIVATE CLOUD WITH GITHUB

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed

THE DATA CENTER AS A COMPUTER

Cloud Essentials for Architects using OpenStack

Cloud Computing Private Cloud

Extend your datacenter with the power of Citrix Open Cloud

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018

CLOUD COMPUTING ABSTRACT

An Introduction to Cloud Computing with OpenNebula

Core of Cloud Computing

Overview of International Standards for Cloud Computing

Cloud Computing An IT Paradigm Changer

Developing the ERS Collaboration Framework

Introduction to Cloud Computing

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Transcription:

Omkumar R. Badhai, Shreya A. Deo, Snehal B.Satpute, Mansi Agrawal Department of Computer Engineering, Sipna College Of engineering and Technology, Amravati, Sant Gadge Baba Amravati University ABSTRACT: Cloud Computing provides us means by which we can access the applications as utilities over the internet. It allows us to create, configure, and customize the business applications online. This paper will take you through a step-by-step approach while learning Cloud Computing concepts. This paper has been prepared for the beginners to help them to understand basic-to-advanced concepts related to Cloud Computing. This paper will give you enough understanding on Cloud Computing concepts from where you can take yourself to a higher level of expertise. Keywords: cloud, IaaS, PaaS, SaaS [1] INTRODUCTION Cloud: The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over public and private networks, i.e., WAN, LAN or VPN. Applications such as e-mail, web conferencing, customer relationship management (CRM) execute on cloud. Cloud Computing: Cloud computing refers to configuring, and accessing the hardware and software resources remotely. It offers online data storage, infrastructure, and application. Cloud computing offers platform independency, as the software is not required to be installed locally on the PC. Hence, the Cloud Computing is making our business applications mobile and collaborative. Basic Concepts: Omkumar R. Badhai Shreya A. Deo Snehal B.Satpute Mansi Agrawal 1

There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing: Deployment Models Service Models Deployment Models Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid, and Community. PUBLIC CLOUD The public cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness. PRIVATE CLOUD The private cloud allows systems and services to be accessible within an organization. It is more secured because of its private nature. COMMUNITY CLOUD The community cloud allows systems and services to be accessible by a group of organizations. HYBRID CLOUD The hybrid cloud is a mixture of public and private cloud, in which the critical activities are performed using private cloud while the non-critical activities are performed using public cloud. Service Models Cloud computing is based on service models. These are categorized into three basic service models which are Infrastructure-as a-service (IaaS) Platform-as-a-Service (PaaS) Software-as-a-Service (SaaS) Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a- Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service. 2

The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service models inherit the security and management mechanism from the underlying model, as shown in the following diagram: INFRASTRUCTURE-AS-A-SERVICE (IAAS) IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc. PLATFORM-AS-A-SERVICE (PAAS) PaaS provides the runtime environment for applications, development and deployment tools, etc. SOFTWARE-AS-A-SERVICE (SAAS) SaaS model allows to use software applications as a service to end-users. History of Cloud Computing The concept of Cloud Computing came into existence in the year 1950 with implementation of mainframe computers, accessible via thin/static clients.since then, cloud computing has been evolved from static clients to dynamic ones and from software to services. The following diagram explains the evolution of cloud computing: Benefits Cloud Computing has numerous advantages. Some of them are listed below - One can access applications as utilities, over the Internet. One can manipulate and configure the applications online at any time. It does not require to install a software to access or manipulate cloud application. Cloud Computing offers online development and deployment tools, programming runtime environment through PaaS model. Cloud resources are available over the network in a manner that provide platform independent access to any type of clients. Cloud Computing offers on-demand self-service. The resources can be used without interaction with cloud service provider. Cloud Computing is highly cost effective because it operates at high efficiency with optimum utilization. It just requires an Internet connection Cloud Computing offers load balancing that makes it more reliable. Risks related to Cloud Computing Although cloud Computing is a promising innovation with various benefits in the world of computing, it comes with risks. Some of them are discussed below: Security and Privacy It is the biggest concern about cloud computing. Since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to cloud service providers.although the cloud computing vendors ensure highly secured password protected accounts, any sign of security breach may result in loss of customers and businesses. Omkumar R. Badhai Shreya A. Deo Snehal B.Satpute Mansi Agrawal 3

Lock In It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular CSP for service. Isolation Failure This risk involves the failure of isolation mechanism that separates storage, memory, and routing between the different tenants. Management Interface Compromise In case of public cloud provider, the customer management interfaces are accessible through the Internet. Insecure or Incomplete Data Deletion It is possible that the data requested for deletion may not get deleted. It happens because either of the following reasons Extra copies of data are stored but are not available at the time of deletion Disk that stores data of multiple tenants is destroyed. Characteristics of Cloud Computing There are four key characteristics of cloud computing. They are shown in the following diagram: On Demand Self Service Cloud Computing allows the users to use web services and resources on demand. One can logon to a website at any time and use them. Broad Network Access Since cloud computing is completely web based, it can be accessed from anywhere and at any time. Resource Pooling Cloud computing allows multiple tenants to share a pool of resources. One can share single physical instance of hardware, database and basic infrastructure. Rapid Elasticity It is very easy to scale the resources vertically or horizontally at any time. Scaling of resources means the ability of resources to deal with increasing or decreasing demand. The resources being used by customers at any given point of time are automatically monitored. 4

Measured Service In this service cloud provider controls and monitors all the aspects of cloud service. Resource optimization, billing, and capacity planning etc. depend on it Conclusion: Thus we have studied the basic concepts regarding cloud computing. Use of cloud computing and the basic idea regarding cloud computing. We have studied the models of cloud computing. The types of cloud we have studied. Various definitions of cloud computing were discussed and the NIST working definition by Mell and Grance [11] was found to be the most useful as it described cloud computing using a number of characteristics, service models and deployment models. The socio-technical aspects of cloud computing that were reviewed included the costs of using and building clouds, the security, legal and privacy implications that cloud computing raises as well as the effects of cloud computing on the work of IT departments. The technological aspects that were reviewed included standards, cloud interoperability, lessons from related technologies, building clouds, and use-cases that presented new technological possibilities enabled by the cloud. Refrences: [1] A Platform Computing Whitepaper. Enterprise Cloud Computing: Transforming IT. Platform Computing, pp6, 2010. [2] B.P. Rimal, Choi Eunmi, I. Lumb, A Taxonomy and Survey of Cloud Computing Systems, Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218 [3] B. R. Kandukuri, R. Paturi V, A. Rakshit, Cloud Security Issues, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009. [4] Cloud Computing. Wikipdia. Available at http://en.wikipedia.org/wiki/cloud_computing [5] Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, Ensuring Data Storage Security in Cloud Computing, 17th Internationaln workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4 [6] C. Weinhardt, A. Anandasivam, B. Blau, and J. Stosser. Business Models in the Service World. IT Professional, vol. 11, pp. 28-33,2009. [7] Daniel Oliveira and Eduardo Ogasawara. Article: Is Cloud Computing the Solution for Brazilian Researchers?. International Journal of Computer Applications 6(8):19 23, September 2010. Omkumar R. Badhai Shreya A. Deo Snehal B.Satpute Mansi Agrawal 5