CLOUD COMPUTING. M.N. Rao

Similar documents
Telecommunication Switching Systems and Networks

Fundamentals of Discrete Mathematical Structures

COMMUNICATION PROTOCOL ENGINEERING

FUNDAMENTALS OF DIGITAL CIRCUITS

A Programming Approach with C DHARMENDER SINGH KUSHWAHA

Honorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore

MICROPROCESSOR 8085 AND ITS INTERFACING SUNIL MATHUR. Second Edition A 1 ALE AD 0 - AD 7. Latch. Keyboard data V CC 8 P A D D 0 7 STB STB G G A

Fundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall

Microcontrollers. Principles and Applications. Ajit Pal +5 V 2K 8. 8 bit dip switch. P2 8 Reset switch Microcontroller AT89S52 100E +5 V. 2.

Object-Oriented Analysis and Design Using UML

Analysis of Algorithms

DATA COMMUNICATIONS AND COMPUTER NETWORKS

Cryptography and Network Security

COMPUTER GRAPHICS, MULTIMEDIA AND ANIMATION, Second Edition (with CD-ROM) Malay K. Pakhira

DIGITA L LOGIC AND COMPUTER ORGA NIZATION

MICROPROCESSOR Architecture, Programming and Interfacing SUNIL MATHUR. Assistant Professor Maharaja Agrasen Institute of Technology Delhi

Computer Graphics. Apurva A. Desai

Contents. Contents (ix) Chapter 1 EVOLUTION OF CLOUD COMPUTING. Chapter 2 INTRODUCTION TO CLOUD COMPUTING. (ix)

Database. Request Class. jdbc. Servlet. Result Bean. Response JSP. JSP and Servlets. A Comprehensive Study. Mahesh P. Matha

Numerical Methods. with Computer. Programs C++ Pallab Ghosh

Part III: Evaluating the Business Value of the Hybrid Cloud

PHI Learning Private Limited

Moving to the Cloud. Developing Apps in. the New World of Cloud Computing. Dinkar Sitaram. Geetha Manjunath. David R. Deily ELSEVIER.

3. What do you mean by virtualization? What is the role of virtualization in cloud computing?

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

Cloud Computing and Service-Oriented Architectures

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

S.No QUESTIONS COMPETENCE LEVEL UNIT -1 PART A 1. Illustrate the evolutionary trend towards parallel distributed and cloud computing.

Summary of Contents LIST OF FIGURES LIST OF TABLES

Lesson Plan for semester Started w.e.f (8 th Sem)

FUNDAMENTALS OF COMPUTERS

COP Cloud Computing. Presented by: Sanketh Beerabbi University of Central Florida

Contributors. Acknowledgements Abbreviations

SAP HR Time Management Technical Reference and Learning Guide

Risk Management in Electronic Banking: Concepts and Best Practices

Measuring the effectiveness of your ISMS implementations based on ISO/IEC 27001

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.

CLOUD MANAGEMENT AND SECURITY

Detail the learning environment, remote access labs and course timings

Multi Packed Security Addressing Challenges in Cloud Computing

An Introduction to Virtualization and Cloud Technologies to Support Grid Computing

VMware vsphere: Install, Configure, Manage plus Optimize and Scale- V 6.5. VMware vsphere 6.5 VMware vcenter 6.5 VMware ESXi 6.

Online Editor for Compiling and Executing Different Languages Source Code

EGI-InSPIRE. Cloud Services. Steven Newhouse, EGI.eu Director. 23/05/2011 Cloud Services - ASPIRE - May EGI-InSPIRE RI

SQA Advanced Unit specification: general information for centres

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

TIBCO Spotfire Hybrid Cloud Architecture Deep Dive

Informatica Axon Data Governance 5.2. Release Guide

Foundation for Cloud Computing with VMware vsphere 4

VMware vsphere 6.5: Install, Configure, Manage (5 Days)

ISAO SO Product Outline

AWS Solution Architecture Patterns

Cloud Storage Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science

Cloud Computing and Service-Oriented Architectures

CLOUD COMPUTING ABSTRACT

[VMICMV6.5]: VMware vsphere: Install, Configure, Manage [V6.5]

CS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12,

Endpoint web control overview guide

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

EMBARKING ON A DIGITAL TRANSFORMATION JOURNEY

ISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management

Accelerate Your Enterprise Private Cloud Initiative

Exam Ref Implementing Microsoft Azure Infrastructure Solutions Michael Washam Rick Rainey

Robust SRAM Designs and Analysis

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

Contents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

How to ensure control and security when moving to SaaS/cloud applications

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Architectural Implications of Cloud Computing

Amazon Web Services (AWS) Training Course Content

Cloud Computing /AWS Course Content

Title: Planning AWS Platform Security Assessment?

Cloud Computing. UCD IT Services Experience

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Towards a Hybrid Cloud Platform Using Apache Mesos

Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001

Security Advisory Relating to the Speculative Execution Vulnerabilities with some microprocessors

Cloud Computing Overview. The Business and Technology Impact. October 2013

The IBM Platform Computing HPC Cloud Service. Solution Overview

CHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

INFS 214: Introduction to Computing

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Vision of the Software Defined Data Center (SDDC)

Algorithm Collections for Digital Signal Processing Applications Using Matlab

FISMAand the Risk Management Framework

ISO/IEC TR TECHNICAL REPORT

COSO Enterprise Risk Management

UBS Data Center Efficiency Strategy

20465: Designing a Data Solution with Microsoft SQL Server

WORKSHARE SECURITY OVERVIEW

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

CHALLENGES GOVERNANCE INTEGRATION SECURITY

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

Operating the Cloud to Deliver Business Value. Dr Liam Keating IT Director, Intel APAC

Topological Structure and Analysis of Interconnection Networks

Cloud Services. Infrastructure-as-a-Service

Transcription:

CLOUD COMPUTING M.N. Rao

Cloud Computing

Cloud Computing M.N. RAO Director Research and Development Centre CSE Department SCET Engineering College Narsapuram Delhi-110092 2015

CLOUD COMPUTING M.N. Rao 2015 by PHI Learning Private Limited, Delhi. All rights reserved. No part of this book may be reproduced in any form, by mimeograph or any other means, without permission in writing from the publisher. ISBN-978-81-203-5073-1 The export rights of this book are vested solely with the publisher. Published by Asoke K. Ghosh, PHI Learning Private Limited, Rimjhim House, 111, Patparganj Industrial Estate, Delhi-110092 and Printed by Raj Press, New Delhi-110012.

To My Parents Shri M.L. Narayana and Satyavathi Wife Bhargavi Son Revanth My Sisters Vijaya and Malathi and My Mentor Shri Satrasala Ramesh Babu

Contents Preface xv Acknowledgements xvii 1. Introducing to Cloud Computing 1 14 U Learn 1 1.1 Evolution of Cloud Computing 1 1.2 Why Cloud Computing? 3 1.3 Cloud Essentials 3 1.4 Business and IT Perspectives 4 1.5 Cloud Computing Definition 5 1.6 Benefits and Challenges of Cloud Computing 5 1.7 Limitations 6 1.8 Usage Scenarios and Applications 7 1.8.1 Uses of Cloud Computing 8 1.8.2 Example Use Applications 8 1.9 Business Models around Cloud 8 1.9.1 Advantages 9 1.9.2 Disadvantages 10 1.10 Cloud Computing Characteristics 11 1.11 Cloud Adoption 12 Summary 13 Review Questions 14 Suggested Readings 14 2. Cloud Models 15 31 U Learn 15 2.1 Introduction 15 2.1.1 What is Cloud Computing? 15 2.1.2 What isn t Cloud Computing? 16 2.2 From Collaborations to Cloud 17 2.2.1 Client/Server Computing: Consolidated Appliances and Storage 17 2.2.2 Peer-to-Peer Computing: Distributing Reserves 17 vii

viii Contents 2.2.3 Distributed Computing: Contributing Additional Computing Power 18 2.2.4 Collaborative Computing: Functioning as a Group 18 2.2.5 Cloud Computing: The Subsequent Stage in Collaboration 18 2.3 Cloud Models 18 2.3.1 Public Cloud 18 2.3.2 Private Cloud 19 2.3.3 Hybrid Cloud 20 2.3.4 Community Cloud 21 2.3.5 Public Cloud versus Private Cloud 21 2.4 Cloud Application Architecture 22 2.4.1 Grid Computing 22 2.4.2 Transactional Computing 23 2.5 Cloud Computing Architecture 24 2.5.1 Front End 24 2.5.2 Back End 24 2.5.3 Advantages of Cloud Computing Architecture 24 2.6 Value of Cloud Computing 25 2.6.1 Choices for an IT Infrastructure 25 2.6.2 Bottom Line 26 2.7 Cloud Infrastructure Models 26 2.8 Cloud Infrastructure Self-Service 27 2.9 Scaling a Cloud Infrastructure 28 2.9.1 Capacity Planning 28 2.9.2 Cloud Scale 29 Summary 30 Review Questions 31 Suggested Readings 31 3. Standards and Security 32 48 U Learn 32 3.1 Introduction 32 3.1.1 Standards for Security 32 3.1.2 Standards for Application Developers 35 3.1.3 Standards for Messaging 36 3.2 Legal and Regulatory Issues 37 3.2.1 Third Parties 38 3.2.2 Data Privacy 39 3.3 Cloud Security Challenges 40 3.4 Cloud Data Security 40 3.4.1 Data-in-Transit 40 3.4.2 Data-at-Rest 40 3.4.3 Data Lineage 41 3.4.4 Data Remanence 41 3.5 Network Security 42 3.6 Host Security 42 3.6.1 Software as a Service and Platform, as well as a Service Host Security 42 3.6.2 Infrastructure as a Service Host Security 43

Contents ix 3.7 Database Management 44 3.7.1 Clustering 44 3.7.2 Replication 44 3.8 Risk Tolerance in Cloud 45 3.8.1 Assessing the Risk 45 3.8.2 Information Assets and Risk 46 3.8.3 Privacy and Confidentiality Concerns 46 Summary 47 Review Questions 47 Suggested Readings 48 4. Cloud Licensing and Major Players 49 68 U Learn 49 4.1 Introduction 49 4.2 Cloud Data Centre 49 4.2.1 Requirements 50 4.2.2 Comparing Traditional and Cloud Data Centres 50 4.3 Moving into the Cloud 50 4.3.1 Comparison of Traditional Computing and Cloud Computing 51 4.3.2 Benefits of Cloud Computing 51 4.4 Issues in Cloud Computing 51 4.4.1 Security Issues 51 4.4.2 Data Issues 52 4.4.3 Performance Issues 52 4.4.4 Energy Related Issues 52 4.4.5 Fault Tolerance 52 4.5 Know Your Software Licenses 53 4.6 Service Levels of Cloud Applications 53 4.6.1 Common Metrics 53 4.6.2 Cloud Computing 54 4.6.3 Service Levels 54 4.7 Major Players in Cloud Computing 54 4.8 Eucalyptus 55 4.8.1 History 56 4.8.2 Release History 56 4.8.3 Overview 56 4.8.4 Goals of Eucalyptus 57 4.8.5 Eucalyptus Architecture 57 4.8.6 Eucalyptus Terminology 57 4.8.7 Eucalyptus Components 58 4.8.8 Mechanism 60 4.8.9 Compatibility of Eucalyptus with Amazon EC2 60 4.8.10 Functionality 61 4.9 Nimbus 61 4.9.1 Goals 61 4.10 OpenNebula 61 4.10.1 Overview 61 4.10.2 History 62 4.10.3 Objectives 62

Cloud Computing 30% OFF Publisher : PHI Learning ISBN : 9788120350731 Author : RAO, M.N. Type the URL : http://www.kopykitab.com/product/7658 Get this ebook