Presented by: Rajdeep Biswas Roll No.: 0104IT071082; Branch: IT
(VII Sem.) R.K.D.F. Institute of Science & Technology Cloud
Computing When Outsourcing Outsmarts Purchasing!
Slide 2
Agenda Defining Cloud Computing Learning about Cloud Computing
examples Studying the deployment layers Briefing the deployment
models Briefing the Cloud characteristics Looking into the security
issues Checking out the inadequacies and advantages Checking the
future of Cloud Computing
Slide 3
Slide 4
What is Cloud? C loud is a metaphor for Internet, based on how
it is depicted in computer network, diagrams, and is an abstraction
for the complex infrastructure it conceals.
Slide 5
What is Cloud Computing? L everaging 3 rd party computing
capability over the network to cut costs, increase scale, improve
agility, and access best practices.. Providing services on virtual
machines allocated on lap of large physical machines, typically
servers. Engineering Perspective Methods to address dynamic
scalability and flexibility for large scale applications. Business
Perspective
Slide 6
Cloud Examples
Slide 7
Layers A computer hardware and/or software that relies on cloud
computing for application delivery, or that delivers cloud
services, and, in either case, is essentially useless without it.
Client Software as a Service (SaaS) delivers software as a service
over the Internet, eliminating the need to install and run the
application on the customers own computer, and simplifying
maintenance and support. Application Platform as a Service (PaaS)
delivers a computing platform and/or a solution stack as a service,
and facilitates deployment of applications without the cost and
complexity of buying and managing the underlying hardware and
software layers. Platform Infrastructure as a Service (IaaS)
delivers computer infrastructure - typically a platform
virtualization environment as a service. Rather than purchasing
servers, software or other equipments, clients instead buy those as
a fully outsourced service. Infrastructure The server layer
constitutes of computer hardware and/or computer software that are
specifically designed to deliver the cloud services, including
multi-core processors, cloud-specific operating systems and
combined offerings. Server
Slide 8
Courtesy: Wikipedia
(http://en.wikipedia.org/wiki/File:Cloud_computing_types.svg) Cloud
Deployment Models
Two Broad Categories of Cloud Security Security issues faced by
cloud providers (organizations providing services via the cloud).
The providers must ensure the security & protection of their
infrastructure and clients data and applications. Security issues
faced by the cloud customers. The customer must ensure that the
provider has taken proper security measures to protect their
information.
Slide 12
Dimensions of Cloud Security Security and Privacy Data
Protection Identity Management Physical and Personal Security
Availability Application Security Privacy Compliance Business
Continuity and Data Recovery Logs and Audit Trails Unique
Compliance Requirements Legal and Contractual Issues Liability
Intellectual Property End-of-Service
Slide 13
The Inadequacies of Cloud ! 1. SLA (Service Level Agreements)
2. Performance 3. Trust Deficit Between Customer and Provider 4.
Security Issues 5. Making False Promises
Slide 14
Still, Why Cloud Computing ? 1. Software as a Subscription (Pay
as you go) 2. Reduced Software Maintenance 3. Increased Reliability
4. Increased Scalability 5. Cost Reduction 6. Environmentally
Friendly 7. Matches Current Computing Trends 8. Portability/
Accessibility 9. Efficient Use of Computer Resources 10.
Versionless Software
Slide 15
The Future A solid majority of technology experts and
stakeholders expect that by 2020, most users will perform most
computing and communicating activities through connections to
servers operated by outside firms. This does not mean, however,
that most of these experts think the desktop computer will
disappear soon. The majority sees a hybrid life in the next decade,
as some computing functions move towards the cloud and others
remain based on personal computers. Courtesy: Janna Quitney
Anderson, Elon University and Lee Rainie, Pew Internet &
American Life Project (June 11, 2010)