Cloud Computing by Me
Cloud Computing by Me
The term cloud refers to a network or the internet. It is a technology that uses remote
servers on the internet to store, manage, and access data online rather than local
drives. The data can be anything such as files, images, documents, audio, video, and
more.
Once the data is stored in the cloud, it is easier to get back-up and restore that data
using the cloud.
2) Improved collaboration
3) Excellent accessibility
Cloud allows us to quickly and easily access store information anywhere, anytime in
the whole world, using an internet connection. An internet cloud infrastructure
increases organization productivity and efficiency by ensuring that our data is always
accessible.
Cloud computing reduces both hardware and software maintenance costs for
organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.
Cloud computing offers Application Programming Interfaces (APIs) to the users for
access services on the cloud and pays the charges as per the usage of service.
Cloud offers us a huge amount of storing capacity for storing our important data such
as documents, images, audio, video, etc. in one place.
8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers many
advanced features related to security and ensures that data is securely stored and
handled.
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio, video, etc.) is stored on
the cloud, and we access these data through the cloud by using the internet
connection. If you do not have good internet connectivity, you cannot access these
data. However, we have no any other way to access data from the cloud.
2) Vendor lock-in
3) Limited Control
4) Security
Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be aware
that you will be sending all your organization's sensitive information to a third party,
i.e., a cloud computing service provider. While sending the data on the cloud, there
may be a chance that your organization's information is hacked by Hackers.
Essential Characteristics:
1. On-Demand Self-Service
Self-service means that the cloud user can acquire the service
independently: without going through an IT department, call center, or
other middle man. To support self-service:
3. Resource Pooling
Multiple customers share the cloud service resources in a multi-tenancy
model. This model raises privacy and security concerns, so users must
protect their cloud data and assets by taking necessary security
precautions.
The cloud provider uses a bunch of computers together to help many people at the
same time.
4. Rapid Elasticity
Elasticity refers to the flexibility of the cloud service to scale up or down
automatically to meet the user’s needs. That allows the user to access
the right level and kind of resources, including processing power,
memory, network bandwidth, and storage, to accommodate the user’s
varying workloads.
Imagine the cloud can quickly stretch or shrink to handle more or fewer users, like a
rubber band.
5. Measured Service
A measured cloud service provides a metering capability that underpins
the provider’s pay-as-you-go pricing model. This model provides users
with greater transparency and control over their cloud costs.
The cloud keeps track of how much you use, kind of like a utility bill. You pay for
what you use.
Service Models:
1.Infrastructure-as-a-Service (IaaS)
Users can rent the cloud IT infrastructure, such as servers, networking,
and storage, from an IaaS provider on a pay-as-you-go basis, so the
user doesn’t incur the cost of on-premises installation or maintenance.
IaaS cloud computing platform layer eliminates the need for every
organization to maintain the IT infrastructure.
IaaS is offered in three models: public, private, and hybrid cloud. The
private cloud implies that the infrastructure resides at the customer-
premise. In the case of public cloud, it is located at the cloud computing
platform vendor's data center, and the hybrid cloud is a combination of
the two in which the customer selects the best of both public cloud or
private cloud.
Characteristics of IaaS
Characteristics of PaaS
Services Include:
• Development Tools: Frameworks, databases, and middleware.
• Runtime Environment: Execution environment for applications.
• Deployment Tools: Tools for application deployment and scaling.
Software-as-a-Service (SaaS)
In the SaaS model, the cloud provider manages the underlying software
and IT infrastructure. Users access the SaaS offering via a web browser.
Local installation is not required, and organizations don’t have to worry
about managing data centers, IT operations, or maintenance.
Characteristics of SaaS
Public Cloud
Public cloud is open to all to store and access information via the Internet using the
pay-per-usage method.
In public cloud, computing resources are managed and operated by the Cloud Service
Provider (CSP). The CSP looks after the supporting infrastructure and ensures that the
resources are accessible to and scalable for the users.
Due to its open architecture, anyone with an internet connection may use the public
cloud, regardless of location or company size. Users can use the CSP's numerous
services, store their data, and run apps. By using a pay-per-usage strategy, customers
can be assured that they will only be charged for the resources they actually use, which
is a smart financial choice.
Private Cloud
Private cloud is also known as an internal cloud or corporate cloud. It is used by
organizations to build and manage their own data centers internally or by the third
party. It can be deployed using Opensource tools such as Openstack and Eucalyptus.
Hybrid cloud is partially secure because the services which are running on the public
cloud can be accessed by anyone, while the services which are running on a private
cloud can be accessed only by the organization's users. In a hybrid cloud setup,
organizations can leverage the benefits of both public and private clouds to create a
flexible and scalable computing environment. The public cloud portion allows using
cloud services provided by third-party providers, accessible over the Internet.
Example: Google Application Suite (Gmail, Google Apps, and Google Drive), Office
365 (MS Office on the Web and One Drive), Amazon Web Services.
Community Cloud
Community cloud allows systems and services to be accessible by a group of several
organizations to share the information between the organization and a specific
community. It is owned, managed, and operated by one or more organizations in the
community, a third party, or a combination of them.
In a community cloud setup, the participating organizations, which can be from the
same industry, government sector, or any other community, collaborate to establish a
shared cloud infrastructure. This infrastructure allows them to access shared services,
applications, and data relevant to their community.
Popular IDaaS providers include Okta, Microsoft Azure Active Directory, Ping Identity, and Auth0.
Organizations choose IDaaS solutions to simplify identity management, enhance security, and
adapt to the dynamic nature of cloud-based environments.
Implementing Identity as a Service in cloud computing can contribute to a more secure and user-
friendly environment, especially as businesses increasingly rely on cloud-based applications and
services.
It's important to note that specific features and capabilities of CaaS offerings may
vary among providers. Additionally, the regulatory landscape and compliance
requirements may change, so organizations should regularly assess their compliance
strategies and tools.
As technology and compliance needs evolve, CaaS can be a valuable approach for
organizations seeking efficient and effective ways to manage and demonstrate
adherence to regulatory standards. If there have been significant developments in
the field since my last update, I recommend checking more recent sources for the
latest information on Compliance as a Service.
what is cloud platform
A cloud platform refers to a set of computing resources and services delivered
over the internet. Instead of owning and maintaining physical servers and
infrastructure, users can access and use computing resources, such as servers,
storage, databases, networking, analytics, software, and more, on a pay-as-
you-go basis.
2. **Cost-Efficiency:** Users pay only for the resources they consume, avoiding
the upfront costs and complexity associated with owning and maintaining
physical infrastructure.
Major cloud providers include Amazon Web Services (AWS), Microsoft Azure,
Google Cloud Platform (GCP), IBM Cloud, and others. These platforms offer a
wide range of services, catering to different needs, such as computing power,
storage, machine learning, and internet of things (IoT) services. Users can
choose the cloud provider and services that best suit their requirements.
Single Sign-On (SSO):- SSO has single authentication server, managing multiple
accesses to other systems.
1. User logs into the authentication server using a username and password.
5. Authentication server sends the user’s security credentials for that server back to the intranet
server. If an employee leaves the company, then it just required to disable the user at the
authentication server, which in turn disables the user’s access to all the systems.
MODULE----2
Virtualization:-
A technique, which allows to share single physical instance of an application or
resource among multiple organizations or tenants (customers). Creation of a
virtual machine over existing operating system and hardware is known as
Hardware Virtualization. A Virtual machine provides an environment that is
logically separated from the underlying hardware. The machine on which the
virtual machine is going to create is known as Host Machine and that virtual
machine is referred as a Guest Machine.
Advantages:
Advantages of Virtualization:
1. Cost Savings: Use your existing hardware efficiently, saving on hardware, operation,
cooling, and maintenance costs.
2. Efficiency: Run multiple applications on different virtual machines within one
physical
server, reducing IT management tasks and improving resource utilization.
3. Reduced Maintenance: Manage multiple virtual machines through a single console,
freeing
up IT teams for more strategic tasks.
4. Disaster Recovery: Easily replicate and move virtual machines in case of hardware
failure,
and create quick backups for recovery.
5. Scalability and Flexibility: Quickly create or remove virtual machines to adapt to
changing business needs.
6. Better Environmental Impact: Reduced hardware leads to lower energy
consumption, benefiting the environment and your business.
1. Server Virtualization:
• Definition: Involves dividing a physical server into multiple virtual
servers, each running its own operating system (OS) and applications.
• Purpose: Increases server efficiency, reduces hardware costs, and
enables better resource utilization.
2. Desktop Virtualization:
• Definition: Virtualization of desktop environments, allowing multiple
desktop instances to run on a single physical machine or in a data
center.
• Purpose: Simplifies desktop management, enhances security, and
provides flexibility for end-users.
3. Network Virtualization:
• Definition: Abstracts network resources, enabling the creation of
virtual networks on top of physical networks.
• Purpose: Enhances network flexibility, simplifies network management,
and supports the creation of isolated virtual networks.
4. Storage Virtualization:
• Definition: Combines multiple physical storage devices into a single
virtualized storage unit.
• Purpose: Improves storage management, enhances data mobility, and
provides a more efficient use of storage resources.
5. Application Virtualization:
• Definition: Separates the application layer from the underlying OS,
allowing applications to run in isolated environments.
• Purpose: Simplifies application deployment, improves compatibility,
and enhances system security.
Classification of Hypervisor:
There are 2 types of Hypervisors, as detailed below:
Full Virtualization:-
• The VM is installed as a Type 1 Hypervisor
directly onto the hardware.
• All operating systems in full virtualization
communicate directly with the VM hypervisor,
so guest operating systems do not require any
modification.
• Guest operating systems in full virtualization
systems are generally faster than other
virtualization schemes.
Paravirtualization:-
• It requires that the host operating system
provide a virtual machine interface for the guest
operating system and that the guest access
hardware through that host VM.
• An operating system running as a guest on a
paravirtualization system must be ported to
work with the host interface.
Process Level Virtualization:
• Definition: Process level virtualization, also known as application-level
virtualization, involves creating isolated environments for individual
applications or processes to run independently.
• Characteristics:
• Each application or process runs in its own virtual environment, isolated
from other processes.
• The virtualization occurs at the application level, allowing different
applications to run on the same host without interfering with each
other.
Mobility patterns
Certainly! Mobility patterns in the context of virtualization refer to various
ways in which workloads, applications, or data can be moved or
transferred within and between different IT environments. Here are the
mobility patterns you mentioned:
•
• HTTP(S) Load Balancing: Distributes HTTP and HTTPS traffic
among instances.
• TCP/UDP Load Balancing: Distributes TCP and UDP traffic
among instances.
• Internal TCP/UDP Load Balancing: Load balancing for internal
(within a VPC) TCP and UDP traffic.
• Key Features:
• Global Load Balancing: Allows distributing traffic across multiple
regions, directing users to the nearest or most available instance
globally.
• Content-Based Load Balancing: Distributes traffic based on the
content of the requests, optimizing for specific types of applications.
• Cross-Region Load Balancing: Enables load balancing across different
regions for improved global performance.
VMware:
vSphere:
Dark Web:
The Dark Web refers to a part of the internet that is intentionally hidden and
inaccessible through standard web browsers. It operates on encrypted networks and
requires specific tools and software to access. Here are key aspects of the Dark Web:
Characteristics:
1. Anonymity:
• Use of Tor Network: The most common way to access the Dark Web
is through the Tor (The Onion Router) network, which anonymizes users
by bouncing their connection through a series of volunteer-operated
servers.
2. Encrypted Content:
• Encryption Techniques: Dark Web content is often encrypted, making
it challenging to trace the origin and destination of communication.
This contributes to a high level of privacy for users.
3. Non-Indexed by Search Engines:
• Intentional Exclusion: Dark Web content is intentionally excluded
from indexing by traditional search engines like Google. This intentional
obscurity adds an extra layer of secrecy.
Drugs, Weapons, and Stolen Data: The Dark Web is known for hosting marketplaces where illegal
goods and services, such as drugs, weapons, and stolen data, are bought and sold.
Discussion of Hacking Techniques: Cybercriminals often use the Dark Web to discuss and share
hacking techniques, tools, and vulnerabilities.
Secure Communication: Some individuals use the Dark Web for secure communication, particularly
whistleblowers and privacy advocates seeking to protect their identities.
Aggregation:
Examples of Aggregation:
1. Google News:
• Description: Google News aggregates news articles from a wide range
of sources, presenting them in a unified interface.
• Purpose: Enables users to access news content from multiple
publishers without visiting individual websites.
2.Social Media Feeds:
• Description: Social media platforms aggregate posts, images, and updates
from users and pages that a person follows.
• Purpose: Provides a centralized location for users to view content shared by
their network.
Disintermediation:
Examples of Disintermediation:
AdWords
Google AdWords, now known as Google Ads, is an online advertising platform developed
by Google. It allows businesses to create and run advertisements that appear on
Google's search engine results pages (SERPs), websites within the Google Display
Network, and other Google properties. Advertisers bid on specific keywords, and their
ads are displayed to users based on search queries and other criteria.
Key Features:
• Targeted Advertising: Based on keywords, demographics, and user behavior.
• Cost-Per-Click (CPC): Advertisers pay when users click on their ads.
Global Reach:
AdWords enables businesses to reach a global audience and expand their
market reach beyond geographical constraints.
Flexibility:
• Advertisers can adjust budgets, bids, and targeting options in real-time,
providing flexibility and control over ad campaigns
Google Analytics:
Key Features:
1. Traffic Analysis:
•Functionality: Tracks website and app traffic, providing data on the
number of visitors, pageviews, and user interactions.
• Insights: Helps website owners understand where their traffic is
coming from and how users navigate through the site.
2. Conversion Tracking:
• Purpose: Measures the effectiveness of marketing efforts by tracking
specific user actions or conversions, such as completing a purchase or
filling out a form.
• Insights: Enables businesses to evaluate the success of their marketing
campaigns and optimize strategies for higher conversions.
3. Custom Reports:
• Flexibility: Allows users to create customized reports tailored to their
specific business needs.
• Data Exploration: Provides a deeper analysis of data beyond standard
reports, offering insights into specific metrics and dimensions.
Google Translate:
Description:
Description:
Description:
• Google App Engine: A fully managed Platform as a Service (PaaS) offering for
building and deploying applications in the cloud.
• Key Features:
• Automatic Scaling: Scales applications based on demand.
• Managed Services: Includes managed databases and storage.
• Support for Multiple Languages: Supports Java, Python, Go, and
more.
• Serverless Deployment: Developers focus on code, and Google
manages infrastructure.
• Integrated Security Features: Provides security features for
applications.
1. Compute Services:
• Virtual Machines (VMs): On-demand scalable computing resources.
• Azure App Service: Platform for building, deploying, and scaling web
apps.
2. Storage Services:
•Blob Storage: Scalable object storage for unstructured data.
• Table Storage: NoSQL data store for semi-structured data.
• Queue Storage: Messaging store for reliable messaging.
3. Networking:
• Azure Virtual Network: Allows users to create private, isolated
networks in the cloud.
• Azure Load Balancer: Distributes incoming network traffic across
multiple servers.
4. Databases:
• Azure SQL Database: Fully managed relational database service.
• Azure Cosmos DB: Globally distributed, multi-model database for
various data types.
1. Compute Services:
• Amazon EC2 (Elastic Compute Cloud): Provides resizable compute
capacity in the cloud, allowing users to run virtual servers.
• AWS Lambda: A serverless computing service that lets you run code
without provisioning or managing servers.
2. Storage Services:
• Amazon S3 (Simple Storage Service): Offers scalable object storage
for data storage and retrieval.
• Amazon EBS (Elastic Block Store): Provides block-level storage
volumes for use with EC2 instances.
3. Database Services:
Amazon RDS (Relational Database Service): Manages relational
•
databases, supporting multiple database engines like MySQL,
PostgreSQL, Oracle, and SQL Server.
• Amazon DynamoDB: A fully managed NoSQL database service.
4. Networking:
• Amazon VPC (Virtual Private Cloud): Allows users to provision a
logically isolated section of the AWS Cloud where they can launch AWS
resources.
• Amazon Route 53: A scalable domain name system (DNS) web service.
5. Machine Learning and AI:
Amazon EC2 is a core service within Amazon Web Services (AWS), providing resizable compute
capacity in the cloud. Key features include:
1. Virtual Servers (Instances): EC2 allows users to deploy virtual servers, known as
instances, with a variety of instance types catering to different computing needs.
2. Instance Types: Users can choose from diverse instance types, optimized for specific
purposes such as general computing, memory-intensive tasks, or storage-optimized
applications.
3. Amazon Machine Images (AMIs): AMIs are pre-configured templates enabling users to
launch instances quickly. Users can choose from public AMIs or create custom ones.
4. Pricing Models: EC2 operates on a pay-as-you-go model, offering flexibility in pricing.
Options include on-demand instances, reserved instances (with commitments), and spot
instances (bid-based pricing for unused capacity).
5. Scalability and Auto Scaling: EC2 provides scalability through Auto Scaling, allowing
automatic adjustment of instance counts based on demand. This ensures optimal
performance and cost efficiency.
In summary, Amazon EC2 is a versatile cloud computing service offering a range of virtual servers,
instance types, and pricing models, making it a fundamental component for deploying and
managing applications in the cloud.
OR ans
Amazon Elastic Compute Cloud (EC2) is a web service provided by Amazon Web
Services (AWS) that allows users to rent virtual computers, known as instances, on
which they can run their own applications. These instances can be scaled up or down
depending on the computing requirements.
With EC2, users have the flexibility to choose the instance type, operating system,
storage, and networking configuration that best fits their needs. They can also select
from various pricing models, such as On-Demand Instances, Reserved Instances, and
Spot Instances, each offering different cost structures.
EC2 instances can be used for various purposes like hosting websites, running
applications, performing data processing, machine learning, and much more. It
provides a scalable and customizable environment for deploying and managing
applications in the cloud.
SQL Azure
As of my last knowledge update in January 2022, "SQL Azure" generally refers to
Microsoft Azure SQL Database, which is a fully managed relational database service
provided by Microsoft Azure. It is part of the Azure cloud platform and is based on
Microsoft SQL Server.
1. Planning: iuiu
• What it involves: Figuring out what you need from the cloud, like
storing data or running applications.
• Key activities: Setting goals, deciding what to move to the cloud,
and creating a strategy.
• Tools/Processes: Cloud adoption frameworks, strategy documents.
2. Provisioning:
• What it involves: Putting your things (like data and applications)
into the cloud.
• Key activities: Creating virtual spaces for your data and applications,
setting up resources.
• Tools/Processes: Using tools like AWS CloudFormation or Azure
Resource Manager.
5. Scaling:
• What it involves: Adjusting the amount of space or resources your
things use based on how much they need.
• Key activities: Automatically changing resources to match demand
and balancing the workload.
• Tools/Processes: Auto-scaling features provided by cloud platforms,
load balancing.
6. Decommissioning:
• What it involves: Removing things you don't need in the cloud
anymore.
• Key activities: Identifying and retiring old or unnecessary resources.
• Tools/Processes: Cloud resource management tools, automated
scripts for decommissioning.
Cloud Management:-
Auditing System Backups –
It is required to audit the backups from time to time to ensure restoration of randomly
selected files of
different users.
Flow of data in the system –
The managers are responsible for designing a data flow diagram that shows how the data
is supposed
to flow throughout the organization
Vendor Lock-In –
The managers should know how to move their data from a server to another in case the
organization
decides to switch providers.
Knowing provider’s security procedures –
The managers should know the security plans of the provider, especially Multitenant use,
E-commerce
processing, Employee screening and Encryption policy.
The Cloud Security Alliance (CSA) is a non-profit
organization that is dedicated to promoting best practices for securing cloud
computing environments. It was formed in 2008 and has since become a globally
recognized authority on cloud security. The CSA provides a platform for industry
professionals to collaborate and develop guidelines, frameworks, and best practices
to ensure the security of cloud computing.
1. Access Controls: Defining and enforcing access policies to ensure that only
authorized users and systems can interact with cloud resources. This includes
measures such as identity and access management (IAM) and role-based
access control (RBAC).
2. Data Encryption: Employing encryption mechanisms to secure data both in
transit and at rest. This helps safeguard sensitive information from
unauthorized access, interception, or tampering.
3. Network Security: Implementing firewalls, intrusion detection and prevention
systems, and other network security measures to control and monitor traffic
flowing in and out of the cloud environment.
4. Authentication and Authorization: Verifying the identity of users and
devices accessing cloud services, and determining their permissions based on
predefined roles and policies.
5. Monitoring and Logging: Continuously monitoring activities within the cloud
environment and maintaining detailed logs. This facilitates the detection of
security incidents, auditing, and compliance with security policies.
1. Data Security: It ensures that sensitive information stored or transmitted through the
cloud remains confidential and protected from unauthorized access. Encryption converts
data into an unreadable format for anyone without the decryption key.
2. Compliance Requirements: Many industries have strict regulations (like HIPAA, GDPR)
regarding data protection. Encryption helps companies comply with these regulations by
securing sensitive data.
3. Privacy Concerns: Users often have concerns about their data privacy in the cloud.
Encryption assures them that their information is secure, fostering trust between users
and cloud service providers.
4. Data Integrity: Encryption not only protects data from unauthorized access but also
helps maintain data integrity. It ensures that data remains unchanged during storage or
transmission, preventing tampering or unauthorized modifications.
5. Risk Mitigation: In case of a security breach or unauthorized access, encrypted data is
significantly harder for attackers to decipher. This adds an extra layer of protection,
reducing the risk of data breaches.
1. Your Secrets Stay Secret: You follow certain rules (like passwords, locks) to keep your
private things, like photos or documents, safe when you store them with a company
online.
2. Playing by the Laws: Just like there are rules to drive a car, there are rules about how
companies must handle your information online. Companies need to follow these rules to
protect your information.
3. Checking the Safety: It's like regularly checking that your house or your room's door is
locked properly to make sure no one who shouldn’t be there can get in and take your
things.
4. Keeping Promises: Companies promise to keep your stuff safe and follow the rules.
Compliance means they're doing what they said they would to keep your information
safe and private.
5. Getting a Stamp of Approval: Sometimes, companies get a stamp or certificate to show
they're doing a good job of following the rules. It's like a gold star saying, "Hey, they're
doing things the right way!"
Overall, compliance is about making sure everyone's information stays safe, private, and
protected when using cloud services.
Introduction to SOA:-
Disadvantages of SOA:
High overhead: A validation of input
parameters of services is done
whenever services interact this
decreases performance as it
increasesload and response time.
1. Service Description:
• WSDL (Web Services Description Language) or Swagger/OpenAPI for
defining service interfaces.
2. Service Transport:
• HTTP/HTTPS for communication between services.
3. Message Format:
• SOAP or REST or XML for structuring and exchanging messages.
4. Service Discovery and Composition:
• UDDI or WS-Discovery for service discovery.
5. Security:
• WS-Security, OAuth, or JWT for ensuring secure communication.
6. Orchestration:
• BPEL for defining and orchestrating business processes.
•
Event Driven SOA
ChatGPT
ChatGPT
Event-driven Service-Oriented Architecture (SOA) combines the principles of SOA with event-
driven architecture, emphasizing the exchange of events among services. In this setup, services
communicate primarily through events rather than direct request-response interactions. Here's a
brief overview:
1. Integration Hub:
• Acts as a central integration hub where various applications, services,
and systems can connect and communicate regardless of their location
in the cloud or on-premises.
2. Message Routing and Transformation:
• Routes messages between different services or applications within the
cloud environment.
• Performs data transformation to ensure compatibility between different
message formats or protocols.
3. Service Orchestration:
• Orchestrates the flow of data and services across multiple systems in
the cloud.
• Manages complex workflows and business processes by coordinating
interactions between different services.
4. Protocol Translation and Mediation:
• Provides protocol mediation, allowing services using different
communication protocols to interact seamlessly.
• Ensures interoperability between services using diverse protocols or
standards.
5. Security and Governance:
• Enforces security measures such as authentication, authorization, and
encryption for data in transit within the cloud environment.
• Implements governance policies and monitors service interactions for
compliance purposes.
6. Scalability and High Availability:
• Offers scalability to handle increased message traffic and system
demands in the cloud.
• Ensures high availability by distributing services across multiple cloud
instances or regions.
1. Scalability: Cloud storage allows users to scale their storage needs rapidly, either
increasing or decreasing capacity as required without the constraints of physical
hardware limitations.
2. Accessibility: Users can access cloud storage from anywhere with an internet connection,
using various devices such as computers, smartphones, or tablets.
3. Redundancy and Reliability: Cloud storage providers typically offer redundant systems
and data replication across multiple servers or locations, ensuring data availability even in
the event of hardware failures or outages.
4. Cost-Effectiveness: Cloud storage often operates on a pay-as-you-go model, where
users only pay for the storage they use. This model eliminates the need for investing in
and maintaining physical hardware.
5. Security Measures: Robust security features, including encryption, access controls, and
authentication mechanisms, are implemented to protect data stored in the cloud from
unauthorized access or breaches.
6. Data Transfer and Backup: Cloud storage services facilitate easy data transfer and
backup, allowing users to upload, download, and back up their data seamlessly.
7. Integration and Compatibility: Cloud storage can integrate with various applications
and systems, enabling seamless data sharing and collaboration among users and across
different platforms.
1. System Abstraction:
System abstraction refers to the process of hiding complex underlying details of a
system's infrastructure, software, or services to simplify their use or interaction. In cloud
computing, system abstraction enables users to interact with cloud resources without
needing to understand or manage the intricate technical aspects of the underlying
infrastructure.
• Example: Virtualization is a common technique used for system abstraction in
cloud computing. It abstracts physical hardware resources, allowing multiple
virtual machines or instances to run on a single physical server. Users interact with
these virtualized resources without needing to handle the complexities of the
physical hardware.
2. Cloud Bursting:
Cloud bursting is a deployment model that allows organizations to seamlessly scale their
computing resources from a private cloud to a public cloud to handle sudden spikes in
demand. When the workload surpasses the capacity of the private cloud infrastructure,
the excess workload is redirected or "burst" into the public cloud to ensure continued
performance and availability.
• Usage Scenario: For instance, a company might primarily operate its applications
and services in a private cloud. During times of high demand, such as seasonal
peaks or sudden spikes in user activity, the excess workload is automatically
directed to a public cloud provider. This enables the organization to efficiently
handle temporary increases in demand without investing in additional on-
premises infrastructure.
Cloud bursting requires integration between private and public cloud environments,
automated workload management, and careful orchestration to ensure a seamless
transition of resources.
In the context of cloud-based storage, the terms "manned" and "unmanned" are not typically
used to define or differentiate the storage itself. Cloud storage refers to the practice of storing
data on remote servers accessed over the internet rather than on local storage devices.
However, if we were to loosely interpret these terms in relation to managing or overseeing cloud-
based storage:
However, it's essential to note that in the typical context of cloud storage, the terms "manned"
and "unmanned" are not standard descriptors. Instead, the focus is on aspects like accessibility,
security, scalability, reliability, and cost-effectiveness regardless of whether human intervention is
necessary or automated processes manage the storage infrastructure.