Module 2 - Note
Module 2 - Note
Study Material
(Cloud Computing & PEC-CSD501C)
Table of Contents
Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management.
Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.
1
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
2
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
IaaS, PaaS, and SaaS are the three most prevalent cloud delivery models, and together they have been
widely adopted and formalized. A cloud delivery service model is a specific, preconfigured combination of
IT resources made available by a cloud service provider. But the functionality and degree of
administrative control each of these three delivery types offer cloud users varies.
These abstraction layers can also be considered a tiered architecture, where services from one layer can
be combined with services from another, for example, SaaS can supply infrastructure to create services
from a higher layer. Let us have a look at the layers of cloud computing reference model.
1. SaaS
Software as a Service (SaaS) is a form of application delivery that relieves users of the burden of
software maintenance while making development and testing easier for service providers.
The cloud delivery model's top layer is where applications are located. End customers get access to the
services this tier offers via web portals. Because online software services provide the same functionality
Prepared by Department of CSE Faculty
3
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
as locally installed computer programs, consumers (users) are rapidly switching from them. Today, ILMS
and other application software can be accessed via the web as a service.
In terms of data access, collaboration, editing, storage, and document sharing, SaaS is unquestionably a
crucial service. Email service in a web browser is the most well-known and widely used example of
SaaS, but SaaS applications are becoming more cooperative and advanced.
• The cloud consumer has full control over all the cloud services.
• The provider has full control over software applications-based services.
• The cloud provider has partial control over the implementation of cloud services.
• The consumer has limited control over the implementation of these cloud services.
2. PaaS
Platform as a Service is a strategy that offers a high level of abstraction to make a cloud readily
programmable in addition to infrastructure-oriented clouds that offer basic compute and storage
capabilities (PaaS). Developers can construct and deploy apps on a cloud platform without necessarily
needing to know how many processors or how much memory their applications would use. A PaaS
offering that provides a scalable environment for creating and hosting web applications is Google App
Engine, for instance.
• The cloud provider has entire rights or control over the provision of cloud services to consumers.
• The cloud consumer has selective control based on the resources they need or have opted for on
the application server, database, or middleware.
• Consumers get environments in which they can develop their applications or databases. These
environments are usually very visual and very easy to use.
• Provides options for scalability and security of the user’s resources.
• Services to create workflows and websites.
• Services to connect users’ cloud platforms to other external platforms.
3. IaaS
Infrastructure as a Service (IaaS) offers storage and computer resources that developers and IT
organizations use to deliver custom/business solutions. IaaS delivers computer hardware (servers,
networking technology, storage, and data center space) as a service. It may also include the delivery of
OS and virtualization technology to manage the resources. Here, the more important point is that IaaS
customers rent computing resources instead of buying and installing them in their data centers. The
service is typically
paid for on a usage basis. The service may include dynamic scaling so that if the customers need more
resources than expected, they can get them immediately.
4
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
• The consumer has full/partial control over the infrastructure of the cloud, servers, and databases.
• The consumer has control over the Virtual Machines' implementation and maintenance.
• The consumer has a choice of already installed VM machines with pre-installed Operating
systems.
• The cloud provider has full control over the data centers and the other hardware involved in
them.
• It has the ability to scale resources based on the usage of users.
• It can also copy data worldwide so that data can be accessed from anywhere in the world as
soon as possible.
Types of Clouds
Public cloud: Public clouds deliver resources, such as compute, storage, network, develop-and-deploy
environments, and applications over the internet. They are owned and run by third-party cloud service
providers like Google Cloud.
Private cloud:Private clouds are built, run, and used by a single organization, typically located on-
premises. They provide greater control, customization, and data security but come with similar costs and
resource limitations associated with traditional IT environments.
Hybrid cloud:Environments that mix at least one private computing environment (traditional IT
infrastructure or private cloud, including edge) with one or more public clouds are called hybrid clouds.
They allow you to leverage the resources and services from different computing environments and
choose which is the most optimal for the workloads.
Cloud interoperability and standards are crucial aspects of cloud computing that facilitate seamless
integration and interaction between different cloud services and platforms. Interoperability ensures that
applications and data can move freely across different cloud environments, while standards provide a
common framework for compatibility. Here are key considerations in cloud interoperability and standards:
• Open Standards:
• Open APIs (Application Programming Interfaces): Adopting open APIs enables
interoperability between different cloud services, allowing applications to communicate
and share data across platforms.
• Open Cloud Computing Interface (OCCI): A standardized API for cloud resource
management that enhances interoperability in IaaS (Infrastructure as a Service)
environments.
• Cloud Standards Organizations:
• Cloud Standards Customer Council (CSCC): Develops best practices and standards
for cloud computing with a focus on the needs of cloud customers.
• National Institute of Standards and Technology (NIST): Provides guidelines and
definitions for cloud computing to promote consistency and interoperability.
5
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
• Cloud Data Portability:
• Cloud Data Management Interface (CDMI): A standard for data storage and data
management in the cloud, promoting data portability across different cloud platforms.
• Data Interoperability Standards: Ensure that data can be easily moved and exchanged
between different cloud providers and services.
• Security Standards:
• Security Assertion Markup Language (SAML): A standard for exchanging
authentication and authorization data, promoting single sign-on and secure access across
cloud services.
• Cloud Security Alliance (CSA): Develops best practices and frameworks for security in
cloud computing.
• Service Level Agreements (SLAs):
• Standardized SLA Templates: Using standardized SLA templates helps in defining and
measuring service levels consistently across different cloud providers, enhancing
transparency and accountability.
• Containerization and Orchestration:
• Kubernetes: An open-source container orchestration platform that promotes
portability of applications across different cloud environments.
• Open Container Initiative (OCI): Develops standards for container formats and runtime,
ensuring compatibility across containerization platforms.
• Intercloud Standards:
• Cloud Service Measurement Index (CSMI): A standard for measuring and comparing
cloud services, promoting transparency and ease of comparison.
• Federated Identity Management: Standards that enable users to access resources
seamlessly across multiple clouds without the need for separate authentication.
• Legal and Compliance Standards:
• ISO/IEC 27001: An international standard for information security management systems
that is relevant for cloud service providers.
• GDPR (General Data Protection Regulation): Ensures that cloud services comply with
data protection and privacy regulations.
• Industry-Specific Standards:
• Health Insurance Portability and Accountability Act (HIPAA): Specifies the security
and privacy requirements for healthcare data in the cloud.
• Payment Card Industry Data Security Standard (PCI DSS): Ensures secure handling
of credit card information in the cloud.
• Ecosystem Collaboration:
• Cloud Standards Coordination (CSC): Promotes collaboration and coordination among
various standards development organizations to avoid fragmentation.
Using existing cloud computing technology, data storage space, processing power and networking can
all be escalated. Better still, scaling, usually with little or no interruption or downtime, can be achieved
rapidly and easily. Third-party cloud providers now have the entire infrastructure in place; in the past, the
6
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
process could take weeks or months to scale with on-site physical infrastructure and entail enormous
costs.
• Hardware systems
Hardware systems can be backed up using identical or equivalent systems. For instance, using
an identical server running in parallel, with all operations mirrored to the backup server, a server
can be made fault-tolerant.
• Software systems
Software systems can be backed up using software instances. For example, it is possible to
continuously replicate a database with customer information on another machine and operations
can be mechanically redirected to another database in case a primary database goes down.
• Power sources
Power sources use alternative sources using fault-tolerant. In many instances, organizations
have power generators that can be used in case the electricity fails.
Similarly, using redundancy, any system or component that is a single point of failure can be
made fault-tolerant.
• Security Breach Occurrences
Owing to security failures, there are many explanations about why fault tolerance exists. The
server's hacking adversely affects the server and results in a leak of data. Ransomware,
phishing, virus attack, etc. are other explanations for the need for fault tolerance in the form of
security violations.
Cloud Ecosystem
A complex web of interconnected services, parts, and parties involved in cloud computing is referred to
as a cloud ecosystem. Diverse Elements: The elements that make up a cloud ecosystem are users,
apps, data storage, networking infrastructure, cloud service providers, and development tools. Together,
these parts enable the online delivery of cloud services. Interconnected Services: Platform as a Service
(PaaS), Software as a Service (SaaS), Infrastructure as a Service (IaaS), and other services are all part
of cloud ecosystems. Because of their interconnection, users can access and use data, apps, and
computing resources without requiring a large on-premises infrastructure. Collaborative Environment:
Service providers, developers, and users can work together in cloud ecosystems. Users can access data
and apps from any location, and developers can produce and distribute.
7
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
Cloud Offerings
For users and businesses alike, cloud computing provides a multitude of services and resources. The
following are a few typical cloud computing offerings: IaaS, or infrastructure as a service: Virtualized
computer resources are made available via the internet by IaaS. Pay-as-you-go options are available for
users to rent networking components, storage, and virtual machines. While the cloud provider maintains
control over the underlying infrastructure, users with IaaS retain control over their operating system,
apps, and network configuration. Platform as a Service (PaaS): PaaS offers a platform allowing
developers to build, deploy, and manage applications without dealing with the complexity of underlying
8
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
infrastructure. It provides a framework and environment to develop, test, and run applications. PaaS
offerings often include development tools, database management systems, and application hosting
platforms. Software as a Service (SaaS): SaaS delivers software applications over the internet on a
subscription basis. Users can access these applications through a web browser without the need for
installation or maintenance. Common examples of SaaS applications include email services (e.g.,
Gmail), office productivity suites (e.g., Microsoft 365), and customer relationship management (CRM)
software (e.g., Salesforce). Users can access SaaS applications from any device with an internet
connection.
Cloud Analytics
The term "cloud analytics" describes the processing and analysis of data using cloud computing services
and technologies. It entails analyzing data kept on cloud platforms in order to extract insightful
information, make decisions based on facts, and streamline operations. Scalability and Flexibility: Cloud
analytics makes use of the cloud computing infrastructures' scalability and flexibility. Large amounts of
data can be stored by businesses in the cloud, and because cloud platforms are scalable, they can
easily increase or decrease their computing resources in response to changing analytical requirements.
Real-time Data Analysis: Businesses can analyze data in real-time thanks to cloud analytics.
Organizations can process and analyze data in real-time and make quick decisions based on current
information by utilizing cloud-based tools and technologies. Advanced Analytics and Machine Learning:
Cloud analytics platforms come equipped with machine learning and advanced analytical tools.
Businesses can extract significant patterns and trends from their cloud-stored data by using advanced
algorithms and predictive models. These insights support companies in identifying opportunities,
streamlining processes, and improving client interactions.
9
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
servers, as opposed to operating an operating system and apps locally on a physical computer or
device. Users can use thin clients, desktop computers, laptops, or even mobile devices to access their
virtual desktops remotely. Adaptable User Interface: VDI provides an adaptable user interface. The
virtual desktop of each user can be customized to meet their unique needs and specifications. Based on
user profiles, IT administrators can install apps, assign resources, and change configurations. Improved
Data and Security protection: Data protection and security are improved by VDI. Sensitive data is safe
even in the event that an end-user device is misplaced or stolen because all data and apps are
processed and stored inside of a single data center. Furthermore, VDI enables effective disaster
recovery and backup processes, guaranteeing the security of vital business data.
10