Module-1 Cloud Notes
Module-1 Cloud Notes
(21CS643)
Data is stored:
closer to the site where it is used.
in a device and in a location-independent manner.
Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Utility computing. Pay-per-usage
Resources
Accessible via the Internet
Compute & storage servers
Networks Services Elasticity
Applications
The user:
The user is able to deploy and run arbitrary software, which can
include operating systems and applications.
Presentation
API
Applications
connectivity
connectivity
Abstraction
Abstraction
connectivity
Abstraction
Core
Core
Core
Service
Consumer Service Provider Broker
audit Resource r a
abstraction and Provisioning i
control layer c
Privacy t y
impact audit Physical resource
y
layer Arbitrage
Portability/
Hardware Interoperability
Performance
audit
Facility
Carrier
Identity fraud and theft are made possible by the unauthorized access
to personal data in circulation and by new forms of dissemination
through social networks and they could also pose a danger to cloud
computing.
Such events can affect the Internet domain name servers and
prevent access to a cloud or can directly affect the clouds:
in 2004 an attack at Akamai caused a domain name outage and a
major blackout that affected Google, Yahoo, and other sites.
(Akamai, a content delivery network (CDN) provider,
experienced a domain name outage due to a targeted attack.
This outage affected several major websites, including Google
and Yahoo, which relied on Akamai's services to deliver
content efficiently to users.)
An application developer:
Installs applications on a platform of his/her choice.
Manages resources allocated by Amazon.
Cloud front
NAT
Cloud interconnect
Elastic cache
Internet
Cloud formation
Elastic beanstalk
AWS management
console S3 EBS SDB
S3 EBS SDB
Servers running AWS
services S3 SDB
S3
Simple DB
EC2
Linux, Debian,
Fedora,OpenSolaris,
Open Suse, Red Hat, S3
Ubuntu, Windows, Suse
Linux
EBS
SQS -Simple Queue Service
EC2
Autoscaling
Fig shows the AWS services
AWS Management Console
accessible via Management
console
Cloud Computing: Theory and Practice.
Dan C. Marinescu Chapter 3 48
EC2 – Elastic Cloud Computing
EC2 - web service for launching instances of an application under
several operating systems, such as:
Several Linux distributions.
Microsoft Windows Server 2003 and 2008.
OpenSolaris.
FreeBSD.
NetBSD.
A user can
Load an EC2 instance with a custom application environment.
Manage network’s access permissions.
It manages automatically:
The infrastructure provisioning.
Hardware and software maintenance.
Replication and indexing of data items.
Compute Storage
Fabric Controller
Open-Nebula - a private cloud with users actually logging into the head
node to access cloud functions. The system is centralized and its default
configuration uses the NFS file system.
a1 a2 a3 aP
b1 b2 bP b3
c1 cP c2 c3
dP d1 d2 d3
(a)
Cloud 1 Cloud 2
a1
b1 a2
c1 b2
d1
dP c1
cP
d1
Client Proxy
a3
bP
c2
d2
aP
d3
b3
c3 Cloud 3
d3
Cloud 4
(b)
Cloud Computing: Theory and Practice.
Dan C. Marinescu Chapter 3 74
Cloud interoperability; the Intercloud
cloud interoperability is the capacity or extent at which one cloud
service is connected with the other by trading data as per strategy
to get results
An Intercloud a federation of clouds that cooperate to provide a
better user experience.
Cloud interoperability is the ability of applications and services
developed on one platform to be used on another platform.
Is an Intercloud feasible?
Not likely at this time:
There are no standards for either storage or processing.
The clouds are based on different delivery models.
The set of services supported by these delivery models is large
and open; new services are offered every few months.
Security is a major concern for cloud users and an Intercloud could
only create new threats.
100
Typical operating
90 region
Power
80
70
Energy
60
efficiency
50
40
30
20
10
Percentage
0 of system
0 10 20 30 40 50 60 70 80 90 100 utilization
U
S
Operating system Operating system Operating system E
R
S
Hypervisor Hypervisor Hypervisor
E
R
V
Computing service Computing service Computing service I
C
E
Storage service Storage service Storage service
P
R
O
Network Network Network
V
I
D
Local infrastructure Local infrastructure Local infrastructure E
R
Cloud Computing: Theory and Practice.
Dan C. Marinescu Chapter 3 81
User security concerns
Potential loss of control/ownership of data.
Data integration, privacy enforcement, data encryption.
Data remanence after de-provisioning.
Multi tenant data isolation.
Data location requirements within national borders.
Hypervisor security.
Audit data integrity protection.
Verification of subscriber policies through provider controls.
Certification/Accreditation requirements for a given cloud service.