Cloud Security-Unit 1 Detailed Notes
Cloud Security-Unit 1 Detailed Notes
o Analysis of data
1
CLOUD SECURITY (UNIT-1)
Distributed Systems
Distributed System is a composition of multiple independent systems but all of them are depicted
as a single entity to the users. The purpose of distributed systems is to share resources and also
2
CLOUD SECURITY (UNIT-1)
use them effectively and efficiently. Distributed systems possess characteristics such as
scalability, concurrency, continuous availability, heterogeneity, and independence in failures. But
the main problem with this system was that all the systems were required to be present at the
same geographical location. Thus to solve this problem, distributed computing led to three more
types of computing and they were-Mainframe computing, cluster computing, and grid
computing.
Mainframe Computing
Mainframes which first came into existence in 1951 are highly powerful and reliable computing
machines. These are responsible for handling large data such as massive input-output operations.
Even today these are used for bulk processing tasks such as online transactions etc. These
systems have almost no downtime with high fault tolerance. After distributed computing, these
increased the processing capabilities of the system. But these were very expensive. To reduce
this cost, cluster computing came as an alternative to mainframe technology.
Cluster Computing
In 1980s, cluster computing came as an alternative to mainframe computing. Each machine in
the cluster was connected to each other by a network with high bandwidth. These were way
cheaper than those mainframe systems. These were equally capable of high computations. Also,
new nodes could easily be added to the cluster if it was required. Thus, the problem of the cost
was solved to some extent but the problem related to geographical restrictions still pertained. To
solve this, the concept of grid computing was introduced.
Grid Computing
In 1990s, the concept of grid computing was introduced. It means that different systems were
placed at entirely different geographical locations and these all were connected via the internet.
These systems belonged to different organizations and thus the grid consisted of heterogeneous
nodes. Although it solved some problems but new problems emerged as the distance between the
nodes increased. The main problem which was encountered was the low availability of high
bandwidth connectivity and with it other network associated issues. Thus. cloud computing is
often referred to as “Successor of grid computing”.
Virtualization
Virtualization was introduced nearly 40 years back. It refers to the process of creating a virtual
layer over the hardware which allows the user to run multiple instances simultaneously on the
hardware. It is a key technology used in cloud computing. It is the base on which major cloud
computing services such as Amazon EC2, VMware vCloud, etc work on. Hardware virtualization
is still one of the most common types of virtualization.
Web 2.0
3
CLOUD SECURITY (UNIT-1)
Web 2.0 is the interface through which the cloud computing services interact with the clients. It
is because of Web 2.0 that we have interactive and dynamic web pages. It also increases
flexibility among web pages. Popular examples of web 2.0 include Google Maps, Facebook,
Twitter, etc. Needless to say, social media is possible because of this technology only. It gained
major popularity in 2004.
Service Orientation
A service orientation acts as a reference model for cloud computing. It supports low-cost,
flexible, and evolvable applications. Two important concepts were introduced in this computing
model. These were Quality of Service (QoS) which also includes the SLA (Service Level
Agreement) and Software as a Service (SaaS).
Utility Computing
Utility Computing is a computing model that defines service provisioning techniques for services
such as compute services along with other major services such as storage, infrastructure, etc
which are provisioned on a pay-per-use basis.
There are many characteristics of Cloud Computing here are few of them :
1. On-demand self-services: The Cloud computing services does not require any human
administrators, user themselves are able to provision, monitor and manage computing
resources as needed.
2. Broad network access: The Computing services are generally provided over standard
networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT resources that are able to scale
out and in quickly and on a need basis. Whenever the user require services it is provided
to him and it is scale out as soon as its requirement gets over.
4. Resource pooling: The IT resource (e.g., networks, servers, storage, applications, and
services) present are shared across multiple applications and occupant in an uncommitted
manner. Multiple clients are provided service from a same physical resource.
5. Measured service: The resource utilization is tracked for each application and occupant,
it will provide both the user and the resource provider with an account of what has been
4
CLOUD SECURITY (UNIT-1)
used. This is done for various reasons like monitoring billing and effective use of
resource.
6. Multi-tenancy: Cloud computing providers can support multiple tenants (users or
organizations) on a single set of shared resources.
7. Virtualization: Cloud computing providers use virtualization technology to abstract
underlying hardware resources and present them as logical resources to users.
8. Resilient computing: Cloud computing services are typically designed with redundancy
and fault tolerance in mind, which ensures high availability and reliability.
9. Flexible pricing models: Cloud providers offer a variety of pricing models, including
pay-per-use, subscription-based, and spot pricing, allowing users to choose the option
that best suits their needs.
10. Security: Cloud providers invest heavily in security measures to protect their users’ data
and ensure the privacy of sensitive information.
11. Automation: Cloud computing services are often highly automated, allowing users to
deploy and manage resources with minimal manual intervention.
12. Sustainability: Cloud providers are increasingly focused on sustainable practices, such
as energy-efficient data centers and the use of renewable energy sources, to reduce their
environmental impact.
5
CLOUD SECURITY (UNIT-1)
6
CLOUD SECURITY (UNIT-1)
Public Cloud
Advantages of the Public Cloud Model
Minimal Investment: Because it is a pay-per-use service, there is no substantial upfront
fee, making it excellent for enterprises that require immediate access to resources.
No setup cost: The entire infrastructure is fully subsidized by the cloud service
providers, thus there is no need to set up any hardware.
Infrastructure Management is not required: Using the public cloud does not
necessitate infrastructure management.
No maintenance: The maintenance work is done by the service provider (not users).
Dynamic Scalability: To fulfill your company’s needs, on-demand resources are
accessible.
Disadvantages of the Public Cloud Model
Less secure: Public cloud is less secure as resources are public so there is no guarantee
of high-level security.
Low customization: It is accessed by many public so it can’t be customized according to
personal requirements.
Private Cloud
The private cloud deployment model is the exact opposite of the public cloud deployment model.
It’s a one-on-one environment for a single user (customer). There is no need to share your
hardware with anyone else. The distinction between private and public clouds is in how you
handle all of the hardware. It is also called the “internal cloud” & it refers to the ability to access
systems and services within a given border or organization. The cloud platform is implemented
in a cloud-based secure environment that is protected by powerful firewalls and under the
7
CLOUD SECURITY (UNIT-1)
Private Cloud
Advantages of the Private Cloud Model
Better Control: You are the sole owner of the property. You gain complete command
over service integration, IT operations, policies, and user behavior.
Data Security and Privacy: It’s suitable for storing corporate information to which only
authorized staff have access. By segmenting resources within the same infrastructure,
improved access and security can be achieved.
Supports Legacy Systems: This approach is designed to work with legacy systems that
are unable to access the public cloud.
Customization: Unlike a public cloud deployment, a private cloud allows a company to
tailor its solution to meet its specific needs.
Disadvantages of the Private Cloud Model
Less scalable: Private clouds are scaled within a certain range as there is less number of
clients.
Costly: Private clouds are more costly as they provide personalized facilities.
8
CLOUD SECURITY (UNIT-1)
Hybrid Cloud
By bridging the public and private worlds with a layer of proprietary software, hybrid cloud
computing gives the best of both worlds. With a hybrid solution, you may host the app in a safe
environment while taking advantage of the public cloud’s cost savings. Organizations can move
data and applications between different clouds using a combination of two or more cloud
deployment methods, depending on their needs.
Hybrid Cloud
Advantages of the Hybrid Cloud Model
Flexibility and control: Businesses with more flexibility can design personalized
solutions that meet their particular needs.
Cost: Because public clouds provide scalability, you’ll only be responsible for paying for
the extra capacity if you require it.
Security: Because data is properly separated, the chances of data theft by attackers are
considerably reduced.
Disadvantages of the Hybrid Cloud Model
Difficult to manage: Hybrid clouds are difficult to manage as it is a combination of both
public and private cloud. So, it is complex.
Slow data transmission: Data transmission in the hybrid cloud takes place through the
public cloud so latency occurs.
9
CLOUD SECURITY (UNIT-1)
Community Cloud
It allows systems and services to be accessible by a group of organizations. It is a distributed
system that is created by integrating the services of different clouds to address the specific needs
of a community, industry, or business. The infrastructure of the community could be shared
between the organization which has shared concerns or tasks. It is generally managed by a third
party or by the combination of one or more organizations in the community.
Community Cloud
Advantages of the Community Cloud Model
Cost Effective: It is cost-effective because the cloud is shared by multiple organizations
or communities.
Security: Community cloud provides better security.
Shared resources: It allows you to share resources, infrastructure, etc. with multiple
organizations.
Collaboration and data sharing: It is suitable for both collaboration and data sharing.
Disadvantages of the Community Cloud Model
Limited Scalability: Community cloud is relatively less scalable as many organizations
share the same resources according to their collaborative interests.
Rigid in customization: As the data and resources are shared among different
organizations according to their mutual interests if an organization wants some changes
according to their needs they cannot do so because it will have an impact on other
organizations.
10
CLOUD SECURITY (UNIT-1)
Multi-Cloud
We’re talking about employing multiple cloud providers at the same time under this paradigm, as
the name implies. It’s similar to the hybrid cloud deployment approach, which combines public
and private cloud resources. Instead of merging private and public clouds, multi-cloud uses many
public clouds. Although public cloud providers provide numerous tools to improve the reliability
of their services, mishaps still occur. It’s quite rare that two distinct clouds would have an
incident at the same moment. As a result, multi-cloud deployment improves the high availability
of your services even more.
11
CLOUD SECURITY (UNIT-1)
Compliance: Compliance tells about the laws and regulations which impact the
implementation of the model.
Privacy: Privacy tells about what data you gather for the model.
Each model has some advantages and some disadvantages, and the selection of the best is only
done on the basis of your requirement. If your requirement changes, you can switch to any other
model.
Overall Analysis of Cloud Deployment Models
The overall Analysis of these models with respect to different factors is described below.
Community
Factors Public Cloud Private Cloud Cloud Hybrid Cloud
Scalability
and High High Fixed High
Flexibility
Between public
Cost- Distributed cost
Cost-Effective Costly and private
Comparison among members
cloud
12
CLOUD SECURITY (UNIT-1)
Cloud Computing can be defined as the practice of using a network of remote servers hosted on
the Internet to store, manage, and process data, rather than a local server or a personal computer.
Companies offering such kinds of cloud computing services are called cloud providers and
typically charge for cloud computing services based on usage. Grids and clusters are the
foundations for cloud computing.
Software as a Service(SaaS)
Software-as-a-Service (SaaS) is a way of delivering services and applications over the Internet.
Instead of installing and maintaining software, we simply access it via the Internet, freeing
ourselves from the complex software and hardware management. It removes the need to install
and run applications on our own computers or in the data centers eliminating the expenses of
hardware as well as software maintenance.
SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a
cloud service provider. Most SaaS applications can be run directly from a web browser without
any downloads or installations required. The SaaS applications are sometimes called Web-based
software, on-demand software, or hosted software.
Advantages of SaaS
1. Cost-Effective: Pay only for what you use.
2. Reduced time: Users can run most SaaS apps directly from their web browser without
needing to download and install any software. This reduces the time spent in installation
and configuration and can reduce the issues that can get in the way of the software
deployment.
13
CLOUD SECURITY (UNIT-1)
Disadvantages of Saas :
1. Limited customization: SaaS solutions are typically not as customizable as on-premises
software, meaning that users may have to work within the constraints of the SaaS
provider’s platform and may not be able to tailor the software to their specific needs.
2. Dependence on internet connectivity: SaaS solutions are typically cloud-based, which
means that they require a stable internet connection to function properly. This can be
problematic for users in areas with poor connectivity or for those who need to access the
software in offline environments.
3. Security concerns: SaaS providers are responsible for maintaining the security of the
data stored on their servers, but there is still a risk of data breaches or other security
incidents.
4. Limited control over data: SaaS providers may have access to a user’s data, which can
be a concern for organizations that need to maintain strict control over their data for
regulatory or other reasons.
Platform as a Service
PaaS is a category of cloud computing that provides a platform and environment to allow
developers to build applications and services over the internet. PaaS services are hosted in the
cloud and accessed by users simply via their web browser.
A PaaS provider hosts the hardware and software on its own infrastructure. As a result, PaaS
frees users from having to install in-house hardware and software to develop or run a new
application. Thus, the development and deployment of the application take place independent of
the hardware.
The consumer does not manage or control the underlying cloud infrastructure including network,
servers, operating systems, or storage, but has control over the deployed applications and
possibly configuration settings for the application-hosting environment. To make it simple, take
the example of an annual day function, you will have two options either to create a venue or to
rent a venue but the function is the same.
Advantages of PaaS:
14
CLOUD SECURITY (UNIT-1)
1. Simple and convenient for users: It provides much of the infrastructure and other IT
services, which users can access anywhere via a web browser.
2. Cost-Effective: It charges for the services provided on a per-use basis thus eliminating
the expenses one may have for on-premises hardware and software.
3. Efficiently managing the lifecycle: It is designed to support the complete web
application lifecycle: building, testing, deploying, managing, and updating.
4. Efficiency: It allows for higher-level programming with reduced complexity thus, the
overall development of the application can be more effective.
The various companies providing Platform as a service are Amazon Web services Elastic
Beanstalk, Salesforce, Windows Azure, Google App Engine, cloud Bees and IBM smart cloud.
Disadvantages of Paas:
1. Limited control over infrastructure: PaaS providers typically manage the underlying
infrastructure and take care of maintenance and updates, but this can also mean that users
have less control over the environment and may not be able to make certain
customizations.
2. Dependence on the provider: Users are dependent on the PaaS provider for the
availability, scalability, and reliability of the platform, which can be a risk if the provider
experiences outages or other issues.
3. Limited flexibility: PaaS solutions may not be able to accommodate certain types of
workloads or applications, which can limit the value of the solution for certain
organizations.
Infrastructure as a Service
Infrastructure as a service (IaaS) is a service model that delivers computer infrastructure on an
outsourced basis to support various operations. Typically IaaS is a service where infrastructure is
provided as outsourcing to enterprises such as networking equipment, devices, database, and web
servers.
It is also known as Hardware as a Service (HaaS). IaaS customers pay on a per-user basis,
typically by the hour, week, or month. Some providers also charge customers based on the
amount of virtual machine space they use.
It simply provides the underlying operating systems, security, networking, and servers for
developing such applications, and services, and deploying development tools, databases, etc.
15
CLOUD SECURITY (UNIT-1)
Advantages of IaaS:
1. Cost-Effective: Eliminates capital expense and reduces ongoing cost and IaaS customers
pay on a per-user basis, typically by the hour, week, or month.
2. Website hosting: Running websites using IaaS can be less expensive than traditional web
hosting.
3. Security: The IaaS Cloud Provider may provide better security than your existing
software.
4. Maintenance: There is no need to manage the underlying data center or the introduction
of new releases of the development or underlying software. This is all handled by the
IaaS Cloud Provider.
The various companies providing Infrastructure as a service are Amazon web services,
Bluestack, IBM, Openstack, Rackspace, and Vmware.
Disadvantages of laaS :
1. Limited control over infrastructure: IaaS providers typically manage the underlying
infrastructure and take care of maintenance and updates, but this can also mean that users
have less control over the environment and may not be able to make certain
customizations.
2. Security concerns: Users are responsible for securing their own data and applications,
which can be a significant undertaking.
3. Limited access: Cloud computing may not be accessible in certain regions and countries
due to legal policies.
Anything as a Service
It is also known as Everything as a Service. Most of the cloud service providers nowadays offer
anything as a service that is a compilation of all of the above services including some additional
services.
Advantages of XaaS:
1. Scalability: XaaS solutions can be easily scaled up or down to meet the changing needs
of an organization.
2. Flexibility: XaaS solutions can be used to provide a wide range of services, such as
storage, databases, networking, and software, which can be customized to meet the
specific needs of an organization.
16
CLOUD SECURITY (UNIT-1)
Function as a Service
FaaS is a type of cloud computing service. It provides a platform for its users or customers to
develop, compute, run and deploy the code or entire application as functions. It allows the user to
entirely develop the code and update it at any time without worrying about the maintenance of
the underlying infrastructure. The developed code can be executed with response to the specific
event. It is also as same as PaaS.
FaaS is an event-driven execution model. It is implemented in the serverless container. When the
application is developed completely, the user will now trigger the event to execute the code.
Now, the triggered event makes response and activates the servers to execute it. The servers are
nothing but the Linux servers or any other servers which is managed by the vendor completely.
Customer does not have clue about any servers which is why they do not need to maintain the
server hence it is serverless architecture.
Both PaaS and FaaS are providing the same functionality but there is still some differentiation in
terms of Scalability and Cost.
FaaS, provides auto-scaling up and scaling down depending upon the demand. PaaS also
provides scalability but here users have to configure the scaling parameter depending upon the
demand.
In FaaS, users only have to pay for the number of execution time happened. In PaaS, users have
to pay for the amount based on pay-as-you-go price regardless of how much or less they use.
Advantages of FaaS
Highly Scalable: Auto scaling is done by the provider depending upon the demand.
Cost-Effective: Pay only for the number of events executed.
17
CLOUD SECURITY (UNIT-1)
Code Simplification: FaaS allows the users to upload the entire application all at once. It
allows you to write code for independent functions or similar to those functions.
Maintenance of code is enough and no need to worry about the servers.
Functions can be written in any programming language.
Less control over the system.
The various companies providing Function as a Service are Amazon Web Services – Firecracker,
Google – Kubernetes, Oracle – Fn, Apache OpenWhisk – IBM, OpenFaaS,
Disadvantages of FaaS
1. Cold start latency: Since FaaS functions are event-triggered, the first request to a new
function may experience increased latency as the function container is created and
initialized.
2. Limited control over infrastructure: FaaS providers typically manage the underlying
infrastructure and take care of maintenance and updates, but this can also mean that users
have less control over the environment and may not be able to make certain
customizations.
3. Security concerns: Users are responsible for securing their own data and applications,
which can be a significant undertaking.
4. Limited scalability: FaaS functions may not be able to handle high traffic or large
number of requests.
18
CLOUD SECURITY (UNIT-1)
Cost-effective Maintenance:
Organizations using cloud computing can save money on both hardware and software upkeep.
Because cloud service providers manage the maintenance and updates, businesses no longer need
to make costly infrastructure investments or set aside resources for continuous maintenance.
Upkeep and Updates:
19
CLOUD SECURITY (UNIT-1)
Cloud service providers take care of infrastructure upkeep, security patches, and updates, freeing
organizations from having to handle these duties themselves.
This frees up IT teams' time and resources to work on higher-value projects like application
development, data analysis, or strategic initiatives rather than wasting them on rote upkeep and
updates.
Mobility:
Cloud computing makes it simple for mobile devices to access data. Utilizing smartphones and
tablets, users can easily access and control their cloud-based applications and data, increasing
their mobility and productivity.
Pay-per-use Model:
Cloud computing uses a pay-per-use business model that enables companies to only pay for the
services they really utilize. This method is affordable, eliminates the need for up-front
investments, and offers budget management flexibility for IT.
Scalable Storage Capacity:
Businesses can virtually store and manage a limitless amount of data in the cloud. The cloud
offers a scalable and centralized storage option for all types of data, including documents,
photos, audio, video, and other kinds of files.
Enhanced Data Security:
Cloud computing places a high focus on data security. To guarantee that data is handled and
stored safely, cloud service providers offer cutting-edge security features like encryption, access
limits, and regular security audits. Businesses can rest easy knowing that their important data is
secure.
Disaster Recovery and Business Continuity:
Cloud computing provides reliable options for these two issues. Businesses can quickly bounce
back from any unforeseen disasters or disruptions thanks to data redundancy, backup systems,
and geographically dispersed data centers.
Agility and Innovation:
Businesses can continue to be innovative and nimble thanks to cloud computing. Organizations
may quickly embrace new solutions, test out emerging trends, and promote corporate growth
with access to a variety of cloud-based tools, services, and technology.
Green Computing:
By maximizing the use of computer resources, lowering energy use, and minimizing e-waste,
cloud computing may support environmental sustainability.
20
CLOUD SECURITY (UNIT-1)
By utilizing technologies like virtualization and load balancing to maximize the use of computer
resources, cloud providers can operate large-scale data centers built for energy efficiency,
resulting in lower energy usage and a smaller carbon footprint.
These benefits of cloud computing give companies the ability to use cutting-edge technology
offered by cloud service providers while maximizing productivity, cost savings, scalability, and
data security. They also enable them to concentrate on their core capabilities.
Disadvantages of Cloud Computing
When we talk about the "disadvantages of cloud computing," we're talking about any potential
drawbacks or difficulties that businesses might have when utilizing cloud computing services.
These drawbacks draw attention to some restrictions or risks related to cloud computing that
businesses should take into account before making a choice.
Some of the Disadvantages of Cloud Computing are as follows:
o Vendor Reliability and Downtime:
A dependable and fast internet connection is essential for cloud computing. Business operations
may be delayed or interrupted if there are connectivity problems or interruptions in the internet
service that affect access to cloud services and data.
o Limited Control and Customization:
Using standardized services and platforms offered by the cloud service provider is a common
part of cloud computing. As a result, organizations may have less ability to customize and control
their infrastructure, applications, and security measures. It may be difficult for some
organizations to modify cloud services to precisely match their needs if they have special
requirements or compliance requirements.
o Data Security and Concerns about Privacy:
Concerns about data security and privacy arise when sensitive data is stored on the cloud.
Businesses must have faith in the cloud service provider's security procedures, data encryption,
access controls, and regulatory compliance. Unauthorized access to data or data breaches can
have serious repercussions, including financial loss, reputational harm, and legal obligations.
21
CLOUD SECURITY (UNIT-1)
Although pay-as-you-go models and lower upfront costs make cloud computing more affordable,
businesses should be wary of hidden charges. Data transfer fees, additional storage costs, fees for
specialized support or technical assistance, and expenses related to regulatory compliance are a
few examples.
o Dependency on Service Provider:
When data is stored in the cloud, it frequently sits in numerous data centers around the globe that
may be governed by multiple legal systems and data protection laws. This may pose compliance
issues, especially if some sectors of the economy or nations have stringent data sovereignty laws.
Organizations should carry out a comprehensive risk assessment, thoroughly examine the
dependability and security procedures of possible cloud service providers, and build backup and
disaster recovery strategies to counteract these drawbacks.
22
CLOUD SECURITY (UNIT-1)
23
CLOUD SECURITY (UNIT-1)
3. Service: Service in backend refers to the major three types of cloud based services
like SaaS, PaaS and IaaS. Also manages which type of service the user accesses.
4. Runtime Cloud: Runtime cloud in backend provides the execution and Runtime
platform/environment to the Virtual machine.
5. Storage: Storage in backend provides flexible and scalable storage service and
management of stored data.
6. Infrastructure: Cloud Infrastructure in backend refers to the hardware and software
components of cloud like it includes servers, storage, network devices, virtualization
software etc.
7. Management: Management in backend refers to management of backend components
like application, service, runtime cloud, storage, infrastructure, and other security
mechanisms etc.
8. Security: Security in backend refers to implementation of different security mechanisms
in the backend for secure cloud resources, systems, files, and infrastructure to end-users.
9. Internet: Internet connection acts as the medium or a bridge between frontend and
backend and establishes the interaction and communication between frontend and
backend.
10. Database: Database in backend refers to provide database for storing structured data,
such as SQL and NOSQL databases. Example of Databases services include Amazon
RDS, Microsoft Azure SQL database and Google CLoud SQL.
11. Networking: Networking in backend services that provide networking infrastructure for
application in the cloud, such as load balancing, DNS and virtual private networks.
12. Analytics: Analytics in backend service that provides analytics capabilities for data in the
cloud, such as warehousing, business intelligence and machine learning.
24
CLOUD SECURITY (UNIT-1)
Virtualization
Host Machine: The machine on which the virtual machine is going to be built is known as
Host Machine.
Guest Machine: The virtual machine is referred to as a Guest Machine.
25
CLOUD SECURITY (UNIT-1)
26
CLOUD SECURITY (UNIT-1)
Types of Virtualization
1. Application Virtualization: Application virtualization helps a user to have remote access to
an application from a server. The server stores all personal information and other characteristics
of the application but can still run on a local workstation through the internet. An example of this
would be a user who needs to run two different versions of the same software. Technologies that
use application virtualization are hosted applications and packaged applications.
2. Network Virtualization: The ability to run multiple virtual networks with each having a
separate control and data plan. It co-exists together on top of one physical network. It can be
managed by individual parties that are potentially confidential to each other. Network
virtualization provides a facility to create and provision virtual networks, logical switches,
routers, firewalls, load balancers, Virtual Private Networks (VPN), and workload security within
days or even weeks.
27
CLOUD SECURITY (UNIT-1)
Network Virtualization
3. Desktop Virtualization: Desktop virtualization allows the users’ OS to be remotely stored on
a server in the data center. It allows the user to access their desktop virtually, from any location
by a different machine. Users who want specific operating systems other than Windows Server
will need to have a virtual desktop. The main benefits of desktop virtualization are user mobility,
portability, and easy management of software installation, updates, and patches.
4. Storage Virtualization: Storage virtualization is an array of servers that are managed by a
virtual storage system. The servers aren’t aware of exactly where their data is stored and instead
function more like worker bees in a hive. It makes managing storage from multiple sources be
managed and utilized as a single repository. storage virtualization software maintains smooth
operations, consistent performance, and a continuous suite of advanced functions despite
changes, breaks down, and differences in the underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the masking of server
resources takes place. Here, the central server (physical server) is divided into multiple different
virtual servers by changing the identity number, and processors. So, each system can operate its
operating systems in an isolated manner. Where each sub-server knows the identity of the central
server. It causes an increase in performance and reduces the operating cost by the deployment of
main server resources into a sub-server resource. It’s beneficial in virtual migration, reducing
energy consumption, reducing infrastructural costs, etc.
28
CLOUD SECURITY (UNIT-1)
Server Virtualization
6. Data Virtualization: This is the kind of virtualization in which the data is collected from
various sources and managed at a single place without knowing more about the technical
information like how data is collected, stored & formatted then arranged that data logically so
that its virtual view can be accessed by its interested people and stakeholders, and users through
the various cloud services remotely. Many big giant companies are providing their services like
Oracle, IBM, At scale, Cdata, etc.
Uses of Virtualization
Data-integration
Business-integration
Service-oriented architecture data-services
Searching organizational data
29
CLOUD SECURITY (UNIT-1)
Service-based SLA
Multilevel SLA
Few Service Level Agreements are enforceable as contracts, but mostly are agreements or
contracts which are more along the lines of an Operating Level Agreement (OLA) and may not
have the restriction of law. It is fine to have an attorney review the documents before making a
major agreement to the cloud service provider. Service Level Agreements usually specify some
parameters which are mentioned below:
1. Availability of the Service (uptime)
2. Latency or the response time
3. Service components reliability
4. Each party accountability
5. Warranties
In any case, if a cloud service provider fails to meet the stated targets of minimums then the
provider has to pay the penalty to the cloud service consumer as per the agreement. So, Service
Level Agreements are like insurance policies in which the corporation has to pay as per the
agreements if any casualty occurs. Microsoft publishes the Service Level Agreements linked
with the Windows Azure Platform components, which is demonstrative of industry practice for
cloud service vendors. Each individual component has its own Service Level Agreements. Below
are two major Service Level Agreements (SLA) described:
1. Windows Azure SLA – Window Azure has different SLA’s for compute and storage. For
compute, there is a guarantee that when a client deploys two or more role instances in
separate fault and upgrade domains, client’s internet facing roles will have external
connectivity minimum 99.95% of the time. Moreover, all of the role instances of the
client are monitored and there is guarantee of detection 99.9% of the time when a role
instance’s process is not runs and initiates properly.
2. SQL Azure SLA – SQL Azure clients will have connectivity between the database and
internet gateway of SQL Azure. SQL Azure will handle a “Monthly Availability” of
99.9% within a month. Monthly Availability Proportion for a particular tenant database is
the ratio of the time the database was available to customers to the total time in a month.
Time is measured in some intervals of minutes in a 30-day monthly cycle. Availability is
always remunerated for a complete month. A portion of time is marked as unavailable if
the customer’s attempts to connect to a database are denied by the SQL Azure gateway.
Service Level Agreements are based on the usage model. Frequently, cloud providers charge
their pay-as-per-use resources at a premium and deploy standards Service Level Agreements
only for that purpose. Clients can also subscribe at different levels that guarantees access to a
30
CLOUD SECURITY (UNIT-1)
particular amount of purchased resources. The Service Level Agreements (SLAs) attached to a
subscription many times offer various terms and conditions. If client requires access to a
particular level of resources, then the client need to subscribe to a service. A usage model may
not deliver that level of access under peak load condition.
SLA Lifecycle
31
CLOUD SECURITY (UNIT-1)
This can be done through mutual agreement or through the enforcement of penalties for
non-compliance.
6. Enforce penalties for SLA Violation: If the service provider is found to be in violation
of the SLA, penalties can be imposed as outlined in the agreement. These penalties can
include financial penalties, reduced service level objectives, or termination of the
agreement.
Advantages of SLA
1. Improved communication: A better framework for communication between the service
provider and the client is established through SLAs, which explicitly outline the degree of
service that a customer may anticipate. This can make sure that everyone is talking about
the same things when it comes to service expectations.
2. Increased accountability: SLAs give customers a way to hold service providers
accountable if their services fall short of the agreed-upon standard. They also hold service
providers responsible for delivering a specific level of service.
3. Better alignment with business goals: SLAs make sure that the service being given is in
line with the goals of the client by laying down the performance goals and service level
requirements that the service provider must satisfy.
4. Reduced downtime: SLAs can help to limit the effects of service disruptions by creating
explicit protocols for issue management and resolution.
5. Better cost management: By specifying the level of service that the customer can
anticipate and providing a way to track and evaluate performance, SLAs can help to limit
costs. Making sure the consumer is getting the best value for their money can be made
easier by doing this.
Disadvantages of SLA
1. Complexity: SLAs can be complex to create and maintain, and may require significant
resources to implement and enforce.
2. Rigidity: SLAs can be rigid and may not be flexible enough to accommodate changing
business needs or service requirements.
3. Limited service options: SLAs can limit the service options available to the customer, as
the service provider may only be able to offer the specific services outlined in the
agreement.
4. Misaligned incentives: SLAs may misalign incentives between the service provider and
the customer, as the provider may focus on meeting the agreed-upon service levels rather
than on providing the best service possible.
32
CLOUD SECURITY (UNIT-1)
5. Limited liability: SLAs are not legal binding contracts and often limited the liability of
the service provider in case of service failure.
33
CLOUD SECURITY (UNIT-1)
challenge as it requires high-quality tools for data analytics. Cloud computing provides
the biggest facility to organizations in terms of storing and analyzing big data.
4. Testing and development : Setting up the platform for development and finally
performing different types of testing to check the readiness of the product before delivery
requires different types of IT resources and infrastructure. But Cloud computing provides
the easiest approach for development as well as testing even if deployment by using their
IT resources with minimal expenses. Organizations find it more helpful as they got
scalable and flexible cloud services for product development, testing, and deployment.
5. Anti-Virus Applications : Previously, organizations were installing antivirus software
within their system even if we will see we personally also keep antivirus software in our
system for safety from outside cyber threats. But nowadays cloud computing provides
cloud antivirus software which means the software is stored in the cloud and monitors
your system/organization’s system remotely. This antivirus software identifies the
security risks and fixes them. Sometimes also they give a feature to download the
software.
6. E-commerce Application : Cloud-based e-commerce allows responding quickly to the
opportunities which are emerging. Users respond quickly to the market opportunities as
well as the traditional e-commerce responds to the challenges quickly. Cloud-based e-
commerce gives a new approach to doing business with the minimum amount as well as
minimum time possible. Customer data, product data, and other operational systems are
managed in cloud environments.
7. Cloud computing in education : Cloud computing in the education sector brings an
unbelievable change in learning by providing e-learning, online distance learning
platforms, and student information portals to the students. It is a new trend in education
that provides an attractive environment for learning, teaching, experimenting, etc to
students, faculty members, and researchers. Everyone associated with the field can
connect to the cloud of their organization and access data and information from there.
8. E-Governance Application : Cloud computing can provide its services to multiple
activities conducted by the government. It can support the government to move from the
traditional ways of management and service providers to an advanced way of everything
by expanding the availability of the environment, making the environment more scalable
and customized. It can help the government to reduce the unnecessary cost in managing,
installing, and upgrading applications and doing all these with help of could computing
and utilizing that money public service.
1. Cloud Computing in Medical Fields : In the medical field also nowadays cloud
computing is used for storing and accessing the data as it allows to store data and access
it through the internet without worrying about any physical setup. It facilitates easier
34
CLOUD SECURITY (UNIT-1)
access and distribution of information among the various medical professional and the
individual patients. Similarly, with help of cloud computing offsite buildings and
treatment facilities like labs, doctors making emergency house calls and ambulances
information, etc can be easily accessed and updated remotely instead of having to wait
until they can access a hospital computer.
2. Entertainment Applications : Many people get entertainment from the internet, in that
case, cloud computing is the perfect place for reaching to a varied consumer base.
Therefore different types of entertainment industries reach near the target audience by
adopting a multi-cloud strategy. Cloud-based entertainment provides various
entertainment applications such as online music/video, online games and video
conferencing, streaming services, etc and it can reach any device be it TV, mobile, set-top
box, or any other form. It is a new form of entertainment called On-Demand
Entertainment (ODE). With respect to this as a cloud, the market is growing rapidly and it
is providing various services day by day. So other application of cloud computing
includes social applications, management application, business applications, art
application, and many more. So in the future cloud computing is going to touch many
more sectors by providing more applications and services.
35