CC Ia2
CC Ia2
CC Ia2
The Cloud Reference Model provides a structured approach to understanding the diverse components
and services of cloud computing by breaking down its architecture into several layers:
1. Infrastructure-as-a-Service (IaaS): This layer forms the foundation, offering virtualized physical
infrastructure that includes computing resources, storage, and networking, typically managed by a
hypervisor to facilitate virtual machines (VMs). Datacenters house these resources, which may
include clusters, networked PCs, and storage systems. IaaS solutions can either encompass both the
physical infrastructure and management layer, or only the management layer (IaaS (M))—the latter
often being integrated with other IaaS solutions.
2. Platform-as-a-Service (PaaS): Built atop IaaS, PaaS offers a development platform with tools such
as APIs, web-based interfaces, and frameworks for concurrent and distributed programming. This
layer allows users to create and deploy applications without managing the underlying infrastructure.
PaaS solutions may come bundled with infrastructure, but in the case of Pure PaaS, only user-level
middleware is provided, requiring additional infrastructure support.
3. Software-as-a-Service (SaaS): This is the application layer, where end-user services and
applications are delivered via the web. SaaS solutions benefit from the computing power provided by
the IaaS and PaaS layers, enabling vendors to offer scalable, cloud-based applications like web
applications, social media platforms, and gaming portals. SaaS often includes adaptive capabilities for
availability and performance, providing autonomic scaling on demand.
4. Everything-as-a-Service (XaaS): This concept encompasses the combination of services across
IaaS, PaaS, and SaaS to form integrated, customizable solutions that span the entire computing stack,
from bare-metal infrastructure to web-based applications. XaaS allows for flexibility, enabling
providers to mix services for optimized solutions based on user needs, a crucial aspect for startups and
organizations aiming to scale affordably and rapidly.
The reference model emphasizes adaptive management, allowing the cloud to respond dynamically to
demand, whether through IaaS, PaaS, or SaaS APIs, ensuring that performance and availability needs
are met elastically.
2.Explain essential characteristics that identify a PaaS solution.
There are some essential characteristics that identify a PaaS solution:
• Runtime framework. This framework represents the “software stack” of the PaaS model and the
most intuitive aspect that comes to people’s minds when they refer to PaaS solutions. The runtime
framework executes end-user code according to the policies set by the user and the provider.
• Abstraction. PaaS solutions are distinguished by the higher level of abstraction that they provide.
Whereas in the case of IaaS solutions the focus is on delivering “raw” access to virtual or physical
infrastructure, in the case of PaaS the focus is on the applications the cloud must support. This means
that PaaS solutions offer a way to deploy and manage applications on the cloud rather than a bunch of
virtual machines on top of which the IT infrastructure is built and configured.
• Automation. PaaS environments automate the process of deploying applications to the infrastructure,
scaling them by provisioning additional resources when needed. This process is performed
automatically and according to the SLA made between the customers and the provider. This feature is
normally not native in IaaS solutions, which only provide ways to provision more resources.
• Cloud services. PaaS offerings provide developers and architects with services and APIs, helping
them to simplify the creation and delivery of elastic and highly available cloud applications. These
services are the key differentiators among competing PaaS solutions and generally include specific
components for developing applications, advanced services for application monitoring, management,
and reporting.
3.Describe the Private Clouds in detail.
Private clouds offer an alternative to public cloud solutions for organizations needing greater control
over their data, infrastructure, and security.
While public clouds provide scalable IT resources and cost-saving benefits, they may pose risks
related to data privacy and regulatory compliance.
Private clouds mitigate these concerns by operating within the organization's own infrastructure,
ensuring data remains secure and accessible only within the enterprise.
• Customer Information Protection: Private clouds offer better security because organizations
can directly control and maintain their own security systems, unlike public cloud providers
that may not fully disclose their security measures.
• Infrastructure Ensuring SLAs: Private clouds ensure that service quality is maintained with
operations like data replication, system monitoring, backup, and disaster recovery. Public
cloud providers may not offer all these features or may not meet the specific needs of your
applications.
• Compliance with Standards and Operations: If a company needs to follow specific rules or
standards (e.g., legal or industry requirements), a private cloud can be customized to meet
these needs. This might not be possible with a public cloud infrastructure.
Architectural Components of Private Clouds:
Private clouds are typically implemented on the organization’s IT infrastructure, often using
virtualization technologies like Xen, KVM, and VMware. This setup is managed by software
solutions (IaaS or PaaS layers), which facilitate resource allocation, user access, and application
management.
Popular tools for private cloud deployment include:
- VMware vCloud (proprietary) for extensive IaaS solutions.
- Eucalyptus and OpenNebula (open-source) for virtual infrastructure management, compatible with
multiple virtualization platforms.
- OpenPEX and InterGrid offer additional features such as VM reservation, enhancing private cloud
functionality.
PaaS solutions for private clouds, like DataSynapse, Zimory Pools, Elastra, and Aneka, deliver high-
level services, supporting application development and deployment within a private setting.
4. Explain the basic security risks in cloud computing.
Cloud computing introduces several security risks, especially as more users and organizations adopt
these services. These risks can be grouped into three primary categories: traditional security threats,
availability concerns, and issues related to third-party control.
- External Attacks: Similar to other internet-connected systems, cloud services face threats like
Distributed Denial of Service (DDoS) attacks, phishing, SQL injection, and cross-site scripting. These
attacks can disrupt access to cloud resources, steal sensitive data, or hijack accounts.
- User Authentication: Ensuring secure access for multiple users in an organization is challenging.
Without proper access controls and authentication policies, unauthorized users could access sensitive
data.
- Multitenancy Vulnerabilities: Cloud servers often host multiple virtual machines (VMs) and
applications. If the virtualization software has flaws, it may allow one user to access data or resources
meant for another, creating a privacy and security risk.
- Lack of Transparency in Forensics: Tracking and investigating security incidents in a shared cloud
environment is challenging, as digital traces are often quickly overwritten or shared among multiple
users, complicating digital forensics.
- Downtime and Failures: Cloud services can experience system outages due to failures, power
outages, or other catastrophic events, potentially halting business operations.
- Data Lock-In: When data is stored in a specific cloud provider’s system, it may be difficult to
move or recover it if that service goes down, especially if there are no proper backup mechanisms.
- Complex System Effects: Large-scale clouds are complex systems where unpredictable events like
phase transitions could cause failures that impact availability.
- Data Handling by Third Parties: Cloud providers may subcontract services or hardware, creating
additional security concerns if these third parties do not follow stringent security protocols.
- Risk of Data Loss or Leakage: Cloud providers may not offer adequate guarantees for data safety.
If data replication or storage mechanisms fail, critical data could be lost permanently.
- Account Hijacking: Hackers might exploit vulnerabilities to steal user credentials, gaining access
to sensitive data or services.
- Unknown Risk Profiles: Cloud users may underestimate the risks involved in cloud computing, as
some cloud providers do not fully disclose their security measures.
10 Discuss about mitigation of security risks between CSPs and cloud users.
To mitigate security risks between Cloud Service Providers (CSPs) and cloud users, the following
measures should be taken:
1. Evaluate CSP’s Security Policies: Users should evaluate the security policies and
mechanisms the CSP has in place to enforce these policies.
2. Contractual Obligations: The contract between the user and the CSP should explicitly:
o State CSP’s obligations to securely handle sensitive information and comply with
privacy laws.
o Spell out CSP liabilities for mishandling sensitive information or data loss.
o Define the rules governing data ownership.
o Specify the geographical regions where information and backups can be stored.
3. Avoid Processing Sensitive Data on Cloud: Users may try to avoid processing sensitive data
on a cloud, especially if the data processing workflow requires access to the entire volume of
user data.
4. Data Encryption: When sensitive data must be stored on a public or hybrid cloud, it should
be encrypted whenever feasible.