0% found this document useful (0 votes)
0 views

Cloud computing

Cloud computing provides on-demand access to computing resources over the internet, allowing for scalability, cost-efficiency, and accessibility. It encompasses various deployment models such as public, private, and hybrid clouds, as well as service models like IaaS, PaaS, and SaaS. Key considerations include security threats, privacy compliance, and the advantages of virtualization and cloud storage types.

Uploaded by

dhruvkumar935452
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Cloud computing

Cloud computing provides on-demand access to computing resources over the internet, allowing for scalability, cost-efficiency, and accessibility. It encompasses various deployment models such as public, private, and hybrid clouds, as well as service models like IaaS, PaaS, and SaaS. Key considerations include security threats, privacy compliance, and the advantages of virtualization and cloud storage types.

Uploaded by

dhruvkumar935452
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Introduction to Cloud Computing

Cloud computing refers to delivering computing resources (such as servers, storage, databases,
networking, software, analytics, and intelligence) over the internet (“the cloud”). Instead of
owning physical data centers or servers, businesses and individuals can use computing services
on-demand, typically on a pay-as-you-go basis.

Necessity of Cloud Computing

1. Scalability: Businesses often face fluctuating demands. Cloud computing allows them to
scale resources up or down based on their needs without investing in new infrastructure.
2. Cost-Efficiency: It reduces the cost of purchasing and maintaining hardware. Instead,
users only pay for what they use.
3. Accessibility: Users can access data and applications from anywhere with an internet
connection, promoting remote work and global collaboration.
4. Innovation: By freeing resources previously tied to infrastructure, organizations can
focus on developing innovative applications and solutions.

Distribution System in Cloud Computing

A distributed system in cloud computing refers to a network of interconnected nodes (servers,


devices) working together to perform tasks. These systems share resources and appear as a single
system to users.

Key Characteristics:

 Resource Sharing: Compute, storage, and data are shared across multiple nodes.
 Fault Tolerance: If one node fails, others can compensate.
 High Availability: Resources are consistently available with minimal downtime.

Example: Content Delivery Networks (CDNs) like AWS CloudFront use distributed systems to
cache and deliver content efficiently worldwide.

Comparing Conventional Servers and Cloud Computing

Aspect Conventional Servers Cloud Computing


Aspect Conventional Servers Cloud Computing
Infrastructure Requires physical servers. Virtualized resources over the internet.
Scalability Limited by hardware. Highly scalable on demand.
Cost High upfront cost. Pay-as-you-go model.
Maintenance Requires in-house IT teams. Maintenance handled by service provider.
Flexibility Rigid; tied to on-premise infrastructure. Accessible from anywhere.

Example:

 Conventional Server: A company maintaining its own email server.


 Cloud Computing: Using Gmail (hosted on Google Cloud).

Advantages of Cloud Computing Over Conventional Servers

1. Flexibility and Mobility: Work from anywhere with an internet connection.


2. Disaster Recovery: Built-in redundancy and backups ensure data protection.
3. Automatic Updates: Providers handle software and hardware updates.
4. Reduced Costs: Eliminates the need for upfront hardware purchases.
5. Environmentally Friendly: Better resource utilization reduces energy consumption.

Disadvantages:

1. Dependency on Internet: Requires a reliable internet connection.


2. Security Concerns: Sensitive data might be at risk if not properly secured.
3. Compliance Issues: Regulations may restrict cloud usage for certain data types.

Cloud Deployment Models

1. Public Cloud

 Owned and operated by third-party providers.


 Resources are shared among multiple users.
 Example: Amazon Web Services (AWS), Microsoft Azure, Google Cloud.

Advantages:
 Low cost.
 Easy to deploy.
 Scalable.

Disadvantages:

 Less secure for sensitive data.

2. Private Cloud

 Exclusively used by a single organization.


 Hosted either on-premise or by a third party.

Advantages:

 High security and control.


 Customizable to specific organizational needs.

Disadvantages:

 Higher cost.
 Limited scalability compared to public cloud.

Example: A bank using a private cloud to store customer financial data securely.

3. Hybrid Cloud

 Combines public and private clouds.


 Allows data and applications to move between the two as needed.

Advantages:

 Balance between cost and security.


 Flexible resource allocation.

Disadvantages:

 Complex to manage.
 Requires integration between systems.

Example: A retail company using the public cloud for e-commerce websites and a private cloud
for internal inventory management.
Cloud Platforms and Virtualization
1. Concept of a Data Center

A data center is a centralized facility that houses computer systems, storage systems, networking
equipment, and other infrastructure required for computing and data processing. Data centers are
critical for businesses, enabling them to store, process, and manage large amounts of data
efficiently.

Components of a Data Center:

 Servers: Physical or virtual machines that provide computing power.


 Storage Systems: Devices for storing data such as SAN (Storage Area Network) or NAS
(Network Attached Storage).
 Networking: Includes routers, switches, and firewalls to ensure seamless connectivity.
 Cooling Systems: To maintain optimal operating temperatures for hardware.
 Power Supplies: Backup generators and UPS systems to ensure uninterrupted power.

2. Cloud Platform Providers

Cloud computing platforms provide on-demand IT resources over the internet. Key players in the
market include:

 Amazon Web Services (AWS): Offers a wide range of services, including computing,
storage, databases, machine learning, and analytics. Key offerings include EC2, S3, and
Lambda.
 Microsoft Azure: Provides services for virtual machines, AI, IoT, and application
development. It integrates well with Microsoft Office and other enterprise solutions.
 Google Cloud Platform (GCP): Known for data analytics and AI capabilities. Services
like BigQuery and TensorFlow are prominent.
 Meghraj (NIC Cloud): An Indian government initiative to provide cloud services for e-
governance and public sector projects.

3. Concept of Virtualization

Virtualization is the process of creating virtual instances of hardware, operating systems, storage
devices, or network resources, enabling multiple workloads to run on a single physical system.
Key Benefits of Virtualization:

 Resource Optimization: Maximizes the utilization of physical hardware.


 Cost Savings: Reduces the need for physical servers and associated costs.
 Scalability: Makes it easier to scale resources up or down.
 Flexibility: Supports multiple operating systems and applications on a single machine.

4. Types of Virtualization

 Server Virtualization: Divides a physical server into multiple virtual servers, each
running its own operating system. Example: VMware ESXi.
 Storage Virtualization: Pools physical storage from multiple devices into a single
virtual storage device. Example: NetApp ONTAP.
 Network Virtualization: Combines hardware and software network resources into a
single virtual network. Example: VMware NSX.

5. Hypervisor Technology

A hypervisor, also known as a virtual machine monitor (VMM), is software that creates and
manages virtual machines (VMs). It enables multiple VMs to share resources on a single
physical machine.

Types of Hypervisors:

1. Type 1 (Bare-Metal Hypervisors):


o Installed directly on the hardware.
o Offers high performance and security.
o Examples: VMware ESXi, Microsoft Hyper-V.
2. Type 2 (Hosted Hypervisors):
o Installed on a host operating system.
o Easier to set up but less efficient than Type 1.
o Examples: VMware Workstation, Oracle VirtualBox.

6. Popular Hypervisors
 VMware: A leading provider of virtualization software offering ESXi (Type 1) and
VMware Workstation (Type 2). Known for robust enterprise solutions.
 Microsoft Hyper-V: A Type 1 hypervisor built into Windows Server. Ideal for
enterprises using Microsoft ecosystems.
 KVM (Kernel-based Virtual Machine): An open-source Type 1 hypervisor integrated
into the Linux kernel. Popular for flexibility and cost-effectiveness.
Cloud Computing Reference Architecture (CCRA)
Cloud Computing Reference Architecture (CCRA) serves as a blueprint that defines the
components, relationships, and dynamics involved in cloud computing. It provides a
standardized framework for designing, implementing, and managing cloud services, ensuring
efficiency, scalability, and interoperability.

Key Components of CCRA

1. Cloud Service Provider (CSP):


o Delivers cloud services such as IaaS, PaaS, or SaaS.
o Manages infrastructure, platforms, and software.
2. Cloud Consumer:
o Entities or individuals using cloud services.
3. Cloud Broker:
o Acts as an intermediary between CSPs and consumers, aggregating, customizing,
and managing services.
4. Cloud Auditor:
o Evaluates cloud services' performance, security, and compliance.
5. Cloud Carrier:
o Provides the connectivity and transport of cloud services (e.g., ISPs).
6. Service Models (IaaS, PaaS, SaaS):
o Delivery mechanisms for cloud resources.

Delivery Models in Cloud Computing

1. Infrastructure as a Service (IaaS):


o Definition: Provides virtualized computing resources over the internet (e.g.,
virtual machines, storage).
o Key Features:
 Scalability and flexibility.
 Pay-per-use billing.
 Users control OS, storage, and applications.
o Examples:
 Amazon Web Services (AWS) EC2: Offers scalable virtual servers.
 Microsoft Azure VM: Provides customizable virtual machines.
o Use Case: Hosting websites, running large-scale data analytics, or creating
backup solutions.

2. Platform as a Service (PaaS):


o Definition: Offers a platform for developers to build, deploy, and manage
applications without handling underlying infrastructure.
o Key Features:
 Pre-configured development environments.
 Integrated tools for coding, testing, and deploying.
o Examples:
 Google App Engine: Allows developers to deploy applications without
managing servers.
 Heroku: Simplifies app deployment with built-in tools and frameworks.
o Use Case: Developing mobile or web apps with reduced setup overhead.

3. Software as a Service (SaaS):


o Definition: Delivers software applications over the internet on a subscription
basis.
o Key Features:
 No installation or maintenance required by users.
 Accessed through web browsers.
o Examples:
 Microsoft 365: Cloud-based productivity tools.
 Salesforce CRM: Customer relationship management tools.
o Use Case: Collaboration, project management, and data analytics.

Community Cloud

 Definition: A cloud infrastructure shared by several organizations with similar interests


or requirements.
 Key Features:
o Managed by one or more organizations or a third party.
o Provides greater privacy and security compared to public clouds.
 Example Use Case: Government agencies sharing resources for public administration.
Diagram of Cloud Computing Reference Architecture

Here’s a visual representation of the architecture, showing the relationship between components:
Concept of Cloud Storage
Cloud storage is a technology that allows users to store data on remote servers that can be
accessed over the internet. These servers are maintained, operated, and managed by cloud
storage service providers. Users can upload files, access them anytime from any device, and
share them with others, without relying on local storage devices.

Cloud storage is highly scalable, secure, and cost-effective. It eliminates the need for managing
physical storage hardware and provides a flexible solution for businesses and individuals to store
data.

Types of Cloud Storage

Cloud storage can be classified based on how the data is stored and accessed. Below are the
primary types:

1. Block Storage

 Definition: Block storage divides data into fixed-size blocks. Each block has a unique
address but is stored independently from the others.
 How it works: These blocks can be stored across different physical storage devices, and
the system assembles them when data is accessed. This approach is often used in storage
area networks (SANs).
 Use Cases:
o Databases: Due to high I/O performance.
o Virtual machine file systems in cloud environments.
 Advantages:
o High performance and low latency.
o Fine-grained control over data.
 Example: Amazon Elastic Block Store (EBS).

2. Hosted Object Storage

 Definition: Object storage manages data as objects, which include the data itself,
metadata, and a unique identifier. It is designed for unstructured data like images, videos,
and backups.
 How it works: Instead of a traditional file hierarchy, object storage uses a flat structure,
which makes it scalable.
 Use Cases:
o Data archiving and backups.
o Media hosting.
o Big data analytics.
 Advantages:
o Scalability: Easily handles petabytes of data.
o Built-in metadata makes data retrieval faster.
 Example: Amazon S3, Google Cloud Storage.

3. File Storage

 Definition: File storage organizes data into a hierarchical structure of files and folders. It
resembles the traditional storage model used in personal computers.
 How it works: Files are stored in directories, and users access them through a shared file
system.
 Use Cases:
o Shared drives for teams and applications.
o Storing personal or business documents.
 Advantages:
o Simple to use and manage.
o Compatible with many applications requiring file systems.
 Example: Google Drive, Dropbox.

4. Distributed File Systems

Distributed file systems store data across multiple servers or locations to provide redundancy,
scalability, and fault tolerance. Below are two popular examples:

a. Ceph FS

 Definition: Ceph File System (Ceph FS) is a distributed file system that uses the Ceph
storage cluster.
 How it works: Ceph FS decouples the storage layer into three components:
o Monitors: Manage cluster maps.
o Object Storage Devices (OSDs): Handle data storage.
o Metadata Servers: Manage metadata like directory structures.
 Advantages:
o Scalability: Grows seamlessly by adding nodes.
o Fault tolerance: Redundant storage prevents data loss.
 Use Cases:
o Cloud applications requiring scalable file storage.
o Big data analytics.

b. HDFS (Hadoop Distributed File System)

 Definition: HDFS is designed for large-scale data storage and is a core component of the
Hadoop ecosystem.
 How it works: HDFS splits files into blocks and distributes them across multiple nodes
in the cluster. It ensures fault tolerance by replicating blocks.
 Advantages:
o Handles large datasets efficiently.
o Data locality: Computation is performed close to the data.
 Use Cases:
o Big data processing.
o Data analytics in distributed environments.

Comparison of Cloud Storage Types

Feature Block Storage Object Storage File Storage Distributed File Systems

Data Objects with Blocks/files spread


Fixed-size blocks Files and directories
Structure metadata across nodes

Backups, media Shared drives, Big data, scalable


Use Case Databases, VMs
hosting documents storage

Performance High Moderate Moderate High

Scalability Limited Unlimited Limited Unlimited

Fault Depends on
High Moderate High
Tolerance configuration
Security
1. Security Threats in Cloud Computing

Cloud computing faces unique risks due to its architecture and shared nature. These include
threats to Confidentiality, Integrity, and Availability (CIA triad):

1.1 Confidentiality

Confidentiality involves protecting sensitive data from unauthorized access. Cloud environments
are susceptible to:

 Data breaches: Unauthorized access to sensitive customer or business data stored in the
cloud.
 Insecure APIs: Weakly secured interfaces and APIs may expose data to attackers.
 Malicious insiders: Employees or contractors with access to sensitive data can misuse it.

1.2 Integrity

Integrity ensures that data is accurate and not altered maliciously. Threats include:

 Data tampering: Unauthorized alteration of data in transit or storage.


 Man-in-the-Middle (MITM) attacks: Intercepting communication between two parties
to alter information.

1.3 Availability

Availability ensures that data and services are accessible when needed. Threats include:

 DDoS attacks: Overwhelming cloud resources with fake traffic, making them
unavailable.
 Outages: Downtime due to hardware failures, software issues, or natural disasters.

2. Privacy and Compliance Risks

Privacy and compliance involve adhering to laws and regulations governing data protection, such
as GDPR, HIPAA, and CCPA. Risks include:

 Data sovereignty: Data stored in a foreign country must comply with that nation’s laws.
 Lack of transparency: Cloud providers may not disclose where data is stored or who has
access.
 Data leaks: Sensitive information might be accidentally exposed due to
misconfigurations.

Mitigation measures:

 Encryption: Encrypting data in transit and at rest to protect confidentiality.


 Regular audits: Ensuring compliance with relevant regulations through periodic
assessments.

3. Cloud Access Control Issues

Access control in cloud computing ensures that only authorized users can access specific
resources. Challenges include:

 Identity management: Ensuring the right users have the right access using secure
authentication mechanisms.
 Privilege escalation: Attackers gaining unauthorized access to high-level permissions.
 Weak authentication: Exploiting poorly secured passwords or lack of multi-factor
authentication (MFA).

Best practices:

 Implement role-based access control (RBAC).


 Use MFA and strong password policies.
 Regularly review and update permissions.

4. Types of Security Policies

Security policies define rules and procedures to safeguard cloud environments. Key types
include:

4.1 Data Security Policy

Focuses on protecting sensitive data through encryption, access control, and backup mechanisms.

4.2 Network Security Policy


Defines measures to secure communication channels and prevent unauthorized access, such as
firewalls and intrusion detection systems (IDS).

4.3 Incident Response Policy

Outlines steps to detect, mitigate, and recover from security incidents, minimizing damage and
restoring operations quickly.

4.4 Compliance Policy

Ensures adherence to regulatory and organizational standards for data protection and privacy.

5. Cloud Security Services

Cloud providers offer several security services to protect assets:

 Identity and Access Management (IAM): Control who can access resources.
 Data encryption services: Tools to encrypt data at rest and in transit.
 Network security services: Firewalls, VPNs, and security groups to prevent
unauthorized access.
 Monitoring and analytics: Real-time threat detection using machine learning and
behavioral analysis.

6. Computer Security Incident Response Team (CSIRT)

A CSIRT is a team responsible for managing security incidents within an organization. Core
activities include:

 Incident identification: Detect and assess security events.


 Mitigation: Respond to and contain incidents quickly.
 Forensics: Analyze incidents to determine their cause and extent.
 Recovery: Restore normal operations while preventing recurrence.

7. CERT-In (India’s Computer Emergency Response Team)


CERT-In is the nodal agency under the Indian Ministry of Electronics and Information
Technology (MeitY) for cybersecurity-related matters. Its responsibilities include:

 Incident response: Assisting organizations in handling and mitigating cybersecurity


incidents.
 Threat assessment: Identifying and reporting vulnerabilities and threats to Indian
cyberspace.
 Awareness programs: Educating businesses and individuals about best practices in
cybersecurity.
 Coordination: Collaborating with international CERTs, law enforcement, and industry
stakeholders to enhance cybersecurity.

Key initiatives by CERT-In:

 Cyber Swachhta Kendra: A botnet cleaning and malware analysis center to help
individuals and businesses secure their devices.
 Threat bulletins: Regular advisories and alerts about potential threats and
vulnerabilities.

Conclusion

Securing cloud environments requires a comprehensive approach involving robust access


controls, encryption, regular audits, and incident response capabilities. Organizations should
adopt best practices and leverage the services of entities like CERT-In to bolster their defenses
against evolving threats.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy