Cloud computing
Cloud computing
Cloud computing refers to delivering computing resources (such as servers, storage, databases,
networking, software, analytics, and intelligence) over the internet (“the cloud”). Instead of
owning physical data centers or servers, businesses and individuals can use computing services
on-demand, typically on a pay-as-you-go basis.
1. Scalability: Businesses often face fluctuating demands. Cloud computing allows them to
scale resources up or down based on their needs without investing in new infrastructure.
2. Cost-Efficiency: It reduces the cost of purchasing and maintaining hardware. Instead,
users only pay for what they use.
3. Accessibility: Users can access data and applications from anywhere with an internet
connection, promoting remote work and global collaboration.
4. Innovation: By freeing resources previously tied to infrastructure, organizations can
focus on developing innovative applications and solutions.
Key Characteristics:
Resource Sharing: Compute, storage, and data are shared across multiple nodes.
Fault Tolerance: If one node fails, others can compensate.
High Availability: Resources are consistently available with minimal downtime.
Example: Content Delivery Networks (CDNs) like AWS CloudFront use distributed systems to
cache and deliver content efficiently worldwide.
Example:
Disadvantages:
1. Public Cloud
Advantages:
Low cost.
Easy to deploy.
Scalable.
Disadvantages:
2. Private Cloud
Advantages:
Disadvantages:
Higher cost.
Limited scalability compared to public cloud.
Example: A bank using a private cloud to store customer financial data securely.
3. Hybrid Cloud
Advantages:
Disadvantages:
Complex to manage.
Requires integration between systems.
Example: A retail company using the public cloud for e-commerce websites and a private cloud
for internal inventory management.
Cloud Platforms and Virtualization
1. Concept of a Data Center
A data center is a centralized facility that houses computer systems, storage systems, networking
equipment, and other infrastructure required for computing and data processing. Data centers are
critical for businesses, enabling them to store, process, and manage large amounts of data
efficiently.
Cloud computing platforms provide on-demand IT resources over the internet. Key players in the
market include:
Amazon Web Services (AWS): Offers a wide range of services, including computing,
storage, databases, machine learning, and analytics. Key offerings include EC2, S3, and
Lambda.
Microsoft Azure: Provides services for virtual machines, AI, IoT, and application
development. It integrates well with Microsoft Office and other enterprise solutions.
Google Cloud Platform (GCP): Known for data analytics and AI capabilities. Services
like BigQuery and TensorFlow are prominent.
Meghraj (NIC Cloud): An Indian government initiative to provide cloud services for e-
governance and public sector projects.
3. Concept of Virtualization
Virtualization is the process of creating virtual instances of hardware, operating systems, storage
devices, or network resources, enabling multiple workloads to run on a single physical system.
Key Benefits of Virtualization:
4. Types of Virtualization
Server Virtualization: Divides a physical server into multiple virtual servers, each
running its own operating system. Example: VMware ESXi.
Storage Virtualization: Pools physical storage from multiple devices into a single
virtual storage device. Example: NetApp ONTAP.
Network Virtualization: Combines hardware and software network resources into a
single virtual network. Example: VMware NSX.
5. Hypervisor Technology
A hypervisor, also known as a virtual machine monitor (VMM), is software that creates and
manages virtual machines (VMs). It enables multiple VMs to share resources on a single
physical machine.
Types of Hypervisors:
6. Popular Hypervisors
VMware: A leading provider of virtualization software offering ESXi (Type 1) and
VMware Workstation (Type 2). Known for robust enterprise solutions.
Microsoft Hyper-V: A Type 1 hypervisor built into Windows Server. Ideal for
enterprises using Microsoft ecosystems.
KVM (Kernel-based Virtual Machine): An open-source Type 1 hypervisor integrated
into the Linux kernel. Popular for flexibility and cost-effectiveness.
Cloud Computing Reference Architecture (CCRA)
Cloud Computing Reference Architecture (CCRA) serves as a blueprint that defines the
components, relationships, and dynamics involved in cloud computing. It provides a
standardized framework for designing, implementing, and managing cloud services, ensuring
efficiency, scalability, and interoperability.
Community Cloud
Here’s a visual representation of the architecture, showing the relationship between components:
Concept of Cloud Storage
Cloud storage is a technology that allows users to store data on remote servers that can be
accessed over the internet. These servers are maintained, operated, and managed by cloud
storage service providers. Users can upload files, access them anytime from any device, and
share them with others, without relying on local storage devices.
Cloud storage is highly scalable, secure, and cost-effective. It eliminates the need for managing
physical storage hardware and provides a flexible solution for businesses and individuals to store
data.
Cloud storage can be classified based on how the data is stored and accessed. Below are the
primary types:
1. Block Storage
Definition: Block storage divides data into fixed-size blocks. Each block has a unique
address but is stored independently from the others.
How it works: These blocks can be stored across different physical storage devices, and
the system assembles them when data is accessed. This approach is often used in storage
area networks (SANs).
Use Cases:
o Databases: Due to high I/O performance.
o Virtual machine file systems in cloud environments.
Advantages:
o High performance and low latency.
o Fine-grained control over data.
Example: Amazon Elastic Block Store (EBS).
Definition: Object storage manages data as objects, which include the data itself,
metadata, and a unique identifier. It is designed for unstructured data like images, videos,
and backups.
How it works: Instead of a traditional file hierarchy, object storage uses a flat structure,
which makes it scalable.
Use Cases:
o Data archiving and backups.
o Media hosting.
o Big data analytics.
Advantages:
o Scalability: Easily handles petabytes of data.
o Built-in metadata makes data retrieval faster.
Example: Amazon S3, Google Cloud Storage.
3. File Storage
Definition: File storage organizes data into a hierarchical structure of files and folders. It
resembles the traditional storage model used in personal computers.
How it works: Files are stored in directories, and users access them through a shared file
system.
Use Cases:
o Shared drives for teams and applications.
o Storing personal or business documents.
Advantages:
o Simple to use and manage.
o Compatible with many applications requiring file systems.
Example: Google Drive, Dropbox.
Distributed file systems store data across multiple servers or locations to provide redundancy,
scalability, and fault tolerance. Below are two popular examples:
a. Ceph FS
Definition: Ceph File System (Ceph FS) is a distributed file system that uses the Ceph
storage cluster.
How it works: Ceph FS decouples the storage layer into three components:
o Monitors: Manage cluster maps.
o Object Storage Devices (OSDs): Handle data storage.
o Metadata Servers: Manage metadata like directory structures.
Advantages:
o Scalability: Grows seamlessly by adding nodes.
o Fault tolerance: Redundant storage prevents data loss.
Use Cases:
o Cloud applications requiring scalable file storage.
o Big data analytics.
Definition: HDFS is designed for large-scale data storage and is a core component of the
Hadoop ecosystem.
How it works: HDFS splits files into blocks and distributes them across multiple nodes
in the cluster. It ensures fault tolerance by replicating blocks.
Advantages:
o Handles large datasets efficiently.
o Data locality: Computation is performed close to the data.
Use Cases:
o Big data processing.
o Data analytics in distributed environments.
Feature Block Storage Object Storage File Storage Distributed File Systems
Fault Depends on
High Moderate High
Tolerance configuration
Security
1. Security Threats in Cloud Computing
Cloud computing faces unique risks due to its architecture and shared nature. These include
threats to Confidentiality, Integrity, and Availability (CIA triad):
1.1 Confidentiality
Confidentiality involves protecting sensitive data from unauthorized access. Cloud environments
are susceptible to:
Data breaches: Unauthorized access to sensitive customer or business data stored in the
cloud.
Insecure APIs: Weakly secured interfaces and APIs may expose data to attackers.
Malicious insiders: Employees or contractors with access to sensitive data can misuse it.
1.2 Integrity
Integrity ensures that data is accurate and not altered maliciously. Threats include:
1.3 Availability
Availability ensures that data and services are accessible when needed. Threats include:
DDoS attacks: Overwhelming cloud resources with fake traffic, making them
unavailable.
Outages: Downtime due to hardware failures, software issues, or natural disasters.
Privacy and compliance involve adhering to laws and regulations governing data protection, such
as GDPR, HIPAA, and CCPA. Risks include:
Data sovereignty: Data stored in a foreign country must comply with that nation’s laws.
Lack of transparency: Cloud providers may not disclose where data is stored or who has
access.
Data leaks: Sensitive information might be accidentally exposed due to
misconfigurations.
Mitigation measures:
Access control in cloud computing ensures that only authorized users can access specific
resources. Challenges include:
Identity management: Ensuring the right users have the right access using secure
authentication mechanisms.
Privilege escalation: Attackers gaining unauthorized access to high-level permissions.
Weak authentication: Exploiting poorly secured passwords or lack of multi-factor
authentication (MFA).
Best practices:
Security policies define rules and procedures to safeguard cloud environments. Key types
include:
Focuses on protecting sensitive data through encryption, access control, and backup mechanisms.
Outlines steps to detect, mitigate, and recover from security incidents, minimizing damage and
restoring operations quickly.
Ensures adherence to regulatory and organizational standards for data protection and privacy.
Identity and Access Management (IAM): Control who can access resources.
Data encryption services: Tools to encrypt data at rest and in transit.
Network security services: Firewalls, VPNs, and security groups to prevent
unauthorized access.
Monitoring and analytics: Real-time threat detection using machine learning and
behavioral analysis.
A CSIRT is a team responsible for managing security incidents within an organization. Core
activities include:
Cyber Swachhta Kendra: A botnet cleaning and malware analysis center to help
individuals and businesses secure their devices.
Threat bulletins: Regular advisories and alerts about potential threats and
vulnerabilities.
Conclusion