CLBE304 - Week2
CLBE304 - Week2
Additional Text:
2- Private cloud:
The cloud infrastructure is provisioned for exclusive use by
a single organization comprising multiple consumers (e.g.,
business units).
It may be owned, managed, and operated by the
organization, a third party, or some combination of them,
and it may exist on or off premises.
Cloud Deployment Models:
3- Hybrid cloud:
The cloud infrastructure is a composition of two or more distinct
cloud infrastructures (private, community, or public) that remain
unique entities, but are bound together by standardized or
proprietary technology that enables data and application portability
(e.g., cloud bursting for load balancing between clouds).
4- Community cloud:
The cloud infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared
concerns (e.g., mission, security requirements, policy, and compliance
considerations).
It may be owned, managed, and operated by one or more of the
organizations in the community, a third party, or some combination of
them, and it may exist on or off premises
What are the Different Types of Cloud Service Solutions?
Cloud Service Models:
1- Software as a Service (SaaS):
The capability provided to the consumer is to use the provider’s applications running on a
cloud infrastructure.
The applications are accessible from various client devices through either a thin client
interface, such as a web browser (e.g., web-based email), or a program interface.
The consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, storage, or even individual application capabilities,
with the possible exception of limited user specific application configuration settings.
SaaS examples:
Google Apps, Salesforce, Dropbox ..
Cloud Service Models: (cont’d)
2- Platform as a Service (PaaS):
The capability provided to the consumer is to deploy onto the cloud infrastructure.
Consumer-created or acquired applications created using programming languages, libraries,
services, and tools supported by the provider.
The consumer does not manage or control the underlying cloud infrastructure including network,
servers, operating systems, or storage, but has control over the deployed applications and possibly
configuration settings for the application-hosting environment.
Examples:
AWS Elastic Beanstalk, Windows Azure,
Force.com, Google App Engine..
Cloud Service Models: (cont’d)
3- Infrastructure as a Service (IaaS):
The capability provided to the consumer is to provision processing, storage, networks, and other
fundamental computing resources.
The consumer is able to deploy and run arbitrary software, which can include operating systems and
applications.
The consumer does not manage or control the underlying cloud infrastructure but has control over
operating systems, storage, and deployed applications; and possibly limited control of select
networking components (e.g., host firewalls).
Examples:
Amazon Web Services (AWS), Cisco Metapod,
Microsoft Azure..
Cloud Computing Users
Cloud Service Models: specialized variations
Many specialized variations of the three base cloud delivery models have
emerged, each comprised of a distinct combination of IT resources. Some
examples include:
• Storage-as-a-Service
• Database-as-a-Service
• Security-as-a-Service
• Communication-as-a-Service
• Integration-as-a-Service
• Testing-as-a-Service
• Process-as-a-Service
Note also that a cloud delivery model can be referred to as a cloud service
delivery model because each model is classified as a different type of
cloud service offering.
Combining Cloud Delivery Models - IaaS + PaaS
A PaaS environment will be built upon an underlying infrastructure comparable to
the physical and virtual servers and other IT resources provided in an IaaS
environment. Figure 4.14 shows how these two models can conceptually be
combined into a simple layered architecture.
From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini
(ISBN: 0133387526) Copyright © 2013 Arcitura Education, Inc. All rights reserved.
Combining Cloud Delivery Models - IaaS + PaaS
A cloud provider would not normally need to provision an IaaS environment from its
own cloud in order to make a PaaS environment available to cloud consumers.
Figure 4.15 shows an example of a contract between Cloud Providers X and Y, in which
services offered by Cloud Provider X are physically hosted on virtual servers belonging
to Cloud Provider Y. Sensitive data that is legally required to stay in a specific region is
physically kept in Cloud B, which is physically located in that region.
From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini
(ISBN: 0133387526) Copyright © 2013 Arcitura Education, Inc. All rights reserved.
Combining Cloud Delivery Models - IaaS + PaaS+ SaaS
All three cloud delivery models can be combined to establish layers of IT resources that build upon each
other. For example, by adding on to the preceding layered architecture shown in Figure 4.15, the ready-
made environment provided by the PaaS environment can be used by the cloud consumer organization
to develop and deploy its own SaaS cloud services that it can then make available as commercial
products (Figure 4.16).
From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini
(ISBN: 0133387526) Copyright © 2013 Arcitura Education, Inc. All rights reserved.
What are Cloud Computing Challenges?
Cloud servers and data storage generally require network connectivity
for resource access. If a network disruption occurs, service interrupted.
Cloud security considerations.
Cloud services can be costly.
Vulnerability to attacks.
Loss of control.
Technical problems. If technical problems emerge, the fix might depend
on cloud service providers.
Who Uses the Cloud?
Cloud Computing has broad appeal for:
People operating at the individual level
Employees of small and medium businesses
People in corporate environments
Individual Users
• Personal storage of digital resources has grown tremendously
• People store photos, videos, movies, music collections, eBooks, documents, family records,
recorded television programs, digitized art, souvenirs, digital keepsakes, correspondence, text
message streams, and countless other artifacts
Individual Motivations for Cloud Use
• All digital resources handily stored in a single place
• Provides backup for digital resources
• Cloud storage separates data from fragile digital devices
• Safeguards valuable digital holdings.
• Provides access to software and services for individuals
Cloud service users need to be vigilant in understanding the risks of data breaches in
this new environment.
Today Small and Medium Business (SMB) companies are increasingly realizing that
simply by tapping into the cloud they can gain fast access to best business applications
or drastically boost their infrastructure resources, all at negligible cost.
Resources: Choudhary V. Software as a service: implications for investment in software development. In:
International conference on system sciences, 2007, p. 209
Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A, Licciardi A, et al. Security guidance for critical
areas of focus in cloud computing, v2.1. CloudSecurityAlliance, 2009, 25 p.
Security issues in SaaS: Key Security Elements
• The following key security elements should be carefully considered as an integral part of
the SaaS application development and deployment process:
1) Data security
2) Network security
3) Data locality
4) Data integrity
5) Data segregation
6) Data access
7) Authentication and authorization.
Resources: Choudhary V. Software as a service: implications for investment in software development. In:
International conference on system sciences, 2007, p. 209
Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A, Licciardi A, et al. Security guidance for critical
areas of focus in cloud computing, v2.1. CloudSecurityAlliance, 2009, 25 p.
Security issues in SaaS: Key Security Elements
1) Data security
In the SaaS model, the enterprise data is stored outside the enterprise
boundary, at the SaaS vendor. Consequently, the SaaS vendor must adopt
additional security checks to ensure data security and prevent breaches due to
security vulnerabilities in the application or through malicious employees.
Malicious users can exploit weaknesses in the data security model to gain
unauthorized access to data.
Resources: Choudhary V. Software as a service: implications for investment in software development. In:
International conference on system sciences, 2007, p. 209
Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A, Licciardi A, et al. Security guidance for critical
areas of focus in cloud computing, v2.1. CloudSecurityAlliance, 2009, 25 p.
Security issues in SaaS: Key Security Elements
2) Network Security
All data flow over the network needs to be secured in order to prevent leakage of sensitive
information.
This involves the use of strong network traffic encryption techniques such as Secure Socket
Layer (SSL) and the Transport Layer Security (TLS) for security.
Malicious users can exploit weaknesses in network security configuration to sniff network
packets.
• Data integrity is one of the most critical elements in any system. Data integrity is easily
achieved in a standalone system with a single database.
• Data integrity in such a system is maintained via database constraints and transactions.
Transactions should follow ACID (atomicity, consistency, isolation and durability) properties
to ensure data integrity.
• Most databases support ACID transactions and can preserve data integrity.
• The lack of integrity controls at the data level (or, in the case of existing integrity controls,
bypassing the application logic to access the database directly) could result in profound
problems.
• Architects and developers need to approach this danger cautiously, making sure they do not
compromise databases’ integrity in their zeal to move to cloud computing..
Security issues in SaaS: Key Security Elements
5) Data Segregation
• Multi-tenancy is one of the major characteristics of cloud computing. So data of various users
will reside at the same location.
• Intrusion of data of one user by another becomes possible in this environment. This intrusion
can be done either by hacking through the loop holes in the application or by injecting client
code into the SaaS system.
• A SaaS model should therefore ensure a clear boundary for each user’s data. The service
should be intelligent enough to segregate the data from different users.
Security issues in SaaS: Key Security Elements
6) Data Access
• Data access issue is mainly related to security policies provided to the users while accessing
the data.
• In a typical scenario, a small business organization can use a cloud provided by some other
provider for carrying out its business processes. This organization will have its own security
policies based on which each employee can have access to a particular set of data.
• The security policies may entitle some considerations wherein some of the employees are
not given access to certain amount of data. These security policies must be adhered by the
cloud to avoid intrusion of data by unauthorized users.
• SaaS customers must remember to remove/disable accounts as employees leave the
company and create/enable accounts as come onboard. In essence, having multiple SaaS
products will increase IT management overhead.
• For example, SaaS providers can provide delegate the authentication process to the
customer’s internal server, so that companies can retain control over the management of
users.
Security issues in SaaS: Key Security Elements
7) Authentication and Authorization
Since the web applications and SaaS are tightly coupled in providing services to the cloud users,
most of the security threats of web application are also posed by the SaaS model of the cloud.
• Authentication is the process of validating that users are whom they claim to be. This is the first
and an important step in any security process.
• Authorization is the process in a system security which allows a user permission to access a
specific resource or function. It is the same as access control or client privilege for any user.
Security issues in PaaS
• In PaaS, the provider might give some control to the people to build applications on top of the
platform.
• But any security below the application level such as host and network intrusion prevention will
still be in the scope of the provider and the provider has to offer strong assurances that the data
remains inaccessible between applications.
• PaaS is intended to enable developers to build their own applications on top of the platform.
• As a result it tends to be more extensible than SaaS, at the expense of customer-ready features.
• This tradeoff extends to security features and capabilities, where the built-in capabilities are less
complete, but there is more flexibility to layer on additional security.
Security issues in IaaS
• With IaaS the developer has better control over the security
as long as there is no security hole in the virtualization
manager.
31