Basics of Cloud Computing

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

Introduction to

Cloud Computing
Basics of Cloud Computing
A S S T. P R O F. H A R S H K A N TA W A L A

C O M P U T E R E N G I N E E R I N G D E P T,

G . H . P AT E L C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y harshkantawala@gcet.ac.in
ASST. PROF. HARSH KANTAWALA 2/8/2023 1
Introduction
❑ It is the use of remote servers on the internet to store manage and process data rather than local
servers.

❑ In the cloud model, the provider hosts, manages and maintains the intranet software; the
customer just pays a licensing fee and uses it on demand, with none of the operational overhead.

ASST. PROF. HARSH KANTAWALA 2/8/2023 2


Cloud Intranet
❑ A cloud-based intranet provides a simple, convenient alternative to traditional on-premises
software.

❑ In the cloud model, the provider hosts, manages and maintains the intranet software; the
customer just pays a licensing fee and uses it on demand, with none of the operational overhead.

ASST. PROF. HARSH KANTAWALA 2/8/2023 3


Cloud vs On-Premises Intranets
❑ With an on-premises intranet, you buy the software and own it.

❑ You host it in your own data center and shoulder all the associated costs and burdens.

❑ That includes purchasing and provisioning the hardware and other infrastructure that the
software runs on; installing, testing and deploying the software; maintaining and upgrading it;
applying patches and securing it; expanding capacity as needed as your usage grows.

ASST. PROF. HARSH KANTAWALA 2/8/2023 4


Cloud computing- Benefits
❑ Back-up and restore data: Once the data is stored in the cloud, it is easier to get back-up and restore
that data using the cloud
❑ Improved collaboration: Cloud applications improve collaboration by allowing groups of people to
quickly and easily share information in the cloud via shared storage.
❑ Excellent accessibility: Cloud allows us to quickly and easily access store information anywhere,
anytime in the whole world, using an internet connection. An internet cloud infrastructure increases
organization productivity and efficiency by ensuring that our data is always accessible.
❑ Low maintenance cost: Cloud computing reduces both hardware and software maintenance costs for
organizations.
❑ Mobility: Cloud computing allows us to easily access all cloud data via mobile.

ASST. PROF. HARSH KANTAWALA 2/8/2023 5


Cloud computing- Benefits
❑ Services in the pay-per-use model: Cloud computing offers Application Programming Interfaces
(APIs) to the users for access services on the cloud and pays the charges as per the usage of
service.

❑ Unlimited storage capacity: Cloud offers us a huge amount of storing capacity for storing our
important data such as documents, images, audio, video, etc. in one place.

❑ Data security: Data security is one of the biggest advantages of cloud computing. Cloud offers
many advanced features related to security and ensures that data is securely stored and handled.

ASST. PROF. HARSH KANTAWALA 2/8/2023 6


Cloud computing- Limitation
❑ Internet Connectivity: As you know, in cloud computing, every data (image, audio, video, etc.) is
stored on the cloud, and we access these data through the cloud by using the internet
connection. If you do not have good internet connectivity, you cannot access these data.
However, we have no any other way to access data from the cloud.

❑ Vendor lock-in: Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may
face problems when transferring their services from one vendor to another. As different vendors
provide different platforms, that can cause difficulty moving from one cloud to another.

ASST. PROF. HARSH KANTAWALA 2/8/2023 7


Cloud computing- Limitation
❑ Limited Control: As we know, cloud infrastructure is completely owned, managed, and monitored
by the service provider, so the cloud users have less control over the function and execution of
services within a cloud infrastructure.

❑ Security: Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be aware that you will
be sending all your organization's sensitive information to a third party, i.e., a cloud computing
service provider. While sending the data on the cloud, there may be a chance that your
organization's information is hacked by Hackers.

ASST. PROF. HARSH KANTAWALA 2/8/2023 8


Cloud computing- Security Risk
❑ Data Loss
❑ Hacked Interfaces and Insecure APIs
❑ Data Breach
❑ Vendor lock-in
❑ Increased complexity strains IT staff
❑ Spectre & Meltdown
❑ Denial of Service (DoS) attacks
❑ Account hijacking

ASST. PROF. HARSH KANTAWALA 2/8/2023 9


Data Loss
❑ Most common cloud security risks.

❑ Known as data leakage.

❑ The process in which data is being deleted, corrupted, and unreadable by a user, software, or
application.

❑ Data loss occurs when our sensitive data is somebody else's hands, one or more data elements
can not be utilized by the data owner, hard disk is not working properly, and software is not
updated.

ASST. PROF. HARSH KANTAWALA 2/8/2023 10


Hacked Interfaces and Insecure
APIs
❑ As we all know, cloud computing is completely depends on Internet, so it is compulsory to protect
interfaces and APIs that are used by external users.

❑ APIs are the easiest way to communicate with most of the cloud services.

❑ In cloud computing, few services are available in the public domain.

❑ These services can be accessed by third parties, so there may be a chance that these services
easily harmed and hacked by hackers.

ASST. PROF. HARSH KANTAWALA 2/8/2023 11


Data Breach
❑ Data Breach is the process in which the confidential data is viewed, accessed, or stolen by the
third party without any authorization, so organization's data is hacked by the hackers.

ASST. PROF. HARSH KANTAWALA 2/8/2023 12


Vendor lock-in
❑ Vendor lock-in is the of the biggest security risks in cloud computing.

❑ Organizations may face problems when transferring their services from one vendor to another.

❑ As different vendors provide different platforms, that can cause difficulty moving one cloud to
another.

ASST. PROF. HARSH KANTAWALA 2/8/2023 13


Increased complexity strains IT
staff
❑ Migrating, integrating, and operating the cloud services is complex for the IT staff.

❑ IT staff must require the extra capability and skills to manage, integrate, and maintain the data to
the cloud.

ASST. PROF. HARSH KANTAWALA 2/8/2023 14


Spectre & Meltdown
❑ Spectre & Meltdown allows programs to view and steal data which is currently processed on
computer.

❑ It can run on personal computers, mobile devices, and in the cloud.

❑ It can store the password, your personal information such as images, emails, and business
documents in the memory of other running programs.

ASST. PROF. HARSH KANTAWALA 2/8/2023 15


Denial of Service (DoS) attacks
❑ Denial of service (DoS) attacks occur when the system receives too much traffic to buffer the
server.

❑ Mostly, DoS attackers target web servers of large organizations such as banking sectors, media
companies, and government organizations.

❑ To recover the lost data, DoS attackers charge a great deal of time and money to handle the data.

ASST. PROF. HARSH KANTAWALA 2/8/2023 16


Account hijacking
❑ Account hijacking is a serious security risk in cloud computing.

❑ It is the process in which individual user's or organization's cloud account (bank account, e-mail
account, and social media account) is stolen by hackers.

❑ The hackers use the stolen account to perform unauthorized activities.

ASST. PROF. HARSH KANTAWALA 2/8/2023 17


Deployment Models of Cloud
❑ Public Cloud

❑ Private Cloud

❑ Hybrid Cloud

❑ Community Cloud

ASST. PROF. HARSH KANTAWALA 2/8/2023 18


Public Cloud
❑ The cloud infrastructure is made available to the general public or a large industry group and is
owned by an organization selling cloud services.

❑ Public cloud is a huge data center that offers the same services to all its users. The services are
accessible for everyone and much used for the consumer segment.

❑ Examples of public services are Facebook, Google and LinkedIn.

❑ Public cloud benefits: Low investment hurdle : Pay for what you use, Good test/development
environment for applications that scale to many servers

❑ Public cloud risks: Security concerns: Multi-tenancy and transfers over the Internet, IT
organization may react negatively to loss of control over data center function

ASST. PROF. HARSH KANTAWALA 2/8/2023 19


Private Cloud
❑ The cloud infrastructure is operated solely for a single organization. It may managed by the
organization or a third party and may exist on-premises or off-premises.
❑ Private cloud benefits:
▪ Fewer security concerns as existing data center security stays in place.
▪ IT organization retains control over data center.
❑ Private cloud risks:
▪ High investment hurdle in private cloud implementation, along with purchases of new hardware
and software.
▪ New operational processes are required; old processes not all suitable for private cloud.

ASST. PROF. HARSH KANTAWALA 2/8/2023 20


Hybrid Cloud
❑ The cloud infrastructure is a composition of two or more clouds (private, community or public) that
remain unique entities but are bound together by standardized or proprietary technology that enables
data and application portability (e.g., cloud bursting for load-balancing between clouds).
❑ Hybrid cloud benefits :
❑ a) Operational flexibility: Run mission critical on private cloud, dev/test on public cloud
❑ b) Scalability: Run peak and burst workloads on the public cloud
❑ Hybrid cloud risks :
❑ a) Hybrid clouds are still being developed; not many in real use
❑ b) Control of security between private and public clouds, some of same concerns as in public cloud

ASST. PROF. HARSH KANTAWALA 2/8/2023 21


Community Cloud
❑ The cloud infrastructure is shared by several organizations and supports a specific community that
has shared concerns (e.g. mission, security requirements, policy, or compliance considerations). It
may be managed by the organizations or a third party and may exist on-premises or off-premises.

ASST. PROF. HARSH KANTAWALA 2/8/2023 22


Public Cloud vs Private Cloud
Public cloud Private Cloud

Public cloud infrastructure is offered via web applications and Private cloud infrastructure is dedicated to a single
also as web services over Internet to the public. organization.

Support multiple customer Support dedicated customer

Full utilized of infrastructure. Does not utilize shared infrastructure

Security is low as compared to private cloud High level of security


Low cost High cost

Azure, Amazon Web Services, Google App Engine and An example of the Private Cloud is NIRIX's one Server with
Force.com are a few examples of public clouds dedicated servers

ASST. PROF. HARSH KANTAWALA 2/8/2023 23


Service Models

ASST. PROF. HARSH KANTAWALA 2/8/2023 24


Software as a Service (SaaS)
❑ Software as a Service (SaaS/on-demand software), is a software delivery model in which software
and its associated data are hosted centrally and accessed using a thin-client, usually a web
browser over the internet.

❑ Simply put, SaaS is a method for delivering software that provides remote access to software as a
web based service. The software service can be purchased with a monthly fee and pay as you go.

ASST. PROF. HARSH KANTAWALA 2/8/2023 25


Software as a Service (SaaS)
❑ SaaS is a model of software deployment where an application is hosted as a service provided to
customers across the Internet.

❑ Saas alleviates the burden of software maintenance/support but users relinquish control over
software versions and requirements.

❑ Terms that are used in this sphere include

• Platform as a Service (PaaS) and

• Infrastructure as a Service (IaaS)

ASST. PROF. HARSH KANTAWALA 2/8/2023 26


Applicability of SAAS
❑ Enterprise Software application:
Sharing of data between internal and external users e.g. : Salesforce CRM application
❑ Single user Software application
Runs on single user computer and serves 1 user at a time e.g. : Microsoft office
Business Utility SaaS - Applications like Salesforce automation are used by businesses and
individuals for managing and collecting data, streamlining collaborative processes and
providing actionable analysis. Popular use cases are Customer Relationship Management
(CRM), Human Resources and Accounting.
Social Networking SaaS - Applications like Facebook are used by individuals for networking
and sharing information, photos, videos, etc.

ASST. PROF. HARSH KANTAWALA 2/8/2023 27


Important factors for good design of SAAS model
❑ Three distinct points that separates a well-design from a poorly designed SAAS
application
▪ Scalability
▪ Multi tenant efficient
▪ Configurable
❑ Scalability- maximizing concurrency, and efficient use of resources
▪ Optimizing locking duration, statelessness, sharing pooled resources such as
threads and network connections, caching reference data, and partitioning large
databases

ASST. PROF. HARSH KANTAWALA 2/8/2023 28


Cont..

Configurable - a single application instance on a single server has


to accommodate users from several different companies
◦ Customizing the application for one customer will change the application
for other customers as well.
Traditionally customizing an application would mean changes in
the code.
Each customer must use metadata to configure the way the
application appears and behaves for its users.
Customers configuring applications must be simple and easy
without any extra development or operation costs

ASST. PROF. HARSH KANTAWALA 2/8/2023 29


Cont..

Multi-tenancy – important architectural shift from designing


isolated, single-tenant applications
◦ One application instance should accommodate users from multiple other
companies at the same time while providing transparency
◦ This requires an architecture that maximizes the sharing of resources
efficiently across tenants

ASST. PROF. HARSH KANTAWALA 2/8/2023 30


Thank You…

ASST. PROF. HARSH KANTAWALA 2/8/2023 31

You might also like