Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 60

Cloud Computing CSE 6145

-Introduction to Cloud Computing-

Prof. Dr. A.K.M. Muzahidul Islam


Computer Science & Engineering (CSE)
United International University (UIU)

Spring 2020
Course Outline: Summary
1. Topic 1: Introduction to Cloud Computing

2. Topic 2: Cloud Infrastructure


3. Topic 4: Cloud Application
• Sensor/Mobile Cloud Computing
4. Topic 5: Virtualization
5. Topic 6: Cloud Security
Schedule
– Section ‘M’
• Friday
– 11:00 a.m.~ 1:30 p.m.
– Room No. 0432
• Counseling
– 10:00 a.m.~ 11:00 a.m. (Friday)
– Room No. 333/D (Level 3)
Assessment
– Attendance : 5%
– Class Tests : 10%
– Mid Term : 20%
– Final : 40%
– Project : 25%

Grading Policy
A (Plain) : 90-100 C+ (Plus) : 70-73
A- (Minus) : 86-89 C (Plain) : 66-69
B+ (Plus) : 82-85 C- (Minus) : 62-65
B (Plain) : 78-81 D+ (Plus) : 58-61
B- (Minus) : 74-77 D (Plain) : 55-57
Overview
• Introduction to Cloud Computing
• Cloud Deployment Models
• Types of Cloud
• Cloud Providers
Introduction
• The term “Cloud” swept on into the scene in recent years and looks like
its a new technology.
• However, it’s just a very nice packaging up of a whole number of
technologies that have actually been with us for some time.
• It can really be thought of as just
 Outsourcing the hosting of your applications
 Outsourcing the hosting of your physical servers to someone else.
 Renting Space and Renting time on someone else’s computers.
• These days, due to huge computational capabilities,
new and fancier technologies have lent themselves of hosting all the more
software and
putting all of the more hardware off-site in the so-called cloud
• So that companies no longer need to host their own physical hardware or
event a whole number of roles in their premises
An Example
Inside of the cloud are things like Routers, and
A running through those Routers are packets, both
TCP/IP, etc.
Laptop
Underneath of this cloud some Transport
Mechanism that gets data from point A (e.g.
Cloud Laptop) to point B (e.g. Web/Email Server, Social
P/IP,
(Router, TC Media site, etc.).
t M ec ha nism, etc.)
Transpor
One can use any number of languages, DBs with
little experiences to get a website up on the
Internet → It’s not that hard initially.
B
However, things start to get hard quickly, if many
Server users hitting the website(s) it’s become difficult
for the servers to handle all of the load (i.e. no.
of users per minute or per unit of time) as there
are finite number of resources e.g. HDD, RAM,
CPU, Code, etc. Example, 1000 users per minute
or second.
An Example (Cont’d)
What is the solution?
A
Increase Capacity - Add Another Server, where in
Laptop both Servers exactly the same software is running .

Cloud How to get traffic in both Servers?


P/IP,
(Router, TC
t M ec ha nism, etc.) www.website.com
Transpor
However, you may see the following:
www1.website.com
B www2.website.com
--------------------------
Server-1 wwwn.website.com
Server-2
By giving different names (but similar names) to
their servers. And then they somehow redirect
users from their main domain i.e.
www.website.com to any of these servers.
An Example (Cont’d)

Laptop Laptop

Cloud Cloud
P/IP, P/IP,
(Router, TC (Router, TC
t M ec ha nism, etc.) t M ec ha nism, etc.)
Transpor Transpor

LB Load Balancer - Route request LB LB


to the particular server, often in
round robin method.

50 50 50 50

Server-2 Server-1 Server-2 Server-1


Vertical Scaling Horizontal Scaling

Laptop Laptop

Cloud Cloud

LB LB

1 2 3 1 2 3
What is Cloud?
• It has a huge space that is available online for usage
• It is a collection of data centers that host application
and store data
– Make sure that one can manage all of his/her
applications, recourses, etc. combining all data
centers through a network and
– Give you control to use these resources and
mange them properly.
Cloud Computing
• Uses Internet technologies to offer scalable and elastic services.
The term “elastic computing” refers to the ability of dynamically
acquiring computing resources and supporting a variable workload.

• The resources used for these services can be metered and


the users can be charged only for the resources they used.

• The maintenance and security are ensured by service providers.

• The service providers can operate more efficiently due to


specialization and centralization.

Cloud Computing: Theory and Practice. 13


Dan C. Marinescu
Chapter 1
Cloud Computing (Cont’d)
• Lower costs for the cloud service provider are past to
the cloud users.

• Data is stored:
– closer to the site where it is used.
– in a device and in a location-independent manner.

• The data storage strategy can increase reliability, as


well as security, and can lower communication costs.

Cloud Computing: Theory and Practice. 14


Dan C. Marinescu
Chapter 1
Why Cloud?
• Before Cloud Computing:
– Suppose you want to host a website, the following things
that you need to do
• Buy a stack of servers : Servers are usually very expensive, thus
one end up paying a lot of money
• Monitoring and Maintain Servers : Hire Engineers or Technicians
to maintain the serves.
• High Traffic, then install more Servers : To handle higher data
traffic it is required that extra devices are deployed.
– Disadvantages
• Setup is very expensive
• Troubleshooting problems are tedious
• Since traffic may vary, most of the time the server is idle
Advantages of Cloud Computing
Greater Mobility: Information can be accessed at anytime from
anywhere unlike traditional system (storing information in
personal computer and accessing only when near it).
Cost Reduction: Reduced costs due to more rapid deployment
services and operational efficiencies. Eliminates the initial
investment costs for a private computing infrastructure and the
maintenance and operation costs.
Increased Storage: At the point when compared to private
computer systems, large amount of data can be stored than
usual.
Elasticity: Elastic nature of the infrastructure allows to swiftly
allocate and deallocate vastly scalable resources to business
services on a demand basis.
Advantages (Cont’d)
• Resources, such as CPU cycles, storage, network bandwidth,
are shared.
• When multiple applications share a system, their peak
demands for resources are not synchronized thus,
multiplexing leads to a higher resource utilization.
• Resources can be aggregated to support data-intensive
applications.
• Data sharing facilitates collaborative activities. Many
applications require multiple types of analysis of shared data
sets and multiple decisions carried out by groups scattered
around the globe.
• User convenience: virtualization allows users to operate in
familiar environments rather than in idiosyncratic ones.
18
Characteristics of Cloud Computing
According to the NIST cloud computing contains following five
essential characteristics:
A. On-demand self-service: Provision computer services such as
email, network, application and computer capabilities. It also
provision server service without human interaction from each service
provider.
B. Broad network access: Computing capabilities are available over
the network and can be accessed through standard mechanisms that
promote the use of heterogeneous thin or thick client platform.
C. Resource pooling: The computing resources of the providers are
pooled to support multiple consumers using a multi-tenant model
with different virtual and physical resources dynamically assigned
and reassigned according to consumer demand. The consumer has
no idea or knowledge over the exact location of the resources but
can access and use data at any time from any location.
Characteristics (Cont’d)
According to the NIST cloud computing contains following five
essential characteristics:

D. Rapid Elasticity: Computing capabilities can be rapidly and


elastically provisioned. The resource pooling and self-service make it
possible. The provider can automatically distribute more or less
resources from available pool.

E. Measured Service: Cloud systems, in this case, automatically


control and manage resource use by leveraging a metering capability
at some level of abstraction as it seen appropriate to the type of
service.
Brief history
• Is cloud Computing New?
• Time Sharing: 1970s
• Large Distributed Data Centers 1980s-1990s
• Internet Computing 2000-Present
• What is new in cloud computing today?
– Faster data communication
– Faster and more reliable computing
– Denser and cheaper storage
– Newer Programming paradigms
– Comprehensive Computational resource sharing
Types of Clouds
• Choosing the suitable type of cloud computing deployment model is
very important for an institution.
• Institutions must analyze their data precisely before deciding which
type of model to choose in order to avoid failure of implementation.

There are four common cloud deployment models :

• Private Cloud – The infrastructure is operated solely for an organization.


• Public Cloud - The infrastructure is made available to the general public or
a large industry group and is owned by the organization selling cloud
services.
• Hybrid Cloud - Composition of two or more clouds (public, private, or
community) as unique entities but bound by standardized technology that
enables data and application portability.
22
• A private cloud is one
in which the services
and infrastructure are
maintained on a
private network. 
• A public cloud is one
in which the services
and infrastructure are
provided off-site over
the Internet. 
•A hybrid cloud
includes a variety of
public and private
options with multiple
providers.
https://www.dummies.com/programming/networking/comparing-public-private-and-hyb
rid-cloud-computing-options/
Private Cloud
The cloud infrastructure is operated exclusively for an organization (not
accessible by the public).
It may be controlled by the organization or a third party and might exist on
premise or off premise.
Some characteristics of private cloud are listed below:
Enhanced security measures: Private cloud model ensures security against
illegal usage, such as hacking by providing strong security tools.
Dedicated Resources: Like a supporter of private cloud, enterprises have their
own committed resources, for instance, the time of processor and the data
buses that assure ideal execution.
Better Customization: The private cloud model is customizable as it could be
constructed to outfit the perfect requests of a commercial enterprise. This in
turns permits the commercial enterprise to take additional manage over their
own data to ensure security.
24
Public Cloud
The public cloud model offers data storages, applications and other services
to its users and owned by the service provider (pay-per-usage model).
Users can scale their use on demand and do not have to buy hardware for the
service. Example: Residential users that connect to the internet through an ISP.

Flexible and elastic environment: Public cloud provides an elastic environment


to its users . It allows customers to share and store information on their
demand.
Freedom of self-service: The public cloud conjures up it customers in making a
cloud all on my own exceptional of taking anybody's assistance. They do not
need to depend on any third-party support in making or running kind of cloud.
Pay-Per-Use: This unique function empowers the era of cloud to be greater
reachable by organizations to operate in a synchronized manner.
Availability and Reliability: The users have the opportunity to time their work
from anywhere in the glob and at any time. 25
Hybrid Cloud
Hybrid cloud is made from lots of both public or private cloud that is
shared among the institutions that have similar interests and necessities.
Hybrid cloud infrastructure is a composition of two or more clouds which can
be unique entities and are bound collectively by using standardized or
proprietary technology that permits data and application portability.

The characteristics of hybrid cloud include:


Optimal Use: The typical centres of data in the server resources are used from
5 to 20% – making unnecessary costs. Hybrid cloud could expand server use
with the aid of scaling out the open assets to take care of the hosts.
Availability: In a hybrid cloud, the general public cloud would possibly scale up
or completely overtake operations if the organization's server is not available
due to some failures.
Risk Transfer: Using the hybrid cloud, the danger of misestimating workload is
relocated to the cloud dealer from the service operator. 26
Community Cloud
The community cloud is supervised and utilized by a different number of
institutions that have the identical core business, initiatives or shareable needs
infrastructures which include software program and hardware so that the
running can be reduced [6].
It aspires to combine distributed resource provision from grid computing,
distributed manipulate from virtual ecosystems and sustainability from green
computing, with the use instances of cloud computing, at the same time as
making greater use of self management advances from autonomic computing.

The advantages of community cloud include [5]:


Cost of establishing a communal cloud versus personal private cloud can be
cheaper because of the distribution of costs among all participants.
Tools located inside the community cloud can be used to leverage the
information stored to serve consumers and the supply chain.
 Management of the community cloud can be outsourced to a cloud provider.27
Cloud Delivery Models

Software as a Service (SaaS),

Platform as a Service (PaaS),

Infrastructure as a Service (IaaS).

As big data cloud computing and internet technology grow, they raise a
new concept of services. This services can interconnect huge number of
online activities.
As per a review from Cisco, the Internet of Things (IoT) is dynamically
expanding the abilities of the cloud.
The major three service models are SaaS, PaaS and IaaS. 28
Software-as-a-Service (SaaS)
• Applications are supplied by the service provider.
• The user does not manage or control the underlying cloud infrastructure
or individual application capabilities.
• Services offered include:
– Enterprise services such as: workflow management, group-ware and
collaborative, supply chain, communications, digital signature, customer
relationship management (CRM), desktop software, financial management,
geo-spatial, and search.
– Web 2.0 applications such as: metadata management, social networking,
blogs, wiki services, and portal services.
• Not suitable for real-time applications or for those where data is not
allowed to be hosted externally.
• Examples: Gmail, Google search engine.

Cloud Computing: Theory and Practice. 29


Dan C. Marinescu
Chapter 1
In SaaS, the cloud provider is only authorized to control
the application level.

The subscriber does not control or manage middleware,


hardware or operating system.
Platform-as-a-Service (PaaS)
• Allows a cloud user to deploy consumer-created or acquired applications
using programming languages and tools supported by the service provider.
• The user:
– Has control over the deployed applications and, possibly, application
hosting environment configurations.
– Does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, or storage.
• Not particularly useful when:
– The application must be portable.
– Proprietary programming languages are used.
– The hardware and software must be customized to improve the
performance of the application.

Cloud Computing: Theory and Practice. 31


Dan C. Marinescu
Chapter 1
PaaS offers to create and modify applications where in SaaS
application is typically possessed by the cloud provider.

In PaaS model, the consumer is permitted to write applications that


run on the provider’s specific surroundings.

A PaaS provider gives its consumers an extra Application Programming


Interface (API) for dynamically adjusting the computational resources
(e.g. memory, storage disk).
Infrastructure-as-a-Service (IaaS)
• The user is able to deploy and run arbitrary software, which can include
operating systems and applications.

• The user does not manage or control the underlying cloud infrastructure
but has control over operating systems, storage, deployed applications,
and possibly limited control of some networking components, e.g., host
firewalls.

• Services offered by this delivery model include: server hosting, Web


servers, storage, computing hardware, operating systems, virtual
instances, load balancing, Internet access, and bandwidth provisioning.

Cloud Computing: Theory and Practice. 33


Dan C. Marinescu
Chapter 1
The ability gave to the customer is to arrangement processing,
networks, storage, and other computing resources where the
customer can convey and run arbitrary software, which can
incorporate operating systems and applications.
Cloud Providers
Cloud Architecture
(NIST Cloud Reference Model)

Five (05) important factors have an effect on Cloud Computing:

Cloud Consumer: An individual or organization that keeps up a business


association with, and uses services from cloud provider.
Cloud Provider: An individual or organization for creating a service
accessible to interested parties.
Cloud Auditor: A party that can conduct autonomous appraisal of cloud
administrations, data framework operations, performance and security
of the cloud usage.
Cloud Broker: An entity that deals with utilization, performance and
delivery of cloud services and negotiates relationships between cloud
consumers and providers.
Cloud Carrier: A medium that provides network and transport of cloud
services from cloud providers to cloud consumers.
NIST Cloud Reference Model
Carrier

Service
Consumer Service Provider Broker

Service Layer Service


Management Intermediation
SaaS
S P
PaaS
IAAS
Business e r
Auditor support
IaaS c i
Security
u v
Aggregation

audit Resource r a
abstraction and Provisioning i
control layer c
Privacy t y
impact audit Physical resource
y
layer Arbitrage
Portability/
Hardware Interoperability
Performance
audit
Facility

Carrier

Figure 1. NIST Cloud Computing Reference Architecture 37


Cloud activities

• Service management and provisioning


including:
– Virtualization.
– Service provisioning.
– Call center.
– Operations management.
– Systems management.
– QoS management.
– Billing and accounting, asset management.
– SLA management.
– Technical support and backups.

Cloud Computing: Theory and Practice. 39


Dan C. Marinescu
Chapter 1
Cloud activities (cont’d)

• Security management including:


– ID and authentication.
– Certification and accreditation.
– Intrusion prevention.
– Intrusion detection.
– Virus protection.
– Cryptography.
– Physical security, incident response.
– Access control, audit and trails, and firewalls.

Cloud Computing: Theory and Practice. 40


Dan C. Marinescu
Chapter 1
Cloud activities (Cont’d)

• Customer services such as:


• Customer assistance and on-line help.
• Subscriptions.
• Business intelligence.
• Reporting.
• Customer preferences.
• Personalization.
• Integration services including:
• Data management.
• Development.

Cloud Computing: Theory and Practice. 41


Dan C. Marinescu
Chapter 1
Thank You
References
• Cloud Computing – Architecture, Platform and
Security Issues: A Survey
Why cloud computing could be successful when other
paradigms have failed?

• It is in a better position to exploit recent advances in software, networking,


storage, and processor technologies promoted by the same companies who
provide cloud services.
• It is focused on enterprise computing; its adoption by industrial organizations,
financial institutions, government, and so on could have a huge impact on the
economy.
• A cloud consists of a homogeneous set of hardware and software resources.
• The resources are in a single administrative domain (AD). Security, resource
management, fault-tolerance, and quality of service are less challenging than in a
heterogeneous environment with resources in multiple ADs.

Cloud Computing: Theory and Practice. 45


Dan C. Marinescu
Chapter 1
Challenges for cloud computing

• Availability of service; what happens when the service provider cannot


deliver?

• Diversity of services, data organization, user interfaces available at


different service providers limit user mobility; once a customer is
hooked to one provider it is hard to move to another. Standardization
efforts at NIST!

• Data confidentiality and auditability, a serious problem.

• Data transfer bottleneck; many applications are data-intensive.

Cloud Computing: Theory and Practice. 46


Dan C. Marinescu
Chapter 1
More challenges
• Performance unpredictability, one of the consequences of resource
sharing.
– How to use resource virtualization and performance isolation for QoS
guarantees?
– How to support elasticity, the ability to scale up and down quickly?

• Resource management; are self-organization and self-management the


solution?

• Security and confidentiality; major concern.

• Addressing these challenges provides good research opportunities!!

Cloud Computing: Theory and Practice. 47


Dan C. Marinescu
Chapter 1
Network-centric computing

• Information processing can be done more efficiently on large farms of


computing and storage systems accessible via the Internet.
– Grid computing – initiated by the National Labs in the early 1990s; targeted
primarily at scientific computing.
– Utility computing – initiated in 2005-2006 by IT companies and targeted at
enterprise computing.
• Grid computing is distributed system, a large number of loosely coupled,
heterogeneous, and geographically dispersed systems in different
administrative domains. The term grid computing is a metaphor of electric
grid.
• The focus of utility computing is on the business model for providing
computing services; it often requires a cloud-like infrastructure.
• Cloud computing is a path to utility computing embraced by major IT
companies including: Amazon, HP, IBM, Microsoft, Oracle, and others.

Cloud Computing: Theory and Practice. 48


Dan C. Marinescu
Chapter 1
Network-centric content

• Content: any type or volume of media, be it static or dynamic, monolithic or


modular, live or stored, produced by aggregation, or mixed.
• The “Future Internet” will be content-centric.
The creation and consumption of audio and visual content is likely to
transform the Internet to support increased quality in terms of resolution,
frame rate, color depth, stereoscopic information.

Cloud Computing: Theory and Practice. 49


Dan C. Marinescu
Chapter 1
Network-centric computing and content
• Data-intensive: large scale simulations in science and engineering require
large volumes of data. Multimedia streaming transfers large volume of
data.
• Network-intensive: transferring large volumes of data requires high
bandwidth networks.
• Low-latency networks for data streaming, parallel computing, computation
steering.
• The systems are accessed using thin clients (e.g., Google Chrome OS)
running on systems with limited resources, e.g., wireless devices such as
smart phones and tablets.
• The infrastructure should support some form of workflow management,
i.e., complex computational tasks require coordination of several
applications

Cloud Computing: Theory and Practice. 50


Dan C. Marinescu
Chapter 1
Advantages of Network-centric computing and content

• Computing and communication resources (CPU cycles,


storage, network bandwidth) are shared and
resources can be aggregated to support data-intensive
applications
• Data sharing facilitates collaborative activities
• Cost reduction: pay as you go model, eliminate initial
investment, reduces significantly maintenance and
operation costs
• User convenience and elasticity, accommodate very
large peak-to-average ratios
Cloud Computing: Theory and Practice.
Dan C. Marinescu 51
Chapter 1
Evolution of concepts and technologies
• The concepts and technologies for network-centric computing and content
evolved along the years.

– The web and the semantic web - expected to support composition of services.
The web is dominated by unstructured or semi-structured data, while the
semantic web advocates inclusion of sematic content in web pages.
– The Grid - initiated in the early 1990s by National Laboratories and
Universities; used primarily for applications in the area of science and
engineering.
– Peer-to-peer systems.
– Computer clouds.

Cloud Computing: Theory and Practice. 52


Dan C. Marinescu
Chapter 1
Delivery models
Software as a Service (SaaS) Deployment models
Platform as a Service (PaaS) Public cloud

Infrastructure as a Service (IaaS) Private cloud

Community cloud
Hybrid cloud

Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Utility computing. Pay-per-usage
Resources
Accessible via the Internet
Compute & storage servers
Networks Services Elasticity

Applications

Cloud Computing: Theory and Practice. 53


Dan C. Marinescu
Chapter 1
Infrastructure as a Service

Presentation

API

Applications

Platform as a Service Data Metadata

Integration and Integration and


Software as a Service middleware middleware

API API API

connectivity

connectivity
Abstraction

Abstraction
connectivity
Abstraction

Core

Core
Core

Hardware Hardware Hardware

Facilities Facilities Facilities

Cloud Computing: Theory and Practice. 54


Dan C. Marinescu
Chapter 1
Ethical issues
• Paradigm shift with implications on computing ethics:
• The control is relinquished to third party services.
• The data is stored on multiple sites administered by
several organizations.
• Multiple services interoperate across the network.
• Implications
• Unauthorized access.
• Data corruption.
• Infrastructure failure, and service unavailability.

Cloud Computing: Theory and Practice. 55


Dan C. Marinescu
Chapter 1
De-perimeterisation

• Systems can span the boundaries of multiple organizations and cross the
security borders.

• The complex structure of cloud services can make it difficult to determine


who is responsible in case something undesirable happens.

• Identity fraud and theft are made possible by the unauthorized access to
personal data in circulation and by new forms of dissemination through
social networks and they could also pose a danger to cloud computing.

Cloud Computing: Theory and Practice. 56


Dan C. Marinescu
Chapter 1
Privacy issues

• Cloud service providers have already collected petabytes of sensitive


personal information stored in data centers around the world. The
acceptance of cloud computing therefore will be determined by privacy
issues addressed by these companies and the countries where the data
centers are located.

• Privacy is affected by cultural differences; some cultures favor privacy,


others emphasize community. This leads to an ambivalent attitude
towards privacy in the Internet which is a global system.

Cloud Computing: Theory and Practice. 57


Dan C. Marinescu
Chapter 1
Cloud vulnerabilities

• Clouds are affected by malicious attacks and failures of the infrastructure, e.g.,
power failures.

• Such events can affect the Internet domain name servers and prevent access
to a cloud or can directly affect the clouds:
• in 2004 an attack at Akamai caused a domain name outage
and a major blackout that affected Google, Yahoo, and
other sites.
• in 2009, Google was the target of a denial of service attack
which took down Google News and Gmail for several days;
• in 2012 lightning caused a prolonged down time at
Amazon.

Cloud Computing: Theory and Practice. 58


Dan C. Marinescu
Chapter 1
References:
Cloud Computing – Architecture, Platform and Security Issues:
A Survey Md. Sakib Bin Alam Department of Computer Science
and Engineering, Faculty of Science and Engineering,
International Islamic University Chittagong, Chittagong - 4318,
Bangladesh

Thank You
References
• Cloud Computing – Architecture, Platform and
Security Issues: A Survey

You might also like