0% found this document useful (0 votes)
36 views21 pages

Lecture-2 Spring 2024

This document discusses various topics related to cloud computing including: 1. Different cloud computing hosting and pricing models like pay-as-you-go, subscription, and reserved instances. 2. Challenges of cloud computing including availability, data security, vendor lock-in, and performance unpredictability. 3. Ethical issues introduced by cloud computing such as loss of data control, increased risk of unauthorized access or data corruption, and implications for user privacy. 4. Vulnerabilities clouds face including infrastructure attacks and failures that can cause outages or loss of access.

Uploaded by

LAEVO Life
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views21 pages

Lecture-2 Spring 2024

This document discusses various topics related to cloud computing including: 1. Different cloud computing hosting and pricing models like pay-as-you-go, subscription, and reserved instances. 2. Challenges of cloud computing including availability, data security, vendor lock-in, and performance unpredictability. 3. Ethical issues introduced by cloud computing such as loss of data control, increased risk of unauthorized access or data corruption, and implications for user privacy. 4. Vulnerabilities clouds face including infrastructure attacks and failures that can cause outages or loss of access.

Uploaded by

LAEVO Life
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Course Title: Cloud Computing

Course Code: CSE- 472 , Spring 2022

SECTION 1: (Sunday) 6:30PM-9:30PM

Presented by
Dr. Rubaiyat Islam
Crypto-economist Consultant
Sifchain Finance, USA.
Adjunct Faculty, IUB.
OMDENA Local Chapter Lead, Bangladesh
Discussion :

By the Way….

What is Shared Hosting ?


What is VPS Hosting?
What is Cloud Hosting?
What are the differences among
three?

Source : Tony Teaches Tech

2
Discussion :

An open Question :

“ Web hosting is better in which platform


Shared hosting vs VPS vs Cloud Computing? ”

3
Paralellization Consideration

§ Speed of computation is
proportional to the square root
of system cost; they never
increase linearly. Therefore, the
faster a system becomes, the
more expensive it is to increase
its speed
§ Speed by a parallel computer
increases as the logarithm of
the number of processors (i.e., y
= klog(N)).
Let’s do a math to
understand Processing Need!

§ Suppose a company currently has a server with four processors


and wants to increase its speed by 50%. How many additional
processors will the company need to add? [Hint speed(y) =
k.log(N), where k=1 and N= number of processors]
Let’s do a math to
understand Processing Need!
Discussion :

§ VPS Speed test Criteria:


1. Selecting latest CPU and SSD
2. Selecting the closes region
3. Same OS
4. Largest VPS less than $15 or less
5. 2 GB or 1 GB memory
6. Running Geekbench speed test software
7. Testing hosted website latency( 2-3 seconds)
Source : Tony Teaches Tech

7
Discussion :

Geekbench Speed test Criteria:


Run extensive CPU workloads
Record Sigle / Multicore scores
Creating 20 GB files and random read test for 60
seconds

Source : Tony Teaches Tech

8
Discussion :
VPS Speed Tester Computing Use Case:
https://www.youtube.com/watch?v=Tk5dKs-JurA

9
Results
Combined comparison
Discussion :

So Finally we can say :

Shared Hosting ? -> low


traffic
VPS Hosting? - > Growing
sites, Technical manpower
Cloud Hosting? -> large,
complex sites

Source : Tony Teaches Tech

11
A case study
§ An e-commerce business that sells high-end luxury products is experiencing
rapid growth and an increase in website traffic. The company needs a hosting
solution that can accommodate the increased traffic and provide high
performance and security. However, the business has specific requirements that
limit the use of shared hosting. For example, the company's products require
high-quality images and videos that take up a lot of server resources. In
addition, the business is required to comply with strict security regulations that
mandate the use of advanced security measures. The company has just
transitioned from low demand to moderate demand in the market for their
offered products.
§ Based on the above scenario, which option would you recommend for the e-
commerce business, VPS or cloud computing service, and why?
Cloud ECONOMICS MODELS
§ Pay-as-you-go: This is the most common model, where customers
pay only for the resources they use, typically on an hourly or monthly
basis. This model is ideal for customers who have unpredictable or
changing resource needs, as they only pay for what they use and can
scale their usage up or down as needed.
§ Subscription: In this model, customers pay a fixed monthly or
annual fee for a set amount of resources, regardless of actual usage.
This model is ideal for customers who have a stable and predictable
resource demand, and who want to lock in a predictable cost.
§ Reserved Instances: In this model, customers pay a lower rate for
a commitment to use a certain amount of resources over a defined
period of time. This model is ideal for customers who have a steady
and predictable resource demand, and who want to save money in
exchange for a longer-term commitment.

13
Cloud ECONOMICS MODELS

§ Spot instances: In this model, customers bid on


unused capacity and can get a lower rate compared to
the standard rate. This model is ideal for customers
who have flexible workloads and can tolerate
interruption, as the capacity is not guaranteed and may
be terminated at any time.
§ Hybrid: This model allows customers to use a
combination of the above models, for example, using
reserved instances for their predictable workloads and
pay-as-you-go for their unpredictable workloads.

14
Challenges for cloud
computing
1. Availability of service: what happens when the service provider
cannot deliver?
- Downtime and Service Disruption
- Data Loss or Inaccessibility
- Breach of Service Level Agreements (SLAs)
- Loss of Customer Trust and Reputation

2. Data confidentiality and auditability, a serious problem.

3. Diversity of services, data organization, user interfaces available at


different service providers limit user mobility; once a customer is
hooked to one provider it is hard to move to another.

4. Data transfer bottleneck; many applications are data-intensive.

15
More challenges

5. Performance unpredictability, one of the consequences of resource


sharing.
§ How to use resource virtualization and performance isolation for QoS
guarantees?
§ How to support elasticity, the ability to scale up and down quickly?

6. Resource management: It is a big challenge to manage different


workloads running on large data centers. Are self-organization and
self-management the solution?

7. Security and confidentiality: major concern for sensitive


applications, e.g., healthcare applications.

Addressing these challenges is on-going work!

16
Ethical issues

§ Paradigm shift with implications on computing ethics:


§ The control is relinquished to third party services.
§ Data is stored on multiple sites administered by several
organizations.
§ Multiple services interoperate across the network.
§ Implications:
§ Unauthorized access.
§ Data corruption.
§ Infrastructure failure, and service unavailability.

17
De-perimeterisation

§ Systems can span the boundaries of multiple organizations


and cross the security borders.

§ The complex structure of Cloud services can make it


difficult to determine who is responsible in case something
undesirable happens.

§ Identity fraud and theft are made possible by the


unauthorized access to personal data in circulation and by
new forms of dissemination through social networks and
they could also pose a danger to Cloud Computing.

18
Privacy issues
§ Cloud service providers have already collected
petabytes of sensitive personal information stored in
data centers around the world. The acceptance of Cloud
Computing therefore will be determined by privacy
issues addressed by these companies and the countries
where the data centers are located.

§ Privacy is affected by cultural differences; some cultures


favor privacy, others emphasize community. This leads
to an ambivalent attitude towards privacy in the
Internet which is a global system.

19
Cloud Vulnerabilities

§ Clouds are affected by malicious attacks and failures of the


infrastructure, e.g., power failures.

§ Such events can affect the Internet domain name servers


and prevent access to a Cloud or can directly affect the
Clouds:
§ in 2004 an attack at Akamai caused a domain name outage and
a major blackout that affected Google, Yahoo, and other sites.
§ in 2009, Google was the target of a denial of service attack
which took down Google News and Gmail for several days;
§ in 2012 lightning caused a prolonged down time at Amazon.
20
Summary

§ Economies of Scales of cloud and other


technologies
§ Ethical issues in Cloud Computing.
§ Cloud vulnerabilities.

21

You might also like