Cloud Computing Document
Cloud Computing Document
CLOUD COMPUTING
_______________________________________________
Activities
Week One Introduction ,Understanding the nature of cloud
CONTENTS
1. Introduction-------------------------------------------------------------Pg4
What is Cloud Computing?
The Cloud Environment
1. INTODUCTION
Welcome to Cloud Computing.
Cloud computing is more than a service sitting in some remote data centre. It’s a set of approaches
that can help organizations quickly, effectively add and subtract resources in almost real time. Unlike
other approaches, the cloud is as much about the business model as it is about technology Companies
clearly understand that technology is at the heart of how they operate their businesses.
Fig 1) Wide spread of Cloud Computing: Databases, Mobiles, Tablets, Network, and Server etc.
Well; Cloud computing is a type of computing that relies on shared computing resources rather than
having local servers or personal devices to handle applications. In its most simple description, cloud
computing is taking services "CLOUD SERVICES" and moving them outside an organization's
firewall. Applications, storage and other services are accessed via the Web. The services are delivered
and used over the Internet and are paid for by the cloud customer on an as-needed or pay-per-use
business model.
Fig 2) The Cloud Environment where all the necessary devices (Gadgets) is connected t the Cloud
Cloud computing is older than it seems; cloud marked its era in early 1960’s. That time the initial
concept of time-sharing became popular via RJE (Remote Job Entry) this terminology was mostly
associated with large vendors such as IBM (International Business Machine Corp.) and DEC (Digital
Equipment Corporation). But, the term “CLOUD COMPUTING” was popularized
with Amazon.com releasing its Elastic Compute Cloud product in 2006, references to the phrase
"cloud computing" appeared as early as 1996, with the first known mention in a Compaq internal doc.
After the Amazons Elastic Compute Cloud in April 2008 Google released its Google App Engine in
beta that was very effective for modern day technology. The CLOUD was taking shape, after Google
it was Open Nebula1 by NASA which was first open source software for developing private and
Hybrid clouds, and for the federation of clouds. Further more in 2010 Microsoft evolved by it concept
of Microsoft Asure which was a cloud computing service created by Microsoft for building, testing,
deploying, and managing applications and services through a global network of Microsoft
managed data centres. It provides Software as a Service (SaaS), platform as a service (PaaS)
and infrastructure as a service (IaaS) and supports many different programming languages, tools and
frameworks, including both Microsoft-specific and third-party software and systems; And so on the
cloud was growing rapidly according to its needs and efficiency over data that it showed in real-time.
1
Open Nebula: Open Nebula provides the most simple but feature-rich and flexible solution for the comprehensive
management of virtualized data centres to enable private, public and hybrid IaaS clouds.
NON-TEACHING CREDIT COURSE 7
Cloud computing also examines how companies are using the cloud to control IT expenditures as they
prepare to move to a service-centric world.
The vendors providing applications and enabling technology, infrastructure, hardware, and
integration.
The partners of these vendors that are creating cloud services offerings and providing
support services to customers.
The business leaders themselves who are either using or evaluating various types of cloud
computing offerings.
The goal of cloud computing is to allow users to take benefit from all of these technologies, without
the need for deep knowledge about or expertise with each one of them. The cloud aims to cut costs,
and helps the users focus on their core business instead of being impeded by IT obstacles. The main
enabling technology for cloud computing is virtualization. Virtualization software separates a
physical computing device into one or more "virtual" devices, each of which can be easily used and
managed to perform computing tasks.
COST: First thing that come in mind is cost efficiency that how cheap it can go. Cost reductions
are claimed by cloud providers. A public-cloud delivery model converts to operational
expenditure. This purportedly lowers barriers to entry, The e-FISCAL project's state-of-the-art
repository contains several articles looking into cost aspects in more detail, most of them
NON-TEACHING CREDIT COURSE 8
concluding that costs savings depend on the type of activities supported and the type of
infrastructure available in-house.
PRODUCTIVITY: It may be increased when multiple users can work on the same data
simultaneously, rather than waiting for it to be saved and emailed. Time may be saved as
information does not need to be re-entered when fields are matched, nor do users need to install
application software upgrades to their computer.
ON-DEMAND SELF-SERVICE: This means that cloud customers can sign up for, pay for and
start using cloud resources very quickly on their own without help from a sales agent.
RAPID ELASTICITY OR EXPANSION: Cloud customers can easily scale their use of
resources up or down as their needs change.
There are many more characteristics but as of now these are very popular and in the mouth of all
the professionals.
Fig 3: (a) gives relevant cloud characteristics enlisted above (b) an example of one of the cloud
characteristics in working (a working of LAW firm)
NON-TEACHING CREDIT COURSE 9
SaaS is a software delivery method that provides access to software and its functions remotely as
a Web-based service. Instead of paying an upfront fee to purchase and/or license software, SaaS
customers pay a recurring (often monthly or annual) fee to subscribe to the service. In general,
they can access the SaaS from any Internet-connected device, any time day or night. Well-known
examples of SaaS include Salesforce.com, Microsoft Office 365, Google G Suite, Dropbox,
Adobe Creative Cloud and others.
STORAGE AS A SERVICE(SAAS) :
This is a term used to describe a storage model where a business or organization (the client) rents
or leases storage space from a third-party provider. Data is transferred from the client to the
service provider via the Internet and the client would then access their stored data using software
provided by the storage provider. The software is used to perform common tasks related to
storage, such as data backups and data transfers.
PaaS is a computing platform being delivered as a service. Here the platform is outsourced in
place of a company or data centre purchasing and managing its own hardware and software layers.
Most PaaSes are designed for developers and aim to simplify the process of creating and
deploying software. For example, a Web developer might use a PaaS that includes operating
system software, Web server software, a database and related Web development tools. The
leading PaaS vendors include Amazon Web Services, Microsoft Azure2, IBM and Google Cloud
Platform.
2
MICROSOFT AZURE: is a cloud computing service created by Microsoft for building, testing, deploying, and
managing applications and services through a global network of Microsoft-managed data centres. It provides
Software as a Service (SaaS).
NON-TEACHING CREDIT COURSE 10
Computer infrastructure, such as servers, storage and networking delivered as a service. IaaS is
popular with enterprises that appreciate the convenience of having the cloud vendor manage their
IT infrastructure. They also sometimes see cost savings as a result of paying only for the
computing resources they use. The leading IaaS vendors include Amazon Web Services,
Microsoft Azure, IBM and Google Cloud Platform.
While SaaS, PaaS and IaaS are the three most common types of cloud services, cloud computing
vendors sometimes also use other "as a service" labels to describe their offerings. For example,
some offer database as a service (DBaaS), mobile back-end as a service (MBaaS), functions as a
service (FaaS)
Fig 4: This image gives the detailed view of all kind of services i.e. IaaS, PaaS and SaaS.
i. it reduces the need for organizations to invest in and maintain their own on-premises IT
resources;
iii. There are fewer wasted resources because customers only pay for the resources they use.
PRIVATE CLOUD:
Private cloud is a type of cloud computing that delivers similar advantages to public cloud,
including scalability and self-service, but through a proprietary architecture. Unlike public clouds,
which deliver services to multiple organizations, a private cloud is dedicated to the needs and
goals of a single organization. As a result, private cloud is best for businesses with dynamic or
unpredictable computing needs that require direct control over their environments, typically to
meet security, business governance or regulatory compliance requirements.
NON-TEACHING CREDIT COURSE 12
HYBRID CLOUD:
Hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and
third-party, public cloud services with orchestration between the two platforms. By allowing
workloads to move between private and public clouds as computing needs and costs change,
hybrid cloud gives businesses greater flexibility and more data deployment options. However, an
enterprise has no direct control over the architecture of a public cloud, so, for a hybrid cloud
deployment, it must architect its private cloud to achieve compatibility with the desired public
cloud or clouds. This involves the implementation of suitable hardware within the data centre,
including servers, storage, a local area network (LAN) and load balancers.
When an organization properly architects and implements a private cloud, it can provide most of
the same benefits found in public clouds, such as user self-service and scalability, as well as the
ability to provision and configure virtual machines (VMs) and change or optimize computing
resources on demand. An organization can also implement chargeback tools to track computing
usage and ensure business units pay only for the resources or services they use. Private clouds are
often deployed when public clouds are deemed inappropriate or inadequate for the needs of a
business. For example, a public cloud might not provide the level of service availability or uptime
that an organization needs.
However, private clouds also have some disadvantages. First, private cloud technologies, such as
increased automation and user self-service, can bring some complexity into an enterprise. These
technologies typically require an IT team to re-architect some of its data centre infrastructure, as
well as adopt additional management tools. As a result, an organization might have to adjust or
even increase its IT staff to successfully implement a private cloud.
In general, the public cloud is seen as a way for enterprises to scale IT resources on demand,
without having to maintain as many infrastructure components, applications or development
resources in house. The pay-per-usage pricing structure offered by most public cloud providers is
also seen by some enterprises as an attractive and more flexible financial model.
However, because users typically deploy public cloud services in a self-service model, some
companies find it difficult to accurately track cloud service usage, and potentially end up paying
for more cloud resources than they actually need. Some organizations also just prefer to directly
supervise and manage their own on-premises IT resources, including servers.
NON-TEACHING CREDIT COURSE 14
Hybrid cloud computing enables an enterprise to deploy an on-premises private cloud to host
sensitive or critical workloads, and use a third-party public cloud provider to host less-critical
resources, such as test and development workloads. Hybrid cloud is also particularly valuable for
dynamic or highly changeable workloads.
Despite its benefits, hybrid cloud computing can present technical, business and management
challenges. Private cloud workloads must access and interact with public cloud providers, so, as
mentioned above, hybrid cloud requires API compatibility and solid network connectivity.
The applications of cloud computing are practically limitless. With the right middleware, a cloud
computing system could execute all the programs a normal computer could run. Potentially,
everything from generic word processing software to customized computer programs designed for
a specific company could work on a cloud computing system.
NON-TEACHING CREDIT COURSE 15
The number of cloud storage providers online seems to grow every day. Each competing over the
amount of storage they can provide to clients.
Right now, Dropbox is the clear leader in streamlined cloud storage allowing users to access files
on any device through its application or website with up to 1 terabyte of free storage. Google’s
email service provider Gmail, on the other hand, provides unlimited storage on the cloud. Gmail
has revolutionized the way we send emails and largely responsible for the increased usage of
email worldwide. Facebook is a mix of the two, in that it can store an infinite amount of
information, images, and videos on your profile. They can then be easily accessed on multiple
devices. Facebook goes a step further with their Messenger app, which allows for profiles to
exchange data.
A marketing cloud is an end-to-end digital marketing platform for clients to manage contacts and
target leads. 3Maropost Marketing Cloud combines easy-to-use marketing automation and hyper-
targeting of leads. At the same time, ensuring emails actually arrive in the inbox, thanks to its
advanced email deliverability capabilities. In general, marketing clouds fulfil a need for
NON-TEACHING CREDIT COURSE 16
personalization. This is important in a market that demands messaging be “more human.” That’s why
communicating that your brand is here to help, will make all the difference in closing.
Education is increasingly adopting advanced technology because students already are. So, in an
effort to modernize classrooms, educators have introduced e-learning software like Slide Rocket.
4
Slide Rocket is a platform that students can use to build presentations and submit them. Students
can even present them through web conferencing all on the cloud. Another tool teacher’s use is
Rat type, which helps students learn to type faster and offers online typing tests to track their
progress.
Fig12:
Education now
days are
connected via
cloud.
NON-TEACHING CREDIT COURSE 17
Cloud basically does some statistics over this, it stores data every second and manipulate them as
and when required. When any user requests for the update of weather or pollution the program or
software which are designed for it gives the output and if the results or readings rise above the
threshold then the indication led is lit up, so we can understand that the weather or pollution level
is not up to the mark (hazardous/ danger). Google along with some others have created this kind
of software that detects the pollution level and warns accordingly.
3
Maropost: Maropost Marketing Cloud provides the foundation B2C businesses need to easily create complex
customer journeys, resulting in increased revenue—across email, web, mobile, and social channels. Coupled with in-
depth analytics to track every part of your marketing process, Maropost Marketing Cloud is the art and science of
marketing elevated.
4
Slide Rocket: Slide Rocket was an online presentation platform that lets users create, manage, share and measure
presentations. Slide Rocket is provided via a SaaS model.
NON-TEACHING CREDIT COURSE 18
It brings efficiency, creates new economic value for the companies for the government and
ultimately it improves the quality of life.
IOT is an application of cloud computing as it generates or stores data over internet and gives
desired results as and when required.
7.3 APPLICATION
Let’s start this application with simple glowing of LED light taking data from server and
processing it ON and OFF.
Code Snippet
// enter a MAC address and IP address for your controller below.
// The IP address will be dependent on your local network.
NON-TEACHING CREDIT COURSE 19
void setup() {
pinMode(ledPin, OUTPUT);
Ethernet.begin(mac, ip, gateway, subnet);
server.begin();
Serial.begin(9600);
while(!Serial){
;
}
Serial.print("csadd;");
Serial.println(Ethernet.localIP());
void loop() {
EthernetClient client = server.available();
if(client) {
if(!alreadyConnected) {
client.flush();
commandString = "";
server.println("--> PLZ type the command and return..");
alreadyConnected = true;
}
while(client.available()) {
char newChar = client.read();
if(newChar==0x0D)
{
server.print("receive this command: ");
server.println(commandString);
processCommand(commandString);
} else {
Serial.println(newChar);
commandString += newChar;
NON-TEACHING CREDIT COURSE 20
}
}
}
}
if(command.indexOf("photo")> -1)
{
Serial.println("photo command received");
server.print("reading from photoresistor:");
server.println(analogRead(A0));
commandString = "";
return;
}
if (command.indexOf("ledon")> -1)
{
Serial.println("LED on command received");
digitalWrite(ledPin, HIGH);
server.println("LED was turned on");
commandString = "";
return;
}
if (command.indexOf("ledoff")> -1)
{
Serial.println("LED band command received");
digitalWrite(ledPin, LOW);
server.println("LED was band");
commandString = "";
return;
}
commandString ="";
instructions();
}
void instructions()
{
server.println(" Not Understood Cmmand ");
NON-TEACHING CREDIT COURSE 21
Under this sub heading application of real time use of Cloud Computing is shown by running of
Pollution Check.
DESCRIPTION: This application runs on the server and it generates data every 5 sec. The
Apparatus checks for Temperature Humidity, Smoke detection, Gas detection (nearly components
of pollution). When the working model is exposed to Smoke or Gas the embedded sensors detect
them and when it crosses the threshold it gives a warning by glowing of led. The Model also
shows the temperature rise and humidity so as to make a move before some hazard can happen.
This is a very good model that can be implemented in various places like Auditoriums, Theatres,
Class Labs, and House etc. and lives of many people can be saved. This is how we detect the
pollution and some action can be taken for rescue purpose.
5
Application (Pollution check): This application model is designed such a way that it can be used in market for several
purposes protections and it will be handy to all customers. At least lives of people can be saved from hazardious gases or
smoke from now a days pollution levels.
NON-TEACHING CREDIT COURSE 22
Things Required:
i. Ardiuno uno
ii. Jumper wire
iii. Resistors
iv. Breadboard
v. DHT11
vi. MQ2
vii. MQ9
viii. Ethernet shield
ix. LED
F
i
Code Snippet
#define gasPin2 4 // MQ9(gas)
#define redLed 5
byte mac[] = {
int sensorThresgasPin1=330;
NON-TEACHING CREDIT COURSE 23
int sensorThresgasPin2=400;
EthernetServer server(80);
void setup() {
// Open serial communications and wait for port to open:
Serial.begin(9600);
dht.begin();
void loop() {
// listen for incoming clients
EthernetClient client = server.available();
if (client) {
Serial.println("new client");
client.print(sensorReading);
client.println("<br />");
float h =dht.readHumidity();
float t =dht.readTemperature();
NON-TEACHING CREDIT COURSE 24
if (isnan(t)|| isnan(h)){
}else{
client.print("humidity: ");
client.println(h);
client.print("Temperature: ");
client.println(t);
client.println("<br />");
client.println("<br />");
client.println("<=======================================>");
}
client.println(analogRead(gasPin1));
digitalWrite(redLed, HIGH);
}
else
{
digitalWrite(redLed, LOW);
}
delay(1000);
client.println("<br />");
client.println("<br />");
client.println("<=======================================>");
client.println("<br />");
client.print("GAS SENSOR: ");
client.println(analogRead(gasPin2));
if (analogSensor > sensorThresgasPin2)
{
digitalWrite(redLed, HIGH);
}
else
{
digitalWrite(redLed, LOW);
NON-TEACHING CREDIT COURSE 25
delay(1000);
client.println("<br />");
client.println("<br />");
client.println("<=======================================>");
client.println("</html>");
break;
}
if (c == '\n') {
// you're starting a new line
currentLineIsBlank = true;
else if (c != '\r') {
// you've gotten a character on the current line
currentLineIsBlank = false;
}
}
}
// give the web browser time to receive the data
delay(1);
// close the connection:
client.stop();
Serial.println("client disonnected");
Many companies contemplating the addition of the cloud into their IT strategy are concerned about
three key issues: Security, Accountability, and Reliability. Security is top on the list of any IT
manager who’s thinking about the cloud. Whether you’re looking at creating a private
cloud, leveraging a public cloud, or implementing a hybrid environment, you must have a security
strategy.
Many of the same security risks that companies face when dealing with their own computer systems
are found in the cloud, but there are some important twists. With the cloud, you no longer have well-
NON-TEACHING CREDIT COURSE 26
defined boundaries regarding what’s internal and what’s external to your systems. You must assess
whether holes or vulnerabilities exist across servers, networks, infrastructure components, and
endpoints and then continuously monitor them.
According to the Cloud Security Alliance (CSA), an organization dedicated to ensuring security best
practices in the cloud; significant areas of operational risk in the cloud include the following:
Physical security: Covers security of IT equipment, network assets, and telecommunications
infrastructure.
Human resource security: Deals with the people side of the equation ensuring background
checks, confidentiality, and segregation of duties (for example, those who develop
applications don’t operate them).
Business continuity: Ensures that the provider meets its service level agreement for operation
with you.
Disaster recovery: Ensures that your assets (your data and applications) are protected if, for
example, you’re using a public Infrastructure as a Service (IaaS) to run an application, find out
what happens if there’s some sort of disaster (natural or otherwise).
Incident handling changes in a cloud: Working with your service provider to control at least
part of the infrastructure.
block cipher is of 64 bits and key used is of 56 bits out of 64 bits of key is used rest of 8 bits are
padded. In block cipher we encrypt block of data which consist of plain text by combination of
confusion and diffusion to make cipher block then this cipher block has to pass 16 rounds, before
passing through these 16 rounds the 64 bits of data is divided into 32 bits. After dividing the data
into 32 bits, F-function (Feistel function) is applied. F-function consists of substitution,
permutation, key mixing. The output of function is combined with other half of the data using
XOR gate alternate crossing of data is done; then crossing of data is done.
IDEA
International Data Encryption Algorithm was proposed by James Massey and Xuejia Lai in
1991.It is considered as best symmetric key algorithm. It accepts 64 bits plain text and key size is
128 bits. IDEA consists of 8.5 rounds. All rounds are similar except the one. In IDEA the 64 bits
of data is divided into 4 blocks each having size 16 bits. Now basic operations modular, addition,
multiplication, and bitwise exclusive OR (XOR) are applied on sub blocks.
When you deploy applications on your own premises, you can control your resources and you
hopefully know who’s responsible for maintaining the integrity of the overall environment. When
you move some of your computing to a cloud environment, the way you think about managing
changes dramatically. You need to find the right balance between the oversight you must provide
to internal customers and the way you monitor your cloud provider. We expect that many
companies will have a combination of on-premise data centres combined with some cloud-based
services. Therefore, you have to juggle a variety of management approaches. When you begin to
leverage cloud services, you must have a clear understanding of how that resource will be
managed by that provider. The company you have partnered with has to manage the underlying
infrastructure that you’re using (along with its multitude of other customers). This includes the
physical servers, networks, and storage, as well as any virtual servers.
11. ACKNOWLEDGMENT
Apart from the efforts of me, the success of any project depends largely on the encouragement and
guidelines of many others. I take this opportunity to express my gratitude to the people who have
been instrumental in the successful completion of this project. I would like to show my greatest
appreciation to my mentor Prof. SUDIP CHATERJEE. I can’t say thank you enough for his
tremendous support and help. I feel motivated and encouraged every time I attend his meeting.
Without his encouragement and guidance this project would not have materialized. The guidance
and support received from all the members who contributed and who are contributing to this
project, was vital for the success of the project. I am grateful for their constant support and help.
12. REFERENCES
Description:
CD contents:
Document ( Report On Cloud Computing)
Synopsis
Ppt.
Images
Video (Basic, Advanced)
Basic: Glowing of LED via Arduino on server (Ethernet)
Advanced: Pollution Check
15. LIMITATIONS
Basically the main project is all about the pollution sensing which senses the different kind of
pollution that is gas, smoke and various other things. This was a small scale project done. On a
larger scale project it can have many more sensors like particulate sensors and ozone gas, fire and
NO2 sensor.
NON-TEACHING CREDIT COURSE 31
This project on a larger scale can have 5 to 6 Arduino(s) connected to the same server via Wi-Fi and
the data readings taken at every interval of time. If any large change is sensed then it will send you
an e-mail or will notify you. The data collected on the large scale can be analyzed as well and to
save the environment by knowing the rising change in the environment.
Url: http://plagiarisma.net/
NON-TEACHING CREDIT COURSE 32