Bcs 2417 Cloud Computing Lecture Notes Week 1-3
Bcs 2417 Cloud Computing Lecture Notes Week 1-3
WEEK 1 & 2
Introduction to Cloud Computing
Public cloud
Private cloud
Private clouds are built, run, and used by a single organization, typically located on-
premises. They provide greater control, customization, and data security but come with
similar costs and resource limitations associated with traditional IT environments.
Hybrid cloud
PaaS delivers and manages hardware and software resources for developing, testing,
delivering, and managing cloud applications. Providers typically offer middleware,
development tools, and cloud databases within their PaaS offerings.
SaaS provides a full application stack as a service that customers can access and use.
SaaS solutions often come as ready-to-use applications, which are managed and
maintained by the cloud service provider.
This is a relatively new cloud service model that provides solutions to build applications
as simple, event-triggered functions without managing or scaling any infrastructure.
However, most of us generally don’t have enough time or don’t want to spend so much
time and effort to eat a bowl of pasta. Instead you might choose from the following
options instead:
• IaaS: Buying pre-packed ingredients like fresh pasta and sauce made by someone else
that you use to cook at home.
• PaaS: Order takeout or delivery where your meal is prepared for you and you don’t
have to worry about the ingredients or how you’ll cook it, but you have to worry about
where you’ll eat, the utensils, and cleaning up after your meal.
• SaaS: Call ahead to the restaurant and order the exact meal you want. They prepare
everything ahead of time for you so that all you have to do is show up and eat.
• Serverless: Go out to dinner and order pasta at a restaurant, alone or with friends.
You pay and eat whatever you want and the restaurant makes sure there’s enough
ingredients and staff to create the order without a long wait.
Grid computing is a type of system for computing that pools computer resources
located in several places to accomplish a single objective. All idle resources from several
computers are combined and made accessible for a single job. Grid computing is used
by businesses to conduct massive activities or solve complicated issues that might be
challenging to address on one computer. It is often conducted on a "data grid," a
collection of computers that interface directly with one another to coordinate
operations.
• A control node or server manages the whole network and keeps track of the
resources in an online pool. It can be a single server or a collection of servers.
• A user is a machine that utilizes network resources to carry out a task, also known as
a resource user.
Every machine connected to the grid network runs specialized software for grid
computing. The software manages and coordinates all the jobs in the grid. The program
divides the primary work into smaller tasks and assigns each computer one of those
smaller tasks. This enables all computers to operate on their subtasks at the same time.
The results of every computer are combined when the subtasks are completed to finish
the bigger main task.
The program enables computers to interact and share information about the subtasks.
Consequently, computers can combine their output for the given main job. Grid
computing is a kind of distributed computing in which a virtual supercomputer
aggregates the resources of numerous separate computers deployed across
geographies. As part of a grid, computers share resources like power for processing,
internet connectivity, and storage space to carry out tasks requiring a lot of computing
power. Overall, the grid design is a single computational unit.
Services in Finance
Medical Care
Massive volumes of patient data are being stored and analyzed using grid computing in
the healthcare sector. This can aid with the development of personalized therapy, the
advancement of medical research, and even the identification and control of disease
outbreaks.
Media
A robust computer is needed to generate the intricate special effects in some movies.
Grid computing is used by special effects creators to accelerate the production timeline.
They use grid-supported software that distributes processing resources to produce
special-effect visuals.
Cloud computing refers to distributing computer services through the Internet, such as
computers, storage devices and software, and analytics, to promote quicker innovation,
adaptable resource use, and cost savings. Small and large businesses utilize cloud
computing technology to store information in the cloud and provide access to it through
a web connection from any location at any time.
The architecture of cloud computing is separated into two parts: front end and back
end. Through the Internet, the front end and back end can communicate. In cloud
computing, frontend systems include the client facilities, such as user experiences,
user-side applications, and client networks or devices, which let users communicate
with and use cloud computing services. The cloud architecture's back end includes all
the parts that go into creating the cloud itself, such as the management, security, and
management systems, as well as the computing and storage resources.
In cloud architecture, all elements come together to deliver a foundation for cloud
computing that allows users to access various services and resources as needed. The
front end communicates user interactions through middleware with the back end,
where the application's service model executes the requested action. As cloud strategies
become more sophisticated, the skills and knowledge of cloud architects become more
important in assisting businesses in navigating the intricacies of cloud environments,
implementing effective strategies, and keeping the cloud's infrastructure working
smoothly.
Through big data analytics, businesses may acquire significant insights and optimize
business operations by harnessing the computational power of cloud computing.
Corporate endpoints, cloud apps, and the consumers that utilize them interact with one
another daily, generating enormous amounts of data. Through the use of cloud
computing, businesses may access enormous amounts of organized and unorganized
information that are readily available and use it to their advantage to generate profit.
When obtaining further information, Big Data is a radical movement creating damage in
the corporate world. Big Data Powerhouses like Facebook and Amazon gather data on
consumer preferences, buying patterns, and likes and dislikes to predict potential
purchases and expand their companies.
Email, which belongs to the SaaS category, is a service that has existed for a while.
Typical clients are embedded in essential business operations and can be accessed
online. Email has applications in every company area, whether sales, advertising, or IT,
and cloud accessibility is essential.
Infrastructure Services
Infrastructure construction and upkeep include several steps. There are hardware,
electricity, and overhead costs for building and maintaining it. Companies choose to
house their data in service provider-run data centers rather than invest in capital
equipment to focus on operating costs.
Differences Between Grid Computing and Cloud Computing
Infrastructure companies own the cloud servers Grids are controlled and
used in cloud computing. operated by the organization in
Grid computing.
It's really easy to use cloud computing. It may be When compared to cloud
accessed via standard web protocols. computing, grid computing is
less accessible. Grid framework
can be used to access it.
It is very scalable in comparison to grid computing. In contrast, cloud computing
offers greater scalability than
grid computing.
WEEK 1 & 2
When working with Cloud environments, data security is a major concern as users have
to take responsibility for their data, and not all Cloud providers can assure 100% data
privacy.
No identity access management, lack of visibility and control tools, data misuse, and
cloud misconfiguration are the common reasons behind cloud privacy leaks. There are
also concerns about malicious insiders, insecure APIs, and neglect or oversights in cloud
data management.
Solution:
Install and implement the latest software updates, as well as configure network
data governance, lack of security patches, and no granularity. It is difficult to apply data
management policies across various boards while tracking the security requirements of
multi-clouds.
Solution:
Implementing a multi-cloud data management solution can help you manage multi-
cloud environments. We should be careful while choosing the solution, as not all tools
3. Performance challenges
The performance and security of cloud computing solutions depend on the vendors, and
keep in mind that if a Cloud vendor goes down, you may lose your data too.
Solution:
Cloud Service Providers should have real-time SaaS monitoring policies.
When you try to shift applications between two or multiple Cloud ecosystems,
interoperability is a challenge. Some of the most common issues are:
stacks
• Managing services and apps in the target cloud ecosystem
standards can help organizations solve this problem. The use of multi-layer
When transferring large volumes of information between Cloud data servers, a lack of
and data is highly vulnerable. To help prevent business losses from sudden outages,
enterprises should ensure there is high bandwidth without sacrificing performance.
Solution:
Focus on improving operational efficiency and pay more for higher bandwidth to
address network dependencies.
Hiring the right Cloud talent is another common challenge in cloud computing. There is
market. Enterprises need good expertise in order to efficiently utilize these tools and
look out for the best fit.
Solution:
Hire Cloud professionals having specializations in DevOps as well as automation.
7. Reliability and availability
High unavailability of Cloud services, as well as lack of reliability, are the major
If a Cloud vendor gets hacked, the sensitive data of organizations using their services
gets compromised.
Solution:
8. Password security
Account managers manage all their cloud accounts using the same passwords.
Password management poses a critical problem, and it is often found that users resort
to using weak and reused passwords.
Solution:
Secure all your accounts by using a strong password management solution. To further
9. Cost management
Although Cloud Service Providers (CSPs) offer a pay-as-you-go subscription model for
services, hidden costs are charged as underutilized resources in enterprises, making the
costs can add up.
Solution:
are some ways organizations can fix this. It’s one of the most efficient methods to deal
with major challenges and manage budgets in cloud computing.
Cloud computing is a highly competitive field, and there are many professionals who
lack the required knowledge and skills to be employed in the industry. There is also a
huge gap in supply and demand for certified individuals and many job vacancies.
Solution:
Companies should help existing IT staff in upskilling their careers and skills by investing
in Cloud training programs.
Good IT governance makes sure that the right tools are used and assets get
common problem in cloud computing, and companies utilize tools that do not align with
their vision. IT teams don’t get total control of compliance, data quality checks, and risk
management, thus creating many uncertainties when migrating to the cloud from
traditional infrastructures.
Solution:
Traditional IT operations should be adopted to accommodate Cloud migrations.
12. Compliance
When it comes to having the best data compliance policies, cloud Service Providers
(CSP) are not up-to-date. Organizations run into compliance issues with state laws and
regulations whenever a user transfers data from internal servers to the cloud.
Solution
The General Data Protection Regulation Act is expected to address compliance issues in
the future for CSPs.
5. Multi-Cloud
The use of multiple cloud services from different providers in a single architecture.
- Examples: Utilizing AWS for compute, Google Cloud for analytics, and Azure for
storage.
- Advantages: Avoids vendor lock-in, enhances redundancy, and allows for optimized
services.
- Disadvantages: Increased complexity in integration and management.
1. Hardware clients-
b. Thin Client- has only the necessary components for one specific task, doesn’t have a hard
drive and therefore no s/w instead runs programs and accesses data from a server. E.g Onlive H/w
Are applications that make use of the network support but can also run offline.
3. Cloud clients
Security in cloud computing is a critical concern for organizations using cloud services. Key aspects
related to clients and security:
1. Individual Users:
- End-users who access cloud services for personal or small business use.
- Concern areas: Data protection, compliance with regulations, and managing access controls.
3. Large Enterprises:
- Organizations that utilize cloud services for various applications, including critical business
operations.
- Concern areas: Comprehensive security strategies, data governance, and risk management.
- Agencies that require stringent security measures due to sensitive data handling.
- Concern areas: Compliance with laws and regulations, data sovereignty, and incident response.
Security in Cloud Computing
1. Data Security:
- Access Controls: Implementing strict access controls and identity management to ensure only
authorized users can access sensitive data.
2. Network Security:
- Firewalls: Using virtual firewalls and intrusion detection systems to monitor and protect cloud
environments.
- Secure Connections: Utilizing secure protocols (like HTTPS, VPNs) for data transmission.
- Regulatory Compliance: Adhering to industry standards and regulations such as GDPR, HIPAA, and PCI
DSS.
- Audit Trails: Maintaining logs and audit trails for tracking access and changes to data.
- Incident Response Plan: Establishing a clear plan for responding to security breaches or incidents.
- Monitoring and Alerts: Continuous monitoring for suspicious activity and implementing alert systems.
- Understanding Roles: Cloud providers and clients share responsibility for security, where the provider
secures the cloud infrastructure while clients secure their applications and data.
- Best Practices: Clients must understand their responsibilities, including data encryption and user
management.
- Security Information and Event Management (SIEM): Solutions for real-time analysis of security alerts
generated by applications and network hardware.
- Identity and Access Management (IAM): Tools for managing user identities and permissions.
Types/popular of IAM
3. Okta
IAM tools play a crucial role in ensuring secure access to resources while enabling organizations to
maintain compliance with regulations. Choosing the right IAM solution depends on factors such as the
organization’s size, security needs, and existing infrastructure.
Data leakage in cloud computing refers to the unauthorized transmission of data from within an
organization to an external destination or recipient. This can occur unintentionally or due to malicious
intent. Here are the key aspects of data leakage in the cloud:
- Improperly set access controls or permissions can expose sensitive data to unauthorized users.
2. Insider Threats:
- Employees with access to sensitive information may intentionally or unintentionally leak data.
3. Third-Party Applications:
- Integrating third-party applications without proper vetting can lead to data exposure.
4. Insecure APIs:
- Vulnerabilities in APIs used to access cloud services can be exploited to extract data.
5. Data In Transit:
1. Reputation Damage:
- Organizations may suffer a loss of trust and credibility among customers and stakeholders.
2. Financial Loss:
- Data breaches can lead to significant financial penalties, legal fees, and remediation costs.
3. Regulatory Penalties:
- Non-compliance with data protection regulations (e.g., GDPR, HIPAA) can result in hefty fines.
Prevention Strategies
1. Data Encryption:
- Encrypt data both at rest and in transit to protect it from unauthorized access.
2. Access Controls:
- Implement strict access controls and user authentication to limit who can access sensitive data.
- Conduct regular security audits and monitor for unusual access patterns or behavior.
4. Security Training:
- Educate employees about data security best practices and the importance of protecting sensitive
information.
5. Use of Data Loss Prevention (DLP) Tools:
- Deploy DLP solutions to monitor and control data transfer activities, preventing unauthorized data
sharing.
6. Configuration Management:
- Regularly review and correct cloud service configurations to ensure they align with security best
practices.
- Develop and maintain an incident response plan to quickly address any data leakage incidents.
Conclusion
Data leakage in cloud computing poses significant risks, but with appropriate security measures,
organizations can effectively mitigate these risks. A combination of technology, policies, and employee
training is essential for safeguarding sensitive data in the cloud.