Cloud Computing unit 1 24-25notes
Cloud Computing unit 1 24-25notes
Cloud, in the context of cloud computing, refers to a network of remote servers hosted on the
internet to store, manage, and process data, rather than relying on a local server or personal computer.
The "cloud" is essentially a metaphor for the internet, representing the shift from local to online
computing.
Support for Digital Transformation - Foundation for IoT, blockchain, and more.
○ Front End
○ Back End
Back End
The back end is used by the service provider. It manages all the resources that are required to provide cloud
computing services. It includes a huge amount of data storage, security mechanism, virtual machines,
deploying models, servers, traffic control mechanisms, etc.
1. Client Infrastructure
Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with
the cloud.
2. Application
The application may be any software or platform that a client wants to access.
3. Service
A Cloud Services manages that which type of service you access according to the client’s requirement.
i. Software as a Service (SaaS) – It is also known as cloud application services. Mostly, SaaS applications run
directly through the web browser means we do not require to download and install these applications. Some
important example of SaaS is given below –
ii. Platform as a Service (PaaS) – It is also known as cloud platform services. It is quite similar to SaaS, but
the difference is that PaaS provides a platform for software creation, but using SaaS, we can access software
over the internet without the need of any platform.
iii. Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure services. It is responsible for
managing applications data, middleware, and runtime environments.
Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco Metapod.
4. Runtime Cloud
Runtime Cloud provides the execution and runtime environment to the virtual machines.
5. Storage
Storage is one of the most important components of cloud computing. It provides a huge amount of storage
capacity in the cloud to store and manage data.
6. Infrastructure
It provides services on the host level, application level, and network level. Cloud infrastructure includes
hardware and software components such as servers, storage, network devices, virtualization software, and
other storage resources that are needed to support the cloud computing model.
7. Management
Management is used to manage components such as application, service, runtime cloud, storage,
infrastructure, and other security issues in the backend and establish coordination between them.
8. Security
Security is an in-built back end component of cloud computing. It implements a security mechanism in the
back end.
9. Internet
The Internet is medium through which front end and back end can interact and communicate with each other.
Fig above presents an overview of the NIST cloud computing reference architecture, which identifies the
major actors, their activities and functions in cloud computing. The diagram depicts a generic high-level
architecture and is intended to facilitate the understanding of the requirements, uses, characteristics and
standards of cloud computing.
● Cloud Consumer
● Cloud Provider
● Cloud Carrier
● Cloud Auditor
● Cloud Broker
The image below will explain the cloud computing reference model in a neat diagram.
Each actor is an entity that participates in the process and/or completes duties in cloud computing. This entity
could be a person or an organization.
1. Cloud Consumer
The end user that the cloud computing service is designed to support is the cloud consumer. An individual or
corporation with a working relationship with a cloud provider and utilizing its services is referred to as a
cloud consumer. A cloud customer peruses a cloud provider's service catalog, makes the proper service
request, enters into a service agreement with the cloud provider, and then utilizes the service. The cloud
customer may be charged for the service provided, in which case payment arrangements must be made. They
need to have a cloud Service Level Agreement (SLA).
2. Cloud Provider
Any individual, group, or other entity in charge of making a service accessible to cloud users is a cloud
provider. A cloud provider creates the requested software, platforms, and infrastructure services, manages the
technical infrastructure needed to supply the services, provisions the services at agreed-upon service levels,
and safeguards the services' security and privacy.
Through service interfaces and virtual network interfaces that aid in resource abstraction, the cloud provider
implements the cloud software to make computing resources accessible to cloud consumers who use the
infrastructure as a service.
3. Cloud Carrier
A cloud carrier serves as an intermediary between cloud providers and customers, facilitating connectivity
and transport of cloud services. Customers can access the cloud through the network, telecommunication,
and other access equipment provided by cloud carriers. Customers of cloud services, for instance, can get
them through network access devices, including laptops, mobile phones, PCs, and mobile Internet devices
(MIDs), among others. Network and telecommunication carriers typically handle the distribution of cloud
services, while a transport agent is a company that arranges for the physical delivery of storage devices like
high-capacity hard drives.
Remember that a cloud provider will establish service level agreements (SLAs) with a cloud carrier to
provide services at a level consistent with the SLAs offered to cloud consumers. The cloud provider may also
demand that the cloud carrier provide dedicated and encrypted connections between cloud consumers and
cloud providers.
4. Cloud Auditor
An unbiased evaluation of cloud services, information system operations, performance, and the security of a
cloud computing implementation can be done by a cloud auditor. A cloud auditor can assess a cloud
provider's services in terms of performance, service level agreement compliance, privacy implications, and
security controls.
The management, operational, and technical precautions or countermeasures used inside an organizational
information system to ensure the privacy, availability, and integrity of the system and its data are known as
security controls.
To do a security audit, a cloud auditor can evaluate the information system's security controls to see how well
they are being implemented, functioning as intended, and achieving the required results in relation to the
system's security needs. Verifying compliance with law and security policy should be part of the security
audit.
5. Cloud Broker
An organization called a "Cloud Broker" controls how cloud services are used, performed, and delivered and
negotiates contracts between cloud providers and cloud users. The integration of cloud services could
become too difficult for cloud consumers to handle as cloud computing develops. Instead of contacting a
cloud provider directly in certain circumstances, a cloud consumer may request cloud services through a
cloud broker. A single point of access for controlling numerous cloud services is offered by cloud brokers.
The capacity to offer a single consistent interface to numerous different providers, whether the interface is for
commercial or technical objectives, separates a cloud broker from a cloud service provider. Cloud Brokers
provide services in three categories:
● Intermediation: By enhancing a certain feature and offering cloud consumers value-added services, a
cloud broker improves a given service. The enhancement may take the shape of identity management,
performance reporting, improved security, etc.
● Aggregation: Several services are combined and integrated into one or more new services by a cloud
broker. The broker offers data and service integration, guarantees secure data transfer between the
cloud consumer and various cloud providers, and provides these services.
● Arbitrage: Like service aggregation, service arbitrage differs in that the services being integrated or
aggregated are not fixed. Service arbitrage refers to the freedom a Broker has to select services from
various service Providers.
● IBM Architecture
● Oracle Architecture
● HP Architecture
● Cisco Reference Architecture
The model includes guidelines for secure design and deployment across infrastructure, platform, and
application layers, forming the Cloud Architectural Framework. Governance, Risk, and Compliance (GRC)
policies and controls help manage cloud security risks and ensure regulatory compliance. Cloud Security
Controls cover data protection, identity management, and incident response, while Data Security and Privacy
techniques like encryption and data masking safeguard sensitive information. Application Security involves
secure coding practices and vulnerability assessments to protect cloud-based applications. Operational
Security includes monitoring, incident management, and disaster recovery planning, ensuring continuous
protection and quick recovery from incidents.
On-Premises Deployment
In this model, software applications are installed and run on computers and servers located within the
premises of an organisation. The organisation is responsible for managing and maintaining all aspects of the
infrastructure, including hardware, software, security, and backups.
Software applications are installed and run on servers within the organisation's premises. The organisation
manages all aspects of the infrastructure, including hardware, software, security, and backups.
Cloud Deployment
Cloud deployment involves hosting software applications and services on remote servers maintained by
third-party cloud service providers such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud
Platform. Users access these applications and services over the Internet. Cloud deployment offers scalability,
flexibility, and cost-effectiveness, as organisations can pay only for the resources they use.
Software applications and services are hosted on remote servers maintained by third-party cloud service
providers. Users access these resources over the internet. Cloud deployment offers scalability, flexibility, and
cost-effectiveness as organisations pay only for the resources they use.
Hybrid Deployment
Hybrid deployment combines elements of both on-premises and cloud deployment models. Organisations
may choose to host some applications and services on-premises while utilising cloud services for others. This
approach allows organisations to leverage the benefits of both deployment models, such as maintaining
sensitive data on-premises while taking advantage of cloud scalability for other workloads.
Software applications and services are hosted on remote servers maintained by third-party cloud service
providers. Users access these resources over the internet. Cloud deployment offers scalability, flexibility, and
cost-effectiveness as organisations pay only for the resources they use.
Private Cloud Deployment
The cloud infrastructure is dedicated solely to a single organisation in a private cloud deployment. It may be
hosted on-premises or by a third-party service provider, but the infrastructure is not shared with other
organisations. Private clouds offer greater control, customisation, and security than public cloud
deployments.
The cloud infrastructure is dedicated solely to a single organisation. It can be hosted on-premises or by a
third-party provider but not shared with other organisations. Private clouds offer greater control,
customisation, and security than public cloud deployments.
Multi-Cloud Deployment
Multi-cloud deployment involves using services from multiple cloud providers to meet specific business
needs. Organisations may choose this approach to avoid vendor lock-in, mitigate risk, or take advantage of
specialised services offered by different providers. Organisations use services from multiple cloud providers
to meet specific business needs.
This approach helps avoid vendor lock-in, mitigate risk, or take advantage of specialised services offered by
different providers. These deployment models provide organisations with options to choose the most suitable
infrastructure and delivery method based on their specific requirements, budget, and technical capabilities.
Functional Components
Functional components are essential for effectively managing and utilising cloud resources in cloud
computing. Computing includes virtual machines or containers for processing and executing applications.
Storage encompasses scalable object or block storage solutions for data management.
Networking provides virtualised networks and connectivity between resources. Security includes measures
like firewalls and encryption to protect data and applications. Management ensures efficient resource
allocation, monitoring, and administration. Orchestration automates deployment, scaling, and management
processes for improved operational efficiency.
Computing component
Computing in cloud computing refers to the fundamental capability of provisioning and managing virtual
machines (VMs) or containers to execute applications. Virtual Machines (VMs) emulate physical computers
and support various operating systems (OS).
They are versatile, allowing applications with diverse OS requirements to run within isolated environments.
On the other hand, containers encapsulate applications and their dependencies into portable units, ensuring
consistency across different com
Storage component
Storage solutions in cloud computing offer scalable options for storing and managing data. Object storage
systems store data as objects, each comprising the data itself, metadata (descriptive attributes), and a unique
identifier.
This approach is highly scalable and ideal for unstructured data like media files and backups. Block storage,
in contrast, manages data in fixed-sized blocks and is commonly used for structured data such as databases
and VM disks. It provides high performance and is typically directly attached to VM instances for persistent
storage needs.
Networking component
Networking components in cloud computing facilitate the establishment and management of virtualized
networks that interconnect cloud resources. Virtual Private Clouds (VPCs) offer isolated virtual networks
dedicated to specific users or groups, ensuring security and control over network configurations.
Subnets segment the IP address space within a VPC, enabling further granularity and security. Routing tables
dictate how traffic flows between subnets and external networks, optimizing network efficiency and security.
Security component
Security measures in cloud computing protect data, applications, and infrastructure from unauthorized access
and cyber threats. Firewalls regulate incoming and outgoing network traffic based on predefined security
rules, guarding against unauthorized access and network-based attacks.
Encryption transforms data into a secure format using algorithms, ensuring only authorized parties can
decrypt and access the original data with appropriate keys. Access controls enforce restrictions on resource
access based on authentication credentials, roles, and permissions, adhering to the principle of least privilege
to mitigate security risks.
Management component
Management in cloud computing encompasses tools and processes for efficiently administering cloud
resources throughout their lifecycle. Resource provisioning automates the allocation and deployment of
cloud resources based on demand and workload requirements, ensuring scalability and cost-efficiency.
Performance monitoring continuously tracks resource usage, application performance, and service
availability to detect issues and optimize resource utilization.
Usage optimization analyzes consumption patterns to minimize costs and improve efficiency by dynamically
scaling resources based on workload fluctuations. Compliance management ensures adherence to regulatory
requirements and SLAs, maintaining data protection and service availability standards.
Orchestration component
Orchestration automates and coordinates the deployment, scaling, and management of cloud resources and
applications. It facilitates automated deployment of resources, reducing manual intervention and minimizing
errors in provisioning and configuration tasks. Scaling capabilities dynamically adjust resource capacity
based on workload changes, optimizing performance and cost-effectiveness.
Management processes streamline complex workflows across different cloud components, ensuring
consistency and reliability in operations. Tools like Kubernetes and Terraform are commonly used for
orchestration, enabling efficient management of containerized applications and infrastructure as code (IaC)
practices. puting environments. Containers are lightweight and facilitate efficient deployment and scaling of
applications, sharing the host OS kernel for resource efficiency.
Interactions and Interfaces
Interactions and Interfaces in cloud computing enable seamless communication and collaboration across
diverse environments.APIs (Application Programming Interfaces) define how components communicate,
enabling seamless integration and data exchange between cloud services. Protocols like HTTP TCP/IP
govern communication protocols for reliable data transmission.
Data formats standardise how information is structured and exchanged across different systems and services.
These interactions and interfaces facilitate interoperability, automation, and scalability within complex cloud
architectures, ensuring efficient communication and collaboration across diverse cloud environments.
Data Formats
Standardize how information is structured and exchanged across various systems and services. Standard data
formats like JSON (JavaScript Object Notation) or XML (eXtensible Markup Language) define how data is
formatted and interpreted, facilitating interoperability between different applications and platforms.
Data formats like JSON and XML standardize how information is structured and exchanged between
systems and services. They define rules for encoding data, facilitating interoperability and enabling different
applications and platforms to interpret and process data consistently and accurately.