Cloud Computing - Dr ManishJain
Cloud Computing - Dr ManishJain
• Cloud computing is a business computing model that delivers easy-to-use, on-demand network
access to a pool of computing resources, including software, infrastructure, and hardware facilities
over a network
• This "pay-per-use" model helps an organization to use resources when needed and pay only for the
facilities and the time for which resources have been used
• Hundreds of commercial clouds are available today while Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud being the top-most
Benefits of Cloud Computing
Rapid
Elasticity
Self-Service
Availability
viability
Cloud
Broad
Measured
Network
Service
access
Scalability
Virtualization
Source: “Cloud computing” by Sam Johnston. Licensed under CC BY-SA 3.0 via Wikimedia Commons.
List of other Service Models
• Public Cloud – It is a cloud solution that provides dynamically provisioned resources on a self
service basis to customers via the Internet
• Private cloud – It is a dedicated computing infrastructure owned and shared among users within
the organization
• Hybrid Cloud – It is a combined application of both public and private cloud services where, the
organization stores their critical data in-house and moves the rest of the data to the cloud
• Community Cloud – It is a cloud solution in which organizations having common security practices
and mission share hosted computing services.
Cloud Security Matters!
• Hardware step-up – Done! Virtualization – Done! Shared Service providing – Done! But, what about
the security of client’s data ?
• Securing the client’s data from viruses and theft is a major challenge of cloud system
• Unfortunately, there many hackers out there waiting for that one security hole to breach the
precious data
• Cloud offers a Shared Responsibility Model, that enables both the client and client service provider
to share security duties to improve overall security of the system
• In the Shared Responsibility Model:
• Cloud Service Provider is responsible for security “of” the cloud
• Client is responsible for security “in” the cloud
Cloud Security Matters!
Using-
Hypertext Transfer Protocol
Secure (HTTPS)
• Hypertext Transfer Protocol Secure (HTTPS) is responsible for connecting the client to
cloud resources
• Example: Connecting to Google Drive with HTTPS
Remote Desktop Protocol
(RDP)
• RDP protocol allows the users to create and access virtual Windows copies of their computers in
any other devices
• Once the Windows virtual instance is created, the user can access it just like their original server -
host and run apps, browse files, provide storage, etc.
• These virtual instances are mainly used for:
• Creating different test environments
• Providing extra server capacity
Remote Desktop Protocol
(RDP) (Cont’d)
Once the virtual system is created by the provider, you should install an RDP client on the
current device through which you are going to access the virtual system
For example:
• Linux users can use the rdesktop command
• macOS users can download the Microsoft Remote
Desktop app from the Mac App Store
• Android and iOS users will find RDP clients in their
respective app stores
• Whereas, Windows includes an RDP client called
Remote Desktop Connection; See here 🡪
The Secure Shell (SSH)
• Secure Shells functionality is similar to RDP; the difference is RDP is for Windows Virtual Instances
whereas, SSH is for the Linux Instances
• SSH allows the client to connect and access the virtual copy of Linux system using another device
• Once the connection is established by the provider, You use an SSH command to access the virtual
Linux system
• Example: (for Ref only)
• ssh -i "QDt1.pem" [email protected]
• You can always use Open Source SSH clients like ‘PuTTY’, if your computer does not have access
through SSH commands
Virtual Private Network (VPN)
• VPN provides prominent internet traffic security and is widely used for secure traffic between the
physical cloud sites
• It is defined as secured private connection that occurs through a public network
• VPN is very useful for the organizations to secure their employees remote network in this current
scenario
Direct Connect
• In Direction Connection, the system is physically connect to the network of cloud service provider
• This is mostly used when bulk data transfer is needed for large number of systems
• Examples:
• Azure ExpressRoute
• AWS Direct Connect, and
• Google Cloud Interconnect
Cloud Storage Technologies
• Storage in the cloud functions similar to storage on a local device, the only difference is you need
Internet to access the data in cloud’s hard drive!
• Cloud storage runs on software-defined storage (SDS)
• SDS – A technology that separates the physical storage of data from the logical control over drive
configuration, independent from the underlying hardware
Storage Providers
• There are many cloud storage providers starting from big to budding players in the business
• Here is a list of few cloud-based storage providers:
• Dropbox
• Apple iCloud
• Box
• Microsoft OneDrive
• Google Drive
• Choosing the right storage provider is totally up to your speed Vs. cost requirements
Storage Characteristics
Storage performance
categories
Although data stored inside the hard disk is in binary format (0’s and 1’s); Basic
categorization of data storage is done in three types:
• Files are split in to equal sized chunks 🡪 assigned to unique ID 🡪 storage in hard drive
• Blocks does not need any file structure as they are assigned to a unique ID
Storage Types: Objects
• Object type is used to store unstructured data; example pictures and videos
• Most of the organizations use object storage to analyze and retrieve their unstructured data
effectively
• Every unit is stored as an object no matter its type and size
• Following are the characteristic of an object:
Data
Meta
Data Object ID
Attributes
Storage Features
Makes files
Compression smaller to save
the storage space
Storage
Features
Eliminates
Deduplication
duplicate data
Storage Features
• CDN balances the load of the original webserver and provides high-speed access to web resources
for the users in geographically distributed locations
• The main idea behind CDN is to provide uninterrupted services to the users in remote locations
Implementation • Migration
• A baseline is a test that is performed to read the performance of network and cloud services
• It is important to identify what to baseline and when to baseline
• Baselines helps to identify if your business needs any additional cloud services to increase the
performance
Step 3: Performing a Feasibility
Study
• Feasibility study determines the practicality of the proposed requirements
• It is mainly performed to determine:
• Capabilities that can/should be offloaded to the cloud
• Level of cloud availability (The Nines! Remember we discussed in Module 02?)
• Compliance, security, and privacy guidelines
• Support services from your Internal business and CSP
• Migration path to the cloud
Step 4: Analysing the Gaps
• A gap is nothing but the step space between where you are and where you want to be in future
• There can be cases where your current business requirements might differ from what you need in
the next month- Gap analysis is performed to identify all such cases
• Following is the sample template used for analyzing Gaps
• Reporting and measuring the cloud performing is done based on the following key elements:
• Compute
• Network
• Storage
• Reporting not only helps to measure the performance but also to share this data with other core
executives in your business, when needed
Step 6: Understanding
Benchmarks
• While baseline is a read of performance, A benchmark is a point of reference for comparison
• Which means, once you get the results from baseline, you can refer to the benchmark and
evaluate the cloud performance
• Key areas to benchmark while assessing potential CSPs:
• Availability
• Response time
• Incident resolution time
Step 7: Documentation
• Documentation is required for keeping everything in track and can be very helpful while:
• Meeting with stakeholders
• Locating resources and applications during pre- and post-migration
• Identifying Owners of capabilities and processes
• Identifying Internal and external points of contact
Identity Access Management
Identity Access Management is used to verify that the person trying to log in and access cloud
resources is who they say they are!
Microservices Containerization
Regulatory Concerns
As it is almost impossible to cover all the regulatory concerns, we will be listing the most popular ones in the next slides
Regulatory concerns (Cont’d)
• Industry-Based Requirements
• Family Educational Rights and Privacy Act (FERPA)
• Financial Industry Regulatory Authority (FINRA)
• Gramm-Leach-Bliley Act (GLBA)
• Health Insurance Portability and Accountability Act (HIPAA)
• Motion Picture Association of America (MPAA)
• Sarbanes-Oxley Act (SOX)
Regulatory concerns (Cont’d)
• International Standards:
• CIS Benchmarks
• International Organization of Standardization (IOS)
• ISO 9001 – Global Quality Standard
• ISO 27001 – Security Management Controls
• ISO 27017 – Cloud Specific Controls
• ISO 27018 – Personal Data Protection
Summary
Questions
Thank You!