Cloud Computing- Unit 4
Cloud Computing- Unit 4
Cloud disaster recovery as a service that enables the backup and recovery of remote machines
on a cloud-based platform.
Disaster recovery can be categorized into three levels based on different requirements. These
include data-level, system level and application-level disaster recovery.
Data-level disaster recovery is the most fundamental among all others and guarantees the
security of the application data.
System level disaster recovery makes recovery for operating system of application server as
short as possible.
Application level disaster recovery makes recovery from the cloud software failure.
Recovery Point Objective (RPO): The RPO of a DR (Disaster Recovery) system depicts the
point in time of the most recent backup prior to the event of a disaster or failure.
Recovery Time Objective (RTO): The RTO is an impertinent business decision that determines
the duration it takes an application to be restored back online in the event of a failure
Performance: Disaster recovery service must allow a minimal impact on the performance of
each application being protected under failure-free operation for it to be useful.
Consistency: This ensures that an application regains a consistent state after a failure occurs.
Geographic separation: This ensures that both the primary and backup sites are located at
separate geographical locations
Security and isolation: Security concerns to be addressed include the privacy of storage,
network, and the virtual machine resources being used.
Virtual machine migration and cloning: Although not currently supported, cloud platforms
are expected to allow VM migration in or out of the cloud.
Passive Load Balancer: This is the same as Active Load Balancer except that it is in the passive
mode. It becomes active within 5 to 10 minutes when zone "A" experiences a downtime due to
a disaster.
Monitoring Unit: This unit manages the activities and states (good/ compromised) of both zone
"A" and zone "B" to improve efficiency and reliability of service.
Cost: Cloud service providers annually charge differently for interrelated DR systems as a
service operation
Failure detection: A failure detection time is expected to be very short so that the system
downtime can be adequately managed on time.
Security: Cyber terrorism attacks and natural disasters are major problems. Mechanisms must
be developed to protect important data.
Data storage: Storage single point of failure and data loss are critical challenges to store data
in cloud service providers' DR solutions.
Solutions:
Local backup: An alternative backup plan can be made for both data and complete application
at the customer's end
Geographical Redundancy and Backup (GRB): With this approach, two cloud zones are
located at different geographical locations and ones synchronously mirrored as a replication of
the other.
Inter-Private Cloud Storage (IPCS): This approach provisions three different geographical
backup locations for business data storage such that each backup location is dedicated to
backup only one of the servers, local backup server (LBS) or remote backup server (RBS).
Data loss: This is often experienced due to hard drive failure, malware attacks, natural disasters
(for example, earthquakes and floods), power failure and human errors (accidental file deletion
by a cloud administrator) leading to corrupt or unavailability of data.
Malicious insiders: These are past or present malicious insiders like a system administrator,
former employee, business partner or a third-party contractor with high-level of access to
potentially private, sensitive information and critical systems leading to a serious data breach.
Denial of Service (DoS): A DoS attack originates from a source machine only and is designed
to deny legitimate user’s access
Distributed Denial of Service (DDoS) attack: a DDoS attack locates vulnerable systems
(zombies/slaves) participating in a network
Weak authentication and identity management: Attackers can inject malicious software to
attack the cloud services, modify data and service management/control parameters or sniff data
in transit.
Account hijacking: This involves the stealing and using of the account details of a legitimate
user for disreputable purposes using techniques like fraud and phishing.
Shared technology vulnerabilities: Attackers to cause data breach due to compromised cloud
data security.
Lacking due diligence: Due diligence involves verification of the availability of appropriate
security controls, standards and accreditations.
Abuse of cloud services: Poorly secured cloud service deployments, fraudulent account sign-
ups via payment interfaces, and free cloud service trials expose cloud computing models to
malicious attacks.
Metadata spoofing attack: User information can be modified by attackers to redirect users to
a different place, a concept similar to DNS poisoning.
Security techniques for threats protection
To mitigate against the threats discussed in the previous section, the following security
measures must be taken into consideration to secure the cloud:
SLA
Service guarantee: This establishes the metrics which a cloud provider seeks to achieve within
a service guarantee time period.
Service guarantee time period: This is the acceptable period of time required for a service
guarantee to be met.
Service guarantee granularity: This characterizes the resources scale on which a provider
defines a service guarantee.
Service guarantee exclusions: These are the potential possibilities and likely events that are
not included in the service guarantee metric calculations.
Service credit: This is the accrued amount in favor of the cloud consumer or brought forward
towards future payments for new services
Service violation measurement and reporting: This identifies true violations of a service
guarantee by defining how and who is responsible for measuring and reporting of such
violation(s), respectively.
Types of SLAs
Customer-based SLA: which covers all services used by the users.
Service-based SLA: This is an agreement between the cloud service provider and all registered
users using the service.
Multilevel SLA: This kind of SLA consists of different levels with each containing the
conditions of different customers using the same service.
Customer level SLA: This document contains records of all service level management
problems related to a group of certain users.
Service level SLA: This document contains records of all service level management problems
related to a specific service
Significance of SLAs:
It provides concise and transparent understanding of the cloud services and the cloud
service providers.
It presents a list of all available services a service provider could provide with an
associated detailed specification and description of each service.
It provides detailed information regarding business requirements and objectives in a
transparent manner
It showcases critical privacy and security management policies for the cloud
environment.
It offers service-oriented monitoring of performance, service quality, responsibilities,
and priorities.
It presents the service management requirements in a transparent manner if an event of
a cloud service failure occurs.
Issues of Quality of Cloud Services
Performance quality evaluation measures of the cloud services are summarized and presented
The following table represents the economic quality features of cloud services:
The first initial step of migrating an organization's resources into the cloud starts by conducting
a preliminary checklist of some important definitions of needs and requirements with its
associated risk factors, followed by extensive planning and then migration.
Data integrity: This includes service requirements such as privacy, data security, and
accuracy.
Security: Cloud service providers must put up mechanisms to protect their consumer's personal
information and data securely.
Privacy: The cloud service providers should maintain privacy of sensitive information of their
customers for continued trustworthiness and integrity.
Credibility: This is the degree of quality of a cloud service provided to a cloud service
consumer by a cloud service provider.
Turnaround efficiency: This includes both the actual and the promised turnaround times.
Availability: This measures the degree of uptime and accessibility of resources, services or
components provisioned by a cloud service provider.
Reliability/success rate: This defines the degree of compliance of a cloud service provider to
provide mutually agreed upon services
Adaptability: This reflects redundant provisioning of data storage and processing facilities to
manage potential single point of failure events.
SLA: This is an official document that clearly specifies technical and functional descriptions
to be complied by the cloud service provider.
Customer support: This is the actual support (technical, feedback, security, and so on) offered
by the cloud service provider to its consumers.