“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
Cloud computing provides businesses with a flexible and scalable IT infrastructure that reduces costs. It allows companies to increase or decrease bandwidth as needed to match their business needs. By using cloud computing, businesses can avoid the high costs of owning and maintaining their own servers and IT staff. It also provides access to data from any location through the internet and ensures data is securely backed up.
Cloud computing provides businesses flexibility and cost savings. It allows companies to scale their bandwidth and infrastructure up or down as needed to match traffic fluctuations. This saves money compared to maintaining physical servers. Businesses can access data from anywhere via the internet with cloud computing. Security and backups are also improved since cloud providers spend heavily on data protection. Various roles like cloud providers, consumers, owners, and administrators each have different responsibilities for managing cloud services and resources.
The document discusses key concepts in cloud computing including cloud roles, characteristics, delivery models, and deployment models. It defines roles like cloud provider, consumer, and service owner. It describes characteristics such as on-demand access, elasticity, and multi-tenancy. Delivery models covered are IaaS, PaaS, and SaaS. Deployment models discussed are public, private, hybrid, and community clouds.
The document discusses cloud computing fundamentals including cloud roles, characteristics, delivery models, and deployment models. It defines key roles like cloud provider, consumer, and service owner. Characteristics covered include on-demand access, elasticity, and multi-tenancy. Delivery models explained are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtual servers and storage, PaaS provides development platforms, and SaaS provides software applications.
The document discusses cloud storage, including what it is, how it works, different types of cloud storage models like public, private, community and hybrid clouds, advantages like accessibility and cost savings, disadvantages like reliance on internet and data security issues, and concludes that while cloud computing activities are not new, mainstream adoption could cause problems for users so some prefer open source local systems.
The document discusses key concepts in cloud computing, including definitions, models, and architectures. It defines cloud computing using NIST and ISO/IEC definitions, noting essential characteristics like on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It describes cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), as well as deployment models like public, private, community, and hybrid clouds. The document also provides reference architectural models for IaaS, PaaS and SaaS and discusses logical models and security scope in cloud computing.
Exploring the cloud deployment and service delivery modelscloudresearcher
This document summarizes cloud computing deployment and service delivery models. It describes common cloud deployment models including private clouds for internal use, public clouds for external use, hybrid clouds combining public and private, and community clouds for specific groups. It also outlines emerging models like combined and inter clouds. For service delivery, it defines the main models of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), explaining the level of control users have and examples of each.
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
This document summarizes an academic research paper that explores different cloud deployment and service delivery models. It begins by defining cloud computing and discussing its benefits for organizations. It then describes various cloud deployment models including private, public, hybrid, community, combined, and inter-cloud models. It also outlines several cloud service delivery models such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and emerging models like Integration as a Service (IgaaS) and Business Process as a Service (BPaaS). The document concludes by presenting results from a survey that showed SaaS is the most commonly implemented cloud service model.
Public cloud is a cloud computing model where computing resources are dynamically provisioned on-demand via the internet from an off-site third-party provider. It offers flexible resources, scalability, and a pay-per-use model but has less security and customization than private cloud. Popular public cloud providers include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Cloud computing provides on-demand, pay-as-you-go computing resources over the internet. It has grown rapidly since the 2000s as a more efficient and flexible alternative to traditional computing models. While promising lower costs and increased agility, cloud computing also presents challenges regarding security, compliance with regulations, vendor lock-in, and auditability that businesses must address through service level agreements with cloud vendors. As the cloud computing industry and standards continue to evolve, many expect it will transform how IT resources are utilized.
CA NOTES ON EMERGING TECHNOLOGIES
FREE AFFIDAVITS AND NOTICES FORMATS
FREE AGREEMENTS AND CONTRACTS FORMATS
FREE LLB LAW NOTES
FREE CA ICWA NOTES
FREE LLB LAW FIRST SEM NOTES
FREE LLB LAW SECOND SEM NOTES
FREE LLB LAW THIRD SEM NOTES
FREE LLB LAW FOURTH SEM NOTES
FREE LLB LAW FIFTH SEM NOTES
FREE LLB LAW SIXTH SEM NOTES
FREE CA ICWA FOUNDATION NOTES
FREE CA ICWA INTERMEDIATE NOTES
FREE CA ICWA FINAL NOTES
KANOON KE RAKHWALE INDIA
HIRE LAWYER ONLINE
LAW FIRMS IN DELHI
CA FIRM DELHI
VISIT : https://www.kanoonkerakhwale.com/
VISIT : https://hirelawyeronline.com/
The document discusses the key characteristics, principles, deployment models, and advantages of cloud computing. Specifically, it outlines the five essential characteristics of cloud computing as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also describes the basic principles of cloud computing as federation, independence, isolation, elasticity, business orientation, and trust. Finally, it summarizes the main deployment models of public cloud, private cloud, hybrid cloud, and community cloud and their respective advantages.
The document provides an overview of cloud computing concepts and mechanisms. It discusses key topics like virtual servers, ready-made environments, automated scaling listeners, failover systems, multi-device brokers, pay-per-use monitors, state management databases, and resource replication. These mechanisms work together to establish cloud-based technology architectures and allow cloud providers to share physical resources with multiple consumers.
From the server room to the board room, there is a lot of talk about “the cloud” — and for good reason. The cloud offers organizations — and their information technology (IT) staffs, in particular — a number of important benefits ranging from increased efficiencies to scalability. Taking advantage of these benefits requires understanding the various cloud models available and how they can best meet your organization’s specific needs.
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
-Cloud
-Underlying technology pieces from which cloud computing -Infrastructure is built
-Characteristics of Cloud
-Types of cloud services (SaaS, IaaS and PaaS)
-Cloud deployment models
-Virtualization
-Using Virtualization to form Clouds
The document discusses cloud storage, including what it is, how it works, different types of cloud storage models like public, private, community and hybrid clouds, advantages like accessibility and cost savings, disadvantages like reliance on internet and data security issues, and concludes that while cloud computing activities are not new, mainstream adoption could cause problems for users so some prefer open source local systems.
The document discusses key concepts in cloud computing, including definitions, models, and architectures. It defines cloud computing using NIST and ISO/IEC definitions, noting essential characteristics like on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It describes cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), as well as deployment models like public, private, community, and hybrid clouds. The document also provides reference architectural models for IaaS, PaaS and SaaS and discusses logical models and security scope in cloud computing.
Exploring the cloud deployment and service delivery modelscloudresearcher
This document summarizes cloud computing deployment and service delivery models. It describes common cloud deployment models including private clouds for internal use, public clouds for external use, hybrid clouds combining public and private, and community clouds for specific groups. It also outlines emerging models like combined and inter clouds. For service delivery, it defines the main models of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), explaining the level of control users have and examples of each.
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
This document summarizes an academic research paper that explores different cloud deployment and service delivery models. It begins by defining cloud computing and discussing its benefits for organizations. It then describes various cloud deployment models including private, public, hybrid, community, combined, and inter-cloud models. It also outlines several cloud service delivery models such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and emerging models like Integration as a Service (IgaaS) and Business Process as a Service (BPaaS). The document concludes by presenting results from a survey that showed SaaS is the most commonly implemented cloud service model.
Public cloud is a cloud computing model where computing resources are dynamically provisioned on-demand via the internet from an off-site third-party provider. It offers flexible resources, scalability, and a pay-per-use model but has less security and customization than private cloud. Popular public cloud providers include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Cloud computing provides on-demand, pay-as-you-go computing resources over the internet. It has grown rapidly since the 2000s as a more efficient and flexible alternative to traditional computing models. While promising lower costs and increased agility, cloud computing also presents challenges regarding security, compliance with regulations, vendor lock-in, and auditability that businesses must address through service level agreements with cloud vendors. As the cloud computing industry and standards continue to evolve, many expect it will transform how IT resources are utilized.
CA NOTES ON EMERGING TECHNOLOGIES
FREE AFFIDAVITS AND NOTICES FORMATS
FREE AGREEMENTS AND CONTRACTS FORMATS
FREE LLB LAW NOTES
FREE CA ICWA NOTES
FREE LLB LAW FIRST SEM NOTES
FREE LLB LAW SECOND SEM NOTES
FREE LLB LAW THIRD SEM NOTES
FREE LLB LAW FOURTH SEM NOTES
FREE LLB LAW FIFTH SEM NOTES
FREE LLB LAW SIXTH SEM NOTES
FREE CA ICWA FOUNDATION NOTES
FREE CA ICWA INTERMEDIATE NOTES
FREE CA ICWA FINAL NOTES
KANOON KE RAKHWALE INDIA
HIRE LAWYER ONLINE
LAW FIRMS IN DELHI
CA FIRM DELHI
VISIT : https://www.kanoonkerakhwale.com/
VISIT : https://hirelawyeronline.com/
The document discusses the key characteristics, principles, deployment models, and advantages of cloud computing. Specifically, it outlines the five essential characteristics of cloud computing as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also describes the basic principles of cloud computing as federation, independence, isolation, elasticity, business orientation, and trust. Finally, it summarizes the main deployment models of public cloud, private cloud, hybrid cloud, and community cloud and their respective advantages.
The document provides an overview of cloud computing concepts and mechanisms. It discusses key topics like virtual servers, ready-made environments, automated scaling listeners, failover systems, multi-device brokers, pay-per-use monitors, state management databases, and resource replication. These mechanisms work together to establish cloud-based technology architectures and allow cloud providers to share physical resources with multiple consumers.
From the server room to the board room, there is a lot of talk about “the cloud” — and for good reason. The cloud offers organizations — and their information technology (IT) staffs, in particular — a number of important benefits ranging from increased efficiencies to scalability. Taking advantage of these benefits requires understanding the various cloud models available and how they can best meet your organization’s specific needs.
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
-Cloud
-Underlying technology pieces from which cloud computing -Infrastructure is built
-Characteristics of Cloud
-Types of cloud services (SaaS, IaaS and PaaS)
-Cloud deployment models
-Virtualization
-Using Virtualization to form Clouds
module4 cloud provider and consumer perspRadhika R
Controlling scalability features such as usage quotas, active instance thresholds, and the configuration and deployment of the automated scaling listener and load balancer mechanisms.
containers-in-cloud.pptx introduction partRadhika R
Many SaaS offerings are provided free of charge, although these cloud services often come with data collecting sub-programs that harvest usage data for the benefit of the cloud provider (what benefits?).
containerization1. introduction to containRadhika R
SaaS-based cloud services are almost always accompanied by refined and generic APIs, they are usually designed to be incorporated as part of larger distributed solutions.
moThese platforms hide the complexity and details of the underlying infrastru...Radhika R
These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface).
Cloud Computing is a general term used to describe a new class of network bas...Radhika R
Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet,
basically a step on from Utility Computing
a collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform).
Using the Internet for communication and transport provides hardware, software and networking services to clients
DTGO -a public organization that specializes in IT infrastructure and technology
services for public sector organization.
• DTGOV has virtualized its network infrastructure to produce a logical network
layout favoring network segmentation and isolation.
• Figure 7.4 depicts the logical network perimeter implemented at each DTGOV data
center. A logical network layout is established through a set of logical network
perimeters using various firewalls and virtual networks.
The cloud consumer’s on-premise environment and a cloud provider’s
cloud-based environment, connected through VPN and protect
communications. Figure 7.3
Virtualization technology and virtualizationRadhika R
Logical Network Perimeter
• Isolation of a network environment from the rest of a communications
network
• Establishes a virtual network boundary Figure 7.1
that can encompass and isolate a group of related cloud-based IT
resources
• This mechanism can be implemented to: – isolate IT resources in a cloud from non-authorized users – isolate IT resources in a cloud from non-users – isolate IT resources in a cloud from cloud consumers – control the bandwidth that is available to isolated IT resources
introduction to web technology and web applicationRadhika R
Enable multiple users (tenants) to access the same
application simultaneously
• Multitenant applications ensure that tenants do
not have access to data and configuration
information that is not their own
Introduction to cloud delivery models of paasRadhika R
Cloud computing relies on internet.
• Web technology is generally used as both the
implementation medium and the managUniform resource locator (URL)
Commonly informally referred to as a web address
a reference to a web resource that specifies its location
on a computer network and a mechanism for retrieving
it
Example: http://www.example.com/index.html
• Hypertext transfer protocol (HTTP)
Primary communication protocol used to exchange
content
• Markup languages (HTML, XML)
16
Express Web‐centric data and metadata
Virtualization Technology Hardware Independence Server ConsolidationRadhika R
Virtualization is the process of converting a physical IT resource into a virtual IT
resource.
Most types of IT resources can be virtualized, including:
Servers
Storage
Network
Power
A number of characteristics define cloud data, applications services and infr...Radhika R
Remotely hosted: Services or data are hosted on remote infrastructure.
Ubiquitous: Services or data are available from anywhere.
Commodified: The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!
Cloud computing is an umbrella term used to refer to Internet based developme...Radhika R
A number of characteristics define cloud data, applications services and infrastructure:
Remotely hosted: Services or data are hosted on remote infrastructure.
Ubiquitous: Services or data are available from anywhere.
Commodified: The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
How to use nRF24L01 module with ArduinoCircuitDigest
Learn how to wirelessly transmit sensor data using nRF24L01 and Arduino Uno. A simple project demonstrating real-time communication with DHT11 and OLED display.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
This presentation provides a high level insight about DFT analysis and test coverage calculation, finalizing test strategy, and types of tests at different levels of the product.
☁️ GDG Cloud Munich: Build With AI Workshop - Introduction to Vertex AI! ☁️
Join us for an exciting #BuildWithAi workshop on the 28th of April, 2025 at the Google Office in Munich!
Dive into the world of AI with our "Introduction to Vertex AI" session, presented by Google Cloud expert Randy Gupta.
The role of the lexical analyzer
Specification of tokens
Finite state machines
From a regular expressions to an NFA
Convert NFA to DFA
Transforming grammars and regular expressions
Transforming automata to grammars
Language for specifying lexical analyzers
Analysis of reinforced concrete deep beam is based on simplified approximate method due to the complexity of the exact analysis. The complexity is due to a number of parameters affecting its response. To evaluate some of this parameters, finite element study of the structural behavior of the reinforced self-compacting concrete deep beam was carried out using Abaqus finite element modeling tool. The model was validated against experimental data from the literature. The parametric effects of varied concrete compressive strength, vertical web reinforcement ratio and horizontal web reinforcement ratio on the beam were tested on eight (8) different specimens under four points loads. The results of the validation work showed good agreement with the experimental studies. The parametric study revealed that the concrete compressive strength most significantly influenced the specimens’ response with the average of 41.1% and 49 % increment in the diagonal cracking and ultimate load respectively due to doubling of concrete compressive strength. Although the increase in horizontal web reinforcement ratio from 0.31 % to 0.63 % lead to average of 6.24 % increment on the diagonal cracking load, it does not influence the ultimate strength and the load-deflection response of the beams. Similar variation in vertical web reinforcement ratio leads to an average of 2.4 % and 15 % increment in cracking and ultimate load respectively with no appreciable effect on the load-deflection response.
Passenger car unit (PCU) of a vehicle type depends on vehicular characteristics, stream characteristics, roadway characteristics, environmental factors, climate conditions and control conditions. Keeping in view various factors affecting PCU, a model was developed taking a volume to capacity ratio and percentage share of particular vehicle type as independent parameters. A microscopic traffic simulation model VISSIM has been used in present study for generating traffic flow data which some time very difficult to obtain from field survey. A comparison study was carried out with the purpose of verifying when the adaptive neuro-fuzzy inference system (ANFIS), artificial neural network (ANN) and multiple linear regression (MLR) models are appropriate for prediction of PCUs of different vehicle types. From the results observed that ANFIS model estimates were closer to the corresponding simulated PCU values compared to MLR and ANN models. It is concluded that the ANFIS model showed greater potential in predicting PCUs from v/c ratio and proportional share for all type of vehicles whereas MLR and ANN models did not perform well.
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
This paper proposes a shoulder inverse kinematics (IK) technique. Shoulder complex is comprised of the sternum, clavicle, ribs, scapula, humerus, and four joints.
3. Cloud Provider
•The organization that provides cloud-based IT resources
responsible for making cloud services available to cloud
consumers, as per agreed upon SLA guarantees.
•Cloud providers normally own the IT resources that are made
available for lease by cloud consumers, however, some cloud
providers also “resell” IT resources leased from other cloud
providers.
4. Cloud Consumer
A cloud consumer is an organization (or a human)
that has a formal contract or arrangement with a
cloud provider to use IT resources made available by
the cloud provider.
Specifically, the cloud consumer uses a cloud
service consumer to access a cloud service .
5. Figure 4.1 A cloud consumer (Organization A) interacts with a cloud service from a cloud
provider (that owns Cloud A). Within Organization A, the cloud service consumer is
being used to access the cloud service.
6. Cloud Service Owner
•The person or organization that legally owns a cloud service .
•The cloud service owner can be the cloud consumer, or the
cloud provider that owns the cloud within which the cloud
service resides.
•For example, either the cloud consumer of Cloud X or the cloud
provider of Cloud X could own Cloud Service A .
7. Figure 4.2 A cloud consumer can be a cloud service owner when it deploys its own service in a
cloud.
8. Figure 4.3 A cloud provider becomes a cloud service owner if it deploys its own cloud
service, typically for other cloud consumers to use.
9. Cloud Resource Administrator
•the person or organization responsible for administering a
cloud-based IT resource (including cloud services).
•can be (or belong to) the cloud consumer or cloud provider of
the cloud within which the cloud service resides.
•it can be (or belong to) a third-party organization
contracted to administer the cloud-based IT resource.
10. Figure 4.4 A cloud resource administrator can be with a cloud consumer organization
and administer remotely accessible IT resources that belong to the cloud consumer.
11. Figure 4.5 A cloud resource administrator can be with a cloud provider organization for which it
can administer the cloud providerʼs internally and externally available IT resources.
12. Cloud Auditor
•A third-party (often accredited) that conducts independent
assessments of cloud environments .
•Responsible for the evaluation of security controls, privacy
impacts, and performance.
•provide an unbiased assessment (and possible
endorsement) of a cloud environment to help strengthen
the trust relationship between cloud consumers and cloud
providers.
13. Cloud Broker
•a party that assumes the responsibility of managing and
negotiating the usage of cloud services between cloud
consumers and cloud providers.
14. Cloud Carrier
The party responsible for providing the wire-
level connectivity between cloud consumers and
cloud providers .
This role is often assumed by network and
telecommunication providers.
15. Organizational Boundary
represents the physical perimeter that
surrounds a set of IT resources that are owned
and governed by an organization.
does not represent the boundary of an actual
organization, only an organizational set of IT
assets and IT resources.
Similarly, clouds have an organizational
boundary.
16. Organizational Boundary
Figure 4.6 Organizational boundaries of a cloud consumer (left), and a cloud provider
(right), represented by a broken line notation.
17. Trust Boundary
a logical perimeter that typically spans beyond
physical boundaries to represent the extent to
which IT resources are trusted .
An organizational boundary represents the
physical scope of IT resources owned and
governed by an organization.
A trust boundary is the logical perimeter that
encompasses the IT resources trusted by an
organization.
18. Trust Boundary
Figure 4.7 An extended trust boundary encompasses the organizational boundaries of the cloud
provider and the cloud consumer.
19. 4.2. Cloud Characteristics
•on-demand usage: A cloud consumer can unilaterally access
cloud-based IT resources giving the cloud consumer the
freedom to self-provision these IT resources.
•ubiquitous access: represents the ability for a cloud service
to be widely accessible.
•multitenancy (and resource pooling): A cloud provider
pools its IT resources to serve multiple cloud service
consumers by using multitenancy models that frequently
rely on the use of virtualization technologies.
20. 4.2. Cloud Characteristics
•Elasticity: the automated ability of a cloud to transparently
scale IT resources, as required in response to runtime
conditions or as pre-determined by the cloud consumer or
cloud provider.
•measured usage: represents the ability of a cloud platform
to keep track of the usage of its IT resources, primarily by
cloud consumers.
21. 4.3. Cloud Delivery Models
represents a specific, pre-packaged
combination of IT resources offered by a cloud
provider.
• Infrastructure-as-a-Service (IaaS)
• Platform-as-a-Service (PaaS)
• Software-as-a-Service (SaaS)
22. Infrastructure-as-a-Service (IaaS)
represents a self-contained IT environment
comprised of infrastructure-centric IT resources
that can be accessed and managed via cloud
service-based interfaces and tools.
Include hardware, network, connectivity,
operating systems, and other “raw” IT resources.
23. Infrastructure-as-a-Service (IaaS)
This model is therefore used by cloud
consumers that require a high level of control
over the cloud-based environment they intend to
create.
A central and primary IT resource within a
typical IaaS environment is the virtual server.
Virtual servers are leased by specifying
server hardware requirements, such as
processor capacity, memory, and local storage
space
24. Figure 4.11 A cloud consumer is using a virtual server within an IaaS environment. Cloud
consumers are provided with a range of contractual guarantees by the cloud provider,
pertaining to characteristics such as capacity, performance, and availability.
25. Platform-as-a-Service (PaaS)
•represents a pre-defined “ready-to-use” environment
typically comprised of already deployed and configured IT
resources.
•PaaS relies on (and is primarily defined by) the usage of a ready-
made environment that establishes a set of pre-packaged
products and tools used to support the entire delivery lifecycle
of custom applications.
26. Platform-as-a-Service (PaaS)
•the cloud consumer is granted a lower level of control over the
underlying IT resources that host and provision the platform
•PaaS products are available with different development stacks.
For example, Google App Engine offers a Java and Python-based
environment.
27. Figure 4.12 A cloud consumer is accessing a ready-made PaaS environment. The question mark
indicates that the cloud consumer is intentionally shielded from the implementation details of
the platform.
28. Software-as-a-Service (SaaS)
A software program positioned as a shared
cloud service and made available as a “product”
or generic utility.
The SaaS delivery model is typically used to
make a reusable cloud service widely available
(often commercially) to a range of cloud
consumers.
A cloud consumer is generally granted very
limited administrative control over a SaaS
implementation.
29. Figure 4.13 The cloud service consumer is given access the cloud service contract, but not to
any underlying IT resources or implementation details.
32. IaaS + PaaS
Figure 4.14 A PaaS
environment based on the
IT resources provided by
an underlying IaaS
environment.
33. IaaS + PaaS
Figure 4.15 An example of a
contract between Cloud Providers
X and Y, in which services offered
by Cloud Provider X are
physically hosted on virtual servers
belonging to Cloud Provider Y.
Sensitive data that is legally
required to stay in a specific
region is physically kept in Cloud
B, which is physically
located in that region.
34. IaaS + PaaS + SaaS
Figure 4.16 A simple
l a y e re d v i e w o f
a n architecture
comprised of
I a a S a n d
environments
P a a S
hosting
three SaaS cloud service
implementations.
35. 4.4. Cloud Deployment Models
There are four common cloud deployment models:
1. Public Cloud
2. Community Cloud
3. Private Cloud
4. Hybrid Cloud
36. Public Clouds
A public cloud is a publicly accessible cloud
environment owned by a third-party cloud
provider.
The IT resources on public clouds are usually
provisioned via the previously described cloud
delivery models and are generally offered to
cloud consumers at a cost or are
commercialized via other avenues (such as
advertisement).
37. Figure 4.17 Organizations act as cloud consumers when accessing cloud services and IT resources
made available by different cloud providers.
38. Community Clouds
•A community cloud is similar to a public cloud except that its access
is limited to a specific community of cloud consumers.
•The community cloud may be jointly owned by the community
members or by a third-party cloud provider that provisions a
public cloud with limited access.
•Membership in the community does not necessarily
guarantee access to or control of all the cloud’s IT resources.
•Parties outside the community are generally not granted access
unless allowed by the community.
39. Figure 4.18 An example of a “community” of organizations accessing IT resources from a community clou
40. Private Clouds
A private cloud is owned by a single organization
Private clouds enable an organization to use cloud
computing technology as a means of centralizing
access to IT resources by different parts, locations,
or departments of the organization.
The actual administration of a private cloud
environment may be carried out by internal or
outsourced staff.
the same organization is technically both the cloud
consumer and cloud provider.
41. Figure 4.19 A cloud service consumer in the organizationʼs on-premise environment accesses
a cloud service hosted on the same organizationʼs private cloud via a virtual private network.
42. Hybrid Clouds
•A hybrid cloud is a cloud environment comprised of two or
more different cloud deployment models.
•For example, a cloud consumer may choose to deploy cloud
services processing sensitive data to a private cloud and other,
less sensitive cloud services to a public cloud.
43. Figure 4.20 An organization using a hybrid cloud architecture that utilizes both a private and public
cloud.