29-10-2012, 03:44 PM
The Cloud Computing Paradigm
The Cloud Computing.ppt (Size: 1.79 MB / Downloads: 213)
Origin of the term “Cloud Computing”
“Comes from the early days of the Internet where we drew the network as a cloud… we didn’t care where the messages went… the cloud hid it from us” – Kevin Marks, Google
First cloud around networking (TCP/IP abstraction)
Second cloud around documents (WWW data abstraction)
The emerging cloud abstracts infrastructure complexities of servers, applications, data, and heterogeneous platforms
(“muck” as Amazon’s CEO Jeff Bezos calls it)
A Working Definition of Cloud Computing
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Cloud Service Models
Cloud Software as a Service (SaaS)
Use provider’s applications over a network
User doesn’t manage or control the network, servers, OS, storage or applications
Cloud Platform as a Service (PaaS)
Users deploy their applications on a cloud
Users control their apps
Users don’t manage servers, IS, storage
Common Cloud Characteristics
Cloud computing often leverages:
Massive scale
Homogeneity
Virtualization
Resilient computing
Low cost software
Geographic distribution
Service orientation
Advanced security technologies
General Security Challenges
Trusting vendor’s security model
Customer inability to respond to audit findings
Obtaining support for investigations
Indirect administrator accountability
Proprietary implementations can’t be examined
Loss of physical control
Cloud Security Advantages
Simplification of Compliance Analysis
Data Held by Unbiased Party (cloud vendor assertion)
Low-Cost Disaster Recovery and Data Storage Solutions
On-Demand Security Controls
Real-Time Detection of System Tampering
Rapid Re-Constitution of Services
Advanced Honeynet Capabilities