04-02-2013, 12:51 PM
Effectively and Securely Using the Cloud Computing Paradigm
1Effectively and Securely.ppt (Size: 3.83 MB / Downloads: 86)
Origin of the term “Cloud Computing”
“Comes from the early days of the Internet where we drew the network as a cloud… we didn’t care where the messages went… the cloud hid it from us” – Kevin Marks, Google
First cloud around networking (TCP/IP abstraction)
Second cloud around documents (WWW data abstraction)
The emerging cloud abstracts infrastructure complexities of servers, applications, data, and heterogeneous platforms
(“muck” as Amazon’s CEO Jeff Bezos calls it)
A Working Definition of Cloud Computing
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
5 Essential Cloud Characteristics
On-demand self-service
Broad network access
Resource pooling
Location independence
Rapid elasticity
Measured service
3 Cloud Service Models
Cloud Software as a Service (SaaS)
Use provider’s applications over a network
Cloud Platform as a Service (PaaS)
Deploy customer-created applications to a cloud
Cloud Infrastructure as a Service (IaaS)
Rent processing, storage, network capacity, and other fundamental computing resources
To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics
Common Cloud Characteristics
Cloud computing often leverages:
Massive scale
Homogeneity
Virtualization
Resilient computing
Low cost software
Geographic distribution
Service orientation
Advanced security technologies
General Security Challenges
Trusting vendor’s security model
Customer inability to respond to audit findings
Obtaining support for investigations
Indirect administrator accountability
Proprietary implementations can’t be examined
Loss of physical control
Cloud Network and Perimeter Security
Advantages
Distributed denial of service protection
VLAN capabilities
Perimeter security (IDS, firewall, authentication)
Challenges
Virtual zoning with application mobility
The ‘Why’ and ‘How’ of Cloud Migration
There are many benefits that explain why to migrate to clouds
Cost savings, power savings, green savings, increased agility in software deployment
Cloud security issues may drive and define how we adopt and deploy cloud computing solutions
Migration Paths for Cloud Adoption
Use public clouds
Develop private clouds
Build a private cloud
Procure an outsourced private cloud
Migrate data centers to be private clouds (fully virtualized)
Build or procure community clouds
Organization wide SaaS
PaaS and IaaS
Disaster recovery for private clouds
Use hybrid-cloud technology
Workload portability between clouds