Dan C. Marinescu
Contents
Dan C. Marinescu
Network-centric computing
Dan C. Marinescu
Network-centric content
Dan C. Marinescu
Dan C. Marinescu
Dan C. Marinescu
Cloud computing
Dan C. Marinescu
Lower costs for the cloud service provider are past to the cloud users.
Data is stored:
closer to the site where it is used.
in a device and in a location-independent manner.
Dan C. Marinescu
Types of clouds
Dan C. Marinescu
Dan C. Marinescu
10
Dan C. Marinescu
11
Dan C. Marinescu
12
Dan C. Marinescu
13
More challenges
Dan C. Marinescu
14
Delivery models
Software as a Service (SaaS)
Deployment models
Public cloud
Private cloud
Community cloud
Hybrid cloud
Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Resources
Compute & storage servers
Networks
Services
Applications
Dan C. Marinescu
15
Dan C. Marinescu
16
Software-as-a-Service (SaaS)
Not suitable for real-time applications or for those where data is not
allowed to be hosted externally.
Examples: Gmail, Google search engine.
Dan C. Marinescu
17
Platform-as-a-Service (PaaS)
Dan C. Marinescu
18
Infrastructure-as-a-Service (IaaS)
The user is able to deploy and run arbitrary software, which can
include operating systems and applications.
Dan C. Marinescu
19
Infrastructure as a Service
Presentation
API
Applications
Platform as a Service
Software as a Service
Metadata
Integration and
middleware
Integration and
middleware
API
API
API
Core
connectivity
Abstraction
Core
connectivity
Abstraction
Core
connectivity
Abstraction
Dan C. Marinescu
Data
Hardware
Hardware
Hardware
Facilities
Facilities
Facilities
20
Cloud activities
Virtualization.
Service provisioning.
Call center.
Operations management.
Systems management.
QoS management.
Billing and accounting, asset management.
SLA management.
Technical support and backups.
Dan C. Marinescu
21
ID and authentication.
Certification and accreditation.
Intrusion prevention.
Intrusion detection.
Virus protection.
Cryptography.
Physical security, incident response.
Access control, audit and trails, and firewalls.
Dan C. Marinescu
22
Data management.
Development.
Dan C. Marinescu
23
Auditor
Security
audit
Privacy
impact audit
Performance
audit
Broker
Service Provider
Service
Management
PaaS
IAAS
IaaS
Resource
abstraction and
control layer
Physical resource
layer
Hardware
Business
support
Provisioning
Portability/
Interoperability
Intermediation
S
e
c
u
r
i
t
y
P
r
i
v
a
c
y
Aggregation
Arbitrage
Facility
Carrier
Dan C. Marinescu
24
Ethical issues
Implications
Unauthorized access.
Data corruption.
Infrastructure failure, and service unavailability.
Dan C. Marinescu
25
De-perimeterisation
Identity fraud and theft are made possible by the unauthorized access
to personal data in circulation and by new forms of dissemination
through social networks and they could also pose a danger to cloud
computing.
Dan C. Marinescu
26
Privacy issues
Dan C. Marinescu
27
Cloud vulnerabilities
Such events can affect the Internet domain name servers and
prevent access to a cloud or can directly affect the clouds:
Dan C. Marinescu
28