Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction The network is the computer By Waseem Anwar Chaudhri.

Similar presentations


Presentation on theme: "Introduction The network is the computer By Waseem Anwar Chaudhri."— Presentation transcript:

1 Introduction The network is the computer By Waseem Anwar Chaudhri

2 Sun microsystem slogan is “The network is the computer” and it truly reflects the concept of Cloud computing in which one virtual interface acts as a computer consisting of a network of computers to serve applications and data.

3 Cloud Computing Cloud computing is an interconnection of large number of computers which can be normal PC’s or Servers and provide different services like computing and storage. Key Areas: Computing Power Network Infrastructure Storage

4 Cloud Type Cloud Computing similar to VPN dynamically provide virtual computing resources to the user based on there requirements. They can be classified into Public Clouds Private Clouds Hybrid Clouds Provided by a third party, Provided by the company owns IT department, or blend of both

5 Cloud Storage Cloud storage is delivered as a service via a subscriber model

6 Shared Infrastructure Model Cloud Storage is beneficial for both the service provider and customer. Service providers gain economies of scale via multi- tenant infrastructure and recurring revenue while enterprises gain the benefit of growing storage capability and data protection without worrying about the underlying technology. In this scenario data storage becomes even more crucial.

7 Companies offering cloud Services Amazon.com’s Simple Storage Service (S3) IBM Google Google Docs, presentation software, email and calendar / scheduling and providing an interface between all these services for user’s easiness. EMC Egnyte

8 Egnyte Services via Web Interface

9 Advantages of Cloud Storage Scalability Cloud storage provides scalability as space can be demanded ranging from few Giga bytes to Pita Bytes Reliability On cloud data is backup at multiple places. Low cost Cloud provides storage at much less rates as they utilizes space more efficiently

10 Risk factors Reliability Just like own IT infrastructure if Cloud service provider not manage good infrastructure and not keep multiple copies data can be at risk effecting reliability factor. Security Similarly to applying high security measures there can be high tech thieves who can hack systems and temper data. Accessibility issue As data is accessed via the internet there are chances that internet connection on user or cloud end goes down or may be there is a latency issue. User error It may lead to exposing data to unauthorized user or permanent deletion

11 Cloud Storage Standards SOA Service-Oriented Architecture is a collection of services which communicate with each other they can be based on simple data passing or can be involving two or more services to accomplish some task. "SOA, through its loose coupling of applications, naturally complements cloud computing, with its loose coupling of hardware to software, to provide enterprises significant opportunities for increasing their agility, productivity, and efficiency," [4]4 OCCI System virtual machine is one of the techniques used to develop infrastructure as a service (IaaS) which offer deployment of applications and underlying operating systems to handle services loads. The Open Cloud Computing Interface (OCCI) has been developed by Open Grid Forum which provides a free open API and is based on Resource Oriented Architecture ROA. [3]3

12 OCCI

13 Cloud Storage Standards CDMI The Storage Networking Industry Association™ has also proposed a cloud storage standard known as Cloud Data Management Interface (CDMI) which enables interoperable cloud storage and data management. It provides a good control for applying data services. [3]3 SLA A service level agreement (SLA) is a part of a service contract where the level of service is formally defined.

14 CDMI AND OCCI

15 Security Aspects with Service Provide Physical Security in Terms of Data Center Is the data center physically secure? What about it's ability to withstand power outages? For how long? Electrical power paths? How are communications facilities enabled? Communications providers have a POP (point of presence) at the facility? Certified (SAS 70 Type II)? How data is saved Is encryption used before saving the data. What measure should the sender take? When data is received at storage end and decrypted is there any risk

16 Authentication and identification What sort of verification level should be enforced How much powerful passwords should be made. How frequent passwords should be changed How strict verification process should be What method should be adopted to convey new authentication. Service agreement between customer and service provider Do customer and service provider understand each other. I s services clearly defined. Limitation Trustworthiness Reputation of the service provider Providing what they commits. Is there performance satisfactory. What other service providers are offering

17 Conclusion Cloud computing is an emerging technology and its demand is increasing manifold. Considerable research is also taking place to make it more reliable fast and efficient and to identify its key risk factors. But still lot of efforts and study is required to make it more risk free and secure as well to increase its efficiency and trust worthy.

18 Potential Research To look how trustworthiness of users can be increased with respect to the new security architecture and services, protection measures taken or required for securing management infrastructure and storage load from malicious attacks

19 References [1] Lori M. Kaufman, "Data Security in the World of Cloud Computing," IT ALL DEPENDS, IEEE Security & Privacy, pp. 61-64, Auguest 2009. [2] Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online.: Que Publishing, 2009. [3] Storage Networking Industry Association and the Open Grid Forum, "Cloud Storage for Cloud," SNIA, September 2009. [4] (2009, November) SFGate. [Online]. http://www.sfgate.com/cgi- bin/article.cgi?f=/g/a/2009/11/13/urnidgns852573C4006938800025766D006DF 626.DTLhttp://www.sfgate.com/cgi- bin/article.cgi?f=/g/a/2009/11/13/urnidgns852573C4006938800025766D006DF 626.DTL [5] Steve Lesem. (2009, July) Cloud Storage Strategy. [Online]. http://cloudstoragestrategy.com/2009/07/security-and-cloud-storage- everybody-talks-about-it-but-is-it-really-all-that-different.html http://cloudstoragestrategy.com/2009/07/security-and-cloud-storage- everybody-talks-about-it-but-is-it-really-all-that-different.html


Download ppt "Introduction The network is the computer By Waseem Anwar Chaudhri."

Similar presentations


Ads by Google