Sei sulla pagina 1di 5

Cloud Computing: A New Era of Computing

Shailesh Saxena
Asst. professor, HOD (CS & IT)
SRMSCETR, Bareilly
Shaileshgla@gmail.com
ABSTRACT- Due to the advent of technologies and
applications that are large and resource intensive, a large
scale distributed and heterogeneous system like grids have
emerged as popular platforms. Cloud Computing is a model
for enabling convenient, on-demand network access to a
shared pool of configurable computing resources. “Cloud
Computing is a reality that enterprise cannot escape.” Cloud
Computing has taken commercial computing by storm that
provide easy access to a company’s high-performance
computing and storage infrastructure through web services.
Cloud Computing is really changing the way of computation.
Many computer resources such as hardware and
software are collected into the resource pool which can be
assessed by the users via the internet through web browsers
or mobile devices. Cloud computing can be divided into three
types:- private, public and hybrid computing. The different
types of Cloud Computing Services commonly referred to as
Software as a Service (SaaS), Platform as a Service (PaaS) Fig. 1: Cloud computing concept
and Infrastructure as a Service (IaaS).
II. TYPES OF CLOUD COMPUTING
I. INTRODUCTION
With cloud computing technology, large pools of resources
Cloud Computing is the internet-based storage for files,
can be connected through private or public networks. This
applications, and infrastructure. Cloud computing is a
technology simplifies infrastructure planning and provides
recently evolved computing terminology or metaphor
dynamically scalable infrastructure for cloud based
based on utility and consumption of computing resources.
applications, data and file storage. Cloud Computing can
Cloud computing involves deploying of groups of remote
be divided into three types: Private, Public and Hybrid
servers and software networked that allow centralized data
Computing.
storage and online access to computer services or resources
1. Public Computing:- Public clouds are made available to
as shown in fig 1. One could say cloud computing has been
the general public by a service provider who hosts the
around for many years, but now a company may buy or
cloud infrastructure. Generally, public cloud providers like
rent space for their daily operations.  
Amazon, Microsoft and Google own and operate the
Uses of Cloud Computing:-
infrastructure and offer access over the internet. With this
 Rapid Service
 Secure Service model, customers have no visibility or control over where
 Satisfying User Experience the infrastructure is located. It is important to note that all
 Lower Costs customers on public clouds share the same infrastructure
 Multi-User Access pool with limited configuration, security protections and
 Development Platform availability variances.
 Infinite Storage

Private Computing: - Private cloud is cloud infrastructure


dedicated to a particular organization. Private clouds allow
businesses to host applications in the cloud, while
addressing concerns regarding data security and control,
which is often lacking in a public cloud environment. It is
not shared with other organizations and it can be hosted
internally or externally.
There are two variations of private clouds:-
1. On –Premise Private Cloud: This type of cloud is
hosted within an organizations own facility. A
businesses IT department would incur the capital and
operational costs for the physical resources with this
model. On –Premise Private Clouds are best used for
applications that require complete control and preventative or corrective controls to address the
configurability of the infrastructure and security. issue. System and network security monitoring, including
2. Externally Hosted Private Cloud: Externally hosted intrusion detection and prevention arrangements, are
private clouds are also exclusively used by one typically employed to detect attacks on cloud systems and
organization, but are hosted by a third party the supporting communications infrastructure.
specializing in cloud infrastructure. The service Corrective controls-Corrective controls reduce the
provider facilitates an exclusive cloud environment consequences of an incident, normally by limiting the
with full guarantee of privacy. This format is damage. They come into effect during or after an incident.
recommended for organizations that prefer not to use a Restoring system backups in order to rebuild a
public cloud infrastructure due to the risks associated compromised system is an example of a corrective control.
with the sharing of physical resources. Cloud security also involve the following types of
privacy policies-
Hybrid Computing: - Hybrid Clouds are a composition of Identity management- Every enterprise will have its
two or more clouds (private, community or public) that own identity management system to control access to
remain unique entities but are bound together offering the information and computing resources. Cloud providers
advantages of multiple deployment models. In a hybrid either integrate the customer’s identity management system
cloud, you can leverage third party cloud providers in into their own infrastructure, using  federation 
either a full or partial manner; increasing the flexibility of or SSO technology, or provide an identity management
computing. Augmenting a traditional private cloud with the solution of their own.
resources of a public cloud can be used to manage any Physical security-Cloud service providers physically
unexpected surges in workload. Hybrid cloud architecture secure the IT hardware (servers, routers, cables etc.)
requires both on-premise resources and off-site server against unauthorized access, interference, theft, fires,
based cloud infrastructure. floods etc. and ensure that essential supplies (such as
electricity) are sufficiently robust to minimize the
III. SECURITY IN CLOUD COMPUTING possibility of disruption. This is normally achieved by
Cloud computing poses privacy concerns because the serving cloud applications from 'world-class' (i.e.
service provider can access the data that is on the cloud at professionally specified, designed, constructed, managed,
any time. It could accidentally or deliberately alter or even monitored and maintained) data centers.
delete information. Cloud Security is an evolving sub- Personnel security- Various information security concerns
domain of computer security, network security, and, more relating to the IT and other professionals associated with
broadly, information security. It refers to a broad set of cloud services are typically handled through pre-, para- and
policies, technologies, and controls deployed to protect post-employment activities such as security screening
data, applications, and the associated infrastructure potential recruits, security awareness and training
of cloud computing. programs, proactive security monitoring and supervision,
Cloud computing security is the set of control-based disciplinary procedures and contractual obligations
technologies and policies designed to adhere to regulatory embedded in employment contracts, service level
compliance rules and protect information, data applications agreements, codes of conduct, policies etc.
and infrastructure associated with cloud computing use. Availability- Cloud providers help ensure that customers
The following types of controls are used for cloud security. can rely on access to their Data and Applications; at least
Deterrent controls -These controls are intended to reduce in part (failures at any point - not just within the cloud
attacks on a cloud system. Much like a warning sign on a service providers' domains - may disrupt the
fence or a property, deterrent controls typically reduce the communications chains between users and applications).
threat level by informing potential attackers that there will Application security- Cloud providers ensure that
be adverse consequences for them if they proceed. applications available as a service via the cloud (SaaS) are
Preventive controls-Preventive controls strengthen the secure by specifying, designing, implementing, testing and
system against incidents, generally by reducing if not maintaining appropriate application security measures in
actually eliminating vulnerabilities. Strong authentication the production environment. Note that - as with any
of cloud users, for instance, makes it less likely that commercial software - the controls they implement may
unauthorized users can access cloud systems, and more not necessarily fully mitigate all the risks they have
likely that cloud users are positively identified. identified, and that they may not necessarily have
Detective controls-Detective controls are intended to detect identified all the risks that are of concern to customers.
and react appropriately to any incidents that occur. In the Consequently, customers may also need to assure
event of an attack, a detective control will signal the themselves that cloud applications are adequately secured
for their specific purposes, including their compliance efficient.
obligations.

IV. CLOUD COMPUTING SERVICES


Cloud Computing is a broad term that describes a broad
range of services. The different types of Cloud Computing
Services commonly referred to as Software as a Service
(SaaS), Platform as a Service (PaaS) and Infrastructure as a
Service (IaaS).

1. Software as a Service:-
Software as a Service (SaaS) run on distant computers “in
the cloud” that are owned and operated by others and that
connect to users’ computers via the Internet and, usually, a
web browser.Saas applications are designed for end-users,
delivered over the web.

Fig 3: Platform as a Service

3. Infrastructure as a Service:-

Infrastructure as a service provides companies with


computing resources including servers, networking,
storage, and data centre space on a pay-per-use basis. Iaas
is the hardware and software that powers it all – servers,
storage, networks, operating systems.

Fig 2: Software as a Service

2. Platform as a Service:
Platform as a service provides a cloud-based environment
with everything required to support the complete life cycle

of building and delivering web-based (cloud) applications


without the cost and complexity of buying and managing
the underlying hardware, software, provisioning and
hosting. Paas is the set of tools and services designed to
make coding and deploying those applications quick and
Fig 4: Infrastructure as a Service

Potrebbero piacerti anche