Wednesday, April 3, 2019
The History Of Cloud Computing Information Technology Essay
The bill Of befoul cypher Information Technology Essay overswarm compute be data and maskings that argon vexible finished and through servers round the universe of discourse (Clouds), and it fag be reached at any time, from any device without facility that specific exercise to your computer. Data management within bribe involves intense parallelization and distri merelyion of data. Its goals ar to depart quickness in which applications are deployed, step-up the technology, and lower costs, all while increasing business agility. The contrastive emblems of go including IaaS, PaaS, SaaS cod been projected for obscure compute. only if, consumers want hard-hitting and efficient shelterive c all over for their virtual machines. There is most obnubilate providers that offer credentials-as-a- assistance based on VM introspection that promise the best of both worlds efficient centralization and effective protection. Since nodes flock pop off data and apps from one cloud to a nonher, an effective theme requires learning what providers to work with and what they secure.This report lead provide detailed grounds of cloud work out and its major bail egressions. This will include the level of Cloud computation, the models, its characteristics, deployment models, applications, advantages and disadvantages, security issues and other concerns.Key Words chafe code wangleCloud ComputingCloud tributeDelivery ModelsDeployment ModelsSPIThis Report is form the followingChapter 1 groundingsChapter 2 Defining Cloud ComputingChapter 3 Cloud SecurityChapter 4 end/Future ResearchIntroductionClouds is a metaphor for the Internet, the term Cloud Computing for computation over the Internet. It allows employrs to main course choices database and Internet applications from anywhere as long as demand without worrying approximately maintenance or management of real resources. In addition, the databases in the cloud are very dynamic and evol ving.Cloud Computing is unlike grid compute, utility computing, or autonomic computing. In fact, it is a very independent course of study in terms of computing. The best standard of cloud computing if Google Apps where any application coffin nail be admissioned pulmonary tuberculosis a browser and it scum bag be deployed on thousands of computer through the net profit. Most of the data is stored on local engagements with servers that may be clustered and sharing terminus. This approach has had time to be developed into stable architecture, and provide decent redundancy when deployed set. Pinal Dave. Introduction to Cloud Computing Published 10 Apr 2009This in the raw technology, cloud computing, requires the attention and it changes rapidly the direction of the technology. Whether it is Googles file administration or Microsoft Azure, it is clear that cloud computing has arrived with much to learn. In dealings with the abstract concept of the cloud, it is easy to mi sunderstand the structure and function.Defining Cloud ComputingWhat is Cloud Computing?Cloud computing is a shell of computation over the Internet. It shares resources instead of using a bundle or hardware on a physical computer. Cloud computing after part be software and infrastructure. And, it loafer improve collaboration, mobility, size and availability features.It in like manner improves cost reduction by offering a centralized computer programme for use when hireed, and the reduction of energy consumption. different grid computing, cloud computing can be hosted externally, but also internally, peculiarly for companies who develop businesses around the world.Consumers will no long-lived take up to down corrupt and install memory-hogging applications and software on their device and will instead have access to everything they get hold of via the browser. With this model, most of the computing software will be rented on an as- undeniable base of operations rather t han being bought as an expensive one-off purchase. what is cloud computing and how to use it. February 11, 2010 .There are many definitions that try to answer the clouds of todays point of keep an eye on of developers, researchers, administrators, engineers and consumers. This report focuses on a definition that is specifically tailored to the unmatched perspectives of IT net and security professionals.2.2. explanation of Cloud ComputingOriginally, Cloud Computing was an unclear term for a vague and distant future in which computing would occur in a few remote fixtures without the need for very much human intervention. Infinite computing resources would be unattached for every need at prices approaching zero. Certainly, users would not care about how the computers, their software, or the network functioned.The idea of an intergalactic computer network was introduced in the 60s by J.C.R. Licklider, who was responsible for enabling the development of ARPANET (Advanced Research P rojects Agency Network) in 1969.His day-dream was for everyone on the globe to be interconnected and accessing programs and data at any site, from anywhere, explained Margaret Lewis, product marketing director at AMD. It is a vision that sounds a lot like what we are calling cloud computing. History of cloud computing directr Weekly (2009).Computer scientist John McCarthy, who attributed the cloud concept, proposed the idea of computation being delivered as a public utility, akin to the service bureaus which date back to the 60s. Since the 60s, cloud computing has developed on a number of lines, with weave 2.0 being the most recent evolution. However, since the internet precisely started to offer significant bandwidth in the 90s, cloud computing for the concourse has been something of a late developer.In the past, the computers were connected from a larger computer. It was a common technique in industry. The technique enabled you to configure the computer to blether to each other with specially designed protocols to balance the computational load across machines. As a user you didnt care about what mainframe computer was running the program, and cluster management software ensured that the best CPU at that time was used to execute the code.In the early 1990s Ian cherish and Carl Kesselman came up with a new concept of The Grid. The analogy used was of the electrical energy grid where users could plug into the grid and use a metered utility service. If companies dont have their own powers stations, but rather access a third society electricity supply, why cant the same obligate to computing resources? plug away into a grid of computers and pay for what you use. Cloud Expo Article A Brief History of Cloud Computing Is the Cloud There to that extent? Paul Wallis August 22, 2008 One of the for the first time milestones for cloud computing was the arrival of Salesforce.com in 1999, which pioneered the concept of delivering enterprise applications vi a a simple sacksite. The go pixilated paved the way for both specialist and mainstream software firms to deliver applications over the internet. The next development was Amazon Web Services in 2002, which provided a suite of cloud-based service including storage, computation and even human intelligence through the Amazon Mechanical Turk. Then in 2006, Amazon launched its Elastic Compute cloud (EC2) as a commercial web service that allows atomic companies and individuals to rent computers on which to run their own computer applications. Amazon EC2/S3 was the first widely accessible cloud computing infrastructure service, said Jeremy Allaire, chief executive officer of B flopcove, which provides its SaaS online video platform to UK TV stations and newspapers. A history of cloud computing ArifMohamed Friday 27 March 2009 Another big milestone came in 2009, as Web 2.0 hit its stride, and Google and others started to offer browser-based enterprise applications, though go such(preno minal) as Google Apps.Today, many companies are setting up data centers, sometimes as an extension of their own needs, sometimes only to serve customers. Originally, the idea of these clouds was to provide power and storage capacity. Everything else will be interpreted up by the customer. Now providers offer many services depending on the consumer needs.Source http//www.fuzeboxinc.com/Extras/Blog/2.3. SPI for Cloud ComputingSPI. This abbreviation stands for the three major services in the cloud. Software-as-a-Service, Platform-as-a-Service, and Infrastructure-as-a-Service.Source http//texdexter.files.wordpress.com/2009/09/figure-1-cloud-computing-architecture.jpg2.4. Delivery ModelsInfrastructure as a Service (IaaS)- Instead of wasting money on servers, software, hardware, racks..etc. the provider would resource the service. This will be on demand computing and whatever the join is consumed that what the consumer will be charged. This service can be hosted or via VPS(virtual backs tage servers)Major Infrastructure Vendors Below are companies that provide infrastructure servicesGoogle (GOOG) Managed hosting, development environmentInternational Business Machines (IBM) Managed hostingSAVVIS (SVVS) Managed hostingTerremark Worldwide (TMRK) Managed hostingAmazon.com (AMZN) Cloud storageRackspace Hosting (RAX) Managed hosting cloud computingCloud platform services (PaaS)- delivers a platform or a solution stack as a service. This makes the rake of applications easier without the cost of hardware or software. uniform Salesforce.coms, which lets subscribers access their applications over the cloud. Amazon, Google, and Microsoft have also allow the users access their applications from centralized servers.Software as a service (SaaS)- issoftware in the cloud. This deployment model is absolutely through the web browser. This eliminates the installation of applications on the consumers computer making it easy to access as simplifying maintenance and support.Ch aracteristic of SaaSAvailability via a web browseron demand availabilitypayment terms based on usageminimal IT demands2.5. Deployment ModelsPrivate cloud- This is used only for organizations. Can be managed by the organization or to third parties and can exist on premise or off premise.Community cloud- This is used by many organizations running(a) together, and is compatible with a particular community, which shared the concerns (eg, mission, security requirements, policy and compliance). It can be managed by organizations or third parties and can exist on premise or off premise.Public cloud- This is owned by cloud providers and is used by a larger organization or the cosmopolitan public. Hybrid cloud- Cloud Infrastructure is composed of two or to a greater extent clouds (private, community or the public), that remain unique entities, but are caused by a standardized or proprietary technology that enables data and applications.2.6. inseparable Characteristics What is Cloud Compu ting? On-demand self-service- A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each services provider.Broad network access- Capabilities are ready(prenominal) over the network and accessed through standard mechanisms that advertise use by heterogeneous thin or thick thickening platforms (e.g., mobile phones, laptops, and PDAs).Resource pooling- The providers computing resources are pooled to serve multiple consumers using a multi-tenant model, with varied physical and virtual resources dynamically assigned and reassigned concord to consumer demand. There is a sense of location independence in that, the customer generally has no potency or knowledge over the film location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). This includes storage, processing, memory, network bandw idth, and virtual machines.Rapid elasticity- Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.Measured Service- Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitor lizarded, controlled, and reported providing transparency for both the provider and consumer of the utilized service.Source www.katescomment.com/images/CloudCube.pngCloud Security3.1. Pros and ConsThe main question is whether users are prepared to use the service from your local computer and are moving into the cloud because cloud computing has advantages and disadvantages to all pote ntial users, but may have different meanings for different users.ProsReduced Cost Cloud technology is paid incrementally (you pay only for what you need), saving organizations money in the short run. Money saved can be used for other Copernican resources.Increased Storage Companies can save more data than on servers.Highly Automated IT round not needed to keep software up to date as maintenance is the job of the service provider on the cloud.More Mobility Employees can access information wherever they are.Allows IT to Shift Focus No perennial having to worry about constant server updates and other computing issues, political relation organizations will be free to concentrate on innovation.ConsSecurity standards depending on company and global locationReliance on 3rd caller Control over own data is lost in the men of an difficult-to-trust providerCost of transition Is it feasible for me to move from the existing architecture of my data center to the architecture of the cloud?Un certainty of benefits Are on that point any long term benefits?Today, customers are looking expand their on-premises infrastructure, but cannot afford the risk of compromising the security of their applications and data.In this survey of IDC, security ranked first as the greatest challenge or issue in cloud computing.Source IDC Enterprise PanelWhat is Cloud Security?Security in the cloud, is not different than security control. But, because of the cloud models for contractual services, business models and technologies are used to cloud services, cloud computing different risks of a traditional organization of IT solutions can have. Cloud Computing is to drop away control and accountability at the same time, but operational certificate of indebtedness lies with one or more other parties.Not all services are the same. This depends on the provider you choose. This picture below illustrates the issue in SaaS where the contracts are negotiable service levels, privacy, and compliance a re all issues to be dealt with legally in contracts. In an IaaS, the remainder of the stack is the responsibility of the costumer. PaaS offers a balance in between, where the provider is in charge of securing the platform, but securing the application developed against the platform and developing them securely, both belong to the consumer.Source http//www.rationalsurvivability.com/blog/wp-content/media/2009/07/CloudRefModel.htmlThe technology has many advantages for employers. It is a simple solution that is cost effective, and can be updated easily and as quickly as the business grows, especially during peak sales. Many entrepreneurs do not do their homework when registering with a provider of cloud, and neglect to ask whether sensitive data can be isolated or not, or what layers of security is available.Cloud Security jacket ThreatsAccording to CSA (Cloud Security Alliance) The report, titled Top Threats to Cloud Computing V1.0, These are the following threats in cloud computingA buse and Nefarious use of Cloud Computing Attackers can find a way to transfer malware to thousands of computers and use the power of the cloud infrastructure to attack other machines. uncertain Application Programming Interfaces The reuse and combination of existing code to rapidly build applications often sacrifices quality assurance for agility and quick turnaround, resulting in insecure APIs.Malicious Insiders One that gains in importance as many providers still dont reveal how the hire people, how they grant them access to assets or how they monitor them. Transparency is, in this case, vital to a secure cloud offering, on with compliance reporting and breach notification.Shared Technology Vulnerabilities Sharing infrastructure is a way of life for IaaS providers. Unfortunately, the components on which this infrastructure is based were not designed for that. To ensure that customers dont thread on each others territory, monitoring and healthful compartmentalization is require d, not to mention scanning for and patching of vulnerabilities that might pretend this coexistence.Data Lose/Leakage Using security control to protect the inside data in a company. This control is hard to apply to new environment. There is a lack of having the ability to monitor and control what is going on.Accounting, Services and Traffic Hijacking The cloud is vulnerable to hacking. Like being redirected to malicious sites.Unknown risk profile The customer are not well informed on where their applications are being reside, nor the configurations of the systems.Access Control in the CloudIn a traditional network, access control focuses on protecting from unauthorized users based on host-based attributes. Which sometimes is inadequate, this can cause inaccurate accounting. In the cloud, the access control workings as a cloud firewall policy. This is by using rules using transmission control protocol/IP parameters, including the source of IP, the source port, the IP destination and the port destination. Unlike the network-based access control, the access should be strongly focused in the cloud by binding the users identity to the resource in the cloud and will help protect access control, data protection and users accounts.ISO/IEC 27002 has defined sextuplet access control objectives that cover end user, privileged user, network, application, and information access control.The objective is to ensure that the authorized user have access the right information and unauthorized users are prevented from accessing the systems. A procedure should take betoken and should cover all stages in the lifecycle of the user access, staring from the registration of the new user to the final step which is denying the user who will no longer need to access the information in the system.The following are the sestet control statements Control access to information. Manage user access rights. elevate good access practices. Control access to network services. Control access to operating systems. Control access to applications and systems.The reasons for this six control statements from the view of IT security, is providing access to information and applications to authorized users. The objective of this task is to provide the right users the right services, while preventing access to unauthorized users.Conclusion/Future Research4.1. ConclusionCloud computing is increasingly popular. Industry leaders like Microsoft, Google and IBM, have been promoting cloud computing and have gain a lot of costumer. But the rest of the public that are still doing research on the division are still doubting and afraid to migrate to the cloud.There are still many questions left without any answer and the most important one is security. On the other hand, Cloud Computing is the most direful technology that has happened recently. It is easy to use, cheaper, faster, and convenient. The question is whether the users are ready to move and if so, what providers to move to.Securi ty technology must be developed specifically for the protection of the business in the cloud. The technology has changed and security needs to keep up with it.Future WorkAccording to btsecurethinking.com, Breach Security is working with partners, such as Akamai, to provide web application security in the cloud. Example, when deployed with Akamais Web Application Firewall service, Breachs WebDefend Global Event Manager is the first web application security management solution to defend against global application security threats by enabling customers to make distributed cloud and data center defense-in-depth architectures operational.CSA and HP are still doing research on top threats and intended to lively businesses to current and future cloud computing risks.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment