The Features Of Cloud Computing

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Cloud computing technology is enabling IT to do more with the infrastructure that already exists, as well as adding new ways to expand capacity quickly and economically by using external cloud computing resources. This technology is enabling IT managers to treat infrastructure as a common substrate on which they can provision services to users faster in a much more flexible and cost-effective way –without having to re-design or add to the underlying infrastructure. Given the benefits of cloud computing, its broad appeal is not surprising. However, this new approach does raise some concerns. Chief among them is securing data in the cloud. Cloud Computing it’s simply means computing over the Internet. The Internet is usually visualized as Clouds; hence the term CC for computing has been done through internet. With CC end users can access datacenter and computing resources via the Internet from anywhere, for as long as they need, without disturbing about the maintenance or management of actual resources.

Cloud Computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the internet. It includes Software as a service, Platform as a Service and Infrastructure as a service .Cloud computing represents an externalization of information technology applications and infrastructure beyond an organization’s data center values. By making data available in the cloud, it can be more easily and ubiquitously accessed, often at much lower cost, increasing its value by enabling opportunities for integration and analysis on a shared common platform. Organizations explore cloud computing as a way to reduce costs, improve service and free internal resources to focus on differentiating mission critical activities.

SERVICES

Infrastructure as a Service: Like Amazon Web Services provides virtual servers with unique IP addresses and blocks of storage on demand. Customers benefit from an API from which they can control their servers. Because customers can pay for exactly the amount of service they use, like for electricity or water, this service is called utility computing. Servers, storage systems, networking equipment, data centre space etc. are pooled and made available to handle workloads. The customer would typically deploy his own software on the infrastructure. Some common examples are Amazon, Go Grid, 3 Tera, etc.

Platform as a Service: Platform as a Service provides a development platform for developers. The traditional programmers write their own programming and upload that file into the datacenter of the cloud and present it on the internet. Platform as a service is a set of software and development tools hosted on the provider’s servers. Developers can create applications using the provider’s APIs. Google Apps is one of the most famous Platform as a Service Providers. This phase also provides the environment to build the application to the traditional programmers. Thus the work of Platform as a Service is to provide the services as a platform, to develop the softwares or specific applications to work over the cloud.

There are mainly four types of solutions of Platform as a Service,

Social application platforms

Raw compute platforms

Business application platforms

Web application platforms

Software as a service: Software as a Service is the broadest market. SaaS allows the customer only to use its applications. . A single instance of the service runs on the cloud & multiple end users are serviced. On the customers side, there is no need for upfront investment in servers or software licenses, while for the provider, the costs are lowered, since only a single application needs to be hosted & maintained.

FEATURES OF CLOUD COMPUTING:

Cloud computing brings various benefits among the three categories:

Economic: It helps in reducing the IT costs

Architectural: Improves the Experience of the end users

Strategic: helps that the companies focus on the core competencies between various companies.

Cloud Service Level Agreements (SLAs)

Most subscribers of a cloud service may feel as tough they are getting into an arrangement where it appears as though vendors create the SLA’s for their own protection against litigation, with minimal assurances to a tenant. IT managers can focus on the following SLA tips with a vendor:

Data Protection: where there is a clear definition as to who will have access to the data and the levels of protection in effect for their data some questions are:

How will data be encrypted?

How will compliance be addressed?

What are the levels of access control?

How is data center secured?

What happens to the data if the service providers are switched?

How often are audits done and what type of auditing tools are in place?

How is data detection handled?

Continuity: one has to consider what happens in the event of an outage or another related event that causes data to become unavailable. Some questions to consider here are

How will the vendor define a services outage?

Will there be scheduled vendor downtime for maintenance etc?

Costs: on cost to consider are:

Will there be or are there current licensing fees above and beyond sated vendor service fees?

Does the vendor offer price protection?

PREDICTIONS

Appirio’s predictions reveal that in spite of our current economy, cloud computing will continue to see strong growth and investment over the next year – a prediction that industry analysts agree with as well.

The "cloud of clouds" expands but sees traction revolve around open platforms. We will see Microsoft and other traditional software players invest even more in new but closed cloud platforms. At the same time, proponents of a more open approach, like Amazon, Facebook, Google and Salesforce, will push more and deeper "cloud connections".

At the best, Microsoft Azure will be better platform for exchange. Microsoft will continue to shower attention on Azure but will see relatively limited adoption from ISVs and customers. While it will likely disappoint users and remain well behind established cloud players for the first few years.

Google doubles down on the enterprise, enterprises return the favor by racing to Google Apps. Google has already shown they’re serious about winning over enterprises with acquisitions.

RESEARCH ISSUES

The general cloud computing approach discussed so far, as well as the specific VCL implementation of a cloud continues a number of research directions, and opens some new ones of resources and complex control images for those resources, including workflow- oriented images. Temporal and spatial feedback largescale workflows may present is a valid research issue. Underlying that is a considerable amount of meta- data, some permanently attached to an image, and some kept in the cloud management databases. Cloud provenance data, and in general metadata management, is an open issue.

Open challenges include: How to collect provenance information in a standardized and seamless way and with minimal overhead – modularized design and integrated provenance recording; How to store this information in a permanent way so that one can come back to it at anytime, - standardized schema; and How to present this information to the user in a logical manner- an intuitive user web interface.

THE FUTURE OF CLOUD COMPUTING

As new offerings like Amazon’s Cloud Front, Microsoft’s Azure, Hosting.com’s CloudNine and VMware’s Cloud are rolled out week in, week out, the worldwide Cloud computing momentum continues to grow.

Peter Coffee

Director, Platform Research – Salesforce.com

Developer communities and system integrators will defect, in growing numbers, from established enterprise software vendors that have failed to deliver real innovation and value during the past several years.

Software market cycles will rapidly accelerate to web speed, with multiple release per year, rather than the glacial pace of multi year upgrade cycles that currently results in most IT sites running legacy versions of cumbersome bloatware.

Geva Perry

GM of Cloud Computing, Giga Spaces

Trend of Large Vendors Entering Cloud Computing will Accelerate with more coming from these vendors as well as VMW are, Citrix, Sun, HP, Cisco, Intuit, Symantes, Yahoo and others.

Platform-as-a-Service will take its first steps into the Mainstream such as Heroku, aimed at Ruby-on-Rails, will be in a particularly strong position to take advantage of this trend.

Markus Klems

Research Assistant, FZI Research Center for information Technology

Cloud computing will certainly fuel the Saas business. More and more Desktop applications will turn into services or at least hybrid online / offline apps that live in the Cloud.

Scalable, on-demand middleware is an appealing vision for large enterprises: avoiod bottlenecks by outsourcing parts of the middleware infrastructure into a SOA- Cloud.

Amazons’ new Web Service CloudFront points at the promising future for DIY Content Distribution and Media Hosting.

CLOUD COMPUTING SERVICE PROVIDER

Cloud Computing has emerged as one such concept that allows an entrepreneur to avoid capital expenditure (CapEx) on hardware, software and services, and pay provider only for what they use. These are Amazon web services, 3Tera, Force.com., Appistry-Cloud computing middleware, Microsoft Live Mesh, AppNexus, Flexiscale, GoogleApp Engine, GoGrid, Terremark Enterprise Cloud.

High – level challenges

Cloud service immaturity: The cloud computing space is still in a state of relative immaturity. Vendor fluctuations and various service approaches are likely to make this a volatile segment in the short term.

Vendor lock-in/ dependency: Given this immaturity and volatity, vendor dependency or vendor changes must be considered, including the ability to continue business operations.

Risk assessment and management difficulty: Risk assessment and management are difficult in many cases due to poor vendor transparency, inflexible terms of service, lack of a negotiated contract with the vendor (as opposed to a "click through" terms of service imposed on all users), and lack of right to audit.

Cost / benefit profile uncertainty: Recent surveys suggest that the cost / benefit of cloud services is difficult to assess. A significant proportion of institutions that have and used cloud services indicate the cost/savings realized by using cloud services was estimated incorrectly, and that they have been unable to effectively monitor cost / savings or have only been able to do so with great difficulty.

RISKS

Once the high level challenges are understood, the next step is to consider the risks and determine whether / how to appropriately mitigate those risks in the context of the proposed information and / or service.

Vendor trustworthiness: How do we establish an adequate level of trust in a cloud service provider? How do we ensure our trust boundaries do not extend farther than intended when using a cloud service vendor?

Integration: How will we manage the integration so such cloud services with current information and / or information services.

Data and intellectual property issues: What are the potential for and the consequences of information loss, leakage or services? What are the risks to involved intellectual property? What response plan will be followed if a data breach occurs? How is the data owner notified?

Recorded preservation, access and management: How would we manage preservation, access, retention and disposal of information? How would we ensure that university information is securely removed form the vendor’s equipment if necessary?

Responsibility / liability: What is the relative liability for lost data / revene accepted by the vendor and retained by the university? How will liabilities related to lost or altered data be shared between the vendor and the university?

Vendor location: What are the implications of the vendor’s location on compliance, cultural, timeliness and support level issues?

Human resources safeguards: How does the vendor select, vet, and train its employees to minimize risks to the privacy, security and integrity of client data.

Operational flexibility: What is the effect of the potential loss of flexibility or life cycle control over the service? How would we be alerted to vendor service changes that could impact our operations?

Security / safeguards: How do we satisfy ourselves that the vendor will employ and maintain adequate safeguards based on the sensitivity and criticality of the information or / services involved.

Confidentiality / privacy: What are the privacy risks and / or open records consequences of the information and / or service involved? Can we control how our information may be used by the vendor? Does vendor use or intended use of information conflict with nondisclosure agreements the university has entered into regarding such information?

Legal / regulatory consequences: How does the use of a cloud service impact our ability to comply with various legal requirements (e.g., HIPAA, FERA, PCI-DSS, E-discovery, state data protection laws, export control laws)? Do laws where the vendor is incorporated or locates its servers (which may include foreign laws) potentially apply.

Recommendations and Strategies

The following recommendations and strategies are intended to assist units in their approach to evaluating the prudence and feasibility of leveraging cloud services.

Risk / benefit analysis: units considering university services that may be delivered using cloud technology or new services provided by cloud technology must indentify and understand the risks and benefits of the service. Consider the security and privacy objectives of confidentiality, integrity, availability, use control and availability and determine what would happen if these objectives were not met.

Consultation: Consult with appropriate data stewards, process owners, stakeholders and subject matter experts during the evaluation process.

Lower risk candidates: When considering university services that may be delivered using cloud technology, ideal candidates will be those that are non-critical to operations involve public information and otherwise would require significant internal infrastructure or investment to deliver or continue delivering internally.

Higher risk candidates: University services that are critical to the operation of the university or involve differentiating or core competencies, and / or involve restricted, or critical information or intellectual property are necessarily higher risk candidates and require careful scrutiny.

Consider "internal cloud" alternatives: Due to the decentralized nature of the university, some duplication of effort is inevitable. "Large enterprises should generally avoid placing sensitive information in public clouds, but concentrate on building internal cloud and hybrid cloud capabilities in the near term,"

A SECURITY ANALYSIS OF CLOUD COMPUTING

With its ability to provide users dynamically scalable, shared resources over the internet and avoid large upfront fixed cost, cloud computing promises to change the future of computing.

Cloud Security Concerns

One of the more notable security incidents occurred in March, 2009 with Google Docs, when a system error allowed the content of private documents to be exposed to everyone for a brief period of time. As a result of this security breakdown, a public interest group, The Electronic Privacy Information Center (EPIC), filed a detailed complaint with the Federal Trade Commission requesting an injunction against Google offering the cloud service until" safeguards are verifiably established" claiming Google’s inadequate security is a deceptive business practice.

Situations like this one and other possible security problems have prompted numerous articles (for example The Twitterhack is Cloud Computing’s Figure: 1 (a)

http://www.onbile.com/info/wp-content/uploads/2011/11/cloudcomputing.jpg

Wake – Up Call: Time for Security That works) and white papers on cloud security. The cloud Security Alliance, a non-profit organization comprised of security and technology experts, published an indepth 83-page white paper security Guidance for Critical Areas of Focus in Cloud Computing in April 2009. In addition to articles and white papers, research firm Gartner reports data location and data segregation / encryption among the top seven security concern in cloud computing. Also, cloud computing security is one of the top ten 2009 trends identified in a survey conducted by Cloud Computing.

To establish a basis for the use of these tools, it is essential to understand one key difference between cloud computing and conventional data centers. Figures 1 shows the rather simple yet significant difference between an enterprise’s data center and cloud computing. In cloud computing, several users’ data is co-located and processed on shared equipment. In spite of the differences, there are similarities to enterprise concerns: access through the internet, ciritical, storage requirements and potential for software attacks. If existing enterprises solutions are implemented and adapted to the cloud, cloud computing providers can create the security that customers require. The difference Figure: 1 (b) between a conventional data center (see figure 1a) is that it’s just used by one enterprise and a cloud computing model (see figure 1b) is that a single cloud provider hosts applications and data used by several enterprises.

CONCLUSION

Start-up companies, small businesses, mid-size and even large enterprises are interested in cloud computing it also provides for better and easier management of data security, since all the data is located on a central server, so administrators can control who has and doesn’t have access to the files. "Cloud" computing builds on decades of research in virtualization, distributed computing, utility computing and more recently, networking, web and software services. It implies a services-oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now