0% found this document useful (0 votes)
34 views13 pages

Cloud Unit 2

The document provides an overview of cloud computing, detailing various client types (mobile, thin, thick), security concerns (data leakage, logging, forensics), and network infrastructure. It also discusses services offered in cloud computing, broadband networks, virtualization technology, web technology, multitenancy, and containerization. Key aspects include the importance of security, scalability, cost-efficiency, and the challenges associated with multitenancy and containerization.

Uploaded by

vishvaamane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views13 pages

Cloud Unit 2

The document provides an overview of cloud computing, detailing various client types (mobile, thin, thick), security concerns (data leakage, logging, forensics), and network infrastructure. It also discusses services offered in cloud computing, broadband networks, virtualization technology, web technology, multitenancy, and containerization. Key aspects include the importance of security, scalability, cost-efficiency, and the challenges associated with multitenancy and containerization.

Uploaded by

vishvaamane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Cloud

Computing
1) Hardware and
Infrastructure:
Clients- mobile, thin, thick-
Clients
1. Mobile clients: Devices like smartphones and
tablets with limited processing power and storage,
primarily relying on network connectivity for data
access and application execution.
2. Thin clients: Devices with minimal hardware and
operating system, heavily dependent on a central
server for processing and data storage, often used
in enterprise environments for cost-efficiency and
centralized management.
3. Thick clients: Powerful standalone computers
with significant processing capabilities and local
storage, capable of handling complex applications
without relying heavily on network resources.

2) Security
1. Data leakage: The unauthorized disclosure of
sensitive information, requiring robust data
protection measures such as encryption, access
controls, and data loss prevention.
Common Causes of Data Leakage:
Misconfigurations: Incorrect settings or
configurations in cloud services can expose data to
unauthorized access. For example, public buckets
in cloud storage services can inadvertently make
data publicly accessible.
Insider Threats: Employees or contractors with
access to cloud environments may intentionally or
unintentionally leak data.
Phishing Attacks: Phishing scams can trick users
into revealing sensitive information or credentials
that can be used to gain unauthorized access to
cloud accounts.
Supply Chain Attacks: Compromises in the supply
chain of cloud providers or their partners can lead
to data leakage.
2. Offloading work: Shifting security tasks to
specialized hardware or software to improve
performance and reduce resource consumption,
such as using firewalls, intrusion detection
systems, and load balancers.
3. Logging: Logging in cloud computing refers to
the process of recording events and activities that
occur within a cloud environment. This includes
information such as user actions, system errors,
security events, and performance metrics. Logging
is a critical component of cloud security and
management.
Application Logs: Record events related to the
execution of applications and services within the
cloud environment.
System Logs: Capture information about the
operating system, network, and other system
components.
Security Logs: Record security-related events, such
as login attempts, access denials, and intrusion
attempts.
Performance Logs: Monitor system performance
metrics, such as CPU usage, memory utilization,
and network traffic
4. Forensics: The process of collecting, preserving,
and analyzing digital evidence for legal or
investigative purposes, involving specialized tools
and techniques. Data Acquisition: Collecting data
from various cloud components, such as virtual
machines, storage, and network devices.
Data Analysis: Examining data for signs of
malicious activity, unauthorized access, or data
breaches.
Forensic Tools: Using specialized software to
analyze data, identify patterns, and extract
evidence.
Cloud API Access: Leveraging cloud service
provider APIs to retrieve data and metadata.
Legal Procedures: Obtaining court orders or
subpoenas to access data stored by CSPs.
5. Development: Incorporating security into the
software development lifecycle (SDLC) to build
secure applications from the ground up, through
practices like threat modeling and code reviews.
6. Auditing: Auditing in Cloud Computing

Auditing in cloud computing is the process of


examining, evaluating, and assessing the security
and compliance of cloud services and
infrastructure. It involves verifying that cloud
providers are adhering to agreed-upon standards,
policies, and regulations.
Key Objectives of Cloud Auditing:
Security Assurance: Ensure that cloud services and
infrastructure are adequately protected against
security threats.
Compliance Verification: Verify that cloud providers
are complying with relevant industry regulations, such
as GDPR, HIPAA, and PCI DSS.
Risk Assessment: Identify and assess potential risks
associated with using cloud services.
Performance Evaluation: Evaluate the
performance and reliability of cloud services.
Contractual Compliance: Ensure that cloud
providers are fulfilling their contractual obligations.

3)Network-
 Basic public Internet: The standard internet
infrastructure with varying speeds and reliability,
suitable for general web browsing, email, and other
low-bandwidth applications.
 Accelerated Internet: High-speed networks with
low latency and high bandwidth, providing improved
performance for data-intensive applications, such as
video streaming, online gaming, and cloud computing.
Network infrastructure: The physical and logical
components that enable network communication,
including routers, switches, firewalls, and network
protocols.
 Network security: Protecting the network from
unauthorized access, data breaches, and denial-of-
service attacks is essential for maintaining network
integrity and availability.
 Network performance: Ensuring optimal network
speed, reliability, and latency is crucial for delivering
high-quality user experiences.
 Network monitoring: Continuously monitoring
network performance and identifying potential issues to
proactively address problems.
 Network scalability: Designing networks to
accommodate increasing traffic and user demands,
through capacity planning and network upgrades.
 Network virtualization: Creating virtual networks
on top of physical infrastructure to improve flexibility,
efficiency, and resource utilization.

4) Services-
 Identity: Managing user identities and
authentication, including user registration, login,
authorization, and single sign-on.
 Integration: Connecting different systems and
applications to share data and functionality, enabling
seamless workflows and data exchange.
 Mapping: Providing location-based services,
including geocoding, reverse geocoding, and spatial
analysis, to support mapping applications and location-
aware services.
 Payments: Processing financial transactions,
including credit card processing, digital wallets, and
payment gateways.
 Search: Enabling users to find information within
large datasets, through indexing, ranking, and search
algorithms.
 Service-oriented architecture (SOA): Designing
and developing applications as a collection of services
that can be independently deployed and reused.
 Service level agreements (SLAs): Defining the
expected performance and availability of services, to
ensure service quality and customer satisfaction.
 Service management: Managing the lifecycle of
services, including planning, designing, building,
deploying, operating, and supporting services

5) Broadband Networks and Internet


Architecture-
 a. Fiber optics: High-speed data transmission using
light pulses through glass fibers.
 b. DSL (Digital Subscriber Line): High-speed internet
connection using existing telephone lines.
 c. Cable internet: High-speed internet connection
using coaxial cables.
 d. Satellite internet: Internet connection using
satellites for remote areas.
 e. IP (Internet Protocol): Addressing and routing data
packets across networks.
 f. TCP/IP (Transmission Control Protocol/Internet
Protocol): Suite of protocols for communication over the
internet.
 g. DNS (Domain Name System): Translates domain
names into IP addresses.
 h. HTTP (Hypertext Transfer Protocol): Protocol for
transferring data on the web.

6) Virtualization Technology-
 a. Server virtualization: Creating multiple virtual
servers on a single physical server.
 b. Desktop virtualization: Delivering virtual desktops
to users.
 c. Storage virtualization: Pooling storage resources
from multiple physical devices.
 d. Network virtualization: Creating virtual networks
on top of physical networks.
 e. Hypervisors: Software that manages virtual
machines.
 f. Virtual machines (VMs): Software instances that
behave like physical machines.
 g. Containers: Lightweight virtualization technology
for packaging applications and their dependencies.
 h. Virtualization benefits: Increased resource
utilization, flexibility, and scalability.

7) Web Technology-
 a. HTML (Hypertext Markup Language): Structure and
content of web pages.
 b. CSS (Cascading Style Sheets): Presentation of web
pages.
 c. JavaScript: Client-side scripting for interactive web
pages.
 d. Web servers: Software that delivers web content
to clients.
 e. Web applications: Software applications accessed
through a web browser.
 f. Web services: Software components that
communicate over the internet.
 g. REST (Representational State Transfer):
Architectural style for web services.
 h. Web development frameworks: Tools and libraries
for building web applications.
8) Multitenant Technology-
Multitenancy in Cloud Computing
Multitenancy is a technology model in
cloud computing where a single
instance of an application or software
serves multiple customers or tenants
simultaneously. This is achieved by
isolating each tenant's data and
resources within the shared
environment.
Key Characteristics of Multitenancy:
 Shared Infrastructure: Multiple
tenants share a common physical or
virtual infrastructure.
 Logical Isolation: Each tenant's data
and resources are logically
separated from those of other
tenants.
 Scalability: The cloud provider can
easily scale resources up or down to
meet the needs of individual
tenants.
 Cost-Efficiency: Multitenancy can
reduce costs by sharing
infrastructure and resources among
multiple tenants.
Types of Multitenancy:
1. Software as a Service (SaaS):
The most common form of
multitenancy, where a cloud
provider offers a shared application
to multiple tenants. Examples
include Salesforce, Dropbox, and
Google Workspace.
2. Platform as a Service (PaaS):
Provides a platform for developers
to build and deploy applications.
While the underlying infrastructure
is shared, each tenant can
customize their environment.
3. Infrastructure as a Service
(IaaS): Offers the most granular
level of control, allowing tenants to
provision and manage their own
virtual machines, storage, and
networking resources. Multitenancy
is still possible at the data center
level.
Benefits of Multitenancy:
 Reduced Costs: Sharing resources
among multiple tenants can lead to
significant cost savings.
 Scalability: Cloud providers can
easily scale resources up or down to
meet changing demands.
 Rapid Deployment: New tenants can
quickly provision and access cloud
resources.
 Simplified Management: Cloud
providers manage the underlying
infrastructure, reducing the burden
on tenants.
 Increased Security: Cloud providers
can implement robust security
measures to protect the data of all
tenants.
Challenges of Multitenancy:
 Performance Isolation: Ensuring
that the performance of one tenant
does not impact the others can be
challenging.
 Security Concerns: Protecting
sensitive data in a shared
environment requires careful
consideration.
 Vendor Lock-in: Reliance on a
specific cloud provider can limit
flexibility.

 . Shared infrastructure: Multiple tenants share the


same physical hardware and software resources.
 b. Isolation: Tenant data and applications are isolated
from each other.
 c. Scalability: Ability to add or remove resources to
accommodate changing tenant needs.
 d. Elasticity: Dynamically adjusting resources based
on demand.
 e. Security: Protecting tenant data and applications
from unauthorized access.
 f. Performance: Ensuring adequate performance for
all tenants.
 g. Cost-efficiency: Sharing resources among multiple
tenants reduces costs.
 h. Multitenancy challenges: Managing resource
allocation, security, and performance.

9) Containerization-
 Container image: A standardized package containing
an application and its dependencies.
 b. Container runtime: Software that executes
container images.
 c. Docker: Popular containerization platform.
 d. Kubernetes: Container orchestration platform for
managing containerized applications.
 e. Container benefits: Portability, scalability, and
efficiency.
 f. Container challenges: Security, network
configuration, and resource management.
 g. Container orchestration: Managing and deploying
containers in a distributed environment.
 h. Container registries: Storing and distributing
container images.

You might also like