0% found this document useful (0 votes)
18 views21 pages

Unit 2

The document outlines the three primary cloud service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), detailing their characteristics, advantages, disadvantages, and considerations for implementation. SaaS provides web-based software access without user management of infrastructure, PaaS offers a framework for application development without infrastructure concerns, and IaaS delivers on-demand computing resources with full control over the infrastructure. Additionally, it mentions other services like Monitoring as a Service (MaaS) and Disaster Recovery as a Service (DRaaS), as well as the principles of Service-Oriented Architecture (SOA) and cloud analytics.

Uploaded by

rahib5461
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views21 pages

Unit 2

The document outlines the three primary cloud service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), detailing their characteristics, advantages, disadvantages, and considerations for implementation. SaaS provides web-based software access without user management of infrastructure, PaaS offers a framework for application development without infrastructure concerns, and IaaS delivers on-demand computing resources with full control over the infrastructure. Additionally, it mentions other services like Monitoring as a Service (MaaS) and Disaster Recovery as a Service (DRaaS), as well as the principles of Service-Oriented Architecture (SOA) and cloud analytics.

Uploaded by

rahib5461
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

What are the Cloud Service Models?

SaaS, PaaS, and IaaS are the three main cloud computing service model categories.
You can access all three via an Internet browser or online apps available on
different devices. The cloud service model enables the team to collaborate online
instead of offline creation and then share online.

Software as a Service (SaaS) is a web-based deployment model that makes the


software accessible through a web browser. SaaS software users don’t need to care
where the software is hosted, which operating system it uses, or even which
programming language it is written in. The SaaS software is accessible from any
device with an internet connection.
This cloud service model ensures that consumers always use the most current
version of the software. The SaaS provider handles maintenance and support. In
the SaaS model, users don’t control the infrastructure, such as storage, processing
power, etc.

Exam
ple of SaaS Services

Characteristics of SaaS
There are the following characteristics of SaaS:

 It is managed from a central location.


 Hosted directly on a remote server.
 It is accessible over the Internet.
 SaaS users are not responsible for hardware and software updates.
 The services are purchased on a pay-as-per-use basis.

Advantages SaaS
Here are the important advantages/pros of SaaS:

 The biggest benefit of using SaaS is that it is easy to set up, so you can start
using it instantly.
 Compared with on-premises software, it is more cost-effective.
 You don’t need to manage or upgrade the software, as it is typically included
in a SaaS subscription or purchase.
 It won’t use your local resources, such as the hard disk typically required to
install desktop software.
 It is a cloud computing service category that provides a wide range of hosted
capabilities and services.
 Developers can easily build and deploy web-based software applications.
 You can easily access it through a browser.

Disadvantages SaaS
Here are the important cons/drawbacks of SaaS:

 Integrations are up to the provider, so it’s impossible to “patch” an


integration on your end.
 SaaS tools may become incompatible with other tools and hardware already
used in your business.
 You depend on the SaaS company’s security measures, so your data may be
compromised if any leaks occur.

Things to Consider Before SaaS Implementation


Here are essential things you need to consider before SaaS implementation:

 It would help if you opted for configuration over customization within a


SaaS-based delivery model.
 You must carefully understand the usage rates and set clear objectives to
achieve the SaaS adoption.
 You can complement your SaaS solution with integrations and security
options to make it more user-oriented.

Platform as a Service (PaaS)

Platform-as-a-Service (PaaS) provides a cloud computing framework for software


application creation and deployment. It is a platform for the deployment and
management of software apps. This flexible cloud computing model scales up
automatically on demand. It also manages the servers, storage, and networking,
while the developers manage only the application part. It offers a runtime
environment for application development and deployment tools.

This Model provides all the facilities required to support the complex life cycle of
building and delivering web applications and services entirely for the Internet. This
cloud computing model enables developers to rapidly develop, run, and manage
their apps without building and maintaining the infrastructure or platform.

Characteristics of PaaS
There are the following characteristics of PaaS:

 Builds on virtualization technology, so computing resources can easily be


scaled up (Auto-scale) or down according to the organization’s needs.
 Support multiple programming languages and frameworks.
 Integrates with web services and databases.

Advantages PaaS
Here are the important benefits/pros of PaaS:

 Simple, cost-effective development and deployment of apps


 Developers can customize SaaS apps without the headache of maintaining
the software
 Provide automation of Business Policy
 Easy migration to the Hybrid Model
 It allows developers to build applications without the overhead of the
underlying operating system or cloud infrastructure
 Offers freedom to developers to focus on the application’s design while the
platform takes care of the language and the database
 It helps developers to collaborate with other developers on a single app

Disadvantages of SaaS
Here are the important cons/drawbacks of PaaS:

 You have control over the app’s code and not its infrastructure.
 The PaaS organization stores your data, so it sometimes poses a security risk
to your app’s users.
 Vendors provide varying service levels, so selecting the right services is
essential.
 The risk of lock-in with a vendor may affect the ecosystem you need for
your development environment.

Things to Consider Before PaaS Implementation


Here are essential things you need to consider before PaaS implementation:

 Analyze your business needs, decide the automation levels, and also decides
whether you want a self-service or fully automated PaaS model.
 You need to determine whether to deploy on a private or public cloud.
 Plan through the customization and efficiency levels.

Infrastructure as a Service (IaaS)


Infrastructure-as-a-Service (IaaS) is a cloud computing service offering on-demand
computing, storage, and networking resources. It usually works on a pay-as-you-go
basis.

Organizations can purchase resources on-demand and as needed instead of buying


the hardware outright.

The IaaS cloud vendor hosts the infrastructure components, including the on-
premises data center, servers, storage, networking hardware, and the hypervisor
(virtualization layer).

This Model contains the basic building blocks for your web application. It provides
complete control over the hardware that runs your application (storage, servers,
VMs, networks & operating systems). IaaS model gives you the best flexibility and
management control over your IT resources.

Characteristics of IaaS
There are the following characteristics of IaaS:

 Resources are available as a service


 Services are highly scalable
 Dynamic and flexible Cloud Service Model
 GUI and API-based access
 Automate the administrative tasks
Advantages of IaaS
Here are the important benefits/pros of PaaS:

 Easy to automate the deployment of storage, networking, and servers.


 Hardware purchases can be based on consumption.
 Clients keep complete control of their underlying infrastructure.
 The provider can deploy the resources to a customer’s environment anytime.
 It can be scaled up or downsized according to your needs.

Disadvantages of IaaS
Here are the important Cons/drawbacks of IaaS:

 You should ensure that your apps and operating systems are working
correctly and providing the utmost security.
 You’re in charge of the data, so if any of it is lost, it’s up to you to recover it.
 IaaS firms only provide the servers and API, so you must configure
everything else.

Things to Consider Before IaaS Implementation


Here are some specific considerations you should remember before IaaS
Implementation:

 You should clearly define your access needs and your network’s bandwidth
to facilitate smooth implementation and functioning.
 Plan out detailed data storage and security strategy to streamline the
business process.
 Ensure that your organization has a proper disaster recovery plan to keep
your data safe and accessible.

Other important As a Services

 MaaS–MaaS stands for monitoring as a service. It allows the consumer to


monitor the status of their critical applications regardless of location.
 CaaS – Communication as a service use Enterprise level VPNs, VoIP, PBX,
and Unified Communications between the costly investment of hosting,
purchasing, and managing the IT infrastructure. It also enables you to reduce
CAPEX and OPEX.
 DaaS – Desktop as a service ensures a reliable, consistent experience for the
remote use of programs, applications, and files anywhere, anytime.
 DRaaS – Disaster Recovery as a service is a cloud computing model that
provides safeguards from natural (or artificial) catastrophes.

Service-Oriented Architecture
Service-Oriented Architecture (SOA) is a stage in the evolution of application
development and/or integration. It defines a way to make software components
reusable using the interfaces.
Formally, SOA is an architectural approach in which applications make use of
services available in the network. In this architecture, services are provided to
form applications, through a network call over the internet. It uses common
communication standards to speed up and streamline the service integrations in
applications. Each service in SOA is a complete business function in itself. The
services are published in such a way that it makes it easy for the developers to
assemble their apps using those services. Note that SOA is different from
microservice architecture.
 SOA allows users to combine a large number of facilities from existing
services to form applications.
 SOA encompasses a set of design principles that structure system
development and provide means for integrating components into a coherent
and decentralized system.
 SOA-based computing packages functionalities into a set of interoperable
services, which can be integrated into different software systems belonging to
separate business domains.

The different characteristics of SOA are as follows :


o Provides interoperability between the services.
o Provides methods for service encapsulation, service discovery, service
composition,
service reusability and service integration.
o Facilitates QoS (Quality of Services) through service contract based on Service
Level
Agreement (SLA).
o Provides loosely couples services.
o Provides location transparency with better scalability and availability.
o Ease of maintenance with reduced cost of application development and
deployment.
There are two major roles within Service-oriented Architecture:
1. Service provider: The service provider is the maintainer of the service and the
organization that makes available one or more services for others to use. To
advertise services, the provider can publish them in a registry, together with a
service contract that specifies the nature of the service, how to use it, the
requirements for the service, and the fees charged.
2. Service consumer: The service consumer can locate the service metadata in
the registry and develop the required client components to bind and use the
service.

Services might aggregate information and data retrieved from other services or
create workflows of services to satisfy the request of a given service consumer.
This practice is known as service orchestration Another important interaction
pattern is service choreography, which is the coordinated interaction of services
without a single point of control.

Components of SOA:
Guiding Principles of SOA:

1. Standardized service contract: Specified through one or more service


description documents.
2. Loose coupling: Services are designed as self-contained components, maintain
relationships that minimize dependencies on other services.
3. Abstraction: A service is completely defined by service contracts and
description documents. They hide their logic, which is encapsulated within
their implementation.
4. Reusability: Designed as components, services can be reused more effectively,
thus reducing development time and the associated costs.
5. Autonomy: Services have control over the logic they encapsulate and, from a
service consumer point of view, there is no need to know about their
implementation.
6. Discoverability: Services are defined by description documents that constitute
supplemental metadata through which they can be effectively discovered.
Service discovery provides an effective means for utilizing third-party
resources.
7. Composability: Using services as building blocks, sophisticated and complex
operations can be implemented. Service orchestration and choreography
provide a solid support for composing services and achieving business goals.

Advantages of SOA:
 Service reusability: In SOA, applications are made from existing services.
Thus, services can be reused to make many applications.
 Easy maintenance: As services are independent of each other they can be
updated and modified easily without affecting other services.
 Platform independent: SOA allows making a complex application by
combining services picked from different sources, independent of the
platform.
 Availability: SOA facilities are easily available to anyone on request.
 Reliability: SOA applications are more reliable because it is easy to debug
small services rather than huge codes
 Scalability: Services can run on different servers within an environment, this
increases scalability
Disadvantages of SOA:

 High overhead: A validation of input parameters of services is done whenever


services interact this decreases performance as it increases load and response
time.
 High investment: A huge initial investment is required for SOA.
 Complex service management: When services interact they exchange
messages to tasks. the number of messages may go in millions. It becomes a
cumbersome task to handle a large number of messages.

Understanding what cloud computing on demand is

Cloud computing on demand refers to resources such as applications, processors,


and storage being made available to users whenever needed via cloud technology.
Thus, organizations can scale resources up or down easily with this model. This
article discusses how cloud computing on demand works and the benefits of using
it as a delivery model. It also discusses how you can scale your IT infrastructure
dynamically with a Parallels® solution.

How does cloud computing on-demand work?


Instead of building their own datacenters or IT infrastructures, more organizations
are now choosing to outsource their resource needs to cloud service providers.
Typically, they rent computing resources whenever their users demand them. In the
process, they avoid the high upfront costs of acquiring datacenter equipment and
putting it up in physical locations and the complexity of maintaining such
equipment.
More often, cloud service providers offer these services at affordable prices. This
is due to the economies of scale derived from offering them to a wide client base.
This benefits their customers and further drives up demand for their services.

How does cloud computing provide on-demand functionality?


Computing resources from cloud service providers come in the form of servers,
disk storage, networks, network bandwidth, application software, and others.
Providers maintain these resources in server pools. In turn, customers distribute
resources to their users from these pools.
Most cloud services come with control panels that enable customers to view the
services available to them. Distributing to users is done via the control panel when
there is a demand for additional computing resources. For example, when users
need more storage space and access to an application at the same time, more
storage capacity is added, and application licenses are assigned to them. The IT
team is often tasked with handling this distribution.
When there is an excess of computing resources, it can be trimmed and scaled
down from the control panel. The IT team must keep a close watch on the
resources to prevent any excess, leading to higher costs without any accompanying
increase in benefits to the organization.

What are the benefits offered by cloud computing on demand?


On-demand cloud computing benefits include:

 More efficient utilization of computing resources: Since demand for


computing resources may be subject to frequent fluctuations, a common
strategy to ensure the ability to meet changing demands is to build up the
IT infrastructure, necessitating heavy spending on equipment, staff, and
space. With on-demand cloud computing, this does not have to be true
anymore.
 Better ability to scale resources up or down dynamically: Organizations
can put off spending on IT infrastructure requirements since they can just
add more resources when there is already a need for them.
 Pay-as-you-go computing: With organizations only paying for the
resources they are using, there is an immense potential for huge cost
savings.

Cloud analytics is a service model in which elements of the data analytics process
are provided through a public or private cloud.

Cloud analytics applications and services are typically offered under a


subscription-based or utility (pay-per-use) pricing model.

Gartner defines the six key elements of analytics as


1. Data sources
2. Data models
3. Processing applications
4. Computing power
5. Analytic models
6. Sharing or storage of results
In Gartner’s view, any analytics initiative “in which one or more of these elements
is implemented in the cloud” qualifies as cloud analytics.

Examples of cloud analytics products and services include

1. Hosted data warehouses


2. Software-as-a-Service business intelligence (SaaS BI)
3. Cloud-based social media analytics
It provides users with a better forecasting technique to analyze and optimize the
service lines and provide a higher level of accuracy.

Cloud Business Analytics Competencies:

1. This cloud analytic service is supported by different type of competency areas.


2. The cloud analytics strategy helps clients to achieve their business objectives
faster with less risk and at a lower cost.
3. Another competency is business intelligence and performance management that
helps to increase performance by providing accurate and on time data
reporting.
4. The next is analytics and optimization that provides different types of modeling
techniques, deep computing and simulation techniques to increase the
performance.
5. The other competency is a content management system that includes the
different service architecture, technology architecture.
How Cloud Analytics Work?

1. Cloud Analytics works with the combination of hardware services and


middleware.
2. The system features include the platform that provides data reporting analytics
based on text mining activities and analytics techniques.
3. This system also takes care of storage optimization and different high
performance data warehouse management techniques.
Analytics Business Outcomes:
1. Analytics help to get the right information as and when they are required
identify how to get it and point out the right sources to get it.
2. Analytics also helps in designing the policies faster based on the information
available in the organization.
3. This gives the option through which the organization can increase its profit,
reduce cycle time and reduce defects.

What is Information Security?


Introduction :
Information security is the practice of protecting information by mitigating
information risks. It involves the protection of information systems and the
information processed, stored and transmitted by these systems from
unauthorized access, use, disclosure, disruption, modification or destruction. This
includes the protection of personal information, financial information, and
sensitive or confidential information stored in both digital and physical forms.
Effective information security requires a comprehensive and multi-disciplinary
approach, involving people, processes, and technology.
Information Security is not only about securing information from unauthorized
access. Information Security is basically the practice of preventing unauthorized
access, use, disclosure, disruption, modification, inspection, recording or
destruction of information. Information can be a physical or electronic one.
Information can be anything like Your details or we can say your profile on social
media, your data on mobile phone, your biometrics etc. Thus Information
Security spans so many research areas like Cryptography, Mobile Computing,
Cyber Forensics, Online Social Media, etc.

During First World War, Multi-tier Classification System was developed keeping
in mind the sensitivity of the information. With the beginning of Second World
War, formal alignment of the Classification System was done. Alan Turing was
the one who successfully decrypted Enigma Machine which was used by
Germans to encrypt warfare data.
Effective information security requires a comprehensive approach that considers
all aspects of the information environment, including technology, policies and
procedures, and people. It also requires ongoing monitoring, assessment, and
adaptation to address emerging threats and vulnerabilities.
Why we use Information Security?
We use information security to protect valuable information assets from a wide
range of threats, including theft, espionage, and cybercrime. Information security
is necessary to ensure the confidentiality, integrity, and availability of
information, whether it is stored digitally or in other forms such as paper
documents. Here are some key reasons why information security is important:
1. Protecting sensitive information: Information security helps protect sensitive
information from being accessed, disclosed, or modified by unauthorized
individuals. This includes personal information, financial data, and trade
secrets, as well as confidential government and military information.
2. Mitigating risk: By implementing information security measures,
organizations can mitigate the risks associated with cyber threats and other
security incidents. This includes minimizing the risk of data breaches, denial-
of-service attacks, and other malicious activities.
3. Compliance with regulations: Many industries and jurisdictions have specific
regulations governing the protection of sensitive information. Information
security measures help ensure compliance with these regulations, reducing the
risk of fines and legal liability.
4. Protecting reputation: Security breaches can damage an organization’s
reputation and lead to lost business. Effective information security can help
protect an organization’s reputation by minimizing the risk of security
incidents.
5. Ensuring business continuity: Information security helps ensure that critical
business functions can continue even in the event of a security incident. This
includes maintaining access to key systems and data, and minimizing the
impact of any disruptions.

Information Security programs are build around 3 objectives, commonly known


as CIA – Confidentiality, Integrity, Availability.

1. Confidentiality – means information is not disclosed to unauthorized


individuals, entities and process. For example if we say I have a password for
my Gmail account but someone saw while I was doing a login into Gmail
account. In that case my password has been compromised and Confidentiality
has been breached.
2. Integrity – means maintaining accuracy and completeness of data. This means
data cannot be edited in an unauthorized way. For example if an employee
leaves an organisation then in that case data for that employee in all
departments like accounts, should be updated to reflect status to JOB LEFT so
that data is complete and accurate and in addition to this only authorized
person should be allowed to edit employee data.
3. Availability – means information must be available when needed. For example
if one needs to access information of a particular employee to check whether
employee has outstanded the number of leaves, in that case it requires
collaboration from different organizational teams like network operations,
development operations, incident response and policy/change management.
Denial of service attack is one of the factor that can hamper the availability of
information.

Apart from this there is one more principle that governs information security
programs. This is Non repudiation.

 Non repudiation – means one party cannot deny receiving a message or a


transaction nor can the other party deny sending a message or a transaction.
For example in cryptography it is sufficient to show that message matches the
digital signature signed with sender’s private key and that sender could have a
sent a message and nobody else could have altered it in transit. Data Integrity
and Authenticity are pre-requisites for Non repudiation.

 Authenticity – means verifying that users are who they say they are and that
each input arriving at destination is from a trusted source.This principle if
followed guarantees the valid and genuine message received from a trusted
source through a valid transmission. For example if take above example
sender sends the message along with digital signature which was generated
using the hash value of message and private key. Now at the receiver side this
digital signature is decrypted using the public key generating a hash value and
message is again hashed to generate the hash value. If the 2 value matches
then it is known as valid transmission with the authentic or we say genuine
message received at the recipient side
 Accountability – means that it should be possible to trace actions of an entity
uniquely to that entity. For example as we discussed in Integrity section Not
every employee should be allowed to do changes in other employees data. For
this there is a separate department in an organization that is responsible for
making such changes and when they receive request for a change then that
letter must be signed by higher authority for example Director of college and
person that is allotted that change will be able to do change after verifying his
bio metrics, thus timestamp with the user(doing changes) details get recorded.
Thus we can say if a change goes like this then it will be possible to trace the
actions uniquely to an entity.
advantages to implementing an information classification system in an
organization’s information security program:
1. Improved security: By identifying and classifying sensitive information,
organizations can better protect their most critical assets from unauthorized
access or disclosure.
2. Compliance: Many regulatory and industry standards, such as HIPAA and
PCI-DSS, require organizations to implement information classification and
data protection measures.
3. Improved efficiency: By clearly identifying and labeling information,
employees can quickly and easily determine the appropriate handling and
access requirements for different types of data.
4. Better risk management: By understanding the potential impact of a data
breach or unauthorized disclosure, organizations can prioritize resources and
develop more effective incident response plans.
5. Cost savings: By implementing appropriate security controls for different
types of information, organizations can avoid unnecessary spending on
security measures that may not be needed for less sensitive data.
6. Improved incident response: By having a clear understanding of the criticality
of specific data, organizations can respond to security incidents in a more
effective and efficient manner.
There are some potential disadvantages to implementing an information
classification system in an organization’s information security program:
1. Complexity: Developing and maintaining an information classification system
can be complex and time-consuming, especially for large organizations with a
diverse range of data types.
2. Cost: Implementing and maintaining an information classification system can
be costly, especially if it requires new hardware or software.
3. Resistance to change: Some employees may resist the implementation of an
information classification system, especially if it requires them to change their
usual work habits.
4. Inaccurate classification: Information classification is often done by human, so
it is possible that some information may be misclassified, which can lead to
inadequate protection or unnecessary restrictions on access.
5. Lack of flexibility: Information classification systems can be rigid and
inflexible, making it difficult to adapt to changing business needs or new types
of data.
6. False sense of security: Implementing an information classification system
may give organizations a false sense of security, leading them to overlook
other important security controls and best practices.
7. Maintenance: Information classification should be reviewed and updated
frequently, if not it can become outdated and ineffective.
Uses of Information Security :
Information security has many uses, including:
1. Confidentiality: Keeping sensitive information confidential and protected from
unauthorized access.
2. Integrity: Maintaining the accuracy and consistency of data, even in the
presence of malicious attacks.
3. Availability: Ensuring that authorized users have access to the information
they need, when they need it.
4. Compliance: Meeting regulatory and legal requirements, such as those related
to data privacy and protection.
5. Risk management: Identifying and mitigating potential security threats to
prevent harm to the organization.
6. Disaster recovery: Developing and implementing a plan to quickly recover
from data loss or system failures.
7. Authentication: Verifying the identity of users accessing information systems.
8. Encryption: Protecting sensitive information from unauthorized access by
encoding it into a secure format.
9. Network security: Protecting computer networks from unauthorized access,
theft, and other types of attacks.
10.Physical security: Protecting information systems and the information they
store from theft, damage, or destruction by securing the physical facilities that
house these systems.
Issues of Information Security :
Information security faces many challenges and issues, including:
1. Cyber threats: The increasing sophistication of cyber attacks, including
malware, phishing, and ransomware, makes it difficult to protect information
systems and the information they store.
2. Human error: People can inadvertently put information at risk through actions
such as losing laptops or smartphones, clicking on malicious links, or using
weak passwords.
3. Insider threats: Employees with access to sensitive information can pose a risk
if they intentionally or unintentionally cause harm to the organization.
4. Legacy systems: Older information systems may not have the security features
of newer systems, making them more vulnerable to attack.
5. Complexity: The increasing complexity of information systems and the
information they store makes it difficult to secure them effectively.
6. Mobile and IoT devices: The growing number of mobile devices and internet
of things (IoT) devices creates new security challenges as they can be easily
lost or stolen, and may have weak security controls.
7. Integration with third-party systems: Integrating information systems with
third-party systems can introduce new security risks, as the third-party
systems may have security vulnerabilities.
8. Data privacy: Protecting personal and sensitive information from
unauthorized access, use, or disclosure is becoming increasingly important as
data privacy regulations become more strict.
9. Globalization: The increasing globalization of business makes it more difficult
to secure information, as data may be stored, processed, and transmitted across
multiple countries with different security requirements.

Virtual desktop infrastructure (VDI) is defined as the hosting of desktop


environments on a central server. It is a form of desktop virtualization, as the
specific desktop images run within virtual machines (VMs) and are delivered to
end clients over a network.

Virtual Desktop Infrastructure (VDI) is a concept in which a solution based on a


server based computing model that is not so different from the traditional terminal
server centralized computing model used to deliver applications to remote users.

Virtual Desktop Infrastructure or VDI is the name given to a collection of


technologies and processes that dramatically extend the concept of a remote
desktop.

It centers on the idea that companies can virtualized their desktop operating
systems like Windows XP or Vista using platforms like VMware ESX or
Xenserver. and run said desktops from within the secured datacenter.
Vdi Benefits:

1. Data Security
2. Reduced Hardware Expenditures
3. Easier Management: Perform centralized patching and application installation
or streaming without loading the network
4. Mobile Workforce: User desktops are portable – users can reconnect from any
location with a variety of devices.
5. Resource Pooling.

What is Cloud Storage?


In Cloud Computing, Cloud storage is a virtual locker where we can remotely
stash any data. When we upload a file to a cloud-based server like Google Drive,
OneDrive, or iCloud that file gets copied over the Internet into a data server that
is cloud-based actual physical space where companies store files on multiple hard
drives. Most companies have hundreds of the ese servers known as ‘server farms’
spanning across multiple locations. So, if our data gets somehow lost we will not
lose our data because it will be backed up by another location. This is known as
redundancy which keeps our data safe from being lost.
Features of Cloud Storage System:
The key features of cloud computing are as follows.
 It has a greater availability of resources.
 Easy maintenance is one of the key benefits of using Cloud computing.
 Cloud computing has a Large Network Access.
 It has an automatic system.
 Security is one of the major components and using cloud computing you can
secure all over the networks.
Storage Systems in the Cloud
There are 3 types of storage systems in the Cloud as follows.
 Block-Based Storage System
 File-Based Storage System
 Object-Based Storage System
Let’s discuss it one by one as follows.
1. Block-Based Storage System –
 Hard drives are block-based storage systems. Your operating system like
Windows or Linux actually sees a hard disk drive. So, it sees a drive on which
you can create a volume, and then you can partition that volume and format
them.
 For example, If a system has 1000 GB of volume, then we can partition it into
800 GB and 200 GB for local C and local D drives respectively.
 Remember with a block-based storage system, your computer would see a
drive, and then you can create volumes and partitions.

2. File-Based Storage System –


 In this, you are actually connecting through a Network Interface Card (NIC) .
You are going over a network, and then you can access the network-attached
storage server (NAS). NAS devices are file-based storage systems.
 This storage server is another computing device that has another disk in it. It is
already created a file system so that it’s already formatted its partitions, and it
will share its file systems over the network. Here, you can actually map the
drive to its network location.
 In this, like the previous one, there is no need to partition and format the
volume by the user. It’s already done in file-based storage systems. So, the
operating system sees a file system that is mapped to a local drive letter.

3. Object-Based Storage System –


 In this, a user uploads objects using a web browser and uploads an object to a
container i.e., Object Storage Container. This uses the HTTP Protocols with
the rest of the APIs (for example: GET, PUT, POST, SELECT, DELETE).
 For example, when you connect to any website, you need to download some
images, text, or anything that the website contains. For that, it is a code HTTP
GET request. If you want to review any product then you can use PUT and
POST requests.
 Also, there is no hierarchy of objects in the container. Every file is on the
same level in an Object-Based storage system.
Cloud Storage Architecture
Cloud Storage architecture flow is as follows :
 The Cloud Storage Architecture consists of several distributed resources, but
still functions as one, either in a cloud architecture of federated or cooperative
storage.
 Durable through the manufacture of copies of versions.
 Ultimately, it is usually compatible with data replication advantages.
 Companies just need to pay for the storage they actually use, normally an
average of a month’s consumption. This does not indicate that cloud storage is
less costly, but rather that operating costs are incurred rather than capital
expenses.
 Cloud storage companies can cut their energy usage by up to 70 percent,
making them a greener company.
 Storage and data security is inherent in the architecture of object storage
 The additional infrastructure, effort, and expense to incorporate accessibility
and security can be removed depending on the application.
 Tasks for storage management, such as the procurement of additional storage
space, are offloaded to the service provider’s obligation.
 It provides users with immediate access to a wide variety of tools and software
housed in another organization’s infrastructure through a web service
interface.
 Very few backups servers are located in different locations across the globe,
cloud storage may be used as a natural disaster-proof backup.
 With the WebDAV protocol, cloud storage can be mapped as a local drive
Advantages of Cloud Storage
 Scalability – Capacity and storage can be expanded and performance can be
enhanced.
 Flexibility – Data can be manipulated and scaled according to the rules.
 Simpler Data Migrations – As it can add and remove new and old data when
required and eliminates disruptive data migrations.
 Recovery -In the event of a hard drive failure or other hardware malfunction,
you can access your files on the cloud.
Disadvantages of Cloud Storage
 Data centers require electricity and proper internet facility to operate their
work, failing which system will not work properly.
 Support for cloud storage isn’t the best, especially if you are using a free
version of a cloud provider.
 When you use a cloud provider, your data is no longer on your physical
storage.
 Cloud-based storage is dependent on having an internet connection. If you are
on a slow network you may have issues accessing your storage.

You might also like