Cloud Computing Definition

Preview:

Citation preview

1

Defining Cloud ComputingPROF. MEYBODIAMIR HADIFAR

2Table of Content

Defining cloud computing Cloud Models Learning about cloud type Understanding the paradigm shift that is cloud computing Comparing the benefits and disadvantages of cloud systems

3Is Cloud Computing new ?

Utility sharing 1961 Time sharing 70s Large distributed data centers 80s – 90s The New Millennium: 2000s

What is Cloud Computing ?

First definition in 2009 After 15 draft in 2011 NIST Cloud Computing Model (800-145)

4

5Some Concepts in Cloud

Abstraction abstracts the details of system implementation from users and developers

Virtualization virtualizes systems by pooling and sharing resources

6Difference between Cloud & Internet

Internet is establish and maintain connectivity of computers Cloud is a technology delivers many type of resource over internet

7Cube Model by Jericho Forum

Founded 2004 & closed October 2013

4 dimension : Physical location of data ( internal/external) Ownership (Proprietary/open) Security boundary (Perimeterised/De-Perimeterised) Sourcing ( insource/outsource)

8Model type According to NIST

Three service model Four deployment model Five essential characteristics

9Deployment model

Private cloud Public cloud Community cloud Hybrid cloud Others

refers to the location and management of the cloud's infrastructure

10Service Model ( SPI )

Software as a Service ( SaaS ) Platform as a Service ( PaaS ) Infrastructure as a Service ( IaaS )

<something> as a Service

11NIST Deployment & Service Model

12Essential Characteristics

13Advantage

Lower costs Ease of utilization Quality of Service Reliability Outsourced IT management Simplified maintenance and upgrade

14Disadvantage

Sometimes is not customizable as you want inherent latency that is intrinsic in their WAN connectivity Stateless Privacy and security

15References

Sosinsky, Barrie. "Understanding Cloud Architecture." Cloud Computing Bible (2011): 45-64.

“Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Problem,” 2009.

Recommended