Wednesday, May 6, 2020
Cloud Computing Architecture Is a Set of Various Components
Question: Difference between Clouds Computing Architecture Various Components? Answer: Introducation: Cloud computing architecture is a set of various components that can be categorized in terms of databases, applications, software and their capabilities, analytics, storage systems, server management and more over the cloud. Companies who offer services over cloud are called cloud service providers and they charge for managing cloud computing services which are based on various factors (HCL, 2017). Cloud architecture comprises of various components such as on premise resources, software components and their services, middleware and cloud resources. Top benefits for using cloud computing are to reduce cost, speeding up the process on demand basis, removes physical need of deployment of hardware set up and patching up of softwares over and over, increasing the performance and reliability with the help of backing up of data that are stored on cloud (Erl, Puttini, Mahmood, 2013). There are three types of deployment models over cloud and they are: Public cloud model the services that are provided by cloud is exposed which means that anyone on the internet has the access or view the data that are stored on cloud. The virtualization that is built on public cloud is such that the data are accessible to all the public. For example: Amazon Web Services (HighQ , 2014). Private cloud model the services that are provided by cloud is bound to a single organization. The data are not exposed to the public and a private cloud exists only inside of an organization and must be protected by a firewall so that the organization that has deployed only has access to read the data (Furht Escalante, 2010). Hybrid cloud model hybrid cloud is generally a combination of two or more models combined together. Hybrid cloud model can be deployed and distributed among both private and public clouds. For example, sensitive information can be kept as private using private cloud model and services can be provided over public cloud using public cloud model (HighQ , 2014; Microsoft, 2017). Reasons for choosing Hybrid cloud model Multi tenancy data which are stored on the public cloud is of multi-tenant by default and the data can be stored by any number of organizations and the data which are considered as sensitive can be kept as private and this can be done by an organization depending on the requirement basis (HighQ , 2014). Exposure of data - Since organizations need to store sensitive data as private, at the same time organizations has to provide service, the data which are marked as public can be viewed anyone whereas the private data can be viewed only by the organizations users. Data centers A private cloud maintains its data only inside of its organization but, hybrid cloud maintains its private data inside of the organizations network and keeps its public data anywhere to provide public related services (HighQ , 2014). Cost Cost of hybrid cloud is effectively lower than that of private cloud and also, more reliable comparing with the services as compared to the private cloud. Risks associated with Hybrid Cloud Security hybrid model should focus on the following: Management of users, access control systems and encryption of sensitive data that goes on cloud. Maintaining of directories is a problem that has to be handled because, the user who can integrate the directories on-premises sometimes has to integrate the directories on cloud too and since hybrid cloud supports multi tenancy, user should have the capability to integrate directories on multiple clouds. And since hybrid cloud provides support to public and private cloud models, implementation of directory structures is a security threat that has to be handled. Access control is another setback that should be taken care of because; a public user should not have access to the private data stored on the cloud. Key management of private data should also be taken care of because the data which are marked as private should be encrypted else it is a serious issue of theft. One can use Amazons Key management service for this encryption of da ta (Sullivan, 2015). Management of accounts and their billing In hybrid cloud model, since it consists of private cloud, no organization wishes their bill to be of surprise and for this, its really important to use cloud resources only on-demand basis. Organizations should have a close look on the cloud expenses and for this organizations can take guidance from RightScale or Cloudability (Sullivan, 2015) which are generally third party services. Organizations should have budget alerts too and this help in reducing costs where it is not necessary. Provisioning of resources Resources that are used in public and private cloud should be configured properly. Configuration errors will not only waste hardware resources or breaking the infrastructure but also its a huge waste of money. Hence, there has to be automation testing unit that takes care of the configuration after and before the configuration set up is started (Sullivan, 2015). Virtualization Virtualization is application software that helps in separating physical infrastructures for creating various dedicated resources on cloud. Virtualization is the primary technology that gives cloud computing a power to manage resources. Virtualization will help to run multiple operating systems to run multiple applications on a single dedicated server and at same time too. This technique will reduce IT costs and will help in increasing efficiency, flexibility and utilization becomes simple with the existing hardware components. The technology that is behind virtualization is VMM which is virtual machine monitor and this helps in separating different environments that is actual infrastructure and the other running on virtual machine (Angeles, 2014). Benefits of virtualization Maximizing resources virtualization will help in reducing physical frameworks or physical systems which needs to be acquired and one can get more output from the servers. Most of the systems which are built on traditional way are of underutilized. Virtualization will make sure that it uses maximum of hardware investment (Angeles, 2014). Multiple systems virtualization will help in running multiple applications which are of not same type and also which are running on different operating systems altogether but, those has to be on same physical hardware (Gouda, Patro, Dwivedi, Bhat, 2014). Flexibility virtualization will help in creating multiple instances (Thakur Mahajan, 2016). Utilization of hardware virtual machine uses assets which are marked as idle and ensures that it uses 80 percent of servers capacity. It reduces hardware equipment incredibly. Security usage of different virtual machines will help in administration of each of the virtual machine independently. This approach is termed as jailing of services (Thakur Mahajan, 2016). ICT risk management Organizations should be very careful and should access who is accessing private or sensitive data. The data which are kept on-premises will no longer be called as private unless or otherwise it is moved on cloud infrastructure. From organizations perspective, organization should enquire how best cloud service providers will ensure that the data are safe and what are the best practices they follow to ensure and also backup the data at times of theft (Prakash, 2011). Lose of data and recovery data before going on to the cloud and on cloud should be encrypted to safeguard private or sensitive data of the customers. It is very hard or sometimes the corrupted data or the data which gets encrypted from the hackers is considered to be loss of data. In such scenarios, organizations should know how service providers will make sure that the data gets recovered from the corrupted or encrypted data after data gets malware. Availability of data and backup generally, the cloud service provider will depend on network, application, and storage and on the equipments of the cloud. If any one of the component is down, then the user wouldnt be able to access the data that is cloud. Therefore, putting whole data on cloud shouldnt be considered as best practice but, the data should be kept on-premises but it has to be kept under authorized access. Migration of services to cloud Points that have be taken care of before moving the data on cloud: Backing up of data. In depth understanding of configuration details of cloud infrastructure Understanding which cloud computing model should be used on data that is pushed on cloud for example public or private model. Making sure that the data are encrypted before the data are pushed on cloud. Make sure that the data present on-premises is deleted from the resources and safe guarded at one physical location which should be maintained under authorization. Provide two-sided authentication for accessing of data present on cloud that is client and web based authentication. References Angeles, S. (2014, January 20). Virtualization vs. Cloud Computing: What's the difference? Business News Daily. Erl, T., Puttini, R., Mahmood, Z. (2013). Cloud Computing: Concepts, Technology Architecture. Prentice Hall. Furht, B., Escalante, A. (2010). Handbook of Cloud Computing. Springer Science Business Media. Gouda, K., Patro, A., Dwivedi, D., Bhat, N. (2014). Virtualization Approaches in Cloud Computing. International Journal of Computer Trends and Technology (IJCTT), 12(4), 161-166. HCL. (2017). Cloud Architecture. HCL. HighQ . (2014, October 2). Whats the difference between public, private and hybrid cloud? Microsoft. (2017). What is cloud computing? Microsoft. Prakash, S. (2011, April 15). Risk Management in Cloud Computing. Retrieved from CIO: https://www.cio.com/article/2409109/cloud-computing/risk-management-in-cloud-computing.html Sullivan, D. (2015, June). Tackling three key issues with hybrid cloud management. Thakur, P., Mahajan, M. (2016). Virtualization in Cloud Computing. Internation Journal of Recent Trends in Engineering Research, 2(12), 308-315
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.