issues in cloud computing

Download Issues in cloud computing

Post on 17-Jan-2015




0 download

Embed Size (px)


Cloud computing means using multiple server computers via a digital network, as though they were one computer. We can say , it is a new computing paradigm, involving data and/or computation has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.there are solutions like scaling of resources, distribute servers etc.


  • 2. Flow of presentation :
    • Introduction
    • Security issues
    • Data issues
    • Performance issues
    • Energy related issues
    • Bandwidth related issues
    • Fault tolerance
    • Conclusion
    • Cloud computingmeans using multipleservercomputers via a digital network, as though they were one computer.
    • We can say , it is a new computing paradigm, involving data and/or computation outsourcing, with
    • Infinite and elastic resource scalability
    • On demand just-in-time provisioning
    • No upfront cost pay-as-you-go
    • The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams.
    • Traditionally, without a cloud, aweb serverruns as a single computer or a group of privately owned computers
    • If the computer'swebsiteorweb applicationsuddenly becomes more popular, and the amount of requests are far more than the web server can handle, the response time of the requested pages will be increased due to overloading. On the other hand, in times of low load much of the capacity will go unused.
    • If the website,service, or web application is hosted in a cloud, however, additional processing and compute power is available from the cloud provider.
    • If the website suddenly becomes more popular, the cloud can automatically direct more individual computers to work to serve pages for the site, and more money is paid for the extra usage. If it becomes unpopular, however, the amount of money due will be less. Cloud computing is popular for its pay-as-you-go pricing model.
  • 5.
    • In the past computing task there were not possible without the installation of application software on a user's computer. A user bought a license for each application from a software vendor and obtained the right to install the application on one computer system.
    • With the development oflocal area networks(LAN) and more networking capabilities, theclient-server modelof computing was born, where server computers with enhanced capabilities and large storage devices could be used to host application services and data for a large workgroup.
  • 6. Difference between client-server and cloud computing :
    • Typically, in client-server computing, a network-friendly client version of the application is required on client computers which utilized the client system's memory and CPU for processing. even though resultant application data files were stored centrally on the data servers. Multiple user licenses of an application were purchased for use by many users on a network.
    • Cloud computingdiffers from the classic client-server model by providing applications from a server that are executed and managed by a client's web browser, with no installed client version of an application required.
  • 7. Architecture The two most significant components of cloud computing architecture are known as the front end & the back end .
  • 8.
    • The front end is the part seen by the client, i.e., the computer user. This includes the clients network (or computer) and the applications used to access the cloud via a user interface such as a web browser.
    • The back end of the cloud computing architecture is theclouditself, comprising various computers, servers and data storage devices.
    • Cloud architecture,thesystems architectureof thesoftware systemsinvolved in the delivery of cloud computing, typically involves multiplecloud componentscommunicating with each other overloose couplingmechanism such as messaging queue.
  • 9. Data storage
    • Cloud storage is a model of networkedcomputer data storagewhere data is stored on multiple virtual servers, in general hosted by third parties, rather than being hosted on dedicated servers.
    • Hosting companies operate large data centers; and people who require their data to be hosted buy or lease storage capacity from them and use it for their storage needs.
    • Thedata centeroperators, in the background,virtualizesthe resources according to the requirements of the customer and expose them as virtual servers, which the customers can themselves manage. In the physical sense, the resource may span across multiple servers.
  • 10. Cloud computing services are broadly divided into three categories:
    • Infrastructure as a Service (IaaS) :
    • This is the base layer of the cloud stack. It serves as a foundation for the other two layers, for their execution. The keyword behind this stack is Virtualization.
    • your application will be executed on a virtual computer (instance). You have the choice of virtual computer, where you can select a configuration of CPU, memory & storage that is optimal for your application.
    • The whole cloud infrastructure viz. servers, routers, hardware based load-balancing, firewalls, storage & other network equipments are provided by the IaaS provider.
    • Some common examples are Amazon, GoGrid, 3 Tera, etc.
  • 11. Platform as a Service (PaaS)
    • Here, a layer of software, or development environment is encapsulated & offered as a service, upon which other higher levels of service can be built.
    • The customer has the freedom to build his own applications, which run on the providers infrastructure.
    • To meet manageability and scalability requirements of the applications, PaaS providers offer a predefined combination of OS and application servers.
    • such as LAMP platform (Linux, Apache, MySql and PHP), Googles App Engine,, etc are some of the popular PaaS examples
  • 12. Software as a Service (SaaS)
    • In this model, a complete application is offered to the customer, as a service on demand. A single instance of the service runs on the cloud & multiple end users are serviced.
    • On the customers side, there is no need for upfront investment in servers or software licenses, while for the provider, the costs are lowered, since only a single application needs to be hosted & maintained.
    • Today SaaS is offered by companies such as Google, Salesforce, Microsoft, etc.
    • Private cloud:
    • The cloud infrastructure is owned or leased by a single organization and is operated solely for that organization.
    • Community cloud:
    • The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy).
    • Public cloud:
    • The cloud infrastructure is owned by an organization selling cloud services to the general public or to a large industry group.
    • Hybrid cloud:
    • The cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized orproprietary technology.
  • 14.
    • Security issues
    • - Physical security
    • - Operational security
    • - Programmatic security
    • Data issues
    • - Data backup
    • - Data usage
    • - Data loss
    • - Data integrity
    • - Data theft
  • 16.
    • Performance issue
    • Design issues
    • - Energy management
    • - Novel cloud architectures
    • - Software Licensing
    • Reliability
    • Legal issuues
    • - The Physical Location of your Data
    • - Responsibility of your Data
    • - Intellectual Property Rights
    • Security is generally perceived as a huge issue for the cloud
    • The survey found that while 58 percent of the general population and 86 percent of senior business leaders are excited about the potential of cloud computing, more than 90 percent of these same people are concerned about the security, access and privacy of their own data in the cloud.
    • There is a possibility where a malicious user can penetrate the cloud by impersonating a legitimate user, there by infecting t


View more >