cloud-computing-unit-4
cloud-computing-unit-4
UNIT 4
(Resource management and security)
Resource management is the process of allocating computing, storage, networking
and energy resources to a set of applications in order to meet performance
objectives and requirements of the infrastructure providers and the cloud users.
Cloud resource management requires complex policies and decisions for multi-
objective optimization. Effective resource management is extremely challenging
due to the scale of the cloud infrastructure and to the unpredictable interactions of
the system with a large population of users.
The cloud provider performs a number of tasks to ensure efficient use of cloud
resources.
1
Audit System Backups
The managers must know the procedure to exit from services of a particular cloud
provider. The procedures must be defined to enable the cloud managers to export
data of an organization from their system to another cloud provider.
Knowing Provider’s Security Procedures
The managers should know the security plans of the provider for the following
services:
• Multitenant use
2
• E-commerce processing
• Employee screening
• Encryption policy
Monitoring Capacity Planning and Scaling Capabilities
The managers must know the capacity planning in order to ensure whether the
cloud provider is meeting the future capacity requirement for his business or not.
The managers must manage the scaling capabilities in order to ensure services can
be scaled up or down as per the user need.
Monitor Audit Log Use
In order to identify errors in the system, managers must audit the logs on a regular
basis.
Solution Testing and Validation
When the cloud provider offers a solution, it is essential to test it in order to ensure
that it gives the correct result and it is error-free. This is necessary for a system to
be robust and reliable.
Resource Provinioning
In general, Provisioning means making something available, or “providing”.
The allocation of resources and services from a cloud provider to a customer is
known as resource provisioning in cloud computing, sometimes called cloud
provisioning. Resource provisioning is the process of choosing, deploying, and
managing software (like load balancers and database server management
systems) and hardware resources (including CPU, storage, and networks) to
assure application performance.
To effectively utilize the resources without going against SLA and achieving the
QoS requirements, Static Provisioning/Dynamic Provisioning and
Static/Dynamic Allocation of resources must be established based on the
application needs. Resource over and under-provisioning must be prevented.
Power usage is another significant restriction. Care should be taken to reduce
power consumption, dissipation, and VM placement. There should be techniques
to avoid excess power consumption.
Therefore, the ultimate objective of a cloud user is to rent resources at the lowest
possible cost, while the objective of a cloud service provider is to maximize
profit by effectively distributing resources.
We can provide a variety of processes, which include:
• Server Provisioning
• User Provisioning
• Network Provisioning
• Device Provisioning
• Internet Access Provisioning
1. Server provisioning: It is the process of giving a server in a network the
desired resources it will need to operate, which depends completely on the job
that particular server is doing. So it is important to gather information about a
server’s intended use before provisioning. As there are many servers categorized
according to their uses, Each of them has unique provisioning requirements, and
the choice of the server itself will be driven by the intended use. For example,
there are file servers, policy servers, mail servers, and application servers, just to
name a few. Server provisioning includes processes such as adjusting control
panels, installing operating systems and other software, or even replicating the
set-up of other servers. Generally, server provisioning is a process that constructs
a new machine, bringing it up to speed and defining the system’s desired state.
2. User Provisioning: User provisioning is identity management that monitors
authorization and authentication of privileges and rights in a business or
information technology infrastructure. This technology is involved in modifying,
disabling, creating, and deleting user accounts and profiles. In a business setup,
this is important as it automates administrative workforce activities, off-
boarding, and on-boarding activities.
3. Network Provisioning: Network provisioning is mainly concerned with
setting up a network in an information technology environment so that devices,
servers, and authorized users can gain access to it. Network provisioning is
becoming more widespread in corporations, and it focuses on limiting access to a
system to only specified users. The procedure begins when the network is first
set up and users are granted access to specific devices and servers. It is
paramount that security and connectivity are given priority in this provisioning
so as to safeguard identity and device management.
4. Device Provisioning: This technology is mostly used when you’re deploying
your IoT network. In this, a device is configured, secured, customized, and
certified, after which a user is allocated these devices. This enables improved
device management, flexibility, and device sharing.
5. Internet- access Provisioning: This simply means granting internet access to
individuals and devices on a network. There is a lot more as, although it may
appear straightforward, it necessitates the installation of firewalls, virus
protection, cyber security tools, and editing software, among other things.
Furthermore, everything will need to be correctly adjusted, which could take
some time. This is especially true for larger networks, which will necessitate a
higher level of protection.
• Scalability: Being able to actively scale up and down with flux in demand
for resources is one of the major points of cloud computing
• Speed: Users can quickly spin up multiple machines as per their usage
without the need for an IT Administrator
• Savings: Pay as you go model allows for enormous cost savings for users,
it is facilitated by provisioning or removing resources according to the
demand
Security Overview
Cloud security, is a collection of security measures designed to protect cloud-
based infrastructure, applications, and data. These measures ensure user and
device authentication, data and resource access control, and data privacy
protection.
• Identifying and assessing cloud services. First, you need to spend time
identifying which cloud products and services are being used in your organization,
and which ones might be considered in the future. Then, you’ll need to assess and
audit those items, analyzing their security and potential vulnerabilities.
• Encrypting data. In many cases, you’ll need to take extra efforts to prevent
data loss and preserve data integrity by encrypting your data and securing your
connections. It’s your responsibility to allow legitimate network traffic and block
suspicious traffic.
• Reporting. It’s also important to monitor cloud activity from a high level,
and report on that activity so you can better understand your risks and ongoing
operations.
Security Planning
Before deploying a particular resource to cloud, one should need to analyze several
aspects of the resource such as:
• Select resource that needs to move to the cloud and analyze its sensitivity to
risk.
• Consider cloud service models such as IaaS, PaaS, and SaaS. These models
require customer to be responsible for security at different levels of service.
• Consider the cloud type to be used such as public, private,
community or hybrid.
• Understand the cloud service provider's system about data storage and its
transfer into and out of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud
types.
Understanding Security of Cloud
Security Boundaries
• Access Control
• Auditing
• Authentication
• Authorization
All of the service models should incorporate security mechanism operating in all above-
mentioned areas.
Isolated Access to Data
Since data stored in cloud can be accessed from anywhere, we must have a mechanism to isolate
data and protect it from client’s direct access.
Brokered Cloud Storage Access is an approach for isolating storage in the cloud. In this
approach, two services are created:
• A broker with full access to storage but no access to client.
• A proxy with no access to storage but access to both client and broker.
Working Of Brokered Cloud Storage Access System
When the client issues request to access data:
• The client data request goes to the external service interface of proxy.
• The proxy forwards the request to the broker.
• The broker requests the data from cloud storage system.
• The cloud storage system returns the data to the broker.
• The broker returns the data to proxy.
• Finally the proxy sends the data to the client.
All of the above steps are shown in the following diagram:
Encryption
Encryption helps to protect data from being compromised. It protects data that is being
transferred as well as data stored in the cloud. Although encryption helps to protect data from
any unauthorized access, it does not prevent data loss.