Unit 1-Cloud Computing
Unit 1-Cloud Computing
Cloud Computing means storing and accessing the data and programs
on remote servers that are hosted on the internet instead of the
computer’s hard drive or local server. Cloud computing is also referred
to as Internet-based computing, and it is a technology where the
resource is provided as a service through the Internet to the user. The
data that is stored can be files, images, documents, or any other storable
document.
The following are some of the Operations that can be performed with
Cloud Computing
• Storage, backup, and recovery of data
• Delivery of software on demand
• Development of new applications and services
• Streaming videos and audio
In cloud computing, frontend stages include the client infrastructure, for example,
user interfaces, client-side applications, and the devices or networks accessed by
the public over the public network. This includes applications like web browsers
Google Chrome, Safari, and Internet Explorer. For example, utilizing a web
browser on a cell phone, computer, or laptop to edit a Microsoft Word document
or PDF document involves these front-end components. The gadgets, apps, and
services all live on the backend. The backend is responsible for managing all the
programs that power the front end applications. The backend implies the
foundational parts of the actual cloud like computing resources, storage, services,
security mechanisms, management tools, and more.
Storage services are used to store and manage data in the cloud architecture. The
data stored in the cloud can be accessed by multiple people at the same time.
Cloud service providers offer scalable storage choices like hard drives, solid-state
drives, or persistent disks, intended to manage huge volumes of data efficiently.
Popular cloud storage options include Amazon Simple Storage Service (S3),
Microsoft Azure Blob Storage, and Google Cloud Platform (GCP).
Another component of the backend design is the infrastructure. Included in this
is the hardware that is vital for the operation of the system, such as central
processing units, graphics processing units, network interface cards, and other
components needed to power cloud services. It additionally incorporates the
necessary software to manage and operate these components
Security efforts are important in cloud computing adoption, enveloping tools and
features to protect data, applications, and platforms. Security carries out various
safety efforts in the back end to secure cloud systems, applications, IP addresses,
files, infrastructure, and services. These actions include data security planning,
network security provisions, regular backups, debugging, and virtual firewall
implementations to prevent data loss and downtime, and guarantee redundancy
Cloud computing can either be classified based on the deployment model or the
type of service. Based on the specific deployment model, we can classify cloud
as public, private, and hybrid cloud. At the same time, it can be classified as
infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-
a-service (SaaS) based on the service the cloud model offers.
Service Models
Deployment Models
Private cloud hosting’s are systems that use cloud computing services from a
dedicated infrastructure that is accessible only by a single customer or
organization. The infrastructure can be hosted on-premises or off-premises by a
third-party provider. These systems offer more control, security, and
customization than public cloud-based hosting.
However, they may also require more investment, maintenance, and expertise
than public cloud-based platforms. Some examples of private cloud platforms are
VMware vSphere, Red Hat OpenStack, and Oracle Cloud Infrastructure.
Public cloud-based computings are systems that use cloud computing services
from a third-party provider over the public internet. The provider owns and
manages the infrastructure and offers shared resources to multiple customers.
Public cloud hostings are typically easy to use, cost-effective, and scalable.
However, they may have less control, security, and customization than other
types of cloud-enabled systems. Some examples of public cloud providers are
Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure,
and IBM Cloud.
Cloud computing can be beneficial to your business for the following reasons:
• Scalable data storage
• Easier and less expensive maintenance cost
• Eliminates disaster recovery concerns
• Better security
• Fewer compliance concerns
• Business continuity is guaranteed
• Less IT staff needed in-house
• Reduced costs
• Rapid cross-border expansion of business
• On-demand access to additional resources for rapid scaling
Cloud computing offers many benefits for businesses and organizations that want
to leverage the latest technologies and innovations quickly and efficiently. Some
of the benefits of cloud-based systems are:
Scalability
These systems allow customers to choose from a variety of services and features
that suit their requirements and preferences. Customers can also customize their
applications and environments according to their business goals and strategies.
Cost-efficiency
Cloud computing services allow customers to pay only for what they use and
avoid upfront capital expenses. Customers can also save on operational costs such
as maintenance, power, cooling, and security.
Security
Innovation
These systems provide customers with access to the most advanced technologies
and innovations such as artificial intelligence (AI), machine learning (ML), big
data analytics, the internet of things (IoT), blockchain, serverless computing, and
more. Customers can also benefit from the continuous updates and improvements
offered by the cloud providers.
Despite the many benefits of cloud based systems, there are also some challenges
that customers may face when adopting or using them. Some of the challenges of
cloud hosting are:
Compatibility
Performance
Due to network latency or congestion, they may not guarantee consistent
performance across different regions or zones. Customers may need to optimize
their applications or data for better performance in the cloud environment.
Usability
These systems may not be easy to use or understand for some customers who lack
the necessary skills or knowledge. Customers may need to learn new tools or
processes to use cloud services effectively and efficiently.
Maintenance
Cloud-based systems may not be fully reliable or available at all times due to
technical issues or outages. Customers may need to monitor and troubleshoot
their cloud services and applications regularly and have contingency plans in case
of failures.
Security
Cloud-based computing may not be fully secure or compliant with some industry
or government regulations that customers have to follow. Customers may need to
implement additional security measures or policies to ensure data confidentiality,
integrity, and availability in the cloud environment.
Infrastructure Cost
Data transfer is mainly concerned with the cost of moving data between cloud
resources, or from an on-premises framework to cloud infrastructure. The amount
of data that is transferred will impact the cost, as well as the distance of the
transfer and the type of cloud service or cloud provider that is being used.
Cloud service providers typically offer different pricing options for data transfer
services. For example, a provider may charge for transfers across multiple regions
or between cloud providers while offering free/discounted data transfer fees
within certain zones.
Storage Cost
Licensing Cost
Licensing costs may include any software licenses used in the cloud environment.
This is a piece that can be overlooked because businesses tend to focus more on
the upfront costs of moving to the cloud and less at the pieces necessary to maintain
the environment. Certain cloud services providers empower customers to bring
their own software licenses into the cloud. However, before doing so, IT teams
would need to run an analysis to understand their:
• Licensing terms
• Costs for running the licensed software on cloud infrastructure
This evaluation is helpful in determining if it’s more cost-effective to use existing
licenses or transition to cloud-native alternatives.
Cloud cost analysis is essential for businesses today since it greatly impacts the
bottom line. Understanding and minimizing cloud expenses is critical for
financial efficiency and strategic decision-making as businesses progressively
transfer their activities to the cloud. Businesses can gain significant insights into
their cloud spending patterns by doing a complete cloud cost analysis, allowing
them to discover overspending areas, optimize resource utilization, and
eventually lower overall costs.
1. Cost Savings:
One of the primary benefits of cloud scalability is that it can help you reduce
costs. By only paying for the resources you need, you can avoid overspending on
unnecessary hardware or infrastructure. Additionally, cloud scalability allows
you to optimize your resources, which can help you save money on maintenance
and energy costs.
2. Improved Performance:
Cloud scalability allows you to scale up or down resources in real time, which
means you can respond quickly to changing computing power or bandwidth
demands. This can help you avoid bottlenecks and ensure that your applications
and services are always performing at their best.
3. Flexibility and Agility:
5. Enhanced Security:
Cloud Security
Cloud security is the whole bundle of technology, protocols, and best practices
that protect cloud computing environments, applications running in the cloud,
and data held in the cloud. Securing cloud services begins with understanding
what exactly is being secured, as well as, the system aspects that must be
managed.
The full scope of cloud security is designed to protect the following, regardless
of your responsibilities:
• Physical networks — routers, electrical power, cabling, climate controls,
etc.
• Data storage — hard drives, etc.
• Data servers — core network computing hardware and software
• Computer virtualization frameworks — virtual machine software, host
machines, and guest machines
• Operating systems (OS) — software that houses
• Middleware — application programming interface (API) management,
• Runtime environments — execution and upkeep of a running program
• Data — all the information stored, modified, and accessed
• Applications — traditional software services (email, tax software,
productivity suites, etc.)
• End-user hardware — computers, mobile devices, IOT etc.
Cloud data security is the practice of protecting data and other digital information
assets from security threats, human error, and insider threats. It leverages
technology, policies, and processes to keep your data confidential and still
accessible to those who need it in cloud-based environments.
In the 1990s, business and personal data lived locally — and security was local
as well. Data would be located on a PC’s internal storage at home, and on
enterprise servers, if you worked for a company.
Introducing cloud technology has forced everyone to reevaluate cyber security.
Your data and applications might be floating between local and remote systems
— and always internet-accessible. If you are accessing Google Docs on your
smartphone, or using Salesforce software to look after your customers, that data
could be held anywhere. Therefore, protecting it becomes more difficult than
when it was just a question of stopping unwanted users from gaining access to
your network. Cloud security requires adjusting some previous IT practices, but
it has become more essential for two key reasons:
1. Convenience over security. Cloud computing is exponentially growing as
a primary method for both workplace and individual use. Innovation has
allowed new technology to be implemented quicker than industry security
standards can keep up, putting more responsibility on users and providers
to consider the risks of accessibility.
2. Centralization and multi-tenant storage. Every component — from core
infrastructure to small data like emails and documents — can now be
located and accessed remotely on 24/7 web-based connections. All this
data gathering in the servers of a few major service providers can be highly
dangerous. Threat actors can now target large multi-organizational data
centers and cause immense data breaches?
Cloud Compliance
A Cloud Governance Framework is like a set of rules and best practices that
help organizations manage their cloud services effectively. It ensures that cloud
usage is secure, cost-efficient, and aligned with business goals.
Think of it as a traffic system for the cloud—just like traffic rules keep roads
safe and organized, a cloud governance framework keeps cloud operations under
control.
Key Elements of a Cloud Governance Framework
1. Security & Compliance – Ensuring that data is protected and follows
legal regulations (e.g., GDPR, HIPAA).
The General Data Protection Regulation (GDPR) is a legal framework that sets
guidelines for the collection and processing of personal information from
individuals who live in and outside of the European Union (EU).
HIPAA stands for Health Insurance Portability and Accountability Act. It's a
federal law in the United States that protects the security and confidentiality of
health information .HIPAA also gives patients more control over their health
information.