SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
6. List and explain the functional requirements for
networking as per the ITU-T technical report. List and
explain cloud deployment models and list relative
strengths and weaknesses of the deployment models with
neat diagram.
The cloud architecture must meet several requirements to enable sustained innovation and
development of cloud services. With multiple stakeholders involved, the cloud architecture
must be flexible to fit the needs of infrastructure CSPs, CSPs and service resellers. The
following high-level requirements are broadly envisioned for the cloud architecture.
 Cloud deployments will have to support many standards within the same cloud
infrastructure, e.g. in terms of resource allocation, orchestration, or CSU access. The
cloud architecture must allow and support the evolution of these standards, without
requiring disruptive infrastructure changes from the CSP perspective.
 A cloud CSP must be able to support multiple standards within the same architecture
and migrate to a newer standard if they so wish, without having to change everything
in the CSP network or lose the existing customer base.
 Broadband access is fundamental in making cloud services viable. The cloud
architecture may benefit from integration with the support of network resource
reservation and guaranteed quality of service capabilities through the network over
which services are delivered. Without the network access guaranteeing bounded
delay, jitter, bandwidth, and reliability, the cloud experience for CSUs may be worse
than the intranet experience.
 The cloud architecture must enable multiple deployment models, cloud service
categories and use cases, some currently known and others to be envisioned in the
future. Currently known cloud service categories include IaaS, PaaS, SaaS, CaaS, and
NaaS, and it is possible that these will also co-exist in the same cloud deployment.
The same architecture must allow a cloud service provider to provide either all, or a
subset, of these services.
 For private and hybrid cloud operations, cloud services must appear like intranet
services. This means a user must be able to access resources using the same domain
names as on the intranet. Hosts and resources that have been migrated from private to
public clouds should be accessed transparently where they are being currently hosted.
 The cloud architecture must enable early detection, diagnosis and fixing of
infrastructure or service-related problems.
 CSUs must be able to (request) audit CSP‟s services and get assurance that the
agreedupon SLAs are being complied with. To that end, the cloud architecture must
enable, among others, service-level monitoring of resources allocated to a user and
generate SLA compliance reports.
 Cloud resource allocations should be invisible to the CSUs, even though services are
visible. A CSP may choose to expose service-operation details without having to
share cloud internal infrastructure allocation and provisioning details. This is
important for a CSP for security and business reasons.
 Users consuming cloud services must be able to control cloud resource access to the
CSP transparently, and enable IT procedures to work without compromise in legal or
organizational mandates. This includes, for instance, the ability to dynamically add or
remove a user from access to a cloud without CSP intervention.
 The cloud architecture must enable intranet-level security on the network. This may
include access records, activity reports, session monitoring, and packet inspections on
the network. It must also include firewalling, access control and malicious attack
detection and prevention. Prevention of one user disrupting others‟ services is
paramount.
 The cloud architecture must support cloud resource mobility which includes virtual
machine mobility within a POD or data centre, between PODs or data centres within
the same CSP‟s infrastructure, or between different CSPs‟ infrastructures, or from a
CSU to a CSP.
 Resource mobility depends upon being able to treat an entire network as a single
entity, which implies the need of the cloud architecture to scale. With a huge number
of computing, storage and network resources, and an even greater number of
virtualized resources, the cloud architecture must have scalability as a primary
requirement.
 Naming extensions are necessary to meet cloud needs. Users who move their private
resources into the cloud may need to access their resources by the same names as they
did prior to those resources being migrated. Since hosts are associated with user‟s
domain names, it is necessary to translate the user‟s domain names into cloud names.
 Cloud-service deployment needs to be automated in order to support scalable resource
operations, including configuration, provisioning, charging, etc. In a typical scenario,
a user would want to specify the computing, storage and virtual machine (VM)
resources needed, as well as the network resources. This includes how the network
resources should be reserved, configured and managed during lifetime for optimized
connectivity between the distributed computing, storage and VM resources, and
finally retired. [For more details about cloud resource management, refer to the FG
CC Cloud Resource Management Technical Report as well as the FG Cloud
Infrastructure Technical Report.
Deployment Models: [2nd
part of the question]
Deployment models define the type of access to the cloud, i.e., how the cloud is located?
Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.
Private Cloud Deployment Model:
A private cloud is an environment specifically dedicated to a single user within the user‟s
firewall. It grants access to only authorized users, giving companies more central control over
security factors and data. The data center can be either a co-location or even an on-premises
one. However, on-premise deployment is very similar to the “legacy IT” structure. This
deployment is usually single-tenant, which means the platform isn‟t shared. However, it can
have multiple tenants per department within the company. It also provides on-demand data
availability, securing reliability, and aid for mission-critical workloads. Governments and
scientific laboratories mostly incorporate a private cloud. Moreover, companies with precise
demands such as their data are confidential and sensitive or need secure and robust
efficiency; they should choose a private cloud model.
An enterprise typically deploys its applications and infrastructure to its data-center in a
private cloud-computing deployment model. If the right stack is designed, it can have many
cloud computing characteristics converting into a „private cloud‟. However, private cloud is
not a pay-as-you-go expense––you pay for the whole stack, used or not. Nevertheless, you
can opt for a record meter and display usage to user groups or various tenants. This payment
option is known as „chargeback‟. Although private cloud deployment doesn‟t provide many
benefits of cloud computing, having your private cloud means better control of sharing and
storing data. When it comes to data security, this deployment model is your best bet to
manage data governance, guarantee compliance with regulations, and safeguard precious
intellectual property.
Advantages of private cloud:
 The company is the exclusive owner with full control of its service integrations,
operations, regulations, and user practices.
 It supports legacy applications, which is not an option on a public cloud.
 Only authorized personnel are given access, which is ideal for protection of corporate
data with a privacy policy.
 Companies can customize their solution according to demands.
 It further enhances the quality of service given by the clients.
 It offers exceptional reliability in performance.
 It provides higher control over system configuration as per your company‟s
requirements.
Disadvantages of private cloud
 Under-utilization is a cost to your company, and not to your provider, affecting the
model‟s overall feasibility.
 Your company may need to invest in expensive hardware and software along with
trained human resources.
 Scalability depends on the choice of hardware.
 It‟s maintained in-house and demands high maintenance.
 A hosting-service provider may encounter limitations with storage capacity, which
can influence your requirements directly.
Public Cloud Deployment Model
The public cloud is an ideal deployment model for companies whose business demands quick
access without incurring massive setup costs upfront. It‟s open and available to all types and
sizes of businesses and is extremely beneficial due to its unique feature that securely transfers
data online. It‟s more cost-effective than the private cloud-deployment model since its
services are more commoditized. It has a pay-as-you-go setup with minimal investment to
start. Your company purchases virtualized-compute data storage and networking services
from a cloud-service provider in the public cloud. This cloud accelerates time-to-market,
scales promptly, and gets the agility to try out some latest services or applications swiftly.
There are various leading names such as Amazon Web Services, Google Cloud, Microsoft
Azure, Alibaba Cloud, and IBM that provide this service. So you have a variety of providers,
large and small, offering an a la carte of services.
This is a multi-tenant model with many clients sharing the same infrastructure like Amazon
EC2 Dedicated Hosts. Public cloud services are especially beneficial for workload in the
short term like for an event or initial phase for a start-up just as long as it requires. Public
cloud is ideally used by businesses that need services like on-demand scaling, social
networking, CRM, and storage.
Advantages of public cloud
 It‟s the most affordable model on the market with no location dependencies.
 You don‟t need infrastructure management with a dedicated in-house team to fully
use a public cloud.
 It offers greater vertical scalability through virtualization.
 It‟s very reliable, so there‟s no interruption in your services or scope of any failure.
 Services like SaaS, Paas, and Iaas can be readily accessed on the public cloud via all
internet-enabled devices.
Disadvantages of public cloud
 Shared resources sometimes lead to breakdowns in scalability and flexibility.
 It‟s not suitable for data-sensitive applications.
 Concerns around its security and privacy are serious. It attracts more targeted attacks
as it has no stringent data protocol.
 The public cloud has limited customization. Clients can select the operating system
and the VM size but cannot customize orders, reports, or networking.
Community Cloud Deployment Model
This model is shared among many companies/tenants operating within the same domain like
banking, government, education institutions, etc. Access to a community cloud is limited to
the members of that specific community. In other words, a group of several companies shares
a multi-tenant setup where they have some privacy, security, and performance limitations and
concerns. Businesses use this for joint ventures and research firms that require a centralized
cloud-computing system. For governments, it‟s known as Government Cloud and is
embraced by many countries. Due to legislative issues, a typical Government Cloud is the
answer to many country-specific judicial matters.
For example, according to Google„s recent announcement, it will develop security-and-app-
management tools for the Defence Innovation Unit of USA‟s Pentagon to eliminate the
challenges the Defense Department faces and run a multi-cloud environment in a community
cloud deployment model. Two Google Cloud product managers, Christopher Johnson and
Bhavna Batra, said, “Assured Workloads for Government helps its customers, suppliers, and
contractors. Additionally, the Department of Defense, the FBI‟s Criminal Justice Information
Services Division, and the Federal Risk and Authorization Management Program to meet the
extraordinary security and compliance standards set forth.” Community cloud is technically
no different than public cloud or private cloud. The difference lies in who holds the control
together with their set of users. It‟s as if a group of companies shared the cost of a building,
and several other firms with similar requirements for infrastructure and resources share this
environment. In this model, all active users share the cost. This multi-tenant data center helps
companies boost their efficiency and performance while also maintaining standard protocols
for privacy, security, management, implementation, and usage for projects like a centralized
cloud.
Advantages of community cloud
 It‟s more cost-effective than other cloud models. Multiple companies share the bill,
which lowers the individual cost.
 It offers scalability and flexibility to manage cloud computing needs.
 Configuration and protocols in community systems are designed to meet the
community‟s requirements to enhance efficiency.
 The availability and reliability of the community make it a go-to choice for
governments and universities
Disadvantages of community cloud
 The most common problem with this system is its lower bandwidth capacity with
limited storage.
 Its security standards are difficult to maintain without skilled IT staff.
 It increases the setup costs and incurs consistent maintenance costs.
 You can‟t get the complete benefits of either private or public cloud.
Hybrid Cloud Deployment Model
This consists of two or more cloud-deployment models. They‟re all unique, but they‟re bound
by specific, standard protocols. Very few companies can switch over all of their technology
stacks to the cloud in one go. For such companies, the hybrid cloud-deployment model
provides a smoother transition with a mix of on-premise and cloud options. NASA uses this
system. For example, Nebula- an open-source cloud-computing project, employs a private
cloud for research and development while using a public cloud to share datasets with external
partners and other people. Hybrid cloud models are used for cloud bursting. Say the client
runs their application mainly in a private cloud. But if the system is experiencing a spike,
sudden surge, or heavy load, it can „burst‟ into the public cloud to ease the load. This hybrid
cloud combination of public and private cloud environments allows sharing of applications. It
helps companies seamlessly scale services within their cloud infrastructure whenever
required. This model safeguards and strategically controls your company‟s essential assets.
It‟s such a cost-effective and resource-positive approach that more companies should adopt it.
Its infrastructure strategy facilitates application and data portability greatly and enables
companies to mix and match options that best suit their requirements. As the private cloud-
deployment model might not be optimal for all workloads, this model meets all requirements
of even the larger organizations. It borrows significant advantages of both public and private
cloud although some companies find their needs met via either one model and embrace the
benefits to going “all in”.
Advantages of hybrid cloud
 It reduces operational costs and gives companies the freedom to combine cloud
models for workflows.
 Thanks to its segmented storage, the security protocols are simpler. So it becomes
easy to shield the cloud from attackers.
 It gives robust setup flexibility, so that customers can customize their solutions to fit
their requirements.
 It‟s scalable due to its mix-and-match combination to operate and manage the
workloads.
Disadvantages of hybrid cloud
 It‟s a somewhat complex setup to manage as you combine two or more separate cloud
models.
 It makes sense only if your company has varied use or demand for managing the
workloads.
 It‟s noticed that there can be infrastructure dependency on this model.
 There are possibilities of a security violation by public cloud back-door.

Más contenido relacionado

La actualidad más candente

Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...3camp
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud StrategyAmit Gatenyo
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computingvncson
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10Rugby7277
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactivejerianasmith
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHappiest Minds Technologies
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 

La actualidad más candente (20)

Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computing
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
CSA & GRC Stack
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service Management
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 

Similar a ITU-T requirement for cloud and cloud deployment model

SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesEswar Publications
 
Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...IEEEGLOBALSOFTTECHNOLOGIES
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To CloudPeak 10
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxSURBHI SAROHA
 
oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373Prithvi Rajkumar
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 

Similar a ITU-T requirement for cloud and cloud deployment model (20)

SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud management
Cloud managementCloud management
Cloud management
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Introducing cloud computing
Introducing cloud computingIntroducing cloud computing
Introducing cloud computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment Services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 
cloud computing
cloud computing cloud computing
cloud computing
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To Cloud
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 

Más de Hitesh Mohapatra

Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingHitesh Mohapatra
 
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningAutomating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningHitesh Mohapatra
 
Harnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and ApplicationsHarnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and ApplicationsHitesh Mohapatra
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud ComputingHitesh Mohapatra
 
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptxHitesh Mohapatra
 
Reviewing basic concepts of relational database
Reviewing basic concepts of relational databaseReviewing basic concepts of relational database
Reviewing basic concepts of relational databaseHitesh Mohapatra
 
Advanced database protocols
Advanced database protocolsAdvanced database protocols
Advanced database protocolsHitesh Mohapatra
 
Involvement of WSN in Smart Cities
Involvement of WSN in Smart CitiesInvolvement of WSN in Smart Cities
Involvement of WSN in Smart CitiesHitesh Mohapatra
 
Data Structure and its Fundamentals
Data Structure and its FundamentalsData Structure and its Fundamentals
Data Structure and its FundamentalsHitesh Mohapatra
 
WORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDINGWORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDINGHitesh Mohapatra
 
Basic commands for powershell : Configuring Windows PowerShell and working wi...
Basic commands for powershell : Configuring Windows PowerShell and working wi...Basic commands for powershell : Configuring Windows PowerShell and working wi...
Basic commands for powershell : Configuring Windows PowerShell and working wi...Hitesh Mohapatra
 
WINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISE
WINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISEWINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISE
WINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISEHitesh Mohapatra
 

Más de Hitesh Mohapatra (20)

Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningAutomating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
 
Harnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and ApplicationsHarnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and Applications
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud Computing
 
Cloud-Case study
Cloud-Case study Cloud-Case study
Cloud-Case study
 
RAID
RAIDRAID
RAID
 
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptx
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Leetcode Problem Solution
Leetcode Problem SolutionLeetcode Problem Solution
Leetcode Problem Solution
 
Leetcode Problem Solution
Leetcode Problem SolutionLeetcode Problem Solution
Leetcode Problem Solution
 
Trie Data Structure
Trie Data Structure Trie Data Structure
Trie Data Structure
 
Reviewing basic concepts of relational database
Reviewing basic concepts of relational databaseReviewing basic concepts of relational database
Reviewing basic concepts of relational database
 
Reviewing SQL Concepts
Reviewing SQL ConceptsReviewing SQL Concepts
Reviewing SQL Concepts
 
Advanced database protocols
Advanced database protocolsAdvanced database protocols
Advanced database protocols
 
Measures of query cost
Measures of query costMeasures of query cost
Measures of query cost
 
Involvement of WSN in Smart Cities
Involvement of WSN in Smart CitiesInvolvement of WSN in Smart Cities
Involvement of WSN in Smart Cities
 
Data Structure and its Fundamentals
Data Structure and its FundamentalsData Structure and its Fundamentals
Data Structure and its Fundamentals
 
WORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDINGWORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDING
 
Basic commands for powershell : Configuring Windows PowerShell and working wi...
Basic commands for powershell : Configuring Windows PowerShell and working wi...Basic commands for powershell : Configuring Windows PowerShell and working wi...
Basic commands for powershell : Configuring Windows PowerShell and working wi...
 
WINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISE
WINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISEWINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISE
WINDOWS ADMINISTRATION AND WORKING WITH OBJECTS : PowerShell ISE
 

Último

nvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxnvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxjasonsedano2
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxKISHAN KUMAR
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecTrupti Shiralkar, CISSP
 
Design Analysis of Alogorithm 1 ppt 2024.pptx
Design Analysis of Alogorithm 1 ppt 2024.pptxDesign Analysis of Alogorithm 1 ppt 2024.pptx
Design Analysis of Alogorithm 1 ppt 2024.pptxrajesshs31r
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...soginsider
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Bahzad5
 
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.pptOracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.pptDheerajKashnyal
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxSAJITHABANUS
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS Bahzad5
 
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptxVertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptxLMW Machine Tool Division
 
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfRenewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfodunowoeminence2019
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptxSaiGouthamSunkara
 
Tachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and ApplicationsTachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and ApplicationsEpec Engineered Technologies
 
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide LaboratoryBahzad5
 
Technical Management of cement industry.pdf
Technical Management of cement industry.pdfTechnical Management of cement industry.pdf
Technical Management of cement industry.pdfMadan Karki
 
CSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptxCSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptxssusera0771e
 

Último (20)

nvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxnvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptx
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptx
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
Design Analysis of Alogorithm 1 ppt 2024.pptx
Design Analysis of Alogorithm 1 ppt 2024.pptxDesign Analysis of Alogorithm 1 ppt 2024.pptx
Design Analysis of Alogorithm 1 ppt 2024.pptx
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)
 
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.pptOracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
 
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptxVertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
 
Lecture 2 .pptx
Lecture 2                            .pptxLecture 2                            .pptx
Lecture 2 .pptx
 
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfRenewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptx
 
Tachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and ApplicationsTachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and Applications
 
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
 
Technical Management of cement industry.pdf
Technical Management of cement industry.pdfTechnical Management of cement industry.pdf
Technical Management of cement industry.pdf
 
計劃趕得上變化
計劃趕得上變化計劃趕得上變化
計劃趕得上變化
 
CSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptxCSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptx
 

ITU-T requirement for cloud and cloud deployment model

  • 1. 6. List and explain the functional requirements for networking as per the ITU-T technical report. List and explain cloud deployment models and list relative strengths and weaknesses of the deployment models with neat diagram. The cloud architecture must meet several requirements to enable sustained innovation and development of cloud services. With multiple stakeholders involved, the cloud architecture must be flexible to fit the needs of infrastructure CSPs, CSPs and service resellers. The following high-level requirements are broadly envisioned for the cloud architecture.  Cloud deployments will have to support many standards within the same cloud infrastructure, e.g. in terms of resource allocation, orchestration, or CSU access. The cloud architecture must allow and support the evolution of these standards, without requiring disruptive infrastructure changes from the CSP perspective.  A cloud CSP must be able to support multiple standards within the same architecture and migrate to a newer standard if they so wish, without having to change everything in the CSP network or lose the existing customer base.  Broadband access is fundamental in making cloud services viable. The cloud architecture may benefit from integration with the support of network resource reservation and guaranteed quality of service capabilities through the network over which services are delivered. Without the network access guaranteeing bounded delay, jitter, bandwidth, and reliability, the cloud experience for CSUs may be worse than the intranet experience.  The cloud architecture must enable multiple deployment models, cloud service categories and use cases, some currently known and others to be envisioned in the future. Currently known cloud service categories include IaaS, PaaS, SaaS, CaaS, and NaaS, and it is possible that these will also co-exist in the same cloud deployment. The same architecture must allow a cloud service provider to provide either all, or a subset, of these services.  For private and hybrid cloud operations, cloud services must appear like intranet services. This means a user must be able to access resources using the same domain names as on the intranet. Hosts and resources that have been migrated from private to public clouds should be accessed transparently where they are being currently hosted.  The cloud architecture must enable early detection, diagnosis and fixing of infrastructure or service-related problems.  CSUs must be able to (request) audit CSP‟s services and get assurance that the agreedupon SLAs are being complied with. To that end, the cloud architecture must enable, among others, service-level monitoring of resources allocated to a user and generate SLA compliance reports.
  • 2.  Cloud resource allocations should be invisible to the CSUs, even though services are visible. A CSP may choose to expose service-operation details without having to share cloud internal infrastructure allocation and provisioning details. This is important for a CSP for security and business reasons.  Users consuming cloud services must be able to control cloud resource access to the CSP transparently, and enable IT procedures to work without compromise in legal or organizational mandates. This includes, for instance, the ability to dynamically add or remove a user from access to a cloud without CSP intervention.  The cloud architecture must enable intranet-level security on the network. This may include access records, activity reports, session monitoring, and packet inspections on the network. It must also include firewalling, access control and malicious attack detection and prevention. Prevention of one user disrupting others‟ services is paramount.  The cloud architecture must support cloud resource mobility which includes virtual machine mobility within a POD or data centre, between PODs or data centres within the same CSP‟s infrastructure, or between different CSPs‟ infrastructures, or from a CSU to a CSP.  Resource mobility depends upon being able to treat an entire network as a single entity, which implies the need of the cloud architecture to scale. With a huge number of computing, storage and network resources, and an even greater number of virtualized resources, the cloud architecture must have scalability as a primary requirement.  Naming extensions are necessary to meet cloud needs. Users who move their private resources into the cloud may need to access their resources by the same names as they did prior to those resources being migrated. Since hosts are associated with user‟s domain names, it is necessary to translate the user‟s domain names into cloud names.  Cloud-service deployment needs to be automated in order to support scalable resource operations, including configuration, provisioning, charging, etc. In a typical scenario, a user would want to specify the computing, storage and virtual machine (VM) resources needed, as well as the network resources. This includes how the network resources should be reserved, configured and managed during lifetime for optimized connectivity between the distributed computing, storage and VM resources, and finally retired. [For more details about cloud resource management, refer to the FG CC Cloud Resource Management Technical Report as well as the FG Cloud Infrastructure Technical Report. Deployment Models: [2nd part of the question] Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.
  • 3. Private Cloud Deployment Model: A private cloud is an environment specifically dedicated to a single user within the user‟s firewall. It grants access to only authorized users, giving companies more central control over security factors and data. The data center can be either a co-location or even an on-premises one. However, on-premise deployment is very similar to the “legacy IT” structure. This deployment is usually single-tenant, which means the platform isn‟t shared. However, it can have multiple tenants per department within the company. It also provides on-demand data availability, securing reliability, and aid for mission-critical workloads. Governments and scientific laboratories mostly incorporate a private cloud. Moreover, companies with precise demands such as their data are confidential and sensitive or need secure and robust efficiency; they should choose a private cloud model. An enterprise typically deploys its applications and infrastructure to its data-center in a private cloud-computing deployment model. If the right stack is designed, it can have many cloud computing characteristics converting into a „private cloud‟. However, private cloud is not a pay-as-you-go expense––you pay for the whole stack, used or not. Nevertheless, you
  • 4. can opt for a record meter and display usage to user groups or various tenants. This payment option is known as „chargeback‟. Although private cloud deployment doesn‟t provide many benefits of cloud computing, having your private cloud means better control of sharing and storing data. When it comes to data security, this deployment model is your best bet to manage data governance, guarantee compliance with regulations, and safeguard precious intellectual property. Advantages of private cloud:  The company is the exclusive owner with full control of its service integrations, operations, regulations, and user practices.  It supports legacy applications, which is not an option on a public cloud.  Only authorized personnel are given access, which is ideal for protection of corporate data with a privacy policy.  Companies can customize their solution according to demands.  It further enhances the quality of service given by the clients.  It offers exceptional reliability in performance.  It provides higher control over system configuration as per your company‟s requirements. Disadvantages of private cloud  Under-utilization is a cost to your company, and not to your provider, affecting the model‟s overall feasibility.  Your company may need to invest in expensive hardware and software along with trained human resources.  Scalability depends on the choice of hardware.  It‟s maintained in-house and demands high maintenance.  A hosting-service provider may encounter limitations with storage capacity, which can influence your requirements directly. Public Cloud Deployment Model The public cloud is an ideal deployment model for companies whose business demands quick access without incurring massive setup costs upfront. It‟s open and available to all types and sizes of businesses and is extremely beneficial due to its unique feature that securely transfers data online. It‟s more cost-effective than the private cloud-deployment model since its services are more commoditized. It has a pay-as-you-go setup with minimal investment to start. Your company purchases virtualized-compute data storage and networking services from a cloud-service provider in the public cloud. This cloud accelerates time-to-market, scales promptly, and gets the agility to try out some latest services or applications swiftly. There are various leading names such as Amazon Web Services, Google Cloud, Microsoft
  • 5. Azure, Alibaba Cloud, and IBM that provide this service. So you have a variety of providers, large and small, offering an a la carte of services. This is a multi-tenant model with many clients sharing the same infrastructure like Amazon EC2 Dedicated Hosts. Public cloud services are especially beneficial for workload in the short term like for an event or initial phase for a start-up just as long as it requires. Public cloud is ideally used by businesses that need services like on-demand scaling, social networking, CRM, and storage. Advantages of public cloud  It‟s the most affordable model on the market with no location dependencies.  You don‟t need infrastructure management with a dedicated in-house team to fully use a public cloud.  It offers greater vertical scalability through virtualization.  It‟s very reliable, so there‟s no interruption in your services or scope of any failure.  Services like SaaS, Paas, and Iaas can be readily accessed on the public cloud via all internet-enabled devices. Disadvantages of public cloud  Shared resources sometimes lead to breakdowns in scalability and flexibility.  It‟s not suitable for data-sensitive applications.  Concerns around its security and privacy are serious. It attracts more targeted attacks as it has no stringent data protocol.  The public cloud has limited customization. Clients can select the operating system and the VM size but cannot customize orders, reports, or networking.
  • 6. Community Cloud Deployment Model This model is shared among many companies/tenants operating within the same domain like banking, government, education institutions, etc. Access to a community cloud is limited to the members of that specific community. In other words, a group of several companies shares a multi-tenant setup where they have some privacy, security, and performance limitations and concerns. Businesses use this for joint ventures and research firms that require a centralized cloud-computing system. For governments, it‟s known as Government Cloud and is embraced by many countries. Due to legislative issues, a typical Government Cloud is the answer to many country-specific judicial matters. For example, according to Google„s recent announcement, it will develop security-and-app- management tools for the Defence Innovation Unit of USA‟s Pentagon to eliminate the challenges the Defense Department faces and run a multi-cloud environment in a community cloud deployment model. Two Google Cloud product managers, Christopher Johnson and Bhavna Batra, said, “Assured Workloads for Government helps its customers, suppliers, and contractors. Additionally, the Department of Defense, the FBI‟s Criminal Justice Information Services Division, and the Federal Risk and Authorization Management Program to meet the extraordinary security and compliance standards set forth.” Community cloud is technically no different than public cloud or private cloud. The difference lies in who holds the control together with their set of users. It‟s as if a group of companies shared the cost of a building, and several other firms with similar requirements for infrastructure and resources share this environment. In this model, all active users share the cost. This multi-tenant data center helps companies boost their efficiency and performance while also maintaining standard protocols for privacy, security, management, implementation, and usage for projects like a centralized cloud. Advantages of community cloud
  • 7.  It‟s more cost-effective than other cloud models. Multiple companies share the bill, which lowers the individual cost.  It offers scalability and flexibility to manage cloud computing needs.  Configuration and protocols in community systems are designed to meet the community‟s requirements to enhance efficiency.  The availability and reliability of the community make it a go-to choice for governments and universities Disadvantages of community cloud  The most common problem with this system is its lower bandwidth capacity with limited storage.  Its security standards are difficult to maintain without skilled IT staff.  It increases the setup costs and incurs consistent maintenance costs.  You can‟t get the complete benefits of either private or public cloud. Hybrid Cloud Deployment Model This consists of two or more cloud-deployment models. They‟re all unique, but they‟re bound by specific, standard protocols. Very few companies can switch over all of their technology stacks to the cloud in one go. For such companies, the hybrid cloud-deployment model provides a smoother transition with a mix of on-premise and cloud options. NASA uses this system. For example, Nebula- an open-source cloud-computing project, employs a private cloud for research and development while using a public cloud to share datasets with external partners and other people. Hybrid cloud models are used for cloud bursting. Say the client runs their application mainly in a private cloud. But if the system is experiencing a spike, sudden surge, or heavy load, it can „burst‟ into the public cloud to ease the load. This hybrid cloud combination of public and private cloud environments allows sharing of applications. It helps companies seamlessly scale services within their cloud infrastructure whenever
  • 8. required. This model safeguards and strategically controls your company‟s essential assets. It‟s such a cost-effective and resource-positive approach that more companies should adopt it. Its infrastructure strategy facilitates application and data portability greatly and enables companies to mix and match options that best suit their requirements. As the private cloud- deployment model might not be optimal for all workloads, this model meets all requirements of even the larger organizations. It borrows significant advantages of both public and private cloud although some companies find their needs met via either one model and embrace the benefits to going “all in”. Advantages of hybrid cloud  It reduces operational costs and gives companies the freedom to combine cloud models for workflows.  Thanks to its segmented storage, the security protocols are simpler. So it becomes easy to shield the cloud from attackers.  It gives robust setup flexibility, so that customers can customize their solutions to fit their requirements.  It‟s scalable due to its mix-and-match combination to operate and manage the workloads. Disadvantages of hybrid cloud  It‟s a somewhat complex setup to manage as you combine two or more separate cloud models.  It makes sense only if your company has varied use or demand for managing the workloads.  It‟s noticed that there can be infrastructure dependency on this model.  There are possibilities of a security violation by public cloud back-door.