SlideShare una empresa de Scribd logo
1 de 38
Cloud Computing Defined



  Convenient, on-demand network access to a shared pool of
  configurable computing resources
  (e.g., networks, servers, storage, applications, and services) that
  can be rapidly provisioned and released with minimal
  management effort or service provider interaction
Essential Characteristics



   •   On-demand Self-service
   •   Broad Network Access
   •   Resource Pooling
   •   Rapid Elasticity
   •   Measured Service
On-demand Self-service



  • Unilaterally provision computing resources, as needed
  • Does not requiring human interaction with service provider.
Broad Network Access



  • Capabilities are available over the network and accessed
    through standard mechanisms (e.g., mobile phones, tablets,
    laptops, and workstations).
Resource Pooling



  • Provider’s computing resources are pooled with different
    physical and virtual resources dynamically assigned and
    reassigned according to consumer demand.
  • Location independence in that the consumer generally has no
    control or knowledge over the exact location of the provided
    resources, but may be able to specify location at a higher level
    of abstraction (e.g., country, state, or datacenter).
Rapid Elasticity



   • Capabilities can be elastically provisioned and released, in
     some cases automatically, to scale rapidly outward and inward
     commensurate with demand.
   • The capabilities available for provisioning appear to be
     unlimited and can be provisioned in any quantity at any time.
Measured Service



  • Pay-per-use model appropriate to the type of resource or
    service (e.g., storage, processing, bandwidth, and active user
    accounts).
  • Usage can be monitored, controlled, and reported, providing
    transparency for both the provider and consumer of the
    utilized service.
Deployment Models



  • Private Cloud
  • Public Cloud
  • Hybrid Cloud
Private Cloud



  • Provisioned for exclusive use by a single organization
  • May be owned, managed, and operated by the organization, a
    third party, or some combination of them
  • May exist on or off premises
Public Cloud



  • Provisioned for open use by the general public
  • Owned, managed, and operated by a business, academic, or
    government organization, or some combination of them
  • Exists on the premises of the cloud provider
Hybrid Cloud



  • Combination of Public and Private clouds
  • Remain unique entities, but are bound together by
    standardized or proprietary technology
  • Enables data and application portability
Service Models



  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
Infrastructure as a Service



   • Allows the consumer to deploy and run off-the-shelf software
     just like they would on their own IT infrastructure.
   • Provides on-demand provisioning of computing resources
     allowing a company to pay for only as much capacity as is
     needed, and bring more online as soon as required.
   • Consumer does not manage or control the underlying cloud
     infrastructure but has control over operating systems, storage,
     deployed applications, and select networking components
     (e.g., host firewalls).
   • Amazon Web Services, Rackspace Cloud Servers
Platform as a Service



   • A set of software and product development tools hosted on
     the provider's infrastructure that developers use to create
     applications over the Internet.
   • The consumer of the service does not manage or control the
     underlying cloud infrastructure, but has control over the
     deployed applications and application hosting environment
     configurations.
   • Used by consumers who develop their own software and
     desire a common off-the-shelf development and runtime
     platform.
   • Microsoft Azure, Google App Engine
Software as a Service



   • Consumer uses a provider’s applications running on a cloud
     infrastructure from through a thin client interface such as a
     web browser.
   • Consumer does not manage or control the underlying cloud
     infrastructure.
   • Consumer pays a fee for use of the application.
   • Hotmail.com, Google Apps
Benefits



  •   Economic Benefits
  •   Better Agility
  •   Greater Accessibility
  •   Improved Reliability
  •   Superior Security
Economic Benefits



  • Instead of using capital budget to purchase machines, storage, and
    networking equipment, companies can expense the monthly costs
    of only the resources that they actually need and use.
  • Cloud computing provides access to almost unlimited processing
    power and storage. Companies can provision large data servers for
    online historical databases, but only pay for the actual storage that
    they are using.
  • Companies do not have to purchase redundant hardware and
    software licenses, or set-up disaster recovery sites that they pay for
    and may never use. Instead they can provision new resources on
    demand when and if they need them. Add in the costs that a
    company would otherwise incur to manage an IT infrastructure and
    the savings of moving to a cloud infrastructure can be huge.
Better Agility



   • Building an IT infrastructure is usually a long term
     commitment and can take months to
     purchase, install, configure, and test. Equivalent cloud
     resources can be running in as little as a few minutes, and on-
     demand allows for trial-and-error. If some resource doesn't
     fit, simply stop, and start a new one that seems more
     appropriate.
   • Projects that involve significant cost, resources, and long
     timelines include significant risk of project failure. Projects
     that can be completed in a few hours with little or no financial
     and resource commitments include much less risk.
   • The faster a business can change, the faster a business can
     react to changing requirements. Cloud resources can
     immediately be scaled up or down to match.
Greater Accessibility



   • Most companies have a single Internet provider. If that
     provider experiences an outage, then any users who need
     remote access applications are out of luck. Cloud computing
     providers have multiple, redundant internet connections. As
     long as a user has Internet access, then they have access to
     their applications.
Improved Reliability



   • Redundancy and disaster recovery capabilities are built into
     cloud computing environments and on-demand resource
     capacity can be used for better resilience when facing
     increased service demands or distributed denial of service
     attacks, and for quicker recovery from serious incidents.
   • The backup and recovery policies and procedures of a cloud
     service may be superior to those of the organization and, if
     copies are maintained in diverse geographic locations, may be
     more robust.
   • Data maintained within a cloud can be more available, faster
     to restore, and more reliable in many circumstances than that
     maintained in a traditional data center.
Superior Security



   • Cloud providers have dedicated staff that specialize in
     security, privacy, and other areas of high interest and concern
     to the organization.
   • Increases in the scale of computing induce specialization,
     which in turn allows security staff to shed other duties and
     concentrate exclusively on security issues.
   • The structure of cloud computing platforms is typically more
     uniform than that of most traditional computing centers.
     Greater uniformity and homogeneity facilitate platform
     hardening and enable better automation of security
     management activities like configuration control, vulnerability
     testing, security audits, and security patching of platform
     components.
Challenges



  •   System Complexity
  •   Data Protection
  •   Availability
  •   Internet-facing Services
  •   Multi-Tenancy
  •   Loss of Control
  •   Botnets and other threats
System Complexity



  • A public cloud computing environment is extremely complex
    compared with that of a traditional data center.
  • Security depends not only on the correctness and
    effectiveness of many components, but also on the
    interactions among them.
  • The number of possible interactions between components
    pushes the level of complexity upward.
  • Complexity typically relates inversely to security, with greater
    complexity giving rise to vulnerabilities.
Data Protection



  • Data stored in the cloud typically resides in a shared
    environment collocated with data from other customers.
  • Organizations moving sensitive and regulated data into the
    cloud, therefore, must account for the means by which access
    to the data is controlled and the data is kept secure.
Availability



   • In simple terms, availability is the extent to which an
     organization’s full set of computational resources is accessible
     and usable.
   • Availability can be affected temporarily or permanently, and a
     loss can be partial or complete.
   • Denial of service attacks, equipment outages, and natural
     disasters are all threats to availability.
Internet-facing Services



   • Applications and data that were previously accessed from the
     confines of an organization’s intranet, but moved to the
     cloud, now face increased risk from network threats that were
     previously defended against at the perimeter of the
     organization’s intranet and from new threats that target the
     exposed interfaces.
   • Requiring remote administrative access as the sole means to
     manage the assets of the organization held by the cloud
     provider also increases risk, compared with a traditional data
     center, where administrative access to platforms can be
     restricted to direct or internal connections.
Multi-Tenancy



  • Having to share an infrastructure with unknown outside
    parties can be a major drawback for some applications and
    requires a high level of assurance for the strength of the
    security mechanisms used for logical separation.
  • Access to organizational data and resources could
    inadvertently be exposed to other subscribers through a
    configuration or software error.
  • An attacker could also pose as a subscriber to exploit
    vulnerabilities from within the cloud environment to gain
    unauthorized access.
Loss of Control



   • Migrating to a public cloud requires a transfer of control to
     the cloud provider over information as well as system
     components that were previously under the organization’s
     direct control.
   • Loss of control over both the physical and logical aspects of
     the system and data diminishes the organization’s ability to
     maintain situational awareness, weigh alternatives, set
     priorities, and effect changes in security and privacy that are
     in the best interest of the organization.
Botnets and other threats



  • Botnets could be used to launch a denial of service attack
    against the infrastructure of a cloud provider.
  • The possibility that a cloud service could become infiltrated by
    a botnet has already occurred.
  • In 2009, a command-and-control node was discovered
    operating from within one of the leading cloud providers.
Communication with RTUs
                     Thin Client Stations




                                            TCP/IP




                          RTUs
Store and Forward with local HMIs
                       Thin Client Stations




                                              TCP/IP




                           Local HMIs
Email
   (US)           info@indusoft.com
   (Brazil)       info@indusoft.com.br
   (Germany)      info@indusoft-germany.de
                                                            USA
Support           support@indusoft.com
Web site
   (English)      www.indusoft.com
   (Portuguese)   www.indusoft.com.br
   (German)       www.indusoft-germany.de         Brazil
Phone             (512) 349-0334 (US)
                  +55-11-3293-9139 (Brazil)
                  +49 (0) 6227-732510 (Germany)            Germany
Toll-Free         877-INDUSOFT (877-463-8763)
Fax               (512) 349-0375

Más contenido relacionado

La actualidad más candente

Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsOVHcloud
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...sadique_ghitm
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveAugusto Ciuffoletti
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
Relational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the CloudRelational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the CloudHossein Riasati
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”Hardway Hou
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesMatteo Leonetti
 

La actualidad más candente (12)

Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacements
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
Relational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the CloudRelational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the Cloud
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing Services
 

Destacado

RevvNRG Plano de Carreira e Bonificaçoes
RevvNRG Plano de Carreira e BonificaçoesRevvNRG Plano de Carreira e Bonificaçoes
RevvNRG Plano de Carreira e BonificaçoesWellington Dourado
 
A DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORT
A DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORTA DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORT
A DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORTPedro Uva
 
Imersão hybrid apps
Imersão   hybrid appsImersão   hybrid apps
Imersão hybrid appsAdalto Junior
 
Sigma Metais - Catálogo de produtos - 2013
Sigma Metais - Catálogo de produtos - 2013Sigma Metais - Catálogo de produtos - 2013
Sigma Metais - Catálogo de produtos - 2013Sigma Metais
 
Guia do bixo 2010
Guia do bixo 2010Guia do bixo 2010
Guia do bixo 2010eltermann
 
Capacitacao telecelula 2012
Capacitacao telecelula 2012Capacitacao telecelula 2012
Capacitacao telecelula 2012Supremaraniele
 
Curso ASP.NET MVC 3 - Vinicius Quaiato
Curso ASP.NET MVC 3 - Vinicius QuaiatoCurso ASP.NET MVC 3 - Vinicius Quaiato
Curso ASP.NET MVC 3 - Vinicius QuaiatoVinicius Quaiato
 
Globalcode bitrix24 cloud
Globalcode bitrix24 cloudGlobalcode bitrix24 cloud
Globalcode bitrix24 cloudGlobalCodeMx
 
Team Foundation Server
Team Foundation ServerTeam Foundation Server
Team Foundation ServerMaira Iantas
 
Segunda Empregável - Edição 32
Segunda Empregável - Edição 32Segunda Empregável - Edição 32
Segunda Empregável - Edição 32Fernando Anselmo
 
Boletim Novembro 2010
Boletim Novembro 2010Boletim Novembro 2010
Boletim Novembro 2010willams
 
Múltiplas Soluções Consultoria Empresarial
Múltiplas Soluções Consultoria EmpresarialMúltiplas Soluções Consultoria Empresarial
Múltiplas Soluções Consultoria EmpresarialMarcos Alves
 

Destacado (20)

RevvNRG Plano de Carreira e Bonificaçoes
RevvNRG Plano de Carreira e BonificaçoesRevvNRG Plano de Carreira e Bonificaçoes
RevvNRG Plano de Carreira e Bonificaçoes
 
Projeções para o Agronegócio - Outlook Brasil 2022
Projeções para o Agronegócio - Outlook Brasil 2022Projeções para o Agronegócio - Outlook Brasil 2022
Projeções para o Agronegócio - Outlook Brasil 2022
 
Grupo ii
Grupo iiGrupo ii
Grupo ii
 
A DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORT
A DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORTA DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORT
A DIFICULDADE DA MUDANÇA: MARKETING E POSICIONAMENTO NO RIO DO RASTRO ECO RESORT
 
Imersão hybrid apps
Imersão   hybrid appsImersão   hybrid apps
Imersão hybrid apps
 
Sigma Metais - Catálogo de produtos - 2013
Sigma Metais - Catálogo de produtos - 2013Sigma Metais - Catálogo de produtos - 2013
Sigma Metais - Catálogo de produtos - 2013
 
WorkShop Venda Mais....
WorkShop Venda Mais.... WorkShop Venda Mais....
WorkShop Venda Mais....
 
Guia do bixo 2010
Guia do bixo 2010Guia do bixo 2010
Guia do bixo 2010
 
Capacitacao telecelula 2012
Capacitacao telecelula 2012Capacitacao telecelula 2012
Capacitacao telecelula 2012
 
Curso ASP.NET MVC 3 - Vinicius Quaiato
Curso ASP.NET MVC 3 - Vinicius QuaiatoCurso ASP.NET MVC 3 - Vinicius Quaiato
Curso ASP.NET MVC 3 - Vinicius Quaiato
 
Globalcode bitrix24 cloud
Globalcode bitrix24 cloudGlobalcode bitrix24 cloud
Globalcode bitrix24 cloud
 
Team Foundation Server
Team Foundation ServerTeam Foundation Server
Team Foundation Server
 
Libr. de Literatura
Libr. de LiteraturaLibr. de Literatura
Libr. de Literatura
 
Asp.net
Asp.netAsp.net
Asp.net
 
Tdc2015
Tdc2015Tdc2015
Tdc2015
 
Segunda Empregável - Edição 32
Segunda Empregável - Edição 32Segunda Empregável - Edição 32
Segunda Empregável - Edição 32
 
Boletim Novembro 2010
Boletim Novembro 2010Boletim Novembro 2010
Boletim Novembro 2010
 
Cultura visual
Cultura visualCultura visual
Cultura visual
 
Múltiplas Soluções Consultoria Empresarial
Múltiplas Soluções Consultoria EmpresarialMúltiplas Soluções Consultoria Empresarial
Múltiplas Soluções Consultoria Empresarial
 
Outlook
OutlookOutlook
Outlook
 

Similar a Cloud Computing Defined - Essential Characteristics and Service Models

A short introduction to the cloud
A short introduction to the cloudA short introduction to the cloud
A short introduction to the cloudLaurent Eschenauer
 
Overview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurityOverview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurityAISDC
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxsarahabbas40
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudInternap
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxOmSatpathy
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Security as an Enabler – Cloud Security
Security as an Enabler – Cloud SecuritySecurity as an Enabler – Cloud Security
Security as an Enabler – Cloud SecurityTom Laszewski
 
History of data centric transformation preso
History of data centric transformation presoHistory of data centric transformation preso
History of data centric transformation presoDarren Pulsipher
 
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric WautersDynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wautersdynamicscom
 
Cloud computing and Docker
Cloud computing and DockerCloud computing and Docker
Cloud computing and DockerSrinivasVaddi4
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
Microsoft Azure Cloud fundamentals
Microsoft Azure Cloud fundamentalsMicrosoft Azure Cloud fundamentals
Microsoft Azure Cloud fundamentalsANURAG SINGH
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-IntroductionSuchithra Suriya
 

Similar a Cloud Computing Defined - Essential Characteristics and Service Models (20)

Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11
 
A short introduction to the cloud
A short introduction to the cloudA short introduction to the cloud
A short introduction to the cloud
 
Overview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurityOverview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurity
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptx
 
Ipanema
IpanemaIpanema
Ipanema
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Security as an Enabler – Cloud Security
Security as an Enabler – Cloud SecuritySecurity as an Enabler – Cloud Security
Security as an Enabler – Cloud Security
 
History of data centric transformation preso
History of data centric transformation presoHistory of data centric transformation preso
History of data centric transformation preso
 
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric WautersDynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing and Docker
Cloud computing and DockerCloud computing and Docker
Cloud computing and Docker
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Microsoft Azure Cloud fundamentals
Microsoft Azure Cloud fundamentalsMicrosoft Azure Cloud fundamentals
Microsoft Azure Cloud fundamentals
 
cloud computing
cloud computingcloud computing
cloud computing
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-Introduction
 
cloud computin
cloud computincloud computin
cloud computin
 

Más de AVEVA

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAAVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2AVEVA
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...AVEVA
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1AVEVA
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioAVEVA
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioAVEVA
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1AVEVA
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1AVEVA
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1AVEVA
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...AVEVA
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...AVEVA
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017AVEVA
 

Más de AVEVA (20)

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web Studio
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Cloud Computing Defined - Essential Characteristics and Service Models

  • 1.
  • 2.
  • 3.
  • 4. Cloud Computing Defined Convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction
  • 5. Essential Characteristics • On-demand Self-service • Broad Network Access • Resource Pooling • Rapid Elasticity • Measured Service
  • 6. On-demand Self-service • Unilaterally provision computing resources, as needed • Does not requiring human interaction with service provider.
  • 7. Broad Network Access • Capabilities are available over the network and accessed through standard mechanisms (e.g., mobile phones, tablets, laptops, and workstations).
  • 8. Resource Pooling • Provider’s computing resources are pooled with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. • Location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources, but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
  • 9. Rapid Elasticity • Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. • The capabilities available for provisioning appear to be unlimited and can be provisioned in any quantity at any time.
  • 10. Measured Service • Pay-per-use model appropriate to the type of resource or service (e.g., storage, processing, bandwidth, and active user accounts). • Usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
  • 11. Deployment Models • Private Cloud • Public Cloud • Hybrid Cloud
  • 12. Private Cloud • Provisioned for exclusive use by a single organization • May be owned, managed, and operated by the organization, a third party, or some combination of them • May exist on or off premises
  • 13. Public Cloud • Provisioned for open use by the general public • Owned, managed, and operated by a business, academic, or government organization, or some combination of them • Exists on the premises of the cloud provider
  • 14. Hybrid Cloud • Combination of Public and Private clouds • Remain unique entities, but are bound together by standardized or proprietary technology • Enables data and application portability
  • 15. Service Models • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Software as a Service (SaaS)
  • 16. Infrastructure as a Service • Allows the consumer to deploy and run off-the-shelf software just like they would on their own IT infrastructure. • Provides on-demand provisioning of computing resources allowing a company to pay for only as much capacity as is needed, and bring more online as soon as required. • Consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and select networking components (e.g., host firewalls). • Amazon Web Services, Rackspace Cloud Servers
  • 17. Platform as a Service • A set of software and product development tools hosted on the provider's infrastructure that developers use to create applications over the Internet. • The consumer of the service does not manage or control the underlying cloud infrastructure, but has control over the deployed applications and application hosting environment configurations. • Used by consumers who develop their own software and desire a common off-the-shelf development and runtime platform. • Microsoft Azure, Google App Engine
  • 18. Software as a Service • Consumer uses a provider’s applications running on a cloud infrastructure from through a thin client interface such as a web browser. • Consumer does not manage or control the underlying cloud infrastructure. • Consumer pays a fee for use of the application. • Hotmail.com, Google Apps
  • 19. Benefits • Economic Benefits • Better Agility • Greater Accessibility • Improved Reliability • Superior Security
  • 20. Economic Benefits • Instead of using capital budget to purchase machines, storage, and networking equipment, companies can expense the monthly costs of only the resources that they actually need and use. • Cloud computing provides access to almost unlimited processing power and storage. Companies can provision large data servers for online historical databases, but only pay for the actual storage that they are using. • Companies do not have to purchase redundant hardware and software licenses, or set-up disaster recovery sites that they pay for and may never use. Instead they can provision new resources on demand when and if they need them. Add in the costs that a company would otherwise incur to manage an IT infrastructure and the savings of moving to a cloud infrastructure can be huge.
  • 21. Better Agility • Building an IT infrastructure is usually a long term commitment and can take months to purchase, install, configure, and test. Equivalent cloud resources can be running in as little as a few minutes, and on- demand allows for trial-and-error. If some resource doesn't fit, simply stop, and start a new one that seems more appropriate. • Projects that involve significant cost, resources, and long timelines include significant risk of project failure. Projects that can be completed in a few hours with little or no financial and resource commitments include much less risk. • The faster a business can change, the faster a business can react to changing requirements. Cloud resources can immediately be scaled up or down to match.
  • 22. Greater Accessibility • Most companies have a single Internet provider. If that provider experiences an outage, then any users who need remote access applications are out of luck. Cloud computing providers have multiple, redundant internet connections. As long as a user has Internet access, then they have access to their applications.
  • 23. Improved Reliability • Redundancy and disaster recovery capabilities are built into cloud computing environments and on-demand resource capacity can be used for better resilience when facing increased service demands or distributed denial of service attacks, and for quicker recovery from serious incidents. • The backup and recovery policies and procedures of a cloud service may be superior to those of the organization and, if copies are maintained in diverse geographic locations, may be more robust. • Data maintained within a cloud can be more available, faster to restore, and more reliable in many circumstances than that maintained in a traditional data center.
  • 24. Superior Security • Cloud providers have dedicated staff that specialize in security, privacy, and other areas of high interest and concern to the organization. • Increases in the scale of computing induce specialization, which in turn allows security staff to shed other duties and concentrate exclusively on security issues. • The structure of cloud computing platforms is typically more uniform than that of most traditional computing centers. Greater uniformity and homogeneity facilitate platform hardening and enable better automation of security management activities like configuration control, vulnerability testing, security audits, and security patching of platform components.
  • 25. Challenges • System Complexity • Data Protection • Availability • Internet-facing Services • Multi-Tenancy • Loss of Control • Botnets and other threats
  • 26. System Complexity • A public cloud computing environment is extremely complex compared with that of a traditional data center. • Security depends not only on the correctness and effectiveness of many components, but also on the interactions among them. • The number of possible interactions between components pushes the level of complexity upward. • Complexity typically relates inversely to security, with greater complexity giving rise to vulnerabilities.
  • 27. Data Protection • Data stored in the cloud typically resides in a shared environment collocated with data from other customers. • Organizations moving sensitive and regulated data into the cloud, therefore, must account for the means by which access to the data is controlled and the data is kept secure.
  • 28. Availability • In simple terms, availability is the extent to which an organization’s full set of computational resources is accessible and usable. • Availability can be affected temporarily or permanently, and a loss can be partial or complete. • Denial of service attacks, equipment outages, and natural disasters are all threats to availability.
  • 29. Internet-facing Services • Applications and data that were previously accessed from the confines of an organization’s intranet, but moved to the cloud, now face increased risk from network threats that were previously defended against at the perimeter of the organization’s intranet and from new threats that target the exposed interfaces. • Requiring remote administrative access as the sole means to manage the assets of the organization held by the cloud provider also increases risk, compared with a traditional data center, where administrative access to platforms can be restricted to direct or internal connections.
  • 30. Multi-Tenancy • Having to share an infrastructure with unknown outside parties can be a major drawback for some applications and requires a high level of assurance for the strength of the security mechanisms used for logical separation. • Access to organizational data and resources could inadvertently be exposed to other subscribers through a configuration or software error. • An attacker could also pose as a subscriber to exploit vulnerabilities from within the cloud environment to gain unauthorized access.
  • 31. Loss of Control • Migrating to a public cloud requires a transfer of control to the cloud provider over information as well as system components that were previously under the organization’s direct control. • Loss of control over both the physical and logical aspects of the system and data diminishes the organization’s ability to maintain situational awareness, weigh alternatives, set priorities, and effect changes in security and privacy that are in the best interest of the organization.
  • 32. Botnets and other threats • Botnets could be used to launch a denial of service attack against the infrastructure of a cloud provider. • The possibility that a cloud service could become infiltrated by a botnet has already occurred. • In 2009, a command-and-control node was discovered operating from within one of the leading cloud providers.
  • 33.
  • 34. Communication with RTUs Thin Client Stations TCP/IP RTUs
  • 35. Store and Forward with local HMIs Thin Client Stations TCP/IP Local HMIs
  • 36.
  • 37.
  • 38. Email (US) info@indusoft.com (Brazil) info@indusoft.com.br (Germany) info@indusoft-germany.de USA Support support@indusoft.com Web site (English) www.indusoft.com (Portuguese) www.indusoft.com.br (German) www.indusoft-germany.de Brazil Phone (512) 349-0334 (US) +55-11-3293-9139 (Brazil) +49 (0) 6227-732510 (Germany) Germany Toll-Free 877-INDUSOFT (877-463-8763) Fax (512) 349-0375