SlideShare a Scribd company logo
NIST Cloud Computing Reference Architecture
1. Background

NIST : The goal is to accelerate the federal
government’s adoption of secure and effective
cloud computing to reduce costs and improve
services.
NIST working group

- Cloud Computing Target Business Use Cases
- Cloud Computing Reference Architecture and Taxonomy
- Cloud Computing Standards Roadmap
- Cloud Computing SAJACC (Standards Acceleration to
Jumpstart the Adoption of Cloud Computing)
- Cloud Computing Security
2. Objectives
Provides a simple and unambiguous taxonomy of
three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and
Hybrid cloud)
Provides a unifying view of five essential
characteristics
- On-demand self-service
- Broad network access
- Resource pooling
- Rapid elasticity
- Measured service
The project team developed a Strawman
model of architectural concepts
3. Cloud Computing Reference Architecture

Figure 1: The Conceptual Reference Model
Figure 2: Interactions between the Actors in Cloud Computing
(dedicated and encrypted connection)

(capability, flexibility and functionality)
Cloud Consumer
Cloud Provider

Figure 7: Cloud Provider - Major Activities
Cloud Auditor => security controls, privacy impact,
performance
Cloud Broker => intermediation, aggregation,
arbitrage
Cloud Carrier
provides connectivity and transport of cloud
services between cloud consumers and cloud
providers (network, telecommunication, access
devices )
Figure 17: Cloud Taxonomy

More Related Content

What's hot

Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
sagaroceanic11
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
purplesea
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 

What's hot (20)

cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
 
cluster computing
cluster computingcluster computing
cluster computing
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 

Similar to NIST Cloud Computing Reference Architecture

Cloud computing
Cloud computingCloud computing
Cloud computing
shethzaid
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Editor Jacotech
 
Feet On The Ground Head In The Cloud
Feet On The Ground Head In The CloudFeet On The Ground Head In The Cloud
Feet On The Ground Head In The Cloud
dchmielewski
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
kevnikool
 

Similar to NIST Cloud Computing Reference Architecture (20)

Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Nigga
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
 
Scheduling in CCE
Scheduling in CCEScheduling in CCE
Scheduling in CCE
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG
 
internship paper
internship paperinternship paper
internship paper
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
Feet On The Ground Head In The Cloud
Feet On The Ground Head In The CloudFeet On The Ground Head In The Cloud
Feet On The Ground Head In The Cloud
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 

More from Thanakrit Lersmethasakul

More from Thanakrit Lersmethasakul (20)

CHAMPSPACE: Living as a Champion
CHAMPSPACE: Living as a ChampionCHAMPSPACE: Living as a Champion
CHAMPSPACE: Living as a Champion
 
CHAMPSPACE: Living as a Champion (Draft)
CHAMPSPACE: Living as a Champion (Draft)CHAMPSPACE: Living as a Champion (Draft)
CHAMPSPACE: Living as a Champion (Draft)
 
Doing Business on Modern Trade Era
Doing Business on Modern Trade EraDoing Business on Modern Trade Era
Doing Business on Modern Trade Era
 
Integrated Life Architecture (Draft)
Integrated Life Architecture (Draft)Integrated Life Architecture (Draft)
Integrated Life Architecture (Draft)
 
Roadmap, roadmapping, roadmapper, roadmappee and roadmapware
Roadmap, roadmapping, roadmapper, roadmappee and roadmapwareRoadmap, roadmapping, roadmapper, roadmappee and roadmapware
Roadmap, roadmapping, roadmapper, roadmappee and roadmapware
 
Scenario Planning
Scenario PlanningScenario Planning
Scenario Planning
 
Organizational cultures II
Organizational cultures IIOrganizational cultures II
Organizational cultures II
 
Organizational cultures I
Organizational cultures IOrganizational cultures I
Organizational cultures I
 
Core Concept: Software Defined Everything
Core Concept: Software Defined EverythingCore Concept: Software Defined Everything
Core Concept: Software Defined Everything
 
How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?
 
Epigram Collection
Epigram CollectionEpigram Collection
Epigram Collection
 
Algorithmic Trading
Algorithmic TradingAlgorithmic Trading
Algorithmic Trading
 
Doing Business Index
Doing Business IndexDoing Business Index
Doing Business Index
 
Web-based Design for the status of a Technology Roadmap
Web-based Design for the status of a Technology RoadmapWeb-based Design for the status of a Technology Roadmap
Web-based Design for the status of a Technology Roadmap
 
National Innovation Systems
National Innovation SystemsNational Innovation Systems
National Innovation Systems
 
Innovation Systems
Innovation SystemsInnovation Systems
Innovation Systems
 
National Innovation Systems
National Innovation SystemsNational Innovation Systems
National Innovation Systems
 
LEGO Serious Play
LEGO Serious PlayLEGO Serious Play
LEGO Serious Play
 
Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]
 
Why What How in Sense of CRM
Why What How in Sense of CRMWhy What How in Sense of CRM
Why What How in Sense of CRM
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 

NIST Cloud Computing Reference Architecture

  • 1. NIST Cloud Computing Reference Architecture
  • 2. 1. Background NIST : The goal is to accelerate the federal government’s adoption of secure and effective cloud computing to reduce costs and improve services.
  • 3. NIST working group - Cloud Computing Target Business Use Cases - Cloud Computing Reference Architecture and Taxonomy - Cloud Computing Standards Roadmap - Cloud Computing SAJACC (Standards Acceleration to Jumpstart the Adoption of Cloud Computing) - Cloud Computing Security
  • 4. 2. Objectives Provides a simple and unambiguous taxonomy of three service models - Software as a service (SaaS) - Platform as a service (PaaS) - Infrastructure as a service (IaaS) (Private cloud, Community cloud, Public cloud, and Hybrid cloud)
  • 5. Provides a unifying view of five essential characteristics - On-demand self-service - Broad network access - Resource pooling - Rapid elasticity - Measured service The project team developed a Strawman model of architectural concepts
  • 6. 3. Cloud Computing Reference Architecture Figure 1: The Conceptual Reference Model
  • 7. Figure 2: Interactions between the Actors in Cloud Computing
  • 8. (dedicated and encrypted connection) (capability, flexibility and functionality)
  • 10. Cloud Provider Figure 7: Cloud Provider - Major Activities
  • 11. Cloud Auditor => security controls, privacy impact, performance Cloud Broker => intermediation, aggregation, arbitrage
  • 12. Cloud Carrier provides connectivity and transport of cloud services between cloud consumers and cloud providers (network, telecommunication, access devices )
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Figure 17: Cloud Taxonomy