SlideShare a Scribd company logo
1 of 28
Download to read offline
Cloud Deployments
MODELS – METHODS - TYPES

By Mohamed Sami and Mostafa El-Hefnawy
Agenda
Cloud Deployment Models

Deployment Models Adoption Rate

Selection for best model

Related research topics

References

2
What are the cloud deployment
models

3
Private cloud
Private cloud: The cloud infrastructure is provisioned for
exclusive use by a single organization comprising multiple
consumers (e.g., business units). It may be owned,
managed, and operated by the organization, a third party,
or some combination of them, and it may exist on or off
premises.

4
Private cloud (Cont’d)
ON-SITE PRIVATE CLOUD

OUTSOURCED PRIVATE CLOUD

5
Public cloud
Public cloud: The cloud infrastructure is provisioned for
open use by the general public. It may be owned,
managed, and operated by a business, academic, or
government organization, or some combination of them. It
exists on the premises of the cloud provider.

6
Public cloud (Cont’d)
Community cloud
Community cloud: The cloud infrastructure is provisioned
for exclusive use by a specific community of consumers
from organizations that have shared concerns (e.g.,
mission, security requirements, policy, and compliance
considerations). It may be owned, managed, and operated
by one or more of the organizations in the community, a
third party, or some combination of them, and it may exist
on or off premises.

8
Community cloud (Cont’d)
ON-SITE COMMUNITY CLOUD

OUTSOURCED COMMUNITY CLOUD

9
Hybrid cloud
Hybrid cloud: The cloud infrastructure is a composition of
two or more distinct cloud infrastructures (private,
community, or public) that remain unique entities, but are
bound together by standardized or proprietary technology
that enables data and application portability (e.g., cloud
bursting for load balancing between clouds).

10
Hybrid cloud (Cont’d)

11
12
Growth Expected for Models



Currently



In 18 Months

13
World Adoption

14
15
How to select the best Model for your
business?
The cloud deployment selection is based on multiple evaluation criteria including technology,
business criteria, legal issues, etc…

The best model selection may be for:

Workload
Patterns

Security
concerns

Type of
requested
services

Regulations

Available
Budget

Hosted Data
classification

Availability

Time to
operate

Skills

16
Cloud workload Patterns

17
18
19
Summary

20
Cloud Deployment Summary
Deployment model

Description

Best suited for

offers

challenges

Public cloud

• Provisioned of general public use
• Externally hosted by a service provider

• Variable workloads
• Test & Dev

• The Lowest TCO
• Rabid elasticity &
flexibility
• Faster deployments

• Data security &
privacy
• Service availability
(e.g. cut in
connectivity)

Private cloud

• Use for a single organization
• Can be internally or externally deployed

• Sensitive data
• Legal compliance

• Security & control
• Higher customizability
• performance

• High Cost of
ownership
• Required skill set

Community cloud

• Shared by several organizations
• typically externally hosted
• Can be hosted internally by one of the
organizations or could be distributed.

• Collaboration between
universities
• Multiple business
enterprises apply Shared
services model (e.g. group
of hospitals & clinics)

• Lower TCO than
private cloud
• elasticity

• Complex IT
governance

• Composition of 2 or more clouds that remains
unique entities but are bound together.
• Make use of the scalability and costeffectiveness of public cloud offers without
exposing mission-critical applications and data
to third-party vulnerabilities

•
•
•
•

•
•
•
•
•

Hybrid cloud

Cloud bursting
On-demand access
Sensitive data
Storage as a service for nonsensitive data

• Required skill set

Lower TCO
High elasticity
Security &control
Performance
customizability

•
•
•
•

Portability
interoperability
Integration
migration

21
Research hot topics
• Cloud Data sovereignty - Legal research
◦ What are the laws governing the data access? How to comply with
conflicting laws & acts?
◦
◦
◦
◦
◦

The laws of the country in which the data originated?
The laws of the country in which the cloud customer is based?
The laws of the country, or countries, in which the cloud provider houses its data centers?
The laws of the country in which the cloud provider is based?
Or all of the above?

22
Research hot topics (Cont’d)
• Cloud Computing portability & interoperability- Technical research

23
Research hot topics (Cont’d)
• Cloud Computing portability & interoperability- Technical research

Data portability

Application
portability

Platform
portability

Application
interoperability

Platform
interoperability

Management
interoperability
24
Other topics
Distributed file systems
and data management
(Technical)

Legacy System Migration
(Technical)

Performance/scale/price
estimation

Mobile Cloud Computing

(marketing, management)

(Technical)

Cloud SLAs
(legal & contractual)

Deployment Model
Selection
(Strategic Management)

Community cloud
governance (operation &
managerial)

Cost & Risk Analysis
(Management)

25
References
• NIST SP 800-145, “A NIST definition of cloud computing”, http://csrc.nist.gov/publications/drafts/800-145/Draft-SP800-145_cloud-definition.pdf
• NIST Cloud Computing Reference Architecture,
http://www.cloudcredential.org/images/pdf_files/nist%20reference%20architecture.pdf
• NIST SP 800-146, “NIST Cloud Computing Synopsis and Recommendations”,
http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf
• Cloud Computing Portability and Interoperability, http://www.opengroup.org/cloud/cloud_iop/cloud_port.htm
• Towards Multi-criteria Cloud Service Selection, IEEE,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5976164&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%
2Fabs_all.jsp%3Farnumber%3D5976164
• Cloud Computing – A Classification, Business Models, and Research Directions, springer,
http://download.springer.com/static/pdf/458/art%253A10.1007%252Fs12599-009-00712.pdf?auth66=1388152113_369819fc6a3a7900814b03a13546acf7&ext=.pdf

26
References (Cont’d)
• Deployment models: Towards eliminating security concerns from cloud computing, IEEE
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5547137&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%
2Fabs_all.jsp%3Farnumber%3D5547137
• Cloud computing: Issues and challenges, IEEE
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5474674&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%
2Fabs_all.jsp%3Farnumber%3D5474674
• Virtual Infrastructure Management in Private and Hybrid Clouds, IEEE
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5233608&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%
2Fabs_all.jsp%3Farnumber%3D5233608
• Building a Flexible Service Architecture for User Controlled Hybrid Clouds, IEEE
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6329175

27
Thank you
28

More Related Content

What's hot

What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationVivek Ravindran
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architectureMohammad Ilyas Malik
 
Cloud computing notes
Cloud computing notesCloud computing notes
Cloud computing notesSrinivasa Rao
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESTushar Dhoot
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using EucalyptusAbhishek Dey
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSAnchises Moraes
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesThoughtWorks Studios
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGTanmoy Barman
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 

What's hot (20)

What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
Cloud computing notes
Cloud computing notesCloud computing notes
Cloud computing notes
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and Challenges
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 

Similar to Cloud Deployments Models

cloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptxcloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptx20DC11NOUFALN
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computingRaj Sarode
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing mehanasshahul
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud ComputingAnshi Bhadoria
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityAndy Powell
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityJisc
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To CloudPeak 10
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeLisa Abe-Oldenburg, B.Comm., JD.
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz wordQuadrisk
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained Juan Pablo
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Fabrizio Volpe
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 

Similar to Cloud Deployments Models (20)

cloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptxcloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptx
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To Cloud
 
cloud computing
 cloud computing cloud computing
cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
3822424.ppt
3822424.ppt3822424.ppt
3822424.ppt
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz word
 
4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

Cloud Deployments Models

  • 1. Cloud Deployments MODELS – METHODS - TYPES By Mohamed Sami and Mostafa El-Hefnawy
  • 2. Agenda Cloud Deployment Models Deployment Models Adoption Rate Selection for best model Related research topics References 2
  • 3. What are the cloud deployment models 3
  • 4. Private cloud Private cloud: The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. 4
  • 5. Private cloud (Cont’d) ON-SITE PRIVATE CLOUD OUTSOURCED PRIVATE CLOUD 5
  • 6. Public cloud Public cloud: The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. 6
  • 8. Community cloud Community cloud: The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. 8
  • 9. Community cloud (Cont’d) ON-SITE COMMUNITY CLOUD OUTSOURCED COMMUNITY CLOUD 9
  • 10. Hybrid cloud Hybrid cloud: The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds). 10
  • 12. 12
  • 13. Growth Expected for Models  Currently  In 18 Months 13
  • 15. 15
  • 16. How to select the best Model for your business? The cloud deployment selection is based on multiple evaluation criteria including technology, business criteria, legal issues, etc… The best model selection may be for: Workload Patterns Security concerns Type of requested services Regulations Available Budget Hosted Data classification Availability Time to operate Skills 16
  • 18. 18
  • 19. 19
  • 21. Cloud Deployment Summary Deployment model Description Best suited for offers challenges Public cloud • Provisioned of general public use • Externally hosted by a service provider • Variable workloads • Test & Dev • The Lowest TCO • Rabid elasticity & flexibility • Faster deployments • Data security & privacy • Service availability (e.g. cut in connectivity) Private cloud • Use for a single organization • Can be internally or externally deployed • Sensitive data • Legal compliance • Security & control • Higher customizability • performance • High Cost of ownership • Required skill set Community cloud • Shared by several organizations • typically externally hosted • Can be hosted internally by one of the organizations or could be distributed. • Collaboration between universities • Multiple business enterprises apply Shared services model (e.g. group of hospitals & clinics) • Lower TCO than private cloud • elasticity • Complex IT governance • Composition of 2 or more clouds that remains unique entities but are bound together. • Make use of the scalability and costeffectiveness of public cloud offers without exposing mission-critical applications and data to third-party vulnerabilities • • • • • • • • • Hybrid cloud Cloud bursting On-demand access Sensitive data Storage as a service for nonsensitive data • Required skill set Lower TCO High elasticity Security &control Performance customizability • • • • Portability interoperability Integration migration 21
  • 22. Research hot topics • Cloud Data sovereignty - Legal research ◦ What are the laws governing the data access? How to comply with conflicting laws & acts? ◦ ◦ ◦ ◦ ◦ The laws of the country in which the data originated? The laws of the country in which the cloud customer is based? The laws of the country, or countries, in which the cloud provider houses its data centers? The laws of the country in which the cloud provider is based? Or all of the above? 22
  • 23. Research hot topics (Cont’d) • Cloud Computing portability & interoperability- Technical research 23
  • 24. Research hot topics (Cont’d) • Cloud Computing portability & interoperability- Technical research Data portability Application portability Platform portability Application interoperability Platform interoperability Management interoperability 24
  • 25. Other topics Distributed file systems and data management (Technical) Legacy System Migration (Technical) Performance/scale/price estimation Mobile Cloud Computing (marketing, management) (Technical) Cloud SLAs (legal & contractual) Deployment Model Selection (Strategic Management) Community cloud governance (operation & managerial) Cost & Risk Analysis (Management) 25
  • 26. References • NIST SP 800-145, “A NIST definition of cloud computing”, http://csrc.nist.gov/publications/drafts/800-145/Draft-SP800-145_cloud-definition.pdf • NIST Cloud Computing Reference Architecture, http://www.cloudcredential.org/images/pdf_files/nist%20reference%20architecture.pdf • NIST SP 800-146, “NIST Cloud Computing Synopsis and Recommendations”, http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf • Cloud Computing Portability and Interoperability, http://www.opengroup.org/cloud/cloud_iop/cloud_port.htm • Towards Multi-criteria Cloud Service Selection, IEEE, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5976164&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls% 2Fabs_all.jsp%3Farnumber%3D5976164 • Cloud Computing – A Classification, Business Models, and Research Directions, springer, http://download.springer.com/static/pdf/458/art%253A10.1007%252Fs12599-009-00712.pdf?auth66=1388152113_369819fc6a3a7900814b03a13546acf7&ext=.pdf 26
  • 27. References (Cont’d) • Deployment models: Towards eliminating security concerns from cloud computing, IEEE http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5547137&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls% 2Fabs_all.jsp%3Farnumber%3D5547137 • Cloud computing: Issues and challenges, IEEE http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5474674&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls% 2Fabs_all.jsp%3Farnumber%3D5474674 • Virtual Infrastructure Management in Private and Hybrid Clouds, IEEE http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5233608&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls% 2Fabs_all.jsp%3Farnumber%3D5233608 • Building a Flexible Service Architecture for User Controlled Hybrid Clouds, IEEE http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6329175 27

Editor's Notes

  1. Hybrid cloud challenges: portability, interoperability, integration, migrationCommunity cloud advantages:The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the cost savings potential of cloud computing are realized
  2. What are the laws governing the data access? How to comply with conflicting laws & acts?The laws of the country in which the data originated?The laws of the country in which the cloud customer is based?The laws of the country, or countries, in which the cloud provider houses its data centers?The laws of the country in which the cloud provider is based?Or all of the above?
  3. A system that involves cloud computing typically includes data, application, platform, and infrastructure components, where:Data is the machine-processable representation of information, held in computer storage.Applications are software programs that perform functions related to business problems.Platforms are programs that support the applications and perform generic functions that are not business-related.Infrastructure is a collection of physical computation, storage, and communication resources.
  4. A system that involves cloud computing typically includes data, application, platform, and infrastructure components, where:Data is the machine-processable representation of information, held in computer storage.Applications are software programs that perform functions related to business problems.Platforms are programs that support the applications and perform generic functions that are not business-related.Infrastructure is a collection of physical computation, storage, and communication resources.Data portabilitySuppose that an enterprise uses a SaaS product for Customer Relations Management (CRM), for example, and the commercial terms for use of that product become unattractive compared with other SaaS products or with use of an in-house CRM solution. The customer data held by the SaaS product may be crucial to the enterprise's operation. How easy will it be to move that data to another CRM solution?Application PortabilityEnables the re-use of application components across cloud PaaS services and traditional computing platforms. Application portability requires a standard interface exposed by the supporting platform.Platform PortabilityHas 2 types:Re-use of platform components across cloud IaaS services and non-cloud infrastructure – platform source portabilityRe-use of bundles containing applications and data with their supporting platforms – machine image portabilityApplication InteroperabilityIs the interoperability between application components deployed as SaaS, as applications using PaaS, as applications on platforms using IaaS, in a traditional enterprise IT environment, or on client devicesCloud SaaS gives enterprises the possibility of acquiring new application capabilities quickly and easily, but much of the benefit of this is lost if costly integration work is needed to make the SaaS service interoperate with other applications and services that the enterprise uses.Application components typically intercommunicate by invoking their respective platforms, which implement the necessary communications protocols. It requires that the interoperating applications Platform interoperability is achieved at firstshare common process and data models. These are not appropriate subjects for generic standards, although there are specific standards for some particular applications and business areas.Platform InteroperabilityPlatform interoperability is interoperability between platform componentsPlatform interoperability requires standard protocols for service discovery and information exchange.Application interoperability cannot be achieved without platform interoperability.Protocols for information exchange between platforms should support the establishment of sessions and transfer of session information, as well as information transport. (In the case of IaaS, the platform in question is not part of the infrastructure service but implemented on top of it.) Session information might, for example, include the user’s identity, the authorization level established by the user for access control purposes, the user’s time-zone, the user’s language, and the user’s preferred cultural environment.Management Interoperabilityinteroperability between cloud services (SaaS, PaaS, or IaaS) and programs concerned with the implementation of on-demand self-service.This can only be achieved if cloud services have standard interfaces.