Cloud Computing - TRAI Report
Cloud Computing four attributes:
- Data Intensive - focus is on data rather computation, (I/O) is more important resource metric than CPU utilization
- Resource Pooling - instance of program to serve different consumers (multi-tenancy)
- Scalability & Rapid Elasticity - Scalability - automated ability of cloud to scale IT resource, Elasticity is scalability supported with optimized utilization of resources as well as cost optimization
- On demand access - freedom to selfprovision these resources, pay-as-you-go approach with no upfront commitments
Top Verticals such as Retail, Railways, Manufacturing, Banking, Education and Healthcare using cloud like
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
for
- Content, Communication and Collaboration (CCC)
- Customer Relationship Management (CRM)
- Enterprise Resource Planning (ERP)
- Supply Chain Management (SCM)
- Other Integrations
through Service Models:
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Infrastructure as a Service (IaaS)
also Other:
- Data as a Service (DaaS)
- Identity and Policy Management as a Service (IPMaaS)
- Network as a Service (NaaS)
- Video as a Service (VaaS)
- Hardware as a service (HaaS)
Supply-Side Economies of Scale:
- Cost of power
- Infrastructure labour costs
- Security and reliability cost
- Cost of architecture - Operators
Market Predictions for Cloud Computing
- Smart city technologies will drive up demand for Internet of Things (IoT)
- Public cloud
- Software-as-a-Service (SaaS) market
- Social, Mobility, Analytics and Cloud
Interoperability Requirements: Data Portability, System/Application Portability
Ensuring Quality of the Cloud : High availability, Performance, Security, Resilience, Reliability, Self-service Portals, Response time & Customer support, Metering/Billing Accuracy, Support in Compliance of Regulations
Compliances: Loss of Service, Audit, Service Conformity
Key Parameters of QoS in Cloud: Availability, Performance, Response time, Scalability through dynamic provisioning of Resource, Metering and Billing/Charging performance.
Major Threats: (i) Abuse and Nefarious Use of CloudComputing, (ii) Insecure Application Programming Interfaces, (iii) Malicious Insiders, (iv) Shared Technology Vulnerabilities, (v) Data Loss/Leakage, (vi) Account, Service & Traffic Hijacking and (vii)Unknown Risk Profile.
Security:
- Infrastructure Security
- Network security
- Application & Process security
- Data security
Security attacks:
- Theft of Service attack
- Denial of Service attack
- Malware Injection attack
- Cross VM Side Channel attack
- Targeted Shared Memory attack
- Phishing attack
- Botnet or Stepping Stone attack
- Audio Steganography attack
- VM Rollback attack
Comments
Post a Comment