You are on page 1of 33

CLOUD VIRTUAL INTERNSHIP

A summer internship report submitted in partial fulfilment of the requirements


for the award of degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

Submitted by

P.VIKSHITH REDDY – 222010302036

Under the guidance of


Dr.V.SIREESHA
Associate Professor

Department of Computer Science and Engineering


GITAM School of Technology
GITAM Deemed to be University
Hyderabad Campus – 502329

August 2023
GANDHI INSTITUTE OF TECHNOLOGY AND MANAGEMENT
(GITAM)
(Declared as Deemed-to-be-University u/s 3 of UGC Act 1956)
HYDERABAD CAMPUS

DECLARATION

I hereby declare that the summer internship report entitled “CLOUD VIRTUAL” is an original
work done in the Department of Computer Science and Engineering, GITAM School of
Technology, GITAM (Deemed to be University) submitted in partial fulfilment of the requirements
for the award of the degree of “Bachelor of Technology” in Computer Science and Engineering.
The work had not beensubmitted to any other college or university for the award of any degree or
diploma.

Place – HYDERABD

Date-01-09-2023 VIKSHITH REDDY


(222010302036)

2
DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING GITAM SCHOOL OF TECHNOLOGY

GITAM
(DEEMED TO BE UNIVERSITY)
HYDERABAD CAMPUS

CERTIFICATE

This is to certify that the Internship report entitled “CLOUD VIRTUAL” is a bonafide record of
work carried out by VIKSHITH REDDY(222010302036) submitted in partial fulfillment of the
requirement for the award of the degree of Bachelors of Technology in Computer Science and
Engineering.

Dr.V.SIREESHA Dr. K.S. Sudeep


Associate Professor Associate Professor &
HOD Dept. of Science
CSE Department

3
C ERTIFICATE OF COMPLETION

4
ACKNOWLEDGEMENT

My project would not have been successful without the help of several people. We would
like to thank the personalities who were part of our project in numerous ways, those who gave
us outstanding support from the birth of the project.

We are extremely thankful to our honorable Pro-Vice Chancellor, Dr. D. Sambasiva rao for
providing necessary infrastructure and resources for the accomplishment of our project.

We are highly indebted to Prof. N. Seetharamaiah, Principal, School of Technology, for his support
during the tenure of the project.

We are very much obliged to our beloved Assoc. Prof. K.S Sudeep, Head of the Department
of Computer Science & Engineering for providing the opportunity to undertake this project and
encouragement in completion of this project.

We hereby wish to express our deep sense of gratitude to Dr. V. Sireesha, Associate
Professor, Department of Computer Science and Engineering, School of Technology for the
esteemed guidance, moral support and invaluable advice provided by her for the success of the
project.

We are also thankful to all the staff members of Computer Science and Engineering
department who have cooperated in making our project a success. We would like to thank all
our parents and friends who extended their help, encouragement and moral support either
directly or indirectly in our project work.

Sincerely,

VIKSHITH REDDY
222010302036

5
ABSTRACT

Cloud computing is one of the most useful technology that is been widely used all over the world. It generally provides
on demand IT services and products. Virtualization plays a major role in cloud computing as it provides a virtual
storage and computing services to the cloud clients which is only possible through virtualization. Cloud computing is
a new business computing paradigm that is based on the concepts of virtualization, multi-tenancy, and shared
infrastructure.

“Cloud computing technology is based on three factors- grid computing, utility computing and automatic computing.”
All the data is stored on the servers and can be accessed simply by authenticating with the help of the internet anywhere
in the world. Apple, Google, Microsoft, etc. are the biggest cloud service providers provide very large storage to its
users and making the work easier

Virtualization is basically making a virtual image or “version” of something such as server, operating system, storage
devices or network resources so that they can be used on multiple machines at the same time. The main aim of
virtualization is to manage the workload by transforming traditional computing to make it more scalable, efficient and
economical. Virtualization can be applied to a wide range such as operating system virtualization, hardware-level
virtualization and server virtualization. Virtualization technology is hardware reducing cost saving and energy saving
technology that is rapidly transforming the fundamental way of computing

6
INTERNSHIP OBJECTIVES

● One of the primary objectives of an cloud virtual internship could be to


enhance participants' skills in AWS Cloud virtual internship.

● This might involve learning about various cloud concepts, algorithms,


frameworks, and tools.

● Since this is an AWS Eduskills internship, an objective could be to


familiarize participants with AWS services related to cloud computing.

● This might include using services like Amazon SageMaker, Amazon


Rekognition, or Amazon Comprehend for various cloud tasks.

● A cloud internship could emphasize problem-solving skills,


encouraging participants to tackle complex challenges and come up with
innovative solutions using cloud techniques.

● The internship might include interactions with cloud


professionals, experts, or mentors who can provide guidance, feedback,
and insights into the industry.
Table of Contents

CHAPTER 1: Cloud Computing

1.1 Introduction 10
1.2 When an Cloud is used 10

1.3 How an Cloud is carried out 11

1.4 Cloud Deployments Models 11

1.5 Risks and challenges of cloud computing 18

1.6 Cloud origins and Influence 22

1.7 Cloud Delivery Models 25

1.8 References 31

CHAPTER 2: Cloud Deployments Model


2.1 Public Cloud 12
2.2 Community Cloud 13
2.3 Private Cloud 14
2.4 Hybrid Cloud 16

CHAPTER 3: Risks and challenges of cloud computing


3.1. Increased Security Vulnerabilities 18
3.2 Reduced Operational Governance Control 19
3.3 Limited Portablity between cloud providers 20
3.4 Multi Regional Compliance and legal issues 21
CHAPTER 4: Cloud origins and influence
4.1 Client / Server Computing 22
4.2. Distributed Computing 22
4.3. Grid Computing 23
4.4. Utility and Cloud Computing 23

CHAPTER 5: Cloud Delivery Models

5.1. Infrastructure –as-a-Service 25


5.2. Platform-as-a-Service 27
5.3. Software-as-a-Service 29

RESULTS AND CONCLUSION 31

ABOUT THE AUTHOR 32

REFERENCES 32
List of Figures

Fig. No Name of the figure Page no

1.1 process of cloud computing 10


1.2 Operation of cloud applications 10
2.1 Public cloud 12

2.2 Use of public cloud 12

3.1 Private cloud 13

4.1 Use of Private cloud 14

4.2 Hybrid cloud 15

4.3 Difference of these cloud deployment models 16

4.4 Client / Server Computing 22

6.1 Distributed Computing 22

6.2 Grid Computing 23

6.3 Utility Computing 23

6.4 IAAS , SAAS , PAAS 29


CHAPTER 1: Cloud Computing

1.1 INTRODUCTION:

Cloud computing is a revolutionary technology that has fundamentally transformed the way we
store, access, and manage data and applications. In a world increasingly driven by digital demands, cloud
computing has emerged as a game-changer, offering businesses and individuals a newway to harness the power
of computing resources.

1.2 When an cloud is used

Cloud computing has revolutionized the way we approach technology and data management. In today's digital age,
the term "cloud" is synonymous with convenience, scalability, and accessibility. The cloud allows individuals and
organizations to store, process, and access data and applications via the internet, eliminating the need for on-
premises hardware and infrastructure.

Businesses leverage cloud services to streamline operations, reduce costs, and enhance flexibility. They can scale
resources up or down as needed, fostering agility in a rapidly changing market. Moreover, the cloud facilitates
collaboration by enabling remote work and data sharing, promoting global connectivity.

In the realm of personal computing, cloud storage solutions have become indispensable. Users rely on services like
Dropbox, Google Drive, and iCloud to store and sync their files across devices, ensuring data accessibility from
anywhere.

While the cloud offers numerous benefits, it also raises concerns about data security and privacy. As cloud adoption
continues to grow, addressing these challenges remains paramount. Overall, the cloud has become an integral part
of our digital lives, reshaping how we work, connect, and innovate
1.3 How an cloud is carried out :

The adoption of cloud computing entails a strategic process:

1. Assessment: Evaluate business needs, regulatory requirements, and workloads to determine what
should migrate to the cloud.

2. Service Model Selection: Choose between Infrastructure as a Service (IaaS), Platform as a Service
(PaaS), or Software as a Service (SaaS) based on specific requirements.

3. Provider Selection: Select a cloud service provider like AWS, Azure, or Google Cloud, considering
factors like services offered, pricing, and geographical presence.

4. Migration: Move data, applications, and services to the cloud. This may involve rearchitecting or
redesigning for optimal cloud utilization.

5. Security and Compliance: Implement robust security measures, access controls, encryption, and
compliance practices to protect data and meet regulatory standards.

6. Management: Continuously monitor resource usage, optimize configurations, and manage costs to
ensure efficiency.

7. Training: Train personnel to effectively utilize cloud resources and tools for enhanced productivity.

8. Disaster Recovery: Establish disaster recovery and backup strategies to safeguard data and ensure
business continuity.

9. Scalability: Leverage the cloud's scalability to adjust resources according to demand, promoting
innovation and cost management.

In essence, cloud adoption is a comprehensive process that offers organizations flexibility, scalability,and cost-
efficiency while requiring diligence in security, compliance, and resource management.

1.4 Cloud Deployment Models :

A Cloud deployment model represents a specific type of cloud environment , primarily distinguished byownership,
size and access. It refer to distinct archietectures for hosting and managing data , applications, and services:
There are totally four types of common cloud deployment models
(i) Public Cloud
(ii) Private cloud
(iii) Hybrid cloud
(iv) Multi-cloud 12
2.1 : PUBLIC CLOUD COMPUTING

Public Cloud Computing: Empowering Innovation and Scalability

Public cloud computing is a transformative model of cloud services provided by third-party vendors, such as
Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP), to organizations and
individuals over the internet. In this paradigm, cloud resources like servers, storage,databases, and software
applications are shared among multiple users, offering a cost-effective, scalable, and accessible solution.

One of the primary advantages of public cloud computing is scalability. Users can easily adjust their resources
up or down based on demand, enabling businesses to handle varying workloads efficiently. This scalability
fosters innovation as organizations can experiment with new projects and applicationswithout the upfront
investment in physical hardware.

Accessibility is another key feature. Users can access public cloud services from virtually anywhere with an
internet connection, promoting remote work and collaboration on a global scale. This flexibilityis particularly
valuable in today's distributed and dynamic work environments.

Public clouds also provide a wide range of services, from Infrastructure as a Service (IaaS) for raw computing
power and virtual machines to Platform as a Service (PaaS) for application development andSoftware as a
Service (SaaS) for ready-to-use applications like email and collaboration tools.

Despite its many benefits, public cloud computing raises concerns related to data security, compliance,and
potential vendor lock-in. Organizations must implement robust security measures, data encryption, access
controls, and compliance protocols to mitigate these risks effectively.

In conclusion, public cloud computing has become an integral part of the modern digital landscape, offering
organizations and individuals a flexible, scalable, and cost-efficient solution for their computing needs. It
empowers innovation, fosters collaboration, and simplifies IT management whilenecessitating careful
consideration of security and compliance requirements.

13
2.2 : Private Cloud Computing:

Private Cloud Computing: Balancing Control and Customization

Private cloud computing is a cloud deployment model that offers dedicated and exclusive cloud resources to a
single organization. Unlike public clouds, where resources are shared among multiple users, private clouds provide
a higher degree of control, security, and customization. This model can be hosted on-premises within an
organization's data center or by a third-party provider.

One of the primary advantages of private cloud computing is the enhanced control it affords organizations over
their data and infrastructure. This control is particularly valuable for enterprises with strict regulatory compliance
requirements or those handling sensitive and confidential data, such as financial institutions and healthcare
14
providers.

Customization is another key feature of private clouds. Organizations can tailor the cloud environment
to meet their specific needs, including hardware configurations, security policies, and network settings. This level
of customization ensures that the cloud infrastructure aligns seamlessly with an organization'sexisting IT ecosystem
and business processes.

Private clouds also provide a high degree of reliability and performance predictability, as resources are not shared
with other tenants. This can be crucial for applications and workloads that require consistent performance levels.

However, private cloud computing often entails higher upfront costs compared to public cloud solutions, as it
involves setting up and maintaining dedicated infrastructure. It may also require a skilledIT team for management
and maintenance.

In conclusion, private cloud computing offers organizations control, security, and customization while addressing
specific compliance and data privacy needs. While it may involve higher initial investments, it provides a robust
and reliable solution for businesses that prioritize data protection and performance

15
2.3 : Hybrid Cloud Computing:

Hybrid Cloud Computing: Bridging Flexibility and Control

Hybrid cloud computing is a strategic blend of both public and private cloud environments, offering organizations
a versatile solution to meet diverse computing needs. In a hybrid cloud, data and applications can seamlessly move
between the public and private clouds, providing greater flexibility, scalability, and control over computing
resources.

One of the primary advantages of a hybrid cloud is its ability to balance the benefits of both public and private
cloud models. It enables organizations to leverage the scalability and cost-efficiency of the public cloud for non-
sensitive workloads while retaining sensitive data and critical applications within a secure private cloud
environment. This flexibility allows companies to optimize their IT infrastructure based on workload requirements
and budget constraints.

Additionally, hybrid clouds foster business continuity and disaster recovery. Organizations can replicateand back
up data and applications across both cloud environments, ensuring data resilience and minimaldowntime in case of
unforeseen disruptions.

Hybrid cloud adoption requires careful planning, including workload assessment, data classification, and
integration strategies. It also necessitates robust network connectivity to facilitate seamless data transfer between
the private and public cloud components.

However, the complexity of managing a hybrid cloud environment, along with security and compliance concerns,
can present challenges. Organizations must implement comprehensive security measures, encryption, access
controls, and compliance protocols to mitigate risks effectively.

In conclusion, hybrid cloud computing offers a pragmatic approach to harnessing the benefits of both public and
private clouds. It empowers organizations to optimize their IT infrastructure, enhancedisaster recovery capabilities,
and achieve a harmonious balance between flexibility and control in the digitalera.

16
17
2.1Multi-Cloud Computing:

Multi-Cloud Computing: Embracing Diversity for Resilience and Choice

Multi-cloud computing is an innovative approach in which organizations strategically use services andresources
from multiple cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud
Platform (GCP), and others. This strategy aims to leverage the strengths of different cloud platforms to enhance
resilience, reduce vendor lock-in, and achieve specific business objectives.

One of the primary motivations for adopting a multi-cloud approach is to mitigate the risks associated with
relying solely on a single cloud provider. By distributing workloads across various cloud environments,
organizations can reduce the impact of potential outages, service disruptions, or changesin a single provider's
offerings. This diversity enhances the overall resilience of their IT infrastructure.

Multi-cloud also offers organizations greater choice and flexibility. It allows them to select the most suitable
cloud services and pricing models for specific workloads or geographic regions. This flexibilityis particularly
valuable as organizations aim to optimize costs, comply with data residency requirements, or take advantage of
specialized services available on different cloud platforms.

However, implementing a multi-cloud strategy is not without its challenges. Managing and orchestrating
resources across multiple providers can be complex, requiring specialized tools and skills.Additionally, ensuring
data security, compliance, and consistent management practices across diverse environments demands careful
planning and execution.

In conclusion, multi-cloud computing represents a strategic response to the evolving cloud landscape. Itenables
organizations to maximize resilience, choice, and flexibility while addressing the challenges of complexity and
security through effective planning and management. Embracing the diversity of cloud providers is a forward-
thinking approach in a rapidly evolving digital world.

18
CHAPTER 3: RISKS AND CHALLENGES IN CLOUD COMPUTING
Cloud computing offers numerous benefits, but it also comes with several risks and
challenges that organizations must carefully address to ensure the security, privacy, and
reliability of their data and applications. Some of the key risks and challenges in cloud
computing include:

(i) Increased Security Vulnerabilities


(ii) Reduced operational Governance Control
(iii) Limited Portability b/w Cloud providers
(iv) Multi Regional Compliance and Legal issues.

3.1 : Increased Security Vulnerabilities :

Increased security vulnerability in cloud computing arises from the unique challenges posed by this technology
paradigm. While cloud computing offers numerous advantages, it also introduces specific security risks:

1. Data Breaches: Cloud services store vast amounts of data, making them attractive targets for
cybercriminals. Breaches can lead to unauthorized access to sensitive information.
2. Inadequate Access Controls: Improperly configured access controls can result in unauthorized users
gaining entry to cloud resources and data.
3. Shared Infrastructure: Multi-tenancy in cloud environments means that resources are shared among
multiple users, potentially exposing one user to the security vulnerabilities of another.
4. Compliance and Data Privacy: Meeting regulatory compliance standards, especially in multi-
regional cloud deployments, can be challenging and raises concerns about data privacy and jurisdictional
19
issues.
5. Vendor Dependency: Relying on cloud service providers for security measures can be risky, as users
may have limited control over security configurations.
6. Complexity: The complexity of cloud environments and the rapid pace of change can lead to
misconfigurations, software vulnerabilities, and security oversight.
To address these vulnerabilities, organizations must implement robust security measures, including encryption,
access controls, regular audits, and employee training. Adopting a shared responsibility model that clearly defines
the responsibilities of both cloud providers and users is essential for enhancing cloud security. Collaborative efforts
across the industry are also crucial to staying ahead of evolving security threats in the cloud.

3.2 : Reduced Operational Governance control


Reduced operational governance control in cloud computing refers to the challenges and potential lossof control
that organizations may encounter when migrating their IT infrastructure and services to the cloud. While cloud
computing offers numerous benefits, including scalability and cost-efficiency, italso introduces complexities in
managing and governing these resources effectively. Here are key aspects of reduced operational governance
control:

1. Resource Abstraction: Cloud abstracts physical infrastructure, making it challenging to maintain the
same level of visibility and control over hardware, network configurations, and data center operations.
2. Shared Responsibility: Cloud providers follow a shared responsibility model, where they manage
certain aspects of security and infrastructure, while customers are responsible for others. This division of
responsibility can create gaps in governance.
3. Multi-Tenancy: In multi-tenant cloud environments, multiple customers share the same underlying
resources. This shared environment can raise concerns about data isolation and resource contention.
4. Compliance and Auditing: Ensuring compliance with industry regulations and conducting audits can
be more complex when data and services are hosted in the cloud. Organizations must navigate shared
compliance responsibilities with their cloud provider.
5. Vendor Lock-In: Over-reliance on a specific cloud provider can limit an organization's ability to
switch providers or migrate services back in-house, reducing flexibility and governance control.

To address these challenges and maintain operational governance control in the cloud, organizations must establish
clear policies and procedures, implement robust monitoring and auditing mechanisms, and maintain a strong focus
on security, compliance, and risk management. Effective cloud governance
20
strategies are crucial to maximizing the benefits of cloud computing while maintaining control and compliance.

3.3 : Limited Portability B/w Cloud providers:

Limited portability between cloud providers refers to the challenges organizations face when attempting to
migrate their applications, data, or services from one cloud service provider to another. Several factors contribute
to this limited portability:

1. Vendor-Specific Services: Cloud providers offer proprietary services, APIs, and technologies that
may not be compatible with other providers. Organizations that heavily rely on these services may face
difficulties when transitioning.
2. Data and Format Lock-In: Data stored in one provider's format or database may not easily transfer
to another. This can lead to data migration complexities.
3. Cost and Licensing: Migrating applications and data can entail significant costs, including data egress
fees, and may require re-licensing software.
4. Operational and Skill Differences: Each cloud provider has unique operational procedures,
management tools, and skill requirements, which can hinder a smooth migration.
5. Compliance and Regulatory Challenges: Transferring data across borders or complying withregion-
specific regulations can pose additional hurdles.

To mitigate limited portability challenges, organizations should consider multi-cloud or hybrid cloud strategies
from the outset. Using containers and container orchestration platforms like Kubernetes can also enhance portability
by abstracting underlying infrastructure. Additionally, careful planning, including a comprehensive assessment of
workloads and data, is crucial to ensure successful migration between cloud providers.

3.4 : Multi-Regional Compliance a2n1d Legal Issues :


Multi-regional compliance and legal issues pertain to the challenges organizations face when operating in multiple
geographic regions, each with its own set of regulatory requirements and legal frameworks. These complexities
arise due to variations in data protection laws, privacy regulations, taxation rules, and industry-specific mandates
across different regions. Ensuring compliance across these diverse landscapes can be daunting, requiring
organizations to navigate intricate legal terrain, manage data sovereignty concerns, and address potential conflicts
between local and international regulations. It necessitates a comprehensive understanding of regional laws and
often entails developing tailored compliance strategies and robust data management practices

Liability: the data stored on the servers might be the intellectual property of an individual, company, or
community. The cloud service provider may have the luxury of locating its servers in the location of their choice.
But the ultimate liability for protecting the data rests upon the service provider itself. Here, govt can also be a
service provider and hence be liable for its safe storage and authorized usage.
Compliance: the service providers are obligated to comply with the law of the land where the data servers are
located. The noncompliance to the regulatory framework can lead to increased legal barriers, further aggravating
the time and cost overruns in implementing a particular project. Too much regulatory compliance can hamper the
business prospects, thus making the business environment rigid.

22
CHAPTER 4: Cloud Origins and Influence

Cloud computing has evolved significantly over the years, influenced by various technological,
economic, and business factors. Here is a brief overview of its origins and influence:

(i) Client/Server Computing


(ii) Distributed Computing
(iii) Grid Computing
(iv) Utility Computing

So let’us know about their origins and influence

4.1 : Client/Server Computing

Client-server architecture is a fundamental concept in cloud computing, playing a pivotal role in delivering
services and resources over the internet. In this model, two main components collaborate tofulfill computing
tasks: the client and the server.

1. Client: Clients are devices or software applications used by end-users to access services or resources.
These can be web browsers, mobile apps, or specialized software. Clients send requests to servers for
specific functions or data.
2. Server: Servers, typically hosted in remote data centers in the cloud, are robust computing machines
or virtual instances. They store and manage data, execute applications, and provide services in response
to client requests. These servers are designed for high availability, scalability, and performance.

Cloud computing enhances the client-server model by offering several advantages:

- Scalability: Cloud servers can easily scale up or down to accommodate varying workloads and
demands. This ensures that clients have consistent access to resources, even during traffic
spikes.
- Reliability: Cloud providers ensure server reliability through redundancy, backup systems, and
disaster recovery plans, minimizing downtime.
- Accessibility: Clients can access cloud-based servers from anywhere with an internet connection,
promoting remote collaboration and flexibility.
- Cost Optimization: Cloud services offer pay-as-you-go models, allowing clients to pay only for theresources
they use, reducing upfront costs and overhead.

This architecture underpins various cloud-based applications, including web hosting, databases, and IoTsystems,
making cloud computing an essential technology for modern businesses seeking scalability, cost-efficiency, and
global accessibility.

4.2 : Distributed Computing

Distributed computing in the cloud is a paradigm where computational tasks are divided and processedacross a
network of interconnected computers and servers, all of which are part of a larger cloud infrastructure. This
approach offers numerous benefits:

1. Scalability: Distributed computing in the cloud2a3llows for easy scaling of resources. As demand
increases, additional servers and computing power can be dynamically allocated to handle workloads,
ensuring efficient resource utilization.
2. Redundancy: The cloud's distributed nature provides redundancy and fault tolerance. If one server or
data center fails, the system can seamlessly switch to alternate resources, minimizing downtime and
ensuring high availability.

3. Performance: Tasks can be processed in parallel across multiple distributed nodes, resulting in
improved performance and reduced processing time. This is particularly valuable for computationally
intensive applications and big data analytics.

4. Cost Efficiency: Cloud providers offer pay-as-you-go models, so organizations only pay for the
resources they use. This eliminates the need for expensive on-premises hardware and allows for cost
optimization.

5. Global Accessibility: Distributed cloud resources can be accessed from anywhere with an internet
connection. This enables organizations to serve global audiences and facilitate remote collaboration.

6. Data Management: Distributed computing in the cloud facilitates efficient data storage and retrieval.
Data can be distributed across multiple locations for redundancy and accessed rapidly when needed.

7. Security: Cloud providers invest heavily in security measures, offering robust protection for data and
applications. Data can also be encrypted and backed up in distributed storage systems for added
security.

Overall, distributed computing in the cloud empowers organizations to leverage vast computing resources,
achieve high availability, and efficiently manage data while reducing costs and adapting tochanging
workloads and demands. It has become a cornerstone of modern IT infrastructure and application
development.

4.3 : Grid Computing

Grid computing in the context of cloud computing refers to the utilization of a distributed network of
interconnected and geographically dispersed computing resources to solve complex computational problems or
execute large-scale tasks. Unlike traditional cloud computing, where resources are typicallyowned and managed
by a single entity, grid computing leverages resources contributed by multiple organizations or institutions, often
forming a global network.

In a cloud-based grid computing environment, users can access a vast pool of computing, storage, and
processing resources on-demand, allowing them to solve computationally intensive problems efficiently. This
approach enables organizations to harness a distributed and shared infrastructure whilebenefiting from
scalability, cost-effectiveness, and flexibility. Grid computing in the cloud has applications in scientific research,
data analysis, simulations, and other data-intensive fields, offering a powerful solution for tackling complex
challenges that require significant computational power and storage capacity.

4.4 : Utility Computing


2 4
Utility computing is a cloud computing model where c o mputing resources, such as processing power, storage,
and network capacity, are provided to users or organizations on a pay-as-you-go or utility basis,similar to how
electricity or water is billed. In this model, customers only pay for the resources they actually consume, making it
a cost-effective and flexible solution.
Key characteristics of utility computing include:

1. Resource Pooling: Resources are shared among multiple users or organizations in a multi-tenant
environment. This pooling allows for efficient resource utilization and cost-sharing, as users tap into a
shared infrastructure.

2. On-Demand Provisioning: Users can quickly provision and de-provision resources as needed,
scaling up or down in response to changing workloads or demands. This agility is especially beneficial
for businesses with fluctuating computing needs.

3. Metered Billing: Users are billed based on their actual resource usage, much like a utility bill. This
cost model eliminates the need for large upfront capital investments and allows for cost optimization.

4. Flexibility: Utility computing is highly flexible, accommodating a wide range of computing tasks,
from hosting websites and applications to running data analytics and machine learning workloads.

5. Accessibility: Resources are typically accessible over the internet, enabling remote access and global
availability.

6. Managed Services: Many cloud providers offer managed services, taking care of infrastructure
maintenance, security, and updates, allowing users to focus on their core business activities.

Utility computing is widely adopted by businesses of all sizes and industries due to its cost-efficiency,
scalability, and ease of use. It empowers organizations to access and leverage computing resources without the
burden of managing complex hardware infrastructure, promoting innovation and competitiveness in today's
digital landscape.

25
CHAPTER 5 : CLOUD DELIEVERY MODELS

A cloud delievery models represents a specific , Pre-packaged combination of IT resources


offered by a cloud provider. Three common cloud delievery models havebecome widely
established and formalized.
(i) IAAS- Infrastructure – as – a – Service
(ii) PAAS – Platform – as- a – Service
(iii) SAAS- Software-as- a- Service

5.1 : IAAS-Infrastructure – as – a – Service

Infrastructure as a Service (IaaS) is a fundamental cloud computing service model that provides virtualized
computing resources over the internet. In the IaaS model, cloud providers offer a range ofinfrastructure
components, including virtual machines (VMs), storage, networking, and sometimes additional services like
load balancers and firewalls.

Users of IaaS have the flexibility to rent and manage these resources, allowing them to deploy and runtheir own
operating systems, applications, and software. This level of control makes IaaS well-suited for organizations
that require specific configurations, software environments, or custom development.

Key advantages of IaaS include scalability, as users can easily adjust resources to meet changing demands, and
cost-efficiency, as organizations only pay for the resources they consume. Additionally,IaaS eliminates the
need for physical hardware procurement and maintenance, reducing capital expenditures and operational
overhead.

IaaS serves as a foundational building block for more complex cloud deployments and application
architectures, enabling organizations to focus on their core business operations while leaving the
management of infrastructure to the cloud provider. Popular IaaS providers include Amazon Web Services
(AWS), Microsoft Azure, and Google Cloud Platform (GCP).

26
5.2 : PAAS – Platform – as – a – service

Platform as a Service (PaaS) is a cloud computing service model that provides a platform and environment for
developers to build, deploy, and manage applications without the complexities of managing underlying
infrastructure. In the PaaS model, cloud providers offer a comprehensive platformthat includes development
tools, runtime environments, databases, and other resources needed for application development and hosting.

Key features and benefits of PaaS include:

1. Development Simplification: PaaS abstracts infrastructure management, allowing developers to


focus solely on writing code and creating applications.

2. Scalability: PaaS platforms provide the capability to scale applications easily, handling increased
workloads or user demands.

3. Cost Efficiency: Users pay only for the resources and services they consume, reducing capital
expenditures and operational costs.
27
4. Faster Time to Market: PaaS accelerates application development, enabling quicker deployment
and time-to-market for software products.

5. Collaboration:PaaS platforms often include collaboration tools, making it easier for development
teams to work together, even when geographically dispersed.

6. Security and Compliance: PaaS providers typically offer security features and compliance tools to
help organizations meet their data protection and regulatory requirements.

Popular PaaS offerings include Microsoft Azure App Service, Google App Engine, and Heroku. PaaS is
particularly beneficial for organizations seeking to streamline their development processes, reduce development
time and costs, and harness

28
5.3 : SAAS- Software – as – a – Service

Software as a Service (SaaS) is a cloud computing service model that provides access to software applications
over the internet on a subscription basis. In the SaaS model, cloud providers host and maintain software
applications, making them accessible to users via web browsers. This eliminates theneed for users to install,
update, or manage the software locally, simplifying access and reducing maintenance overhead.

Key characteristics and advantages of SaaS include:

1. Accessibility: Users can access SaaS applications from any device with an internet connection,
promoting remote work and collaboration.
2. Automatic Updates: SaaS providers handle software updates, ensuring users always have access to
the latest features and security patches.
3. Scalability: SaaS solutions can easily scale to accommodate growing user bases or changing business
needs.
4. Cost Efficiency: Organizations pay for SaaS subscriptions on a per-user or consumption basis,
reducing upfront costs and providing predictable pricing.
5. Quick Deployment: SaaS applications can be deployed rapidly, enabling organizations to implement
new tools and solutions without long lead times.
6. Maintenance Outsourcing: SaaS providers manage infrastructure, security, and performance,
relieving users of these responsibilities.
Popular SaaS examples include Microsoft 365, Salesforce, Dropbox, and Zoom. SaaS is widely used across
industries for applications ranging from office productivity tools to customer relationship management (CRM)
systems, offering convenience, flexibility, and cost savings to organizations of allsizes.

29
30
ABOUT THE AUTHOR

Paper Publish at IEEE as below name,

1) FirewallPenetration Testing Paper ID M575 – The 2nd International Conference on


Computer modeling and simulation (iccms 2010)- http://iccms.org/
2) Peer-to-Peer Network Protocols ID H271 - The 2010 International Conference on
Signal Acquisition and Processing (ICSAP 2010) - http://www.icsap.org/
3) Why We Need the Intrusion Detection Prevention Systems (IDPS) In IT Company
ID E447. - 2nd International Conference on Computer Engineering and
Applications (ICCEA 2010) - http://www.iccea.org/
4) E-marketing, Unsolicited Commercial E-mail, and Legal Solutions –
Emerging Trends in Computer Science, Communication & Information Technology
(CSCIT2010)
5) Saving the World Unsolicited Email Flow - Emerging Trends in Computer Science
and Information Technology-2010
(For further information visit http://www.kkwagh.org/ETCSIT/ETCSIT10.html6)
is a member of the IEEE and the IEEE Computer Society.

REFERENCES:

1) http://www.molehillgroup.com/
2) http://www.businessinsider.com/2009/2/ibm-embraces-juniper-for-its-smart-
hybrid-cloud-disses-cisco-ibm
3) http://www.iland.com/solutions/hybrid-cloud
4) http://www.informationweek.com/news/services/business/showArticle.jhtml
?articleID=209904474
5) http://blogs.idc.com/ie/?p=190
6) http://blogs.gartner.com/nick_gall/2009/02/09/private-cloud-computing-the-
only-thing-real-so-far-is-the-desire/
7) http://www.informationweek.com/cloud-
computing/blog/archives/2009/01/milliondollar_p.html
8) http://www.it-tude.com/grid-to-cloud.html
9) http://www.theregister.co.uk/2008/04/08/google_unveils_app_engine/
10) 31
http://www.informationweek.com/news/windows/operatingsystems/showArticl
e.jhtml?articleID=216300168&cid=nl_IWK_daily_H
11)
http://www.informationweek.com/news/services/business/showArticle.jhtml?art
icleID=209904474
12) http://news.cnet.com/8301-13556_3-10150841-61.html
13) http://www.informationweek.com/cloud-
computing/blog/archives/2009/01/theres_no_such.html
14) http://www.networkworld.com/news/2008/111208-private-cloud-
networks.html
15) http://www.networkworld.com/news/2009/042709-burning-security-cloud-
computing.html
16) http://www.youtube.com/watch?v=0FacYAI6DY0
17) http://news.cnet.com/8301-13953_3-10052188-80.html
18) http://www.beet.tv/2008/09/cloud-computing.html
19) http://arstechnica.com/microsoft/news/2009/10/voice-recognition-gets-
cloudy-will-soon-rival-humans.ars

RESULTS

Cloud computing has transformed the IT landscape, delivering a host of benefits. It's enabled businessesto scale
resources, reduce costs, and increase agility. Collaboration and remote work have flourished, enhancing
productivity and work-life balance. Cloud services have democratized technology, providingsmall and large
organizations access to advanced tools. While security and compliance challenges persist, they've spurred
innovation in cloud security. Multi-cloud and hybrid strategies have gained prominence, offering redundancy and
flexibility. Edge computing has emerged, enabling real-time processing at the network edge. Cloud computing's
final results are an interconnected, adaptable, and efficient digital ecosystem that powers modern businesses and
drives technological progress.

Conclusion

In conclusion, cloud computing represents a transformative shift in the world of technology. It has revolutionized
how organizations leverage and manage IT resources, offering scalability, flexibility, andcost-efficiency. Cloud
computing has accelerated digital transformation, enabling businesses to innovate, collaborate, and scale rapidly.
However, it has also introduced new challenges related to security, compliance, and vendor lock-in, which
require careful consideration. As cloud technologies continue to evolve, their impact on various industries and
daily life is profound, fostering a dynamic andinterconnected digital ecosystem. Cloud computing has become an
indispensable tool, empowering businesses and individuals to thrive in the fast-paced, data-driven world of today
and tomorrow.

32
33

You might also like