Professional Documents
Culture Documents
SMARTEVENT 2010
September 23
Sophia Antipolis
Christian GOIRE
Cloud Computing Definition(s)
Gartner’s definition :
"a style of computing where
scalable and elastic IT-
related capabilities are
provided 'as a service' to
external customers using
Internet technologies."
Built on compute and storage virtualization, provides
scalable, network-centric, abstracted IT infrastructure,
platforms, and applications as on-demand services
that are billed by consumption.
Cloud computing is a model for enabling convenient, on-demand
network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with minimal
management effort or service provider interaction.
This cloud model promotes availability and is composed of five essential
characteristics, three service models, and four deployment models.
08/12/21 NIST Definition
2
The NIST Cloud Definition Framework
Deployment Hybrid Clouds
Models
Private Community
Public Cloud
Cloud Cloud
Common
Massive Scale Resilient Computing
Character-
istics Homogeneity Geographic Distribution
Virtualization Service Orientation
Low Cost Software Advanced Security
08/12/21 3
3 main
Services
Models
08/12/21 4
Cloud Providers – A Birds Eye View
Infrastructure
Infrastructure Platform
Platform Software
Software
as
asaaService
Service as
asaaService
Service as
asaaService
Service
08/12/21 5
Main aspects forming a cloud system
08/12/21 6
Expert group report (Excerpts)
Elasticity
Reliability
Quality of Service
Availability
08/12/21 7
Continued (2)
Economic aspects
Cost reduction
Return of investment
Going Green
08/12/21 8
Continued (3)
Technological Aspects
Virtualisation
Multi- tenancy
Data Management
Metering
Tools
08/12/21 9
Research time line (in year) of the
individual topics
08/12/21 10
Security and Privacy Challenges
08/12/21 11
Technical risks
Resource exhaustion
Isolation failure
Cloud provider malicious insider, abuse of high privilege
Management interface compromise
Intercepting data in transit
Data leakage on up /download, intra- cloud
Insecure or ineffective deletion of data
Distributed Denial of service DDoS
Economic denial of service EDOS
Loss of encryption keys
Undertaking malicious probes and scans
Compromise service engine
Conflicts between customer procedures and cloud
08/12/21 12
Policy and organizational risks
Lock -in
Loss of governance
Compliance challenges
Loss of business reputation due to co -tenant activities
Cloud service termination or failure
Cloud provider acquisition
Supply chain failure
08/12/21 13
Legal risk
08/12/21 14
Research recommendations
Certification
processes and
standards for
the Cloud
08/12/21 15
Research recommendations
08/12/21 16
Legal recommendations
08/12/21 17
Conclusion
08/12/21 18