Cloud computing

Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. The concept incorporates infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) as well as other recent (ca. 2007–2009)[6][7]technology trends that have the common theme of reliance on the Internet for satisfying the computing needs of the users. Cloud computing services usually provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers. The term cloud is used as a metaphor for the Internet, based on how the Internet is depicted in computer network diagrams, and is an abstraction for the complex infrastructure it conceals.

Brief
Comparisons
Cloud computing is often confused with grid computing ("a form of distributed computing whereby a 'super and virtual computer' is composed of a cluster of networked, loosely-coupled computers, acting in concert to perform very large tasks"), utility computing (the "packaging of computing, such as computation and storage, as a metered service similar to a traditional public utility such as electricity") and autonomic ("computer systems capable of self-management"). Indeed many cloud computing deployments as of 2009 depend on grids, have autonomic characteristics and bill like utilities — but cloud computing can be seen as a natural next step from the grid-utility model. Some successful cloud architectures have little or no centralized infrastructure or billing systems whatsoever, including peer-to-peer networks like BitTorrent and Skype and volunteer computing like http://en.wikipedia.org/wiki/SETI@home.[12][13]

Architecture
The majority of cloud computing infrastructure, as of 2009, consists of reliable services delivered through data centers and built on servers with different levels of virtualization technologies. The services are accessible anywhere that has access to networking infrastructure. The Cloud appears as a single point of access for all the computing needs of consumers. Commercial offerings need to meet the quality of service requirements of customers and typically offer service level agreements. Open standards are critical to the growth of cloud computing and open source software has provided the foundation for many cloud computing implementations.

shared infrastructure and costs. resources consumed. like a newspaper) basis with little or no upfront cost. Users can generally terminate the contract at any time (thereby avoiding return on investment risk and uncertainty) and the services are often covered by service level agreements with financial penalties.Characteristics The customers engaging in cloud computing do not own the physical infrastructure serving as host to the software platform in question.g. He argues that the cloud computing paradigm shift is similar to the displacement of electricity generators by electricity early in the 20th century. which is analogous to how traditional utilities like electricity are consumed. they avoid capital expenditure by renting usage from a third-party provider. Goggle. A side effect of this approach is that "computer capacity rises dramatically" as customers do not have to engineer for peak loads. time based. Companies IBM. as servers are not left idle. paying instead for only the resources they use. Sharing "perishable and intangible" computing power among multiple tenants can improve utilization rates. which can reduce costs significantly while increasing the speed of application development. Economics Diagram showing economics of cloud computing versus traditional IT. while others are billed on a subscription basis. rather paying a provider only for what they use. Instead. It is being adopted by individual users through large enterprises including General Electric and Procter & Gamble History . Amazon. Adoption has been enabled by "increased high-speed bandwidth" which makes it possible to receive the same response times from centralized infrastructure at other sites. They consume resources as a service. software and services. Other benefits of this time sharing style approach are low barriers to entry. Consumption is billed on a utility (e. including capital expenditure (CapEx) and operational expenditure (OpEx) Cloud computing users can avoid capital expenditure (CapEx) on hardware. According to Nicholas Carr the strategic importance of information technology is diminishing as it becomes standardized and cheaper. Microsoft and Yahoo are some of the major cloud computing service providers.g. Many cloudcomputing offerings have adopted the utility computing model. low management overhead and immediate access to a broad range of applications. like electricity) or subscription (e.

Up until the '90s data circuits (including those that carried Internet traffic) were hard-wired between destinations. self-configuring. Microsoft extended the concept of SaaS through the development of web services. and his fellows. In the '90s long haul telephone companies began offering Virtual Private Network service for data communications.which described advanced automation techniques such as self-monitoring. self-healing. and a number of universities embarking on a large scale cloud computing research project. 2007 saw increased activity. and self-optimizing in the management of complex IT systems with heterogeneous storage. It was a hot topic by mid-2008 and numerous cloud computing events had been scheduled.com was established by Marc Benioff. providing access to their systems by way of Amazon Web Services in 2005 on a utility computing basis. They also provided the concept of "On demand" and "SaaS" (Software as a Service) with their real business and successful customers. networks. In the early 2000s. The term cloud had already come into commercial use in the early 1990s to refer to large ATM networks. A common depiction in network diagrams is a cloud outline. IBM detailed these concepts in 2001 in the Autonomic Computing Manifesto -. security mechanisms. they are location in-specific as well. much like a cloud network. having found that the new cloud architecture resulted in significant internal efficiency improvements. As these VMs can be spawned on any given computer as conditions demand. The telephone companies were able to offer these VPN based services with the same guaranteed bandwidth as fixed circuits at a lower cost because they maintained the ability to switch traffic to balance utilization as they saw fit."[27] Vendor lock-in concerns Cloud computing has been criticized for limiting the freedom of users and making them dependent on the cloud computing provider. it is impossible to determine how many such VMs are going to be running at any given time. Amazon. In 1999. Parker Harris.[25]around the time the term started gaining popularity in the mainstream press. It is indeed only possible to use applications or services that the provider is . Gartner Research observed that "organizations are switching from company-owned hardware and software assets to per-use service-based models" and that the "projected shift to cloud computing will result in dramatic growth in IT products in some areas and in significant reductions in other areas. Cloud computing relies heavily on virtual machines (VMs) that are spawned on demand to meet the user's needs. Cloud Computing is very similar. The underlying concept dates back to 1960 when John McCarthy opined that "computation may someday be organized as a public utility". As a result of this arrangement it was thus impossible to determine in advance precisely what the path was going to be. indeed it shares characteristics with service bureaus which date back to the 1960s. Because these virtual instances are spawned on demand. with Goggle.[26] In August 2008. the term "cloud computing" had started to appear.[23]although most of the focus at this time was on Software as a service (SaaS). applications. IBM. and other system elements that can be virtualized across an enterprise.[22] By the turn of the 21st century. Business users have enthusiastically welcomed the resulting flexibility and speed.com played a key role in the development of cloud computing by modernizing their data centers after the dot-com bubble and. The term "telecom cloud" was used to describe this type of networking. Salesforce. They applied many technologies of consumer web sites like Google and Yahoo! to business applications.The Cloud is a term that borrows from telephony. servers. thus utilizing their overall network bandwidth more effectively. The key for SaaS is being customizable by customer alone or with a small amount of help.

Trademark 77. The "Notice of Allowance" it received in July 2008 was canceled on August 6. Despite efforts (such as US-EU Safe Harbor) to harmonize the legal environment. Richard Stallman. Users had no freedom to install new applications and needed approval from the administrator to achieve certain tasks. 2008[33]. e.S. On September 30. such as Microsoft Azure[32]. Gartner. Good OS LLC also announced their "Cloud" operating system on December 1st."[30] As such it becomes subject to complex geopolitical issues: providers must satisfy myriad regulatory environments in order to deliver service to a global market. One technology analyst and consulting firm. lists seven security issues which one should discuss with a cloud-computing vendor: . the USA PATRIOT Act and use of national security letters and the Electronic Communications Privacy Act's Stored Communications Act. it limited both freedom and creativity. the Free Software Foundation released the Affero General Public License. USPTO issued a "Notice of Allowance" to CGactive LLC (U. 2008. This dates back to the early days of the Internet. resulting in a formal rejection of the trademark application less than a week later. believes that cloud computing endangers liberties because users sacrifice their privacy and personal data to a third party. Overall. proprietary systems that would cost them more and more over time. In November 2007."[29] Political issues The Cloud spans many borders and "may be the ultimate form of globalization. Legal issues In March 2007.287) for "CloudOS". An application service provider is required to release any changes they make to Affero GPL open source code.[28] Similarly..139. Dell applied to trademark the term "cloud computing" (U." by [31] deploying local infrastructure and allowing customers to select "availability Nonetheless.[citation needed] Risk mitigation Corporations or end-users wishing to avoid not being able to access their data — or even losing it — should research vendors' policies on data security before using vendor services.082) in the United States. a version of GPLv3 designed to close a perceived legal loophole associated with Free software designed to be run over a network. as of 2009 providers such as Amazon Web Services cater to the major markets (typically the United States and the European Union) zones. The Times argues that cloud computing is a regression to that time. author Neal Stephenson envisaged this as a tiny island data haven called Kinakuta in his classic sciencefiction novel Cryptonomicon. Thus The Times compares cloud computing to old mainframes of the 1950s and 60s. Trademark 77. He stated that cloud computing "was simply a trap aimed at forcing more people to buy into locked. to which users connected via "dumb" terminals.willing to offer.355.S. where libertarian thinkers felt that "cyberspace was a distinct place calling for laws and legal institutions of its own". there are still concerns about security and privacy from individual through governmental level.g. founder of the Free Software Foundation. A cloud operating system is a generic operating system that "manage[s] the relationship between software inside the computer and on the Web". particularly software as a service.

most major cloud computing services have suffered outages and IT and business managers are able to do little when they are affected. A tactic not covered by Gartner is to encrypt the data yourself.g.. Privileged user access—inquire about who has specialized access to data and about the hiring and management of such administrators 2. then regardless of the service provider's security and encryption policies. etc. Cost is greatly reduced and capital expenditure is converted to operational expenditure. This lowers barriers to entry. If you encrypt the data using a trusted algorithm. how will data be returned and in what format In practice. Regulatory compliance—make sure a vendor is willing to undergo external audits and/or security certifications 3. do they offer complete restoration and. self-service basis near real-time. but raises concerns about loss of control over certain sensitive data. Key characteristics Agility improves with users able to rapidly and inexpensively re-provision technological infrastructure resources. PC.[37] Multi-tenancy enables sharing of resources and costs among a large pool of users. electricity. Pricing on a utility computing basis is fine-grained with usage-based options and minimal or no IT skills are required for implementation. how long that would take 6. Long-term viability—ask what will happen to data if the company goes out of business.. if so. and verifying that the checksums match the original data. Recovery—find out what will happen to data in the case of a disaster. Determining data security is harder. as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Security is often as good as or . As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet the users can connect from anywhere. Security typically improves due to centralization of data. seeing how long it takes. allowing for: Centralization of infrastructure in areas with lower costs (such as real estate.[37] Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using. Reliability improves through the use of multiple redundant sites. etc. e.) Peak-load capacity increases (users need not engineer for highest possible load-levels) Utilization and efficiency improvements for systems that are often only 10-20% utilized. without users having to engineer for peak loads. Nonetheless. Data location—ask if a provider allows for any control over the location of data 4. increased security-focused resources. one can best determine data-recovery capabilities by experiment: asking to get back old data. Investigative Support—inquire whether a vendor has the ability to investigate any inappropriate or illegal activity 7. This leads to a follow-on problem: managing private keys in a pay-on-demand computing infrastructure.1. Performance is monitored and consistent and loosely-coupled architectures are constructed using web services as the system interface. which makes it suitable for business continuity and disaster recovery. Data segregation—make sure that encryption is available at all stages and that these "encryption schemes were designed and tested by experienced professionals" 5. mobile. Scalability via dynamic ("on-demand") provisioning of resources on a fine-grained. the data will only be accessible with the decryption keys.

more efficient systems. computers and associated infrastructure are major consumers of energy. Providers typically log accesses. ongoing operation. Zonbu. iPhone. gOS-based systems) Thick client / Web browser (Google Chrome. For example: Peer-to-peer / volunteer computing (Bittorrent. and carbon neutrality.[46] Components Six layers components of cloud computing Application A cloud application leverages the Cloud in software architecture. SAP and Salesforce) Software plus services (Microsoft Online Services) Client A cloud client consists of computer hardware and/or computer software which relies on cloud computing for application delivery. is essentially useless without it. in either case. in part because providers are able to devote resources to solving security issues that many customers cannot afford. Mozilla Firefox) Infrastructure . Sustainability comes about through improved resource utilization. often eliminating the need to install and run the application on the customer's own computer. but accessing the audit logs themselves can be difficult or impossible. BOINC Projects.better than traditional systems.[44][45] Nonetheless. thus alleviating the burden of software maintenance. or which is specifically designed for delivery of cloud services and which. and support. Windows Mobile) Thin client (CherryPal. Skype) Web application (Facebook) Software as a service (Google Apps. For example: Mobile (Android.

MobileMe push functions) Web service (Amazon Simple Storage Service. The SNIA is creating standards for Cloud Storage. Nirvanix SDN) Backup (Backup Direct. Software plus services.Cloud infrastructure. For example. software. e. including database-like services. Skytap) Grid computing (Sun Grid) Management (RightScale) Compute (Amazon Elastic Compute Cloud) Platform (Force. For example: Database (Amazon SimpleDB. PayPal) Mapping (Google Maps. per gigabyte per month. is the delivery of computer infrastructure. services and solutions that are delivered and consumed in real-time over the Internet". Web Services ("software system[s] designed to support interoperable machine-to-machine interaction over a network") which may be accessed by other cloud computing components. Nirvanix CloudNAS) Synchronization (Live Mesh Live Desktop component.NET (Azure Services Platform) Web hosting (Mosso) Proprietary (Force. Google Checkout. For example: Web application frameworks Python Django (Google App Engine) Ruby on Rails (Heroku) . Yahoo! Maps) Search (Alexa. and/or solution stack as a service.com) Service A cloud service includes "products. as a service.. Iron Mountain Inc services) Cloud storage can be delivered as a service to cloud computing. Architecture . OpenID) Integration (Amazon Simple Queue Service) Payments (Amazon Flexible Payments Service. or end users directly.g. e. typically a platform virtualization environment. facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. or can be delivered to end points directly. Google Custom Search. Google App Engine's BigTable datastore) Network attached storage (MobileMe iDisk. Yahoo! BOSS) Others (Amazon Mechanical Turk) Storage Cloud storage involves the delivery of data storage as a service.com) Platform A cloud platform. such as Platform as a service. often billed on a utility computing basis.[55] For example: Full virtualization (GoGrid.[58] Specific examples include: Identity (OAuth. the delivery of a computing platform. such as Infrastructure as a service..g.

Hybrid cloud . Complexity is controlled and the resulting systems are more manageable than their monolithic counterparts.Cloud computing sample architecture Cloud architecture. Cloud storage architecture is loosely coupled. Cloud architecture extends to the client. via web applications/web services. It typically involves multiple cloud components communicating [61] with each other over application programming interfaces. whereby resources are dynamically provisioned on a fine-grained. where metadata operations are centralized enabling the data nodes to scale into the hundreds. comprises hardware and software designed by a cloud architect who typically works for a cloud integrator. This closely resembles the Unix philosophy of having multiple programs doing one thing well and working together over universal interfaces. where web browsers and/or software applications access cloud applications. Types Cloud computing types Public cloud Public cloud or external cloud describes cloud computing in the traditional mainstream sense. usually web services. each independently delivering data to applications or users. self-service basis over the Internet.[60] the systems architecture of the software systems involved in the delivery of cloud computing. from an off-site third-party provider who shares resources and bills on a finegrained utility computing basis.

fast-moving groups to add new features faster and easier. like most computer networks. Some organizations realize a subset of the benefits of cloud computing by becoming "internal" cloud providers and servicing themselves. were using as little as 10% of its capacity at any one time just to leave room for occasional spikes.[24] The companies listed in the Components section are providers. They have been criticized on the basis that users "still have to buy. and they went on to open it up to outsiders as Amazon Web Services in 2002 on a utility computing basis. and server consolidation and virtualization rollouts are already well underway. These (typically virtualization automation) products claim to "deliver some benefits of cloud computing without the pitfalls". significant operational efficiency and agility advantages can be realized. and that future datacenters will look like internal clouds. Amazon. Private cloud Private cloud and internal cloud are neologisms that some vendors have recently used to describe offerings that emulate cloud computing on private networks. even by small organizations. which is being addressed via a community effort to create a bill of rights. While an analyst predicted in 2008 that private cloud networks would be the future of corporate IT. The rights of users is also an issue. although they do not benefit from the same economies of scale and still have to engineer for peak loads. User A user is a consumer of cloud computing. Nonetheless. and manage them" and as such do not benefit from lower up-front capital costs and less hands-on management. capitalizing on data security. Usually this requires significant resources and expertise in building and managing next-generation data centers. corporate governance. for example in reference to platform as a service offerings. The privacy of users in cloud computing has become of increasing concern. Analysts also claim that within five years a "huge percentage" of small and medium enterprises will get most of their computing resources from external cloud computing providers as they "will not have economies of scale to make it worth staying in the IT business" or be able to afford private clouds. Roles Provider A cloud computing provider or cloud computing service provider owns and operates live cloud computing systems to deliver service to third parties. particularly for the financial services. and reliability concerns. though such offerings including Microsoft's Azure Services Platform are not available for on-premises deployment. The term has also been used in the logical rather than physical sense. Analysts have reported on Platform's view that private clouds are a stepping stone to external clouds. This allowed small.com was the first such provider. modernizing its data centers which. The barrier to entry is also significantly higher with capital expenditure required and billing and management creates some overhead. there is some uncertainty whether they are a reality even within the same firm. build.A hybrid cloud environment consisting of multiple internal and/or external providers "will be typical for most enterprises". essentially "[lacking] the economic model that makes cloud computing such an intriguing concept". Vendor .

Some vendors sell or give products and services that facilitate the delivery. including:[82] Application Communications (HTTP. Juniper Networks. Eucalyptus. For example: Computer hardware (Dell. EMC. have facilitated the growth of cloud computing. Sun Microsystems) Storage (Sun Microsystems. Hadoop) Operating systems (Solaris. Brocade Communications) Computer software (3tera. Sun xVM. HP. IBM) Infrastructure (Cisco Systems. IBM. SSL/TLS[83]) Syndication (Atom) Client Browsers (AJAX) Offline (HTML 5) Implementations Virtualization (OVF[84]) Platform Solution stacks (LAMP) Service Data (XML. XMPP) Security (OAuth. open standards. Microsoft. OpenID. g-Eclipse. typically lightweight. AIX. IBM. adoption and use of cloud computing. Linux KVM. VMware. Linux including Red Hat[80] and Ubuntu[81]) Platform virtualization (Citrix. a number of existing. JSON) Web Services (REST) Storage . Xen) Standards Cloud standards.

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.