Cloud computing is a new business computing paradigm that is based on the concepts of virtualization, multi-tenancy, and shared infrastructure. It is an effort to nudge the business computing model towards a âPay-as-you-goâ approach from the traditional âOwn-and-Useâ model. The Holy Grail is to eventually establish all types of computing as the fifth utility. A cloud system can be deployed in multiple ways depending on the business needs of an enterprise, either as a public, private or a hybrid implementation. Recently, other derivative deployment models like Community clouds and private rental clouds where an enterprise can rent a modular data center can also be seen. Cloud services can be consumed in three ways viz. Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) with decreasing service abstraction levels respectively. The benefits of clouds are realized through resource sharing. The basic idea is to share large pools of resources like compute cycles or virtual CPUs (VCPUs), storage, software services etc. This very idea of resource sharing gives rise to significant security concerns for a user, especially with respect to his/her data and/or applications which are hosted in the cloud providerâs data centers. This security and privacy issue becomes grave in case of the IaaS deployment model which allows a user to set up their virtual infrastructure in clouds. IaaS has the lowest abstraction level and allows a user to create their virtual infrastructure by choosing the desirable configuration in terms of OS, storage space, number of VCPUâs, RAM size etc. A cloud provider is only responsible up to the hypervisor level, for security and maintenance of the infrastructure. (Establishing Trust in Public Clouds, Jogesh K Muppala)
Last date updated on April, 2024