N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.

Slides:



Advertisements
Similar presentations
Trust Management of Services in Cloud Environments:
Advertisements

Lecture 12 IaaS Chapter 3 of the second reference book.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Introduction to Distributed Systems
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Data-Center Traffic Management COS 597E: Software Defined Networking.
DISTRIBUTED COMPUTING
Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Cloud Usability Framework
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Introduction to Cloud Computing
Sanbolic Enabling the Always-On Enterprise Company Overview.
4.4 Public Cloud Platforms: GAE, AWS, and AZURE
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
4. Cloud Platform Architecture over Virtualized Data Centers
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
N. GSU Slide 1 Chapter 02 Cloud Computing Systems N. Xiong Georgia State University.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
SUNY FARMINGDALE Computer Programming & Information Systems BCS451 – Cloud Computing Prof. Tolga Tohumcu.
For Testbeds TM. Secure, multi-tenant cloud orchestration platform –Turnkey platform for delivering IaaS clouds –Hypervisor agnostic –Massively scalable,
N. GSU Slide 1 Chapter 05 Clustered Systems for Massive Parallelism N. Xiong Georgia State University.
Introduction The network is the computer By Waseem Anwar Chaudhri.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Towards Constraint-based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization Speaker : 吳靖緯 MA0G0101.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
Secui.com Goh, Kyeongwon Secui.com Goh, Kyeongwon GRID Security Infrastructure
Cloud Interoperability & Standards. Scalability and Fault Tolerance Fault tolerance is the property that enables a system to continue operating properly.
VMware vSphere Configuration and Management v6
Virtual techdays INDIA │ august 2010 Cloud Computing – What and How ? Sandeep J Alur │ Microsoft India.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Chapter 8 – Cloud Computing
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Cloud computing: IaaS. IaaS is the simplest cloud offerings. IaaS is the simplest cloud offerings. It is an evolution of virtual private server offerings.
Alfresco on Azure Shah Rahman Founder and CEO, CloudlyIO.
IETF95.
SDN/NFV DDoS Requirements "The Mobile Use Case – 5G" Bipin Mistry, VP Product Management © 2015 Corero
INFSO-RI Enabling Grids for E-sciencE Grid & Cloud Computing Introduction
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Designing Cisco Data Center Unified Fabric
CMSC 818J: Privacy enhancing technologies Lecture 2.
Securing Information Systems
Chapter 1 Characterization of Distributed Systems
Chapter 6: Securing the Cloud
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Exam 1 Study Guide Cs 595 Lecture 17.
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
Cloud Testing Shilpi Chugh.
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Azure Availability, Reliability, and Performance
3 Cloud Computing.
Introduction to Cyberspace
Cloud Computing: Concepts
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University

N. GSU Slide 2 Chapter 04 Review and Introduction

N. GSU Slide 3 Chapter 04 Cloud Computing and Service Models Datacenter Design and Interconnection Networks Architectural Design of Computing Clouds Cloud Platforms and Service Models Resource Management and Design Challenges Cloud Security and Trust Management Homework Problems Chapter 05 Main Contents

N. GSU Slide 4 Chapter 04 Public, Private, and Hybrid Clouds

N. GSU Slide 5 Chapter 04 Over Open Internet

N. GSU Slide 6 Chapter 04 Cloud Design Objectives Shifting Computing from Desktops to Datacenters Service Provisioning and Cloud Economics Scalability in Performance Data Privacy Protection High Quality of Cloud Services New Standards and Interfaces

N. GSU Slide 7 Chapter 04 Cloud Ecosystem and Cost Model

N. GSU Slide 8 Chapter 04 Cloud Ecosystem for Building Private Clouds

N. GSU Slide 9 Chapter 04 Popular Cloud Service Models

N. GSU Slide 10 Chapter 04 Customized Cloud Services

N. GSU Slide 11 Chapter 04 Datacenter Growth and Cost Breakdown

N. GSU Slide 12 Chapter 04 Warehouse-Scale Datacenter Design

N. GSU Slide 13 Chapter 04 Cooling System of a Datacenter Room

N. GSU Slide 14 Chapter 04 Datacenter Interconnection Networks Specific Design Considerations:  Application Traffic Support  Network Expandability  Fault Tolerance and Graceful Degradation  Switch-centric Datacenter Design

N. GSU Slide 15 Chapter 04 Fat-tree Switch Network Design

N. GSU Slide 16 Chapter 04 Modular Datacenters in Containers

N. GSU Slide 17 Chapter 04 Interconnection among Modular Datacenters

N. GSU Slide 18 Chapter 04 Modularized Datacenter Cube network

N. GSU Slide 19 Chapter 04 Datacenter Management Issues Making the Common Users Happy Controlled Information Flows Multi-User Manageability Scalability in Database Growth Reliability in Virtualized Infrastructure Lowered Costs to both Users and Providers Security Enforcement and Data Protection Green Information Technology

N. GSU Slide 20 Chapter 04 Google Datacenter Health Monitoring Infrastructure

N. GSU Slide 21 Chapter 04 Marketplaces in Cloud computing Services

N. GSU Slide 22 Chapter 04 Enabling Technologies for Clouds

N. GSU Slide 23 Chapter 04 A Generic Cloud Architecture

N. GSU Slide 24 Chapter 04 Layered Cloud Architectural Development

N. GSU Slide 25 Chapter 04 System Virtualization

N. GSU Slide 26 Chapter 04 Virtualization Tools

N. GSU Slide 27 Chapter 04 VM Cloning for Disaster Recovery

N. GSU Slide 28 Chapter 04 Virtualization Support in Public Clouds

N. GSU Slide 29 Chapter 04 Data and Software Protection Techniques Data Integrity and Privacy Protection Data Coloring and Cloud Watermarking Data Lock-in Problem and Proactive Solutions

N. GSU Slide 30 Chapter 04 The Concept of Data Coloring

N. GSU Slide 31 Chapter 04 Cloud Watermarking for Trust Management

N. GSU Slide 32 Chapter 04 Five Levels of Cloud Players in Industry

N. GSU Slide 33 Chapter 04 Major Cloud Providers and Service Offerings

N. GSU Slide 34 Chapter 04 Six Layers of Cloud Services

N. GSU Slide 35 Chapter 04 Three Classes of Cloud Players

N. GSU Slide 36 Chapter 04 Software Stack for Cloud Computing

N. GSU Slide 37 Chapter 04 Cloud Service Stack

N. GSU Slide 38 Chapter 04 Application Cloud Services Tasks

N. GSU Slide 39 Chapter 04 Resource Provisioning and Platform Deployment

N. GSU Slide 40 Chapter 04 Provisioning of Storage Resources

N. GSU Slide 41 Chapter 04 Resource Provisioning Strategies

N. GSU Slide 42 Chapter 04 Virtual Machine Creation and Management

N. GSU Slide 43 Chapter 04 Benchmark Experiments on an InterGrid Testbed over The Grid’5000

N. GSU Slide 44 Chapter 04 Cloud Loading Results

N. GSU Slide 45 Chapter 04 Basic Cloud Security Protection of servers from malicious software attacks like worms, viruses, and malwares. Protection of hypervisors or VM monitors from software based attacks and vulnerabilities. Protection of VMs and monitors from service disruption and denial of service attacks. Protection of data and information from theft, corruption and natural disasters. Providing authenticated and authorized access to critical data and services

N. GSU Slide 46 Chapter 04 Mapping of Cloud Models to Various Security Measures

N. GSU Slide 47 Chapter 04 Cloud Defense Methods

N. GSU Slide 48 Chapter 04 Cloud Security Deployment by Vordel Company

N. GSU Slide 49 Chapter 04 Distributed Defense against DDoS Flooding Attacks

N. GSU Slide 50 Chapter 04 DDoS Attacks Over Multiple Network Domains

N. GSU Slide 51 Chapter 04 Man-in-The–Middle Attacks

N. GSU Slide 52 Chapter 04 Reputation System Design Options

N. GSU Slide 53 Chapter 04 Trust Overlay Networks

N. GSU Slide 54 Chapter 04 Some References and Further Reading

N. GSU Slide 55 Chapter 04 Homework Problems

N. GSU Slide 56 Chapter 04 Homework Problems