N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University
N. GSU Slide 2 Chapter 04 Review and Introduction
N. GSU Slide 3 Chapter 04 Cloud Computing and Service Models Datacenter Design and Interconnection Networks Architectural Design of Computing Clouds Cloud Platforms and Service Models Resource Management and Design Challenges Cloud Security and Trust Management Homework Problems Chapter 05 Main Contents
N. GSU Slide 4 Chapter 04 Public, Private, and Hybrid Clouds
N. GSU Slide 5 Chapter 04 Over Open Internet
N. GSU Slide 6 Chapter 04 Cloud Design Objectives Shifting Computing from Desktops to Datacenters Service Provisioning and Cloud Economics Scalability in Performance Data Privacy Protection High Quality of Cloud Services New Standards and Interfaces
N. GSU Slide 7 Chapter 04 Cloud Ecosystem and Cost Model
N. GSU Slide 8 Chapter 04 Cloud Ecosystem for Building Private Clouds
N. GSU Slide 9 Chapter 04 Popular Cloud Service Models
N. GSU Slide 10 Chapter 04 Customized Cloud Services
N. GSU Slide 11 Chapter 04 Datacenter Growth and Cost Breakdown
N. GSU Slide 12 Chapter 04 Warehouse-Scale Datacenter Design
N. GSU Slide 13 Chapter 04 Cooling System of a Datacenter Room
N. GSU Slide 14 Chapter 04 Datacenter Interconnection Networks Specific Design Considerations: Application Traffic Support Network Expandability Fault Tolerance and Graceful Degradation Switch-centric Datacenter Design
N. GSU Slide 15 Chapter 04 Fat-tree Switch Network Design
N. GSU Slide 16 Chapter 04 Modular Datacenters in Containers
N. GSU Slide 17 Chapter 04 Interconnection among Modular Datacenters
N. GSU Slide 18 Chapter 04 Modularized Datacenter Cube network
N. GSU Slide 19 Chapter 04 Datacenter Management Issues Making the Common Users Happy Controlled Information Flows Multi-User Manageability Scalability in Database Growth Reliability in Virtualized Infrastructure Lowered Costs to both Users and Providers Security Enforcement and Data Protection Green Information Technology
N. GSU Slide 20 Chapter 04 Google Datacenter Health Monitoring Infrastructure
N. GSU Slide 21 Chapter 04 Marketplaces in Cloud computing Services
N. GSU Slide 22 Chapter 04 Enabling Technologies for Clouds
N. GSU Slide 23 Chapter 04 A Generic Cloud Architecture
N. GSU Slide 24 Chapter 04 Layered Cloud Architectural Development
N. GSU Slide 25 Chapter 04 System Virtualization
N. GSU Slide 26 Chapter 04 Virtualization Tools
N. GSU Slide 27 Chapter 04 VM Cloning for Disaster Recovery
N. GSU Slide 28 Chapter 04 Virtualization Support in Public Clouds
N. GSU Slide 29 Chapter 04 Data and Software Protection Techniques Data Integrity and Privacy Protection Data Coloring and Cloud Watermarking Data Lock-in Problem and Proactive Solutions
N. GSU Slide 30 Chapter 04 The Concept of Data Coloring
N. GSU Slide 31 Chapter 04 Cloud Watermarking for Trust Management
N. GSU Slide 32 Chapter 04 Five Levels of Cloud Players in Industry
N. GSU Slide 33 Chapter 04 Major Cloud Providers and Service Offerings
N. GSU Slide 34 Chapter 04 Six Layers of Cloud Services
N. GSU Slide 35 Chapter 04 Three Classes of Cloud Players
N. GSU Slide 36 Chapter 04 Software Stack for Cloud Computing
N. GSU Slide 37 Chapter 04 Cloud Service Stack
N. GSU Slide 38 Chapter 04 Application Cloud Services Tasks
N. GSU Slide 39 Chapter 04 Resource Provisioning and Platform Deployment
N. GSU Slide 40 Chapter 04 Provisioning of Storage Resources
N. GSU Slide 41 Chapter 04 Resource Provisioning Strategies
N. GSU Slide 42 Chapter 04 Virtual Machine Creation and Management
N. GSU Slide 43 Chapter 04 Benchmark Experiments on an InterGrid Testbed over The Grid’5000
N. GSU Slide 44 Chapter 04 Cloud Loading Results
N. GSU Slide 45 Chapter 04 Basic Cloud Security Protection of servers from malicious software attacks like worms, viruses, and malwares. Protection of hypervisors or VM monitors from software based attacks and vulnerabilities. Protection of VMs and monitors from service disruption and denial of service attacks. Protection of data and information from theft, corruption and natural disasters. Providing authenticated and authorized access to critical data and services
N. GSU Slide 46 Chapter 04 Mapping of Cloud Models to Various Security Measures
N. GSU Slide 47 Chapter 04 Cloud Defense Methods
N. GSU Slide 48 Chapter 04 Cloud Security Deployment by Vordel Company
N. GSU Slide 49 Chapter 04 Distributed Defense against DDoS Flooding Attacks
N. GSU Slide 50 Chapter 04 DDoS Attacks Over Multiple Network Domains
N. GSU Slide 51 Chapter 04 Man-in-The–Middle Attacks
N. GSU Slide 52 Chapter 04 Reputation System Design Options
N. GSU Slide 53 Chapter 04 Trust Overlay Networks
N. GSU Slide 54 Chapter 04 Some References and Further Reading
N. GSU Slide 55 Chapter 04 Homework Problems
N. GSU Slide 56 Chapter 04 Homework Problems