Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

IT Industry & Cloud Computing. Trends ‘2011- The year of high salaries and immense job opportunities for IT job seekers’ (Source – Blog.Timesjobs.com)
System Center 2012 R2 Overview
Profit from the cloud TM Parallels Dynamic Infrastructure AndOpenStack.
By Adam Balla & Wachiu Siu
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Modified by: Masud-Ul-Hasan and Ahmad Al-Yamani 1 Chapter 11 Network Management (Selected Topics)
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Oyinkan Adedun Adeleye Caitlyn Carney Tyler Nguyen.
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
ProjectWise Virtualization Kevin Boland. What is Virtualization? Virtualization is a technique for deploying technologies. Virtualization creates a level.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
Plan Introduction What is Cloud Computing?
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Cisco and OpenStack Lew Tucker VP/CTO Cloud Computing Cisco Systems,
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Cloud Computing in Large Scale Projects George Bourmas Sales Consulting Manager Database & Options.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Cloud Computing.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
In the name of God :).
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
Understanding Virtualization Introduction. Basic computing is always bound by its limitations, usually physical. You can only store as much data as you.
Windows Azure Conference 2014 Deploy your Java workloads on Windows Azure.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco Confidential Cloud Computing – The Value Proposition Wayne Clark Architect, Intelligent Network.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing - 2 Instructor: Pankaj Mehra Teaching Assistant: Raghav Gautam Lec. 6 April 22, 2010 ISM 158.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Cloud Computing Use Case Draft v2.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
Microsoft Cloud Solution.  What is the cloud?  Windows Azure  What services does it offer?  How does it all work?  How to go about using it  Further.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
CLOUD COMPUTING ARCHITECTURES & APPLICATIONS LECTURERS LAZAR KIRCHEV, PhD ILIYAN NENOV KRUM BAKALSKY 21 March, 2011 LECTURE #6 ARCHITECTURE OF CLOUD APPLICATIONS.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Clouding with Microsoft Azure
Dr. Ir. Yeffry Handoko Putra
Unit 3 Virtualization.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Cloud Faxing for Law Firms
Understanding The Cloud
Cloud computing-The Future Technologies
Introduction to Cloud Computing
CLOUD COMPUTING Presented By:- EduTechlearners
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Concept of VLAN (Virtual LAN) and Benefits
3 Cloud Computing.
Computer Science and Engineering
NIST Cloud Computing Reference Architecture
Cloud Computing LegalRun Solutions Why It’s Right for You!
IT Management Services Infrastructure Services
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper

Government Initiatives and Cloud Standards Government Cloud Initiatives (e.g. GSA, DoD) Use Cases with Timelines (e.g. GSA, DoD, Use Case Group) Required Standards for Use Cases (e.g. Use Case Group) Standards Groups Coordination (e.g. Standards Groups) Cloud Standards Roadmap (e.g. NIST) C Map to Addressed by To Produce Create

Cloud Computing: Standards Roadmap Process Cloud Computing will produce major changes in the deployment and delivery of software services Several governments have launched leading edge Cloud Computing initiatives for internal and citizen applications The initiatives have developed phased strategies for implementing Cloud Use Cases Cloud standards are a major concern for governments and large enterprises to reduce costs and simplify operations The Cloud Standards groups are coordinating their work to ensure that required standards are available when needed Government initiatives and standards groups are working together on a Cloud Standards Roadmap for the future

Use Cases

Cloud Use Cases

Cloud Use Cases (continued) (SaaS, Middleware. Storage, VMs)

Standards Requirements

General Requirement Categories Common VM Formats, Data Formats and APIs: Virtual machines, data and applications created for one cloud provider should run on another cloud provider without changes. Cloud Management: Cloud computing is not feasible without service management, governance, metering, monitoring, federated identity, SLAs and benchmarks, data and application federation, deployment, and lifecycle management. Security: Security in cloud computing is vital, although the requirements for security will vary widely depending on the application and data types. Location awareness: A way of identifying the location of the physical machine hosting the cloud infrastructure is an absolute requirement for many government regulations.

Requirements -1 Identity: The cloud service must authenticate the end user An open client: Access to the cloud service should not require a particular platform or technology Security: Security (including privacy) is a common requirement to all use cases, although the details of those requirements will vary widely from one use case to the next. A full discussion of security in cloud computing is beyond the scope of this paper SLAs: Although service level agreements for end users will usually be much simpler than those for enterprises, cloud vendors must be clear about what guarantees of service they provide. Federated identity: In addition to basic the identity needed by an end user, an enterprise user is likely to have an identity with the enterprise. The ideal is that the enterprise user manages a single ID, with an infrastructure federating other identities that might be required by cloud services.

Requirements -2 Location awareness: Depending on the kind of data the enterprise is managing on the user's behalf, there might be legal restrictions on the location of the physical server where the data is stored. Although this violates the cloud computing ideal that the user should not have to know details of the physical infrastructure, this requirement is essential. Many applications cannot be moved to the cloud until cloud vendors provide an API for determining the location of the physical hardware that delivers the cloud service. Management and Governance: Public cloud providers make it very easy to open an account and begin using cloud services; that ease of use creates the risk that individuals in an enterprise will use cloud services on their own initiative. Management of VMs and of cloud services such as storage, databases and message queues is needed to track what services are used. Governance is crucial to ensure that policies and government regulations are followed wherever cloud computing is used. Other governance requirements will be industry- and geography-specific.

Requirements -3 Metering and monitoring: All cloud services must be metered and monitored for cost control, charge backs and provisioning. Security: Any use case involving an enterprise will have more sophisticated security requirements than one involving a single end user. Similarly, the more advanced enterprise use cases to follow will have equally more advanced security requirements. A Common File Format for VMs: A VM created for one cloud vendor’s platform should be portable to another vendor’s platform. Data and Application Federation: Enterprise applications need to combine data from multiple cloud-based sources, and they need to coordinate the activities of applications running in different clouds. Interoperability: When more than one enterprise is involved, interoperability between the enterprises is essential.

Requirements - 4 Lifecycle Management: Enterprises must be able to manage the lifecycle of applications and documents. This requirement includes versioning of applications and the retention and destruction of data. Discovery is a major issue for many organizations. There are substantial legal liabilities if certain data is no longer available. In addition to data retention, in some cases an enterprise will want to make sure data is destroyed at some point. Common APIs for Cloud Storage and Middleware: The enterprise use cases require common APIs for access to cloud storage services, cloud databases, and other cloud middleware services such as message queues. Writing custom code that works only for a particular vendor’s cloud service locks the enterprise into that vendor’s system and eliminates some of the financial benefits and flexibility that cloud computing provides. SLAs and Benchmarks: In addition to the basic SLAs required by end users, enterprises who sign contracts based on SLAs will need a standard way of benchmarking performance. There must be an unambiguous way of defining what a cloud provider will deliver, and there must be an unambiguous way of measuring what was actually delivered.

Requirements - 5 Deployment: It should be simple to build a VM image and deploy it to the cloud as necessary. When that VM image is built, it should be possible to move that image from one cloud provider to another. Deployment of applications to the cloud should be straightforward as well. Industry-specific standards and protocols: Many cloud computing solutions between enterprises will use existing standards such as RosettaNet or OAGIS. The applicable standards will vary from one application to the next and from one industry to the next. Transactions and concurrency: For applications and data shared by different enterprises, transactions and concurrency are vital. If two enterprises are using the same cloud-hosted application, VM, middleware or storage, it's important that any changes made by either enterprise are done reliably.

Standards Requirements Mapped to Use Cases

Requirements Mapped to Use Cases