Nama :
Tera Nurul Harfiah
Kelas :
4ia10
NPM :
56410863
Tugas 2 - CLOUD COMPUTING
1.
Cloud computing in general can be
portrayed as a synonym for distributed computing over a network, with the ability to
run a program or application on many connected computers at the same time. It
specifically refers to a computing hardware machine or group of computing
hardware machines commonly referred as a server connected through acommunication network such as the Internet, an intranet, a local area network (LAN) or wide area
network (WAN) and
individual users or user who have permission to access the server can use the
server's processing power for their individual computing needs like to run an
application, store data or any other computing need. Therefore, instead of
using a personal computer every-time to run the application, the individual can
now run the application from anywhere in the world, as the server provides the
processing power to the application and the server is also connected to a
network via internet or other connection platforms to be accessed from anywhere [30]. All this has become possible due to
increasing computer processing power available to humankind with decrease in
cost as stated in Moore's law.
In common usage,
the term "the cloud" is essentially a metaphor for the Internet. Marketers have further popularized the
phrase "in the cloud" to refer to software, platforms and
infrastructure that are sold "as a
service", i.e. remotely through the Internet. Typically, the
seller has actual energy-consuming servers which host products and services
from a remote location, so end-users don't have to; they can simply log on to
the network without installing anything. The major models of cloud computing
service are known as software as a service, platform as a service, and infrastructure as a service.These cloud
services may be offered in a public, private or hybrid network. Google, Amazon,
IBM, Oracle Cloud, Rackspace, Salesforce, Zoho and Microsoft Azure are some
well-known cloud vendors.
Network-based
services, which appear to be provided by real server hardware and are in fact
served up by virtual hardware simulated by software running on one or more real
machines, are often called cloud computing. Such virtual servers do not
physically exist and can therefore be moved around and scaled up or down on the
fly without affecting the end user, somewhat like a cloud becoming larger or
smaller without being a physical object.
The cloud also
focuses on maximizing the effectiveness of the shared resources. Cloud
resources are usually not only shared by multiple users but are also
dynamically reallocated per demand. This can work for allocating resources to
users. For example, a cloud computer facility that serves European users during
European business hours with a specific application (e.g., email) may
reallocate the same resources to serve North American users during North
America's business hours with a different application (e.g., a web server).
This approach should maximize the use of computing power thus reducing environmental
damage as well since less power, air conditioning, rackspace, etc. are required
for a variety of functions. With cloud computing, multiple users can access a
single server to retrieve and update their data without purchasing licenses for
different applications.
The term
"moving to cloud" also refers to an organization moving away from a
traditional CAPEX model
(buy the dedicated hardware and depreciate it over a period of time) to theOPEX model (use a shared cloud
infrastructure and pay as one uses it).
Proponents claim
that cloud computing allows companies to avoid upfront infrastructure costs,
and focus on projects that differentiate their businesses instead of
infrastructure. Proponents also claim that cloud computing allows enterprises to
get their applications up and running faster, with improved manageability and
less maintenance, and enables IT to more rapidly adjust resources to meet
fluctuating and unpredictable business demand. Cloud providers typically use a
"pay as you go" model. This can lead to unexpectedly high charges if
administrators do not adapt to the cloud pricing model.
- 4 Basic
Principle of Cloud Computing
Cloud computing is
one of the best ways to reduce your IT cost and complexity all while helping to
optimize your workload and provide the highest possible availability to your
user base. Cloud computing utilizes a dynamic infrastructure that is
specifically designed to provide more services and capacity while using fewer
server resources. One of the best ways to implement a cloud computing solution
is with IBM Power Systems.
In fact, IBM Power
Systems is in an ideal solution for cloud environments. There are a
number of ways in which IBM Power Systems can be the foundation for your cloud,
and a number of options to get you there.
a. The Right Kind of
Workload Optimization
At the
core of cloud computing is this idea of optimizing the workload. This allows
you to make the most of your IT resources while increasing your overall
flexibility. Power Systems use technology like IBM’s New Intelligent Threads to
switch between processor threading dynamically. The Power Systems TurboCore
mode lets you provide the most performance per core for things like database or
transaction workloads. Active Memory expansion lets you expand your physical
memory logically by as much as 100 percent for memory-intensive workloads like
SAP.
b. Limitless
Virtualization
With
PowerVM, the virtualization component to IBM Power Systems, you can virtualize
not just processor resources, but memory and I/O resources as well. You can use
PowerVM to adjust capacity in a dynamic fashion, to move workloads between
servers, and to maximize availability. This kind of virtualization even allows
you to prevent planned downtime.
c. Automated
Management
Being
able to provision resources within the cloud is key to maximizing utilization
and efficiency. It also helps to reduce your TCO and management costs.
Utilizing IBM Systems Director Enterprise for Power Systems, you have a way to
manage physical as well as virtual servers in an automated fashion. These tools
are cross-platform, too. This means that, no matter what your environment, the
Power Systems cloud can provision virtual machine images and effectively
allocate resources, all while providing you with an accurate picture of how
your systems are operating.
d. Solutions of All
Kinds
No
matter the shape, size or composition of your cloud, IBM Power Systems has a
possible solution. Here are a few of the specific offerings:
·
IBM CloudBurst. CloudBurst lets the data center quickly create and
implement a private cloud environment. It’s a cloud computing quickstart aimed
at a defined portion of the data center.
·
IBM WebSphere CloudBurst Appliance. This offering lets you deploy and
manage your SOA foundation in a cloud computing environment, and easily deploys
WebSphere virtual images to your Power Systems partitions.
·
IBM Smart Business Development and Test Cloud. This solution lets you
create a private cloud environment for the purposes of development and testing,
reducing your operating costs and your test cycle times.
- Characteristics
of Cloud Computing
Cloud computing exhibits the following key characteristics:
·
Agility improves
with users' ability to re-provision technological infrastructure resources.
·
Application programming interface (API) accessibility to software that enables machines to interact
with cloud software in the same way that a traditional user interface (e.g., a
computer desktop) facilitates interaction between humans and computers. Cloud
computing systems typically use Representational State Transfer (REST)-based APIs.
·
Cost: cloud providers
claim that computing costs reduce. A public-cloud delivery model converts
capital expenditure to operational expenditure. This
purportedly lowersbarriers to entry, as infrastructure is
typically provided by a third party and does not need to be purchased for
one-time or infrequent intensive computing tasks. Pricing on a utility
computing basis is fine-grained, with usage-based options and fewer IT skills
are required for implementation (in-house). The e-FISCAL project's
state-of-the-art repository contains
several articles looking into cost aspects in more detail, most of them
concluding that costs savings depend on the type of activities supported and
the type of infrastructure available in-house.
·
Device and location independence enable users to access systems using a web browser regardless of
their location or what device they use (e.g., PC, mobile phone). As
infrastructure is off-site (typically provided by a third-party) and accessed
via the Internet, users can connect from anywhere
·
Virtualization technology
allows sharing of servers and storage devices and increased utilization.
Applications can be easily migrated from one physical server to another.
·
Multitenancy enables
sharing of resources and costs across a large pool of users thus allowing for:
§ centralization of infrastructure in locations with lower
costs (such as real estate, electricity, etc.)
§ peak-load capacity increases (users need not engineer for
highest possible load-levels)
§ utilisation and efficiency improvements
for systems that are often only 10–20% utilised.
·
Scalability and elasticity via dynamic ("on-demand") provisioning of
resources on a fine-grained, self-service basis in near real-time (Note, the VM
startup time varies by VM type, location, os and cloud providers), without
users having to engineer for peak loads.
·
Performance is monitored, and consistent and loosely coupled architectures are
constructed using web services as the system interface.
·
Security can improve due to centralization of data, increased
security-focused resources, etc., but concerns can persist about loss of
control over certain sensitive data, and the lack of security for stored
kernels.[51] Security
is often as good as or better than other traditional systems, in part because
providers are able to devote resources to solving security issues that many
customers cannot afford to tackle. However, the complexity of security is
greatly increased when data is distributed over a wider area or over a greater
number of devices, as well as in multi-tenant systems shared by unrelated
users. In addition, user access to security audit logs may
be difficult or impossible. Private cloud installations are in part motivated
by users' desire to retain control over the infrastructure and avoid losing
control of information security.
·
Maintenance of cloud computing applications is easier, because they do not
need to be installed on each user's computer and can be accessed from different
places.
On-demand self-service. A consumer
can unilaterally provision computing capabilities, such as server time and
network storage, as needed automatically without requiring human interaction
with each service provider.
Broad network access. Capabilities
are available over the network and accessed through standard mechanisms that
promote use by heterogeneous thin or thick client platforms (e.g., mobile
phones, tablets, laptops, and workstations).
Resource pooling. The provider's computing resources are pooled
to serve multiple consumers using a multi-tenant model, with different physical
and virtual resources dynamically assigned and reassigned according to consumer
demand.
Rapid elasticity. Capabilities can be elastically provisioned
and released, in some cases automatically, to scale rapidly outward and inward
commensurate with demand. To the consumer, the capabilities available for
provisioning often appear unlimited and can be appropriated in any quantity at
any time.
Measured service. Cloud systems automatically control and
optimize resource use by leveraging a metering capability at some level of
abstraction appropriate to the type of service (e.g., storage, processing, bandwidth,
and active user accounts). Resource usage can be monitored, controlled, and
reported, providing transparency for both the provider and consumer of the
utilized service. National Institute of Standards and Technology.
- Cloud
Computing Security
As cloud computing is achieving increased popularity, concerns are being
voiced about the security issues introduced through adoption of this new model. The
effectiveness and efficiency of traditional protection mechanisms are being
reconsidered as the characteristics of this innovative deployment model can
differ widely from those of traditional architectures. An alternative
perspective on the topic of cloud security is that this is but another,
although quite broad, case of "applied security" and that similar
security principles that apply in shared multi-user mainframe security models
apply with cloud security.
The relative security of cloud computing services is a contentious issue
that may be delaying its adoption.] Physical
control of the Private Cloud equipment is more secure than having the equipment
off site and under someone else's control. Physical control and the ability to
visually inspect data links and access ports is required in order to ensure
data links are not compromised. Issues barring the adoption of cloud computing are
due in large part to the private and public sectors' unease surrounding the
external management of security-based services. It is the very nature of cloud
computing-based services, private or public, that promote external management
of provided services. This delivers great incentive to cloud computing service
providers to prioritize building and maintaining strong management of secure
services. Security issues have been categorised into sensitive data
access, data segregation, privacy, bug exploitation, recovery, accountability,
malicious insiders, management console security, account control, and
multi-tenancy issues. Solutions to various cloud security issues vary, from
cryptography, particularly public key infrastructure (PKI), to use of multiple
cloud providers, standardisation of APIs, and improving virtual machine support
and legal support.
Cloud computing offers many benefits, but is vulnerable to threats. As
cloud computing uses increase, it is likely that more criminals find new ways
to exploit system vulnerabilities. Many underlying challenges and risks in
cloud computing increase the threat of data compromise. To mitigate the threat,
cloud computing stakeholders should invest heavily in risk assessment to ensure
that the system encrypts to protect data, establishes trusted foundation to
secure the platform and infrastructure, and builds higher assurance into
auditing to strengthen compliance. Security concerns must be addressed to
maintain trust in cloud computing technology.
Data breach is a big concern in cloud computing. A compromised server
could significantly harm the users as well as cloud providers. A variety of
information could be stolen. These include credit card and social security
numbers, addresses, and personal messages. The U.S. now requires cloud
providers to notify customers of breaches. Once notified, customers now have to
worry about identify theft and fraud. While providers, have to deal with
federal investigations, lawsuits, and bad reputation. Customer lawsuits and
settlements have resulted in over $1 billion in losses to cloud providers.
- Similar
Systems and Concepts
Cloud Computing is the result of evolution and adoption of existing
technologies and paradigms. The goal of cloud computing is to allow users to
take beneļ¬t from all of these technologies, without the need for deep knowledge
about or expertise with each one of them. The cloud aims to cut costs, and help
the users focus on their core business instead of being impeded by IT
obstacles.
The main enabling technology for cloud computing is virtualization.
Virtualization generalizes the physical infrastructure, which is the most rigid
component, and makes it available as a soft component that is easy to use and
manage. By doing so, virtualization provides the agility required to speed up
IT operations, and reduces cost by increasing infrastructure utilization.
On the other hand, autonomic computing automates the process through which the
user can provision resources on-demand.
By minimizing user involvement, automation speeds up the process and reduces
the possibility of human errors.
Users face difficult business problems
every day. Cloud computing adopts concepts from Service-oriented Architecture (SOA)
that can help the user break these problems intoservices that can be
integrated to provide a solution. Cloud computing provides all of its resources
as services, and makes use of the well-established standards and best practices
gained in the domain of SOA to allow global and easy access to cloud services
in a standardized way.
Cloud computing also leverages concepts from utility computing in order
to provide metrics for the services used. Such
metrics are at the core of the public cloud pay-per-use models. In addition,
measured services are an essential part of the feedback loop in autonomic
computing, allowing services to scale on-demand and to perform automatic
failure recovery.
Cloud computing is a kind of grid
computing; it has evolved by addressing the QoS (quality of service)
and reliability problems.
Cloud computing provides the tools and technologies to build data/compute
intensive parallel applications with much more affordable prices compared to
traditional parallel computing techniques.
Cloud computing shares characteristics with:
·
Grid
computing — "A form of distributed and parallel computing, whereby a
'super and virtual computer' is composed of a cluster of networked, loosely
coupled computers acting in concert to perform very large
tasks."
·
Mainframe computer — Powerful computers used mainly
by large organizations for critical applications, typically bulk data
processing such as: census; industry and consumer statistics; police and secret
intelligence services; enterprise resource planning; and
financial transaction processing.
·
Utility computing — The "packaging of computing resources, such as computation
and storage, as a metered service similar to a traditional public utility, such
as electricity."
·
Peer-to-peer — A distributed architecture
without the need for central coordination. Participants are both suppliers and
consumers of resources (in contrast to the traditional client–server model).
·
Cloud gaming — Also known as on-demand
gaming, is a way of delivering games to computers. Gaming data is stored in the
provider's server, so that gaming is independent of client computers used to
play the game. One such current example, would be a service by OnLive which allows users a certain
space to save game data, and load games within the OnLive server.