Understanding Services and
Applications by Type
General Objective (GO)
Students can able to understand the basic applications of different services and deployment
models in cloud environment.
Specific Objectives (SO)
SO1: Understand the applications of different services in cloud environment. (U/C)
SO2: Understand the services of different deployment models in cloud. (U/C)
SO3: Understand the basic concepts to build an efficient cloud . (U/C)
Cloud Models
Public Cloud
Public Cloud allows systems and
services to be easily accessible to
the general public.
Private Cloud
Private Cloud allows systems
and services to be accessible
within an organization.
It offers increased security
because of its private nature,
◦ e.g.: AWS, VM ware.
Hybrid Cloud
Use both private and public
clouds, depending on their
purpose.
host most important
applications on own servers to
keep them more secure and
secondary applications
elsewhere.
◦ E.g., Federal agencies
DEPLOYMENT MODELS
SERVICE MODELS
SERVICE MODELS- IaaS
POPULAR IAAS PROVIDERS
SERVICE MODELS - PaaS
POPULAR PAAS PROVIDERS
SERVICE MODELS - SaaS
POPULAR SAAS PROVIDERS
Cloud Service and Application Types
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Cloud Service
Infrastructure as a Service (IaaS)
◦ Infrastructure as a Service allows for the creation of virtual computing
systems or networks.
Software as a Service (SaaS)
◦ Software as a Service represents a hosted application that is universally
available over the Internet, usually through a browser.
Platform as a Service (PaaS)
◦ Platform as a Service is a cloud computing infrastructure that creates a
development environment upon which applications may be build.
Ecosystem
Infrastructure as a Service (IaaS)
o Infrastructure as a Service (IaaS) is a cloud computing service model in
which hardware is virtualized in the cloud.
o In this particular model, the service vendor owns the equipment: servers,
storage, network, infrastructure.
o The developer creates virtual hardware on which to develop applications and
services.
o Essentially, an IaaS vendor has created a hardware utility service where the
user provisions virtual resources as required.
IaaS Workload
o Fundamental unit of virtualized client in an IaaS deployment is called a workload.
o A workload simulates the ability of a certain type of real or physical server to do an amount of
work.
o Work done can be measured by the number of Transactions Per Minute (TPM) or a similar
metric against a certain type of system.
o Throughput attributes such as
• Disk I/Os measured in Input/Output Per Second IOPS
• amount of RAM consumed under load in MB
• Network throughput and latency
Server Partition
Pods, Aggregation, and Silos
Platform as a Service (PaaS)
PaaS offering provides the tools and development environment to deploy
applications on another vendor's application.
Platforms can be based on specific types of development languages, application
frameworks, or other constructs.
Platform as a Service (PaaS)
oPaaS tool is a fully integrated development environment; that is, all the tools
and services are part of the PaaS service.
ocustomize the platform involved (enter and retrieve data, perform actions, get
results.
ono responsibility for maintaining the hardware
oGoogle's App Engine platform.
Software as a Service (SaaS)
o SaaS provides the complete infrastructure, software, and solution stack as the service offering.
o A good way to think about SaaS is that it is the cloud-based equivalent of shrink-wrapped
software.
o Google Gmail and Calendar, QuickBooks online, Zoho Office Suite
SaaS characteristics
o Global Access
o typical license is subscription-based or usage-based and is billed on a recurring basis.
o software and the service are monitored and maintained by the vendor,
o executable client-side code, but the user isn't responsible for maintaining that code or its
interaction with the service.
o Reduced distribution and maintenance costs and minimal end-user system costs
o applications feature automated upgrades, updates, and patch management and much faster
rollout of changes.
o SaaS supports multiple users and provides a shared data model through a single-instance, multi-
tenancy model.
Shrink - Wrapped
Identity as a Service (IDaaS)
An identity service is one that stores the information associated with a digital entity in a form
that can be queried and managed for use in electronic transactions.
Identity services have as their core functions: a data store, a query engine, and a policy engine
that maintains data integrity.
The Domain Name Service can run on a private network, but is at the heart of the Internet as a
service that provides identity authorization and lookup.
The name servers that run the various Internet domains (.COM, .ORG, .EDU, .MIL, and so on)
are IDaaS servers.
DNS establishes the identity of a domain as belonging to a set of assigned addresses, associated
with an owner and that owner's information, and so forth. If the identification is the assigned IP
number, the other properties are its metadata.
What is an identity?
An identity is a set of characteristics or traits that make something recognizable or known.
In computer network systems, it is one's digital identity that most concerns us.
A digital identity is those attributes and metadata of an object along with a set of relationships
with other objects that makes an object identifiable.
An identity can belong to a person and may include the
following:
Things you are: Biological characteristics such as age, gender, appearance, and so forth
Things you know: Biography, personal data such as social security numbers, PINs, where you
went to school, and so on
Things you have: A pattern of blood vessels in your eye, your fingerprints, a bank account you
can access, a security key you were given, objects and possessions, and more
Things you relate to: Your family and friends, a software license, beliefs and values, activities
and endeavors, personal selections and choices, habits and practices, an iGoogle account, and
more
Networked identity service
classes
To validate Web sites, transactions, transaction participants, clients, and network services—
various forms of identity services—have been deployed on networks.
Ticket or token providing services, certificate servers, and other trust mechanisms all provide
identity services that can be pushed out of private networks and into the cloud.
Identity as a Service (IDaaS) may
include any of the following:
oAuthentication services (identity verification)
oDirectory services
oFederated identity
oIdentity governance
oIdentity and profile management
oPolicies, roles, and enforcement
oProvisioning (external policy administration)
oRegistration
oRisk and event monitoring, including audits
oSingle sign-on services (pass-through authentication)
Identity system codes of
conduct
User control for consent: Users control their identity and must consent to the use of their information.
Minimal Disclosure: The minimal amount of information should be disclosed for an intended use.
Justifiable access: Only parties who have a justified use of the information contained in a digital identity
and have a trusted identity relationship with the owner of the information may be given access to that
information.
Directional Exposure: An ID system must support bidirectional identification for a public entity so that it
is discoverable and a unidirectional identifier for private entities, thus protecting the private ID.
Interoperability: A cloud computing ID system must interoperate with other identity services from other
identity providers.
Consistency of Service: An IDaaS service must be simple to use, consistent across all its uses, and able to
operate in different contexts using different technologies.
Mind map