Fundamental Concepts of Cloud Computing

Fundamental Concepts of Cloud Computing

DOI: 10.4018/979-8-3693-0900-1.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing has transformed corporate and consumer lives. Cloud computing may save startups and businesses money and improve services. Independent developers may build global apps and services, share, and analyze data at scales formerly reserved for well-funded projects. Internet users may quickly create, share, and preserve digital content beyond their devices' computing capabilities. The cloud provider owns and maintains computer resources in cloud computing. Browser-based apps like Netflix, third-party data storage for images and other digital files like iCloud or Dropbox, and third-party servers used to support a company, research, or personal project's computer architecture are examples of such resources. This chapter discusses many topics related to cloud computing, such as: Cloud computing term, entities, technologies, delivery models, environments, and platforms, advantages and disadvantages of cloud computing, benefits of cloud computing, using cloud computing, risks and security concerns, cloud computing ethics, challenges, and costs, and research directions.
Chapter Preview

Emerging Trends in Cloud Computing Analytics, Scalability, and Service Models

Top

Introduction

The impact of cloud computing on industries and end users is of significant magnitude, as the extensive utilization of cloud-based applications has resulted in the transformation of various aspects of everyday life. Cloud computing offers startups and companies the opportunity to reduce costs and enhance their service offerings by eliminating the need to procure and manage hardware and software internally. Individual developers possess the autonomy to create internet services and software applications that are universally accessible. The advancements in data sharing and analysis have facilitated the ability to conduct research on a larger scale, which was previously limited to projects with substantial funding. Furthermore, individuals utilizing the internet have the convenient ability to access software applications and storage systems, enabling them to create, disseminate, and store digital content in quantities that surpass the limitations of their personal computer devices.

Cloud computing refers to the allocation of computer resources as a service, wherein the responsibility for ownership and management of these resources lies with the cloud provider, rather than the end user. These resources encompass a wide range of options, including web-based software programs such as TikTok or Netflix, as well as third-party data storage solutions like iCloud or Dropbox. Additionally, third-party servers are utilized to provide support for the computing infrastructure of various entities, including companies, research projects, or personal endeavors.

To cultivate innovation, the National Institute of Standards and Technology (NIST), an independent agency under the jurisdiction of the United States Department of Commerce, provides the following definition of cloud computing (Mell & Grance, 2011):

This statement describes a conceptual framework that facilitates widespread and easily accessible network connectivity, allowing users to access a shared collection of adaptable computing resources. These resources may include networks, servers, storage, applications, and services. The provisioning and release of these resources can be done quickly and with minimal involvement from the user or service provider.

  • On-demand self-service: Cloud resources can be accessed or provisioned without the need for human intervention. Customers have the option to enroll in this particular model, which grants them immediate access to cloud services. Furthermore, organizations have the capability to establish operational frameworks that facilitate the seamless utilization of internal cloud services by employees, customers, or collaborators, in alignment with predetermined protocols, thereby eliminating the need for IT support.

  • Broad network access enables users to securely access cloud services and resources from any networked location and any authorized device.

  • Resource pooling refers to the practice of maintaining the privacy of individual customers' data from other clients, while simultaneously allowing multiple tenants to utilize resources provided by the cloud provider.

  • Quick elasticity: In contrast to hardware and software deployed on-site, cloud computing resources possess the ability to swiftly and flexibly increase, decrease, or modify in accordance with the evolving requirements of the cloud user.

  • Metered service: The utilization of cloud resources is measured, enabling companies and other cloud customers to solely incur charges for the specific resources they actively utilize within a designated billing cycle.

Key Terms in this Chapter

Windows Communication Foundation (WCF): This is a framework for building service oriented applications. Using WCF, you can send data as asynchronous messages from one service endpoint to another.

Jericho Forum: This promotes technical standards before ISO2 ratifies them. The Jericho Forum was an international group working to define and promote de-parameterization.

Chartered Institute of Information Security: Formerly the Institute of Information Security Professionals IISP), this is an independent, not-for-profit body governed by its members.

Virtual Machine (VM): This is the virtualization or emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination of the two.

Atomicity, Consistency, Isolation, and Durability (ACID): This is a set of properties of database transactions. It is a term from database theory and describes rules and procedures for data transactions.

Google File System (GFS): It is designed by Google, while HDFS is an open source version of distributed file system that referenced GFS.

Representational State Transfer (REST): This is a web service communication protocol.

Content Delivery Network (CDN): This it is a network of servers that are geographically distributed to speed up the delivery of web content by caching copies of files or facilitating dynamic content in servers closer to users than the host server, which is where the website originates.

Online Analytical Processing (OLAP): This is one type of data processing systems, uses data to gain valuable insights, which is used to solve data problems.

Hadoop Distributed File System (HDFS): This is an open source implementation of the GFS architecture that is also available on the Amazon EC2 cloud platform.

Enterprise Resource Planning (ERP): It is a type of software system that helps organizations automate and manage core business prosses for optimal performance.

Service Level Objectives (SLOs): These are used to quantifiably measure customer experience and happiness, which directly impacts the business.

Simple Object Access Protocol (SOAP): This is a web service communication protocol. It was long the standard approach to web service interfaces, but it was dominated by REST in recent years, with REST now representing more than 70% of public APIs (Application Programming Interfaces).

Online Transaction Processing (OLTP): This is one type of data processing systems, is purely operational, and is used to solve data problems.

Service Level Agreement (SLA): It is an agreement between a service provider and a customer.

Structured Query Language (SQL): This is a standardized programming language that is used to create, manage, and retrieve data stored in a relational database management system (RDBMS). A RDBMS is a type of database management system (DBMS) that stores inter-related data in tables and allows SQL queries to access and manipulate the data.

Distributed Denial of Service (DDoS): This is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the internet.

IBM Power Architecture: This is a reduced instruction set computer (RISC) instruction set architecture (ISA) developed by IBM. The name is an acronym for performance optimization with enhanced RISC.

Complete Chapter List

Search this Book:
Reset