{"id":11974,"date":"2015-01-27T10:00:21","date_gmt":"2015-01-27T10:00:21","guid":{"rendered":"https:\/\/www.whizlabs.com\/?p=11974"},"modified":"2015-01-27T10:00:21","modified_gmt":"2015-01-27T10:00:21","slug":"cloud-computing-terms-and-concepts","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/cloud-computing-terms-and-concepts\/","title":{"rendered":"Cloud Computing \u2013 Terms and Concepts"},"content":{"rendered":"<p style=\"text-align: left\" align=\"center\"><span style=\"line-height: 1.5em\">What do \u201cGmail\u201d, \u201cDropbox\u201d and other social networking sites like Facebook, LinkedIn have in common? They all employ the \u201cCloud\u201d for storage purposes. Cloud computing \u2013 yet another hot topic in the IT world is outsourcing all applications relating to email, storage, networking to cloud providers. Hosting one\u2019s own server and building one\u2019s own infrastructure drains time and money. The primary advantage of using cloud computing is the cost savings for organizations. We will see some of the characteristics of cloud computing along with the different deployment models and security issues relating to cloud computing in this post.<\/span><\/p>\n<h3>Characteristics of Cloud Computing<\/h3>\n<p>According to the NIST website, the important characteristics of cloud computing can be defined as follows:<\/p>\n<ol>\n<li><strong>Elasticity :\u00a0<\/strong><span style=\"line-height: 1.5em\">When we talk about \u201celasticity\u201d on the cloud, it means that the cloud can be scaled up and down to meet an organization\u2019s demands. As an example, users can be added and deleted to access the resources on the cloud.\u00a0<\/span><\/li>\n<li><strong>Measured Service :\u00a0<\/strong><span style=\"line-height: 1.5em\">The amount of resources used by the organization is based on the users and the different types of processing. This is measured by the cloud provider. Organizations then pay for the services that they have used on the cloud.\u00a0<\/span><\/li>\n<li><strong>Resource pooling :\u00a0<\/strong><span style=\"line-height: 1.5em\">\u201cResource pooling\u201d is yet another characteristic of the cloud which states that the same resource is served to different clients according to each client\u2019s requirement. This is known as resource pooling by the cloud provider.\u00a0<\/span><\/li>\n<li><strong>Broad network access :\u00a0<\/strong><span style=\"line-height: 1.5em\">Broad network access can be defined as the accessing of files, emails and other shared resources through different modes (laptops, smart phones etc) and from different geographical locations by different employees of an organization. This enables employees to stay on top of projects in an increasingly networked world.\u00a0<\/span><\/li>\n<li><strong>On-demand Self service :<\/strong>\u00a0<span style=\"line-height: 1.5em\">Access to resources can be changed and more services can be added or deleted at any time and payment will be accordingly adjusted. This is defined as \u201con-demand self service\u201d.<\/span><\/li>\n<\/ol>\n<p style=\"padding-left: 30px\">\u00a0\u00a0(The NIST Definition of Cloud Computing)<\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Having seen the characteristics of cloud computing, we next move onto the different deployment models of the same.<\/p>\n<h3>Deployment Models of cloud computing:<\/h3>\n<p>The different deployment models of cloud computing can be stated as private cloud, public cloud, hybrid cloud and community cloud.<\/p>\n<p><strong>Public cloud:\u00a0<\/strong>In this type of cloud, the resources on the cloud are available to general public. The cloud service itself is managed by a business, academic or government organization. Example of public cloud is AWS or \u2018Amazon web services\u2019.<\/p>\n<p><strong>Private cloud:\u00a0<\/strong>This type of cloud caters to only one organization and its consumers. Private cloud is managed by the organization itself or any third party unit.<\/p>\n<p><strong>Community cloud:\u00a0<\/strong>Community clouds cater to the needs of organizations with similar interests. They are maintained by one or more of those organizations or by a third party unit.<\/p>\n<p><strong>Hybrid clouds:\u00a0<\/strong>Hybrid clouds combine the services of public, private and community clouds.<\/p>\n<p>Having seen the characteristics and deployment models of cloud computing we move onto the most obvious concern when data is stored on a cloud \u2013 \u201csecurity\u201d. Data security, network security, physical security and virtualization security are the different security concerns related to cloud data.<\/p>\n<p>Cloud computing and security is another big topic which will form the basis of another blog post. (OpenSource)<\/p>\n<h5>Bibliography<br \/>\nOpenSource. (n.d.).<br \/>\n<i>The NIST Definition of Cloud Computing<\/i>. (n.d.). Retrieved from csrc.nist.gov: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf<\/h5>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What do \u201cGmail\u201d, \u201cDropbox\u201d and other social networking sites like Facebook, LinkedIn have in common? They all employ the \u201cCloud\u201d for storage purposes. Cloud computing \u2013 yet another hot topic in the IT world is outsourcing all applications relating to email, storage, networking to cloud providers. Hosting one\u2019s own server and building one\u2019s own infrastructure drains time and money. The primary advantage of using cloud computing is the cost savings for organizations. We will see some of the characteristics of cloud computing along with the different deployment models and security issues relating to cloud computing in this post. Characteristics of [&hellip;]<\/p>\n","protected":false},"author":145,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[10],"tags":[604],"class_list":["post-11974","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-certifications","tag-cloud-computing"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"profile_24":false,"profile_48":false,"profile_96":false,"profile_150":false,"profile_300":false,"tptn_thumbnail":false,"web-stories-poster-portrait":false,"web-stories-publisher-logo":false,"web-stories-thumbnail":false},"uagb_author_info":{"display_name":"Sparsh Goyal","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/sparsh\/"},"uagb_comment_info":2558,"uagb_excerpt":"What do \u201cGmail\u201d, \u201cDropbox\u201d and other social networking sites like Facebook, LinkedIn have in common? They all employ the \u201cCloud\u201d for storage purposes. Cloud computing \u2013 yet another hot topic in the IT world is outsourcing all applications relating to email, storage, networking to cloud providers. Hosting one\u2019s own server and building one\u2019s own infrastructure&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/11974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=11974"}],"version-history":[{"count":0,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/11974\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=11974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=11974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=11974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}