0% found this document useful (0 votes)
39 views

CC Unit 4

Uploaded by

tahi66438
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

CC Unit 4

Uploaded by

tahi66438
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Unit - IV

Introduction to Web Services:


The Internet is the worldwide connectivity of hundreds of thousands of computers of various
types that belong to multiple networks. On the World Wide Web, a web service is a standardized
method for propagating messages between client and server applications. A web service is a software
module that is intended to carry out a specific set of functions. Web services in cloud computing can
be found and invoked over the network.The web service would be able to deliver functionality to the
client that invoked the web service.
A web service is a set of open protocols and standards that allow data to be exchanged
between different applications or systems. Web services can be used by software programs written in
a variety of programming languages and running on a variety of platforms to exchange data via
computer networks such as the Internet in a similar way to inter-process communication on a single
computer.

Any software, application, or cloud technology that uses standardized web protocols (HTTP or
HTTPS) to connect, interoperate, and exchange data messages – commonly XML (Extensible
Markup Language) – across the internet is considered a web service. Web services have the
advantage of allowing programs developed in different languages to connect with one another by
exchanging data over a web service between clients and servers. A client invokes a web service by
submitting an XML request, which the service responds with an XML response.

Amazon Web Service:


Amazon Web Services (AWS), a subsidiary of Amazon.com, has invested billions of dollars
in IT resources distributed across the globe. These resources are shared among all the AWS account
holders across the globe. These account themselves are entirely isolated from each other. AWS
provides on-demand IT resources to its account holders on a pay-as-you-go pricing model with no
upfront cost. Amazon Web services offers flexibility because you can only pay for services you use
or you need. Enterprises use AWS to reduce capital expenditure of building their own private IT
infrastructure (which can be expensive depending upon the enterprise’s size and nature). AWS has its
own Physical fiber network that connects with Availability zones, regions and Edge locations. All the
maintenance cost is also bared by the AWS that saves a fortune for the enterprises.
Security of cloud is the responsibility of AWS but Security in the cloud is Customer’s Responsibility.
The Performance efficiency in the cloud has four main areas:-
 Selection
 Review
 Monitoring
 Tradeoff

Advantages of Amazon Web Services


 AWS allows you to easily scale your resources up or down as your needs change, helping you to
save money and ensure that your application always has the resources it needs.
 AWS provides a highly reliable and secure infrastructure, with multiple data centers and a
commitment to 99.99% availability for many of its services.
 AWS offers a wide range of services and tools that can be easily combined to build and deploy a
variety of applications, making it highly flexible.
 AWS offers a pay-as-you-go pricing model, allowing you to only pay for the resources you
actually use and avoid upfront costs and long-term commitments.

Disadvantages of Amazon Web Services


 AWS can be complex, with a wide range of services and features that may be difficult to
understand and use, especially for new users.
 AWS can be expensive, especially if you have a high-traffic application or need to run multiple
services. Additionally, the cost of services can increase over time, so you need to regularly
monitor your spending.
 While AWS provides many security features and tools, securing your resources on AWS can still
be challenging, and you may need to implement additional security measures to meet your
specific requirements.
 AWS manages many aspects of the infrastructure, which can limit your control over certain parts
of your application and environment.

AWS Global Infrastructure


The AWS global infrastructure is massive and is divided into geographical regions. The geographical
regions are then divided into separate availability zones. While selecting the geographical regions for
AWS, three factors come into play
 Optimizing Latency
 Reducing cost
 Government regulations (Some services are not available for some regions)
Each region is divided into at least two availability zones that are physically isolated from each other,
which provides business continuity for the infrastructure as in a distributed system. If one zone fails
to function, the infrastructure in other availability zones remains operational. The largest region
North Virginia (US-East), has six availability zones. These availability zones are connected by high-
speed fiber-optic networking.

AWS Cloud Computing Models


There are three cloud computing models available on AWS.
1. Infrastructure as a Service (IaaS): It is the basic building block of cloud IT. It generally
provides access to data storage space, networking features, and computer hardware(virtual or
dedicated hardware). It is highly flexible and gives management controls over the IT resources to
the developer. For example, VPC, EC2, EBS.
2. Platform as a Service (PaaS): This is a type of service where AWS manages the underlying
infrastructure (usually operating system and hardware). This helps the developer to be more
efficient as they do not have to worry about undifferentiated heavy lifting required for running the
applications such as capacity planning, software maintenance, resource procurement, patching,
etc., and focus more on deployment and management of the applications. For example, RDS,
EMR, ElasticSearch.
3. Software as a Service(SaaS): It is a complete product that usually runs on a browser. It primarily
refers to end-user applications. It is run and managed by the service provider. The end-user only
has to worry about the application of the software suitable to its needs. For example,
Saleforce.com, Web-based email, Office 365 .

Microsoft Azure:
Azure is Microsoft’s cloud platform, just like Google has its Google Cloud and Amazon has
its Amazon Web Service or AWS.000. Generally, it is a platform through which we can use
Microsoft’s resources. For example, to set up a huge server, we will require huge investment, effort,
physical space, and so on. In such situations, Microsoft Azure comes to our rescue. It will provide us
with virtual machines, fast processing of data, analytical and monitoring tools, and so on to make our
work simpler. The pricing of Azure is also simpler and cost-effective. Popularly termed as “Pay As
You Go”, which means how much you use, pay only for that.

Azure History:
Microsoft unveiled Windows Azure in early October 2008 but it went to live after February 2010.
Later in 2014, Microsoft changed its name from Windows Azure to Microsoft Azure. Azure provided
a service platform for .NET services, SQL Services, and many Live Services. Many people were still
very skeptical about “the cloud”. As an industry, we were entering a brave new world with many
possibilities. Microsoft Azure is getting bigger and better in the coming days. More tools and more
functionalities are getting added. It has two releases as of now. It’s a famous version of Microsoft
Azure v1 and later Microsoft Azure v2. Microsoft Azure v1 was more JSON script-driven than the
new version v2, which has interactive UI for simplification and easy learning. Microsoft Azure v2 is
still in the preview version.

How Azure can help in business?


Azure can help our business in the following ways-
 Capital less: We don’t have to worry about the capital as Azure cuts out the high cost of
hardware. You simply pay as you go and enjoy a subscription-based model that’s kind to your
cash flow. Also, setting up an Azure account is very easy. You simply register in Azure Portal
and select your required subscription and get going.
 Less Operational Cost: Azure has a low operational cost because it runs on its servers whose
only job is to make the cloud functional and bug-free, it’s usually a whole lot more reliable than
your own, on-location server.
 Cost Effective: If we set up a server on our own, we need to hire a tech support team to monitor
them and make sure things are working fine. Also, there might be a situation where the tech
support team is taking too much time to solve the issue incurred in the server. So, in this regard is
way too pocket-friendly.
 Easy Back-Up and Recovery options: Azure keeps backups of all your valuable data. In disaster
situations, you can recover all your data in a single click without your business getting affected.
Cloud-based backup and recovery solutions save time, avoid large up-front investments and roll
up third-party expertise as part of the deal.
 Easy to implement: It is very easy to implement your business models in Azure. With a couple
of on-click activities, you are good to go. Even there are several tutorials to make you learn and
deploy faster.
 Better Security: Azure provides more security than local servers. Be carefree about your critical
data and business applications. As it stays safe in the Azure Cloud. Even, in natural disasters,
where the resources can be harmed, Azure is a rescue. The cloud is always on.
 Work from anywhere: Azure gives you the freedom to work from anywhere and everywhere. It
just requires a network connection and credentials. And with most serious Azure cloud services
offering mobile apps, you’re not restricted to which device you’ve got to hand.
 Increased collaboration: With Azure, teams can access, edit and share documents anytime, from
anywhere. They can work and achieve future goals hand in hand. Another advantage of Azure is
that it preserves records of activity and data. Timestamps are one example of Azure’s record-
keeping. Timestamps improve team collaboration by establishing transparency and increasing
accountability.

Microsoft Azure Services:


Following are some of the services Microsoft Azure offers:
1. Compute: Includes Virtual Machines, Virtual Machine Scale Sets, Functions for serverless
computing, Batch for containerized batch workloads, Service Fabric for microservices and
container orchestration, and Cloud Services for building cloud-based apps and APIs.
2. Networking: With Azure, you can use a variety of networking tools, like the Virtual Network,
which can connect to on-premise data centers; Load Balancer; Application Gateway; VPN
Gateway; Azure DNS for domain hosting, Content Delivery Network, Traffic Manager,
ExpressRoute dedicated private network fiber connections; and Network Watcher monitoring and
diagnostics
3. Storage: Includes Blob, Queue, File, and Disk Storage, as well as a Data Lake Store, Backup, and
Site Recovery, among others.
4. Web + Mobile: Creating Web + Mobile applications is very easy as it includes several services
for building and deploying applications.
5. Containers: Azure has a property that includes Container Service, which supports Kubernetes,
DC/OS or Docker Swarm, and Container Registry, as well as tools for microservices.
6. Databases: Azure also included several SQL-based databases and related tools.
7. Data + Analytics: Azure has some big data tools like HDInsight for Hadoop Spark, R Server,
HBase, and Storm clusters
8. AI + Cognitive Services: With Azure developing applications with artificial intelligence
capabilities, like the Computer Vision API, Face API, Bing Web Search, Video Indexer, and
Language Understanding Intelligent.
9. Internet of Things: Includes IoT Hub and IoT Edge services that can be combined with a variety
of machine learning, analytics, and communications services.
10. Security + Identity: Includes Security Center, Azure Active Directory, Key Vault, and Multi-
Factor Authentication Services.
11. Developer Tools: Includes cloud development services like Visual Studio Team Services, Azure
DevTest Labs, HockeyApp mobile app deployment and monitoring, Xamarin cross-platform
mobile development, and more.

Google App Engine (GAE)


A scalable runtime environment, Google App Engine is mostly used to run Web applications.
These dynamic scales as demand change over time because of Google’s vast computing
infrastructure. Because it offers a secure execution environment in addition to a number of services,
App Engine makes it easier to develop scalable and high-performance Web apps. Google’s
applications will scale up and down in response to shifting demand. Croon tasks, communications,
scalable data stores, work queues, and in-memory caching are some of these services.
The App Engine SDK facilitates the testing and professionalization of applications by
emulating the production runtime environment and allowing developers to design and test
applications on their own PCs. When an application is finished being produced, developers can
quickly migrate it to App Engine, put in place quotas to control the cost that is generated, and make
the programmer available to everyone. Python, Java, and Go are among the languages that are
currently supported.
The development and hosting platform Google App Engine, which powers anything from web
programming for huge enterprises to mobile apps, uses the same infrastructure as Google’s large-
scale internet services. It is a fully managed PaaS (platform as a service) cloud computing platform
that uses in-built services to run your apps. You can start creating almost immediately after receiving
the software development kit (SDK). You may immediately access the Google app developer’s
manual once you’ve chosen the language you wish to use to build your app.
After creating a Cloud account, you may Start Building your App
 Using the Go template/HTML package
 Python-based webapp2 with Jinja2
 PHP and Cloud SQL
 using Java’s Maven
The app engine runs the programmers on various servers while “sandboxing” them. The app engine
allows the program to use more resources in order to handle increased demands. The app engine
powers programs like Snapchat, Rovio, and Khan Academy.
Features of App Engine.
Runtimes and Languages:
To create an application for an app engine, you can use Go, Java, PHP, or Python. You can develop
and test an app locally using the SDK’s deployment toolkit. Each language’s SDK and nun time are
unique. Your program is run in a:
 Java Run Time Environment version 7
 Python Run Time environment version 2.7
 PHP runtime’s PHP 5.4 environment
 Go runtime 1.2 environment

Generally Usable Features


These are protected by the service-level agreement and depreciation policy of the app engine.
The implementation of such a feature is often stable, and any changes made to it are backward-
compatible. These include communications, process management, computing, data storage, retrieval,
and search, as well as app configuration and management. Features like the HRD migration tool,
Google Cloud SQL, logs, datastore, dedicated Memcached, blob store, Memcached, and search are
included in the categories of data storage, retrieval, and search.

Features in Preview
In a later iteration of the app engine, these functions will undoubtedly be made broadly
accessible. However, because they are in the preview, their implementation may change in ways that
are backward-incompatible. Sockets, MapReduce, and the Google Cloud Storage Client Library are a
few of them.

Experimental Features
These might or might not be made broadly accessible in the next app engine updates. They
might be changed in ways that are irreconcilable with the past. The “trusted tester” features,
however, are only accessible to a limited user base and require registration in order to utilize them.
The experimental features include Prospective Search, Page Speed, OpenID,
Restore/Backup/Datastore Admin, Task Queue Tagging, MapReduce, and Task Queue REST API.
App metrics analytics, datastore admin/backup/restore, task queue tagging, MapReduce, task queue
REST API, OAuth, prospective search, OpenID, and Page Speed are some of the experimental
features.

Third-Party Services
As Google provides documentation and helper libraries to expand the capabilities of the app
engine platform, your app can perform tasks that are not built into the core product you are familiar
with as app engine. To do this, Google collaborates with other organizations. Along with the helper
libraries, the partners frequently provide exclusive deals to app engine users.

Advantages of Google App Engine


The Google App Engine has a lot of benefits that can help you advance your app ideas. This
comprises:
1. Infrastructure for Security: The Internet infrastructure that Google uses is arguably the safest in
the entire world. Since the application data and code are hosted on extremely secure servers, there
has rarely been any kind of illegal access to date.
2. Faster Time to Market: For every organization, getting a product or service to market quickly is
crucial. When it comes to quickly releasing the product, encouraging the development and
maintenance of an app is essential. A firm can grow swiftly with Google Cloud App Engine’s
assistance.
3. Quick to Start: You don’t need to spend a lot of time prototyping or deploying the app to users
because there is no hardware or product to buy and maintain.
4. Easy to Use: The tools that you need to create, test, launch, and update the applications are
included in Google App Engine (GAE).
5. Rich set of APIs & Services: A number of built-in APIs and services in Google App Engine
enable developers to create strong, feature-rich apps.
6. Scalability: This is one of the deciding variables for the success of any software. When using the
Google app engine to construct apps, you may access technologies like GFS, Big Table, and
others that Google uses to build its own apps.
7. Performance and Reliability: Among international brands, Google ranks among the top ones.
Therefore, you must bear that in mind while talking about performance and reliability.
8. Cost Savings: To administer your servers, you don’t need to employ engineers or even do it
yourself. The money you save might be put toward developing other areas of your company.
9. Platform Independence: Since the app engine platform only has a few dependencies, you can
easily relocate all of your data to another environment.

Difference between AWS (Amazon Web Services) and Azure

Data Security vs. Data Privacy


Data security and data privacy both involve protecting data, but they are different. Data security entails
controlling access to data using stark, black-and-white terms. For example, a data security policy may dictate that no
one other than someone troubleshooting a database issue is allowed to see customer payment information—period.
In that way, you reduce your chances of suffering a data security breach.
Data privacy, on the other hand, involves more subtle, strategic decisions around who gets access to certain
kinds of data. Using the same example, another organization may say, “Well, it may help the development team to
know if a lot of customers have been paying using PayPal. Then they could decide whether it would be wise to start
accepting Payoneer, Skrill, or Stripe, too. Let’s give them access to payment info for the next two weeks.”
When it comes to data security in cloud computing or on-premises environments, these kinds of decisions
fall more under the purview of data privacy.

Best Practices for Ensuring Data Security and Privacy


Why is data security important? Primarily, it keeps your data secure and builds confidence among your
customers. Here are some best practices that have been effective for other organizations:

1. Secure your information: This means managing who has access and encrypting your data. Only people who need it
to perform essential functions should have access, and information should be encrypted as it goes back and forth
between the database and their computer or device.
2. Prepare ahead of time for threats: You can get ready for a potential data security incident by testing your system,
educating employees, devising an incident management plan, and creating a data recovery plan.
3. Delete data you are not using: You should get rid of both digital and physical copies of data you no longer need. In
this way, you reduce the chances of a hacker discovering it and using it for profit.
Types of Data Security
Organizations can use a wide range of data security types to safeguard their data, devices, networks,
systems, and users. Some of the most common types of data security, which organizations should look to combine to
ensure they have the best possible strategy, include:

1.Encryption

Data encryption is the use of algorithms to scramble data and hide its true meaning. Encrypting data ensures
messages can only be read by recipients with the appropriate decryption key. This is crucial, especially in the event
of a data breach, because even if an attacker manages to gain access to the data, they will not be able to read it
without the decryption key.

Data encryption also involves the use of solutions like tokenization, which protects data as it moves through an
organization’s entire IT infrastructure.

2.Data Erasure

There will be occasions in which organizations no longer require data and need it permanently removed
from their systems. Data erasure is an effective data security management technique that removes liability and the
chance of a data breach occurring.

3.Data Masking
Data masking enables an organization to hide data by obscuring and replacing specific letters or numbers.
This process is a form of encryption that renders the data useless should a hacker intercept it. The original message
can only be uncovered by someone who has the code to decrypt or replace the masked characters.

4.Data Resiliency
Organizations can mitigate the risk of accidental destruction or loss of data by creating backups or copies of
their data. Data backups are vital to protecting information and ensuring it is always available. This is particularly
important during a data breach or ransomware attack, ensuring the organization can restore a previous backup.

You might also like