Module-1
Module-1
(21CS643)
■ Data is stored:
◻ closer to the site where it is used.
◻ in a device and in a location-independent manner.
■ The user:
■ The user is able to deploy and run arbitrary software, which can
include operating systems and applications.
■ Identity fraud and theft are made possible by the unauthorized access
to personal data in circulation and by new forms of dissemination
through social networks and they could also pose a danger to cloud
computing.
■ Such events can affect the Internet domain name servers and
prevent access to a cloud or can directly affect the clouds:
■ in 2004 an attack at Akamai caused a domain name outage and a
major blackout that affected Google, Yahoo, and other sites.
(Akamai, a content delivery network (CDN) provider,
experienced a domain name outage due to a targeted attack.
This outage affected several major websites, including Google
and Yahoo, which relied on Akamai's services to deliver content
efficiently to users.)
■ An application developer:
■ Installs applications on a platform of his/her choice.
■ Manages resources allocated by Amazon.
■ It manages automatically:
■ The infrastructure provisioning.
■ Hardware and software maintenance.
■ Replication and indexing of data items.
■ Open-Nebula - a private cloud with users actually logging into the head
node to access cloud functions. The system is centralized and its default
configuration uses the NFS file system.