Combo Cloud!
Redundancy per common practices
"N+1" Redundancy - Cloud architecture designed with N+1 redundancy. - Allocate more capacity needed at any point in time. - The term N+1 indicates that one extra is needed - Spread systems and services out evenly across three of the four zones. - Higher confidence that the other zones are able to grow to pick up the excess load from a zone that is not functioning properly.
Run business on cloud
Cloud Solutions for the Cloud - Fully embraced the cloud paradigm.
What risk are Xensource as an open source company face?
Company like red hat could have their app over Xensource.别的公司可以在你的基础上发展
Virtualization:
Efficiency: Save money:
Virtual Network Protection
For example: the network within a host - Software based switches and network configuration as part of the virtual environment for intra-host VM communication - Private subnet is created for intra-host communications - Duplication (overlay) of physical network protection capabilities is required on the virtual network
Cloud Solutions for the Cloud
Fully embraced the cloud paradigm.
Who was the giant?
Microsoft almost 10years
Demond 和demond creation 有啥区别?
Shape the demond you get,Make more profit.
How do they going to compete?
Through performance
multitanent
many company shared resource
Intel with MS
very tight relation ,both making money, OS,
Load Balancing
"Netflix uses Amazons Elastic Load Balance (ELB) service to route traffic to our front end services. - We utilize ELB for almost all our web services. - There is one architectura llimitation with the service: losing a large number of servers in a zone can create a service interruption."
Manual Steps
"When Amazon's Availability Zone (AZ) started failing we decided to get out of the zone all together. This meant making significant changes to our AWS configuration. - While we have tools to change individual aspects of our AWS deployment and configuration they are not currently designed to enact wholesale changes, such as moving sets of services out of a zone completely. - This meant that we had to engage with each of the service teams to make the manual (and potentially error prone) changes. In the future we will be working to automate this process, so it will scale for a company of our size and growth rate.
Statelessness and Statefullness
#Stateless Services# -Any service instance can serve any request in a timely fashion; on one or another service instance; automatically spin up a new node. #Data Stored Across Zones# - In cases statelessness was impractical (statefullness), ensure multiple redundant hot copies of the data spread across zones. In the case of a failure retry another zone, or switch over to the hot standby.
Indian / Russian doll" nested relationship among IaaS, PaaS, SaaS
1. All SaaS and PaaS require an Infrastructure • This infrastructure could be IaaS or traditional. • However, a traditional infrastructure (vs. IaaS) would likely make the economics prohibitive. 2. A SaaS may or may not be built on a PaaS. • It depends on the development and deployment decisions of the SaaS. 3. Each of the 3 delivery models could come from the same or distinct providers. • This has service level, trust, and "chain of custody" implications for the end user
Essential characteristics of cloud (NIST)
1On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. 2Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). 3Resource pooling. The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth. 4Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. 5Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability1 at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
NIST Provides for 4 Deployment Models - All are commonly accepted, though they have different level of implementation adoption in market
1Private cloud. The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. 2Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. 3Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. 4Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds)
Why MS not coming up with the innovation?
1no competation2monply behavior,已经占据主要市场,如果换OS ,applications has to be updated.
Business module:
1open source:来自red hat 2 dual licensec 3 SaaS:2007年的时候the term got defined 那时候还没火起来呢23 4 functional encapsulation: 身边例子?arm's length(公平的从保持距离) flash goto site,download it ,and use. If you don't have the flash plugin the video can run. The flash is opensource,
Why a movie not there.
1some move only on DVD. 2需要有lecence 3the medium id determined by the content
内几个定义为啥错的:1没说haedware 2 virturalizationBushi require不应该出现在定义
1是IAAS定义不是SaaS PaaS 2没automatic synamic 3services 不仅是infrustructure
How did Xensource segment the market?
3 tire way :1developers 2enterprise and 3venually
Who rule the market server?dominant players?
80s : unix player:selaris hardware:sun 90s: (Win not on server side) Lunix server plate form : Win 50% over taking
Definition of (Web) Service
A Web Service (also Webservice) is defined by the W3C as "a software system designed to support interoperable machine-to-machine interaction over a network....... It has an interface described in a machine-processable format (specifically WSDL).....Other systems interact with the Web service in a manner prescribed by its description using SOAP-messages,typically conveyed using HTTP with an XML serialization in conjunction with other Web-related standards."
how does this rapid update happening?
A it needs the definition of the target available means the technology readiness, B skills C budges and approvals for company that gonna be do it. That's the ecosystem, the ecosystem consumers,providers,experts, into the market to make the move.
What is a Service
A service is a small block of computation that can be called upon to support something the business does in order to add value
Any planning and implementation towards cloud must identify which of 3 cloud delivery models to use - and know the implications
APIs, enerything is service based, between boxes, translation happens through APIs, insulation.
Relation in a layered pattern
Allowed to use - Any module in the first is allowed to use any module in the second - Layer A uses B if A's correctness depends on B being correct and present
Architecture Matters of Security, Privacy, and Regulation
Attack Surface / Hypervisor Virtual Network Protection Ancillary Data
Software Isolation2
Attack Vectors Multi-tenancy and sharing of resources at all levels gives rise to new sources of threat. E.g. malicious code from one VM can effect another VM or can effect the VMM Live migration can perpetuate threats to other hosts and VMs on them
How to recover from failure
Automate Zone Fail Over and Recovery - Zone failover had manual steps. - Automate this process, making it a "one click" operation, that can be invoked if required. Multiple Region Support - We are currently re-engineering our systems to work across multiple AWS regions as part of the Netflix drive to support streaming in global markets.
Elastic Block Storage
Avoid EBS Dependencies - We had already decided that EBS performance was an issue
The goals below are accomplished collectively through discussion, lectures, and slides.
Be able to enunciate the various meaning and relationships of "architecture" - Be able to relate to the applicability of layering solutions incloud as well as other realms - Articulate the use of layering for precision and purpose in technology and business - Knowthekeycharacteristicsoflayering - Be able to see and tell the differences of good layering and bad layering - Become accustomed to translating to business value the impact cloud and any form of layered solution - Be aware of the mapping between and SOA reference architecture and cloud computing
For most company, there is more accounting advantage in taking on opex Capex has to depreciation
Buy 100 servers,set up cost, shiped, move from dock,unbox,plug in cable,dual network, backup...not only buy server. Configure it, test it, installed, more than two month . that cost taking electricy, has to be cool, maintain opex cost, you buy it is capex cost. Variable cost, 用的少可以少电
Is the variable cost going be more or less when you compare the widge portion .
Capex: less Opex: Variable cost: depends
Create More Failures
Chaos Monkey: Netflix uses a service called Chaos Monkey to simulate service failure. - Chaos Monkey is a service that kills other services. - Should automatically recover without any manual intervention. - Chaos Gorilla: Simulate an entire Amazon goes (in works)
Graceful degradation, not unavailability
Cloud Computing - Fail Fast: Set aggressive timeouts such that failing components don't make the entire system crawl to a halt. - Fallbacks: Each feature is designed to degrade or fall back to a lower quality representation. For example if we cannot generate personalized rows of movies for a user we will fall back to cached (stale) or un-personalized results. - Feature Removal: If a feature is non-critical then if it's slow we may remove the feature from any given page to prevent it from impacting the member experience.
NIST - pervasive and commonly accepted definition today (attention to every word)
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.
Elements of a layered pattern
Cohesive collection of modules - Module is usually a design time entity vs. a Component which is usually a run time entity - The modules should have an interface by which services can be triggered or initiated or accessed - Layer should represent a virtual machine
why did company go virtualized?
Cost Scale Saves hardware speed
Aoelus
Delivery Model Targeted: IaaS Space Addressed: Cloud management Description: - Aeolus is software for running virtual machines both internally on your own equipment, and in Clouds from several leading vendors.
Graceful degradation, not unavailability
Designed for failure. - 3 principles: Cloud Computing - Fail Fast: Set aggressive timeouts such that failing components don't make the entire system crawl to a halt. - Fallbacks: Each feature is designed to degrade or fall back to a lower quality representation. For example if we cannot generate personalized rows of movies for a user we will fall back to cached (stale) or un-personalized results. - Feature Removal: If a feature is non-critical then if it's slow we may remove the feature from any given page to prevent it from impacting the member experience.
Customer: MS growing fast on the server side Windows got popular, the license to buy windows is 290$,
Domaient 1960 vendor? OEAM ,they have partenships with Dell HP IBM Dell do what ? switch and start using AMD Wintel AMD compete with Restricted with the features they innovated, hosted by MS
Microsoft Vitrlization VMware big grella Performance Defocused of management to hyperiser Relationship with OVEM
How technology 影响relationships completely restructure Understand of economics around What is the significant thing that impact the software ? opensource
General Model of Virtualization at the Infrastructure (Servers)
Hypervisors are also called Virtual Machine Monitors or VMMs. A third category called Hardware Hypervisor is not shown here
Symbiosis 共生。 What is XX in between?
Invertory and demond, what happen is recommendation . also favoured what people going to watch. 60% of que
Cloud computing pulls from a rich past of over 40 years of computing delivery models, building blocks, and concepts
Key terms, concepts, and premises 1Business processes/workflows - Business processes / workflows are underpinned by information technology 2Service oriented computing - Over-arches all forms of service-based interactions in a firm with its IT function 3Service Oriented Architecture - An element of SOC; so is cloud computing - In technology terms - SOA is an application integration paradigm - In business terms - SOA underpins integration of processes, i.e., knits functions in a firm 4Technology Stack and Architecture Layering - In technology terms - these are architecture basics for abstraction, insulation - In business terms - these serve business change and agility © Gurvinder Ahluwalia Do not copy or distribute Cloud Some of the underlying work Computing that led to Cloud Computing 5Virtualization - Technique that uses characteristics and appearance of a real resource - instead of the real resource itself 6And many more... - Client-Server computing, OO Programming, Web, Internet, Utility computing, Grid Computing, Mainframe Computing, Cluster Computing, Super Computing, .....
Service oriented mindset and its value to business - what is the connection and challenge
Model of firm comprises of transactions (among functions) IT is one such function; it serves transactions for business (processes) Aligning among business functions and units itself is hard Aligning IT with business is not easy; must know what business expects Different business strategies will result in different choices at IT level - Internationalization will result in new languages and currencies - Takeovers will result in data integration and infrastructure consolidation - Spin-off and divestiture will result in separation (opposite of consolidation and sharing) - New products will result in new services, new processes, new metrics/ reporting Service orientation is the next step to mirror business in IT - Cloud Computing, SOA,Virtualization,and other drivers make this possible - Mirroring is not sufficient, its hould also optimize - If just mirrored,the silosin business units will just mirror as silos in services
Redundancy per common practices
N+1" Redundancy - Cloud architecture designed with N+1 redundancy. - Allocate more capacity needed at any point in time. - The term N+1 indicates that one extra is needed - Spread systems and services out evenly across three of the four zones. - Higher confidence that the other zones are able to grow to pick up the excess load from a zone that is not functioning properly.
Properties
Name - Each layer is given a name - Contents - Labels, e.g.: "Network Layer", "Business Layer", etc. - The software a layers is allowed to use only the layer below or any lower layer - Are modules allowed to use other modules within the same layer? - What are the exceptions? - Cohesion - How the layer provides a cohesive function or cohesive set of services - Cohesion: services that have been developed as a group would likely be useful as a group
Load Balancing
Netflix uses Amazons Elastic Load Balance (ELB) service to route traffic to our front end services. We utilize ELB for almost all our web services. There is one architectural limitation with the service: losing a large number of servers in a zone can create a service interruption."
Capex: capital expense Buy hardware
Opex: operation Subscribe servers from the cloud Get sth from the cloud
What scenarios are virtualization for?
Provisioning配置 Run 多个OS on a single hardware server Independent management of software and hardware Utilization rate Easily be moved from one physical server to anther
Different control of responsibility for all cloud matters - including security - between Providers and Subscribers
Security is not a single block or layer, i.e., understand what and who is responsible for security at each layer
OpenStack
Space Addressed: Cloud Platform and Management (IaaS) Study further: www.openstack.com Description: - Open Stack Software delivers a massively scalable cloud operating system. 是否与non-openstack integrate?不能,也不能与AWS 相integrate.
Open Nebula
Space addressed: Intercloud Management Description: Open Nebula provides support for building Hybrid Clouds with AmazonEC2and ElasticHost, and with this new adaptor in the ecosystem, OpenNebula leverages RedHat Delta cloud to access any major public cloud, such as GoGrid, Rackspace, Terremark or Rimu Hosting and Private clouds running OpenNebula or RHEV-M.A single OpenNebula management instance can be used to combine local infrastructure with multiple remote clouds, so building a highly scalable hosting environments.
Delta cloud
Space targeted: Cloud Portability IaaS Overview: - Delta cloud protects your apps from cloud API changes and incompatibilities,so you can concentrate on managing cloud instances the way you want. 通过compensate可以把A provide 到B。
Statelessness and Statefullness
Stateless Services - Any service instance can serve any request in a timely fashion; on one or another service instance; automatically spin up a new node. Data Stored Across Zones - In cases statelessness was impractical (statefullness), ensure multiple redundant hot copies of the data spread across zones. In the case of a failure retry another zone, or switch over to the hot standby.
What cause the shift?
Technology price, market power
The industrialization of services have seen patterns of disruption - i.e., better results yet at lower costs and economics
Telecom providers have automated traffic to deliver better service at lower costs Automotive industry has moved from manual labor to manual assembly lines to automated, robotic lines that can be re-fitted dynamically for different auto models Bank teller functions are being shared through ATM or automated teller machines, again, with better service at lower. Service Orientation or Service Oriented Computing is about taking Information Technology & Systems in similar direction. Cloud Computing is a manifestation of Service Orientation
Hybrid cloud.
The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds)
Private cloud.
The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.
Community cloud.
The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises.
Public cloud.
The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. shared resources.
Goals & Understanding to Gain from today
The goals below are accomplished collectively through discussion, lectures, and slides. - Understand the meaning and implications of technology disruptors, what industries have we previously been witness - Become clear about the fundamentals of service oriented computing - Relate to service oriented computing and cloud computing through some common metaphors - Know the new mindset IT that is of value, being demanded by today's business and marketplace, and why this value is being demanded - Gain a more complete context through three "streams" that lead up to cloud computing - Become comfortable to engage in a discussion of 2 notions which are key to the disruption and key to the underpinning of cloud cloud computing - that of Service and Virtual
What the que tell you?
The que tell you about the actual demond. 60% of the que come from recommendation, the recommandion engine is really good .
OASIS / TOSCA
Topology & Orchestration Specifications for Cloud Applications Space Targeted: Management / Orchestration - Enhance the portability of cloud applications and services. TOSCA will enable the interoperable description of application and infrastructure cloud services, the relationships between parts of the service, and the operational behavior of these services (e.g., deploy, patch, shutdown)--independent of the supplier creating the service, and any particular cloud provider or hosting technology. TOSCA will also make it possible for higher-level operational behavior to be associated with cloud infrastructure management. - By increasing service and application portability in a vendor-neutral ecosystem, TOSCA will enable: - Portable deployment to any compliant cloud - Smoother migration of existing applications to the cloud - Flexible bursting (consumer choice) - Dynamic, multi-cloud provider applications OASIS:active TOSCA:data integration,wide standard. 这个incedent 如何translate就是TOSCA在强调的。
Goals & Understanding to Gain from this module
Understand real life experience from those who have done it - Relate to the challenges in moving to the cloud,relate to the benefits - Articulate and carry a discussion on the frameworks for discussion and taxonomies of workloads in planning a move to the cloud - Reinforce learning fromo the discussions - Translate to your own consumption and professional development-work pursuits and work projects.
In deciding on cloud delivery for projects, various other implications and trade-offs must be considered - technical and business
Understand that building a cloud is not just a technology activity. The choices you make (above) must be congruent with business needs.
Virtualization in Desktops & Applications
Virtualization in Desktops & Applications
The notion of virtualization is pervasive in computing
Virtualization, in computing, is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources (Turban & Lee cited in Wikipedia)
Manual Steps
When Amazon's Availability Zone (AZ) started failing we decided to get out of the zone all together. This meant making significant changes to our AWS configuration. While we have tools to change individual aspects of our AWS deployment and configuration they are not currently designed to enact wholesale changes, such as moving sets of services out of a zone completely. This meant that we had to engage with each of the service teams to make the manual (and potentially error prone) changes. In the future we will be working to automate this process, so it will scale for a company of our size and growth rate.
technology never win for technology's sake, technology always win for money.
When prict down, technoly nerver win Value doubled but price goes down
Security Paradox
While the biggest obstacle facing public cloud computing is security, the cloud computing paradigm provides opportunities for innovation in provisioning security services that hold the prospect of improving the overall security of some organizations.
What Xensource found about the challenges?
Xensource change the focusing on hypervisor and management to only on the hypervisor.
cities
architecture view.
Create market demond
by recommendation system
container organization
c groups, name spaces :separate isolation
specific small block of company, 有Input 有out put,not the whole.
called upon: available, request based, multiple users, value in need. has an interface(system, signature, protocode), the procesure is not closed. public exposed interface
saas paas iaas 有细微的displanes
change:lng fix, new pricy, aquization, market based, BPM is about change
The simplest conceptual view of cloud considers complex digital capabilities accessed with ease from some form of remote device
cloud computing delievered and consumed as served , not as capacity
SOA cant define technology , SOA is parralle with cloud computing
cloud computing is service level
5 charcristic is not required
common charactis: virtulization security recovery(not required)
data subject:I own any personal identity information.
data custodian: chase
每个physical server 有几个vm?
depends on 1capacity/supply. 2 demand /load. 3security/ isolation . 4 workload preferences
NIST - National Institute of Standards & Technology
difference with before:1 hierarchy 2relation(flow). multidemension unidemonsion , integrtion happens inside and across, http:session bluetooth,wifi: physical
elascity 和scale区分
elasicity is speed, not large. scale is demond
what's powerful about virtulization:
how a technology reorder complete industrial relationships/structure and business relationships. Not only about tech but new age
orchestration:
how to manage 每个部分都负责不同部分。
DVD 时代在线和实体店区别?instore/online
immediacy /satisfaction inventory / wild selection broad/ search price (selection convience price)
有 stateless services 不分界线的服务
move from one to anather . statelessness 无国界的 reduncy aws
One movie one inventory?
no
saas
ownership could be anybody
PEP
policy employment points. allow/block one access to each other(across devices)
translation
technology---servies
Virtulization became a witch between companies sets between hardware and OS,drow the relationship between intel and MS
the layered architecture module shows the dependency of business in the market the business servers the lower layer has relationship with the one immediately above because the second one above is abstract one which is removed the industry order shifted
network is part of VM
the network is dedicated
support small part of , to support the whole.
web server is interoperable ,couldn't be called upon
Goals & Understanding to Gain from this module
- Be able to enunciate the integration use cases in cloud - Describe the impact from these use cases on interoperability and standards in cloud - Be able to provide an overview of the various cloud standards - Understand where the challenges lie and which initiative is addressing which cloud standards space - Translate to your own consumption and professional development - work pursuits and work projects.
Compliance
- Data Location: Enterprise IT, multi-site Provider, multi-Provider relationships (portfolio view of IT delivery / consumption) - Trans-Border: Country and Regional regulations for certain data leaving international borders (e.g., individual private data, seismic data). Three aspects: - Whether laws in the jurisdiction were the data was collected permit the flow - Whether those laws continue to apply to the data post-transfer (in transit and at destination) - Whether the laws at the destination present additional risks or benefits - Legal concept of "chain of custody" - Law & Regulation: Some pertaining to US - Clinger-Cohen Act of 1996, Office of Management and Budget (OMB Circular A-130), Privacy Act of 1974, Federal Information Security Management Act (FISMA) of 2002, National Archives & Records Administration (NARA) statutes, Federal Records Act - HIPPA, PCI DSS - technical and physical safeguards
2011 (fine-grained view)
2008:nwtflix zuora wmWare ,still on the date, 还没发展起来,在发展 没reach the hype level. 2009 reach the hype level, on the peak, inflated expetations. 2010:到顶了 Gardener started to tracking sub-segments of cloud computing, different aspects of cloud . more specifics.growing at a difrent rate. 2010 August: 3D printing2010年上升,但是2016年 is a good topic ,but not something 2011:break down, begin to shake out, private cloud 上升, 微观:some of segment are 进入life: email gmail, cloud-advertiment ,virtulizationis fairly popular, system从0% to most virtualized
Eachlayerisapartitionedsetofthesystem
- Each partition constitutes a virtual machine - Each layer (virtual machine) is characterized by having a public interface - Interaction with each layer (virtual machine) is through the public interface - Each layer (virtual machine) provides a cohesive set of services • The layered view of architecture is one of the most common view-though poorly defined and commonly less understood
"In the spring of 2010, the World Economic Forum (Davos) published a report which evaluated the impact of cloud computing technologies..."
.....and highlighted the large potential benefits of adoption, ranging from economic growth and potentially sizeable improvements in employment to enabling innovation and collaboration.
difference between segment and solution
1 specific technology 2 more basic , start coding 3 前三种level是paperless不能turn into code.
O-ISM3 - Open Information Security Management Maturity Model (The Open Group)
1.ISM3 is a framework for managing information security in the context of business objectives. - The ISM3 practitioner analyzes the impact of information security on achieving business objectives and makes this analysis visible to management through the development of security objectives and targets. - This analysis forms the basis for documenting Security Policy for the organization - Recognizes that there is a trade-off between information security and other business interests, and requires business and security management to work together. 2.ISM3 provides an objective and measurable framework for managing information security. - All objectives and security targets are expressed in tangible, specific, and measurable terms from which management is able unambiguously to conclude whether the security management system is succeeding or failing.
Summary - Categories of Virtualized / Cloud Specific Threats
1Hyper-jacking: - This involves subverting the hypervisor or inserting a rogue hypervisor. - Since hypervisors run at the most privileged ring level on a processor,it would be hard or even impossible for any OS running on the hypervisor to detect. - In theory,a hacker with control of the hypervisor could control any virtual machine running on the physical server. 2VM Escape: - As the name suggests, an exploit that enables VM Escape allows a hacker who compromises a specific virtual server to escalate the attack from the virtual server to take control of the underlying hypervisor. 3VM Hopping: - Similar to VM Escape,VMHopping allows an attack to move from one virtual server to compromise other virtual server on the same physical hardware 4VM Theft: - This is the ability to steal a virtual machine file electronically, which can then be mounted and run elsewhere. - It is an attack that is the equivalent of stealing a complete physical server without having to enter a secure data center
Areas of security upside from cloud
1Platform Strength - Many cloud providers meet standards for operational compliance and certification - Examples:Healthcare(HIPAA),Finance(PCIDSS-PaymentCardIndustry Data Security Standard), Audit (SAS 70 - Statement on Auditing Standards No. 70; replaced by SSAE 16) 2Backup & Recovery - Tools,policies,and procedures are often superior with Providers. Likely more predictable, tied to service levels. - Data could become more available. 3Mobile Endpoint Security - Cloud clients can be browser-based or application -based. Either way clients are generally lightweight computationally. - Security applies both at end points and back-end of cloud 4Data Concentration - Better than data dispersed on portable devices and removables to rage media - Less prone to theft and loss
What is the security problem (security downside in cloud)
Complexity - Cloud more complex "under the hood" than traditional IT: virtual, dynamic, multi-system, multi-site, multi-party Shared and Multi-tenant - Both public and private can be shared and multi-tenant in different ways - Even within a company/subscriber, one business unit may have different security level than another Internet based services - Administrative interfaces / portals for self-service and application/other API's are accessible over the public internet - Most self-service portals are accessible through three interfaces: UI Portal, CLI - Command Line Interface, and Programmatic API's
Risk Management
Risk relates to control. Risk has more quantified and scientific expression and input to decision making.
DMTF & OVF
Desktop Management Task Force:Standards body that represents 160 member companies and organizations and more than 4,000 active participants crossing 43 countries. They have endorsed and are actively promoting the Open Virtualization Format (OVF) standard for Virtual Machines(VMs) and Virtual Applications (vApps).Workloads can be quickly converted to OVF and then moved or copied between clouds as the needs dictate. This gives the IT department and power users the ultimate flexibility as they begin to adopt a cloud-enabled approach to IT. Space Targeted: Management & Inter-cloud Interoperability Description: DMTF's Open Virtualization Format (OVF) is a packaging standard designed to address the portability and deployment of virtual appliances. OVF enables simplified and error- free deployment of virtual appliances across multiple virtualization platforms.OVF is a common packaging format for independent software vendors (ISVs) to package and securely distribute virtual appliances, enabling cross-platform portability. By packaging virtual appliances in OVF, ISVs can create a single, pre-packaged appliance that can run on customers' virtualization platforms of choice. Examples- VMware's virtual machine image is called VMDK- Amazon's EC2 virtual machine image is called AMI- OVF support is the foundation of the VMware vCloud and VMware vSphere 4.1.
Resemblance of Layers vs. Layered "Pattern"
Does the view of a system below resemble Layers? • Is it a "Layered Pattern"? • Verify that what look like layers are indeed meant to communicate a "Layered Pattern" 从顶到底, 可以绕过中间,不能从底到顶。 from A to C, only in exception acceptable(skip layer)
Key Issues & Concepts in Security, Privacy, and Regulatory realms for Cloud Computing
Governance - Control and oversight over polices, standards, design, implementation, testing, and operations. - Processes for acquisition of computation change. - Easy to bypass traditional controls and governance.
Software Isolation1
Hypervisor Complexity - Modern VMM can be larger and complex, comparable to an OS. - Xen (open source VM) incorporates a modified Linux kernel to implement privileged partitioning for I/O operations. - KVM (also open source VM) transforms Linux kernel into a VMM - Just as an OS has responsibility to isolate processes, a VMM has responsibility to isolating guest VMs. - So understanding which hypervisor to use or which one a provider uses is a key element of security.
Attack Surface / Hypervisor
Hypervisor or Virtual Machine Monitor (VMM) is a new layer and exposure - VMM provides: (a) virtual machines, and (b) API's for their management - Increased surface area for attack - Life cycle of VM's can subvert protection - Hypervisor itself can be compromised - Example: a wide used hypervisor had a vulnerability allowed FTP requests to corrupt a heap buffer in the hypervisor, permitted execution of arbitrary code at the host.
Trust
Insider Access: Threats from insider that have legitimate access - Data Ownership: Organization's rights over the data established in service contract. - Composite Services: Cloud services can be composed through nesting - For example: PaaS Provider can have nested under it another party as IaaS Provider - Usually, trust is not transitive. Third party disclosure made in advance of arrangements. - Visibility: Control is relinquished to Provider but what is the appropriate level of visibility to Subscriber
Layers help to bring quality to systems with multiple value to business
Modifiability:Portability, Applies the development principle of "information hiding". What it hides is the "virtual machine", Change to a lower layer can be hidden behind an interface and should not impact the layers above it. Interface, More than just API, Signatures, Performance qualities, Embodies all the assumptions that an external entity (layer) may make, Runtime overhead of layers can be mitigated by sophisticated compile/link/load facilities, Unused services in layer stake up resources (memory,etc), Might define work assignments and team organization but not always
Ancillary Data
Not just applications data, but BSS data. E.g.: user accounts, payment information - Virtual machine images, i.e, the software stack and configured apps - The challenge is exacerbated hand in hand with need for portability of images
不同云计算之间的转移与匹配。 nature of the problem those standard want to capture.
OVF:open virtualized format. AMI:amazon machine image.
CSCC / OMG
Object Management Group: Cloud Standards Customer Council: Space Targeted:Customer advocacy,influence oncloud standards,Unique in being representing the end customers, Provides guidance to the multiple cloud standards-defining bodies. Description: An end user advocacy group dedicated to accelerating cloud's successful adoption
ODCA
Open Data Center Alliance Space Targeted: Cloud DC Use Cases
OCCI:Open Cloud Computing Interfaces
Space Targeted: Management (IaaS, PaaS) Description:The Open Cloud Computing Interface comprises a set of open community-lead specifications delivered through the Open Grid Forum.is a Protocol and API for all kinds of Management tasks. was originally initiated to create a remote management API for IaaS model based Services, allowing for the development of interoperable tools for common tasks including deployment, autonomic scaling and monitoring. It has since evolved into a flexible API with a strong focus on integration, portability, interoperability and innovation while still offering a high degree of extensibility.The current release of the Open Cloud Computing Interface is suitable to serve many other models in addition to IaaS, including e.g. PaaS and SaaS.
The Theory of The Firm circa 1930's reveals a basis applicable even to today's waves of technology adoption
The theory of the firm as set out by Ronald Coase in 1937 The theory explains why firm sex is tthe way they do in free markets When external transaction costs are higher than internal transaction costs,the company grows When external transaction costs are lower than internal transaction costs,the company shrinks The theory investigates multiple forms of transactions costs and only transactions costs, i.e., it does not consider other elements of a firms' existence and size
Like business processes / workflows, IT is cross-cutting; additionally, IT underpins the digital portions of these processes
Theory of the Firm - Interpreted for IT - Transactions occur among functions - product development, marketing, finance, shipping, HR. Similarly, IT is a function of the firm. - A business process (or workflow) weaves across functions - 3 conclusions become essential - IT as a function of the firm, touches perhaps all other functions in contemporary firms - Business processes / workflows cross-cut functions, and so does IT - Digital portions of business process / workflow run IT capabilities making it a determining transaction cost driver
cities road map最重要. 1automated provisioning of VM- 有VM, 有hardware, 有hypervisor. 2automated configuration of VCS plateform:already done, have hypervisor, 3service catalog integration :the service catalog is there. 4 metering 不是charge back, invoice and only view. 区分show back. 5tiered offerings: performance, security, server level agreement, response, outrage, avability.
basic IaaS: most clear, already been done,每个词都很重要。 is IaaS aquire a SaaS?not nessesarity. 6load balancing: 前提network/server must exist. 7cluster level. capacity management:non-functional capacity and tiered联系到一起。 cumulus:more skill, storage, change to meanue based on policy. Arcus: external cloud, 在stratos里CBM类似MBC
SNIA - CSI and CDMI
focus on storage, google drive/dropbox. delete/update 都是在cloud上操作。 Storage Network Industry Association Cloud Storage Initiative Cloud Data Management Interface Further study: www.snia.org Description: - CSI is promoting the adoption of cloud storage as a new delivery model, that provides elastic, on-demand storage billed only for what is used. - CDMI lets you tag your data with special metadata (data system metadata) that tells the cloud storage provider what data services to provide that data (backup, archive, encryption, etc). These data services all add value to the data you store in the cloud and by implementing a standard interface such as CDMI, you are free to move your data from cloud vendor to cloud vendor without the pain of recoding to different interfaces.
data processor:master card
hypervisor are different and distinction from each other.
NIST
unique command agency, produce delievered IAAS
Corporation breakup, transaction costs, and technology's role in it
when company expand--transaction cost higher,cloud computing made source of technology out of company, make transaction cost lower.
A Layered Pattern
• Layering-likeallmodularstyles-reflectsadivisionofthesystemintounits • In a layered pattern, the units are layers • Eachlayerisa"virtualmachine" • Atruelayeredpatternandarchitecturehavegoodproperties - Modifiability, Portability, etc (more in later slide) These factors make layering a central and foundational pattern to the architecture of Services Oriented Computing & Cloud Computing
Layering has precise interpretations that must be known - in order to communicate clearly
• Layers (virtual machines) are created to interact in strict ordering relationships • Consider two layers A on top of B. This has some exacting interpretation: - Implementation of Layer A is allowed to use any of the public interfaces of Layer B - Layer B implements LayerA; A is implemented using B - Layer B is the virtual machine for Layer A. - Notation: Layer"A uses Layer B" - Is A implemented using only B? - Public facilities or common lower layers; not just the nearest lower layer - Some layers have "collection of utilities", used by any layer • Usage in layers flows downwards. No architecture can be called a layered pattern if it allows a layer to use, without restriction, the facilities of a higher layer
eucalyptus
之前opensource 现在require hp ,IAAS, which standard base is important. 两个hyperviser不能折叠到一起.
Key Message: Different levels of architecture and their relationships
最重要哦! segment architecture:cloud , supply chain.
不需要三个box,只需要一个box里装3个vm?
错! no network,no access. the router和swicher没了,怎么办?--在hyoerviser里