0% found this document useful (0 votes)
1K views12 pages

Architectural Design Challenges

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views12 pages

Architectural Design Challenges

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

KGiSL Institute of Technology

(Approved by AICTE, New Delhi; Affiliated to Anna University, Chennai)


Recognized by UGC, Accredited by NBA (IT)
365, KGiSL Campus, Thudiyalur Road, Saravanampatti, Coimbatore – 641035.

Department of Computer Science and Engineering

Name of the Faculty : Ms. Suriya A

Subject Name & Code : CCS335/ Cloud Computing

Branch & Department : Computer Science and Engineering

Year & Semester : IV / VII

Academic Year :2023-24


Syllabus
• UNIT I CLOUD ARCHITECTURE MODELS AND INFRASTRUCTURE 6

• Cloud Architecture: System Models for Distributed and Cloud Computing – NIST Cloud Computing
Reference Architecture – Cloud deployment models – Cloud service models; Cloud Infrastructure:
Architectural Design of Compute and Storage Clouds – Design Challenges

CCS335/CC/III CSE/V SEM/KG-KiTE


Course Outcome

CO1: Understand the design challenges in the cloud.

CCS335/CC/III CSE/V SEM/KG-KiTE


TOPIC

Architectural Design Challenges


Architectural Design Challenges
• Challenge 1 : Service Availability and Data Lock-in Problem
• Challenge 2: Data Privacy and Security Concerns
• Challenge 3: Unpredictable Performance and Bottlenecks
• Challenge 4: Distributed Storage and Widespread Software Bugs
• Challenge 5: Cloud Scalability, Interoperability and Standardization
Cloud Scalability
• Challenge 6: Software Licensing and Reputation Sharing

CCS335/CC/III CSE/V SEM/KG-KiTE


Challenge 1 : Service Availability
and Data Lock-in Problem
• Service Availability
• Distributed Denial of service (DDoS) attacks
• Data Lock-in

CCS335/CC/III CSE/V SEM/KG-KiTE


Challenge 2: Data Privacy and
Security Concerns
• Cloud services are prone to attacks because they are accessed through internet.

Security is given by
• Storing the encrypted data in to cloud.
• Firewalls, filters.
• Guest hopping
• Hijacking
• Man in the middle attack
• Passive attack
• Active attack

CCS335/CC/III CSE/V SEM/KG-KiTE


Challenge 3: Unpredictable
Performance
and Bottlenecks
• Multiple VMs can share CPUs and main memory in cloud computing,
but I/O sharing is problematic.
• Internet applications continue to become more data-intensive
(handles huge amount of data).
• Handling huge amount of data (data intensive) is a bottleneck in cloud
environment.
• Weak Servers that does not provide data transfers properly must be
removed from cloud.

CCS335/CC/III CSE/V SEM/KG-KiTE


Challenge 4: Distributed Storage
and Widespread Software Bugs
• The database is always growing in cloud applications.
• There is a need to create a storage system that meets this growth.
• This demands the design of efficient distributed SANs (Storage Area
Network of Storage devices).
• Data centers must meet
• Scalability
• Data Durability
• HA(High Availability)
• Data consistency

CCS335/CC/III CSE/V SEM/KG-KiTE


Challenge 5: Cloud Scalability, Interoperability
and Standardization Cloud Scalability
• Cloud Scalability
• Cloud resources are scalable. Cost increases when storage and network
bandwidth scaled(increased)
• Interoperability
• Open Virtualization Format (OVF) describes an open, secure, portable,
efficient, and extensible format for the packaging and distribution of VMs.
• OVF defines a transport mechanism for VM, that can be applied to different
virtualization platforms
• Standardization
• Cloud standardization, should have ability for virtual machine to run on any
virtual platform

CCS335/CC/III CSE/V SEM/KG-KiTE


Challenge 6: Software Licensing and
Reputation Sharing
• Cloud providers can use both pay-for-use and bulk-use licensing
schemes to widen the business coverage.
• Cloud providers must create reputation-guarding services similar to
the “trusted e-mail” services
• Cloud providers want legal liability to remain with the customer, and
vice versa.

CCS335/CC/III CSE/V SEM/KG-KiTE


Thank
You!

CCS335/CC/III CSE/V SEM/KG-KiTE

You might also like