and reduce
services for to different
hardware or
The cloud computing environment consist of multiple types of clouds :
applications and sensitive data in-house in a private cloud. Advantages & Limitation:
PUBLIC |
PRIVATE |
HYBRID |
COMMUNITY |
Highly Scalable |
|
Scalable |
|
Affordable |
|
|
Cost Effective |
|
Central Control |
Complex Cloud Management |
|
Less Secure |
Secure |
Partial Secure |
Partial Secure |
Highly Available |
|
|
|
Stringent SLA |
Weak SLA |
Stringent SLA |
|
CLOUD COMPUTING SERVICEMODELS
Infrastructure as a Service (IaaS): In IaaS, cloud provides the equipment to support operations, including storage, hardware, servers and networking components.
Network as a Service (NaaS) |
Provides Network as a service Like MTNL etc |
Storage as a Service (STaaS) |
Provides storage infrastructure for data storage and backups. |
Database as a Service (DBaaS) |
Provides a mechanisms to create, store, and access databases. Through API or web interface. |
Backend as a Service (BaaS) |
Provides web and mobile app developers a way to connect their applications to backend storage. |
Instance |
Description |
Testing as a Service (TaaS) |
Provides users with software testing capabilities such as generation of test data |
API as a Service (APIaaS) |
Allows users to explore functionality of Web services such as Google Maps etc. |
Email as a Service (EaaS) |
Provides users with an integrated system of emailing, office automation, records management, migration, and integration services. |
Instance |
Description |
|
Communication as a |
The CaaS vendor is responsible for all hardware and software |
|
Service (CaaS) |
management and offers guaranteed Quality of Service (QoS). |
|
|
Examples are: Voice over IP (VolP), Instant Messaging (IM), |
|
|
Collaboration and Videoconferencing application. |
|
Data as a Service (DaaS) |
Provides data on demand. The data may include text, images, sounds, andvideos. |
|
Security as a Service (SECaaS) |
It is an ability given to the end user to access the security service provided by the service provider on a pay-per-usebasis. |
|
Identity as Service (IDaaS) |
a |
It is an ability given to the end users; typically an organization or enterprise; to access the authentication infrastructure that is built, hosted, managed and provided by the third party serviceprovider. |
Explore All Chapters