Tuesday, 19 February 2013

Cloud computing


Cloud computing
Introduction
Cloud computing was and is still a much discussed subject in the field of computing and the internet. This happens because this technology has a lot of strong advantages but disadvantages as well. This technology enables centralized communication with computer resources and data over the network. These resources including computers, servers, printers, video game consoles, etc are connected to the wider network infrastructure. Data is usually stored in servers located in massive data centres. It is not a new concept, as its general idea is based on an older computing model known as “Timesharing”. It is the result of more than forty years of evolution.  Cloud computing nowadays, is evolving faster than ever before, and day by day, the number of companies using is increasing. In this article we are going to present both some of its strengths and weaknesses and how it works.

Cloud structure
The principal structure of Cloud computing involves two parts which are connected to each other via a network:

     The Front end

In a “Front end” example, a computer acts as a client and includes the application needed to gain access to the back end (Cloud service). Such applications are known as APIs (Application Programming Interface). APIs are protocols used as user interfaces for providing various functions of software communication.
The best way to think about cloud computing is “Data Centre with API”. [3]
Different applications use different interfaces. Some applications enable network connection directly through the web (e.g. e-mail) and some others through specifically designed network interfaces.

The Back end

In a “Back end” example, the cloud service is communicating with a client’s computer. A cloud contains servers, computers, network routers, database storage machines and more. Also there are applications stored there, such as video editing, video gaming, word processing and anything that can fit in software. These applications can be accessed by a client computer, via communicating with the corresponding application’s servers as shown in Figure1.
A control node, typically a central server is used for administrating and monitoring the whole network’s operation.
Most of services provided, are transparently delivered, without the physical server knowing much about where the data is actually stored. This concept is similar to virtualization, where multiple resources seem like a single one.

In server environments, virtualization has become the norm with hypervisors providing for increased flexibility and improved utilization of physical assets [4].


Storage
Storing of the data takes place in massive data centers (Figure 2). Data centers house server machines, which act as database or application storage mediums.
As we know, servers often require maintenance or repair, and thus it is important to store copies of the data in multiple places. This is done or should be done to achieve redundancy of data. Without it, a cloud service provider cannot ensure its clients anywhere and anytime access of data. Also data is stored in servers using different power supplies or located in different places, to overcome the sub-sequence of a power failure event.
As we noted earlier, servers can store both data and applications. Some applications are web-based and can access the cloud through an internet browser. Such applications include:

Web mail
·         - Social networking
·         - Multimedia albums
·         - Video hosting
·         - Online gaming
·         - Online documents

In the other hand, some applications require the use of specific network enabled interfaces. Such applications include:

·         - Antivirus software
·         - Network monitoring tools
·         - Operating system/software updating
·         - Data sharing (Drop box)

Advantages of the Cloud

Cost
The most important advantage is that it can reduce the cost of the infrastructure, of a company using it. It is easier to maintain and upgrade, because network infrastructure is centrally located and can be accessed both remotely and locally.

Storage
Storage space in a cloud can be continuously expanded, as there is no limit in disk sizes. Data is hosted in third party servers and it is the host’s responsibility to take care of such issues. Such data can be accessed via a web-based interface, e.g. Google’s “drive” feature, which enables saving files on the cloud.
Backing up and recovery of data is also easier to be implemented. Most third parties will keep copies of the data, and thus it will be easier for it, to be recovered. Furthermore, data is stored in a safer place than a local physical device, in terms of objective loss or destruction of data. This reliable and redundant storage of data can provide strong “Business continuity” and “Disaster recovery”. A minor concern about storage, is that despite that most cloud services try to issue storage concerns via redundancy, there's still the possibility that an entire system could be destroyed (e.g. fire, flooding), and data will be lost completely. So it is important not only to store data in different logical places but in physical too.
Subjective loss, theft and privacy of this data issues will be discussed later.

Remote access
Data stored in the cloud, can be accessed from anywhere at any given time, given that a network connection is provided. This enables geographical and time independence. An employer of a company can retrieve his office work from whenever he wants and thus improve his productivity. Carriage of physical storage devices is not needed, and thus possibility of physically losing it is not present. Other people can also be enabled to access your data remotely.

Disadvantages of the Cloud

Security
Cloud computing means Internet computing [5].
The biggest disadvantage of the internet today, is security. And the same happens for the cloud services, as those reside on the internet. Cloud data, is stored in third party servers and thus is vulnerable to loss or theft. Some hosting providers can be more reliable than others and hence it is important to choose the best one. As cloud service’s use increase, more and more hackers will try to break into the system. This reveals that strong encryption, decryption and authentication schemes need to be used. RADIUS protocol is an example of this discipline applied to a server infrastructure, and which provides a decent level of data protection.

Technical issues
Cloud computing need more resources, smarter computers and thus more capable processor units. There is also the need of excellent, 24/7 internet connection. If for any reason connections fail, the ability to access and upload data will be hugely affected. Also there will be times where systems will face hardware or software malfunctions, and if not back-up plans are deployed a serious outage will be caused. A company served by a cloud service provider, should also keep back-ups of its data locally too. This again reveals the lack of reliability of the cloud. If so many measures need to be taken, then what is for?
A serious service outage who I experienced myself too, was the Playstation network’s one, which lasted for 25 days and affected millions of users. In this case hackers attacked user accounts and the service had to face major changes in security [6]. Users pay a lot of money to such services, and are expecting their information to be kept securely and have 24/7 service available.

Privacy
Nowadays tons of user data resides on the internet. If somebody thinks that is not a cloud service user, then he should think twice. Facebook, twitter, gmail are only some of the web-applications that are keeping our personal information of all sorts of things. This data is circulated and stored in unknown third party storage places. Of course most of these provide service level agreement contracts that will cover various privacy concerns. Personal data should be processed in accordance to these contracts. Legal measures will be able to cover most of these concerns, but in some cases the laws will be applied only within the country that the company or the service resides. Legalisation of different areas of IT is very challenging and complicated, and will always struggle people and companies

Conclusion
Like most IT technologies, we saw that cloud computing too carries a lot of advantages and disadvantages. While the technology is totally evolutionary, it can also cause great harm to an amateur user, who do not understand and use it properly.
Most of people nowadays are unaware that the whole internet is dominated by cloud services. Therefore I believe that some computing privacy and security issues should be taught to younger people in schools, because by that way, they will possess a greater awareness of the dangers that surround the current and upcoming use of the internet.
From a business perspective, we saw that a very big opportunity is opened for smaller and bigger IT companies. The evolution of internet and computing speeds, gives the ability for efficient virtualisation and remote storage of data, with lots of benefits. It is up to the companies to fulfil user needs and eliminate the presence of some disadvantages. As internet security evolves and improves, so cloud computing will become better and more trusted.

Nikolas Georgiou