0
12kviews
What are the risks associated with cloud computing?

Mumbai University > Information Technology > Sem 7 > Cloud Computing

Marks: 10M

Year: Dec 2015

1 Answer
0
182views

The risks associated with cloud computing are as follows:

  1. Security, Privacy, and Trust:
  2. The information security as a main issue is that current cloud offerings are essentially public exposing the system to more attacks. For this reason there are potentially additional challenges to make cloud computing environments as secure as in-house IT systems.
  3. At the same time, existing technologies can be leveraged, such as data encryption, VLANs, and firewalls.
  4. Security and privacy affect the entire cloud computing stack, since there is a massive use of third-party services and infrastructures that are used to host important data or to perform critical operations. In this scenario, the trust toward providers is fundamental to ensure the desired level of privacy for applications hosted in the cloud. Legal and regulatory issues also need attention.
  5. When data are moved into the Cloud, providers may choose to locate them anywhere on the planet. The physical location of data centers determines the set of laws that can be applied to the management of data. For example, specific cryptography techniques could not be used because they are not allowed in some countries.
  6. Similarly, country laws can impose that sensitive data, such as patient health records, are to be stored within national borders.

  7. Data Lock-In and Standardization

  8. A major concern of cloud computing users is about having their data locked-in by a certain provider. Users may want to move data and applications out from a provider that does not meet their requirements. However, in their current form, cloud computing infrastructures and platforms do not employ standard methods of storing user data and applications. Consequently, they do not interoperate and user data are not portable due to standardization. In this direction, there are efforts to create open standards for cloud computing.
  9. The Cloud Computing Interoperability Forum (CCIF) was formed by organizations such as Intel, Sun, and Cisco in order to enable a global cloud computing ecosystem whereby organizations are able to seamlessly work together for the purposes for wider industry adoption of cloud computing technology. The development of the Unified Cloud Interface (UCI) by CCIF aims at creating a standard programmatic point of access to an entire cloud infrastructure. In the hardware virtualization sphere, the Open Virtual Format (OVF) aims at facilitating packing and distribution of software to be run on VMs so that virtual appliances can be made portable—that is, seamlessly run on hypervisor of different vendors.

  10. Availability, Fault-Tolerance, and Disaster Recovery

  11. Users have certain expectations about the service level to be provided once their applications are moved to the cloud. These expectations include availability of the service, its overall performance, and what measures are to be taken when something goes wrong in the system or its components i.e. users seek for a warranty before they can comfortably move their business to the cloud. SLAs(Service Level Agreement), which include QoS requirements, must be ideally set up between customers and cloud computing providers to act as warranty. An SLA specifies the details of the service to be provided, including availability and performance guarantees.
  12. Additionally, metrics must be agreed upon by all parties, and penalties for violating the expectations must also be approved.

  13. Resource Management and Energy-Efficiency

  14. One important challenge faced by providers of cloud computing services is the efficient management of virtualized resource pools.
  15. Physical resources such as CPU cores, disk space, and network bandwidth must be sliced and shared among virtual machines running potentially heterogeneous workloads.
  16. The multi-dimensional nature of virtual machines complicates the activity of finding a good mapping of VMs onto available physical hosts while maximizing user utility. Dimensions to be considered include: number of CPUs, amount of memory, size of virtual disks, and network bandwidth.
  17. Dynamic VM mapping policies may leverage the ability to suspend, migrate, and resume VMs as an easy way of preempting low-priority allocations in favor of higher-priority ones.
  18. Migration of VMs also brings additional challenges such as detecting when to initiate a migration, which VM to migrate, and where to migrate. In addition, policies may take advantage of live migration of virtual machines to relocate data center load without significantly disrupting running services.
  19. In this case, an additional concern is the trade-off between the negative impact of a live migration on the performance and stability of a service and the benefits to be achieved with that migration.
  20. Another challenge concerns the outstanding amount of data to be managed in various VM management activities. Such data amount is a result of particular abilities of virtual machines, including the ability of traveling through space (i.e., migration) and time (i.e., check pointing and rewinding) operations that may be required in load balancing, backup, and recovery scenarios.
  21. In addition, dynamic provisioning of new VMs and replicating existing VMs require efficient mechanisms to make VM block storage devices (e.g., image files) quickly available at selected hosts. Data centers consumer large amounts of electricity. According to a data published by HP, 100 server racks can consume 1.3MWof power and another1.3 MW are required by the cooling system, thus costing USD 2.6 million per year.
  22. Besides the monetary cost, data centers significantly impact the environment in terms of CO2 emissions from the cooling systems. In addition to optimize application performance, dynamic resource management can also improve utilization and consequently minimize energy consumption in data centers. This can be done by judiciously consolidating workload onto smaller number of servers and turning off idle resources.
Please log in to add an answer.