Скачать презентацию Cloud Operating System Unit 13 Cloud System Management Скачать презентацию Cloud Operating System Unit 13 Cloud System Management

dde884df6517db5dff621d5af0aefe23.ppt

  • Количество слайдов: 24

Cloud Operating System Unit 13 Cloud System Management II M. C. Chiang Department of Cloud Operating System Unit 13 Cloud System Management II M. C. Chiang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung, Taiwan, ROC

Outline q Data Management v Data Integration v Data Security v Data Redundancy v Outline q Data Management v Data Integration v Data Security v Data Redundancy v Data Ownership q Network Management v Open. Stack Nova-Network v Open. Stack Quantum v Network Security q Summary 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -2

Data Management q What can be taken as data? v Uploaded files (Documents, Videos, Data Management q What can be taken as data? v Uploaded files (Documents, Videos, Music) v Program Codes v User personal information (Name, Age, Location, etc. ) v User surfing history v etc. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -3

Data Integration q There are no existing standards for moving data in the cloud. Data Integration q There are no existing standards for moving data in the cloud. q The methods of each manufacture’s cloud data storage is different. q Here are some issues for enterprises to treat their data for integration: v Backup v Data movement (from/to) the Cloud 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -4

Data Security (1) q Data security can be considered from three aspects: v Physical Data Security (1) q Data security can be considered from three aspects: v Physical Layer n n Touchable things such as machines, devices. As mentioned in “IDC Management”. v Network Layer n n The behaviors through network. This will be discussed later. v Management Layer n 3/18/2018 Can data be recognized by the Cloud? Cloud Operating System - Unit 12: Cloud Management U 12 -5

Data Security (2) q With the rise of cloud computing, there are some new Data Security (2) q With the rise of cloud computing, there are some new problems. v Data analysis n Google advertisement, e. g. , the righ side of the letter when using Gmail. v Mash-up authorization n n 3/18/2018 Facebook utilizes both sensitive and non-sensitive data to present to other users. Third-party applications on Facebook can also utilize the data. Cloud Operating System - Unit 12: Cloud Management U 12 -6

Data Security (3) v Increased authentication demands n Pros l l l n Software Data Security (3) v Increased authentication demands n Pros l l l n Software piracy becomes difficult. Centralize monitoring on software. Prevents sensitive data spread on untrustworthy clients. Cons l Phishing for stealing access credentials. v Cost-effective defense n n 3/18/2018 Cloud Computing encourages single points of failure. Protect productivity and trust from attackers. Cloud Operating System - Unit 12: Cloud Management U 12 -7

Data Security (4) q Data shouldn’t be recognized by the Cloud provider/maintainer. q The Data Security (4) q Data shouldn’t be recognized by the Cloud provider/maintainer. q The simplest way to protect the data is performing encryption. v AES v RSA v Blowfish v IDEA 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -8

Data Security – Examples (1) q Amazon S 3 v 2011/10/04 announced v Encryption Data Security – Examples (1) q Amazon S 3 v 2011/10/04 announced v Encryption n When writing the object, add an additional request header. v Decryption n Automatically happens when the data retrieved. v Encryption Algorithm n 3/18/2018 AES-256 Cloud Operating System - Unit 12: Cloud Management U 12 -9

Data Security – Examples (2) q Google Docs v Google Docs doesn’t provide any Data Security – Examples (2) q Google Docs v Google Docs doesn’t provide any server side encryption methods. v For data security, users can n n encrypt the document before uploading set the group who can view the document v Encrypted document can not be viewed on Google Docs. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -10

Data Security – Before Using the Cloud q Users should confirm service providers’ response Data Security – Before Using the Cloud q Users should confirm service providers’ response for the following three questions v Are files transferred securely to/from the servers? v Are files stored on the servers encrypted by default? v How will the provider react to the file request from law? n 3/18/2018 If the provider could decrypt the file, what will the provider do? Cloud Operating System - Unit 12: Cloud Management U 12 -11

Data Redundancy q The idea is simple; copy multiple data across different “zones”. q Data Redundancy q The idea is simple; copy multiple data across different “zones”. q Example: The Ring in Open. Stack v Review: n Ring records the physical address of data. v When creating a ring, administrator must supply how many replicas through the zones, and the minimum interval of copying data in command. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -12

Data Ownership q Cloud service provider provides a free/non-free disk space and computing ability Data Ownership q Cloud service provider provides a free/non-free disk space and computing ability for users to handle the data. q After all, who owns the data? v Provider? n I provide the disk space!! v User? n 3/18/2018 I upload the data!! Cloud Operating System - Unit 12: Cloud Management U 12 -13

Network Management Network is a fundamental part of Cloud Computing. q Network is an Network Management Network is a fundamental part of Cloud Computing. q Network is an infrastructure which is q v easy to access v stable v high transfer rate v low latency for users. q Network in a cloud can be classified into two parts. v Internal network v External network 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -14

Open. Stack Nova-Network q Open. Stack network controller (nova-network) q The operations: v Allocate Open. Stack Nova-Network q Open. Stack network controller (nova-network) q The operations: v Allocate fixed IP addresses. v Configuring VLANs for projects. v Configuring networks for compute nodes. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -15

Open. Stack Nova-Network - Concepts q Fixed IPs v An IP address will be Open. Stack Nova-Network - Concepts q Fixed IPs v An IP address will be assigned to an instance after instance creation. v The assigned IP will be remained until the instance is explicitly terminated. q Floating IPs v An IP address can be dynamically associated with an instance. v An IP address can be disassociated and associated with an instance at any time. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -16

Fixed IPs Implementation (1) q There are three strategies available for implementing fixed IPs. Fixed IPs Implementation (1) q There are three strategies available for implementing fixed IPs. v Flat Mode n The simplest networking mode. v Flat DHCP Mode n Similar to flat mode. v VLAN DHCP Mode n 3/18/2018 The default networking mode. Cloud Operating System - Unit 12: Cloud Management U 12 -17

Fixed IPs Implementation (2) v Flat Mode n n By default, all instances attach Fixed IPs Implementation (2) v Flat Mode n n By default, all instances attach to the same bridge (br 100). Before the instance is booted, the network configuration will be injected into the instance. So far, this only works on linux-style systems. The network configuration is in /etc/networking/interfaces. v Flat DHCP Mode n n 3/18/2018 Nova will attempt to bridge into an ethernet device. A DHCP server (dnsmasq) will respond to instance’s dhcpdiscover operation. Cloud Operating System - Unit 12: Cloud Management U 12 -18

Fixed IPs Implementation (3) v VLAN DHCP Mode n n n 3/18/2018 Requires a Fixed IPs Implementation (3) v VLAN DHCP Mode n n n 3/18/2018 Requires a switch which supports host-managed vlan tagging. A vlan will be created with a range of private ips. Cloudpipe helps user access the instances. Nova generates a key and certificate for user. One vpn per project. Illustration is shown in next page. Cloud Operating System - Unit 12: Cloud Management U 12 -19

Fixed IPs Implementation (4) 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U Fixed IPs Implementation (4) 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -20

Open. Stack Quantum (1) q Isolated from Nova to serve “Network Connectivity as a Open. Stack Quantum (1) q Isolated from Nova to serve “Network Connectivity as a Service”. q Help user to establish their own network services. q Three components: v REST API Layer n Directly connect to Nova. v Authentication and Authorization Layer v Pluggable Backend 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -21

Open. Stack Quantum (2) q REST API Layer v Implement Quantum API and redirect Open. Stack Quantum (2) q REST API Layer v Implement Quantum API and redirect API requests to where they should. q Authentication and Authorization Layer v Validate API requests and ensure them from the authorized users. q Pluggable Backend v Enhance REST API Layer. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -22

Network Security q Even though it might be safe in the cloud, but the Network Security q Even though it might be safe in the cloud, but the network is complicated. q The traditional methods still work for cloud. v Sniffer v ARP Poison v XSS v SQL Injection v etc. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -23

Summary q Users should confirm the agreement before using the service. q Quantum helps Summary q Users should confirm the agreement before using the service. q Quantum helps users to create the ideal network. 3/18/2018 Cloud Operating System - Unit 12: Cloud Management U 12 -24