You are on page 1of 49

1.

Overview:

Comparisons:
Cloud computing derives characteristics from, but should not be confused with: 1. Autonomic computing "computer systems capable of self-management" 2. Client server model client server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients) 3. Grid computing "a form of distributed computing and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks" 4. Mainframe computer powerful computers used mainly by large organizations for critical applications, typically bulk data-processing such as census, industry and consumer statistics, enterprise resource planning, and financial transaction processing. 5. Utility computing the "packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity"; 6. Peer-to-peer distributed architecture without the need for central coordination, with participants being at the same time both suppliers and consumers of resources (in contrast to the traditional client server model) 7. Service-oriented computing Cloud computing provides services related to computing while, in a reciprocal manner, service-oriented computing consists of the computing techniques that operate on software-as-aservice.

Characteristics The key characteristic of cloud computing is that the computing is "in the cloud" i.e. the processing (and the related data) is not in a specified, known or static place(s). This is in contrast to a model in which the processing takes place in one or more specific servers that are known. All the other concepts mentioned are supplementary or complementary to this concept. Generally, cloud computing customers do not own the physical infrastructure, instead avoiding capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity) are consumed, whereas others bill on a subscription basis. Sharing "perishable and intangible" computing power among multiple tenants can improve utilization rates, as servers are not unnecessarily left idle, which can reduce costs significantly while increasing the speed of application development. A side-effect of this approach is that overall computer usage rises dramatically, as customers do not have to engineer for peak load limits. In addition, "increased high-speed bandwidth" makes it possible to receive the same. The cloud is becoming increasingly associated with small and medium enterprises (SMEs) as in many cases they cannot justify or afford the large capital expenditure of traditional IT. SMEs also typically have less existing infrastructure, less bureaucracy, more flexibility, and smaller capital budgets for purchasing in-house technology. Similarly, SMEs in emerging markets are typically unburdened by established legacy infrastructures, thus reducing the complexity of deploying cloud solutions. Economics Cloud computing users avoid capital expenditure (CapEx) on hardware, software, and services when they pay a provider only for what they use. Consumption is usually billed on a utility (resources consumed, like electricity) or subscription (time-based, like a newspaper) basis with little or no upfront cost. Other benefits of this approach are low barriers to entry, shared infrastructure and costs, low management overhead, and immediate access to a broad range of applications. In general, users can terminate the contract at any time (thereby

avoiding return on investment risk and uncertainty), and the services are often covered by service level agreements (SLAs) with financial penalties. According to Nicholas Carr, the strategic importance of information technology is diminishing as it becomes standardized and less expensive. He argues that the cloud computing paradigm shift is similar to the displacement of private factory power generators by utility power plants early in the 20th century. Although companies might be able to save on upfront capital expenditures, they might not save much and might actually pay more for operating expenses. In situations where the capital expense would be relatively small, or where the organization has more flexibility in their capital budget than their operating budget, the cloud model might not make great economic sense. Other factors having an impact on the scale of potential cost savings include the efficiency of a company's data center as compared to the cloud vendor's, the company's existing operating costs, the level of adoption of cloud computing, and the type of functionality being hosted in the cloud. Additionally, companies can usually depreciate equipment, such as computers, where services cannot be written off in the same fashion. Among the items that some cloud hosts charge for are instances (often with extra charges for high-memory or high-CPU instances), data transfer in and out, storage (measured by the GB-month), I/O requests, PUT requests and GET requests, IP addresses, and load balancing. In some cases, users can bid on instances, with pricing dependent on demand for available instances. Architecture

Cloud computing sample architecture

Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over application programming interfaces, usually web services and 3-tier architecture. This resembles the UNIX philosophy of having multiple programs each doing one thing well and working together over universal interfaces. Complexity is controlled and the resulting systems are more manageable than their monolithic counterparts. The two most significant components of cloud computing architecture are known as the front end and the back end. The front end is the part seen by the client, i.e. the computer user. This includes the client¶s network (or computer) and the applications used to access the cloud via a user interface such as a web browser. The back end of the cloud computing architecture is the µcloud¶ itself, comprising various computers, servers and data storage devices.

History:
The underlying concept of cloud computing dates back to the 1960s, when John McCarthy opined that "computation may someday be organized as a public utility." Almost all the modern-day characteristics of cloud computing (elastic provision, provided as a utility, online, illusion of infinite supply), the comparison to the electricity industry and the use of public, private, government and community forms was thoroughly explored in Douglas Park hill¶s 1966 book, The Challenge of the Computer Utility. The actual term "cloud" borrows from telephony in that telecommunications companies, who until the 1990s primarily offered dedicated point-to-point data circuits, began offering Virtual Private Network (VPN) services with comparable quality of service but at a much lower cost. By switching traffic to balance utilization as they saw fit, they were able to utilize their overall network bandwidth more effectively. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider from that of the user. Cloud computing extends this boundary to cover servers as well as the network infrastructure. The first scholarly use of the term ³cloud computing´ was in a 1997 lecture by Ramnath Chellappa.

those who use IT services and those who sell them" and observed that "organizations are switching from company-owned hardware and software assets to per-use servicebased models" so that the "projected shift to cloud computing . Cost is claimed to be greatly reduced and capital expenditure is converted to operational expenditure. fast-moving "twopizza teams" could add new features faster and more easily. Open Nebula. were using as little as 10% of their capacity at any one time. enhanced in the RESERVOIR European Commission funded project. Google. in the framework of the IRMOS European Commission funded project. This ostensibly lowers barriers to entry. Cloud Computing systems typically use REST-based APIs." Key features:    Agility improves with users' ability to rapidly and inexpensively re-provision technological infrastructure resources. Application Programming Interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers. By mid-2008. In early 2008.Amazon played a key role in the development of cloud computing by modernizing their data centers after the dot-com bubble. and launched Amazon Web Service (AWS) on a utility computing basis in 2006. Eucalyptus became the first open source AWS API compatible platform for deploying private clouds. which. In 2007. Having found that the new cloud architecture resulted in significant internal efficiency improvements whereby small. IBM and a number of universities embarked on a large scale cloud computing research project. In early 2008.. just to leave room for occasional spikes. like most computer networks.. Gartner saw an opportunity for cloud computing "to shape the relationship among consumers of IT services. efforts were focused on providing QoS guarantees (as required by real-time interactive applications) to Cloud-based infrastructures. became the first open source software for deploying private and hybrid clouds and for the federation of clouds. In the same year. as infrastructure is typically provided by a third-party and does not need to be . will result in dramatic growth in IT products in some areas and significant reductions in other areas. Amazon initiated a new product development effort to provide cloud computing to external customers.

Security is often as good as or better than under traditional systems. Nonetheless. Scalability via dynamic ("on-demand") provisioning of resources on a finegrained. Reliability is improved if multiple redundant sites are used.)  Peak-load capacity increases (users need not engineer for highest possible load-levels)  Utilization and efficiency improvements for systems that are often only 10± 20% utilized. Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface.. Furthermore. increased securityfocused resources. self-service basis near real-time. etc. and IT and business managers can at times do little when they are affected. mobile). electricity. but accessing the audit logs themselves can be difficult or impossible. PC.g.. As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet. and the lack of security for stored kernels. but concerns can persist about loss of control over certain sensitive data. One of the most important new methods for overcoming performance bottlenecks for a large class of applications is data parallel programming on a distributed data grid. in part because providers are able to devote resources to solving security issues that many customers cannot afford. Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for:  Centralization of infrastructure in locations with lower costs (such as real estate. Security could improve due to centralization of data. Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e. Providers typically log accesses.     purchased for one-time or infrequent intensive computing tasks. etc. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house). many major cloud computing services have suffered outages. users can connect from anywhere. without users having to engineer for peak loads. the . which makes well designed cloud computing suitable for business continuity and disaster recovery.

The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider from that of the user. memory. and processing and band width. Metering means that cloud computing resources usage should be measurable and should be metered per client and application on a daily. 41% of IT senior professionals doesn¶t have sound knowledge on cloud computing. since they don't have to be installed on each user's computer. Maintenance of cloud computing applications is easier. Access the personal files at any computer with internet access. and yearly basis. Electronic Recycling The costs of electronic recycling are shifted to the hands of the cloud provider.   complexity of security is greatly increased when data is distributed over a wider area and / or number of devices. Introduction: "Computation may someday be organized as a public utility". monthly. Helps to use applications without installations. They are easier to support and to improve since the changes reach the clients instantly. This technology allows much more efficient computation by centralizing storage. Based on a study conducted in June 2009 by version one. weekly. The actual term "cloud" borrows from telephony in that telecommunications companies. Cloud computing extends this boundary to cover servers as well as the network infrastructure. .

. who until the 1990s primarily offered dedicated point-to-point data circuits. Cost is claimed to be greatly reduced and capital expenditure is converted to operational expenditure. when John McCarthy opined that "computation may someday be organized as a public utility".In September 2009. Aberdeen Group found that 18% reduction in there IT budget and a 16% reduction in data center power costs. began offering ³VIRTUAL PRIVATE NETWORK (VPN)´ services with comparable quality of service but at a much lower cost. Cloud computing extends this boundary to cover servers as well as the network infrastructure. The underlying concept of cloud computing dates back to 1960. Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using. Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. The actual term "cloud" borrows from telephony in that telecommunications companies. indeed it shares characteristics with service bureaus that date back to the 1960s. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider from that of the user.

Once an Internet connection is established among several computers. phones and other devices. Layers The Internet functions through a series of network protocols that form a stack of layers. it is possible to share services within any one of the following layers. . or that is specifically designed for delivery of cloud services and that.5. in either case. Client: A cloud client consists of computer hardware and/or computer software that relies on cloud computing for application delivery. is essentially useless without it. operating systems and browsers. Examples include some computers. as shown in the figure (or as described in more detail in the OSI model).

pricing.. commercially available (i. enabling customers to access applications remotely via the Web Application delivery that typically is closer to a one-to-many model (single instance. not custom) software Activities that are managed from central locations rather than at each customer's site. multi-tenant architecture) than to a one-to-one model. where a provider will license software tailored  Infrastructure providers can allow customers¶ to run applications off their infrastructure. but transparent to the end user  Customers can utilize greater computing power while saving on the following  Cost  Space  Power Consumption  Facility .e. People tend to use the terms µSaaS¶ and µcloud¶ interchangeably. eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support. Key characteristics include     Network-based access to. and management characteristics Centralized feature updating. which obviates the need for downloadable patches and upgrades. partnering. Application as a service:  Defined as service-on-demand. when in fact they are two different things.Application: Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet. including architecture. and management of.

often consuming cloud infrastructure and sustaining cloud applications.  Infrastructure providers can dynamically allocate resources for service providers  Service providers offer this service to end users  Allows cost savings for the service providers. data-center space or network equipment. Cloud infrastructure often takes the form of a tier 3 data center with many tier 4 attributes. delivers computer infrastructure . often consuming cloud infrastructure and sustaining cloud applications. software. It facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. since they  do not need to operate their own datacenter .  Cloud platform services or "Platform as a Service (PaaS)" deliver a computing platform and/or solution stack as a service. assembled from hundreds of virtual machines. Rather than purchasing servers. Suppliers typically bill such services on a utility computing basis and amount of resources consumed (and therefore the cost) will typically reflect the level of activity. clients instead buy those resources as a fully outsourced service.typically a platform virtualization environment as a service.Platform: Cloud platform services or "Platform as a Service (PaaS)" deliver a computing platform and/or solution stack as a service. IaaS evolved from virtual private server offerings. also known as "Infrastructure as a Service (IaaS)". Infrastructure: Cloud infrastructure services.  It facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers.

Deployment models: 1. Community cloud 3. cloud-specific operating systems and combined offerings. Public cloud: Public cloud or external cloud describes cloud computing in the traditional main stream sense. whereby resources are dynamically provisioned on a fine-grained. including multi-core processors. . The server¶s layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services. self-service basis over the Internet. including multi-core processors. Hybrid cloud 4. cloud-specific operating systems and combined offerings. Ad hoc systems allow quick customization to consumer Demands Server: The server¶s layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services. via web applications/web services. Public cloud 2. Private cloud These are the basic models available in the cloud concept. from an offsite third-party provider who bills on a fine-grained utility computing basis.

and applications from different customers are likely to be mixed together on the cloud¶s servers. A public cloud may be established where several organizations have similar requirements  Public clouds are run by third parties. and networks Community cloud: A community cloud may be established where several organizations have similar requirements and seek to share infrastructure so as to realize some of the benefits of cloud computing. . With the costs spread over fewer users than a public cloud (but more than a single tenant) this option is more expensive but may offer a higher level of privacy. storage systems. security and/or policy compliance. Examples of community cloud include Google's "Gov Cloud".

where the hosting infrastructure is a mix between cloud hosting and managed dedicated servers . .By integrating multiple cloud services users may be able to ease the transition to public cloud services while avoiding issues such as PCI compliance. A combined cloud environment consisting of multiple internal and/or external providers "will be typical for most enterprises". internal or external). allowing local data to be replicated to a public cloud. Two clouds that have been joined together are more correctly called a "combined cloud".Hybrid cloud: There is some confusion over the term "hybrid" when applied to the cloud . The most correct definition of the term "hybrid cloud" is probably the use of physical hardware and virtualized cloud server instances together to provide a single common service. private.a standard definition of the term "Hybrid Cloud" has not yet emerged. or a combination of virtualized cloud server instances used together with real physical hardware.this is most commonly achieved as part of a web cluster in which some of the nodes are running on real physical hardware and some are running on cloud server instances. The term "hybrid cloud" has been used to mean either two separate clouds joined together (public. Hybrid storage clouds are often useful for archiving and backup functions. Another perspective on deploying a web application in the cloud is using Hybrid Web Hosting. A hybrid storage cloud uses a combination of public and private storage clouds.

 Hybrid clouds combine both public and private cloud models  to provide on-demand. externally provisioned scale  used to handle planned workload spikes .

and manage them" and thus do not benefit from lower up-front capital costs and less hands-on management. .g. Some vendors have used the terms to describe offerings that emulate cloud computing on private networks. Even within modern utility industries. the ability to recover from failure. however the concepts themselves pre-date the term cloud by 40 years. and the ability to scale up or down depending upon demand. essentially "[lacking] the economic model that makes cloud computing such an intriguing concept". The idea was based upon direct comparison with other industries (e.Private cloud: Douglas Park hill first described the concept of a "private computer utility" in his 1966 book The Challenge of the Computer Utility. Private clouds have attracted criticism because users "still have to buy. the electricity industry) and the extensive use of hybrid supply models to balance and mitigate risks. These (typically virtualization automation) products offer the ability to host applications or virtual machines in a company's own set of hosts. These provide the benefits of utility computing -shared hardware costs. Enterprise IT organizations use their own private cloud(s) for mission critical and other operational systems to protect critical infrastructures. hybrid models still exist despite the formation of reasonably well-functioning markets and the ability to combine multiple providers. build. Private cloud and internal cloud have been described as neologisms.

 Are built for the exclusive use of one client  providing the extreme control over data. . and quality of service  The company owns the infrastructure and has control over how applications are deployed on it. security.

quantifiable. conceptualization. . leading towards a cloud ecosystem Cloud engineering is also known as cloud service engineering. as well as the study and applied research of the approach.e. Private clouds have attracted criticism because users "still have to buy. Cloud storage is a model of networked computer data storage where data is stored on multiple virtual servers. i. standardization.. and interdisciplinary approach to the ideation. the application of engineering to cloud.. It is a maturing and evolving discipline to facilitate the adoption.Cloud engineering: Cloud engineering is the application of a systematic. and interdisciplinary approach to the ideation. build. operation. conceptualization. as well as the study and applied research of the approach. strategization. operation. development. and governance of cloud solutions. productization. disciplined. Cloud engineering is the application of a systematic. and manage them" and thus do not benefit from lower up-front capital costs and less hands-on management. and maintenance of cloud computing.e. industrialization.7. i. the application of engineering to cloud. disciplined. and maintenance of cloud computing. quantifiable. commoditization. generally hosted by third parties. development. rather than being hosted on dedicated servers. operationalization.

in the background. generally hosted by third parties. Cloud storage: Cloud storage is a model of networked computer data storage where data is stored on multiple virtual servers. Physically. The Quoter shall provide non-cumulative monthly reports for the items described in the table below for. . rather than being hosted on dedicated servers. and people who require their data to be hosted buy or lease storage capacity from them and use it for their storage needs. The data center operators. Management of Federal Information Resources. After award of the BPA(s). the Quoter shall be responsible for the deliverable products on firm-fixed price basis within the schedules contained in the individual task orders.8. The following security requirements apply to services that may be provided in individual task orders issued under this BPA. Deliverables listed below should be accessible via online interface not later than 10 days after the end of the calendar month and available for up to one year after creation. The information shall be available in comma separated values (CSV) file format. the resource may span across multiple servers. virtualized the resources according to the requirements of the customer and expose them as virtual servers. Hosting companies operate large data centers. which the customers can themselves manage. The Office of Management and Budget (OMB) Circular A-130. requires Federal agencies to plan for security.

quality of service. This concept has been subsequently used many times over the last 40 years and is identical to the Inter cloud. monitoring and billing. trust. security." It became popular in 2009 and has also been used to describe the datacenter of the future. The concept of a competitive utility computing market which combined many computer utilities together was originally described by Douglas Park hill in his 1966 book. the "Challenge of the Computer Utility". and interoperability. The term was first used in the context of cloud computing in 2007 when Kevin Kelly stated that "eventually we'll have the inter cloud. This Inter cloud will have the dimensions of one machine comprising all servers and attendant cloud books on the planet. legal issues. Such form of pay-for-use may introduce new business opportunities among cloud providers if they manage to go beyond theoretical framework. The inter cloud: The Intercloud is an interconnected global "cloud of clouds" and an extension of the Internet "network of networks" on which it is based. vendor's lock-ins. the Inter cloud raises many more challenges than solutions concerning cloud federation. the cloud of clouds. it could not be able to satisfy further requests for service allocations sent from its clients.9. If a cloud saturates the computational and storage resources of its virtualization infrastructure. each cloud can use the computational and storage resources of the virtualization infrastructures of other clouds. The Inter cloud scenario is based on the key concept that each single cloud does not have infinite physical resources. Nevertheless. and in theory. . The Inter cloud scenario aims to address such situation.

Sustainability and sitting Privacy: The cloud model has been criticized by privacy advocates for the greater ease in which the companies hosting the cloud services control. and thus. lawfully or unlawfully. In a Web Hosting scenario. plus the Web Server. and Verizon. can monitor at will.10. Availability and performances 8. monitoring. the communication and data stored between the user and the host company. which recorded over 10 million phone calls between American citizens. and the greater powers it gives to telecommunication companies to monitor user activity. Software and supporting software (i. working with AT&T. Security 7.e. and maintaining the infrastructure as described above. the Quoter is responsible for securing. Legal 4. Open standards 6. Issues: 1. any data base management systems.. causes uncertainty among privacy advocates.) . Open source 5. providers such as Amazon still cater to major markets (typically the United States and the European Union) by deploying local infrastructure and allowing customers to select "availability zones. Compliance 3. Instances such as the secret NSA program. While there have been efforts (such as US-EU Safe Harbor) to "harmonize" the legal environment. Privacy 2.

Dell applied to trademark the term "cloud computing" (U. the specific Service Level Agreement shall document who is responsible for creating. Trademark 77. Compliance: In order to obtain compliance with regulations Including FISMA. Amazon. and maintaining user accounts.g. Salesforce.082) in the United States. Providers typically make this information available on request. resulting in a formal rejection of the trademark application less than a . Google and Microsoft but this has been criticised on the grounds that the handpicked set of goals and standards determined by the auditor and the auditee are often not disclosed and can vary widely.139. The "Notice of Allowance" the company received in July 2008 was canceled in August. under nondisclosure agreement. This is how Google is able to "manage and meet additional government policy requirements beyond FISMA" and Rack spaces Cloud are able to claim PCI compliance. Legal: In March 2007. the Data Protection Directive in the EU and the credit card industry's PCI DSS.com. HIPAA and SOX in the United States. Many providers also obtain SAS 70 Type II certification (e. users may have to adopt community or hybrid deployment modes which are typically more expensive and may offer restricted benefits.S. If individual (named) user access is required.The Consumer Agency is responsible for securing and maintaining the web application. Customers in the EU contracting with cloud providers established outside the EU/EEA have to adhere to the EU regulations on export of personal data.

securing. and trademark analysts predict that over 500 such marks could be filed during 2010. On October 29. calling the requirement "unduly restrictive of competition. up to and including the applications running on the guest OS. in this case a Federal Government Agency. beginning in 2005. ³Scholars have pointed out that. the Consumer Agency is responsible for the security of the ³guest´ Operating System (OS) and any additional software. network(s). Department of Interior. Open source: Open source software has provided the foundation for many cloud computing implementations. Since 2007. On its part.week later. a version of GPLv3 intended to close a perceived legal loophole associated with free software designed to be run over a network. and software that support the infrastructure and present Virtual Machines (VMs) and IT resources to the consumer. the number of trademark filings covering cloud computing brands. the prevalence of open standards and open source may have an impact on the way that public entities choose to select vendors. The Quoter is responsible for provisioning. In November 2007. In CC. Google filed a lawsuit against the U.S. and maintaining the hardware. cloud computing trademark filings increased by 483% between 2008 and 2009. monitoring. In 2009. which opened up a bid for software that required that bidders use Microsoft's Business Productivity Online Suite. the Free Software Foundation released the Affero General Public License. As companies sought to better position themselves for cloud computing branding and marketing efforts. 2010. goods and services has increased at an almost exponential rate. 116 cloud computing trademarks were filed. security responsibilities are shared between the Quoter and the Consumer. . Other legal cases may shape the use of cloud computing by the public sector. Below provides GSA¶s minimum requirements for a Moderate Impact Cloud Computing (CC) Infrastructure as a Service (IaaS) Offering. Google sued.

and maintaining user accounts. the specific Service Level Agreement shall document who is responsible for creating.) The Consumer Agency is responsible for securing and maintaining the web application. Issues barring the adoption of cloud computing are due in large part to the private and public sectors unease surrounding the external management of security based services. . The Open Cloud Consortium (OCC) is working to develop consensus on early cloud computing standards and practices. private or public. the Quoter is responsible for securing.Open standards: Most cloud providers expose APIs which are typically well-documented (often under a Creative Commons license) but also unique to their implementation and thus not interoperable. Security: The relative security of cloud computing services is a contentious issue which may be delaying its adoption.. plus the Web Server software and supporting software (i.e. monitoring. If individual (named) user access is required. and maintaining the infrastructure as described above. In a Web Hosting scenario. Some vendors have adopted others' APIs and there are a number of open standards under development. This delivers great incentive amongst cloud computing service providers in producing a priority in building and maintaining strong management of secure services. including the OGF'sOpen Cloud Computing Interface. It is the very nature of cloud computing based services. that promote external management of provided services. any data base management systems.

. for moderate impact systems.7 . Management of Federal Information Resources. the Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within cloud computing. One organization in particular. The Office of Management and Budget (OMB) Circular A-130. The Government and the Contractor will work in good faith to establish an Interconnection Security Agreement (ISA) and/or a Memorandum of Understanding (MOU) as provided in the National Institute of Standards and Technology (NIST) Special Publication 800-47. Recommended Security Controls for Federal Information Systems.Security Requirements. businesses are also worried about acceptable levels of availability and performance of applications hosted in the cloud. There are also concerns about a cloud provider shutting down for financial or legal reasons. The following security requirements apply to services that may be provided in individual task orders issued under this BPA. The Government¶s intent is to accept the Contractor¶s commercial information security practices that are functionally equivalent to those provided by NIST Special Publication 800-53. Availability and performance: In addition to concerns about security. which has happened in a number of cases.Organizations have been formed in order to provide standards for a better future in cloud computing services. Security Guide for Interconnecting Information Technology Systems. Section D. requires Federal agencies to plan for security.

Sweden and Switzerland. marine research infrastructure of sensors and computational technology. Thus countries with favorable conditions. the environmental effects will be more moderate. In areas where climate favors natural cooling and renewable electricity is readily available. Siting the servers affects the environmental effects of cloud computing. are trying to attract cloud computing data centers. there is as of yet no published study to substantiate this assumption. such as Finland.Sustainability and siting: Although cloud computing is often assumed to be a form of "green computing". . an emerging approach to shared infrastructure in which large pools of systems are linked together to provide IT services. is being developed using cloud computing. Smart Bay.

± Security Requirements). manage. As depicted in the Figure 1 below. the framework consists of three major categories: y Cloud Service Delivery Capabilities . SERVICES AND PRICES Scope The scope of this RFQ focuses on IaaS service offerings available within a public cloud deployment model. illustrated below. The Framework is a functional view of the key capabilities required to enable Cloud Computing. The Cloud Computing Framework is neither architecture nor an operating model. The implementation is a Moderate Impact System as defined in National Institute of Science and Technology (NIST) Federal Information Processing Standard (FIPS) Publication 199 (Section D7. provides a high-level overview of the key functional components for cloud computing services for the Government.Core capabilities required to deliver Cloud Services y Cloud Services ± Services delivered by the Cloud y Cloud User Tools ± Tools or capabilities that enable users to provision. Federal Cloud Computing Framework The Cloud Computing Framework.11. and use the Cloud services .

however. Reporting and Analytics offer the ability to perform key reporting and business intelligence analytics and therefore are not core Cloud Computing components. while the vertical functional areas illustrate the management and business capabilities needed to wrap-around the core components to enable business processes with Cloud Computing.Figure 1: Federal Cloud Computing Framework The Horizontal functional areas represent the core ³computing´ capabilities that enable different levels of Cloud Computing. For example. GSA Cloud Computing Storefront The initial acquisition of these services will be facilitated by GSA through the GSA Cloud Computing Storefront Site ± which will enable Government purchasers to buy (using a credit card or other acceptable payment option) IaaS . analytics offer significant business capabilities that can harness the power of the data that will reside within the Cloud Computing environment.

gov. and maintains the right to request full copies of these at any time. 1 GSA Cloud Storefront (Web Portal) 2 Federal Agencies inquire and procure IaaS service through the GSA Cloud Storefront The GSA Federal Cloud Storefront provides the predefined IaaS service offering options from the supported IaaS vendors based on the submitted inquires from the Federal Agency Tasks The requirements focus on IaaS service offerings. Virtual Machines (VM). Figure 2: GSA Cloud Computing Storefront IaaS Providers IaaS Vendor 1 Government Agencies Once IaaS Services are procured the Federal Agency works directly with the selected IaaS vendor in configuring and utilizing the services via the Internet 4 Federal Agency 1 Federal Agency 2 Federal Agency n IaaS Vendor 2 IaaS Vendor n Internet 3 Based on Federal Agency¶s selection. The Government shall retain ownership of any user created/loaded data and an application hosted on vendor¶s infrastructure. Requirements have been established for each of the IaaS functional components within the Federal Cloud Framework described above as required (mandatory). and Cloud Web hosting service.service offerings as needed through a common Web Portal. specifically for Storage Services. the GSA Cloud Storefront enables the procurement of IaaS services with the vendor. which will be managed and maintained by GSA. such as apps. .

On-demand selfservice A consumer can unilaterally provision computing capabilities. and 3) Requirements ± specifies the requirements for service offerings along with their attributes and the purchase units. without vendor review or approval) provision services.e. . 2. such as server time and network storage. The Quoter shall provide the capability for the ordering activity to unilaterally (i. y IaaS Technical Requirements ± specifies the technical requirements for enabling the IaaS service offerings. as needed automatically without requiring human interaction with each service¶s provider. y IaaS Service Offering (Lot 1.The requirements are divided into three categories as follows: y General Cloud Computing Requirements ± specifies general requirements for cloud services. Cloud Technical Requirements The Quoter shall provide a Cloud Computing solution that aligns to the following ³Essential Characteristics´ as defined in the National Institute of Standards and Technology (NIST) Working Definition and described in Table 1 below: Table 1: Cloud Technical Requirements Cloud Characteristic Definition General Requirement 1.

3.. The customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e. country. Location independent resource pooling The provider¶s computing resources are pooled to serve all consumers using a multi-tenant model.g.. state. The Quoter shall support internet bandwidth of at least 1Gb/s 2b. General Requirement 2a. memory at 1000 times our minimum resource unit metrics. and PDAs).g. Ubiquitous network access Definition Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e. Examples . independently from the physical location of the facilities. computing capacity. mobile phones. with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. laptops. The Quoter shall support provisioning of practically unlimited storage. or datacenter).Cloud Characteristic 2. The Quoter shall have a minimum of two data center facilities at two different geographic locations in the Continental United States (CONUS) and all services acquired under the BPA will be guaranteed to reside in CONUS.

processing. the capabilities available for provisioning often appear to be infinite and can be purchased in any quantity at any time.. and virtual machines. storage. General Requirement 4. Rapid elasticity Capabilities can be rapidly and elastically provisioned to quickly scale up and rapidly released to quickly scale down.g. The Quoter shall support service provisioning and de-provisioning times (scale up/down). Resource usage can be monitored. To the consumer. making the service available within near real-time of provisioning request. bandwidth. and reported providing transparency for both the provider and consumer of the utilized service. network bandwidth.Cloud Characteristic Definition of resources include storage. . controlled. The Quoter shall offer visibility into service usage via dashboard or similar electronic means. and active user accounts). 5. memory. Measured Service Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e. processing.

and data center facilities requirements. . as requested. allocate resources. storage and bandwidth dynamically (or ondemand). Service Management and Provisioning Requirements Service Management and Provisioning requirements address the technical requirements for supporting the provisioning and service management of the IaaS Service Offerings described in Section 4. The Quoter shall enable Service Provisioning via Application Programming Interface (API).3. The requirements for this section are divided into the following areas: Service Management and Provisioning.IaaS Technical Requirements This section specifies the requirements that are applicable to all three (3) Lots as mentioned in Section C.4. Quoter shall support secure provisioning. User/Admin Portal. Table 2: Service Management and Provisioning Requirements Service Provisioning 1. integration requirements. 4. de-provisioning and administering [such as Secure Sockets Layer (SSL)/Transport Layer Security (TLS) or Secure Shell (SSH)] in its service offerings. Service provisioning focuses on capabilities required to assign services to users. 2. and services and the monitoring and management of these resources. This shall include any traffic shaping capabilities the Quoter uses.3 of this document. The Quoter shall enable Service Provisioning via customizable online portal/interface (tools). The Quoter shall provide the ability to provision virtual machines. 3.

5%. Resources (Documentation. The Quoter shall provide Helpdesk and Technical support services to include system maintenance windows. etc) 7. The Quoter shall provide a robust. Service Level Agreement Management 8.5. 99. The Quoter shall document and adhere to their SLAs to include: y Service Availability (Measured as Total Uptime Hours / Total Hours within the Month) displayed as a percentage of availability up to one-tenth of a percent (e.g. Articles/Tutorials. fault tolerant infrastructure that allows for high availability of 99. The Quoter shall support the terms of service requirement of terminating the service at any time (on-demand).5%) y Within a month of a major outage occurrence resulting in greater than 1-hour of unscheduled downtime. The Quoter shall describe the outage including description of root-cause and fix. 6. These reports shall be available for one year after being created. The Quoter shall make the Management Reports described in Section 6 accessible via online interface. The Quoter shall provide a custom webpage and associated Uniform Resource Locator (URL) that describes the following: a. y Service provisioning and de-provisioning times (scale up and down) in near real-time 10. 9. Help Desk and Technical Support c. Service Level Agreements (SLAs) b. .

recovery and refresh operations on a periodic basis. storage. 14. 19. server and virtualization layer. to include performance of internal technology refresh cycles applicable to this BPA. dual factor method of remote access which allows Government designated personnel the ability to perform duties on the hosted infrastructure. The Quoter shall manage data isolation in a multi-tenant environment. Data Management . The Quoter shall manage the network. The Quoter shall ensure the security of the services and data hosted at their facilities by providing DR (Disaster Recovery) and COOP (Continuity of Operations) capabilities.Operational Management 11. 16. The Quoter shall provide the artifacts. DR and COOP 15. 12. The Quoter shall transfer data back in-house either on demand or in case of contract or order termination for any reason. security policies and procedures demonstrating its compliance with the the Security Assessment and Authorization requirements as described in Section D7 ± Security Requirements. The Quoter shall perform patch management appropriate to the scope of their control. 18. The Quoter shall perform backup. The Quoter shall provide a secure. The Quoter shall manage data remanence throughout the data life cycle. 13. 17.

22.20. The individual task orders issued under this BPA will specify a monthly ceiling dollar limitation. User/Admin Portal Requirements Table 3 below describes User/Admin management requirements: Table 3: User/Admin Portal Requirements Order Management 21. The Quoter should enable Order Management via Application Programming Interface (API). 25. The Quoter shall not bill beyond the approved monthly dollar threshold. The Quoter shall provide on-line billing capability that will allow customers to see the status of their bills (updated weekly). 24. The Quoter shall provide the ability for the customer agency to track the status of their invoices. by email and by posting that notification to the website. The Quoter shall provide security mechanisms for handling data at rest and in transit. When 80% of this dollar limit has been reached. that the quoter is approaching the 80% threshold for the order. the Quoter shall notify the user. Billing/Invoice Tracking 23. The Quoter shall enable Order Management via customizable online portal/interface (tools). .

User Profile Management Integration Requirements Table 4 describes Integration requirements for cloud services. degraded service.Utilization Monitoring Trouble Management 26. 27. . Table 4: Integration Requirements Application Programming Interfaces (APIs) 30. The Quoter should provide Trouble Ticketing via API. The Quoter shall provide Trouble Ticketing via customizable online portal/interface (tools). Data Center Facilities Requirements Table 5 describes Data Center Facilities requirements. 28. The Quoter shall provide support to all API¶s it develops/provides. The Quoter shall maintain user profiles and present the user with his/her profile at the time of login. via service dashboard or other electronic means. The Quoter shall provide automatic monitoring of resource utilization and other events such as failure of service. 29. etc.

The Quoter shall provide Internet bandwidth at the minimum of 1 GB. also known as settlement free peering. allowing the Government to have read-only access to inspect the firewall configuration. 3) The Quoter should provide dedicated virtual private network (VPN) connectivity between customer and the Firewalls LAN/WAN . 34. or the Quoter shall administer a firewall policy in accordance with the Government¶s direction. and where this peering occurs. IP Addressing: 1) The Quoter should provide IP address assignment. The Quoter shall implement a firewall policy that allows the Government to administer it remotely. include Dynamic Host Configuration Protocol (DHCP). 2) The Quoter shall provide IP address and IP port assignment on external network interfaces. The Quoter shall provide its Autonomous Number System 32. with a minimum of two data center facilities at two different geographic locations in the Continental United States (CONUS) and all services acquired under the BPA will be guaranteed to reside in CONUS. The Quoter shall provide a Wide Area Network (WAN). The Quoter shall identify Tier 1 Internet service providers it is peered with. A Tier 1 network is an IP network that participates in the Internet solely via Settlement Free Interconnection.Table 5: Data Center Facilities Requirements Internet Access 31. 33. 35. and if capable. The Quoter µs Local Area Network (LAN) shall not impede data transmission.

service attributes. the hosting Quoter shall provide access to the hosting facility for inspection.4.1) y Lot 2: Virtual Machines (Section C.2) y Lot 3: Cloud Web Hosting (Section C.vendor.3. physical infrastructure (hardware).4. Data Center Facilities 36.3. The Quoter shall provide data center facilities including space. . 37. 5) The Quoter shall provide an infrastructure that is IPv6 capable.3) The following sections describe the service. service options. allowing websites or other applications operating in the cloud to be viewed externally as Government URLs and services.4. 4) The Quoter shall allow mapping IP addresses to domains owned by the Government. power.3. Lot Specific Technical Requirements The IaaS Service Offering Requirements have been divided into three distinct Lots: y Lot 1: Cloud Storage Services (Section C. Upon request from the Government. The Quoter shall provide data center facilities and the physical and virtual hardware that are located within the Continental United States of America (CONUS). and service units for the three Lots.

designed to encourage research into all aspects of cloud computing. service and data center management. University of Washington. In July 2008. University of Virginia. Virginia Tech. multi-data center. and the Institute for System Programming at the Russian Academy of Sciences (ISPRAS). University of Wisconsin±Madison. North Carolina State University. the Electronics and Telecommunications Research Institute (ETRI) in Korea. called Open Cirrus. University of Massachusetts. open source test bed. 2010. In Sept. Research: A number of universities. the University of Illinois (UIUC). the Malaysian Institute for Microelectronic Systems(MIMOS). Academic institutions include University of Melbourne (Australia). University of Minnesota.12. more researchers joined the HP/Intel/Yahoo Open Cirrus project for cloud computing research.Open Cirrus partners include the NSF. University of Utah. Yale. In April 2009. University of Maryland. Intel Corporation and Yahoo! announced the creation of a global. Wayne State. Carnegie Mellon.university project designed to enhance students' technical knowledge to address the challenges of cloud computing. MIT. among others. Spain's Supercomputing Center of Galicia (CESGA by its Spanish acronym). academic and vendor collaborative research projects include the IBM/Google Academic Cloud Computing Initiative (ACCI). Indiana University. Karlsruhe Institute of Technology. In October 2007IBM and Google announced the multi. vendors and government organizations are investing in research around the topic of cloud computing. HP. the National Science Foundation joined the ACCI and awarded approximately $5 million in grants to 14 academic institutions. The new researchers are China Mobile Research Institute (CMRI). Joint government. Georgia Tech. University of California. Georgia Tech's Center for Experimental Research in Computer Systems (CERCS) and China Telecom. Purdue University. . the Infocomm Development Authority (IDA) of Singapore. IIT Bombay.

HP Labs India announced a new cloud-based technology designed to simplify taking content and making it mobile-enabled. In Nov. HP Labs Bristol is HP¶s second-largest central research location and currently is responsible for researching cloud computing and security. even from low-end devices. . highly flexible cloud computing based on intellectual property developed at HP Labs. CLOUD 2010 was held on July 5±10. Florida. located at the HP Labs site in Bristol.In July 2010. HP formally opened its Government Cloud Theatre. The IEEE Technical Committee on Services Computing in IEEE Computer Society sponsors the IEEE International Conference on Cloud Computing (CLOUD). 2010 in Miami. England. The aim of the facility is to lessen fears about the security of the cloud. Called Siteon Mobile. 2010. The demonstration facility highlights high-security. the new technology is designed for emerging markets where people are more likely to access the internet via mobile phones rather than computers.

CEO Larry Ellison of Oracle Corporation asserts that cloud computing is "everything that we already do". GNU's Richard Stallman insists that the industry will only use the model to deliver services at ever increasing rates over proprietary systems. otherwise likening it to a "marketing hype campaign.13. describing what he calls "cloud washing" in the industry whereby companies relabel their products as cloud computing resulting in a lot of marketing innovation on top of real innovation. Criticism of the term: Some have come to criticize the term as being either too unspecific or even misleading. Forrester Research VP Frank Gillett questions the very nature of and motivation behind the push for cloud computing. See also        Cloud backup Cloud engineering Cloud gaming Data center Green computing High-performance computing List of cloud computing providers Open Data Center Alliance . claiming that the company could simply "change the wording on some of our ads" to deploy their cloud-based services.

 Finally.  This lets you focus on deploying more apps. but it can have a huge impact on your business.com Take a quick  Office Web Applications  Google Docs  View Video tour Cloud computing is a simple idea. so your CFO will love it. new projects.. accessible anywhere with internet Future educational uses:  An expansion of Microsoft live@edu  View Video  More useful spending of technology budgets  Classroom collaboration  View an example from AirSet. cloud apps don¶t eat up your valuable IT resources. and innovation Future personal uses:  No more backing up files to thumb drives or syncing computers together  Services replace devices  A single hard drive for the rest of a person¶s life.14. Conclusion:  Cloud computing is a better way to run your business. .

^ Buyya. Krissi (2008-03-26). Chee Shin Yeo.com. 11. Datacenterknowledge. Cloud vs Grid". Retrieved 2010-08-22. Retrieved 2010-08-22. ^ "Distributed Application Architecture". Retrieved 2008-07-31. 2009-03-11. ^ "Cloud Computing: Clash of the clouds". ^ "It's probable that you've misunderstood 'Cloud Computing' until now". 2. 14. 9. "Gartner Says Cloud Computing Will Be As Influential As E-business". pp. Rajkumar.com. 10.edu.com. 8. ^ "What's In A Name? Utility vs. Knowledge.net. Retrieved 26 July 2010. Retrieved 2010-08-22. Retrieved 2010-09-14.15. Srikumar Venugopal (PDF). ^ Cloud Computing Defined 17 July 2010.Computer Security Resource Center". Galen (2008-04-07). MarketOriented Cloud Computing: Vision. IEEE Internet Computing. Retrieved 2009-11-03. Retrieved 2010-08-22. Hype.InfoWorld Retrieved 2009-06-02. Department of Computer Science and Software Engineering.nist. ^ "Sun CTO: Cloud computing is like the mainframe".com.asu. 12. 9.eweek. Sun Microsystem. "What cloud computing really mean". ^ "Cloud Computing: The Evolution of Software-as-a-Service". ^ "Service-Oriented Computing and Cloud Computing: Challenges and Opportunities". Retrieved 2010-08-22. "Distinguishing Cloud Computing from Utility Computing".gov. 6. Gartner.com/c/a/Enterprise-Applications/Forresters-Advice-toCFOs-Embrace-Cloud-Computing-to-Cut-Costs/ . 4. Itknowledgeexchange. Ebizq. TechPluto.techtarget. 2009-10-15.wpcarey. Thestandard. Csrc. 7. The Economist. University of Melbourne. ^ "The Internet Cloud". 16. Australia.gov . Danielson. 13. Sellsbrothers. ^ http://www. References: 1. ^ "NIST. ^ "Writing & Speaking".com. Gruman. 5. Retrieved 2010-08-22. 15. 3. Retrieved 2010-08-22. and Reality for Delivering IT Services as Computing Utilities. Retrieved 2010-08-22. Retrieved 2010-12-04. Retrieved 2009-06-16.Computer Security Division .

E. Join in 'Cloud Computing' Research 27.wordpress. ³A Real-time Service Oriented Infrastructure´. ^ [1]. Cucinotta.M. M. ^ a b Jeff Bezos' Risky Bet. A.com. ^ B. Part 1: Cloud Architectures". Cloudave. ^ "Amazon EC2 Spot Instances". Networkworld. 25. No. Vol. ^ "Infrastructure Agility: Cloud Computing as a Best Practice". IBM Journal of Research and Development. Oliveros. Rochwerger. November 2010 29. J. 24. A. Retrieved 2009-09-11. ^ Google and I. 53. 200904-16. Amy Schurr. Retrieved 2009-09-11.com.com. International Conference on Real-Time and Embedded Systems (RTES 2010). 32. Gartner. ^ Keep an eye on cloud computing. Wolfsthal. M. citing the Gartner report. W. Galan. ^ D. Oberle. Retrieved 2010-08-22. 31. R. Boniface.amazonwebservices. Berger. . ^ Gartner Says Worldwide IT Spending On Pace to Surpass $3. Retrieved 2010-08-22. Llorente. Singapore. D. Kousiouris. (2009) 28. Edgewatertech. Bmighty. Levy. E. Retrieved 2010-08-22.4 Trillion in 2008.com. Y. F. J. 21. Developer. 22. K. "Cloud Computing Confusion Leads to Opportunity". ^ "Cloud Computing Savings ± Real or Imaginary?". T. Galis. Elmroth. ^ "Five cloud computing questions". Retrieved 2011-01-07. Caceres. 2010-01-15. 19. 4. "1 Midsize Organization Busts 5 Cloud Computing Myths". Nagin. Retrieved 2010-08-22.M.com. Fredric. S. Network World.com. 26. Kyriazis. Computerworlduk. Breitgand.com. 1993 meeting report from the IP over ATM working group of the IETF".B. T. E.S. Emmerich. Appirio. Caceres. Ben-Yehuda. ^ "Building GrepTheWeb in the Cloud. G. ^ Paul. Menychtas. 2008-08-18. Retrieved 201008-22. ^ "July. 23. K. "The RESERVOIR Model and Architecture for Open Federated Cloud Computing". Elmroth. I.17. ^ "Recession Is Good For Cloud Computing ± Microsoft Agrees". E. ^ "Nicholas Carr on 'The Big Switch' to cloud computing". Montero. Retrieved 2010-08-22. 18. Retrieved 2010-08-22. 20. 2008-0708. 30. Voith. Retrieved 2010-08-22.

Geek.com.com.blogspot. Retrieved 2010-08-22. ^ King. Retrieved 2010-08-22. Eccentex.33. Pcworld. "Cloud computing security forecast: Clear skies". 2009-11-18. Hopeful About Future". 37. 2008 (2008-09-02). Thomas. ^ "Scaling Storage and Analysis of Data Using Distributed Data Grids". Exari. 42.com. Retrieved 2010-08-22. "Google angles for business users with 'platform as a service'". 2008-09-23. 34. Dan (2008-06-25). ^ "Exari: Death By Laptop". 47. 2008-06-22. ^ "Encrypted Storage and Key Management for the cloud". Retrieved 2010-08-22. ^ 2005 Software as a Service Taxonomy and Research Guide[dead link] 48. "The new geek chic: Data centers". ^ Claburn. Retrieved 2010-08-22. Newsweek. ^ Farber.com.com. Rachael (2008-08-04). ^ Jack Schofield (2008-04-17). Gigaom. ^ a b c d "Defining "Cloud Services" and "Cloud Computing"". 45. 39.com. 38.wordpress.com. Born of a Cloud Feud". ^ "The Emerging Cloud Service Architecture". Retrieved 2010-08-22. Cryptoclarity. Businessweek. Retrieved 2010-08-22.typepad. ^ Mills. Retrieved 2010-08-22. ^ a b Nimbus Cloud Guide[dead link] 43. 2006-05-08. Retrieved 2010-08-22. London: Guardian. 41. 2009-06-03. 35. ^ "An example of a 'Cloud Platform' for building applications".com. Elinor (2009-01-27). News. Nubifer. ^ "Microsoft's cloud operating system. "Cloud Computing: Small Companies Take Flight". ^ "What Makes a Cloud Computer?". 36. . Windows Azure. News. 2010-02-16. Retrieved 2010-08-22. "The Cloud's Chrome Lining".idc.com. 40. Retrieved 2010-08-22. Datacenterknowledge.cnet.com. Aws.com.com. ^ "New Resource. 44. 49. Informationweek.com. "Google Reveals Nexus One 'Super Phone'". 2008-08-15. ^ by Brian BraikerSeptember 02. Retrieved 2010-08-22. Blogs. 50. Retrieved 2010-08-22.cnet. 2008-0603.com. to go live in January". 2009-07-30. 46. Retrieved 2010-08-22. ^ "Google Apps Admins Jittery About Gmail. Retrieved 2010-08-22.com. Retrieved 2010-08-22.

Businessinsider. 2010-06-30. ^ "EMC buys Pi and forms a cloud computing group". Jan 2010 61. Retrieved 2010-08-22. Informationweek. SNIA. ^ Claburn. Steve.co.uk. Retrieved 201008-22. The Internet is Still Filled with Problems". ^ Managing Private and Hybrid Clouds for Data Storage.com. 65. 66. 64.2 Million Los Angeles Contract". 2010-0101.Protocols and Formats for Cloud Computing Interoperability. Monique (2009-05-24). Gordon (2009-01-27). Retrieved 2010-08-22. "Private Clouds Take Shape". Retrieved 2010-08-22.techtarget. Theregister. doi:10. 53.2009. 2008-02-21. Blueprint for the Intercloud . Searchstorage. "IBM Embraces Juniper For Its Smart 'Hybrid Cloud'. ^ a b "Kevin Kelly: A Cloudbook for the Cloud". Thomas. IEEE Computer Society. Krishna. John.com. Infoworld. Readwriteweb. ^ Bernstein. "Google's "Gov Cloud" Wins $7.com. Morrow. 54. ^ Myslewski. Rik (2009-12-02). Ludvigson. 2009-06-22. ^ "Vint Cerf: Despite Its Age. ^ "Forecast for 2010: The Rise of Hybrid Clouds". 56. "Just don't call them private clouds".net. News. Retrieved 2010-08-22.com. Gigaom. ^ "Intercloud is a global cloud of clouds". ^ Duffy.com. 62. Jim (2009-05-12).com.cnet. Erik. Disses Cisco (IBM)". ^ "Cutting Through the Cloud Hype". ^ Haff. 67. ^ Eric Krangel (2009-02-10). ^ a b Foley. Retrieved 2010-12-31.com. Diamond. Retrieved 2010-08-22. 52. Retrieved 2010-08-22. Samj. "Cisco unveils cloud computing platform for service providers". 58.com. ^ http://cloudscaling. 328±336. Retrieved 2010-08-22. ^ "There's No Such Thing As A Private Cloud". Sankar.com. Retrieved 2010-08-22. Retrieved 2010-08-22. 59. Retrieved 2010-08-22. Retrieved 2010-08-22. Informationweek. Informationweek.55. ^ Microsoft Plans 'Cloud' Operating System 55. forbes. pp. 63. Kk. David. 60. .51. 2010-07-15.com.com/blog/cloud-computing/hybrid-clouds-are-halfbaked 57.1109/ICIW.org. "Intel puts cloud on single megachip".

Retrieved 2010-08-22. Retrieved 2010-08-22.68. 70. Theglobeandmail. ^ "SP360: Service Provider: From India to Intercloud". Leslie (2006-05-11).cisco. ^ Cauley. 69. Blogs. Retrieved 2010-08-22. "Head in the clouds? Welcome to the future".com. Usatoday. ^ Canada.com.com. . "NSA has massive database of Americans' phone calls".