Understanding The Different Roles In A Cloud Computing Setup

Understanding The Different Roles In A Cloud Computing Setup

A Cloud Computing Setup

If you are migrating from enterprise to a cloud based solution, it is necessary to understand the different roles in cloud computing. In this post, I will cover the 6 major roles in the cloud setup.

Cloud Service Provider

This is the entity that provides the cloud service. The cloud service provider owns and controls the cloud computing platform. The services include SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) and IpaaS (Integration Platform as a Service).

CloudTweaks Comic

Based on the services provided, the CSPs can be broadly categorised into 3 types:

  • Application provider – These are providers that directly provide you access to an application without you having to worry about the layers underneath. Thus, if you are running a mail application with Google, you don’t need to worry much about the server infrastructure, resources such as RAM or platforms. Examples include Dropbox, Salesforce.com, Google Apps and Microsoft Office 365.

  • Resource provider – These provide virtualization systems on top of their servers and lets you buy resources such as RAM, computing cycles and disc space. Offerings from providers such as Rackspace Cloud and Amazon Web Services (AWS) typically fall under this category.

  • Infrastructure provider – These lease servers and associated infrastructure from their datacenters. The infrastructure includes servers, storage, bandwidth and the datacenter (with power, space and personnel to man them). Companies such as Rightscale provide you the complete infrastructure to set up your cloud service.

Cloud Consumer

This is the user that is consuming the cloud services. The “Cloud Consumer” could be one of the following:

  • Developers in your enterprise who are building the apps using the cloud infrastructure.

  • Office workers and end consumers who are accessing the storage and productivity applications.

  • IT support team that uses the cloud services such as cloud backups to supplement their resources.

Cloud Service Brokerage

Cloud Service Brokerage (CSB) provides intermediation services between the consumer and the provider.

They provide three major services:

  • Aggregation services – integration service different cloud service providers,

  • Intermediation services – help you identify the right service provide, consistent billing and support

  • Arbitrage services – getting good deals on what you pay for different cloud services.

Cloud Architects

These are the guys who will help you design your cloud solution and develop the right cloud architecture that suits your needs. The architecture should incorporate your storage, security, computing and compliance needs and build the right design that satisfies these needs.

Cloud Auditor

Security is a very critical aspect in any cloud setup. Since you might be storing confidential enterprise data on a server over which you have less control, it is important to put in place the right auditing and regulatory processes. Cloud Auditors are a third party who will provide independent assessments on your cloud setup and point out to the security vulnerabilities, data leaks and performance issues.

There are 5 major types of audits that these companies might offer:

  • Data security audit – making sure that your enterprise data and those of your customers are not leaked out.

  • Regulatory compliance audit – these are audits that make sure your cloud installation satisfies all the major regulations from federal (Sarbanes-Oxley, HIPAA), state level (California’s data breach law, Massachusetts’ data protection law) to industry body level.

  • Performance and Reliability audit – this audit measures how good is your setup for various performance tests. These could include stress testing and manual testing to find out bottlenecks.

  • DR/BC (Disaster Recovery and Business Continuity) Audit – finds out how fast can you recover from disasters and how much of the data can you salvage.

  • ROI (Return on Investment) audit – this checks the business justifications of the cloud setup and make sure it makes accounting sense.

Cloud Carrier

This is the provider of transport level infrastructure to the cloud and connects cloud service provider and the customers. Although the telecom companies providing these services are assumed to operate in the lowest part of the stack, these days the carriers are getting more aggressive in growing up the value chain by providing transport solutions tailored to the needs of various cloud providers and consumers.

By Balaji Viswanathan

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…