Understanding The Different Roles In A Cloud Computing Setup

If you are migrating from enterprise to a cloud based solution, it is necessary to understand the different roles in cloud computing. In this post, I will cover the 6 major roles in the cloud setup.

Cloud Service Provider

This is the entity that provides the cloud service. The cloud service provider owns and controls the cloud computing platform. The services include SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) and IpaaS (Integration Platform as a Service). Based on the services provided, the CSPs can be broadly categorized into 3 types:

  • Application provider – These are providers that directly provide you access to an application without you having to worry about the layers underneath. Thus, if you are running a mail application with Google, you don’t need to worry much about the server infrastructure, resources such as RAM or platforms. Examples include Dropbox, Salesforce.com, Google Apps and Microsoft Office 365.

  • Resource provider – These provide virtualization systems on top of their servers and lets you buy resources such as RAM, computing cycles and disc space. Offerings from providers such as Rackspace Cloud and Amazon Web Services (AWS) typically fall under this category.

  • Infrastructure provider – These lease servers and associated infrastructure from their datacenters. The infrastructure includes servers, storage, bandwidth and the datacenter (with power, space and personnel to man them). Companies such as Rightscale provide you the complete infrastructure to set up your cloud service.

Cloud Consumer

This is the user that is consuming the cloud services. The “Cloud Consumer” could be one of the following:

  • Developers in your enterprise who are building the apps using the cloud infrastructure.

  • Office workers and end consumers who are accessing the storage and productivity applications.

  • IT support team that uses the cloud services such as cloud backups to supplement their resources.

Cloud Service Brokerage

Cloud Service Brokerage (CSB) provides intermediation services between the consumer and the provider. They provide three major services:

  • Aggregation services – integration service different cloud service providers,

  • Intermediation services – help you identify the right service provide, consistent billing and support

  • Arbitrage services – getting good deals on what you pay for different cloud services.

Cloud Architects

These are the guys who will help you design your cloud solution and develop the right cloud architecture that suits your needs. The architecture should incorporate your storage, security, computing and compliance needs and build the right design that satisfies these needs.

Cloud Auditor

Security is a very critical aspect in any cloud setup. Since you might be storing confidential enterprise data on a server over which you have less control, it is important to put in place the right auditing and regulatory processes. Cloud Auditors are a third party who will provide independent assessments on your cloud setup and point out to the security vulnerabilities, data leaks and performance issues. There are 5 major types of audits that these companies might offer:

  • Data security audit – making sure that your enterprise data and those of your customers are not leaked out.

  • Regulatory compliance audit – these are audits that make sure your cloud installation satisfies all the major regulations from federal (Sarbanes-Oxley, HIPAA), state level (California’s data breach law, Massachusetts’ data protection law) to industry body level.

  • Performance and Reliability audit – this audit measures how good is your setup for various performance tests. These could include stress testing and manual testing to find out bottlenecks.

  • DR/BC (Disaster Recovery and Business Continuity) Audit – finds out how fast can you recover from disasters and how much of the data can you salvage.

  • ROI (Return on Investment) audit – this checks the business justifications of the cloud setup and make sure it makes accounting sense.

Cloud Carrier

This is the provider of transport level infrastructure to the cloud and connects cloud service provider and the customers. Although the telecom companies providing these services are assumed to operate in the lowest part of the stack, these days the carriers are getting more aggressive in growing up the value chain by providing transport solutions tailored to the needs of various cloud providers and consumers.

By Balaji Viswanathan

One Response to Understanding The Different Roles In A Cloud Computing Setup

  1. How is a resource provider different from a service provider ? AWS and rightscale both provide IaaS.

Comic
2016 Tour de France: Racing With Big Data

2016 Tour de France: Racing With Big Data

2016 Tour de France The 2016 Tour de France has just concluded, with Chris Froome (SKY) taking his third overall win. Not the kind of event we often focus on here at CloudTweaks, but Dimension Data has put its analytics technology to use tracking the journeys of each rider across all 21 stages, and their…

Ransomware: A Digital Pandemic – Is There A Cure?

Ransomware: A Digital Pandemic – Is There A Cure?

The Rise Of Ransomware You can imagine the scene: you’ve just completed that business plan and a set of accounts. Finally, it’s done and saved, ready for a final read through and to be sent out to your contact list. And right when you’re ready to click “Send”, the next thing you see on the…

Martech In A Content Crazed World

Martech In A Content Crazed World

Content Crazed World Everywhere you look there are pop-up ads and offers, at times it can feel like overload. What used to be a few online ads on websites has now grown into a wild world of offers that consume your every device. These advancements in marketing technology can not only be overwhelming to the…

Hubgets – Advanced Collaboration, Enriched Communication

Hubgets – Advanced Collaboration, Enriched Communication

Advanced Collaboration Tool Sponsored series provided in collaboration with Hubgets Collaboration tools have advanced leaps and bounds with the advent of cloud technology, and the services available are only getting better. Promising features such as sophisticated group communication, productive management of tasks and meetings, and the ultimate dream, working remotely from some gorgeous island destination, innovative collaboration…

Verizon To Acquire Yahoo For $4.83 Billion

Verizon To Acquire Yahoo For $4.83 Billion

Verizon Communications Inc (VZ.N) said it had agreed to buy Yahoo Inc’s (YHOO.O) core internet business for $4.83 billion in cash, ending a lengthy sale process for the fading Web pioneer. Buying Yahoo’s operations will boost Verizon’s AOL internet business, which it bought last year for $4.4 billion, by giving it access to Yahoo’s advertising…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb