Cloud-Washing – Do Not Get Fooled

Cloud-Washing – Do Not Get Fooled

Cloud-washing is a term used for the act of labeling or advertising a service as a cloud computing service even when it truly isn’t one. This is nothing new, especially not around the internet. It’s the same as those ordinary companies during the early boom of the internet that attached the word “web” to their marketing campaigns and spontaneously became dot-com players. Now it’s happening again as many web service companies are erasing the word “web” and replacing it with “cloud”. They are making use of the people’s inability to distinguish real cloud computing to what looks like cloud computing, mainly due to the vagueness and complexity of cloud computing’s definition.


Because of cloud computing’s definition it can be argued that any web-based subscription site is a basic example of SaaS. But what really matters is not the method of delivery or the pricing scheme but the value proposition being offered by the service which makes it a true cloud computing service or a cloud-washed one. A pay-per-use model does not mean that a vendor’s supposedly SaaS offering is actual cloud computing. This is because a subscription model does not guarantee elasticity and automated recovery, two very important cloud computing characteristics. Some vendors might advertise that they have a cloud service which may suggest that they offer elasticity and automated recovery even when they don’t. Do not get fooled.

But there are different types of elasticity. A vendor may claim they offer it, but you have to be sure how elastic their service can get. For example, they may be referring to elasticity in their virtualization layer. So for an IaaS vendor, they can provision you VMs with a gigabyte of memory and promise that they can provide you more if you need it. But this is somewhat limited depending on the availability and usage among all of the users after all the hardware resource is finite. This is just limited elasticity. But in order to provide real cloud elasticity, that sense of infinite resource, a vendor must do more. The vendor must be able to provision and “deprovision” instances quickly and automatically, whatever resource you need be it in the form of RAM, CPU, storage, or VMs. These resources are taken from other subscribers who may not be using it at the moment. This cloud elasticity is horizontal and may be straightforward for IaaS vendors, but we cannot say the same for SaaS and PaaS. Cloud elasticity would be somewhat problematic for them. For example if a software instance demands 24/7 constant connection, then it cannot be deprovisioned, making it inherently partition intolerant, and so cloud elasticity cannot be achieved through this method.

It is not that easy to determine whether your provider is offering the full cloud experience or not and in most cases the providers themselves may not realize that what they are offering is not true cloud computing, but something very close. But for some, that is quite enough to satisfy their needs.

By Abdul Salam

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…