May 28, 2014

Cloud Deployment Models: Private, Community, Public and Hybrid Cloud

By Mojgan Afshari

Cloud Deployment Models

Nowadays, access to reliable high-performance hardware and software resources without large capital outlays, easier access to applications and services, capability of handling large amounts of information have encouraged managers of  companies to migrate to cloud computing.

Cloud computing is a service-oriented technology that use both hardware and software to provide services through a network regardless of time and location. Cloud computing consists of three different service models and a company should cover all three distinctive service models in order to adopt cloud computing. These three cloud service models are: infrastructure as a service (IaaS), platform as a service (PaaS), software as a service ( SaaS).  (Infographic Source: Horn Group)

cloud-strat

According to the National Institute of Standards and Technology (NIST), infrastructure as a service (IaaS) is : “the capability provided to the consumer to process, store, network, and access to other fundamental computing resources  from cloud vendors”;  platform as a service (PaaS) is: “the capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquire applications created using programming languages and tools supported by cloud vendors”; and software as a service ( SaaS) is “the capability provided to the consumer to use software or applications from various client devices through the Internet”.  Special and unique characteristics of cloud computing; such as broad network access, on-demand self-service, resource pooling, rapid elasticity for faster scalability, and measured service ; encourage companies to choose a cloud computing solution.

Cloud computing is composed of four deployment models which are Private Cloud, Community Cloud, Public Cloud, and hybrid cloud. Public cloud provides the opportunity for general public to access infrastructure and computational resources through the Internet. It is controlled and operated by a cloud provider and the services are usually accessible free or on a pay-per-use model. “The security risks and lack of negotiability of the terms of public cloud services typically will foreclose the possibility of subscribing to an off-the-shelf public cloud provider”. On the other hand, a private cloud is a deployment model that provides core technologies such as virtualization and multitenant application exclusively for a single organization. It is clear that this deployment model is less threatening than a public cloud. Most companies adopt cloud computing through a hybrid process which is a mixture of both public and private cloud services. Decision makers should understand the characteristics of public and private clouds and evaluate carefully security and privacy requirements.

Hsu and his colleagues (2014) conducted an empirical research to examine cloud computing adoption and deployment models. Their results illustrated that companies with higher levels of business concerns tend to choose private cloud over public cloud. In fact, business concerns refer to risks or problems such as data lock-in, confidentiality, insufficient service quality guarantee, bandwith bottlenecks, and reliability that a company can encounter adopting cloud computing. Therefore, The adoption of cloud computing requires a careful and in-depth examination. ICT decision makers should select their cloud models wisely and align them closely with their organization’s business model in order to deploy an effective, economical solution and to address the issues of reliability, data management, and security effectively.

By Mojgan Afshari

Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia. She currently teaches courses in managing change and creativity and statistics in education at the graduate level.
Anastasios Arampatzis

Insider Threats: The Trojan Horses in Intellectual Property Theft

The Invisible Enemy In the rapidly evolving landscape of global business, intellectual property (IP) stands [...]
Read more
Aman Aggarwal

Top Cloud Cost Optimization Strategies for Multi-Cloud Environments

The age-old saying “Don’t put all your eggs in one basket” has found a new [...]
Read more
Randy

Gain Critical AI Insights: The Oxford Artificial Intelligence Programme

Acquire Essential Skills for Success in the AI Industry The expansion of online learning within [...]
Read more
Dolores

Q&A: Airport Security Trends with Dolores Alemán, Frost & Sullivan Analyst

Airport Security Trends In this CloudTweaks interview, we delve into the evolving landscape of airport [...]
Read more
Alex Dean

Privacy in Personalization: Strategies for Trust & Compliance

Enabling Privacy and Personalization (Updated: 02.16.2024) Most businesses today rely on data collected online to [...]
Read more
David Cantor

Impact of AI in Storytelling and Creativity 

These are monumental topics that command volumes of diligent research, backed by empirical evidence and [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.