Cloud Deployment Models: Private, Community, Public and Hybrid Cloud

Cloud Deployment Models

Nowadays, access to reliable high-performance hardware and software resources without large capital outlays, easier access to applications and services, capability of handling large amounts of information have encouraged managers of  companies to migrate to cloud computing.

Cloud computing is a service-oriented technology that use both hardware and software to provide services through a network regardless of time and location. Cloud computing consists of three different service models and a company should cover all three distinctive service models in order to adopt cloud computing. These three cloud service models are: infrastructure as a service (IaaS), platform as a service (PaaS), software as a service ( SaaS).  (Infographic Source: Horn Group)

cloud-strat

According to the National Institute of Standards and Technology (NIST), infrastructure as a service (IaaS) is : “the capability provided to the consumer to process, store, network, and access to other fundamental computing resources  from cloud vendors”;  platform as a service (PaaS) is: “the capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquire applications created using programming languages and tools supported by cloud vendors”; and software as a service ( SaaS) is “the capability provided to the consumer to use software or applications from various client devices through the Internet”.  Special and unique characteristics of cloud computing; such as broad network access, on-demand self-service, resource pooling, rapid elasticity for faster scalability, and measured service ; encourage companies to choose a cloud computing solution.

Cloud computing is composed of four deployment models which are Private Cloud, Community Cloud, Public Cloud, and hybrid cloud. Public cloud provides the opportunity for general public to access infrastructure and computational resources through the Internet. It is controlled and operated by a cloud provider and the services are usually accessible free or on a pay-per-use model. “The security risks and lack of negotiability of the terms of public cloud services typically will foreclose the possibility of subscribing to an off-the-shelf public cloud provider”. On the other hand, a private cloud is a deployment model that provides core technologies such as virtualization and multitenant application exclusively for a single organization. It is clear that this deployment model is less threatening than a public cloud. Most companies adopt cloud computing through a hybrid process which is a mixture of both public and private cloud services. Decision makers should understand the characteristics of public and private clouds and evaluate carefully security and privacy requirements.

Hsu and his colleagues (2014) conducted an empirical research to examine cloud computing adoption and deployment models. Their results illustrated that companies with higher levels of business concerns tend to choose private cloud over public cloud. In fact, business concerns refer to risks or problems such as data lock-in, confidentiality, insufficient service quality guarantee, bandwith bottlenecks, and reliability that a company can encounter adopting cloud computing. Therefore, The adoption of cloud computing requires a careful and in-depth examination. ICT decision makers should select their cloud models wisely and align them closely with their organization’s business model in order to deploy an effective, economical solution and to address the issues of reliability, data management, and security effectively.

By Mojgan Afshari

Frank Suglia
Managing Data Sprawl Over the last two years, our world experienced a dramatic acceleration of digital transformation. The COVID-19 pandemic upended normal operations for many businesses and shifted the pace of technology adoption into warp ...
Jen
VoIP and PBX Phone Systems The cloud is already providing businesses with such a range of advanced tools and services, optimizing communication across channels, improving global cooperation, and supporting collaboration between teammates and partners both ...
Dinesh Varadharajan
The Future with Automation Many entrepreneurs believe digital technologies will transform the way their companies work. By 2022, the worldwide hyper-automation technology market is expected to be worth $596.6 billion. And by 2055, almost half ...
Gilad David Maayan
What is Zero Trust Network Access (ZTNA)? In a zero-trust security model, all user connections are authenticated, and users only receive the access and privileges they need to fulfill their role. This is very different ...
Mark Ardito
‘Legacy systems’ often get a bit of a rough time in the IT community. But perhaps this is unfair. After all, in many cases you’re talking about software platforms that have lasted and been effective ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.