Cloud Deployment Models: Private, Community, Public and Hybrid Cloud

Cloud Deployment Models

Nowadays, access to reliable high-performance hardware and software resources without large capital outlays, easier access to applications and services, capability of handling large amounts of information have encouraged managers of  companies to migrate to cloud computing.

Cloud computing is a service-oriented technology that use both hardware and software to provide services through a network regardless of time and location. Cloud computing consists of three different service models and a company should cover all three distinctive service models in order to adopt cloud computing. These three cloud service models are: infrastructure as a service (IaaS), platform as a service (PaaS), software as a service ( SaaS).  (Infographic Source: Horn Group)


According to the National Institute of Standards and Technology (NIST), infrastructure as a service (IaaS) is : “the capability provided to the consumer to process, store, network, and access to other fundamental computing resources  from cloud vendors”;  platform as a service (PaaS) is: “the capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquire applications created using programming languages and tools supported by cloud vendors”; and software as a service ( SaaS) is “the capability provided to the consumer to use software or applications from various client devices through the Internet”.  Special and unique characteristics of cloud computing; such as broad network access, on-demand self-service, resource pooling, rapid elasticity for faster scalability, and measured service ; encourage companies to choose a cloud computing solution.

Cloud computing is composed of four deployment models which are Private Cloud, Community Cloud, Public Cloud, and hybrid cloud. Public cloud provides the opportunity for general public to access infrastructure and computational resources through the Internet. It is controlled and operated by a cloud provider and the services are usually accessible free or on a pay-per-use model. “The security risks and lack of negotiability of the terms of public cloud services typically will foreclose the possibility of subscribing to an off-the-shelf public cloud provider”. On the other hand, a private cloud is a deployment model that provides core technologies such as virtualization and multitenant application exclusively for a single organization. It is clear that this deployment model is less threatening than a public cloud. Most companies adopt cloud computing through a hybrid process which is a mixture of both public and private cloud services. Decision makers should understand the characteristics of public and private clouds and evaluate carefully security and privacy requirements.

Hsu and his colleagues (2014) conducted an empirical research to examine cloud computing adoption and deployment models. Their results illustrated that companies with higher levels of business concerns tend to choose private cloud over public cloud. In fact, business concerns refer to risks or problems such as data lock-in, confidentiality, insufficient service quality guarantee, bandwith bottlenecks, and reliability that a company can encounter adopting cloud computing. Therefore, The adoption of cloud computing requires a careful and in-depth examination. ICT decision makers should select their cloud models wisely and align them closely with their organization’s business model in order to deploy an effective, economical solution and to address the issues of reliability, data management, and security effectively.

By Mojgan Afshari

Gary Taylor

6 Organizational Challenges for Cloud Services

Cloud Service Challenges Organizations have rapidly come to the realization that digital cloud services make a compelling business case for helping them navigate this difficult pandemic year. The market for cloud services is expected to ...
Sangeeta Chhabra

Leverage DaaS To Solve Challenges of Remote Work

Solve Challenges of Remote Work In the past one year of Coronavirus (COVID-19), we have seen it all: An ailing world economy, dramatic changes in the political structure of many countries, and, most prominently, a ...
Steve Prentice

The Human Element of Zero Trust

The Awareness of Malicious and Threat Actors Security specialists have long known that a single weak link in a chain is all that is needed to bring down a cyberdefense. Sometimes this comes down to ...
Eddie Segal

Kubernetes on AWS: Tips for Cloud-Native Development

Kubernetes AWS Tips Kubernetes is a container orchestration and management tool that automates container deployment. Kubernetes is mainly used in the cloud. A recent survey by CNCF showed that 83% of organizations deploy Kubernetes on ...
Anita Raj

A Winning Data Strategy Series Part 2: Data, an Asset, or a Liability?

Data, an Asset, or a Liability? This is the second piece of a 5-part series on plugging the obvious but overlooked gaps in achieving digital success through a refined data strategy. You can read the ...
Texture Cloud

Building a Cloud Roadmap

Cloud Roadmapping Why is it important to have a cloud roadmap? What's the best way to begin building a cloud roadmap? What points should a cloud roadmap include? Who should be included in the roadmap ...