中文版开源和云计算 - 大规模的按需、创新型 IT.pdf--Sun公司的WhitePaper

合集下载

开源云计算产品咄咄逼人 .doc

开源云计算产品咄咄逼人 .doc

开源云计算产品咄咄逼人由于开源社区的创新活动非常活跃,开源产品在众多的细分市场中正蓄势待发。

由于在桌面操作系统领域已经打下了良好的基础,开源软件目前正在成为云计算领域中的一支重要力量。

开源软件还有很长的一段路要走,而云计算似乎是感受其深刻影响的最新市场潜力。

开源海洋中的第一波几年前,各种创业公司开始了第一波的开源云计算平台开发,其中众多的产品都是基于公共云计算的Amazon网络服务(AWS)的。

让我们来看看一些主要的开源云计算产品吧。

Eucalyptus系统公司源于2007年加州大学的一个研究项目,该公司从2009年就开始提供云计算技术了。

而Eucalyptus云计算平台包括了虚拟化IT基础设施以创建用于计算、网络和存储目的的云计算资源。

曾经是Amazon公司云计算团队一员的Chris Pinkham和Willem van Biljon在风险基金的支持下于2009年创建了Nimbula公司,这家公司也已成为了开源云计算市场中另一个知名的公司。

该公司开发了一个云计算操作系统,这个操作系统融公共云计算的可扩展性与操作高效性和企业数据中心的可靠性、安全性和可信性于一体。

这一方法能够很好地为某些类型的企业提供服务。

AWS开源解决方案很好地满足了超小型企业的需求,但是大部分的企业都在为他们的私有云计算寻找更为复杂的解决方案,451研究中心企业软件组的分析师Jay Lyman说。

很多替代产品也已出现。

云计算平台产品成为开源云计算产品的开路先锋Citrix系统公司在2011年七月收购了,后者推出了一套旨在帮助企业和云计算供应商部署和管理可扩展、安全和开放云计算服务的应用程序编程接口(API)。

最终,Citrix公司在Apache许可证2.0版本下将CloudPlatform API的控制移至Apache Foundation。

CloudPlatform走出了一条有别于其他公司、其他模式的路。

ISWest 公司是一家位于洛杉矶附近的区域性互联网服务供应商(ISP),它从1996年开始提供拨号互联网服务开始,发展到提供各种网络服务以及配套的应用解决方案,例如电子邮件托管。

开源PaaS技术手册

开源PaaS技术手册

开源PaaS技术手册开源PaaS技术手册开源业界向来不太平,关于诸多技术的开源未来足以让很多粉丝兴奋躁动起来。

商业软件开始揉进开源技术,开源技术也成为IT大佬们得基础架构,这一种趋势蔓延的缓慢有有力。

在广告漫天飞得云计算中,开源的分量有多重?是否走向云端就意味着走向开源?开源的PaaS如何选择?如何为开源项目现则PaaS厂商?哪些服务平台值得我们关注,下面我们一一来揭晓。

云计算架构综述如今,云计算结合了很多既有的分布式软件技术以及较新的面向Web架构。

在某种程度上,云可以被看作是以前很“火”的计算架构(比如网格计算和按需计算)的一个大规模可伸缩版本,尽管它更加依赖于现代的虚拟化技术。

下面我们来看看云计算的总体架构。

云计算架构综述:早期架构云计算架构综述:PaaS的发展和API走向云端意味着走向开源?开源PaaS在一个开源项目中,如果有一件事让志愿开发者讨厌,这件辛苦的任务就是:安装、维护、任何对于写代码造成分心的事情,那么如何缓解呢?平台即服务(PaaS)的开源选择同样也很让人头痛。

下面我们来看看如何选择合适的PaaS。

开源平台即服务(PaaS)知多少为开源项目寻求合适的PaaS选择PaaS提供商理解需求是关键iPaaS、和JBoss如果你还不熟悉“iPaaS”——集成平台即服务,最好花时间去学习一下。

因为它将会成为未来集成的一部分。

另外,在云计算平台即服务(PaaS)中独树一帜。

红帽JBoss World 2011会议上,云计算平台即服务(PaaS)和信息即服务(IaaS)产品有过多次探讨,此项运动展示了开源中间件公司努力的使其产品在云计算架构中更多地被提及。

Gartner:iPaaS粉墨登场平台开发初级指南中间件在路上:红帽的PaaS和IaaS之路云计算架构综述:早期架构如今,云计算结合了很多既有的分布式软件技术以及较新的面向Web架构。

在某种程度上,云可以被看作是以前很“火”的计算架构(比如网格计算和按需计算)的一个大规模可伸缩版本——尽管它更加依赖于现代的虚拟化技术。

(完整word版)云计算基本知识

(完整word版)云计算基本知识

第一讲:云计算概述1 什么是云计算?云计算是一种能够将动态伸缩的虚拟化资源通过互联网以服务的方式提供给用户的计算模式。

根据云提供的服务类型,可以划分为基础设施云、平台云、应用云。

根据云的服务方式,可以划分为公有云、私有云、混合云。

2 云计算的优势?○1优化产业布局–成本关键由硬件成本转为电力成本、散热成本–分散的、高能耗模式转变为集中的、资源友好的模式–自给自足资源作坊转变为规模效应的工业化资源工厂○2推进专业分工–专业的大型云计算厂商–实力雄厚的科研技术团队推动硬件技术革新–具有丰富知识和经验的维护管理团队和配套软件–产业链中的新产业契机○3提升资源利用率–更加高效的解决常规业务–更好的应对突发任务或事件–更加平衡的资源分配和负载○4减少初期投资–更少的IT基础设施投入–更少的软件投入–更少的人力投入–更短的培训周期–更灵活的转型支持○5降低管理开销–服务化管理–无需自己建立维护管理团队–随需应变的解决方案–知识、经验更加丰富的管理队伍–通过业务模块的可配置提高系统的灵活性3 云计算的动因?○1芯片与硬件技术–硬件能力的激增、成本的大幅下降,使得独立运作的公司集中客观的硬件能力实现规模效益成为可能○2资源虚拟化–资源在云端,需要被统一的管理–异构硬件、兼容性问题–虚拟化技术○3应用需求○3面向服务的架构SOA–开放式数据模型–统一通信标准–更加丰富的服务–更加松散耦合、灵活的IT架构–转变了人们对IT系统的认识○4软件即服务SaaS–转变了人们使用服务的方式–使得终端用户熟悉服务的交互模式–改变了IT界的商业模式–实力雄厚的大公司负责基础设施,小企业通过创新挖掘充满潜力的市场–“长尾理论”○5互联网技术–基础设施–多种接入方式–更加广阔的覆盖–带宽和可靠性得到大幅提升–使得IT新模式的稳定性、可靠性、安全性、可用性、灵活性、可管理性、自动化程度、节能环保等得到保障○6Web2.0技术–用户从信息的获得者变成信息的贡献者–博客(微博)、内容聚合、百科全书(Wiki)、社交网络、对等网络(P2P)–富互联网应用(Rich Internet Application)成为网络应用发展的趋势–改变了人们的生活方式–为云计算提出了内在需求4 查找资料:业界主流的云计算产品典型的云计算应用补充:1 云计算特征是什么?○1硬件和软件都是资源○2资源可以根据需要进行动态扩展与配置○3按用计费、无需管理○4物理上分布式共享,逻辑上以单一整体呈现2 云计算的发展历程?○1超级计算机○2集群计算○3分布式计算○4网格计算○5效用计算○6云计算第二讲:云服务1云服务的基本层次?云计算的基本层次分为三层,依次为IaaS, PaaS和SaaS。

阿里云计算技术白皮书

阿里云计算技术白皮书

都提供三份副本,当单份数据损坏后可实现数据的自动拷贝。

具体原理图见下图:
云服务器是弹性计算产品的核心部分。

它主要为用户提供计算能力服务创建并启动一台
阿里云服务器控制面板管理界面:
●安全组统一防火墙设置,设置简单。

组内机器默认互通,组内机器数限制200,组
如上图:云服务器的整个生命周期,从云服务器的创建到释放。

远程管理方式
Linux 云服务器:通过ssh 公网IP 的方式连接云服务器; Windows 云服务器:通过远程桌面的方式连接云服务器; 操作系统选择
用户提交购买云服务器订单
资源套餐选择 带宽选择
操作系统选择
创建云服务器 查询可用公网IP
云服务器绑定公网IP
关闭云服务器 启动云服务器 重启云服务器 释放云服务器。

《云计算(第三版)》配套PPT之一:第1章 大数据与云计算

《云计算(第三版)》配套PPT之一:第1章 大数据与云计算

“大数据”(Big词从2012年才引起关注,之后搜索量便迅猛增长。
为什么大数据这么受关注?
4 of 39
1.1大数据时代
《云计算》第三版配套PPT课件
全球数据总量变化图
(EB)
40000
35000 30000
35000
25000
20000 15000
配置工具负责在分配的节点上准备任务 运行环境。
监视统计模块负责监视节点的运行状 态,并完成用户使用节点情况的统计。
26 of 39
目 录
大数据时代 云计算——大数据的计算 云计算发展现状
云计算实现机制
云计算压倒性的成本优势
1.5云计算压倒性的成本优势
《云计算》第三版配套PPT课件
全球企业IT开销发展趋势
任务管理 安全管理
命期管理等
用户管理
保障云计算设施的整体安全,包 括身份认证、访问授权、综合防 护和安全审计等
25 of 39
1.4云计算实现机制
《云计算》第三版配套PPT课件
简化的IaaS实现机制图
用户交互接口向应用以Web Services方 式提供访问接口,获取用户需求。 服务目录是用户可以访问的服务清单。 系统管理模块负责管理和分配所有可用 的资源,其核心是负载均衡。
电子工业出版社《云计算(第三版)》配套课件
云 计 算 (第三版)
CLOUD COMPUTING
Third Edition
第1章
大数据与云计算
主编:刘鹏 教授
of 39
电子工业出版社《云计算(第三版)》配套课件
本套PPT下载地址:/list.aspx?cid=20
电子工业出版社《云计算(第三版)》配套课件

云计算外文翻译参考文献

云计算外文翻译参考文献

云计算外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)原文:Technical Issues of Forensic Investigations in Cloud Computing EnvironmentsDominik BirkRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyAbstract—Cloud Computing is arguably one of the most discussedinformation technologies today. It presents many promising technological and economical opportunities. However, many customers remain reluctant to move their business IT infrastructure completely to the cloud. One of their main concerns is Cloud Security and the threat of the unknown. Cloud Service Providers(CSP) encourage this perception by not letting their customers see what is behind their virtual curtain. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital investigations. This continues to fuel insecurity on the sides of both providers and customers. Cloud Forensics constitutes a new and disruptive challenge for investigators. Due to the decentralized nature of data processing in the cloud, traditional approaches to evidence collection and recovery are no longer practical. This paper focuses on the technical aspects of digital forensics in distributed cloud environments. We contribute by assessing whether it is possible for the customer of cloud computing services to perform a traditional digital investigation from a technical point of view. Furthermore we discuss possible solutions and possible new methodologies helping customers to perform such investigations.I. INTRODUCTIONAlthough the cloud might appear attractive to small as well as to large companies, it does not come along without its own unique problems. Outsourcing sensitive corporate data into the cloud raises concerns regarding the privacy and security of data. Security policies, companies main pillar concerning security, cannot be easily deployed into distributed, virtualized cloud environments. This situation is further complicated by the unknown physical location of the companie’s assets. Normally,if a security incident occurs, the corporate security team wants to be able to perform their own investigation without dependency on third parties. In the cloud, this is not possible anymore: The CSP obtains all the power over the environmentand thus controls the sources of evidence. In the best case, a trusted third party acts as a trustee and guarantees for the trustworthiness of the CSP. Furthermore, the implementation of the technical architecture and circumstances within cloud computing environments bias the way an investigation may be processed. In detail, evidence data has to be interpreted by an investigator in a We would like to thank the reviewers for the helpful comments and Dennis Heinson (Center for Advanced Security Research Darmstadt - CASED) for the profound discussions regarding the legal aspects of cloud forensics. proper manner which is hardly be possible due to the lackof circumstantial information. For auditors, this situation does not change: Questions who accessed specific data and information cannot be answered by the customers, if no corresponding logs are available. With the increasing demand for using the power of the cloud for processing also sensible information and data, enterprises face the issue of Data and Process Provenance in the cloud [10]. Digital provenance, meaning meta-data that describes the ancestry or history of a digital object, is a crucial feature for forensic investigations. In combination with a suitable authentication scheme, it provides information about who created and who modified what kind of data in the cloud. These are crucial aspects for digital investigations in distributed environments such as the cloud. Unfortunately, the aspects of forensic investigations in distributed environment have so far been mostly neglected by the research community. Current discussion centers mostly around security, privacy and data protection issues [35], [9], [12]. The impact of forensic investigations on cloud environments was little noticed albeit mentioned by the authors of [1] in 2009: ”[...] to our knowledge, no research has been published on how cloud computing environments affect digital artifacts,and on acquisition logistics and legal issues related to cloud computing env ironments.” This statement is also confirmed by other authors [34], [36], [40] stressing that further research on incident handling, evidence tracking and accountability in cloud environments has to be done. At the same time, massive investments are being made in cloud technology. Combined with the fact that information technology increasingly transcendents peoples’ private and professional life, thus mirroring more and more of peoples’actions, it becomes apparent that evidence gathered from cloud environments will be of high significance to litigation or criminal proceedings in the future. Within this work, we focus the notion of cloud forensics by addressing the technical issues of forensics in all three major cloud service models and consider cross-disciplinary aspects. Moreover, we address the usability of various sources of evidence for investigative purposes and propose potential solutions to the issues from a practical standpoint. This work should be considered as a surveying discussion of an almost unexplored research area. The paper is organized as follows: We discuss the related work and the fundamental technical background information of digital forensics, cloud computing and the fault model in section II and III. In section IV, we focus on the technical issues of cloud forensics and discuss the potential sources and nature of digital evidence as well as investigations in XaaS environments including thecross-disciplinary aspects. We conclude in section V.II. RELATED WORKVarious works have been published in the field of cloud security and privacy [9], [35], [30] focussing on aspects for protecting data in multi-tenant, virtualized environments. Desired security characteristics for current cloud infrastructures mainly revolve around isolation of multi-tenant platforms [12], security of hypervisors in order to protect virtualized guest systems and secure network infrastructures [32]. Albeit digital provenance, describing the ancestry of digital objects, still remains a challenging issue for cloud environments, several works have already been published in this field [8], [10] contributing to the issues of cloud forensis. Within this context, cryptographic proofs for verifying data integrity mainly in cloud storage offers have been proposed,yet lacking of practical implementations [24], [37], [23]. Traditional computer forensics has already well researched methods for various fields of application [4], [5], [6], [11], [13]. Also the aspects of forensics in virtual systems have been addressed by several works [2], [3], [20] including the notionof virtual introspection [25]. In addition, the NIST already addressed Web Service Forensics [22] which has a huge impact on investigation processes in cloud computing environments. In contrast, the aspects of forensic investigations in cloud environments have mostly been neglected by both the industry and the research community. One of the first papers focusing on this topic was published by Wolthusen [40] after Bebee et al already introduced problems within cloud environments [1]. Wolthusen stressed that there is an inherent strong need for interdisciplinary work linking the requirements and concepts of evidence arising from the legal field to what can be feasibly reconstructed and inferred algorithmically or in an exploratory manner. In 2010, Grobauer et al [36] published a paper discussing the issues of incident response in cloud environments - unfortunately no specific issues and solutions of cloud forensics have been proposed which will be done within this work.III. TECHNICAL BACKGROUNDA. Traditional Digital ForensicsThe notion of Digital Forensics is widely known as the practice of identifying, extracting and considering evidence from digital media. Unfortunately, digital evidence is both fragile and volatile and therefore requires the attention of special personnel and methods in order to ensure that evidence data can be proper isolated and evaluated. Normally, the process of a digital investigation can be separated into three different steps each having its own specificpurpose:1) In the Securing Phase, the major intention is the preservation of evidence for analysis. The data has to be collected in a manner that maximizes its integrity. This is normally done by a bitwise copy of the original media. As can be imagined, this represents a huge problem in the field of cloud computing where you never know exactly where your data is and additionallydo not have access to any physical hardware. However, the snapshot technology, discussed in section IV-B3, provides a powerful tool to freeze system states and thus makes digital investigations, at least in IaaS scenarios, theoretically possible.2) We refer to the Analyzing Phase as the stage in which the data is sifted and combined. It is in this phase that the data from multiple systems or sources is pulled together to create as complete a picture and event reconstruction as possible. Especially in distributed system infrastructures, this means that bits and pieces of data are pulled together for deciphering the real story of what happened and for providing a deeper look into the data.3) Finally, at the end of the examination and analysis of the data, the results of the previous phases will be reprocessed in the Presentation Phase. The report, created in this phase, is a compilation of all the documentation and evidence from the analysis stage. The main intention of such a report is that it contains all results, it is complete and clear to understand. Apparently, the success of these three steps strongly depends on the first stage. If it is not possible to secure the complete set of evidence data, no exhaustive analysis will be possible. However, in real world scenarios often only a subset of the evidence data can be secured by the investigator. In addition, an important definition in the general context of forensics is the notion of a Chain of Custody. This chain clarifies how and where evidence is stored and who takes possession of it. Especially for cases which are brought to court it is crucial that the chain of custody is preserved.B. Cloud ComputingAccording to the NIST [16], cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal CSP interaction. The new raw definition of cloud computing brought several new characteristics such as multi-tenancy, elasticity, pay-as-you-go and reliability. Within this work, the following three models are used: In the Infrastructure asa Service (IaaS) model, the customer is using the virtual machine provided by the CSP for installing his own system on it. The system can be used like any other physical computer with a few limitations. However, the additive customer power over the system comes along with additional security obligations. Platform as a Service (PaaS) offerings provide the capability to deploy application packages created using the virtual development environment supported by the CSP. For the efficiency of software development process this service model can be propellent. In the Software as a Service (SaaS) model, the customer makes use of a service run by the CSP on a cloud infrastructure. In most of the cases this service can be accessed through an API for a thin client interface such as a web browser. Closed-source public SaaS offers such as Amazon S3 and GoogleMail can only be used in the public deployment model leading to further issues concerning security, privacy and the gathering of suitable evidences. Furthermore, two main deployment models, private and public cloud have to be distinguished. Common public clouds are made available to the general public. The corresponding infrastructure is owned by one organization acting as a CSP and offering services to its customers. In contrast, the private cloud is exclusively operated for an organization but may not provide the scalability and agility of public offers. The additional notions of community and hybrid cloud are not exclusively covered within this work. However, independently from the specific model used, the movement of applications and data to the cloud comes along with limited control for the customer about the application itself, the data pushed into the applications and also about the underlying technical infrastructure.C. Fault ModelBe it an account for a SaaS application, a development environment (PaaS) or a virtual image of an IaaS environment, systems in the cloud can be affected by inconsistencies. Hence, for both customer and CSP it is crucial to have the ability to assign faults to the causing party, even in the presence of Byzantine behavior [33]. Generally, inconsistencies can be caused by the following two reasons:1) Maliciously Intended FaultsInternal or external adversaries with specific malicious intentions can cause faults on cloud instances or applications. Economic rivals as well as former employees can be the reason for these faults and state a constant threat to customers and CSP. In this model, also a malicious CSP is included albeit he isassumed to be rare in real world scenarios. Additionally, from the technical point of view, the movement of computing power to a virtualized, multi-tenant environment can pose further threads and risks to the systems. One reason for this is that if a single system or service in the cloud is compromised, all other guest systems and even the host system are at risk. Hence, besides the need for further security measures, precautions for potential forensic investigations have to be taken into consideration.2) Unintentional FaultsInconsistencies in technical systems or processes in the cloud do not have implicitly to be caused by malicious intent. Internal communication errors or human failures can lead to issues in the services offered to the costumer(i.e. loss or modification of data). Although these failures are not caused intentionally, both the CSP and the customer have a strong intention to discover the reasons and deploy corresponding fixes.IV. TECHNICAL ISSUESDigital investigations are about control of forensic evidence data. From the technical standpoint, this data can be available in three different states: at rest, in motion or in execution. Data at rest is represented by allocated disk space. Whether the data is stored in a database or in a specific file format, it allocates disk space. Furthermore, if a file is deleted, the disk space is de-allocated for the operating system but the data is still accessible since the disk space has not been re-allocated and overwritten. This fact is often exploited by investigators which explore these de-allocated disk space on harddisks. In case the data is in motion, data is transferred from one entity to another e.g. a typical file transfer over a network can be seen as a data in motion scenario. Several encapsulated protocols contain the data each leaving specific traces on systems and network devices which can in return be used by investigators. Data can be loaded into memory and executed as a process. In this case, the data is neither at rest or in motion but in execution. On the executing system, process information, machine instruction and allocated/de-allocated data can be analyzed by creating a snapshot of the current system state. In the following sections, we point out the potential sources for evidential data in cloud environments and discuss the technical issues of digital investigations in XaaS environmentsas well as suggest several solutions to these problems.A. Sources and Nature of EvidenceConcerning the technical aspects of forensic investigations, the amount of potential evidence available to the investigator strongly diverges between thedifferent cloud service and deployment models. The virtual machine (VM), hosting in most of the cases the server application, provides several pieces of information that could be used by investigators. On the network level, network components can provide information about possible communication channels between different parties involved. The browser on the client, acting often as the user agent for communicating with the cloud, also contains a lot of information that could be used as evidence in a forensic investigation. Independently from the used model, the following three components could act as sources for potential evidential data.1) Virtual Cloud Instance: The VM within the cloud, where i.e. data is stored or processes are handled, contains potential evidence [2], [3]. In most of the cases, it is the place where an incident happened and hence provides a good starting point for a forensic investigation. The VM instance can be accessed by both, the CSP and the customer who is running the instance. Furthermore, virtual introspection techniques [25] provide access to the runtime state of the VM via the hypervisor and snapshot technology supplies a powerful technique for the customer to freeze specific states of the VM. Therefore, virtual instances can be still running during analysis which leads to the case of live investigations [41] or can be turned off leading to static image analysis. In SaaS and PaaS scenarios, the ability to access the virtual instance for gathering evidential information is highly limited or simply not possible.2) Network Layer: Traditional network forensics is knownas the analysis of network traffic logs for tracing events that have occurred in the past. Since the different ISO/OSI network layers provide several information on protocols and communication between instances within as well as with instances outside the cloud [4], [5], [6], network forensics is theoretically also feasible in cloud environments. However in practice, ordinary CSP currently do not provide any log data from the network components used by the customer’s instances or applications. For instance, in case of a malware infection of an IaaS VM, it will be difficult for the investigator to get any form of routing information and network log datain general which is crucial for further investigative steps. This situation gets even more complicated in case of PaaS or SaaS. So again, the situation of gathering forensic evidence is strongly affected by the support the investigator receives from the customer and the CSP.3) Client System: On the system layer of the client, it completely depends on the used model (IaaS, PaaS, SaaS) if and where potential evidence could beextracted. In most of the scenarios, the user agent (e.g. the web browser) on the client system is the only application that communicates with the service in the cloud. This especially holds for SaaS applications which are used and controlled by the web browser. But also in IaaS scenarios, the administration interface is often controlled via the browser. Hence, in an exhaustive forensic investigation, the evidence data gathered from the browser environment [7] should not be omitted.a) Browser Forensics: Generally, the circumstances leading to an investigation have to be differentiated: In ordinary scenarios, the main goal of an investigation of the web browser is to determine if a user has been victim of a crime. In complex SaaS scenarios with high client-server interaction, this constitutes a difficult task. Additionally, customers strongly make use of third-party extensions [17] which can be abused for malicious purposes. Hence, the investigator might want to look for malicious extensions, searches performed, websites visited, files downloaded, information entered in forms or stored in local HTML5 stores, web-based email contents and persistent browser cookies for gathering potential evidence data. Within this context, it is inevitable to investigate the appearance of malicious JavaScript [18] leading to e.g. unintended AJAX requests and hence modified usage of administration interfaces. Generally, the web browser contains a lot of electronic evidence data that could be used to give an answer to both of the above questions - even if the private mode is switched on [19].B. Investigations in XaaS EnvironmentsTraditional digital forensic methodologies permit investigators to seize equipment and perform detailed analysis on the media and data recovered [11]. In a distributed infrastructure organization like the cloud computing environment, investigators are confronted with an entirely different situation. They have no longer the option of seizing physical data storage. Data and processes of the customer are dispensed over an undisclosed amount of virtual instances, applications and network elements. Hence, it is in question whether preliminary findings of the computer forensic community in the field of digital forensics apparently have to be revised and adapted to the new environment. Within this section, specific issues of investigations in SaaS, PaaS and IaaS environments will be discussed. In addition, cross-disciplinary issues which affect several environments uniformly, will be taken into consideration. We also suggest potential solutions to the mentioned problems.1) SaaS Environments: Especially in the SaaS model, the customer does notobtain any control of the underlying operating infrastructure such as network, servers, operating systems or the application that is used. This means that no deeper view into the system and its underlying infrastructure is provided to the customer. Only limited userspecific application configuration settings can be controlled contributing to the evidences which can be extracted fromthe client (see section IV-A3). In a lot of cases this urges the investigator to rely on high-level logs which are eventually provided by the CSP. Given the case that the CSP does not run any logging application, the customer has no opportunity to create any useful evidence through the installation of any toolkit or logging tool. These circumstances do not allow a valid forensic investigation and lead to the assumption that customers of SaaS offers do not have any chance to analyze potential incidences.a) Data Provenance: The notion of Digital Provenance is known as meta-data that describes the ancestry or history of digital objects. Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud environments, yet it is still a challenging issue today [8]. Albeit data provenance is of high significance also for IaaS and PaaS, it states a huge problem specifically for SaaS-based applications: Current global acting public SaaS CSP offer Single Sign-On (SSO) access control to the set of their services. Unfortunately in case of an account compromise, most of the CSP do not offer any possibility for the customer to figure out which data and information has been accessed by the adversary. For the victim, this situation can have tremendous impact: If sensitive data has been compromised, it is unclear which data has been leaked and which has not been accessed by the adversary. Additionally, data could be modified or deleted by an external adversary or even by the CSP e.g. due to storage reasons. The customer has no ability to proof otherwise. Secure provenance mechanisms for distributed environments can improve this situation but have not been practically implemented by CSP [10]. Suggested Solution: In private SaaS scenarios this situation is improved by the fact that the customer and the CSP are probably under the same authority. Hence, logging and provenance mechanisms could be implemented which contribute to potential investigations. Additionally, the exact location of the servers and the data is known at any time. Public SaaS CSP should offer additional interfaces for the purpose of compliance, forensics, operations and security matters to their customers. Through an API, the customers should have the ability to receive specific information suchas access, error and event logs that could improve their situation in case of aninvestigation. Furthermore, due to the limited ability of receiving forensic information from the server and proofing integrity of stored data in SaaS scenarios, the client has to contribute to this process. This could be achieved by implementing Proofs of Retrievability (POR) in which a verifier (client) is enabled to determine that a prover (server) possesses a file or data object and it can be retrieved unmodified [24]. Provable Data Possession (PDP) techniques [37] could be used to verify that an untrusted server possesses the original data without the need for the client to retrieve it. Although these cryptographic proofs have not been implemented by any CSP, the authors of [23] introduced a new data integrity verification mechanism for SaaS scenarios which could also be used for forensic purposes.2) PaaS Environments: One of the main advantages of the PaaS model is that the developed software application is under the control of the customer and except for some CSP, the source code of the application does not have to leave the local development environment. Given these circumstances, the customer obtains theoretically the power to dictate how the application interacts with other dependencies such as databases, storage entities etc. CSP normally claim this transfer is encrypted but this statement can hardly be verified by the customer. Since the customer has the ability to interact with the platform over a prepared API, system states and specific application logs can be extracted. However potential adversaries, which can compromise the application during runtime, should not be able to alter these log files afterwards. Suggested Solution:Depending on the runtime environment, logging mechanisms could be implemented which automatically sign and encrypt the log information before its transfer to a central logging server under the control of the customer. Additional signing and encrypting could prevent potential eavesdroppers from being able to view and alter log data information on the way to the logging server. Runtime compromise of an PaaS application by adversaries could be monitored by push-only mechanisms for log data presupposing that the needed information to detect such an attack are logged. Increasingly, CSP offering PaaS solutions give developers the ability to collect and store a variety of diagnostics data in a highly configurable way with the help of runtime feature sets [38].3) IaaS Environments: As expected, even virtual instances in the cloud get compromised by adversaries. Hence, the ability to determine how defenses in the virtual environment failed and to what extent the affected systems havebeen compromised is crucial not only for recovering from an incident. Also forensic investigations gain leverage from such information and contribute to resilience against future attacks on the systems. From the forensic point of view, IaaS instances do provide much more evidence data usable for potential forensics than PaaS and SaaS models do. This fact is caused throughthe ability of the customer to install and set up the image for forensic purposes before an incident occurs. Hence, as proposed for PaaS environments, log data and other forensic evidence information could be signed and encrypted before itis transferred to third-party hosts mitigating the chance that a maliciously motivated shutdown process destroys the volatile data. Although, IaaS environments provide plenty of potential evidence, it has to be emphasized that the customer VM is in the end still under the control of the CSP. He controls the hypervisor which is e.g. responsible for enforcing hardware boundaries and routing hardware requests among different VM. Hence, besides the security responsibilities of the hypervisor, he exerts tremendous control over how customer’s VM communicate with the hardware and theoretically can intervene executed processes on the hosted virtual instance through virtual introspection [25]. This could also affect encryption or signing processes executed on the VM and therefore leading to the leakage of the secret key. Although this risk can be disregarded in most of the cases, the impact on the security of high security environments is tremendous.a) Snapshot Analysis: Traditional forensics expect target machines to be powered down to collect an image (dead virtual instance). This situation completely changed with the advent of the snapshot technology which is supported by all popular hypervisors such as Xen, VMware ESX and Hyper-V.A snapshot, also referred to as the forensic image of a VM, providesa powerful tool with which a virtual instance can be clonedby one click including also the running system’s mem ory. Due to the invention of the snapshot technology, systems hosting crucial business processes do not have to be powered down for forensic investigation purposes. The investigator simply creates and loads a snapshot of the target VM for analysis(live virtual instance). This behavior is especially important for scenarios in which a downtime of a system is not feasible or practical due to existing SLA. However the information whether the machine is running or has been properly powered down is crucial [3] for the investigation. Live investigations of running virtual instances become more common providing evidence data that。

计算模式的创新——云计算

计算模式的创新——云计算

2 6 4 ;3 青岛 国际机场集 团有限公 司 6 02 .
图 、搜 索 等 这 些 服 务 增 加 之 后 , 对 于 服
务的 可靠性 、可用性 要 求急剧 增加 ,通 过集群 等方式 已经很难提供足够的性 能保 证 ,那 么只有一 个 办法 ,那就 是 在各地
来 建 设 数 据 中 心 。 对 于 诸 如 GOOgl e、
引 言
云计 算是 目前 I T界最 为热 门的词汇 ,
从 I M 、 o l、Ama o B Go ge zn到 D l el 软 、 、微 HP等这些 I T业界的 巨头都在不遗 余力地
计 算 模 式 的 发 展
推动云计算的发展 , 并且都从各 自的角度 诠释着云计算及其相关应 用。那 么到底 什
些 小 公司来说 ,就没 有独 自建设 数据 中心的能 力 ,那么 Go g e o l 或者 Ama o zn

等 就 可 以将 自己 的基 础 设 施 能 力 作 为 服 务
提供 给相 关ห้องสมุดไป่ตู้ 用户 ,这 就是 云计 算 的 由 来 。
种云 为用 户提供一个托管平 台,用户可以 将他们所开发和运营的应用托管到云平 台
也 要清 醒 地 看到 ,基于 云 计算 的 I 业 T
务 ,虽 然 提 高 了 企 业 I 服 务 水 平 ,但 是 T 这 种 水 平 的 应 用 还 远 没 有 达 到 彻 底 改 变 企 业 I 环 境 的 目的 ,而 且 企 业 在 将 现 有 I T T 业 务迁 移 到云计 算 之前 ,一定 要进 行认
有的资源。 ( )私 有 云 。私 有 云 是 由某 个 企 业 独 2 立构建和使 用的 云环境 。私有云是指 为企 业或组织所专有 的云计算 环境 。 ( )混 合 云 。指 公 有 云 与 私 有 云 的混 3

混合云白皮书(2019)

混合云白皮书(2019)

参与编写单位
中国信息通信研究院、华为技术有限公司、中兴通讯股 份有限公司、上海云轴信息科技有限公司、上海蓝云网络科 技有限公司、浙江蚂蚁小微金融服务集团股份有限公司、无 锡华云数据技术服务有限公司、新华三技术有限公司、北京 青云科技有限公司、浪潮云信息技术有限公司、中国电信股 份有限公司北京研究院、中国电信股份有限公司云计算分公 司、优刻得科技股份有限公司、威睿信息技术(中国)有限 公司、上海道客网络科技有限公司、北京金山云网络技术有 限公司、富通云腾科技有限公司。
其他
10.1% 15.9%
2.5% 4.3%
2018
2017
50.4% 52.7%
48.2% 41.9%
47.9% 54.3%
数据来源:中国信息通信研究院 图 3 企业混合云主要应用场景
灾难恢复、数据备份和负载扩容是混合云三个重要的应用场景。 据调查,50.4%的企业将混合云应用于数据或业务的灾难恢复;占比 次之的场景是数据备份(48.2%),与 2017 年相比提高了 6.3%。还 有 47.9%的企业利用混合云实现应用负载扩容。其他应用场景:根据 需求将不同的应用部署在不同云平台中(25.4%)以及在公有云上做 开发测试,在私有云上做生产部署(10.1%)。
4
云计算开源产业联盟
混合云白皮书(2019 年)
网络连接不够稳定 基础功能不完备 服务可用性差
产品/服务种类不丰富
21.7% 16.3%
20.6% 20.2%
43.1% 34.9%
35.8% 32.2%
资源调配能力及效率低 异构虚拟化实现困难 其他
16.6% 22.9%
11.3% 13.6%
6.2% 1.9%
附录:混合云典型案例 ..........................................................................22
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

摘要当越来越多的初创企业 (Start-up) 还在享受云计算所带来的成本节约和灵活性优势之时,企业如今已在探索如何利用外部云、构建内部云甚至成为云提供商。由于开源 (Open Source) 对于云计算来说是必不可少的,因而企业也在研究他们如何能够避免遭遇锁定在单个供应商产品里的这一老问题。Sun 公司作为一家得到全球认可的开源领先者,正致力于将开放标准和开源的优势推广到云计算之中。

开源与云计算:大规模的按需、创新型 IT

白皮书2009 年 6 月Sun 公司目录内容摘要...........................................................1为云计算提供有力证据...............................................2利用云计算.........................................................4开源在云中的应用...................................................6Sun 公司的云计算成就................................................8展望未来..........................................................11Sun 公司内容摘要云计算提供了大量的机会为企业降低计算成本和加快 Web 服务面市速度。不管是企业利用外部云,内部构建自己的云,成为云服务提供商,还是将上述选项混合使用,他们都可以获得使其能够变得越来越灵活的优势。像 Google、eBay 和 Amazon 这样的大型系统的成功造就了云计算的繁荣,而且上述每个公司都利用免费获得、自由修改的开源软件大规模地构建了高度定制的系统。现在,云计算环境中使用的绝大多数软件栈也是开源的,而且经过集成化和优化的开源 Apache、MySQL、PHP/Perl/Python (AMP) 栈已成为构建和部署新型 Web 应用程序和服务的首选平台。Sun 公司作为一家开源领域的全球领先者,正致力于将开放标准和开源的好处推广到云计算之中。受到 Java™、MySQL™、OpenSolaris™、开放式存储 (Open Storage) 和其它开源技术的强力支持,Sun 开放式云平台 (Sun Open Cloud Platform) 是专为企业构建公用云和专用云所设计的。1 内容摘要Sun 公司2 为云计算提供有力证据 为云计算提供有力证据.从许多方面看,云计算都是计算和数据资源日益迁移到 Web 上的一个示例。但也存在区别:云计算代表着网络计算价值的一个新的转折点。它促成更高的效率、巨大可扩展性和更加方便快捷的软件开发。云计算还为按需提供 IT 资源带来更高水平的效率和经济性,与此同时,也为开发人员和企业开创出新的商业模式和市场机会。

云计算之所以现在如此令人感兴趣,是因为企业都在注视着 Amazon、Google 和 Yahoo!,并想知道这些网络公司为何能在现今的基本计算和存储的市场定价下,和单个企业相比,能实现如此显著的成本节约。事实是,云计算成本较低,而且它允许人们在如何利用 IT 资源方面享有更大的灵活性。

•󰀃成本节约。云计算成本节约是由于提高效率而产生的结果,这始终是 Web 规模计算的一个特色。通过利用像虚拟化这样的技术,公司现在能够更加高效地利用计算资源,从而提高基础设施利用率,并简化资源管理,同时还能够根据需要提供可扩展性。与灵活定价方式 (Utility Pricing) 相结合,由于可预测到未来需求峰值,这还避免了过度配置的情况。而且不需要进行大量资本投资,企业能够只为他们实际需要和使用的计算资源支付费用,这使他们可以将资本费用转变成为经营费用。

•󰀃经营灵活性。云计算的自助配置功能 (Self-Provisioning) 意味着大大加快了面市速度。不需要谈判签订长期合同。内置的服务意味着其他人已经研究出如何构建一个可扩展的存储系统,因此,公司不必亲自做那项工作。云计算还实现更大弹性;如果一个应用程序变得非常庞大,云客户只需为正在使用的已增加资源支付费用。这为现今云中部署的应用程序背后的商业模式提供了更大的灵活性。Sun 公司云计算为企业提供了一条降低成本和提高灵活性的途径,他们不必重复劳动或建设并非设计为支持基于 Web 的服务的内部基础设施。云计算使 IT 机构能够极大地提高硬件利用率,并能够在极短时间内升级到巨大容量,而不必频繁地投资构建新的基础设施、培训新员工或颁发新的软件许可证。云计算还创造出新的机会,使人们能够在较短时间内使用更少投资构建一种更高级的网络服务。当企业发现其 IT 基础设施成本远远高于利用云的初创企业,而且初创企业如何能够更快地提供新服务时,他们就会寻找更多利用云计算的途径。由于云计算并不涉及长期合同 (而且许多云供应商按短至一小时的增量向客户收费),因而,云是企业快速设计新服务原型、进行测试和开发或开展时间有限的促销活动的一种绝佳方法。例如,在传统的 IT 环境中,开发人员自个或通过一个团队创建应用程序,然后将应用程序交付运营团队或托管提供商进行升级和测试,这意味着控制能力弱化,而且由于有更多人参与,因而可能会产生更大冲突。凭借云,开发人员可以通过互联网低价委托使用服务器,并且可以使其应用程序快速启动并正常运行。云使开发人员能够快速进行更多实验,而且可以将其扩展和升级。同时,更快的开发和测试周期意味着企业可以用几个小时时间就能完成过去通常需要数天、数周甚至数月时间完成的工作。3 为云计算提供有力证据 Sun 公司•.利用云计算那么,企业如何利用云计算趋势? 这不仅仅是把包含企业整个软件栈的机器映像加载到一个公用云上的问题,因为还可以通过多种不同途径来利用此基础设施和探索新商业模式的生态系统。掌控云一般来说,企业使用公用云来执行特定功能或工作负荷。云对于下面几项任务来说是一个非常具有吸引力的替代选择: •󰀃开发和测试。这也许是对于企业 (不只是初创企业的开发人员) 来说最容易的云使用案例。如果还不知道项目是否将会通过概念验证 (Proof of Concept),就没有必要采购服务器。 •󰀃功能卸载。企业可以针对特定工作负荷来利用云。例如,SmugMug 在云中作为一项批作业执行其映像微缩功能。 •󰀃扩大。云为企业提供一个在需要服务时处理峰值负荷或预期波峰的新选项。这对于企业来说是一个非常具有吸引力的选项,但也可能是最困难的使用案例之一。成功取决于应用程序有状态性以及与可能需要在多个站点之间复制和均衡负载的其它数据集的相关性。 •󰀃实验。为何要下载新软件的演示版,然后安装、许可和测试软件呢?将来,软件测评可以在需要购买许可证或支持之前在云中进行。构建云许多大型企业了解云计算的经济效益,但希望确保严格执行安全策略。因此,有些企业首先试验“专用”云,长期选项是将成熟的企业应用程序迁移到一个能够提供恰当服务水平的云中。其他企业可能只想构建专用云来利用资源池的经济效益,并标准化其开发和部署过程。有些企业将通过与云提供商合作来为保护在公司防火墙内的专用云开发一个架构。然而,由于存在管制要求,将数据从防火墙内受保护的区域迁移到公用的多租户数据中心可能会对一些企业造成问题。当一个企业利用运行与其内部数据中心相似的环境的外部云时,这是可以迁移的,因而使该企业能够在需求波动时掌控外部云,同时还可以保护其数据并仍然遵守管理法规。4 利用云计算Sun 公司成为云随着企业和服务提供商获得云架构模式方面的经验,并更加信任可用的安全和访问控制技术,其中大部分企业将会决定部署外向型云服务。现在,某些现有的公用云的高增长率无疑会加速推进这一势头。云服务提供商可以: •󰀃为初创企业和 Web 2.0 应用程序开发人员提供进入市场的新路径 •󰀃提供新的增值功能,例如,分析 •󰀃通过企业级 SLA 创造竞争优势 •󰀃帮助企业客户开发自己的云企业可以选择利用服务提供商的云或构建自己的云,这对于处理数据保护和服务水平问题的公司来说是一个很好的选项。第三种可能性是开发一个混合模式,其中,企业拥有云的若干部分,并以一种受控的方式与其他企业共享其它部分。混合云提供根据需要的外部配置式扩展的前景,但增加了确定如何在这些不同环境之间分配应用程序的复杂性。尽管企业可能会为混合云的前景所吸引,但此选项可能最容易为不需要复杂数据库或数据同步的无状态应用程序所采用。现在构建大型数据中心的任何企业都应该思考他们是在内部提供云服务 (专用云),还是向外部机构提供云服务 (公用云)。5 利用云计算Sun 公司开源在云中的应用开源是云计算的巨大促成因素。从 Google 和 Yahoo! 到 Amazon 和 eBay,云计算的先驱们利用免费获得、自由修改的开源性质,以一种前所未有的规模构建高度定制的系统,为其基于 Web 的应用程序提供强大动力。正是这些大型系统的成功促成了云计算的兴起,这是 Google 和其他先驱们利用的同样的技术的普及,使全世界的开发人员能够利用一种本来根本负担不起 (甚至无法获得) 的计算模式。对于促成云计算的大规模系统的早期供应者来说,正是开源的免费可用性和可修改性使其具有吸引力。但对于企业来说,开源的吸引力在于,它是一种避免继续遭受单一供应商锁定困扰的方法。开源技术往往容易吸引大规模的有活力的社区及其周围的生态环境,这导致的一个结果是产生多种专门为企业定制的产品和服务。因此,如果一个企业对于它从一个供应商那里获得的服务或支持不满意,就可以转向另一个供应商来提供该服务和支持,而其,如果其它一切手段都不可行,还可以访问源代码以及创建并维护其的社区。由于开源对于云计算来说是必不可少的,因而云环境中使用的绝大多数软件栈也都是开放源代码的,这一点丝毫不令人惊奇。现在,经过集成化和优化的开放源 Apache、MySQL、PHP/Perl/Python (AMP) 栈已成为构建和部署新型 Web 应用程序和服务的首选平台。而且,云计算证明是采用一系列甚至更新、更轻便、更敏捷的工具的催化剂,这些工具包括 lighttpd (一种开放源 Web 服务器)、.Hadoop (支持数据密集型分布式应用程序的免费 Java 软件框架)、MogileFS (一种能够实现存储水平扩展的文件系统),等等。6 开源在云中的应用

相关文档
最新文档