SlideShare a Scribd company logo
3
Most read
16
Most read
Cloud Use Cases and Related Standards Requirements
Use Cases
Cloud Use Cases  From http://cloud-computing-use-cases.googlegroups.com/
Cloud Use Cases (continued) (SaaS, Middleware. Storage, VMs)
Standards Requirements
General Requirement Categories Common VM Formats, Data Formats and APIs:  Virtual machines, data and applications created for one cloud provider should run on another cloud provider without changes.  Cloud Management:  Cloud computing is not feasible without service management, governance, metering, monitoring, federated identity, SLAs and benchmarks, data and application federation, deployment, and lifecycle management.  Security:  Security in cloud computing is vital, although the requirements for security will vary widely depending on the application and data types. Location awareness:  A way of identifying the location of the physical machine hosting the cloud infrastructure is an absolute requirement for many government regulations.
Requirements Identity:  The cloud service must authenticate the end user An   open client:  Access to the cloud service should not require a particular platform or technology Security:  Security (including privacy) is a common requirement to all use cases, although the details of those requirements will vary widely from one use case to the next. A full discussion of security in cloud computing is beyond the scope of this paper SLAs:  Although service level agreements for end users will usually be much simpler than those for enterprises, cloud vendors must be clear about what guarantees of service they provide .  Federated identity:  In addition to basic the identity needed by an end user, an enterprise user is likely to have an identity with the enterprise. The ideal is that the enterprise user manages a single ID, with an infrastructure federating other identities that might be required by cloud services .
Requirements Location awareness:  Depending on the kind of data the enterprise is managing on the user's behalf, there might be legal restrictions on the location of the physical server where the data is stored. Although this violates the cloud computing ideal that the user should not have to know details of the physical infrastructure, this requirement is essential. Many applications cannot be moved to the cloud until cloud vendors provide an API for determining the location of the physical hardware that delivers the cloud service.  Management and Governance:  Public cloud providers make it very easy to open an account and begin using cloud services; that ease of use creates the risk that individuals in an enterprise will use cloud services on their own initiative. Management of VMs and of cloud services such as storage, databases and message queues is needed to track what services are used. Governance is crucial to ensure that policies and government regulations are followed wherever cloud computing is used. Other governance requirements will be industry- and geography-specific.
Requirements Metering and monitoring:  All cloud services must be metered and monitored for cost control, charge backs and provisioning.  Security:  Any use case involving an enterprise will have more sophisticated security requirements than one involving a single end user. Similarly, the more advanced enterprise use cases to follow will have equally more advanced security requirements.  A  Common File Format for VMs:  A VM created for one cloud vendor’s platform should be portable to another vendor’s platform.  Data and Application Federation:  Enterprise applications need to combine data from multiple cloud-based sources, and they need to coordinate the activities of applications running in different clouds.  Interoperability:  When more than one enterprise is involved, interoperability between the enterprises is essential.
Requirements Lifecycle Management : Enterprises must be able to manage the lifecycle of applications and documents. This requirement includes versioning of applications and the retention and destruction of data. Discovery is a major issue for many organizations. There are substantial legal liabilities if certain data is no longer available. In addition to data retention, in some cases an enterprise will want to make sure data is destroyed at some point.  Common APIs for Cloud Storage and Middleware:  The enterprise use cases require common APIs for access to cloud storage services, cloud databases, and other cloud middleware services such as message queues. Writing custom code that works only for a particular vendor’s cloud service locks the enterprise into that vendor’s system and eliminates some of the financial benefits and flexibility that cloud computing provides.  SLAs and Benchmarks:  In addition to the basic SLAs required by end users, enterprises who sign contracts based on SLAs will need a standard way of benchmarking performance. There must be an unambiguous way of defining what a cloud provider will deliver, and there must be an unambiguous way of measuring what was actually delivered.
Requirements Deployment:  It should be simple to build a VM image and  deploy it to the cloud as necessary. When that VM image is built, it should be possible to move that image from one cloud provider to another. Deployment of applications to the cloud should be straightforward as well.  Industry-specific standards and protocols:  Many cloud computing solutions between enterprises will use existing standards such as RosettaNet or OAGIS. The applicable standards will vary from one application to the next and from one industry to the next.  Transactions and concurrency:  For applications and data shared by different enterprises, transactions and concurrency are vital. If two enterprises are using the same cloud-hosted application, VM, middleware or storage, it's important that any changes made by either enterprise are done reliably.
Standards Requirements    Mapped to Use Cases
Requirements Mapped to Use Cases
Requirements Mapped to Use Cases
GSA Timeline for Use Cases
Phased Approach for Delivering Cloud Computing Infrastructure  as a Service  (IaaS) Platform  as a Service  (PaaS) Software as a Service  (SaaS) Security Procurement Target Availability Target Apps Cloud Delivery  Models  Phase 1 Phase 2 Phase 3 TARGET AVAIL: Sep 2009 TARGET AVAIL: Sep 2009 TARGET AVAIL: Aug 2009 Low-Impact FISMA Security Advantage, BPA Aug – Oct 2009 Light-weight collaboration & productivity tools and basic  infrastructure / platform Low and Medium Impact  FISMA Security Smart-Buy, BPA, Directed RFP Nov 2009 – Feb 2010 Rich productivity tools, enhanced platform capabilities Low , Medium an d High Impact  FISMA Security Mar – Jun 2010 Enterprise Applications in the cloud and integration services Commercially Available Public Clouds Public and Outsourced Private Clouds Private and Hybrid Clouds TARGET AVAIL: Feb 2010 TARGET AVAIL: Jan 2010 TARGET AVAIL: Nov 2009 TARGET AVAIL: Mar 2010 TARGET AVAIL: Apr 2010 TARGET AVAIL: Jun 2010 Smart-Buy, BPA, Directed RFP

More Related Content

PDF
Deploying Cloud Use Cases
PDF
Aws serverless multi-tier_architectures
PPTX
Service Fabric and Azure Service Fabric Mesh introduction
PPTX
DotnetConf - Cloud native and .Net5 announcements
PDF
John Willis Cc Use Cases
PPTX
Monitoring Containerized Micro-Services In Azure
PPTX
Presentation Tier optimizations
PPTX
Azure Container Instance
Deploying Cloud Use Cases
Aws serverless multi-tier_architectures
Service Fabric and Azure Service Fabric Mesh introduction
DotnetConf - Cloud native and .Net5 announcements
John Willis Cc Use Cases
Monitoring Containerized Micro-Services In Azure
Presentation Tier optimizations
Azure Container Instance

What's hot (20)

DOC
Praveen Kumar Resume
PPTX
Lets talk about: Azure Kubernetes Service (AKS)
PPTX
TugaIT 2016 - Docker and the world of “containerized" environments​
PPTX
Azure Container Services​
PPTX
Azure Container Services​
PPTX
Tooling and DevOps for the Hybrid Cloud with Azure and Azure Stack
PDF
Container orchestration k8s azure kubernetes services
PPTX
Architecting and Building Hybrid Cloud Apps for Azure and Azure Stack
PDF
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!
PPTX
Innovation anywhere with microsoft azure arc
PPTX
Monitor Cloud Resources using Alerts & Insights
PPTX
Manage your kubernetes cluster with cluster api, azure and git ops
PPTX
Azure Stack - Azure Nights User Group
PPTX
Cisco integrated system for microsoft azure stack
PPTX
Intro to docker and kubernetes
PPTX
Azure Compute, Networking and Storage Overview
PPTX
Introduction to Microsoft Azure
PPTX
Azure Big Picture
PPTX
Hybrid computing Azure with Azure Stack by Atcetera // Azure Multi-Cloud
PDF
Comparison and mapping between various cloud services 2019
Praveen Kumar Resume
Lets talk about: Azure Kubernetes Service (AKS)
TugaIT 2016 - Docker and the world of “containerized" environments​
Azure Container Services​
Azure Container Services​
Tooling and DevOps for the Hybrid Cloud with Azure and Azure Stack
Container orchestration k8s azure kubernetes services
Architecting and Building Hybrid Cloud Apps for Azure and Azure Stack
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!
Innovation anywhere with microsoft azure arc
Monitor Cloud Resources using Alerts & Insights
Manage your kubernetes cluster with cluster api, azure and git ops
Azure Stack - Azure Nights User Group
Cisco integrated system for microsoft azure stack
Intro to docker and kubernetes
Azure Compute, Networking and Storage Overview
Introduction to Microsoft Azure
Azure Big Picture
Hybrid computing Azure with Azure Stack by Atcetera // Azure Multi-Cloud
Comparison and mapping between various cloud services 2019
Ad

Viewers also liked (6)

PPTX
Enabling the New Breed
PDF
Become a digital company - Case KPN / Xebia
PDF
BIG DATA AS A STRATEGY : CUSTOMER EXPERIENCE AND ANALYTICS
PPTX
Microsoft cloud big data strategy
PPTX
Big data architectures and the data lake
PDF
Use cases for cloud messaging
Enabling the New Breed
Become a digital company - Case KPN / Xebia
BIG DATA AS A STRATEGY : CUSTOMER EXPERIENCE AND ANALYTICS
Microsoft cloud big data strategy
Big data architectures and the data lake
Use cases for cloud messaging
Ad

Similar to Cloud Use Cases And Standards (20)

PPTX
2.evaluating cloud platforms
PPT
Cloud Computing
PDF
Ensuring PCI DSS Compliance in the Cloud
PDF
Q&A: Why cloud-native apps are better?
PPTX
cloud-computing--------------------.pptx
PDF
Best cloud computing training institute in noida
PDF
8 Essential Elements of Cloud Computing Architecture.pdf
PPT
An introduction to the cloud 11 v1
PDF
Cloud computing-overview
PDF
Cloud Computing Overview | Torry Harris Whitepaper
PDF
Cloud computing-overview
PDF
Cloud computing-overview
PDF
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
PDF
From Benefits to Challenges A Guide on Cloud Software Development.pdf
PPTX
Cloud monitoring overview
PPTX
A Breif On Cloud computing
PPT
Cloud Computing Networks
PDF
Cloud Adoption and Risk Report 2019
PDF
Unlocking the value of the cloud - The benefits of deploying asset and facili...
2.evaluating cloud platforms
Cloud Computing
Ensuring PCI DSS Compliance in the Cloud
Q&A: Why cloud-native apps are better?
cloud-computing--------------------.pptx
Best cloud computing training institute in noida
8 Essential Elements of Cloud Computing Architecture.pdf
An introduction to the cloud 11 v1
Cloud computing-overview
Cloud Computing Overview | Torry Harris Whitepaper
Cloud computing-overview
Cloud computing-overview
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
From Benefits to Challenges A Guide on Cloud Software Development.pdf
Cloud monitoring overview
A Breif On Cloud computing
Cloud Computing Networks
Cloud Adoption and Risk Report 2019
Unlocking the value of the cloud - The benefits of deploying asset and facili...

More from GovCloud Network (20)

PDF
IaaS Price performance-benchmark
PDF
Cloud computing training what's right for me
PDF
ViON Corporation: Surviving IT Change
PDF
Staying Safe in Cyberspace
PDF
Vets 360 Services - Military Dedication - Corporate Success
PDF
GovCloud Network LLC Overview - June 25, 2014
PDF
Army PEO EIS Cloud Architecture
PDF
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
PDF
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
PDF
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
PDF
Agile Cloud Conference 2 Introduction - John Brennan
PDF
DoD Business Capability Lifecycle (BCL) Guide (Draft)
PPTX
GovCloud Network Overview Presentation
PPTX
PM ISE Information Interoperability Presentation -agile sourcing brief
PDF
Intrusion Detection on Public IaaS - Kevin L. Jackson
PDF
A Framework for Cloud Computing Adoption in South African Government
PDF
NCOIC GCC OWS-10 presentation 10 7 2013
PDF
Tech gate kevin l jackson - 09-21-2013
PDF
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
PDF
Government cloud deployment lessons learned final (4 4 2013)
IaaS Price performance-benchmark
Cloud computing training what's right for me
ViON Corporation: Surviving IT Change
Staying Safe in Cyberspace
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network LLC Overview - June 25, 2014
Army PEO EIS Cloud Architecture
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
Agile Cloud Conference 2 Introduction - John Brennan
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network Overview Presentation
PM ISE Information Interoperability Presentation -agile sourcing brief
Intrusion Detection on Public IaaS - Kevin L. Jackson
A Framework for Cloud Computing Adoption in South African Government
NCOIC GCC OWS-10 presentation 10 7 2013
Tech gate kevin l jackson - 09-21-2013
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Government cloud deployment lessons learned final (4 4 2013)

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Artificial Intelligence
PPTX
Spectroscopy.pptx food analysis technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
August Patch Tuesday
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Getting Started with Data Integration: FME Form 101
A Presentation on Artificial Intelligence
Spectroscopy.pptx food analysis technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
August Patch Tuesday
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
A comparative study of natural language inference in Swahili using monolingua...
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Cloud Use Cases And Standards

  • 1. Cloud Use Cases and Related Standards Requirements
  • 3. Cloud Use Cases From http://cloud-computing-use-cases.googlegroups.com/
  • 4. Cloud Use Cases (continued) (SaaS, Middleware. Storage, VMs)
  • 6. General Requirement Categories Common VM Formats, Data Formats and APIs: Virtual machines, data and applications created for one cloud provider should run on another cloud provider without changes. Cloud Management: Cloud computing is not feasible without service management, governance, metering, monitoring, federated identity, SLAs and benchmarks, data and application federation, deployment, and lifecycle management. Security: Security in cloud computing is vital, although the requirements for security will vary widely depending on the application and data types. Location awareness: A way of identifying the location of the physical machine hosting the cloud infrastructure is an absolute requirement for many government regulations.
  • 7. Requirements Identity: The cloud service must authenticate the end user An open client: Access to the cloud service should not require a particular platform or technology Security: Security (including privacy) is a common requirement to all use cases, although the details of those requirements will vary widely from one use case to the next. A full discussion of security in cloud computing is beyond the scope of this paper SLAs: Although service level agreements for end users will usually be much simpler than those for enterprises, cloud vendors must be clear about what guarantees of service they provide . Federated identity: In addition to basic the identity needed by an end user, an enterprise user is likely to have an identity with the enterprise. The ideal is that the enterprise user manages a single ID, with an infrastructure federating other identities that might be required by cloud services .
  • 8. Requirements Location awareness: Depending on the kind of data the enterprise is managing on the user's behalf, there might be legal restrictions on the location of the physical server where the data is stored. Although this violates the cloud computing ideal that the user should not have to know details of the physical infrastructure, this requirement is essential. Many applications cannot be moved to the cloud until cloud vendors provide an API for determining the location of the physical hardware that delivers the cloud service. Management and Governance: Public cloud providers make it very easy to open an account and begin using cloud services; that ease of use creates the risk that individuals in an enterprise will use cloud services on their own initiative. Management of VMs and of cloud services such as storage, databases and message queues is needed to track what services are used. Governance is crucial to ensure that policies and government regulations are followed wherever cloud computing is used. Other governance requirements will be industry- and geography-specific.
  • 9. Requirements Metering and monitoring: All cloud services must be metered and monitored for cost control, charge backs and provisioning. Security: Any use case involving an enterprise will have more sophisticated security requirements than one involving a single end user. Similarly, the more advanced enterprise use cases to follow will have equally more advanced security requirements. A Common File Format for VMs: A VM created for one cloud vendor’s platform should be portable to another vendor’s platform. Data and Application Federation: Enterprise applications need to combine data from multiple cloud-based sources, and they need to coordinate the activities of applications running in different clouds. Interoperability: When more than one enterprise is involved, interoperability between the enterprises is essential.
  • 10. Requirements Lifecycle Management : Enterprises must be able to manage the lifecycle of applications and documents. This requirement includes versioning of applications and the retention and destruction of data. Discovery is a major issue for many organizations. There are substantial legal liabilities if certain data is no longer available. In addition to data retention, in some cases an enterprise will want to make sure data is destroyed at some point. Common APIs for Cloud Storage and Middleware: The enterprise use cases require common APIs for access to cloud storage services, cloud databases, and other cloud middleware services such as message queues. Writing custom code that works only for a particular vendor’s cloud service locks the enterprise into that vendor’s system and eliminates some of the financial benefits and flexibility that cloud computing provides. SLAs and Benchmarks: In addition to the basic SLAs required by end users, enterprises who sign contracts based on SLAs will need a standard way of benchmarking performance. There must be an unambiguous way of defining what a cloud provider will deliver, and there must be an unambiguous way of measuring what was actually delivered.
  • 11. Requirements Deployment: It should be simple to build a VM image and deploy it to the cloud as necessary. When that VM image is built, it should be possible to move that image from one cloud provider to another. Deployment of applications to the cloud should be straightforward as well. Industry-specific standards and protocols: Many cloud computing solutions between enterprises will use existing standards such as RosettaNet or OAGIS. The applicable standards will vary from one application to the next and from one industry to the next. Transactions and concurrency: For applications and data shared by different enterprises, transactions and concurrency are vital. If two enterprises are using the same cloud-hosted application, VM, middleware or storage, it's important that any changes made by either enterprise are done reliably.
  • 12. Standards Requirements Mapped to Use Cases
  • 15. GSA Timeline for Use Cases
  • 16. Phased Approach for Delivering Cloud Computing Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Security Procurement Target Availability Target Apps Cloud Delivery Models Phase 1 Phase 2 Phase 3 TARGET AVAIL: Sep 2009 TARGET AVAIL: Sep 2009 TARGET AVAIL: Aug 2009 Low-Impact FISMA Security Advantage, BPA Aug – Oct 2009 Light-weight collaboration & productivity tools and basic infrastructure / platform Low and Medium Impact FISMA Security Smart-Buy, BPA, Directed RFP Nov 2009 – Feb 2010 Rich productivity tools, enhanced platform capabilities Low , Medium an d High Impact FISMA Security Mar – Jun 2010 Enterprise Applications in the cloud and integration services Commercially Available Public Clouds Public and Outsourced Private Clouds Private and Hybrid Clouds TARGET AVAIL: Feb 2010 TARGET AVAIL: Jan 2010 TARGET AVAIL: Nov 2009 TARGET AVAIL: Mar 2010 TARGET AVAIL: Apr 2010 TARGET AVAIL: Jun 2010 Smart-Buy, BPA, Directed RFP