University of Berkley has published an excellent paper on cloud computing,
the argument regarding data security in the cloud is that encrypted data in
the cloud can be more secure than unencrypted data in the internal
datacenter. Almost nobody uses encryption in internal datacenters as they are
percieved as secure. Here is an excerpt from the study:
“We believe that there are no fundamental obstacles to making a
cloud-computing environment as secure as the vast majority of in-house IT
environments, and that many of the obstacles can be overcome immediately with
well understood technologies such as encrypted storage, Virtual Local Area
Networks, and network middle boxes (e.g. firewalls, packet filters). For
example, encrypting data before placing it in a Cloud may be even more secure
than unencrypted data in a local data center; this approach was successfully
used ... (more)
One of our customers wanted to establish a site to site connectivity between
their datacenter and public cloud (Amazon EC2) and then have a private
network within Amazon EC2 with their own custom IP addresses for their
servers in the cloud.
Basically the idea here is to augment the internal datacenter resources with
the resources in the public cloud securely so that the servers in the cloud
appear as if they are part of their own private corporate network. The idea
here is to isolate the servers used by the customer in the cloud from the
rest of the servers in the cloud using ... (more)
At Kaavo we recognized that there is a need to provide a horizontal framework
that anyone can use to quickly build a vertical solution for running and
managing their complex custom applications in the cloud. To enable single
click deployment and runtime management of any custom application in the
cloud Kaavo’s IMOD uses System Definition file for automating complex
workflows and dependencies for deployment and runtime management.
Understanding the structure of System Definition file is important to fully
benefit from Kaavo’s application centric management approach.
System Defin... (more)
Automating the deployment and runtime management of large application
deployments running on multiple cloud resources across various cloud
providers is a challenging problem.
Managing remote resources is not a new problem the big difference is that in
cloud the resources are added and removed dynamically and at a larger scale.
Before cloud people have built management systems using two approaches:
Historically the major trade-off between the agent and the agentless approach
has been control vs. rollout time and maintenance costs. You usually get more
control with t... (more)
The growing use of Infrastructure as a Service to run custom applications,
SaaS, and PaaS offerings is increasing the demand of management solutions to
leverage the automation offered by IaaS. One of the biggest advantages of
IaaS is the ability to automate tasks which were not possible before. E.g.
a crashed server can be restored with an API call by launching a new
instance. Effective use of the IaaS APIs can dramatically reduce the time
and resources it takes to deploy and provide production support for services
Various solutions and standards are availab... (more)