Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
39 views4 pages

Cloud Computing

This document discusses the Cloud Cube Model, which categorizes cloud networks based on four dimensions: internal/external, proprietary/open, de-perimeterized/perimeterized, and insourced/outsourced. It describes each dimension and how the model helps secure data in the cloud. The Cloud Cube Model was designed by the Jericho Forum to select secure cloud formations based on these four factors and protect sensitive data and networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views4 pages

Cloud Computing

This document discusses the Cloud Cube Model, which categorizes cloud networks based on four dimensions: internal/external, proprietary/open, de-perimeterized/perimeterized, and insourced/outsourced. It describes each dimension and how the model helps secure data in the cloud. The Cloud Cube Model was designed by the Jericho Forum to select secure cloud formations based on these four factors and protect sensitive data and networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Apratim Mukherjee

Cloud Computing(CA-2)

TOPIC: CLOUD CUBE MODEL


 NAME: APRATIM MUKHERJEE
 UNIVERSITY ROLL NO: 17600120004 || CLASS ROLL: 07
 YEAR: 4TH || SEMESTER: 7TH
 DEPARTMENT: COMPUTER SCIENCE & ENGINEERING
 SUBJECT: CLOUD COMPUTING
 SUBJECT CODE: : PEC-CS701B
 CONTINUOUS ASSESSMENT 2(CA-2)
 HOOGHLY ENGINEERING & TECHNOLOGY COLLEGE

CLOUD CUBE MODEL:


 INTRODUCTION:
Cloud Cube Model, designed and developed by Jericho forum. This helps to categorize the cloud
network based on the four-dimensional factors: Internal/External, Proprietary/Open, De-
Perimeterized/Perimeterized, and Insourced/Outsourced.

 WHAT IS THE CLOUD CUBE MODEL?


Cloud Cube model, helps to categorize the cloud network based on the four-dimensional factor.
Their main focus is to protect and secure the cloud network. This cloud cube model helps to
select cloud formation for secure collaboration.

This model helps IT managers, organizations, and business leaders by providing a secure and
protected network.

Security is an important concern for cloud customers and most of the cloud providers
understand it. The customer should also keep in mind, the selected cloud formation meets the
regulatory and location requirements.

They should also keep in mind that if cloud providers stop providing the services, where else they
can move. There are three service models, which include:

 Software as a Service (SaaS)


 Platform as a Service (PaaS)
 Infrastructure as a Service (IaaS)

In addition, there are four deployment models such as:

 Public Cloud
 Private Cloud
 Community Cloud
 Hybrid Cloud

Page 1 of 4
Apratim Mukherjee
Cloud Computing(CA-2)

These models are very flexible Agile and responsible. They are user-friendly and provide many
benefits to the customers.

BROAD
RAPID MEASURED ON DEMAND
NETWORK
ELASTICITY SERVICE SELF SERVICE
ACCESS

RESOURCE POOLING

SOFTWARE AS A PLATFORM AS A INFRASTRUCTURE


SERVICE(SaaS) SERVICE(PaaS) AS A SERVICE(IaaS)

PUBLIC PRIVATE HYBRID COMMUNITY

CLOUD CUBE MODEL: FIGURE

 HOW TO SECURE DATA IN THE CLOUD CUBBE MODEL?


There are some steps and points to keep in mind before securing your data in a cloud cube model:

 Step 1

In the classification of the data, the customer should know what rules must be applied to protect it.

 Step 2

It should be ensured, that the data exist only in specific trust levels.

 Step 3

It should check what regulatory compliance and restrictions are applicable. For example, the data
should stay in a particular boundary and it has to stay in the safe harbor or not.

After the data is classified and is ready to be put in the required zone, the assigned person is in a
position to decide the following factors-

The data and processes, which are to be moved in the cloud.

Page 2 of 4
Apratim Mukherjee
Cloud Computing(CA-2)

At what level the user want to operate in the cloud? It can be infrastructure, platform, software, or
platform as a service.

The cloud formations are mostly compatible with the requirement.

The level of operation in the cloud can be different as per the requirement.

Below is the chart which shows the Cloud layers, where the cloud operates.

OUTCOME/VALUE
ABSTRACTION OCCURS HERE!

PROCESS

SECURITY AND IdAMS


ORCHESTRATION

SOFTWARE

PLATFORM

INFRASTRUCTURE

CLOUD CUBE LAYERS: FIGURE 2

 DIMENSIONS OF CLOUD CUBE MODEL:


Cloud Cube model has four dimensions to categorized cloud formations:

 Internal/External
 Proprietary/Open
 De-Perimeterized/Perimeterized
 Insourced/Outsourced Dimension.
 Internal/External:
The most basic cloud form is the external and internal cloud form. The external or internal dimension
defines the physical location of the data. It acknowledges us whether the data exists inside or outside
of your organization’s boundary.
Here, the data which is stored using a private cloud deployment will be considered internal and data
outside the cloud will be considered external.

 Proprietary/Open:
The second type of cloud formation is proprietary and open. The proprietary or open dimension
states about the state of ownership of the cloud technology and interfaces. It also tells the degree of
interoperability, while enabling data transportability between the system and other cloud forms.

Page 3 of 4
Apratim Mukherjee
Cloud Computing(CA-2)

The proprietary dimension means, that the organization providing the service is securing and
protecting the data under their ownership.

The open dimension is using a technology in which there are more suppliers. Moreover, the user is
not constrained in being able to share the data and collaborate with selected partners using the open
technology.

 De-Permeterized/Perimeterized:
The third type of cloud formation is De-perimeterized and Perimeterized. To reach this form, the user
needs collaboration oriented architecture and Jericho forum commandments.

The Perimeterised and De-perimeterized dimension tells us whether you are operating inside your
traditional it mindset or outside it.

Perimeterized dimension means, continuing to operate within the traditional it boundary, orphan
signaled by network firewalls.

With the help of VPN and operation of the virtual server in your own IP domain, the user can extend
the organizations perimeter into external Cloud Computing domain. This means that the user is
making use of the own services to control access.

De-perimeterized dimension means the system perimeter is architected on the principles outlined in
the Jericho forums commandments. In De-perimeterized dimension, the data will be encapsulated
with metadata and mechanisms, which will further help to protect the data and limit the
inappropriate usage.

 Insourced/Outsourced:
The Insourced and outsourced dimensions have two states in each of the eight cloud forms. In the
outsourced dimension the services provided by the third party, whereas in the insourced dimension,
the services provided by the own staff under the control.

In this few organizations that are traditional bandwidth software or hardware, providers will run
fluently on becoming cloud service providers.

The organizations which are seeking to procedure cloud services must have the ability to set legally
binding collaboration agreement. In this, an organization should ensure that data is deleted from the
service provider’s Infrastructure.

Page 4 of 4

You might also like