• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Core Components of Cloud Computing

By Abhishek Ghosh April 23, 2013 7:00 pm Updated on April 23, 2013

Core Components of Cloud Computing

Advertisement

Core Components of Cloud Computing platform includes the identity and authorization management apart from virtualization software, hardwares and network used. This does not only guarantee facility and manageability of identities, but also the safety of the different systems and cloud-based applications.

A modern identity and authorization management system consists of several components, which are summarized in the identity management platform. The pillars of this system are authentication, authorization identities and the publication of attributes. The visibility, scale and manage identity-related information, data and permissions required in a such a comprehensive environment, flexible and secure Identity and Access Management (IDA).

 

Recommended Article : Permissions and Identities in the Cloud

Advertisement

---

 

Core Components of Cloud Computing : Hardware, Software and Networking Part

 

Hardware, Software, Networking and Service models of Cloud belongs to the Core Components of Cloud Computing and has been discussed before through these articles :

 

  • Details about Cloud Computing
  • Cloud Computing Service Models

 

These Core Components of Cloud Computing will not be discussed here due to limitation of space and inconvenience of reading.
 

Core Components of Cloud Computing

 

Core Components of Cloud Computing : The Security and Identity Management Constitutes a Bigger Part

 

An efficient cloud computing requires an IDA system which summarizes the administrative tasks and makes related tasks manageable. An IDA system in the cloud must have the complete control over each and every identity system. This includes the administration of identities of the individuals, service accounts, physical or virtual computers, servers and service identities. These requirements can often only partially meet a conventional IDA system. Ideally, the IDA system storing all relevant information, based on which the access or the manageability of resources within the cloud according to defined service level agreements (SLA) to grant or to refuse.

The IDA system keeps a cohesive solutionready for the manageability of the entire lifecycle of an identity and related information, requirements and authorizations. Functional distinction is made in two different components : one is the installation and deletion of identities (provisioning) and the other is identity management (administration). The manageability of identities defines the implementation and transfer (delegation) of administrative activities and access to self-service components.

In a cloud system, the deletion of identities provide a just-in-time or on-demand process. This distributed identities can be created without having all the information an identity in the connected systems or applications are available. Deletions of identities should immediately and directly, if required, will be synchronized to all systems and applications within the cloud, as any delay may involve a security risk that must be avoided. IDA will ensure that other associated identities according to the request are dysfunctional within the cloud.

Permissions are represented within the IDA by a number of attributes that describe access and permissions to an authenticated identity (according to a set Authenticated Security Principal). As cloud-based applications often requires its own administration for authorization or authorization which include the use of general authorization technology under certain circumstances.

The possibility that an individual can have multiple identities within the cloud, makes a parent mapping of these identities are necessary.

Abhishek-GhoshTagged With core components of cloud computing , core components of cloud computing aws , aws core components of cloud computing , Cloud Hardware Components , components of cloud computing , core component of cloud computing , core components of cloud computing amazon , which of the following are core components of cloud computing , cloud computing core components , core components of AWS cloud computing
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Core Components of Cloud Computing

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • Permissions and Identities in the Cloud

    Permissions and Identities in the Cloud is among the core components of a cloud computing platform. This guarantee installation and manageability of identities.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy