Cloud Computing Group 1 991601 王語瑄 991602 譚學勇 991603 李瑞哲 991625 陳奕潔 991627 高君毅 991630 張毓珊 991638 馬美莊 991639 楊琇婷 991650 張耀宗 991651 蔡宇翔 Question (a) Describe its possible definitions 991651 蔡宇翔 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Definition Basically, cloud computing is to deal with a large amount of data and share IT infrastructure. The number of computers links together in a large database to provide IT application cloud services, cloud computing is to emphasize the spirit of service, and to provide in accordance with the needs of users customized services. Reference[1-1] What is Cloud Computing ? Reference [1-2] Definition In fact, the so-called cloud computing is the network. The name came from an engineer who usually used a cloud to represent the meaning of Internet. To make it easier, the cloud allows different computers on the network at the same time help us to do one thing, and greatly improve processing speed. Reference[1-3] History Chart Reference[2-1] Introduction 1. Centralized computing It is to use only one computer to handle all of the operation, if the operation is more heavy, the more advanced computer we must have. 2. Distributed computing It allows different computers to assist you in processing operations at the same time. Once there are more than two computers that help you deal the work, it is a basic distributed computing. Reference [2-2] Introduction 3. SAAS(Software as a service) SAAS is not only a new type of service model that provides business applications software through the Internet, but also a service model that stores software and data in the provider-side. 4. Grid computing Grid computing virtually gathers multiple computers that the owners of these computers are from all sides, linking with the Internet, and allows users to share computing power. Reference [2-2] Comparsion between grid and cloud There are some aspects in common. Both of them adopt the concept of “serving the public.“ The grid tends to offer free services, while the cloud adopts the "just pay how much you use" concept. Reference [2-3] Question (b) Provide its possible architectures and designs 991601 王語瑄 • Architecture – Deployment Models 000101101010111101011010101110000101010010101110010010010000100001110101101010010 4 Kinds of Deployment Models of Cloud Computing NIST (National Institute of Standards and Technology) defines four kinds of deployment models of cloud computing : • • • • Public Cloud Private Cloud Community Cloud Hybrid Cloud Reference [3],[4-2] Deployment Model - Public Cloud What is Public Cloud? • “The cloud infrastructure is provisioned for open use by the general public.” • “It may be owned, managed and operated by a business, academic, or government organization, or some combination of them.” • “It exists on the premises of the cloud provider.” Reference [3],[4-1] Deployment Model - Public Cloud • Merits – Low cost (or Free) – Easy to access – Flexibility and elasticity – Users only need to take time and some electric bill cost • Demerit – Security Concerns Reference [5-1] Deployment Model Examples of Public Cloud • Amazon Web Services (AWS) • Google App Engine (GAE) • Windows Azure Reference [5-1] Deployment Model - Private Cloud What is Private Cloud? • “The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers. (e.g., business units)” • “It may be owned, managed, and operated by the organization, a third party, or some combination of them.” • “It may exist on or off premises.” Reference [3],[4-1] Deployment Model - Private Cloud • Merits – Adopt virtualization – Save the budget of IT investment – Environment protection & energy conservation – Realize the centralized management of software and hardware – Downsize staff – Opportunities of partial open to private cloud • Demerits – The enterprise still need to take huge amount of cost to build the hardware environment – Relative to public cloud, private cloud is inflexibility Reference [5-1] Deployment Model Examples of Private Cloud • IBM Blue Cloud • Microsoft Mcloud Reference [5-1] Deployment Model Community Cloud What is Community Cloud? • “The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns.(e.g., mission, security requirements, policy, and compliance considerations)” • “It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them.” • “It may exist on or off premises.” Reference [3],[4-1] Deployment Model Community Cloud • Merits – Multi-tenancy billing – Maintain high standards of privacy – Services can be provided by participative organizations or third party managers • Demerit – Broad adoption has been slow Reference [5-1],[5-2] Deployment Model - Hybrid Cloud What is Hybrid Cloud? • “The cloud infrastructure is a composition of two or more distinct cloud infrastructures. (public, private, or community)” • “Remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability.(e.g., cloud bursting for load balancing between clouds)” Reference [3],[4-1] Deployment Model - Hybrid Cloud • Merits – Reduce the cost – Reduce energy consumption – Downsize IT staff – Can help companies utilize internal and external IT resources • Demerits – Dependency over internal IT infrastructure – Complex SLAs(Service Level Agreement): “You need to have detailed SLAs drawn for both your private and public cloud providers to ensure that they can meet your expectations. At the same time you also need to have a realistic approach towards distribution of workload. Look for potential integration issues that can disrupt services.” – Complex networking – Data Protection: “Compliance is a difficult parameter to achieve in hybrid configuration.” Reference [5-1],[5-3] Question (b) Provide its possible architectures and designs 991625 陳奕潔 • Architecture – Service Models 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Service Modes • Three common service modes: IaaS • Infrastructure as a Service PaaS • Platform as a Service SaaS • Software as a Service Reference [6] Service Modes What is IaaS? • Infrastructure as a Service. - Users hire processors, storage capacity, network, and other basic computing resources through the cloud service providers. - No need to purchase hardware and build basic facility. Reference [6] Service Modes IaaS - Feature • Saving hardware purchase costs and set-up costs. • Do not need to worry about hardware upgrades and maintenance issues. • Charges based on volume of use. • Free to deploy and run the software. Reference [6],[8],[9] Service Modes IaaS – Example • A laboratory provide student a server to run programs. – Usually running smoothly. – Server is busy because of the heavy workload. Buy a new server? Rent a Virtual Server? Reference [7] Service Modes What is PaaS? • Platform as a Service. – Users use the supported platforms, tools and programming languages to develop and test software. – Vendors will be responsible for the execution of the program on the platform. Reference [6] Service Modes PaaS – Example Traffic Management Reference [7] Service Modes PaaS – Feature • Application deployment easier. • Reduce hardware and software procurement and management costs. • Save manpower, material and time costs. • Suppliers must ensure the availability and stability of the platform. • Charges based on volume of use. Reference [6],[8],[9] Service Modes What is SaaS? • Software as a Service. – SaaS providers deploy applications on their own servers. – Only need to connect to the Internet, users can use these cloud softwares. Reference [6] Service Modes SaaS – Feature • Lease rather than buy. • Decrease cost. • Curb pirate version of software. • Facilitate software deployment and upgrades. • Provides a set of username and password. • Anytime, anywhere access to services. Reference [6],[8],[9] Service Modes SaaS – Example Reference [9] Question (c) Its possible strengths, weaknesses, opportunities and threats 991650 張耀宗 • Strength • Weakness 000101101010111101011010101110000101010010101110010010010000100001110101101010010 SWOT Analysis Strengths 1. Hardware manufacturing technology – Taiwan is currently the server hardware and mobile devices foundry producing countries. Hardware manufacturing technology is mature, with a cloud data center servers, storage, network hardware equipment manufacturing and maintenance of their own capabilities. 2. Enough resources – Taiwan's large enterprises generally complete intranet related equipment and architecture. With the hardware manufacturing technology is mature, We have enough resources to import the new cloud system. Reference [10] SWOT Analysis Strengths 3. Government program – Government promoted large-type network communications program, establishing an information society and information and development capabilities, making information infrastructure, information comprehensive, Taiwan suitable as experimental and innovative cloud services base. 4. Location – Taiwan is located in Southeast Asia and Mainland China's network of external connection through the center location, and the infrastructure set up almost covers the entire network, Internet penetration is high. Reference [10] SWOT Analysis Weakness 1. Experience – Taiwan is currently the server hardware and mobile devices foundry producing countries, not only lack of large-scale software development system software development technology and talent, but also the lack of large-scale system software product development plans and management experience. 2. Money – Cloud computing needs to invest large amounts of money , equipment and human, for a long time. – So that , Taiwan's general business is not easy to get into the cloud services market alone. Reference [11] SWOT Analysis Weakness 3. Key of cloud technologies – The key of cloud technologies is currently dominated by foreign manufacturers, Taiwanese manufacturers inadequate technology and scale, visibility is not as Europe, America, Japan and other manufacturers. 4. Started late – Cloud computing technology research and development started late, is not easy to catch up with others countries. Reference [11] SWOT Analysis Weakness 5. The market is small ‒ Taiwan’s domestic market is insufficient to support large service platform, enterprise demand is not clear yet, the cost is high, the market is small, It's hard to reach market size, potential users and software vendors to maintain industry sidelines. Reference [11] Question (c) Its possible strengths, weaknesses, opportunities and threats 991627 高君毅 • Opportunity • Threat 000101101010111101011010101110000101010010101110010010010000100001110101101010010 SWOT Analysis Opportunity 1. Develop high quality data center in Taiwan – Taiwan is the biggest production base of component for cloud data center. – If we can pick up the skills of the framework of cloud system , the management software of large scale system, the computing system of data center , ect , we'll hold the superiority of cost in the market of data center. – People can invest the resources and develop reasonable price and high quality data center in Taiwan. Reference [12] SWOT Analysis Opportunity 2. Advance additional value of terminal device – Base on the superiority of manufacturing terminal device and the knowledge of service in information industry of Taiwan, to imitate the successful model of markets in application software and to push forward the software with the hardware. – Import the innovate application software with small and medium-sized software enterprises, it can advance the additional value of manufacturing terminal device in Taiwan – and push forward the development of software industry. Reference [12] SWOT Analysis Opportunity 3. Establish the cloud computing center – In addition to two of the above, Networked Communications Program and Industrial Technology Research Institute establish the cloud computing center. – Hardware companies transform the service strategy into service industry development such as Foxconn and ASUS and the technique of cloud computing has been putting emphasis with IT industry. Reference [12] SWOT Analysis Opportunity 4. Introduce B2B cloud and SaaS – The cooperation with both sides of the Taiwan straits broaden the market of cloud computing. Companies in Taiwan can develop the solution for value chain and assist small and medium-sized enterprises in both sides of the Taiwan straits to introduce B2B cloud and SaaS. Reference [12] SWOT Analysis Threat 1. Standard of technique – Big companies in the world control the standard of technique and bash on competitor by strategic alliance and patent litigation. – If the companies in Taiwan can't unite with each other to integrate the resources, it's difficult to compete with big companies in the world. 2. Companies in China develop cloud computing – The companies in China has been developing cloud computing, cooperating with big companies in the world such as IBM and establish the cloud computing center. Reference [13] SWOT Analysis Threat 3. Easy to introduce cloud computing – The companies in China strengthen their ability of integrating system. – Their telecommunication and Internet operators are experienced with large scale maintenance services. It's easy to introduce cloud computing in the future. 4. Manufacture cloud data center – The companies in Taiwan don't have the ability to manufacture cloud data center by their self. The data will be controlled by big companies in the world and they will drive straight in to domestic demand market. – The information industry will decline in Taiwan. Reference [13] Question (d) Explain its possible applications in various IT related areas and their possible vendors 991630 張毓珊 • Google App Engine • Amazon Web Services • Salesforce.com 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Case 1: Google App Engine • PaaS • Concept:Give me a nice API and take care of the implementation • “Google App Engine lets you run web applications on Google's infrastructure.” • App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data storage needs grow. Reference [14] Case 1: Google App Engine • Provide: – 500MB of storage – up to 5 million page views a month – 10 applications per developer account • Services : – URL Fetch & Mail “Applications can access resources on the Internet, such as web services or other data, and send email messages using App Engine's mail service.” – Memcache “a high-performance, distributed memory object caching system, primarily intended for fast access to cached results of datastore queries.” – Google accounts App Engine supports integrating an app with Google Accounts for user authentication. Reference [14] Case 1: Google App Engine • Limit: – Language: Python、Java “You can develop your application for the Java runtime environment using common Java web development tools and API standards or using the Python programming language, and run it on an optimized Python interpreter.” • Signature Features: – No assembly required – It's easy to scale – It's free to get started • Google offers the same reliability, availability and scalability at par with Google’s own applications Reference [14] Case 2: Amazon Web Services • IaaS • Concept:Paying for What You Use • “Amazon Web Services offers a complete set of infrastructure and application services that enable you to run virtually everything in the cloud” Reference [15] Case 2: Amazon Web Services • Replace upfront infrastructure investment with low monthly costs – “Building on-premises infrastructure can be slow and expensive. There is expensive hardware that needs to be ordered, paid for, installed and configured - and all of this needs to happen long before you actually need it. With Cloud Computing, you don’t have to spend time on these activities; instead you just pay for the resources you consume on a variable basis.” “We avoided significant costs including $800,000 in CapEx costs and $5,000 $8,000 per month in OpEx costs.” Reference [15] Case 2: Amazon Web Services • Elastic Compute Cloud (EC2) – “Web service that provides resizable compute capacity in the cloud.” – Rent computing resources by the hour – Additional costs for bandwidth • Simple Storage Service (S3) – “Highly-scalable, reliable, and low-latency data storage.” – Charge by the GB/month – Additional costs for bandwidth Reference [15] Case 2: Amazon EC2 • “Have the choice of multiple instance types, operating systems and software packages. “ – EC2 allows you to select a configuration of memory, CPU, instance storage, and the boot partition size that is optimal for your choice of operating system and application. For example, your choice of operating systems (instances) includes numerous Linux distributions, and Microsoft Windows Server. Reference [15] Case 2: Amazon EC2 • “Amazon EC2 reduces the time required, allowing you to quickly scale capacity, both up and down, as your computing requirements change. “ • Elastic:user can create, launch, and terminate server instances as needed, paying by the hour for active servers Reference [15] Case 3: Salesforce.com • SaaS • Concept:Just run it for me • “Salesforce.com is a global enterprise software company. The best known is it’s customer relationship management (CRM) product” • World’s Most Innovative Company in 2011 and 2012 Reference [17] Case 3: Salesforce.com • Charges: – $65 per month per user license • Signature Features: – Multitenancy “the fundamental technology that clouds use to share IT resources cost-efficiently and securely.” – 100% cloud computing – Mobility – Community Reference [18] Case 3: Salesforce.com • Upgrades: – releases three new upgrades each year based on customer feedback • Sustainability Reference [16] Case 3: Salesforce.com Why Salesforce CRM? Low cost - No longer need to install software or hardware Build application more fast - Only need to spend about half the cost of traditional software platforms, it can use 5 times faster speed construction applications than traditional software platforms. Reference [16] Case 3: Salesforce.com Why Salesforce CRM? Ability to support cross-border - Support for multiple languages, multiple time zones, multi-currency World-class security Mechanism - In Salesforce trust Web site to access completely open and transparent approach to security and system status. Reference [16] Question (d) Explain its possible applications in various IT related areas and their possible vendors 991639 楊琇婷 • PC-cillin Internet Security • Taiwan Mobile Cloud Data Center 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Case 4: PC-cillin Internet Security • Previous - Traditional Antivirus – Virus pattern files saved on the client Malware appears Malware discovered Pattern file available User downloads pattern file → delay time → security vulnerability Reference [20] Case 4: PC-cillin Internet Security • Nowadays - Cloud Antivirus – Virus pattern files saved on the cloud Reference [19] Case 4: PC-cillin Internet Security • Benefit Reduce the resource consumption of the client • Save memory usage • Shorten the scan time • Speed up the boot Immediate access to protection Reference [19] Case 5: Taiwan Mobile The Green Cloud Data Center Taiwan Mobile built the first high specification green cloud IDC in Neihu District, Taipei. It provide a secure and stable virtual computing environment. So that enterprises do not need to build their own data center or buy server appliance, they can install or deploy software or application projects online, rapid completion of system provisioning and migration. Reference [21][22] Case 5: Taiwan Mobile The Green Cloud Data Center • Service : Reference [23] Question (e) provide a cost and benefit evaluation for any of the cloud applications listed in (d) 991639 楊琇婷 • Taiwan Mobile Cloud Data Center 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Evaluation of costs and benefits (Take case 5 for example) • Cost – – – – Spend NT$5 billion building Purchase Network and hardware equipment Hire IT staff, engineers Maintenance, repair equipment • Benefit – Estimated 2014 production will reach NT$13.3 billion – More efficient allocation of resources – Promote enterprise development: enterprises can focus on the development of their industry – Reduce environmental pollution Reference [21][22] Comparison Between Cloud Computing and Traditional IT 991638 馬美莊 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Comparison of Traditional and Cloud CRM Reference [24] Comparison of traditional and cloud POS • What’s POS ? POS= Point of Sale One kind of information system used to record the retail industry sales information. Reference [25] From a structural comparison with the cost side Reference [25] Reference [25] Function from the service side comparison • Service object Customization v.s. Modular “Traditional POS required by different industries, the development of different system services, and provide customized services.” “Cloud POS only according to different industries, providing modular services, unable to provide customized services.” Reference [25] Function from the service side comparison • Copyright and Services Purchase v.s. Hire “Copyright traditional POS once purchased, update or require the purchase of different modules to be charged separately.” “Cloud POS Copyright hire, duration of the contract to pay, but also according to the actual needs of any additions required modules, and if it updates the system will automatically update at no extra cost.” Reference [25] Function from the service side comparison • Interface and import Highly functional v.s. Simplistic, humane “Traditional POS operator interface is designed for users to make change in demand, so the function is strong, but often need someone to help import.” “POS in the cloud-based online service, it seeks to simplify operation and humane. Also offer online video job description to help users successfully imported, and diversified data input.” Reference [25] Function from the service side comparison • Data reads and mobile applications One-dimensional bar code v.s. One-dimensional, two-dimensional bar code (can be used with mobile devices) “Identification of a traditional POS-dimensional bar codebased, does not work with mobile devices such as smart phones, iPad, iPod, tablet PCs and other mobile devices operate; need extra charge if required.” “Cloud POS can read 1D and 2D bar codes, and can be used with mobile devices” Reference [25] Function from the service side comparison • Data storage and management Responsible v.s. Trusteeship “ The user's responsibility to traditional POS data storage responsibility rests with the user data corruption or expand managed.” “POS data mining cloud cloud hosting system, a professional backup and security mechanisms, do not worry about data corruption or hacking and other issues.” Reference [25] Cloud Security 991603 李瑞哲 • Infrastructure Security • Data Storage Security 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Infrastructure Security: The Network Level • Ensuring Data Confidentiality and Integrity – Use of HTTPS (instead of HTTP) would have mitigated the integrity risk • Ensuring Proper Access Control – “Cloud providers do not sufficiently “age” IP addresses when they are no longer needed for one customer. Addresses are usually reassigned and reused by other customers as they become available.” Reference [26] Infrastructure Security: The Network Level • Ensuring the Availability of Internet-Facing Resources – BGP† prefix hijacking – The event of YouTube • Network-Level Mitigation – Reduce your confidentiality risks by using encryption Preventive controls “Network access control supplied by provider, encryption of data in transit “ Detective controls “Provider-managed aggregation of security event logs, network-based intrusion detection system, intrusion prevention system “ Reference [26] Infrastructure Security: The Application Level • DoS – “Application-level DoS attacks could manifest themselves as high-volume web page reloads, or protocol-specific requests supported by a cloud service” – DoS attacks on pay-as-you-go cloud applications will result in a dramatic increase in your cloud utility bill. This type of attack is also being characterized as economic denial of sustainability (EDoS). Reference [26] Infrastructure Security: The Application Level • SaaS Application Security – SaaS providers are largely responsible for securing the applications and components they offer to customers. Customers are usually responsible for operational security functions. Preventive “Identity management, access control assessment, controls browser hardened with latest patches” Detective controls “Login history and available reports from SaaS vendors” Reference [26] Infrastructure Security: The Application Level • PaaS Application Security – Since PaaS applications may use third-party applications, components, or web services, the third-party application provider may be responsible for securing their services Preventive controls “User authentication, account management, browser hardened with latest patches, endpoint security measures including antivirus and IPS” Detective controls “Application vulnerability scanning” Reference [26] Infrastructure Security: The Application Level • IaaS Application Security – Customers of IaaS clouds are responsible for all aspects of their application security and should take the steps necessary to protect their application Preventive controls “Least-privileged configuration, timely patching of application, user authentication, access control, account management, browser hardened with latest patches, antivirus, host firewall” Detective controls “Logging, event correlation, application vulnerability scanning and monitoring” Reference [26] Data Security and Storage:Storage • Confidentiality – Individuals or groups of data can't be obtained by outsiders – Asymmetric encryption Reference [28] Data Security and Storage:Storage • Integrity – “Refers to the transmission, storage, information or data in the process, to ensure that the information or data from unauthorized tampering or tampered can be quickly found” – Message Authentication codes (MACs) • Adding Cipher Block Chaining (CBC) • Adding One-Way Hash Reference [27] Data Security and Storage:Storage • Availability – “That can be accessed at any time and obtain information” – “A number of high-profile cloud provider outages have occurred” – “Prospective cloud storage customers must be certain to ascertain just what services their provider is actually offering” Reference [26] Cloud Security 991602 譚學勇 • Identity and Access Management (IAM) • Privacy Concerns 000101101010111101011010101110000101010010101110010010010000100001110101101010010 Identity and Access Management (IAM) • Why IAM? – Improve operational efficiency – Regulatory compliance management • IAM Challenges – Users whose roles often change for business reasons – Access policies for information are seldom centrally and consistently applied Reference [26] IAM Definitions • Authentication – “Authentication is the process of verifying the identity of a user or system.” • Authorization – “Authorization is the process of determining the privileges the user or system is entitled to once the identity is established.” • Auditing – “Auditing entails the process of review and examination of authentication, authorization records, and activities to determine the adequacy of IAM system controls, to verify compliance with established security policies and procedures, to detect breaches in security services, and to recommend any changes that are indicated for countermeasures.” Reference [26] What are the key privacy concerns in the cloud? • Access – Data subjects have a right to know what personal information is held and can make a request to stop processing it. • Compliance – Data may be stored in multiple countries. What is the relevant jurisdiction that governs an entity’s data in the cloud and how is it determined? • Storage – Privacy laws in various countries place limitations on transfer some types of personal information to other countries. – When the data is stored in the cloud, such a transfer may occur without the knowledge of the organization, resulting in a potential violation of the local law. ” Reference [26] What are the key privacy concerns in the cloud? • Retention – How long is personal information retained? Which retention policy governs the data? • Destruction – Did the CSP really destroy the data, or just make it inaccessible to the organization? • Audit and monitoring – How can organizations monitor their CSP that privacy requirements are met? • Privacy breaches – How do you know that a breach has occurred, how do you ensure that the CSP notifies you when a breach occurs, and who is responsible for managing the breach notification process? Reference [26] Changes to Privacy Risk Management and Compliance in Relation to Cloud Computing • Collection Limitation Principle – “collection of personal data should be limited to the minimum amount of data required for the purpose for which it is collected.” • Use Limitation Principle – “personal data should not be disclosed, made available, or otherwise used for purposes other than those with the consent of the data subject, or by the authority of law.” • Security Principle – “Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification, or disclosure of data.” Reference [26] Changes to Privacy Risk Management and Compliance in Relation to Cloud Computing • Retention and Destruction Principle – “personal data should not be retained for longer than needed to perform the task for which it was collected, or as required by laws or regulations.” – “Data should be destroyed in a secure way at the end of the retention period.” • Transfer Principle – “data should not be transferred to countries that don’t provide the same level of privacy protection as the organization that collected the information.” • Accountability Principle – “an organization is responsible for personal information under its control and should designate an individual or individuals who are accountable for the organization’s compliance with the remaining principles.” Reference [26] Reference 1-1 http://www.cc.ntu.edu.tw/chinese/epaper/0008/20090320_8008.h tm 1-2 http://www.google.com/search?q=%E9%9B%B2%E7%AB%AF%E4%B8 %89%E5%B1%A4&source=lnms&tbm=isch&sa=X&ei=lX_B UcP2HcfkkgXNuYCwBA&ved=0CAkQ_AUoAQ&biw=1304&bih=707#fa crc=_&imgrc=mwU-nrNGUvJFLM%3A%3BKNE_x-RxkVhgM%3Bhttp%253A%252F%252Figt.dxhs.tyc.edu.tw%252Fsystem% 252Fuploads%252F599d2b62d98d865ba23064006f0fdc7c4267debe. png%3Bhttp%253A%252F%252Figt.dxhs.tyc.edu.tw%252Fsections%2 52F553%252Fpages%252F1405%253Flocale%253Dzh_tw%3B300%3B 272 1-3 http://tw.myblog.yahoo.com/johand920/article?mid=61&next=60&l= f&fid=1 Reference 2-1 http://www.google.com/search?biw=1304&bih=707&tbm=isch& sa=1&q=cloud+history&oq=cloud++his&gs_l=img.1.1.0i19l2j0i5i1 9.61914.69543.0.71581.19.14.4.1.1.0.181.1605.1j11.12.0...0.0...1 c.1.17.img.LcbGcHMlLtU#facrc=_&imgrc=Fi33FXix1LRMPM%3A% 3B4Qp9t1JEuPp3AM%3Bhttp%253A%252F%252Fei.marketwatch .com%252FMultimedia%252F2011%252F04%252F26%252FPhot os%252FCody%252520charts%252Fcloud-computinggrowth.jpg%3Bhttp%253A%252F%252Fblogs.marketwatch.com% 252Fcody%252F2011%252F04%252F30%252Fbest-stocks-forthe-cloud-revolution%252F%3B470%3B516 2-2 http://tnrc.ncku.edu.tw/100report/class/100.09.02-1.pdf 2-3 http://sls.weco.net/blog/bryan0314/14-jan-2009/12497 Reference 3. The NIST definitions of deployment models of cloud computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800145.pdf 4-1. The diagrams of deployment models http://www.cloudopenlab.org.tw/ccipo_industryDefinition.do 4-2. The figure of deployment models of cloud computing, http://www.ubiry.com/en/services/cloud-consulting/ 5-1. The characteristic of deployment models, http://tmue.edu.tw/~cyang/class/Intro_CS_M/Intro_Cloud.pdf 5-2. The pros and cons of Community Cloud, dcia.info/activities/ccw2012/11-8%20Greenberg.ppt 5-3. The pros and cons of Hybrid Cloud, https://exploreb2b.com/articles/pros-and-cons-of-hybrid-cloud Reference 6. 雲端服務架構_IAAS/PAAS/SAAS http://eblog.cisanet.org.tw/80366493/article/content.aspx?Artic leID=996 7. 國家科學委員會-雲端計算 http://web1.nsc.gov.tw/ct.aspx?xItem=14873&ctNode=40 8. 財經知識庫-雲端運算 http://www.moneydj.com/kmdj/wiki/wikiviewer.aspx?keyid=b2a 16b54-77ee-4a1d-8feb-a3d0366e55c8 9. 網管人-認識雲端運算架構與框架 http://www.netadmin.com.tw/article_content.aspx?sn=1201310 001 10. http://www.aceredc.com/eDC/download/cloud_trend.pdf Reference 11. http://investtaiwan.nat.gov.tw/doc/20100820_2.pdf 12. http://www.ey.gov.tw/policy8/cp.aspx?n=5187513675EB4E69 13.http://newsletter.ascc.sinica.edu.tw/news/read_news.php?nid =2385 14. Google developers https://developers.google.com/appengine/docs/whatisgoogle appengine 15. Amazon http://aws.amazon.com/ Reference 16. Salesforce http://www.salesforce.com/ 17. MBA智庫百科 http://wiki.mbalib.com/zhtw/Salesforce.com%E5%85%AC%E5%8F%B8 18 . 天新資訊 http://fiti.force.com/web/page?pageid=a0n20000000zB8SAAU 19. Trend Micro Taiwan─Smart Protection Network介紹影片 http://www.trendmicro.com.tw/spn/movie/index.asp 20. 雲端運算智庫─「如果雲知道」 雲端安全防護技術 http://www.runpc.com.tw/content/cloud_content.aspx?id=103 984 Reference 21. U-3C.com─「台哥大跨足雲端市場 50億元興建綠色機房」 http://computer.u-3c.com/article1404.htm 22. 台灣大哥大─新聞中心 http://corp.taiwanmobile.com/pressrelease/news/press_20120509_558828.html 23. 谷元宏─全方位的雲端服務 http://www.digitimes.com.tw/tw/B2B/Seminar/Service/do wnload/053A109240/053A109240_YFOMH35XTLKLCFGSC5I H.pdf 24. http://sficloud.blogspot.tw/2010/02/crm.html 25. http://www.gs1tw.org/twct/gs1w/pubfile/2012_sUMMER_ P17- 33.pdf Reference 26. Tim Mather & Subra Kumaraswamy & Shahed Latif. Cloud Security and Privacy. O'Reilly Media. 27. Wiki百科 http://zh.wikipedia.org/wiki/%E5%AE%8C%E6%95%B4%E6 %80%A7 28. https://www.google.com.tw/search?hl=zhTW&site=imghp&tbm=isch&source=hp&biw=1366&bih=66 7&q=%E9%9D%9E%E5%B0%8D%E7%A8%B1%E7%B7%A8% E7%A2%BC&oq=%E9%9D%9E%E5%B0%8D%E7%A8%B1%E7 %B7%A8%E7%A2%BC&gs_l=img.3...1114.3143.0.3401.18.1 1.0.6.0.0.108.565.10j1.11.0...0.0.0..1ac.1j4.17.img.dOTMBQ T9whE#facrc=_&imgrc=ZZ7sVKwr4F_EvM%3A%3BuOMY40_Xx1zOM%3Bhttp%253A%252F%252Fwww.asiapeak.com %252Fimg%252Fasymmetric.JPG%3Bhttp%253A%252F%25 2Fwww.asiapeak.com%252FPGPTheory.php%3B655%3B330