You are on page 1of 16

Database in Cloud Application

Ajith Pravin Dhas


MTS 3, VMware

genda
Introduction
DBMS
Cloud Computing
Cloud DBMS
Cloud DBMS Architecture
Evolution of traditional DBMS to CDBMS
Traditional vs Cloud DBMS
Industry Practices
Challenges to Cloud DBMS
Security in Cloud DBMS
Pros and Cons

ntroduction

BMS
What is DBMS?
DBMS Components
DBMS Characteristics

Self Describing

Multiple views

Data Sharing

Data independence

Security

Rollback and Recovery

DBMS Applications

loud Computing
What is Cloud Computing?
Service Models

Saas

Paas

Iaas

Characteristics

On Demand

Resource Pooling

Distributed

Elasticity

loud DBMS
What is CDBMS?
Methods to run CDBMS

Virtual Machines

DBaaS

Need for CDBMS


Types of CDBMS

SQL-Based

NoSQL

Choosing best CDBMS


Characteristics of CDBMS

Failover

Scalability

Node Splitting

Data Growth

DBMS Architecture
5 Layered Architecture

External Layer

Conceptual Middleware Layer

Conceptual Layer

Physical Middleware Layer

Physical Layer

Shared Nothing Scaleout Architecture


Large Mutitenant Databases
Architecture Considerations

Tier Location

Document Oriented vs Relational Databases

Managed vs Unmanaged Relational Databases

valuation of DBMS
Flat and Hierarchical DB
Relational DB
Object Oriented DB
Columnar DB
Big Data
NoSQL

raditional vs Cloud DBMS


Lower upfront cost
Lower Operating cost
Rapid Implementation
Scalability
Focus on Core Competencies
Access to advanced technology
Rapid updates & Upgrades
Improved accessibility, mobility and usability
Improved availability and disaster recovery

ndustry Practices
Amazon Simple Storage Service and Databases
Amazon SimpleDB
Google Apps Big table
MapReduce
Hadoop
Windows Azure Cloud Storage
Microsoft SQL Server Data Services
Dynamo
MegaStore
CouchDB
MongoDB

hallenges
Network Speed
Database Scalability in the Cloud
Database Elasticity in the Cloud
DBaaS Availability
Database Autonomy and multi-tenancy
DBaas privacy
Security

ecurity in CDBMS
Side Channel Infiltration
Data leakage
Attack platform / threat amplification
DDoS attacks
Complexity
Data Sanitization
Auditing and Monitoring issues
Access Control issues
Availability

ecurity in CDBMS
Data Integrity
Data Confidentiality

Homomorphic Encryption

Encrypted search and Database

Distributive Storage

Hybrid Technique

Data concealment

Deletion Confirmation

Data Privacy

Service Abuse

Averting Attacks

Identity Management

ros & Cons


Advantages

Easy access

Lowers cost

Runtime scalability and Availability

Rollback and easy recovery

Disadvantages

No full control

Rely on service provider

Internet speed must be high

Switching between service providers

Huge loss when service unavailable

You might also like