Broad network access:
Availability of capabilities over the network with accessibility through standard mechanisms that promotes usage by the consumer through different platforms (e.g. phones, laptops and PCs).
Over the past decade, Cloud Computing has become a critical alternative of IT resources for organizations Worldwide. The world is witnessing an increase in infrastructure services and software that mainly support cloud services. Cloud computing services offer you several advantages in addition to security and protection, mainly Disaster Recovery (DR). Storing of data in the cloud makes it always available without any impact on any factors affecting your existing devices such as PCs, mobile phone and servers as power outages or natural disasters do not affect your important data. Cloud computing services also provide very high levels of accessibility and DR capability as long as there is a reliable connection. Furthermore, cloud computing provides you with speedy access to your data or applications from any place and at any time with high flexibility in determining and allocating access levels as per accounts, which enhances efficiency and productivity.
Cloud Computing is a model that provides easy and on-demand network access to a shared set of configurable computing resources such as networks, servers, storage, applications and software services that can be made available and launched rapidly with minimal management effort or human interaction with the service provider. Cloud Computing consists of five main characteristics, three service models, and four deployment models.
Cloud computing leverages several elements including scale, virtualization, resilience, cost efficiency, service orientation, agility, etc. These elements are combined under National Institute of Standards and Technology (NIST) definition into five key characteristics:
Broad network access:
Availability of capabilities over the network with accessibility through standard mechanisms that promotes usage by the consumer through different platforms (e.g. phones, laptops and PCs).
Measured service
Automatic controlled and optimized resources are used by leveraging a metering capability at some level of abstraction, appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
On-demand self-service:
Unilateral provisioning of computing capabilities, such as server time and network storage, provisioned by the end-user, without human interaction with each service provider.
Rapid elasticity
Rapid and elastic provision of capabilities to quickly scale resources up and down – this is done in some cases automatically. To the consumer, capabilities available for provisioning are often (almost) unlimited and can be purchased in any quantity at any time
Resource pooling
Pooled computing resources to serve multiple consumers using a multi-tenant model, with different physical and virtual resources assigned and re-assigned based on demand. There is a degree of location independence, the customer may be able to specify location at a higher level of abstraction (e.g. country, state, or datacenter) but not the exact location of the provided resources. Examples of resources include storage, processing, memory, network bandwidth and virtual machines.
Cloud computing, in its core, offers three different service models, which provide applications, platforms and infrastructure as a service. These service models (illustrated in Figure 1) provide some or all the IT support necessary to deploy an IT solution.
The capability provided to the consumer is to provision processing, storage, networks and other fundamental computing resources. It’s up to the consumer to decide what software is deployed and operated, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control on selection of networking components (e.g. firewalls). Examples may include, but are not limited to:
The capability provided to the consumer is to deploy onto the cloud infrastructure of the CSP consumer-created or acquired applications, these applications are created using programming languages and tools supported by the CSP. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Examples may include, but are not limited to:
The capability provided to the consumer is to use the Cloud Service Provider’s (CSP's) applications running on a cloud platform and infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g. web-based email). The consumer does not manage or control the underlying cloud platform and infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Examples may include, but are not limited to:
The Kingdom is one of the first countries to adopt specific regulations and regulatory frameworks for cloud computing service providers, which aim to encourage the public and private sectors to adopt cloud computing services instead of traditional IT solutions. CST’s role is to regulate the telecommunications and information technology sector in the Kingdom by implementing the approved policies, regulations, and programs for developing information technology and emerging technologies, laying down appropriate procedures, proposing and amending regulations related to information technology and emerging technologies and getting the same approved by the competent authorities, in addition to enabling and ensuring a fair competitive environment in the market and issuing necessary licenses in accordance with the relevant terms and regulations. CST seeks to provide the appropriate environment to attract local and international investors, localize cloud computing services, stimulate reliance on CSTsolutions and technologies in the Kingdom in order to raise the level of performance, productivity, flexibility and quality of services for all beneficiaries in the Kingdom.