Cloud ready Applications

Building Cloud Ready Applications

Every customer today demands that the application to be build should be Cloud Ready and with no or minimum changes they can run on Cloud. Building an application to run on the cloud is becoming a common task. The prerequisites step is that the application is first built as “Service enabled”.

~ Written By Ashok Bhandari

Every customer today demands that the application to be build should be Cloud Ready and with no or minimum changes they can run on Cloud. Building an application to run on the cloud is becoming a common task. The prerequisites step is that the application is first built as “Service enabled”.

Service Enabled

The application’s functionality needs to be exposed to the outside world through services[1], i.e. not requiring knowledge of the application’s inner workings, not resulting in side effects, and using an interface that will change very little over time. The same holds true within the applications when exposing (sub) components to each other. Service design is the way to build applications.

Following are the important Design Principles, Standards and Best Practices for Service-Enabled applications eventually to build Cloud Ready Application.


Asynchronous / Parallel Programming

Parallel programming in which a unit of work runs separately from the main application thread and notifies the calling thread of its completion, failure or progress. Task-based Asynchronous – Which uses a single method to represent the initiation and completion of an asynchronous operation.


All applications and services are self-contained and “loosely coupled”. Services maintain a relationship that minimizes dependencies and only requires that they maintain an awareness of each other.

Standardized I/O – All data provided to or by the (subcomponents of the) applications are transferred through standardized interfaces, both in structure and technology. These interfaces should be designed in such a way that:

  • they will change very little over time
  • they are backwards compatible whenever possible

The content/structure of these interfaces should be based on the information needs and required results of the application/component, and not on the data structures of data sources and/or targets. Best Practices – Dependency Injection pattern to achieve loose couple classes from their dependencies. Example – Microsoft Unity is one of the most popular tools to implement Dependency Injection (DI). Unity is a lightweight, extensible dependency injection container and it facilitates building loosely coupled applications.

Microsoft’s patterns and practices suggest Dependency Injection with Unity.

When selecting a Dependency Injection container it is worth considering a number of factors such as:

  • Ease of use
  • Configurability
  • Performance
  • NuGet Support etc.

Basic Comparison with some IoC Containers are available here.

Asynchronous Messaging – Messaging supports asynchronous operations, enabling to decouple a process that consumes a service from the process that implements the service to build scalable and resilient solutions.


Design scalable services by separating them from their state data whenever possible. Stateless – Avoid session state and if states are required then moved to external component i.e. Cache.


Ability of a service to produce the same outcome after calling it multiple times. Idempotent – An operation is idempotent in case it has no additional effects if it is called more than once with the same parameters.

Secure Data

Applications are based on secure lifecycle standards and include built-in security. Secure Data in Transit – Secure network protocols, such as SSL and HTTPS, must be used to prevent network traffic snooping or man-in-the-middle attacks. Secure Service / API – Authentication and Authorization mechanism ensues that applications and services are only accessible to the clients that should have access to them. Secure Data at Rest – Data at rest are encrypted.

No indeterminate states

A method or service must always behave in a predictable way, regardless of the context in which, or the parameters with which, it is called. Note that this “predictable way” maybe an error return (with a meaningful error code or message). Once the application is Service Enabled it will further be extended to be built as Cloud Ready.

Cloud Ready

The application need to be designed and written in such a way that they can be deployed in a cloud environment.

Following are the Cloud Service Models. ashok-2

For building a Cloud Ready application the focus will on Platform as a Service (PaaS).

Following are the Steps to achieve Cloud Ready Applications:


Let’s first understand in summery the characteristics of Cloud.

Cloud Characteristics


  1. On-Demand, self-service model – Cloud offers services On-Demand using self-service model. The management console or API’s exposed be the cloud provider enables to use cloud services as need arises. This offers convenience and flexibility to the consumers.
  2. Broad Network Access – The cloud services are available across common networks. In this way consumers benefit because they can use the services with the broad range of computing platform and devices.
  3. Dynamic Shared and Virtual Infrastructure – Cloud service providers have a business model incentive to leverage their infrastructure across as many consumers as possible. Providers offering shared hardware and shared OS multitenancy use server virtualization technology to create their shared infrastructure.
  4. Scale Rapidly and Elastically – From a consumer point of view, a cloud provider’s ability to quickly provision and de-provision IT services creates an elastic, scalable IT resource. Consumers pay for only the IT services they use.
  5. Meter Consumption – Providers meter the resources (for example, compute, storage and network) that cloud applications consume. Metering enables multiple pricing or chargeback models. These may include pay-as-you go plans, subscriptions, fixed plans and even free plans.

REALIZATION – Cloud Design Principles realized by Patterns

Following are the Design Principles, Standards and Best Practices for Cloud applications.


Failure-aware (Resilient to failure)

Applications are resilient to occasional or extended failures of underlying infrastructure components or dependent services.

Data Replication – Replication refers to creating a redundant set of data so that, if one set of instances fails, another copy of data is available for other instances to work with. Mirroring critical data to another data centre managed by your cloud service provider provides a higher level of resilience and availability.

Circuit Breaker – Handle faults that may take a variable amount of time to rectify when connecting to a remote service or resource.

Retry – Enable an application to handle temporary failures when connecting to a service or network resource by transparently retrying the operation in the expectation that the failure is transient.

Latency-aware (Resilient to latency)

Applications remain operational despite variable and extended latency for services accessed across public networks and between cloud provider data centres.

Cache-aside – Load data on demand into a cache from a data store. This pattern can improve performance and also helps to maintain consistency between data held in the cache and the data in the underlying data store.

Static Content Hosting – Deploy static content to a cloud-based storage service that can deliver these directly to the client. This pattern can reduce the requirement for potentially expensive compute instances.

Example – Using a content delivery network (CDN) to serve static files (for example, images, video, JavaScript, CSS and other media) or streaming media can reduce latency by caching it in multiple locations, ideally in the same geographic region as each user group.

Secure Data

All data provided to, provided by and stored by the application (also as intermediate results) need to be fenced off and encrypted and/or anonymized. The application protects the information and systems, guarding against data loss or SLA violations caused by malicious or accidental events.

Secure Data at Rest – Cloud providers offer encrypted storage services that protect stored data from third-party access. In addition attention is required for protecting personally identifiable information (PII).

Federated Identity / Tokenization – Delegate authentication to an external identity provider. This pattern can simplify development, minimize the requirement for user administration, and improve the user experience of the application.

Role-Based Access Controls (RBAC) – Implementing a secure application requires role-based access controls (RBAC) to ensure that only authenticated and authorized users access application resources and that access is deliberately assigned according to their role.

To read the original blog please visit:

Ashok Bhandari
Ashok Bhandari

Recent articles

todo todo
contact us
  • Sogeti UK
    Sogeti UK
    Make an enquiry
    0330 588 8200