SlideShare a Scribd company logo
Cloud Computing




                  By
                  Pallavi Khandekar &
                  Jacob Bennett
Cloud Service Models

• Software as a Service (SaaS)
   – It is a software product that is provided to you when you logon to the
     cloud

   – These services are meant to be accessible to everyone with a
     computer and an internet provider – Unless you have dialup.

   – It is used for creating, storing, accessing, and manipulating your files
     from any internet connection.

   – Some examples are: Boise State Gmail, Google Docs, or any other
     application you access exclusively through the internet.
Cloud Service Models

• Infrastructure as a Service (IaaS)

   – It is a computer/s that exist on the cloud.

   – It is used for adding virtual machines to a network or for the
     capacity to expand and contract dynamically as you need it.

   – As a user, my computer becomes nothing but the means to
     access another more powerful computer.
      • Do NOT need corporate software installed on the company
        PC!
      • Do NOT need a specific operating system!
Cloud Service Models

• Platform as a Service (PaaS)

   – Like IaaS, PaaS is geared towards providing a platform on which a
     developer may develop, publish, and maintain their source code.

   – It can be defined as an IaaS that will connect to a PC instead of the
     other way around.

   – Think, email that is pushed to your phone and not pulled.
Cloud Service Models
Current Concerns and Challenges

•   Security
•   Dependency
•   Legal Issues
•   Decreased flexibility
Security
    Security of Cloud Computing refers to policies, technologies and controls deployed
    to protect data, application and the associated infrastructure.




                                    Security and Privacy




Security Issues faced by Cloud providers           Security Issues faced by Cloud customers

•          Data Loss / Data theft                  •        Data/ Service Access
•          System Boundaries                       •        Data confidentiality
Traditional System   Cloud Architecture
   architecture



       App                 App


     Server               Server
                       virtualization
      port




    Network             Network
Mobility
 App              App                            App



Server         Server 1                        Server 2
              virtualization                 virtualization
 port




Network        Network                         Network



                               Do they share same
                                 policy/security
                                      layer?
Are they
                                     interacting?
           Co-existence

App 1      App 2          App 1       App 2



Server 1   Server 2            Server 1
                             virtualization
 port       port




Network    Network            Network
Multiple Level Security
Datacenter facility security       Operating systems and application level
•    Physical controls             •   Directory Federation (SAML)
•    Access controls               •   Access control and monitoring
•    Video surveillance            •   Anti malware and anti-Spam
•    Background checks             •   Patch and configuration management
                                   •   Secure engineering.



Network Level                      Data Level
•       Edge routers               •        Access control lists
•       Multiple-layer firewalls   •        User level access and authorization.
•       Intrusion detection        •        Field and data integrity.
•       Vulnerability scanning
•       Encryption
Dependency (loss of control)
•   No or little insight in CSP contingency procedures. Especially backup, restore and
    disaster recovery.

•   No easy migration to an other CSP.

•   Measurement of resource usage and end user activities lies in the hands of the
    CSP

•   Tied to the financial health of another Company.

•   Quality problems with CSP(Cloud Service Providers).

•   No influence on maintenance levels and fix frequency when using cloud services
    from a CSP
Legal and Contractual issues around
                  Cloud Computing
Few important legal issues that must be taken care before signing up with the CSP:

1.   Physical Location of data:
     •   Customer should know actual physical location of their data.
     •   In case of dispute arises between vendor and customer which country’s court
         system will settle the conflict? (e.g. customer is in China and vendor is in US.)
2.   Responsibility of your data:
     •   What if data center is hit by a disaster?
     •   Is there any liability coverage for breach of data?
     •   What can be done if data center gets hacked?
3.   Intellectual Property Rights:
     •   Is your data protected under the intellectual property rights?
     •   Third party access
QUESTIONS ???

More Related Content

PPTX
Security As A Service In Cloud(SECaaS)
PDF
Security OF The Cloud
PPTX
Cloud computing
PPTX
Virtualization security for the cloud computing technology
PDF
Spo1 w25 spo1-w25
PPTX
Venom vulnerability Overview and a basic demo
PPTX
Chap 5 software as a service (saass)
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
Security As A Service In Cloud(SECaaS)
Security OF The Cloud
Cloud computing
Virtualization security for the cloud computing technology
Spo1 w25 spo1-w25
Venom vulnerability Overview and a basic demo
Chap 5 software as a service (saass)
Cloud Security: What you need to know about IBM SmartCloud Security

What's hot (18)

PPTX
Webinar compiled powerpoint
PPTX
Intermedia Overview
PPTX
Cloud security what to expect (introduction to cloud security)
PPTX
Cloud Security
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
PPTX
Rik Ferguson
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PPTX
Cloud computing
PPT
Security & Privacy In Cloud Computing
PPTX
Simplifying SDN Networking Across Private and Public Clouds
PPTX
SaaS Challenges & Security Concerns
PPT
Zimbra collaboration suite
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
Cloud Security Standards: What to Expect and What to Negotiate V2.0
PPT
Cloud Security
PDF
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
PPTX
20N2012- Is there any danger or risk in Green?
PPTX
gkkCloudtechnologyassociate(cta)day 1
Webinar compiled powerpoint
Intermedia Overview
Cloud security what to expect (introduction to cloud security)
Cloud Security
Security and Compliance for Enterprise Cloud Infrastructure
Rik Ferguson
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud computing
Security & Privacy In Cloud Computing
Simplifying SDN Networking Across Private and Public Clouds
SaaS Challenges & Security Concerns
Zimbra collaboration suite
CyberCrime in the Cloud and How to defend Yourself
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
20N2012- Is there any danger or risk in Green?
gkkCloudtechnologyassociate(cta)day 1
Ad

Similar to Bright and Gray areas of Clound Computing (20)

PDF
Cloud Security - Made simple
PDF
Resarch paper i cloud computing
PPTX
Cloud computing
PPTX
What is cloud computing
PPTX
Cloud computing security
PPTX
The Move to the Cloud for Regulated Industries
PDF
null Bangalore meet - Cloud Computing and Security
PDF
MISA Cloud workshop - Cloud 101
PPT
Issues in cloud computing
PDF
IBM Point of View: Security and Cloud Computing
PDF
IBM Point of view -- Security and Cloud Computing (Tivoli)
PPT
Cloud Computing Webinar
PDF
Paper id 27201433
PPT
Chris millercloud
PPTX
Introduction to cloud computing
PPTX
Presentation on cloud computing
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PPTX
Security in the cloud Workshop HSTC 2014
PDF
Cloud security cam ready
PPTX
Cloud computing by Luqman
Cloud Security - Made simple
Resarch paper i cloud computing
Cloud computing
What is cloud computing
Cloud computing security
The Move to the Cloud for Regulated Industries
null Bangalore meet - Cloud Computing and Security
MISA Cloud workshop - Cloud 101
Issues in cloud computing
IBM Point of View: Security and Cloud Computing
IBM Point of view -- Security and Cloud Computing (Tivoli)
Cloud Computing Webinar
Paper id 27201433
Chris millercloud
Introduction to cloud computing
Presentation on cloud computing
Cloudcomputingoct2009 100301142544-phpapp02
Security in the cloud Workshop HSTC 2014
Cloud security cam ready
Cloud computing by Luqman
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf

Bright and Gray areas of Clound Computing

  • 1. Cloud Computing By Pallavi Khandekar & Jacob Bennett
  • 2. Cloud Service Models • Software as a Service (SaaS) – It is a software product that is provided to you when you logon to the cloud – These services are meant to be accessible to everyone with a computer and an internet provider – Unless you have dialup. – It is used for creating, storing, accessing, and manipulating your files from any internet connection. – Some examples are: Boise State Gmail, Google Docs, or any other application you access exclusively through the internet.
  • 3. Cloud Service Models • Infrastructure as a Service (IaaS) – It is a computer/s that exist on the cloud. – It is used for adding virtual machines to a network or for the capacity to expand and contract dynamically as you need it. – As a user, my computer becomes nothing but the means to access another more powerful computer. • Do NOT need corporate software installed on the company PC! • Do NOT need a specific operating system!
  • 4. Cloud Service Models • Platform as a Service (PaaS) – Like IaaS, PaaS is geared towards providing a platform on which a developer may develop, publish, and maintain their source code. – It can be defined as an IaaS that will connect to a PC instead of the other way around. – Think, email that is pushed to your phone and not pulled.
  • 6. Current Concerns and Challenges • Security • Dependency • Legal Issues • Decreased flexibility
  • 7. Security Security of Cloud Computing refers to policies, technologies and controls deployed to protect data, application and the associated infrastructure. Security and Privacy Security Issues faced by Cloud providers Security Issues faced by Cloud customers • Data Loss / Data theft • Data/ Service Access • System Boundaries • Data confidentiality
  • 8. Traditional System Cloud Architecture architecture App App Server Server virtualization port Network Network
  • 9. Mobility App App App Server Server 1 Server 2 virtualization virtualization port Network Network Network Do they share same policy/security layer?
  • 10. Are they interacting? Co-existence App 1 App 2 App 1 App 2 Server 1 Server 2 Server 1 virtualization port port Network Network Network
  • 11. Multiple Level Security Datacenter facility security Operating systems and application level • Physical controls • Directory Federation (SAML) • Access controls • Access control and monitoring • Video surveillance • Anti malware and anti-Spam • Background checks • Patch and configuration management • Secure engineering. Network Level Data Level • Edge routers • Access control lists • Multiple-layer firewalls • User level access and authorization. • Intrusion detection • Field and data integrity. • Vulnerability scanning • Encryption
  • 12. Dependency (loss of control) • No or little insight in CSP contingency procedures. Especially backup, restore and disaster recovery. • No easy migration to an other CSP. • Measurement of resource usage and end user activities lies in the hands of the CSP • Tied to the financial health of another Company. • Quality problems with CSP(Cloud Service Providers). • No influence on maintenance levels and fix frequency when using cloud services from a CSP
  • 13. Legal and Contractual issues around Cloud Computing Few important legal issues that must be taken care before signing up with the CSP: 1. Physical Location of data: • Customer should know actual physical location of their data. • In case of dispute arises between vendor and customer which country’s court system will settle the conflict? (e.g. customer is in China and vendor is in US.) 2. Responsibility of your data: • What if data center is hit by a disaster? • Is there any liability coverage for breach of data? • What can be done if data center gets hacked? 3. Intellectual Property Rights: • Is your data protected under the intellectual property rights? • Third party access

Editor's Notes

  • #8: DataLoss / Data theftData may get lost because of facts like equipments/software failures or stolen by hackers because of shared resource nature of Cloud. The providers must make efforts to overcome such problems as they may loose trust of their clientsSystem BoundariesDue to virtual nature of cloud, there is no specific system boundary. Resources are shared across clouds and so any data transferred should be properly encrypted using proper encryption algorithms and SSL-encrypted communication based on sensitivity of dataData ConfidentialityDue to virtual nature of cloud, one cannot be sure where the data or/and application are physically located and what is the protective mechanism in that place. The existence of a “super user” in the enterprise providing cloud computing services to carry out the management and maintenance of data, is a serious threat to user privacy.Data AccessPredictable access to their data and application at all times and conditions.Failure management and recovery
  • #9: The traditional architecture has a server connected to a network on which application resides.So you have only a single access point for the network into the server. In contrast the cloud environment resides on a virtualization framework. So the network now goes into theVirtualization layer. Thus you have more than one access points and environment to manage. This includes managing network switching policies, firewall policies and access policies.
  • #10: 1. In a traditional system architecture we have an appln running on one particular server2. Now in a cloud there are multiple servers and the application migrates from one server to another for load balancing, failure recovery etc.3. This migration is not guaranteed to be in the same data center/server farm .4. There is always a question if the new location shares the same security policies on each of the layers is not exposed to any specific vulnerability.
  • #11: 1. In a typical system, the user had the control to separate applications completely and make them run separately on servers .2. Thus a nice isolation layer can be created between them using firewall or any other hardware features.3. In a cloud, we may have multiple applications running on same server. 4. We cannot guarantee if the two applications may interact. For all we know one app may be snooping traffic /data of another application?Hence It’s a challenge to maintain the isolation between the applications and scale it on multiple physical servers with mobility
  • #12: To handle the above security challenges following levels of security should be applied.
  • #13: In Cloud architecture data is stored at the CSP’s side. So we have mentioned Dependencies:No or little knowledge of the way the backup or restore of data is done.No easy migrations to an other CSP.In cloud architecture you only pay for what you use. So measurement of resource usage lies in hands of the CSP.Tied to the financial health of CSP.Quality problems with CSP. (e.g. CSP might use cheap disk drives etc)No influence on data maintenance.
  • #14: Customer should know the physical location of their data so as to be clear of the provisions of prevailing law in particular nation.Same as screenWill the Insurance company compensate for loss of your business?Same as screenThough all the CSP’s try their best to provide data security, no security is assumed to be full proof. So if data centre is hacked can you move against vendor/CSP.What means do you have if data gets infringed.The customer must always be notified when vendors provide third party access to customers stored data, whether it is a legal authority or internal employee.