SlideShare a Scribd company logo
Institute of Engineering Technology
Cloud computing
"What's the cloud?"
"Where is the cloud?"
"Are we in the cloud now?!"
Cloud computing
"What's the cloud?"
"Where is the cloud?"
"Are we in the cloud now?!"
Storing and Accessing
Data and Programs over
the Internet instead of
your computer's Hard
Drive.
Cloud computing
Salesforce.com
Appistry
Appscale
AT&T
Engine Yard
Enomaly
Go Grid
Google
Microsoft
G cloud 3
Amazon EC2
Gizmox
Storage Devices
 Block Storage Devices
Offer raw storage to the clients.
This raw storage can be partitioned to create volumes.
 File Storage Devices
Offer storage to clients in form of files, maintaining it’s own
file system.
This storage is in the form of Network Attached Storage
(NAS)
Lower Cost
Easier to Manage
Scalability
Business Contingency
Flexibility
On-Demand-Computing
The Cloud Computing architecture comprises
of many cloud components, each of them are
loosely coupled. We can broadly divide the
cloud architecture into two parts:
Front End refers to the client part of cloud
computing system. It consists of interfaces and
applications that are required to access the cloud
computing platforms, e.g., Web Browser.
Back End refers to the cloud itself. It consists of all
the resources required to provide cloud computing
services. It comprises of huge data storage, virtual
machines, security mechanism, services,
deployment models, servers, etc.
Cloud computing
Development
Models
 Public
 Private
 Hybrid
 Community
Service Models
 SaaS
 PaaS
 IaaS
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
Public Cloud allows systems and services to
be easily accessible to general public, e.g.,
Google, Amazon, Microsoft offers cloud
services via Internet.
Private Cloud allows systems and services to
be accessible with in an organization. The
Private Cloud is operated only within a single
organization. However, It may be managed
internally or by third-party.
Hybrid Cloud is a mixture of public and
private cloud. Non-critical activities are
performed using public cloud while the
critical activities are performed using private
cloud.
Community Cloud allows system and services
to be accessible by group of organizations. It
shares the infrastructure between several
organizations from a specific community. It
may be managed internally or by the third-
party.
 Software as a Service (Saas)
 Platform as a service (PaaS)
 Integration/infrastructure as a Service (IaaS)
 When an organization is
considering Cloud security
it should consider both the
differences and similarities
between these three
segments of Cloud Service
Models
This particular model is focused on managing
access to applications.
For example, policy controls may dictate that a
sales person can only download particular
information from sales CRM
applications(Customer Relationship
Management).
For example, they are only permitted to
download certain leads, within certain
geographies or during local office working hours.
In effect, the security officer needs to focus on
establishing controls regarding users' access to
applications.
The primary focus of this model is on protecting
data. This is especially important in the case of
storage as a service. An important element to
consider within PaaS is the ability to plan against
the possibility of an outage from a Cloud
provider.
The security operation needs to consider
providing for the ability to load balance across
providers to ensure fail over of services in the
event of an outage. Another key consideration
should be the ability to encrypt the data whilst
stored on a third-party platform and to be aware
of the regulatory issues that may apply to data
availability in different geographies
Within this model the focus is on managing
virtual machines.
The CSOs (Chief Security Officers) priority is
to overlay a governance framework to enable
the organization to put controls in place
regarding how virtual machines are created
uncontrolled access and potential costly
wastage
Cloud computing
Cloud computing
Cloud computing
Many Cloud services are accessed using
simple REST Web Services interfaces. These
are commonly called "APIs", since they are
similar in concept to the more heavyweight
C++ or Java APIs used by programmers,
though they are much easier to leverage from
a Web page or from a mobile phone, hence
their increasing ubiquity
Does not access private user data
CSOs focused on SaaS, PaaS and IaaS all the
time.
BENIFITS
High Efficiency
Reliability &
Flexibility
Manipulate &
configure apps
online
Cost Effective
No software
Required
On Demand self
service Online
Development
Resources
Available on
Network
Applications as
utilities over
Internet
Virtualization
Service-Oriented Architecture (SOA)
Grid Computing
Utility Computing
Virtualization is a technique, which allows to share
single physical instance of an application or
resource among multiple organizations or tenants
(customers). It does so by assigning a logical name
to a physical resource and providing a pointer to
that physical resource when demanded
Service-Oriented Architecture helps to use
applications as a service for other
applications regardless the type of vendor,
product or technology.
Grid Computing refers to distributed computing in
which a group of computers from multiple
locations are connected with each other to achieve
common objective. These computer resources are
heterogeneous and geographically dispersed
Utility computing is based on Pay per Use
model. It offers computational resources on
demand as a metered service.
Cloud computing, grid computing, and
managed IT services are based on the
concept of Utility computing.
Although Cloud Computing is a great innovation
in the world of computing, there also exist
downsides of cloud computing.
It is the biggest concern about cloud computing.
Since data management and infrastructure
management in cloud is provided by third-party,
it is always a risk to handover the sensitive
information to such providers.
Although the cloud computing vendors ensure
more secure password protected accounts, any
sign of security breach would result in loss of
clients and businesses.
Cloud computing
Security and Privacy of information is the
biggest challenge to cloud computing. Security
and privacy issues can be overcome by
employing encryption, security hardware and
security applications.
PORTABILITY
INTEROPERABILITY
COMPUTING PERFORMANCE
RELIABILITY AND AVAILABILITY
It is very difficult for the customers to switch
from one Cloud Service Provider (CSP) to
another. It results in dependency on a
particular CSP for service.
This risk involves the failure of isolation
mechanism that separates storage, memory,
routing between the different tenants
Encryption helps to protect data from being
compromised. It protects data that is being
transferred as well as data stored in the
cloud. Although encryption helps to protect
data from any unauthorized access, it does
not prevent from data loss.
Cloud computing
Data Security and Privacy Requirement
Budget Requirements
Type of cloud - public, private or hybrid
Data backup requirements
Training requirements
Dashboard and reporting requirements
Client access requirements
Data export requirements
Cloud computing

More Related Content

PPTX
Cloud security
PDF
Introduction to Microsoft Azure Cloud
PPTX
Cloud computing
PPTX
Cloud Computing Presentation
PPTX
Cloud computing ppt
PDF
Cloud computing
PPSX
Cloud computing
PPT
Cloud architecture
Cloud security
Introduction to Microsoft Azure Cloud
Cloud computing
Cloud Computing Presentation
Cloud computing ppt
Cloud computing
Cloud computing
Cloud architecture

What's hot (20)

PPTX
Cloud computing security issues and challenges
PPTX
Azure fundamentals
PPTX
Cloud computing
PPT
Cloud computing
PDF
Introduction to Cloud Computing
PPTX
Top 10 cloud service providers
PPTX
FOG COMPUTING
PPTX
Virtualization and cloud computing
PPT
Cloud computing
PPT
Cloud computing ppt
PDF
Cloud Computing Architecture
PPTX
Cloud Computing Security
PPTX
Public vs private vs hybrid cloud what is best for your business-
PPT
Cloud computing
PPTX
Cloud computing presentation
PPTX
Research in Cloud Computing
PPT
Cloud computing
PPTX
Cloud computing ppt
PDF
IaaS, SaaS, PasS : Cloud Computing
Cloud computing security issues and challenges
Azure fundamentals
Cloud computing
Cloud computing
Introduction to Cloud Computing
Top 10 cloud service providers
FOG COMPUTING
Virtualization and cloud computing
Cloud computing
Cloud computing ppt
Cloud Computing Architecture
Cloud Computing Security
Public vs private vs hybrid cloud what is best for your business-
Cloud computing
Cloud computing presentation
Research in Cloud Computing
Cloud computing
Cloud computing ppt
IaaS, SaaS, PasS : Cloud Computing
Ad

Viewers also liked (6)

PPTX
Internet protocol (ip) ppt
PPTX
Topology presentation
PPS
Ip address
PPTX
Network topologies
PPTX
Network topology.ppt
PDF
Project Report of TVRO system
Internet protocol (ip) ppt
Topology presentation
Ip address
Network topologies
Network topology.ppt
Project Report of TVRO system
Ad

Similar to Cloud computing (20)

PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
Cloud computing
PPTX
Basics of cloud Computing and various concepts.pptx
PPTX
Cloud Computing.pptx
PDF
Seminar report on cloud computing
PDF
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
PPTX
clude computing presentation topic .pptx
PPT
Introduction to Cloud Computing
PPTX
Cloud Computing_Module1_ updated.pptx
PPTX
ETB S04 - (Cloud Computing) important for.
PPTX
Cloud Computing
PDF
A220113
PPTX
Introduction to Cloud Computing.pptx
PPT
Cloud computing
PPT
Cloud Computing
PDF
G0314043
PDF
Cloud computing-overview
PDF
Cloud computing-overview
PPT
An introduction to the cloud 11 v1
International Journal of Engineering Research and Development (IJERD)
Cloud computing
Basics of cloud Computing and various concepts.pptx
Cloud Computing.pptx
Seminar report on cloud computing
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
clude computing presentation topic .pptx
Introduction to Cloud Computing
Cloud Computing_Module1_ updated.pptx
ETB S04 - (Cloud Computing) important for.
Cloud Computing
A220113
Introduction to Cloud Computing.pptx
Cloud computing
Cloud Computing
G0314043
Cloud computing-overview
Cloud computing-overview
An introduction to the cloud 11 v1

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
MYSQL Presentation for SQL database connectivity
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Cloud computing and distributed systems.
PDF
Advanced IT Governance
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD
MYSQL Presentation for SQL database connectivity
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Cloud computing and distributed systems.
Advanced IT Governance
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development

Cloud computing

  • 3. "What's the cloud?" "Where is the cloud?" "Are we in the cloud now?!"
  • 5. "What's the cloud?" "Where is the cloud?" "Are we in the cloud now?!"
  • 6. Storing and Accessing Data and Programs over the Internet instead of your computer's Hard Drive.
  • 9. Storage Devices  Block Storage Devices Offer raw storage to the clients. This raw storage can be partitioned to create volumes.  File Storage Devices Offer storage to clients in form of files, maintaining it’s own file system. This storage is in the form of Network Attached Storage (NAS)
  • 10. Lower Cost Easier to Manage Scalability Business Contingency Flexibility On-Demand-Computing
  • 11. The Cloud Computing architecture comprises of many cloud components, each of them are loosely coupled. We can broadly divide the cloud architecture into two parts: Front End refers to the client part of cloud computing system. It consists of interfaces and applications that are required to access the cloud computing platforms, e.g., Web Browser. Back End refers to the cloud itself. It consists of all the resources required to provide cloud computing services. It comprises of huge data storage, virtual machines, security mechanism, services, deployment models, servers, etc.
  • 13. Development Models  Public  Private  Hybrid  Community Service Models  SaaS  PaaS  IaaS
  • 14. Public Cloud Private Cloud Hybrid Cloud Community Cloud
  • 15. Public Cloud allows systems and services to be easily accessible to general public, e.g., Google, Amazon, Microsoft offers cloud services via Internet.
  • 16. Private Cloud allows systems and services to be accessible with in an organization. The Private Cloud is operated only within a single organization. However, It may be managed internally or by third-party.
  • 17. Hybrid Cloud is a mixture of public and private cloud. Non-critical activities are performed using public cloud while the critical activities are performed using private cloud.
  • 18. Community Cloud allows system and services to be accessible by group of organizations. It shares the infrastructure between several organizations from a specific community. It may be managed internally or by the third- party.
  • 19.  Software as a Service (Saas)  Platform as a service (PaaS)  Integration/infrastructure as a Service (IaaS)
  • 20.  When an organization is considering Cloud security it should consider both the differences and similarities between these three segments of Cloud Service Models
  • 21. This particular model is focused on managing access to applications. For example, policy controls may dictate that a sales person can only download particular information from sales CRM applications(Customer Relationship Management). For example, they are only permitted to download certain leads, within certain geographies or during local office working hours. In effect, the security officer needs to focus on establishing controls regarding users' access to applications.
  • 22. The primary focus of this model is on protecting data. This is especially important in the case of storage as a service. An important element to consider within PaaS is the ability to plan against the possibility of an outage from a Cloud provider. The security operation needs to consider providing for the ability to load balance across providers to ensure fail over of services in the event of an outage. Another key consideration should be the ability to encrypt the data whilst stored on a third-party platform and to be aware of the regulatory issues that may apply to data availability in different geographies
  • 23. Within this model the focus is on managing virtual machines. The CSOs (Chief Security Officers) priority is to overlay a governance framework to enable the organization to put controls in place regarding how virtual machines are created uncontrolled access and potential costly wastage
  • 27. Many Cloud services are accessed using simple REST Web Services interfaces. These are commonly called "APIs", since they are similar in concept to the more heavyweight C++ or Java APIs used by programmers, though they are much easier to leverage from a Web page or from a mobile phone, hence their increasing ubiquity Does not access private user data
  • 28. CSOs focused on SaaS, PaaS and IaaS all the time.
  • 29. BENIFITS High Efficiency Reliability & Flexibility Manipulate & configure apps online Cost Effective No software Required On Demand self service Online Development Resources Available on Network Applications as utilities over Internet
  • 31. Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). It does so by assigning a logical name to a physical resource and providing a pointer to that physical resource when demanded
  • 32. Service-Oriented Architecture helps to use applications as a service for other applications regardless the type of vendor, product or technology.
  • 33. Grid Computing refers to distributed computing in which a group of computers from multiple locations are connected with each other to achieve common objective. These computer resources are heterogeneous and geographically dispersed
  • 34. Utility computing is based on Pay per Use model. It offers computational resources on demand as a metered service. Cloud computing, grid computing, and managed IT services are based on the concept of Utility computing.
  • 35. Although Cloud Computing is a great innovation in the world of computing, there also exist downsides of cloud computing. It is the biggest concern about cloud computing. Since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to such providers. Although the cloud computing vendors ensure more secure password protected accounts, any sign of security breach would result in loss of clients and businesses.
  • 37. Security and Privacy of information is the biggest challenge to cloud computing. Security and privacy issues can be overcome by employing encryption, security hardware and security applications. PORTABILITY INTEROPERABILITY COMPUTING PERFORMANCE RELIABILITY AND AVAILABILITY
  • 38. It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular CSP for service. This risk involves the failure of isolation mechanism that separates storage, memory, routing between the different tenants
  • 39. Encryption helps to protect data from being compromised. It protects data that is being transferred as well as data stored in the cloud. Although encryption helps to protect data from any unauthorized access, it does not prevent from data loss.
  • 41. Data Security and Privacy Requirement Budget Requirements Type of cloud - public, private or hybrid Data backup requirements Training requirements Dashboard and reporting requirements Client access requirements Data export requirements