SlideShare a Scribd company logo
Cloud Computing
Overview of the technology
Presented by Ahmed Nosehy
ahmed.nosehy@gmail.com
Agenda;
1- Introduction.
2- Advantages.
3- Disadvantages.
4- Recommendations.
5- Conclusion.
6- References.
1. Introduction
In computer networking, cloud computing is a phrase used to describe a variety of
computing concepts that involve a large number of computers connected through a
real-time communication network such as the Internet. It is very similar to the
concept of utility computing. In science, cloud computing is a synonym for
distributed computing over a network, and means the ability to run a program or
application on many connected computers at the same time. The phrase is often
used in reference to network-based services, which appear to be provided by real
server hardware, and are in fact served up by virtual hardware, simulated by
software running on one or more real machines. Such virtual servers do not
physically exist and can therefore be moved around and scaled up or down on the fly
without affecting the end user, somewhat like a cloud becoming larger or smaller
without being a physical object. In common usage, the term "the cloud" is essentially
a metaphor for the Internet. Marketers have further popularized the phrase "in the
cloud" to refer to software, platforms and infrastructure that are sold "as a service",
i.e. remotely through the Internet. Typically, the seller has actual energy-consuming
servers which host products and services from a remote location, so end-users don't
have to; they can simply log on to the network without installing anything. The major
models of cloud computing service are known as software as a service, platform as a
service, and infrastructure as a service. These cloud services may be offered in a
public, private or hybrid network. Google, Amazon, Oracle Cloud, Salesforce, Zoho
and Microsoft Azure are some well-known cloud vendors.
2. Advantages
Cloud computing relies on sharing of resources to achieve coherence and economies
of scale, similar to a utility (like the electricity grid) over a network. At the foundation
of cloud computing is the broader concept of converged infrastructure and shared
services. The cloud also focuses on maximizing the effectiveness of the shared
resources. Cloud resources are usually not only shared by multiple users but are also
dynamically reallocated per demand. This can work for allocating resources to users.
For example, a cloud computer facility that serves European users during European
business hours with a specific application (e.g., email) may reallocate the same
resources to serve North American users during North America's business hours with
a different application (e.g., a web server). This approach should maximize the use of
computing powers thus reducing environmental damage as well since less power, air
conditioning, rack space, etc. is required for a variety of functions. With cloud
computing, multiple users can access a single server to retrieve and update their
data without purchasing licenses for different applications.
We can dictate the advantages of cloud computing in the hereunder points:
 Agility improves with users' ability to re-provision technological
infrastructure resources.
 Application programming interface (API) accessibility to software that
enables machines to interact with cloud software in the same way that a
traditional user interface (e.g., a computer desktop) facilitates interaction
between humans and computers. Cloud computing systems typically use
Representational State Transfer (REST)-based APIs.
 Cost cloud providers claim that computing costs reduce. A public-cloud
delivery model converts capital expenditure to operational expenditure. This
purportedly lowers barriers to entry, as infrastructure is typically provided by
a third-party and does not need to be purchased for one-time or infrequent
intensive computing tasks. Pricing on a utility computing basis is fine-grained,
with usage-based options and fewer IT skills are required for implementation
(in-house).
 Device and location independence enable users to access systems using a
web browser regardless of their location or what device they use (e.g., PC,
mobile phone). As infrastructure is off-site (typically provided by a third-
party) and accessed via the Internet, users can connect from anywhere.
 Virtualization technology allows sharing of servers and storage devices and
increased utilization. Applications can be easily migrated from one physical
server to another.
 Multi-tenancy enables sharing of resources and costs across a large pool of
users thus allowing for:
1- Centralization of infrastructure in locations with lower costs (such as real
estate, electricity, etc.)
2- peak-load capacity increases (users need not engineer for highest
possible load-levels)
3- Utilization and efficiency improvements for systems that are often only
10–20% utilized.
 Reliability improves with the use of multiple redundant sites, which makes
well-designed cloud computing suitable for business continuity and disaster
recovery.
 Scalability and elasticity via dynamic ("on-demand") provisioning of
resources on a fine-grained, self-service basis near real-time (Note, the VM
startup time varies by VM type, location, OS and cloud providers), without
users having to engineer for peak loads.
 Performance is monitored and consistent and loosely coupled architectures
are constructed using web services as the system interface.
 Security can improve due to centralization of data, increased security-
focused resources, etc. The complexity of security is greatly increased when
data is distributed over a wider area or over a greater number of devices, as
well as in multi-tenant systems shared by unrelated users.
 Maintenance of cloud computing applications is easier because they don't
need to be installed on each user's computer and can be accessed from
different places.
3. Disadvantages
Here are the most important issues regarding cloud computing:
 LOSS OF GOVERNANCE in using cloud infrastructures, the client necessarily cedes
control to the Cloud Provider (CP) on a number of issues which may affect security.
At the same time, SLAs may not offer a commitment to provide such services on the
part of the cloud provider, thus leaving a gap in security defenses.
 LOCK-IN there is currently little on offer in the way of tools, procedures or standard
data formats or services interfaces that could guarantee data, application and
service portability. This can make it difficult for the customer to migrate from one
provider to another or data and services back to an in-house IT environment.
 ISOLATION FAILURE multi-tenancy and shared resources are defining characteristics of
cloud computing. This risk category covers the failure of mechanisms separating
storage, memory, routing and even reputation between different tenants.
 COMPLIANCE RISKs investment in achieving certification (e.g., industry standard or
regulatory requirements) may be put at risk by migration to the cloud
1- if the CP cannot provide evidence of their own compliance with the
relevant requirements
2- If the CP does not permit audit by the cloud customer (CC).
4. Recommendations
Cloud customers need assurance that providers are following sound security
practices in mitigating the risk facing both the providers and the customers like
DDOS attack.
For this reason, we have expressed many of the recommendations as a standard list
of questions which can be used to provide or obtain assurance. For this reason, we
have expressed many of the recommendations as a standard list of questions which
can be used to provide or obtain assurance.
Documents based on the check-list should provide a means for customers to:
1- Assess the risk of adopting cloud services.
2- Compare different cloud provider offerings.
3- Obtain assurance from selected cloud providers.
4- Reduce the assurance burden on cloud providers.
We recommend priority areas of research in order to improve the security of cloud
computing technologies. The following are the categories we have considered to
build trust in the cloud:
 Higher assurance clouds, virtual private clouds etc
 Forensics and evidence gathering mechanisms.
 Incident handling - monitoring and traceability.
 Resource isolation mechanisms - data, processing, memory, logs etc.
 Interoperability between cloud providers.
5. Conclusion
Cloud computing has reached a maturity that leads it into a productive phase. This
means that most of the main issues with Cloud computing have been addressed to a
degree that Clouds have become interesting for full commercial exploitation. This
however does not mean that all the problems listed above have actually been
solved, only that the according risks can be tolerated to a certain degree.
6. References
1- a b c Mariana Carroll, Paula Kotzé, Alta van der Merwe
(2012). "Securing Virtual and Cloud Environments". In I. Ivanov et al. Cloud
Computing and Services Science, Service Science Research and Innovations in the
Service Economy. Springer Science+Business Media.
2- Cloud Computing entry". NetLingo. Retrieved 15 January 2014.
3- University of Michigan http//it.umich.edu/initiatives/cloud/content/what-cloud.
Retrieved 15 January 2014.
4- http//www.crn.com/news/cloud/240150619/the-100-
coolest-cloud-computing-vendors-of-2013.htm
5- "The NIST Definition of Cloud Computing". National Institute of Standards and
Technology. Retrieved 24 July 2011.
6-"Recession Is Good For Cloud Computing – Microsoft Agrees". CloudAve. Retrieved
2010-08-22.
7- "Defining "Cloud Services" and "Cloud Computing"". IDC. 2008-09-23. Retrieved
2010-08-22.
8- He, Sijin; L. Guo, Y. Guo, M. Ghanem,. Improving Resource Utilisation in the Cloud
Environment Using Multivariate Probabilistic Models. 2012 2012 IEEE 5th
International Conference on Cloud Computing (CLOUD). pp. 574–581.
doi10.1109/CLOUD.2012.66. ISBN 978-1-4673-2892-0.
9-He, Sijin; L. Guo, Y. Guo, C. Wu, M. Ghanem, R. Han. Elastic Application Container A
Lightweight Approach for Cloud Resource Provisioning
10- The NIST Definition of Cloud Computing. Peter Mell and Timothy Grance, NIST
Special Publication 800-145 (September 2011). National Institute of Standards and
Technology, U.S. Department of Commerce.

More Related Content

PDF
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
PPTX
Cloud computing security issues and challenges
DOCX
Cloud computing
PDF
A Short Appraisal on Cloud Computing
PDF
Basics of Cloud Computing
PDF
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
DOCX
Cloud computing seminar report
PDF
CLOUD COMPUTING_proposal
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Cloud computing security issues and challenges
Cloud computing
A Short Appraisal on Cloud Computing
Basics of Cloud Computing
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Cloud computing seminar report
CLOUD COMPUTING_proposal

What's hot (20)

PPT
Cloud computing..
PDF
Cloud Computing for Universities Graduation Project
DOCX
Public cloud: A Review
PPTX
Cloud computing
PDF
A proposal for implementing cloud computing in newspaper company
PDF
Fault Tolerance in AWS Distributed Cloud Computing
PDF
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
DOC
Cloud Computing Documentation Report
PDF
Cloud Computing- Proposal (Autosaved)
PDF
cloud computing final year project
PDF
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
PPTX
Introduction to Cloud Computing and Cloud Infrastructure
PDF
A220113
PDF
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
PDF
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
DOC
cloud computing documentation
DOC
Cloud Computing Documentation Report
PDF
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...
PDF
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
PDF
Cloud Technology_Concepts
Cloud computing..
Cloud Computing for Universities Graduation Project
Public cloud: A Review
Cloud computing
A proposal for implementing cloud computing in newspaper company
Fault Tolerance in AWS Distributed Cloud Computing
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Computing Documentation Report
Cloud Computing- Proposal (Autosaved)
cloud computing final year project
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Introduction to Cloud Computing and Cloud Infrastructure
A220113
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
cloud computing documentation
Cloud Computing Documentation Report
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Cloud Technology_Concepts
Ad

Similar to Cloud computing final format(1) (20)

PPTX
NSUT_Lecture1_cloud computing[1].pptx
PDF
An Overview on Security Issues in Cloud Computing
PDF
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
PDF
Understanding the Cloud Computing: A Review
DOCX
Introduction to cloud computing
DOCX
Cloud Computing Security Issues in Infrastructure as a Service” report
PPTX
Cloud computing
PDF
Cloud computing security through symmetric cipher model
PPTX
Cloud computing
PPTX
CC&NW-MODULE-3 (1)vmsndk d d d eksns ese s we ses dd d
PDF
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
PPTX
Cloud computing
DOCX
Cloud Computing
DOCX
Introduction to cloud computing
PDF
Paper id 27201433
PDF
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
PDF
CLOUD STEGANOGRAPHY- A REVIEW
PDF
Securing The Journey To The Cloud
PPTX
regarding coputer students who are know about cloud computing in engineering ...
PDF
G0314043
NSUT_Lecture1_cloud computing[1].pptx
An Overview on Security Issues in Cloud Computing
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Understanding the Cloud Computing: A Review
Introduction to cloud computing
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud computing
Cloud computing security through symmetric cipher model
Cloud computing
CC&NW-MODULE-3 (1)vmsndk d d d eksns ese s we ses dd d
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
Cloud computing
Cloud Computing
Introduction to cloud computing
Paper id 27201433
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
CLOUD STEGANOGRAPHY- A REVIEW
Securing The Journey To The Cloud
regarding coputer students who are know about cloud computing in engineering ...
G0314043
Ad

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology

Cloud computing final format(1)

  • 1. Cloud Computing Overview of the technology Presented by Ahmed Nosehy ahmed.nosehy@gmail.com
  • 2. Agenda; 1- Introduction. 2- Advantages. 3- Disadvantages. 4- Recommendations. 5- Conclusion. 6- References. 1. Introduction In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet. It is very similar to the concept of utility computing. In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time. The phrase is often used in reference to network-based services, which appear to be provided by real server hardware, and are in fact served up by virtual hardware, simulated by software running on one or more real machines. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object. In common usage, the term "the cloud" is essentially a metaphor for the Internet. Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy-consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything. The major models of cloud computing service are known as software as a service, platform as a service, and infrastructure as a service. These cloud services may be offered in a public, private or hybrid network. Google, Amazon, Oracle Cloud, Salesforce, Zoho and Microsoft Azure are some well-known cloud vendors. 2. Advantages Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. The cloud also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European
  • 3. business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing powers thus reducing environmental damage as well since less power, air conditioning, rack space, etc. is required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications. We can dictate the advantages of cloud computing in the hereunder points:  Agility improves with users' ability to re-provision technological infrastructure resources.  Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers. Cloud computing systems typically use Representational State Transfer (REST)-based APIs.  Cost cloud providers claim that computing costs reduce. A public-cloud delivery model converts capital expenditure to operational expenditure. This purportedly lowers barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained, with usage-based options and fewer IT skills are required for implementation (in-house).  Device and location independence enable users to access systems using a web browser regardless of their location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third- party) and accessed via the Internet, users can connect from anywhere.  Virtualization technology allows sharing of servers and storage devices and increased utilization. Applications can be easily migrated from one physical server to another.  Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for: 1- Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) 2- peak-load capacity increases (users need not engineer for highest possible load-levels) 3- Utilization and efficiency improvements for systems that are often only 10–20% utilized.  Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
  • 4.  Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis near real-time (Note, the VM startup time varies by VM type, location, OS and cloud providers), without users having to engineer for peak loads.  Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface.  Security can improve due to centralization of data, increased security- focused resources, etc. The complexity of security is greatly increased when data is distributed over a wider area or over a greater number of devices, as well as in multi-tenant systems shared by unrelated users.  Maintenance of cloud computing applications is easier because they don't need to be installed on each user's computer and can be accessed from different places. 3. Disadvantages Here are the most important issues regarding cloud computing:  LOSS OF GOVERNANCE in using cloud infrastructures, the client necessarily cedes control to the Cloud Provider (CP) on a number of issues which may affect security. At the same time, SLAs may not offer a commitment to provide such services on the part of the cloud provider, thus leaving a gap in security defenses.  LOCK-IN there is currently little on offer in the way of tools, procedures or standard data formats or services interfaces that could guarantee data, application and service portability. This can make it difficult for the customer to migrate from one provider to another or data and services back to an in-house IT environment.  ISOLATION FAILURE multi-tenancy and shared resources are defining characteristics of cloud computing. This risk category covers the failure of mechanisms separating storage, memory, routing and even reputation between different tenants.  COMPLIANCE RISKs investment in achieving certification (e.g., industry standard or regulatory requirements) may be put at risk by migration to the cloud 1- if the CP cannot provide evidence of their own compliance with the relevant requirements 2- If the CP does not permit audit by the cloud customer (CC). 4. Recommendations Cloud customers need assurance that providers are following sound security practices in mitigating the risk facing both the providers and the customers like DDOS attack. For this reason, we have expressed many of the recommendations as a standard list of questions which can be used to provide or obtain assurance. For this reason, we have expressed many of the recommendations as a standard list of questions which can be used to provide or obtain assurance. Documents based on the check-list should provide a means for customers to: 1- Assess the risk of adopting cloud services. 2- Compare different cloud provider offerings. 3- Obtain assurance from selected cloud providers.
  • 5. 4- Reduce the assurance burden on cloud providers. We recommend priority areas of research in order to improve the security of cloud computing technologies. The following are the categories we have considered to build trust in the cloud:  Higher assurance clouds, virtual private clouds etc  Forensics and evidence gathering mechanisms.  Incident handling - monitoring and traceability.  Resource isolation mechanisms - data, processing, memory, logs etc.  Interoperability between cloud providers. 5. Conclusion Cloud computing has reached a maturity that leads it into a productive phase. This means that most of the main issues with Cloud computing have been addressed to a degree that Clouds have become interesting for full commercial exploitation. This however does not mean that all the problems listed above have actually been solved, only that the according risks can be tolerated to a certain degree. 6. References 1- a b c Mariana Carroll, Paula Kotzé, Alta van der Merwe (2012). "Securing Virtual and Cloud Environments". In I. Ivanov et al. Cloud Computing and Services Science, Service Science Research and Innovations in the Service Economy. Springer Science+Business Media. 2- Cloud Computing entry". NetLingo. Retrieved 15 January 2014. 3- University of Michigan http//it.umich.edu/initiatives/cloud/content/what-cloud. Retrieved 15 January 2014. 4- http//www.crn.com/news/cloud/240150619/the-100- coolest-cloud-computing-vendors-of-2013.htm 5- "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011. 6-"Recession Is Good For Cloud Computing – Microsoft Agrees". CloudAve. Retrieved 2010-08-22. 7- "Defining "Cloud Services" and "Cloud Computing"". IDC. 2008-09-23. Retrieved 2010-08-22. 8- He, Sijin; L. Guo, Y. Guo, M. Ghanem,. Improving Resource Utilisation in the Cloud Environment Using Multivariate Probabilistic Models. 2012 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). pp. 574–581. doi10.1109/CLOUD.2012.66. ISBN 978-1-4673-2892-0. 9-He, Sijin; L. Guo, Y. Guo, C. Wu, M. Ghanem, R. Han. Elastic Application Container A Lightweight Approach for Cloud Resource Provisioning 10- The NIST Definition of Cloud Computing. Peter Mell and Timothy Grance, NIST Special Publication 800-145 (September 2011). National Institute of Standards and Technology, U.S. Department of Commerce.