SlideShare a Scribd company logo
Database systems and Cloud computing
INTRODUCTION TO COMPUTER SCIENCE
AND PROGRAMMING
WHAT IS A DATABASE?
2
• A collection of stored operational data used by the application systems of some particular
enterprise.
WHAT IS A DATABASE?
3
• Enterprise
• generic term for any reasonably large-scale commercial, scientific, technical, or other
application
• manufacturing
• financial
• medical
• university
• government
WHAT IS A DATABASE?
4
• Operational data
• data maintained about the operation of an enterprise
• products
• accounts
• patients
• students
• plans
• DOES NOT include input/output data
WHAT IS A DBMS?
5
• A Database Management System (DBMS)
• a collection of programs that enables users to create and maintain a database
• a general-purpose software system that facilitates the processes for databases
of
• Defining
• Constructing
• Manipulating
• Sharing
DEFINING A DATABASE
6
• For the data being stored in the database, defining the database specifies:
• the data types
• the structures
• the constraints
CONSTRUCTING A DATABASE
7
• Is the process of storing the data itself on some storage device
• The storage device is controlled by a DBMS
MANIPULATING A DATABASE
8
• Includes functions that
• retrieve specific information in a query
• update the database to include changes
• generate reports from the data
SHARING A DATABASE
9
• Allows multiple users and programs to access the database at
the same time
• Any conflicts between applications are handled by the DBMS
• Other important functions provided by a DBMS include
• Protection
• System protection
• Security protection
ADVANTAGES OF A DATABASE
10
• Controlled redundancy
• Reduced inconsistency in the data
• Shared access to data
• Standards enforced
• Security restrictions maintained
• Easy to maintain data Integrity
• Providing Backup and recovery
DISADVANTAGES OF A DATABASE
11
• Increased complexity in concurrency control
• Increased complexity in centralized access control
• Security needed to allow the sharing of data
• Needed redundancies cause updating complexities
DATABASE SECURITY

Every company needs places to store institutional
knowledge and data.

Frequently that data contains proprietary information
 Personally Identifiable Data
 Employee HR Data
 Financial Data
DEFINITION
Database Security is the mechanism that protect the database against intentional or accidental
threats.
We consider database security in relation to the following situations:
 Theft and Fraud
 Loss of confidentiality
 Loss of privacy
 Loss of integrity
 Loss of availability
Threat is
any intentional or accidental event that may adversely affect the system

There are 3 key issues in the security of databases just
as with all security systems
 Availability
 Integrity
 Confidentiality

Data needs to be available at all necessary times

Data needs to be available to only the appropriate users

Need to be able to track who has access to and who
has accessed what data

Need to verify that any external data has the correct
formatting and other metadata

Need to verify that all input data is accurate and
verifiable

Need to ensure that data is following the correct work
flow rules for your institution/corporation

Need to be able to report on all data changes and who
authored them to ensure compliance with corporate
rules and privacy laws.

Need to ensure that confidential data is only available to
correct people

Need to ensure that entire database is secure from
external and internal system breaches

Need to provide for reporting on who has accessed
what data and what they have done with it

Mission critical and Legal sensitive data must be highly
secured at the potential risk of lost business and
litigation
THREATS
Examples of threats:
- Using another person’s log-in name to access data
- Unauthorized copying of data
- Program/Data alteration
- Illegal entry by hacker
- Viruses
- Etc.
COUNTERMEASURES
Computer-Based Controls:
- Authorization
- Views
- Backup and Recovery
- Integrity controls
- Encryption
- RAID Technology
CLOUD COMPUTING
CLOUD COMPUTING AS A SOLUTION
FOR COMPANIES

Cloud computing has already made huge waves in the technology industry.

Consumer cloud services such as iCloud, Google Drive and Dropbox have changed the way
people think about digital content and how to use it.

In the enterprise sector, cloud deployment is increasingly the preferred option, no longer the
niche use case.
WHAT DO WE MEAN BY CLOUD COMPUTING?
“Cloud Computing is a model for ubiquitous, convenient, on-
demand network access to a shared pool of configurable
resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with
minimal management effort or service provider interaction.”
National Institute of Standards and Technology (NIST)
CATEGORIES OF CLOUD COMPUTING
SERVICES

Software as a Service(SaaS)

Platform as a Service(PaaS)

Infrastructure as a Service(IaaS)
SAAS

Software offered by a third party provider

Available on demand usually via the internet

Configurable remotely

Examples include word processing and spreadsheet tool, CRM tools, Google docs etc
PAAS

Allows customers to develop new applications using APIs deployed and configurable remotely.

Platforms offered include development tools and deployment platforms.

e.g Microsoft Azure
IAAS

A highly scaled redundant and shared computing infrastructure accessible using internet
technologies.

Consists of servers, storage , security , databases and other peripherals.
Cloud Computing: who should use it?
• If the security of ‘your’ organisation is weak, missing features or below average.
• You cant afford to buy high end servers.
If cloud computing is so great,
why isn’t everyone doing it?
• The cloud acts as a big black box, nothing inside the cloud is
visible to the clients
• Clients have no idea or control over what happens inside a cloud
• Even if the cloud provider is honest, it can have malicious system
administrators who can tamper with the (virtual machine)VMs and
violate confidentiality and integrity
• Clouds are still subject to traditional data confidentiality, integrity,
availability, and privacy issues, plus some additional attacks
Causes of Problems Associated
with Cloud Computing

Most security problems stem from:
 Loss of control
 Lack of trust (mechanisms)
 Multi-tenancy

These problems exist mainly in 3rd
party management
models
 Self-managed clouds still have security issues, but not
related to above
Loss of Control in the Cloud
• Consumer’s loss of control
– Data, applications, resources are located with provider
– User identity management is handled by the cloud
– User access control rules, security policies and enforcement
are managed by the cloud provider
– Consumer relies on provider to ensure
• Data security and privacy
• Resource availability
• Monitoring and repairing of services/resources
Lack of Trust in the Cloud
• Trusting a third party requires taking risks
• Defining trust and risk
– Opposite sides of the same coin
– People only trust when it pays
– Need for trust arises only in risky situations
Multi-tenancy Issues in the Cloud
• Conflict between tenants’ opposing goals
– Tenants share a pool of resources and have opposing goals
• Cloud Computing brings new threats
– Multiple independent users share the same physical infrastructure
– Thus an attacker can legitimately be in the same physical machine as the target
Thank you....

More Related Content

PPTX
Unit -3.pptx cloud Security unit -3 notes
PPT
Dstca
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PPTX
Cloud Computing Security
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PDF
Software Defined Networking in the ATMOSPHERE project
PDF
Cloud Security
Unit -3.pptx cloud Security unit -3 notes
Dstca
I am sharing 'Unit-2' with youuuuuu.PPTX
Cloud Computing Security
28_Security-Privacy-inxssudusd_Cloud.ppt
28_Security-Privacy-in_Cloud_AND_real.ppt
Software Defined Networking in the ATMOSPHERE project
Cloud Security

Similar to Database systems and cloud computing.pptx (20)

PDF
A proposed Solution: Data Availability and Error Correction in Cloud Computing
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
PPTX
Cloud Security: A matter of trust?
PDF
wp-security-dbsec-cloud-3225125
PPTX
Security issues in cloud database
PDF
AWS Cloud Security
PDF
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
PPTX
Cloud security
PPT
Security Issues of Cloud Computing
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
PPTX
Guide to security patterns for cloud systems and data security in aws and azure
PPTX
Unit 9 Technological trends in Information Technology By Sulav Acharya
PPTX
Unit 9 Technological trends in Information Technology By Sulav Acharya
PDF
Data security and Integrity
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
security_and_privacy_in_cloud_computing (1).pptx
PPT
Risks and Benefits of Cloud Computing
PPTX
Microsoft Cloud GDPR Compliance Options (SUGUK)
A proposed Solution: Data Availability and Error Correction in Cloud Computing
Module 5-cloud computing-SECURITY IN THE CLOUD
Cloud Security: A matter of trust?
wp-security-dbsec-cloud-3225125
Security issues in cloud database
AWS Cloud Security
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
Cloud security
Security Issues of Cloud Computing
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
Guide to security patterns for cloud systems and data security in aws and azure
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
Data security and Integrity
I am sharing 'unit 4' with youuuuuu.PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
security_and_privacy_in_cloud_computing (1).pptx
Risks and Benefits of Cloud Computing
Microsoft Cloud GDPR Compliance Options (SUGUK)
Ad

Recently uploaded (20)

PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
“Google Algorithm Updates in 2025 Guide”
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Testing WebRTC applications at scale.pdf
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
innovation process that make everything different.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
artificial intelligence overview of it and more
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Internet___Basics___Styled_ presentation
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Module 1 - Cyber Law and Ethics 101.pptx
“Google Algorithm Updates in 2025 Guide”
Sims 4 Historia para lo sims 4 para jugar
Testing WebRTC applications at scale.pdf
Slides PDF The World Game (s) Eco Economic Epochs.pdf
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
innovation process that make everything different.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
Job_Card_System_Styled_lorem_ipsum_.pptx
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
artificial intelligence overview of it and more
Triggering QUIC, presented by Geoff Huston at IETF 123
Internet___Basics___Styled_ presentation
Introuction about ICD -10 and ICD-11 PPT.pptx
Ad

Database systems and cloud computing.pptx

  • 1. Database systems and Cloud computing INTRODUCTION TO COMPUTER SCIENCE AND PROGRAMMING
  • 2. WHAT IS A DATABASE? 2 • A collection of stored operational data used by the application systems of some particular enterprise.
  • 3. WHAT IS A DATABASE? 3 • Enterprise • generic term for any reasonably large-scale commercial, scientific, technical, or other application • manufacturing • financial • medical • university • government
  • 4. WHAT IS A DATABASE? 4 • Operational data • data maintained about the operation of an enterprise • products • accounts • patients • students • plans • DOES NOT include input/output data
  • 5. WHAT IS A DBMS? 5 • A Database Management System (DBMS) • a collection of programs that enables users to create and maintain a database • a general-purpose software system that facilitates the processes for databases of • Defining • Constructing • Manipulating • Sharing
  • 6. DEFINING A DATABASE 6 • For the data being stored in the database, defining the database specifies: • the data types • the structures • the constraints
  • 7. CONSTRUCTING A DATABASE 7 • Is the process of storing the data itself on some storage device • The storage device is controlled by a DBMS
  • 8. MANIPULATING A DATABASE 8 • Includes functions that • retrieve specific information in a query • update the database to include changes • generate reports from the data
  • 9. SHARING A DATABASE 9 • Allows multiple users and programs to access the database at the same time • Any conflicts between applications are handled by the DBMS • Other important functions provided by a DBMS include • Protection • System protection • Security protection
  • 10. ADVANTAGES OF A DATABASE 10 • Controlled redundancy • Reduced inconsistency in the data • Shared access to data • Standards enforced • Security restrictions maintained • Easy to maintain data Integrity • Providing Backup and recovery
  • 11. DISADVANTAGES OF A DATABASE 11 • Increased complexity in concurrency control • Increased complexity in centralized access control • Security needed to allow the sharing of data • Needed redundancies cause updating complexities
  • 13.  Every company needs places to store institutional knowledge and data.  Frequently that data contains proprietary information  Personally Identifiable Data  Employee HR Data  Financial Data
  • 14. DEFINITION Database Security is the mechanism that protect the database against intentional or accidental threats. We consider database security in relation to the following situations:  Theft and Fraud  Loss of confidentiality  Loss of privacy  Loss of integrity  Loss of availability Threat is any intentional or accidental event that may adversely affect the system
  • 15.  There are 3 key issues in the security of databases just as with all security systems  Availability  Integrity  Confidentiality
  • 16.  Data needs to be available at all necessary times  Data needs to be available to only the appropriate users  Need to be able to track who has access to and who has accessed what data
  • 17.  Need to verify that any external data has the correct formatting and other metadata  Need to verify that all input data is accurate and verifiable  Need to ensure that data is following the correct work flow rules for your institution/corporation  Need to be able to report on all data changes and who authored them to ensure compliance with corporate rules and privacy laws.
  • 18.  Need to ensure that confidential data is only available to correct people  Need to ensure that entire database is secure from external and internal system breaches  Need to provide for reporting on who has accessed what data and what they have done with it  Mission critical and Legal sensitive data must be highly secured at the potential risk of lost business and litigation
  • 19. THREATS Examples of threats: - Using another person’s log-in name to access data - Unauthorized copying of data - Program/Data alteration - Illegal entry by hacker - Viruses - Etc.
  • 20. COUNTERMEASURES Computer-Based Controls: - Authorization - Views - Backup and Recovery - Integrity controls - Encryption - RAID Technology
  • 22. CLOUD COMPUTING AS A SOLUTION FOR COMPANIES  Cloud computing has already made huge waves in the technology industry.  Consumer cloud services such as iCloud, Google Drive and Dropbox have changed the way people think about digital content and how to use it.  In the enterprise sector, cloud deployment is increasingly the preferred option, no longer the niche use case.
  • 23. WHAT DO WE MEAN BY CLOUD COMPUTING? “Cloud Computing is a model for ubiquitous, convenient, on- demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” National Institute of Standards and Technology (NIST)
  • 24. CATEGORIES OF CLOUD COMPUTING SERVICES  Software as a Service(SaaS)  Platform as a Service(PaaS)  Infrastructure as a Service(IaaS)
  • 25. SAAS  Software offered by a third party provider  Available on demand usually via the internet  Configurable remotely  Examples include word processing and spreadsheet tool, CRM tools, Google docs etc
  • 26. PAAS  Allows customers to develop new applications using APIs deployed and configurable remotely.  Platforms offered include development tools and deployment platforms.  e.g Microsoft Azure
  • 27. IAAS  A highly scaled redundant and shared computing infrastructure accessible using internet technologies.  Consists of servers, storage , security , databases and other peripherals.
  • 28. Cloud Computing: who should use it? • If the security of ‘your’ organisation is weak, missing features or below average. • You cant afford to buy high end servers.
  • 29. If cloud computing is so great, why isn’t everyone doing it? • The cloud acts as a big black box, nothing inside the cloud is visible to the clients • Clients have no idea or control over what happens inside a cloud • Even if the cloud provider is honest, it can have malicious system administrators who can tamper with the (virtual machine)VMs and violate confidentiality and integrity • Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks
  • 30. Causes of Problems Associated with Cloud Computing  Most security problems stem from:  Loss of control  Lack of trust (mechanisms)  Multi-tenancy  These problems exist mainly in 3rd party management models  Self-managed clouds still have security issues, but not related to above
  • 31. Loss of Control in the Cloud • Consumer’s loss of control – Data, applications, resources are located with provider – User identity management is handled by the cloud – User access control rules, security policies and enforcement are managed by the cloud provider – Consumer relies on provider to ensure • Data security and privacy • Resource availability • Monitoring and repairing of services/resources
  • 32. Lack of Trust in the Cloud • Trusting a third party requires taking risks • Defining trust and risk – Opposite sides of the same coin – People only trust when it pays – Need for trust arises only in risky situations
  • 33. Multi-tenancy Issues in the Cloud • Conflict between tenants’ opposing goals – Tenants share a pool of resources and have opposing goals • Cloud Computing brings new threats – Multiple independent users share the same physical infrastructure – Thus an attacker can legitimately be in the same physical machine as the target