SlideShare a Scribd company logo
Security and Compliance in the
Cloud
Cloud
Computing
Introduction
1
Security and Compliance in the Cloud : Cloud Computing Introduction
Objectives Overview
Cloud Computing
and its Definition
How it works and
Sharing
Comparison
Architecture and
Key
Characteristics
Service Model –
Layers and
Deployment
Models
Why use Cloud
Computing? Pros
& Cons
Adoption Modes,
Selection Factors
and Concern
Security and Compliance in the Cloud : Cloud Computing Introduction 2
Cloud Computing
3
Security and Compliance in the Cloud : Cloud Computing Introduction
Definition
Security and Compliance in the Cloud : Cloud Computing Introduction 4
The National Institute of Standards and
Technology (NIST) provides a concise and
specific definition:
 Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.
How it Works
Security and Compliance in the Cloud : Cloud Computing
Introduction
5
 Utilizes the network as a means to connect user end
point to resources that are centralized in a data center.
 The data center may by accessed via the internet or a
company network, or both.
 Allows access from a variety of end points such as a
mobile phone, a PC or a tablet.
 Cloud services may be designed to be vendor agnostic,
working equally well with Linux, Mac and PC platforms.
How it Works continue…
Security and Compliance in the Cloud : Cloud Computing
Introduction
6
 Allows access from any internet connected location,
allowing Telecommuting, and Outsourcing.
 A user endpoint with minimal software requirements
may submit a task for processing. The service provider
may pool the processing power of multiple remote
computers in "the cloud" to achieve the task, such as
data warehousing of hundreds of terabytes, managing
and synchronizing multiple documents online, or
computationally intensive work.
Comparison
7
Security and Compliance in the Cloud : Cloud Computing Introduction
Cloud computing shares characteristics with:
 Autonomic computing
 Client–server model
 Smart Grid Computing
 Mainframe computer
 Utility computing
 Peer-to-peer
 Service-oriented computing
 Grid Computing
Architecture
8
Security and Compliance in the Cloud : Cloud Computing Introduction
 Involves multiple components communicating with
each other over application programming interfaces,
usually web services and 3-tier architecture.
 Multiple programs each doing one thing well and
working together over universal interfaces.
 Complexity is controlled and the resulting systems are
more manageable than their monolithic counterparts.
Architecture continue…
9
Security and Compliance in the Cloud : Cloud Computing Introduction
The two most significant components of cloud
computing architecture are known as the front end
and the back end.
 The front end is the part seen by the client, i.e. the
computer user. This includes the client’s network and
applications used to access the cloud via a user interface
such as a web browser.
 The back end of the cloud computing architecture is the
‘cloud’ itself, comprising various computers, servers and
data storage devices.
Architecture continue…
10
Security and Compliance in the Cloud : Cloud Computing Introduction
Key characteristics
11
Security and Compliance in the Cloud : Cloud Computing Introduction
 Agility improves with users' ability to rapidly and
inexpensively re-provision technological infrastructure
resources.
 Application Programming Interface (API) accessibility to
software that enables machines to interact with cloud
software in the same way the user interface facilitates
interaction between humans and computers.
 Cost is claimed to be greatly reduced and in a public
cloud delivery model capital expenditure is converted
to operational expenditure.
Key characteristics continue…
12
Security and Compliance in the Cloud : Cloud Computing Introduction
 Device and location independence enable users to
access systems using a web browser regardless of their
location or what device they are using
 Multi-tenancy enables sharing of resources and costs
across a large pool of users thus allowing for:
 Centralization of infrastructure in locations with
lower costs
 Peak-load capacity increases
 Utilization and efficiency improvements for systems
that are often only 10–20% utilized.
Key characteristics continue…
13
Security and Compliance in the Cloud : Cloud Computing Introduction
 Reliability is improved if multiple redundant sites are
used, which makes cloud computing suitable for
business continuity and disaster recovery.
 Scalability via dynamic "on-demand" provisioning of
resources on a fine-grained, self-service basis near
real-time.
 Performance is monitored, and consistent and loosely
coupled architectures are constructed using web
services as the system interface.
 Security could improve due to centralization of data.
Service Models
14
Security and Compliance in the Cloud : Cloud Computing Introduction
• There are three types of the cloud:
 Infrastructure as a Service (IaaS)
 Platform as a Service (PaaS)
 Software as a Service (SaaS)
Layers
15
Security and Compliance in the Cloud : Cloud Computing Introduction
 Client
 Application
 Platform
 Infrastructure
 Server
Deployment Methods
16
Security and Compliance in the Cloud : Cloud Computing Introduction
 Public cloud
 Community cloud
 Hybrid cloud and hybrid IT delivery
 Combined cloud
 Private cloud
Why use cloud computing??
17
Security and Compliance in the Cloud : Cloud Computing Introduction
 Website traffic fluctuates.
 Visitors expect steady, fast performance regardless.
 An infrastructure able to handle peak traffic requires capital
investment.
 No matter how big you build it, it still may not be enough.
 Having to choose between overspending or under-provisioning is a
classic dilemma.
By deploying your web application in the cloud, you can avoid this
dilemma. You can eliminate the upfront fixed investment, and still gain
access to compute resources to meet peak loads with on demand
scalability, while still paying only for the compute time you actually
use.
Why use cloud computing
18
Security and Compliance in the Cloud : Cloud Computing Introduction
Why use cloud computing continue…
19
Security and Compliance in the Cloud : Cloud Computing Introduction
Pros and Cons
20
Security and Compliance in the Cloud : Cloud Computing Introduction
Adoption of Cloud Computing
21
Security and Compliance in the Cloud : Cloud Computing Introduction
Selection Factors
22
Security and Compliance in the Cloud : Cloud Computing Introduction
Main Concerns
23
Security and Compliance in the Cloud : Cloud Computing Introduction
Questions?
24
Security and Compliance in the Cloud : Cloud Computing Introduction
Reading & Reference Material
• Guide to Security Assurance for Cloud Computing
(2015), by Shao Ying Zhu, Richard Hill and
Marcello Travoti
– Chapter ***
25
Security and Compliance in the Cloud : Cloud Computing Introduction

More Related Content

PPT
4831586.ppt
DOCX
Unraveling the Mysteries of Cloud Computing: A Comprehensive Guide
PPTX
Cloud computing
PPTX
Cloud Computing how will be useful in our life.pptx
PPT
IntroductiontoCloudComputing_LatestOn.ppt
PPT
CLOUD COMPUTING AND STORAGE
PDF
Ch-1-INTRODUCTION (1).pdf
PDF
cloud migration service provider - cloud based intelligence
4831586.ppt
Unraveling the Mysteries of Cloud Computing: A Comprehensive Guide
Cloud computing
Cloud Computing how will be useful in our life.pptx
IntroductiontoCloudComputing_LatestOn.ppt
CLOUD COMPUTING AND STORAGE
Ch-1-INTRODUCTION (1).pdf
cloud migration service provider - cloud based intelligence

Similar to Slide 01 - Cloud Computing Introduction (1).pdf (20)

PPTX
Cloud Computing Overview
PPTX
Cloud Computing Introduction. Engineering seventh Semester
PPTX
Introduction-to-basics of Cloud-Computing.pptx
PPT
Introduction to cloud Cambridge University.ppt
PPT
Introduction.ppt
DOCX
Cloud computing
PPT
Introduction to Cloud Computing in Computer.ppt
PPT
Introduction on Cloud Computing in the.ppt
PPT
CLOUD COMPUTING INTRODUCTION WITH DIAGRAM.ppt
PPTX
Benefits of cloud computing key points 👉
PPTX
Cloud-Computing Training Course By Apponix Technologies
PPT
Cloud Computing
PPTX
cloud computing.pptx fundamentals and deployment models
PPTX
Cloud Computing Unit 1 for computer science.pptx
PPT
Cloud computings
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPTX
ETB S04 - (Cloud Computing) important for.
PPTX
NSUT_Lecture1_cloud computing[1].pptx
PDF
Cc unit 1 updated
PPT
Cloud Computing Introduction
Cloud Computing Overview
Cloud Computing Introduction. Engineering seventh Semester
Introduction-to-basics of Cloud-Computing.pptx
Introduction to cloud Cambridge University.ppt
Introduction.ppt
Cloud computing
Introduction to Cloud Computing in Computer.ppt
Introduction on Cloud Computing in the.ppt
CLOUD COMPUTING INTRODUCTION WITH DIAGRAM.ppt
Benefits of cloud computing key points 👉
Cloud-Computing Training Course By Apponix Technologies
Cloud Computing
cloud computing.pptx fundamentals and deployment models
Cloud Computing Unit 1 for computer science.pptx
Cloud computings
Effectively and Securely Using the Cloud Computing Paradigm
ETB S04 - (Cloud Computing) important for.
NSUT_Lecture1_cloud computing[1].pptx
Cc unit 1 updated
Cloud Computing Introduction
Ad

More from hoangdinhhanh88 (20)

PPTX
5-Tạo CSDL oracle trên windows server.pptx
PPT
3_Kien truc oracle cấu hình trên windows.ppt
PPT
3_Kien truc oracle cấu hình trên windows.ppt
PPTX
0_Gioi thieu mon hoc về oracle thực hành trên win.pptx
PPT
2_Co ban ve SQL oracle trên oracle sql.ppt
PPTX
1-Giới thiệu-cài đặt oracle chạy trên windows.pptx
PDF
lecture05_System Design Performance Considerations.pdf
PDF
lecture04_Overview of a Cloud architecture.pdf
PDF
lecture03_The Cloud and Data Center .pdf
PDF
lecture02_Cloud Computer Basicsrwrwrwrwr
PDF
lecture01_Introduction to CloudComputing.pdf
PDF
AN AUTOMATED APPROACH TO CLOUD STORAGE SERVICE SELECTION.pdf
PDF
A FILE STORAGE SERVICE ON A CLOUD COMPUTING ENVIRONMENT FOR DIGITAL.pdf
PPT
linux-lecture3.ppt
PPT
Chapter 9 TCP IP Reference Model.ppt
PPTX
RemoteAdmin.pptx
PPTX
Disks.pptx
PPTX
Backups.pptx
PPTX
7_Chapter 7_Email.pptx
PPT
3_CHAP~2.PPT
5-Tạo CSDL oracle trên windows server.pptx
3_Kien truc oracle cấu hình trên windows.ppt
3_Kien truc oracle cấu hình trên windows.ppt
0_Gioi thieu mon hoc về oracle thực hành trên win.pptx
2_Co ban ve SQL oracle trên oracle sql.ppt
1-Giới thiệu-cài đặt oracle chạy trên windows.pptx
lecture05_System Design Performance Considerations.pdf
lecture04_Overview of a Cloud architecture.pdf
lecture03_The Cloud and Data Center .pdf
lecture02_Cloud Computer Basicsrwrwrwrwr
lecture01_Introduction to CloudComputing.pdf
AN AUTOMATED APPROACH TO CLOUD STORAGE SERVICE SELECTION.pdf
A FILE STORAGE SERVICE ON A CLOUD COMPUTING ENVIRONMENT FOR DIGITAL.pdf
linux-lecture3.ppt
Chapter 9 TCP IP Reference Model.ppt
RemoteAdmin.pptx
Disks.pptx
Backups.pptx
7_Chapter 7_Email.pptx
3_CHAP~2.PPT
Ad

Recently uploaded (20)

PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Institutional Correction lecture only . . .
PDF
Supply Chain Operations Speaking Notes -ICLT Program
O7-L3 Supply Chain Operations - ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharma ospi slides which help in ospi learning
GDM (1) (1).pptx small presentation for students
Abdominal Access Techniques with Prof. Dr. R K Mishra
2.FourierTransform-ShortQuestionswithAnswers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Anesthesia in Laparoscopic Surgery in India
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Institutional Correction lecture only . . .
Supply Chain Operations Speaking Notes -ICLT Program

Slide 01 - Cloud Computing Introduction (1).pdf

  • 1. Security and Compliance in the Cloud Cloud Computing Introduction 1 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 2. Objectives Overview Cloud Computing and its Definition How it works and Sharing Comparison Architecture and Key Characteristics Service Model – Layers and Deployment Models Why use Cloud Computing? Pros & Cons Adoption Modes, Selection Factors and Concern Security and Compliance in the Cloud : Cloud Computing Introduction 2
  • 3. Cloud Computing 3 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 4. Definition Security and Compliance in the Cloud : Cloud Computing Introduction 4 The National Institute of Standards and Technology (NIST) provides a concise and specific definition:  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
  • 5. How it Works Security and Compliance in the Cloud : Cloud Computing Introduction 5  Utilizes the network as a means to connect user end point to resources that are centralized in a data center.  The data center may by accessed via the internet or a company network, or both.  Allows access from a variety of end points such as a mobile phone, a PC or a tablet.  Cloud services may be designed to be vendor agnostic, working equally well with Linux, Mac and PC platforms.
  • 6. How it Works continue… Security and Compliance in the Cloud : Cloud Computing Introduction 6  Allows access from any internet connected location, allowing Telecommuting, and Outsourcing.  A user endpoint with minimal software requirements may submit a task for processing. The service provider may pool the processing power of multiple remote computers in "the cloud" to achieve the task, such as data warehousing of hundreds of terabytes, managing and synchronizing multiple documents online, or computationally intensive work.
  • 7. Comparison 7 Security and Compliance in the Cloud : Cloud Computing Introduction Cloud computing shares characteristics with:  Autonomic computing  Client–server model  Smart Grid Computing  Mainframe computer  Utility computing  Peer-to-peer  Service-oriented computing  Grid Computing
  • 8. Architecture 8 Security and Compliance in the Cloud : Cloud Computing Introduction  Involves multiple components communicating with each other over application programming interfaces, usually web services and 3-tier architecture.  Multiple programs each doing one thing well and working together over universal interfaces.  Complexity is controlled and the resulting systems are more manageable than their monolithic counterparts.
  • 9. Architecture continue… 9 Security and Compliance in the Cloud : Cloud Computing Introduction The two most significant components of cloud computing architecture are known as the front end and the back end.  The front end is the part seen by the client, i.e. the computer user. This includes the client’s network and applications used to access the cloud via a user interface such as a web browser.  The back end of the cloud computing architecture is the ‘cloud’ itself, comprising various computers, servers and data storage devices.
  • 10. Architecture continue… 10 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 11. Key characteristics 11 Security and Compliance in the Cloud : Cloud Computing Introduction  Agility improves with users' ability to rapidly and inexpensively re-provision technological infrastructure resources.  Application Programming Interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers.  Cost is claimed to be greatly reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure.
  • 12. Key characteristics continue… 12 Security and Compliance in the Cloud : Cloud Computing Introduction  Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using  Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for:  Centralization of infrastructure in locations with lower costs  Peak-load capacity increases  Utilization and efficiency improvements for systems that are often only 10–20% utilized.
  • 13. Key characteristics continue… 13 Security and Compliance in the Cloud : Cloud Computing Introduction  Reliability is improved if multiple redundant sites are used, which makes cloud computing suitable for business continuity and disaster recovery.  Scalability via dynamic "on-demand" provisioning of resources on a fine-grained, self-service basis near real-time.  Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.  Security could improve due to centralization of data.
  • 14. Service Models 14 Security and Compliance in the Cloud : Cloud Computing Introduction • There are three types of the cloud:  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS)  Software as a Service (SaaS)
  • 15. Layers 15 Security and Compliance in the Cloud : Cloud Computing Introduction  Client  Application  Platform  Infrastructure  Server
  • 16. Deployment Methods 16 Security and Compliance in the Cloud : Cloud Computing Introduction  Public cloud  Community cloud  Hybrid cloud and hybrid IT delivery  Combined cloud  Private cloud
  • 17. Why use cloud computing?? 17 Security and Compliance in the Cloud : Cloud Computing Introduction  Website traffic fluctuates.  Visitors expect steady, fast performance regardless.  An infrastructure able to handle peak traffic requires capital investment.  No matter how big you build it, it still may not be enough.  Having to choose between overspending or under-provisioning is a classic dilemma. By deploying your web application in the cloud, you can avoid this dilemma. You can eliminate the upfront fixed investment, and still gain access to compute resources to meet peak loads with on demand scalability, while still paying only for the compute time you actually use.
  • 18. Why use cloud computing 18 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 19. Why use cloud computing continue… 19 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 20. Pros and Cons 20 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 21. Adoption of Cloud Computing 21 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 22. Selection Factors 22 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 23. Main Concerns 23 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 24. Questions? 24 Security and Compliance in the Cloud : Cloud Computing Introduction
  • 25. Reading & Reference Material • Guide to Security Assurance for Cloud Computing (2015), by Shao Ying Zhu, Richard Hill and Marcello Travoti – Chapter *** 25 Security and Compliance in the Cloud : Cloud Computing Introduction