SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Cloud Computing and Data Security

Presented By:
Prem regmi
Rahul Panjiyar
Ram Bahadur Gharti
Cloud Computing
• Storing and accessing data and programs over
Internet.
• Practice of using remote servers on the internet to
manage, store and process data instead of using a
personal computer.
Cloud computing is a general term that
is better divided into three categories:
• Infrastructure-as-a-Service providing servers and
storage on demand with the consumer paying
accordingly.
• Platform-as-a-Service allows for the construction
of applications within a provider’s framework,
like Google’s App Engine.
• Software-as-a-Service enables customers to use
an application on demand via a browser. Dropbox
Why Cloud Computing?
• can allow a user to access applications and data from any
computer at any time
• reduces the need for companies to purchase top-of-the-line
servers and hardware or hire people to run them since it is
all maintained by a third party
• Software licenses do not have to be purchased for every
user as the cloud stores and runs the software remotely.
• Data can also be stored with cloud computing so
companies do not have to house servers and databases
themselves
• By centralizing memory, bandwidth, storage & processing in
an off-site environment for a fee, cloud computing can
significantly reduce costs
• Goggle Docs, YouTube, Online file storage,facebook,gmail
etc are the examples of cloud computing where you can
access your stored data from any computer with internet
access and they are widely used by many people worldwide
Data Security Questions
As data is save in cloud not in user hard drive there are
many questions
• Who is Managing My Data?
• Is the Data Secured?
• Where is the Data Actually Located?
• If we choose to put sensitive or protected data in the
cloud, how well does the cloud provider’s security
policies and procedures align with our organizations?
• Who will have access to my data?
• What will happen to my data if I decide to close my
account?
Data Security in Cloud Computing
There are 3 types of different layers of data security in cloud
computing.
1. Physical layer security
it serve as an data center, which includes biometric
scanning, finger prints and voice recognition.
For eg. Building itself is a physical data security. It is design to
stand against hurricane, rain, earthquake etc.
2. Logical layer security
integrated design of networks.
firewalls.
3. Methodological layer security
This includes passwords, controlled environment and
encrypted form.
Cloud Computing Ontology(cocoon)
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Teja Babu
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Docu box intro_12-07-17
Docu box intro_12-07-17Docu box intro_12-07-17
Docu box intro_12-07-17MikeSadowski6
 
microsoftazure.presentation
microsoftazure.presentationmicrosoftazure.presentation
microsoftazure.presentationakshay kohli
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesPrakhyath Rai
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemsRavi Yasas
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityMamta Saxena
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceAsim Kumar Pathak
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000Van Pham
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber SecurityNiki Upadhyay
 
Cloud Computing Courses in Pune
Cloud Computing Courses in PuneCloud Computing Courses in Pune
Cloud Computing Courses in PuneClassboat.com
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitygangal
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education SectorWinastwan Gora
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkRohini SharmaOhlan
 

Was ist angesagt? (19)

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Docu box intro_12-07-17
Docu box intro_12-07-17Docu box intro_12-07-17
Docu box intro_12-07-17
 
microsoftazure.presentation
microsoftazure.presentationmicrosoftazure.presentation
microsoftazure.presentation
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
 
cloud abstract
cloud abstractcloud abstract
cloud abstract
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud Computing Courses in Pune
Cloud Computing Courses in PuneCloud Computing Courses in Pune
Cloud Computing Courses in Pune
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education Sector
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer network
 

Andere mochten auch

Andere mochten auch (12)

електрик
електрикелектрик
електрик
 
Catholic identity dr. vanders
Catholic identity dr. vandersCatholic identity dr. vanders
Catholic identity dr. vanders
 
Catholic identity dr. vanders
Catholic identity dr. vandersCatholic identity dr. vanders
Catholic identity dr. vanders
 
Diwali
DiwaliDiwali
Diwali
 
Tutores 2012
Tutores 2012Tutores 2012
Tutores 2012
 
Behaviour driven development present
Behaviour driven development presentBehaviour driven development present
Behaviour driven development present
 
1Us Application - Quick Pitch
1Us Application - Quick Pitch1Us Application - Quick Pitch
1Us Application - Quick Pitch
 
Company profile
Company profileCompany profile
Company profile
 
Gás natural: perspectiva e utilização
Gás natural: perspectiva e utilizaçãoGás natural: perspectiva e utilização
Gás natural: perspectiva e utilização
 
Prueba diagnostica 02
Prueba diagnostica 02Prueba diagnostica 02
Prueba diagnostica 02
 
Presentacion pnle
Presentacion pnlePresentacion pnle
Presentacion pnle
 
In situ emerita_rodriguez
In situ emerita_rodriguezIn situ emerita_rodriguez
In situ emerita_rodriguez
 

Ähnlich wie Cloud Computing and Data Security: Understanding Risks and Best Practices

Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing NASIMTAHIR2
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxDeveshKhandare
 
Leverage the Best Cloud Storage
Leverage the Best Cloud StorageLeverage the Best Cloud Storage
Leverage the Best Cloud Storageifcloudus
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsGaruda Trainings
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusNANDINI SHARMA
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfifcloudus
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfifcloudus
 
Public Cloud Model.pptx
Public Cloud Model.pptxPublic Cloud Model.pptx
Public Cloud Model.pptxchinmidbz2
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 

Ähnlich wie Cloud Computing and Data Security: Understanding Risks and Best Practices (20)

Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Leverage the Best Cloud Storage
Leverage the Best Cloud StorageLeverage the Best Cloud Storage
Leverage the Best Cloud Storage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabus
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdf
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdf
 
Public Cloud Model.pptx
Public Cloud Model.pptxPublic Cloud Model.pptx
Public Cloud Model.pptx
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 

Kürzlich hochgeladen

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Kürzlich hochgeladen (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Cloud Computing and Data Security: Understanding Risks and Best Practices

  • 1. Cloud Computing and Data Security Presented By: Prem regmi Rahul Panjiyar Ram Bahadur Gharti
  • 2. Cloud Computing • Storing and accessing data and programs over Internet. • Practice of using remote servers on the internet to manage, store and process data instead of using a personal computer.
  • 3.
  • 4. Cloud computing is a general term that is better divided into three categories: • Infrastructure-as-a-Service providing servers and storage on demand with the consumer paying accordingly. • Platform-as-a-Service allows for the construction of applications within a provider’s framework, like Google’s App Engine. • Software-as-a-Service enables customers to use an application on demand via a browser. Dropbox
  • 5. Why Cloud Computing? • can allow a user to access applications and data from any computer at any time • reduces the need for companies to purchase top-of-the-line servers and hardware or hire people to run them since it is all maintained by a third party • Software licenses do not have to be purchased for every user as the cloud stores and runs the software remotely. • Data can also be stored with cloud computing so companies do not have to house servers and databases themselves • By centralizing memory, bandwidth, storage & processing in an off-site environment for a fee, cloud computing can significantly reduce costs • Goggle Docs, YouTube, Online file storage,facebook,gmail etc are the examples of cloud computing where you can access your stored data from any computer with internet access and they are widely used by many people worldwide
  • 6. Data Security Questions As data is save in cloud not in user hard drive there are many questions • Who is Managing My Data? • Is the Data Secured? • Where is the Data Actually Located? • If we choose to put sensitive or protected data in the cloud, how well does the cloud provider’s security policies and procedures align with our organizations? • Who will have access to my data? • What will happen to my data if I decide to close my account?
  • 7. Data Security in Cloud Computing There are 3 types of different layers of data security in cloud computing. 1. Physical layer security it serve as an data center, which includes biometric scanning, finger prints and voice recognition. For eg. Building itself is a physical data security. It is design to stand against hurricane, rain, earthquake etc. 2. Logical layer security integrated design of networks. firewalls. 3. Methodological layer security This includes passwords, controlled environment and encrypted form.