SlideShare a Scribd company logo
1 of 5
Download to read offline
Introduction to Cloud Computing
When you store your photos online instead of on your home computer, or use webmail or a
social networking site, you are using a “cloud computing” service. If you are an organization,
and you want to use, for example, an online invoicing service instead of updating the in-house
one you have been using for many years, that online invoicing service is a “cloud computing”
service. Cloud computing refers to the delivery of computing resources over the Internet. Instead
of keeping data on your own hard drive or updating applications for your needs, you use a
service over the Internet, at another location, to store your information or use its applications.
Doing so may give rise to certain privacy implications.
Cloud Computing
Cloud computing is the delivery of computing services over the Internet. Cloud services allow
individuals and businesses to use software and hardware that are managed by third parties at
remote locations. Examples of cloud services include online file storage, social networking sites,
webmail, and online business applications. The cloud computing model allows access to
information and computer resources from anywhere that a network connection is available.
Cloud computing provides a shared pool of resources, including data storage space, networks,
Computer processing power, and specialized corporate and user applications. The following
definition of cloud computing has been developed by the U.S. National Institute of Standards and
Technology (NIST): Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction. This cloud model promotes availability and is
composed of five essential characteristics, three service models, and four deployment models.1
Characteristics
The characteristics of cloud computing include on-demand self service, broad network access,
resource pooling, rapid elasticity and measured service. On-demand
self service means that customers (usually organizations) can request and manage
their own computing resources. Broad network access allows services to be offered
over the Internet or private networks. Pooled resources means that customers draw
from a pool of computing resources, usually in remote data centres. Services can be
scaled larger or smaller; and use of a service is measured and customers are billed
accordingly.
Service models
The cloud computing service models are Software as a Service (SaaS), Platform as a
Service (PaaS) and Infrastructure as a Service (IaaS). In a Software as a Service
model, a pre-made application, along with any required software, operating system,
hardware, and network are provided. In PaaS, an operating system, hardware, and
network are provided, and the customer installs or develops its own software and
applications. The IaaS model provides just the hardware and network; the customer
installs or develops its own operating systems, software and applications.
Deployment of cloud services:
Cloud services are typically made available via a private cloud, community cloud,
public cloud or hybrid cloud.
Generally speaking, services provided by a public cloud are offered over the
Internet and are owned and operated by a cloud provider. Some examples include
services aimed at the general public, such as online photo storage services, e-mail
services, or social networking sites. However, services for enterprises can also be
offered in a public cloud.
In a private cloud, the cloud infrastructure is operated solely for a specific
organization, and is managed by the organization or a third party.
In a community cloud, the service is shared by several organizations and made
available only to those groups. The infrastructure may be owned and operated by the
organizations or by a cloud service provider.
1 NIST cloud definition, version 15 http://csrc.nist.gov/groups/SNS/cloudcomputing/
A hybrid cloud is a combination of different methods of resource pooling (for
example, combining public and community clouds).
Why cloud services are popular
Cloud services are popular because they can reduce the cost and complexity of
owning and operating computers and networks. Since cloud users do not have to
invest in information technology infrastructure, purchase hardware, or buy software
licences, the benefits are low up-front costs, rapid return on investment, rapid
deployment, customization, flexible use, and solutions that can make use of new
innovations. In addition, cloud providers that have specialized in a particular area
(such as e-mail) can bring advanced services that a single company might not be
able to afford or develop.
Some other benefits to users include scalability, reliability, and efficiency. Scalability
means that cloud computing offers unlimited processing and storage capacity. The
cloud is reliable in that it enables access to applications and documents anywhere in
the world via the Internet. Cloud computing is often considered efficient because it
allows organizations to free up resources to focus on innovation and product
development.
Another potential benefit is that personal information may be better protected in the
cloud. Specifically, cloud computing may improve efforts to build privacy protection
into technology from the start and the use of better security mechanisms. Cloud
computing will enable more flexible IT acquisition and improvements, which may
permit adjustments to procedures based on the sensitivity of the data. Widespread
use of the cloud may also encourage open standards for cloud computing that
will establish baseline data security features common across different
services and providers. Cloud computing may also allow for better audit trails. In
addition, information in the cloud is no as easily lost (when compared to the
paper documents or hard drives, for example).
Potential privacy risks
While there are benefits, there are privacy and security concerns too. Data is
travelling over the Internet and is stored in remote locations. In addition, cloud
providers often serve multiple customers simultaneously. All of this may raise the
scale of exposure to possible breaches, both accidental and deliberate.
Concerns have been raised by many that cloud computing may lead to “function creep” — uses
of data by cloud providers that were not anticipated when the information was originally
collected and for which consent has typically not been obtained. Given how inexpensive it is to
keep data, there is little incentive to remove the information from the cloud and more reasons
to find other things to do with it.
Security issues, the need to segregate data when dealing with providers that serve
multiple customers, potential secondary uses of the data—these are areas that
organizations should keep in mind when considering a cloud provider and when
negotiating contracts or reviewing terms of service with a cloud provider. Given that
the organization transferring this information to the provider is ultimately
accountable for its protection, it needs to ensure that the personal information is
appropriate handled.
Privacy is not a barrier but it must be taken into consideration
The Personal Information Protection and Electronic Documents Act (PIPEDA) does not
prevent an organization from transferring personal information to an organization in
another jurisdiction for processing.
However, PIPEDA establishes rules governing those transfers — particularly with
respect to obtaining consent for the collection, use and disclosure of personal
information, securing the data, and ensuring accountability for the information and
transparency in terms of practices.
For more information on the views of the Office of the Privacy Commissioner of
Canada with respect to outsourcing of personal data processing across borders,
please see our Guidelines for Processing Personal Data Across Borders. These
considerations apply whether moving data in the cloud or otherwise.
It is important to note that many non-Canadian based cloud providers may also be
subject to PIPEDA. To the extent that a cloud provider has a real and substantial
connection to Canada, and collects, uses or discloses personal information in the
course of a commercial activity, the provider is expected to protect personal
information, in keeping with PIPEDA.
Conclusion
Cloud computing offers benefits for organizations and individuals. There are also
privacy and security concerns. If you are considering a cloud service, you should
think about how your personal information, and that of your customers, can best be
protected. Carefully review the terms of service or contracts, and challenge the
provider to meet your needs.
For more information on cloud computing, see:
Reaching for the Clouds
The Report on the 2010 Office of the Privacy Commissioner of Canada’s
Consultations on Online Tracking, Profiling and Targeting, and Cloud Computing
Guidelines for Processing Personal Data Across Borders
Frequently Asked Questions
What is cloud computing?
Simply put, cloud computing is the delivery of computing services over the Internet.
Whether they realize it or not, many people use cloud computing services for their
own personal needs. For example, many people use social networking sites or
webmail, and these are cloud services. Photographs that people once kept on their
own computers are now being stored on servers owned by third parties. These are
also examples of cloud services.
Cloud services are popular because people can access their e-mail, social networking
site or photo service from anywhere in the world, at any time, at minimal or no
charge. Some cloud providers may, however, use the personal information of users
for advertising purposes or to learn more about the users for other reasons. The
Office of the Privacy Commissioner of Canada (OPC) has been critical of some of
these practices, largely because they occur without individuals fully realizing how
their personal information is being used “in the cloud.” Individuals should pay careful
attention to whether and how the cloud company protects their personal information.
Users should also protect their own personal information by using any privacy
settings that the service may offer.
Can cloud computing affect privacy?
When it comes to cloud computing, the security and privacy of personal information
is extremely important. Given that personal information is being turned over to
another organization, often in another country, it is vital to ensure that the
information is safe and that only the people who need to access it are able to do so.
There is the risk that personal information sent to a cloud provider might be kept
indefinitely or used for other purposes. Such information could also be accessed by
government agencies, domestic or foreign (if the cloud provider retains the
information outside of Canada).
For businesses that are considering using a cloud service, it is important to
understand the security and privacy policies and practices of the provider. The terms
of service that govern the relationship with the provider sometimes allow for rather
liberal usage and retention practices.
Which party is accountable for personal information? The business that
collects it from individuals or the cloud provider?
The Personal Information Protection and Electronic Documents Act (PIPEDA) does not
prohibit cloud computing, even when the cloud provider is in another country. Under
PIPEDA, organizations must ensure that they collect personal information for
appropriate purposes and that these purposes be made clear to individuals; they
obtain consent; they limit collection of personal information to those purposes; they
protect the information; and that they be transparent about their privacy practices.
PIPEDA also requires that when an organization transfers personal information to a
third-party for processing, it remains accountable for that information. It must use
contractual or other means to ensure that the personal information transferred to the
third party is appropriately protected. Therefore, an organization that is considering
using a cloud service remains accountable for the personal information that it
transfers to the cloud service, and it must ensure that the personal information
remain protected in the hands of that cloud service provider. Organizations need to
carefully review the terms of service of the cloud provider and ensure that the
personal information it entrusts to it will be treated in a manner consistent with
PIPEDA. For more information on transferring of personal information to third
parties, please see our Guidelines for Processing Personal Data Across Borders.
Why are organizations interested in cloud computing?
Cloud computing can significantly reduce the cost and complexity of owning and
operating computers and networks. If an organization uses a cloud provider, it does
not need to spend money on information technology infrastructure, or buy hardware
or software licences. Cloud services can often be customized and flexible to use, and
providers can offer advanced services that an individual company might not have the
money or expertise to develop.
I’ve heard that cloud computing may improve privacy protection. Is this
true?
For businesses that are considering using a cloud service, cloud computing could
offer better protection of personal information compared with current security and
privacy practices. Through economies of scale, large cloud providers may be able to
use better security technologies than individuals or small companies can, and have
better backup and disaster-recovery capabilities. Cloud providers may also be
motivated to build privacy protections into new technology, and to support better
audit trails.
On the other hand, while cloud computing may not increase the risk that personal
information will be misused or improperly exposed, it could increase the scale of
exposure. The aggregation of data in a cloud provider can make that data very
attractive to cybercriminals, for example. Moreover, given how inexpensive it is to
keep data in the cloud, there may be a tendency to retain it indefinitely, thereby
increasing the risk of breaches.
For more information, please see Cloud Computing.

More Related Content

What's hot

Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing reportProduct Reviews
 
Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3Utphala P
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & WhereMohammed Sajjad Ali
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 

What's hot (18)

Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
B1802041217
B1802041217B1802041217
B1802041217
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud
CloudCloud
Cloud
 
Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Fog doc
Fog doc Fog doc
Fog doc
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 

Viewers also liked

Different Roads To Heaven My Paper On Luther, Calvin And Catholic Ideas Be...
Different Roads To Heaven    My Paper On Luther, Calvin And Catholic Ideas Be...Different Roads To Heaven    My Paper On Luther, Calvin And Catholic Ideas Be...
Different Roads To Heaven My Paper On Luther, Calvin And Catholic Ideas Be...Joseph Florencio
 
Evaluacion pory. public
Evaluacion pory. publicEvaluacion pory. public
Evaluacion pory. publicUSAT
 
Normas apa 6ta edicion 2012
Normas apa 6ta edicion 2012Normas apa 6ta edicion 2012
Normas apa 6ta edicion 2012Lorena Gomez
 
Webinar Presentation: Influencing IT Decisions with Social
Webinar Presentation: Influencing IT Decisions with SocialWebinar Presentation: Influencing IT Decisions with Social
Webinar Presentation: Influencing IT Decisions with SocialLinkedIn
 
Tema8.2ºbachillerato.física
Tema8.2ºbachillerato.físicaTema8.2ºbachillerato.física
Tema8.2ºbachillerato.físicaquififluna
 
3. aci exposion reparacion viviendas
3. aci exposion reparacion viviendas3. aci exposion reparacion viviendas
3. aci exposion reparacion viviendasFrancisco Sanchez
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Viewers also liked (9)

Different Roads To Heaven My Paper On Luther, Calvin And Catholic Ideas Be...
Different Roads To Heaven    My Paper On Luther, Calvin And Catholic Ideas Be...Different Roads To Heaven    My Paper On Luther, Calvin And Catholic Ideas Be...
Different Roads To Heaven My Paper On Luther, Calvin And Catholic Ideas Be...
 
La economia
La economiaLa economia
La economia
 
Online travel review study
Online travel review studyOnline travel review study
Online travel review study
 
Evaluacion pory. public
Evaluacion pory. publicEvaluacion pory. public
Evaluacion pory. public
 
Normas apa 6ta edicion 2012
Normas apa 6ta edicion 2012Normas apa 6ta edicion 2012
Normas apa 6ta edicion 2012
 
Webinar Presentation: Influencing IT Decisions with Social
Webinar Presentation: Influencing IT Decisions with SocialWebinar Presentation: Influencing IT Decisions with Social
Webinar Presentation: Influencing IT Decisions with Social
 
Tema8.2ºbachillerato.física
Tema8.2ºbachillerato.físicaTema8.2ºbachillerato.física
Tema8.2ºbachillerato.física
 
3. aci exposion reparacion viviendas
3. aci exposion reparacion viviendas3. aci exposion reparacion viviendas
3. aci exposion reparacion viviendas
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar to Intro to cloud computing

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introductionRameshKante
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?sriramr
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloudsriramr
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationLayani Malsha
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingPraveen M Jigajinni
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
A Journey of Cloud Computing
A Journey of Cloud ComputingA Journey of Cloud Computing
A Journey of Cloud ComputingCETPA
 

Similar to Intro to cloud computing (20)

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloud
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
A Journey of Cloud Computing
A Journey of Cloud ComputingA Journey of Cloud Computing
A Journey of Cloud Computing
 
Cloud Computing in Laymen terms
Cloud Computing in Laymen termsCloud Computing in Laymen terms
Cloud Computing in Laymen terms
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Intro to cloud computing

  • 1. Introduction to Cloud Computing When you store your photos online instead of on your home computer, or use webmail or a social networking site, you are using a “cloud computing” service. If you are an organization, and you want to use, for example, an online invoicing service instead of updating the in-house one you have been using for many years, that online invoicing service is a “cloud computing” service. Cloud computing refers to the delivery of computing resources over the Internet. Instead of keeping data on your own hard drive or updating applications for your needs, you use a service over the Internet, at another location, to store your information or use its applications. Doing so may give rise to certain privacy implications. Cloud Computing Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Examples of cloud services include online file storage, social networking sites, webmail, and online business applications. The cloud computing model allows access to information and computer resources from anywhere that a network connection is available. Cloud computing provides a shared pool of resources, including data storage space, networks, Computer processing power, and specialized corporate and user applications. The following definition of cloud computing has been developed by the U.S. National Institute of Standards and Technology (NIST): Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.1 Characteristics The characteristics of cloud computing include on-demand self service, broad network access, resource pooling, rapid elasticity and measured service. On-demand self service means that customers (usually organizations) can request and manage their own computing resources. Broad network access allows services to be offered over the Internet or private networks. Pooled resources means that customers draw from a pool of computing resources, usually in remote data centres. Services can be scaled larger or smaller; and use of a service is measured and customers are billed accordingly. Service models The cloud computing service models are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). In a Software as a Service model, a pre-made application, along with any required software, operating system, hardware, and network are provided. In PaaS, an operating system, hardware, and network are provided, and the customer installs or develops its own software and applications. The IaaS model provides just the hardware and network; the customer installs or develops its own operating systems, software and applications. Deployment of cloud services: Cloud services are typically made available via a private cloud, community cloud, public cloud or hybrid cloud. Generally speaking, services provided by a public cloud are offered over the Internet and are owned and operated by a cloud provider. Some examples include services aimed at the general public, such as online photo storage services, e-mail
  • 2. services, or social networking sites. However, services for enterprises can also be offered in a public cloud. In a private cloud, the cloud infrastructure is operated solely for a specific organization, and is managed by the organization or a third party. In a community cloud, the service is shared by several organizations and made available only to those groups. The infrastructure may be owned and operated by the organizations or by a cloud service provider. 1 NIST cloud definition, version 15 http://csrc.nist.gov/groups/SNS/cloudcomputing/ A hybrid cloud is a combination of different methods of resource pooling (for example, combining public and community clouds). Why cloud services are popular Cloud services are popular because they can reduce the cost and complexity of owning and operating computers and networks. Since cloud users do not have to invest in information technology infrastructure, purchase hardware, or buy software licences, the benefits are low up-front costs, rapid return on investment, rapid deployment, customization, flexible use, and solutions that can make use of new innovations. In addition, cloud providers that have specialized in a particular area (such as e-mail) can bring advanced services that a single company might not be able to afford or develop. Some other benefits to users include scalability, reliability, and efficiency. Scalability means that cloud computing offers unlimited processing and storage capacity. The cloud is reliable in that it enables access to applications and documents anywhere in the world via the Internet. Cloud computing is often considered efficient because it allows organizations to free up resources to focus on innovation and product development. Another potential benefit is that personal information may be better protected in the cloud. Specifically, cloud computing may improve efforts to build privacy protection into technology from the start and the use of better security mechanisms. Cloud computing will enable more flexible IT acquisition and improvements, which may permit adjustments to procedures based on the sensitivity of the data. Widespread use of the cloud may also encourage open standards for cloud computing that will establish baseline data security features common across different services and providers. Cloud computing may also allow for better audit trails. In addition, information in the cloud is no as easily lost (when compared to the paper documents or hard drives, for example). Potential privacy risks While there are benefits, there are privacy and security concerns too. Data is travelling over the Internet and is stored in remote locations. In addition, cloud providers often serve multiple customers simultaneously. All of this may raise the scale of exposure to possible breaches, both accidental and deliberate. Concerns have been raised by many that cloud computing may lead to “function creep” — uses of data by cloud providers that were not anticipated when the information was originally collected and for which consent has typically not been obtained. Given how inexpensive it is to keep data, there is little incentive to remove the information from the cloud and more reasons to find other things to do with it. Security issues, the need to segregate data when dealing with providers that serve
  • 3. multiple customers, potential secondary uses of the data—these are areas that organizations should keep in mind when considering a cloud provider and when negotiating contracts or reviewing terms of service with a cloud provider. Given that the organization transferring this information to the provider is ultimately accountable for its protection, it needs to ensure that the personal information is appropriate handled. Privacy is not a barrier but it must be taken into consideration The Personal Information Protection and Electronic Documents Act (PIPEDA) does not prevent an organization from transferring personal information to an organization in another jurisdiction for processing. However, PIPEDA establishes rules governing those transfers — particularly with respect to obtaining consent for the collection, use and disclosure of personal information, securing the data, and ensuring accountability for the information and transparency in terms of practices. For more information on the views of the Office of the Privacy Commissioner of Canada with respect to outsourcing of personal data processing across borders, please see our Guidelines for Processing Personal Data Across Borders. These considerations apply whether moving data in the cloud or otherwise. It is important to note that many non-Canadian based cloud providers may also be subject to PIPEDA. To the extent that a cloud provider has a real and substantial connection to Canada, and collects, uses or discloses personal information in the course of a commercial activity, the provider is expected to protect personal information, in keeping with PIPEDA. Conclusion Cloud computing offers benefits for organizations and individuals. There are also privacy and security concerns. If you are considering a cloud service, you should think about how your personal information, and that of your customers, can best be protected. Carefully review the terms of service or contracts, and challenge the provider to meet your needs. For more information on cloud computing, see: Reaching for the Clouds The Report on the 2010 Office of the Privacy Commissioner of Canada’s Consultations on Online Tracking, Profiling and Targeting, and Cloud Computing Guidelines for Processing Personal Data Across Borders Frequently Asked Questions What is cloud computing? Simply put, cloud computing is the delivery of computing services over the Internet. Whether they realize it or not, many people use cloud computing services for their own personal needs. For example, many people use social networking sites or webmail, and these are cloud services. Photographs that people once kept on their own computers are now being stored on servers owned by third parties. These are also examples of cloud services. Cloud services are popular because people can access their e-mail, social networking site or photo service from anywhere in the world, at any time, at minimal or no charge. Some cloud providers may, however, use the personal information of users for advertising purposes or to learn more about the users for other reasons. The
  • 4. Office of the Privacy Commissioner of Canada (OPC) has been critical of some of these practices, largely because they occur without individuals fully realizing how their personal information is being used “in the cloud.” Individuals should pay careful attention to whether and how the cloud company protects their personal information. Users should also protect their own personal information by using any privacy settings that the service may offer. Can cloud computing affect privacy? When it comes to cloud computing, the security and privacy of personal information is extremely important. Given that personal information is being turned over to another organization, often in another country, it is vital to ensure that the information is safe and that only the people who need to access it are able to do so. There is the risk that personal information sent to a cloud provider might be kept indefinitely or used for other purposes. Such information could also be accessed by government agencies, domestic or foreign (if the cloud provider retains the information outside of Canada). For businesses that are considering using a cloud service, it is important to understand the security and privacy policies and practices of the provider. The terms of service that govern the relationship with the provider sometimes allow for rather liberal usage and retention practices. Which party is accountable for personal information? The business that collects it from individuals or the cloud provider? The Personal Information Protection and Electronic Documents Act (PIPEDA) does not prohibit cloud computing, even when the cloud provider is in another country. Under PIPEDA, organizations must ensure that they collect personal information for appropriate purposes and that these purposes be made clear to individuals; they obtain consent; they limit collection of personal information to those purposes; they protect the information; and that they be transparent about their privacy practices. PIPEDA also requires that when an organization transfers personal information to a third-party for processing, it remains accountable for that information. It must use contractual or other means to ensure that the personal information transferred to the third party is appropriately protected. Therefore, an organization that is considering using a cloud service remains accountable for the personal information that it transfers to the cloud service, and it must ensure that the personal information remain protected in the hands of that cloud service provider. Organizations need to carefully review the terms of service of the cloud provider and ensure that the personal information it entrusts to it will be treated in a manner consistent with PIPEDA. For more information on transferring of personal information to third parties, please see our Guidelines for Processing Personal Data Across Borders. Why are organizations interested in cloud computing? Cloud computing can significantly reduce the cost and complexity of owning and operating computers and networks. If an organization uses a cloud provider, it does not need to spend money on information technology infrastructure, or buy hardware or software licences. Cloud services can often be customized and flexible to use, and providers can offer advanced services that an individual company might not have the money or expertise to develop. I’ve heard that cloud computing may improve privacy protection. Is this
  • 5. true? For businesses that are considering using a cloud service, cloud computing could offer better protection of personal information compared with current security and privacy practices. Through economies of scale, large cloud providers may be able to use better security technologies than individuals or small companies can, and have better backup and disaster-recovery capabilities. Cloud providers may also be motivated to build privacy protections into new technology, and to support better audit trails. On the other hand, while cloud computing may not increase the risk that personal information will be misused or improperly exposed, it could increase the scale of exposure. The aggregation of data in a cloud provider can make that data very attractive to cybercriminals, for example. Moreover, given how inexpensive it is to keep data in the cloud, there may be a tendency to retain it indefinitely, thereby increasing the risk of breaches. For more information, please see Cloud Computing.