SlideShare ist ein Scribd-Unternehmen logo
1 von 10
What is Cloud Computing
 Cloud computing is a model for enabling network access to a
shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services).
 When you store your photos online, use webmail or a social
networking site, you are using a “cloud computing” service.
 It can be rapidly supplied and released with minimal
management effort.
 It has some essential service models, and deployment
models.
Cloud Architecture
Individual users connect to cloud from
their own personal computers and portable
device, over the Internet. To these individual
users, the cloud is seen as a single application
,device or software. The hardware in the cloud
and the operating system that manages the
hardware connections is invisible.
Service Models
1. Software as a service (SaaS)
> The capability provided to the consumer is to use the provider’s
applications running on a cloud infrastructure.
> The applications are accessible from various client devices such as
a web browser (e.g., web-based email).
> The consumer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems,
storage.
Examples: Caspio, Google Apps, Salesforce, Nivio, Learn.com.
Service Models (Cont’d)
2. Platform as a service (PaaS)
> The capability provided to the consumer is to acquired
applications created using programming languages and tools
supported by the provider.
> The consumer does not manage or control the underlying cloud
infrastructure.
> Consumer has control over the deployed applications and possibly
application hosting environment configurations.
Examples: Windows Azure, Google App.
Service Models (Cont’d)
3. Infrastructure as a service (IaaS)
> The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing
resources.
> The consumer is able to deploy and run arbitrary software, which
can include operating systems and applications.
> The consumer does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage,
deployed applications, and possibly limited control of select
networking components (e.g., host firewalls).
Examples: Windows Azure, Google App.
Service Models (Cont’d)
Deployment Models
The cloud is operated solely for an organization. It may be managed by the organization
or a third party and may exist on premise or off premise.
The cloud infrastructure is made available to the general public or a large industry group
and it is owned by an organization selling cloud services.
The cloud infrastructure is shared by several organizations and supports a specific
community that has shared concerns. It may be managed by the organizations or a third
party and may exist on premise or off premise
The cloud infrastructure is a composition of two or more clouds (private, community, or
public).
Deployment Models (cont’d)
Why the Cloud
Advantages:
• Can be less expensive compared to
software and hardware.
• Can be used from any computer or
with an Internet connection.
• The device does not need as large of an
internal storage system.
• Compatible with most computers and
operating systems.
• Provides dependable and secure data
storage center.
• Updates occur across the service.
Disadvantages:
• Security Issues
• Terms of Service
• Privacy Policies

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
Parveen Yadav
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Mamta Saxena
 

Was ist angesagt? (20)

Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Introduction
 Cloud Computing Introduction Cloud Computing Introduction
Cloud Computing Introduction
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Chapter "Cloud Computing Architecture and Services"
Chapter  "Cloud Computing  Architecture and Services"Chapter  "Cloud Computing  Architecture and Services"
Chapter "Cloud Computing Architecture and Services"
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Chapter1
Chapter1Chapter1
Chapter1
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Deployment Model
Cloud Deployment ModelCloud Deployment Model
Cloud Deployment Model
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 

Ähnlich wie introduction to cloud computing

Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
Editor IJARCET
 

Ähnlich wie introduction to cloud computing (20)

Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud def-v15
Cloud def-v15Cloud def-v15
Cloud def-v15
 
Cloud Def V15
Cloud Def V15Cloud Def V15
Cloud Def V15
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction au Cloud computing
Introduction au Cloud computingIntroduction au Cloud computing
Introduction au Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

introduction to cloud computing

  • 1.
  • 2. What is Cloud Computing  Cloud computing is a model for enabling network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services).  When you store your photos online, use webmail or a social networking site, you are using a “cloud computing” service.  It can be rapidly supplied and released with minimal management effort.  It has some essential service models, and deployment models.
  • 3. Cloud Architecture Individual users connect to cloud from their own personal computers and portable device, over the Internet. To these individual users, the cloud is seen as a single application ,device or software. The hardware in the cloud and the operating system that manages the hardware connections is invisible.
  • 4. Service Models 1. Software as a service (SaaS) > The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. > The applications are accessible from various client devices such as a web browser (e.g., web-based email). > The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage. Examples: Caspio, Google Apps, Salesforce, Nivio, Learn.com.
  • 5. Service Models (Cont’d) 2. Platform as a service (PaaS) > The capability provided to the consumer is to acquired applications created using programming languages and tools supported by the provider. > The consumer does not manage or control the underlying cloud infrastructure. > Consumer has control over the deployed applications and possibly application hosting environment configurations. Examples: Windows Azure, Google App.
  • 6. Service Models (Cont’d) 3. Infrastructure as a service (IaaS) > The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources. > The consumer is able to deploy and run arbitrary software, which can include operating systems and applications. > The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Examples: Windows Azure, Google App.
  • 8. Deployment Models The cloud is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. The cloud infrastructure is made available to the general public or a large industry group and it is owned by an organization selling cloud services. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or a third party and may exist on premise or off premise The cloud infrastructure is a composition of two or more clouds (private, community, or public).
  • 10. Why the Cloud Advantages: • Can be less expensive compared to software and hardware. • Can be used from any computer or with an Internet connection. • The device does not need as large of an internal storage system. • Compatible with most computers and operating systems. • Provides dependable and secure data storage center. • Updates occur across the service. Disadvantages: • Security Issues • Terms of Service • Privacy Policies