SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Cloud Computing
Ashish Kumar Mishra(103022)
E-mail:-ashish.103022@gmail.com
1
Cloud Computing describes a network based computing that takes place over
the Internet,
basically a step on from Utility Computing
a collection/group of integrated and networked hardware, software and Internet
infrastructure (called a platform).
Using the Internet for communication and transport provides hardware, software
and networking services to clients
simple graphical interface or API (Applications Programming Interface).
2
Example of Cloud Computing
3
4
Cloud Architecture
Multi-core architectures
Virtualization: bare metal, hypervisor. …
VM0 VM1 VMn
Web-services, SOA, WS standards
Services interface
Cloud application : data intensive,
compute intensive , Storage intensive
Storage
Models: S3,
BigTable,
BlobStore, ...
Bandwidth
WS
64-bit
processor
5
Cloud Deployment Models
Community
Cloud
Private
Cloud
Public Cloud
Hybrid Clouds
Deployment
Models
Service
Models
Essential
Characteristics
Common
Characteristics
Software as a
Service (SaaS)
Platform as a
Service (PaaS)
Infrastructure as a
Service (IaaS)
Resource Pooling
Broad Network Access Rapid Elasticity
Measured Service
On Demand Self-Service
Low Cost Software
Virtualization Service Orientation
Advanced Security
Homogeneity
Massive Scale Resilient Computing
Geographic Distribution
6
Different Types Of Cloud’s
Characteristics
Private Clouds
• Cloud is controlled
completely by the
enterprise
• All data in resource
under control of legal
and contractual
umbrella of the
organization
• Require Capital
Expenditure and
Operational
Expenditure and highly
skilled labor
Public clouds
• External
organizations
provide the
infrastructure and
management of the
cloud
• Billed based on usage
• Data in an offsite
organization outside
the legal and
regulatory umbrella
• Difficult to document
the physical location
of data at any
particular moment
7
Hybrid Clouds
•Combine public and private
clouds
•Coordination between the
private and public service
management system
Different type Of Services
8
Security and Challenge
9
 Protecting datacenters must first secure cloud resources and uphold user privacy
and data integrity.
 Trust overlay networks could be applied to build reputation systems for
establishing the trust among interactive datacenters.
 A watermarking technique is suggested to protect shared data objects and
massively distributed software modules.
 These techniques safeguard user authentication and tighten the data access-
control in public clouds.
 The new approach could be more cost-effective than using the traditional
encryption and firewalls to secure the clouds.
Cloud Provider
10
Advantage & Disadvantage over
cloud computing
Advantage Disadvantage
11
* Convenient and environment
friendly.
* Cost efficient and lower the
expenses.
* Provides compelete backup
and recovery.
* Very easy and quick to get.
* Security breaches and
personal informations
may be exposed.
* Slow speed
* Limited features
* Storage Limits-only 5
GB free storage is
allowed.
 * Demand is increasing day by day
 * Expected to grow 320% by 2016
 * New and powerful platform for large data processing
 * Reliable, scalable and flexible service
 * Useful for small as well as for large scale industries
 * Expand the internet to become computing platform of future
Conclusion
12
13

Weitere ähnliche Inhalte

Was ist angesagt?

Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09dhanya.sumeru
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingSD Paul
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
Cloud computing
Cloud computingCloud computing
Cloud computingkanchu17
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
Cloud computing
Cloud computingCloud computing
Cloud computingstudent
 
What is cloud computing technology
What is cloud computing technologyWhat is cloud computing technology
What is cloud computing technologyNIDHI SHARMA
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingieeepondy
 
Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computingasmita tarar
 
Cloud Computing Training Presentation
Cloud Computing Training Presentation Cloud Computing Training Presentation
Cloud Computing Training Presentation Faraz Akhtar
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingRavi Kumar
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computingArar Fahem
 

Was ist angesagt? (20)

Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is cloud computing technology
What is cloud computing technologyWhat is cloud computing technology
What is cloud computing technology
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computing
 
Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing Training Presentation
Cloud Computing Training Presentation Cloud Computing Training Presentation
Cloud Computing Training Presentation
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional Computing
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Ähnlich wie Cloud computing

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxAschalewAyele2
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
A220113
A220113A220113
A220113irjes
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxUtkarshKumar608655
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Clouding computing
Clouding computingClouding computing
Clouding computingMadhavi39
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxadad129366
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computingTarek Nader
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingSuman Jha
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 

Ähnlich wie Cloud computing (20)

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
A220113
A220113A220113
A220113
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Cloud management
Cloud managementCloud management
Cloud management
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
cc.pptx
cc.pptxcc.pptx
cc.pptx
 
Clouding computing
Clouding computingClouding computing
Clouding computing
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptx
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Cloud computing

  • 1. Cloud Computing Ashish Kumar Mishra(103022) E-mail:-ashish.103022@gmail.com 1
  • 2. Cloud Computing describes a network based computing that takes place over the Internet, basically a step on from Utility Computing a collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform). Using the Internet for communication and transport provides hardware, software and networking services to clients simple graphical interface or API (Applications Programming Interface). 2
  • 3. Example of Cloud Computing 3
  • 4. 4
  • 5. Cloud Architecture Multi-core architectures Virtualization: bare metal, hypervisor. … VM0 VM1 VMn Web-services, SOA, WS standards Services interface Cloud application : data intensive, compute intensive , Storage intensive Storage Models: S3, BigTable, BlobStore, ... Bandwidth WS 64-bit processor 5
  • 6. Cloud Deployment Models Community Cloud Private Cloud Public Cloud Hybrid Clouds Deployment Models Service Models Essential Characteristics Common Characteristics Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security Homogeneity Massive Scale Resilient Computing Geographic Distribution 6
  • 7. Different Types Of Cloud’s Characteristics Private Clouds • Cloud is controlled completely by the enterprise • All data in resource under control of legal and contractual umbrella of the organization • Require Capital Expenditure and Operational Expenditure and highly skilled labor Public clouds • External organizations provide the infrastructure and management of the cloud • Billed based on usage • Data in an offsite organization outside the legal and regulatory umbrella • Difficult to document the physical location of data at any particular moment 7 Hybrid Clouds •Combine public and private clouds •Coordination between the private and public service management system
  • 8. Different type Of Services 8
  • 9. Security and Challenge 9  Protecting datacenters must first secure cloud resources and uphold user privacy and data integrity.  Trust overlay networks could be applied to build reputation systems for establishing the trust among interactive datacenters.  A watermarking technique is suggested to protect shared data objects and massively distributed software modules.  These techniques safeguard user authentication and tighten the data access- control in public clouds.  The new approach could be more cost-effective than using the traditional encryption and firewalls to secure the clouds.
  • 11. Advantage & Disadvantage over cloud computing Advantage Disadvantage 11 * Convenient and environment friendly. * Cost efficient and lower the expenses. * Provides compelete backup and recovery. * Very easy and quick to get. * Security breaches and personal informations may be exposed. * Slow speed * Limited features * Storage Limits-only 5 GB free storage is allowed.
  • 12.  * Demand is increasing day by day  * Expected to grow 320% by 2016  * New and powerful platform for large data processing  * Reliable, scalable and flexible service  * Useful for small as well as for large scale industries  * Expand the internet to become computing platform of future Conclusion 12
  • 13. 13

Hinweis der Redaktion

  1. Cloud Computing works in a way similar to how our water and electricity services work- we use the service, how much we use is monitored and we pay for only what we use.That means cloud computing is an outside and in some cases a 3rd party provider that provide services via the internet, giving the users immediate access. There are 3 different services that cover the foundation for cloud computing.SAAS- A SaaS provider typically hosts and manages a given application in their own data center and makes it available to multiple users over the WebPAAS-. This services is an application development and deployment platform delivered as a service to developers over the Web. IAAS- this service is the delivery of hardware (server, storage and network), and associated software (operating systems virtualization technology, file system), as a service. Unlike PaaS services, the IaaS provider does very little management other than keep the data center operational and users must deploy and manage the software services themselves--just the way they would in their own data center.
  2. In a private cloud, the infrastructure for implementing the cloud is controlled completely by the own company. Typically, private clouds are implemented in the own data center and managed by internal resources. This eliminates the management and security concerns associated with information being processed on third party computing resources. Currently, private clouds require Capital Expenditure and Operational Expenditure as well as highly skilled labor to ensure that business services can be met.
  3. As we focus on building the cloud, a number of models have been developed for deploying a cloud infrastructure.
  4. Cloud computing and grid computing are two new concepts of computing. They are often mistaken for the same thing, however that is not the case at all.