SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Downloaden Sie, um offline zu lesen
Contents
• Introduction
• Why Cloud?
• History of Cloud
• Evolution of Cloud
• Definition of Cloud
• Cloud Models
• Pros and Cons
• Security Issues
• Summary
• References
• Query
 The spread of high-speed broadband
networks in developed countries, the
continual increase in computing power, and
the growth of the Internet have changed
the way in which society manages
information and information services.
Why Cloud?
Imagine the absence of a power grid
throughout the nation, necessitating the
presence of a  generator in every home for
producing electricity. Well, why do we have our
computers filled with software we use
occasionally? Wouldn’t it be meaningful to use
software the same way we use electricity – as
and when we need it?
This was the defining thought behind cloud
computing.
 In 1960, J.C.R. Licklider is person who brought
the idea of cloud computing to the forefront. In
1961, John McCarthy suggested in a speech at
MIT that computing can be sold like a utility,
like electricity/water. In 1997, Ramnath
Chellappa – first known academic use of the
term “Cloud Computing”
 In 1999, Salesforce started delivering
applications to users using a simple website. In
2002, Amazon started Amazon Web Services,
providing services like storage, computation and
even human intelligence. However, the launch
of the Elastic Compute Cloud in 2006, open to
everybody existed. In 2009, Google Apps,
Microsoft Windows Azure, and companies like
Oracle and HP have all joined the game.
 Common
 Location Independent
 Online 
 Utility (that is available on)
 Demand
simplifies the meaning of CLOUD -
(Chan, 2009).
 The Cloud delivers a hosting
environment that is immediate,
flexible, elastic, scalable, secure,
and available – while saving money,
time and resources
• Instead of hosting apps and data on
an individual desktop computer,
everything is hosted in the "cloud"—
an assemblage of computers and
servers accessed via the Internet.
 SaaS - 'Software as a Service', describes when users
'rent' or borrow online software instead of actually
purchasing and installing it on their own computers. 
 Instead of selling you a copy of Microsoft Word for
$300, a cloud computing model would "rent" word
processing software to you through the Internet for $5
a month. You would not install any special software to
your home machine to use this rented online product.
You simply use your modern web browser to login
from any web-enabled computer, and you can access
your word processing documents in the same way that
you would access your Gmail.
 PaaS (Platform as a service), as the name
suggests, provides you computing
platforms which typically includes
operating system, programming language
execution environment, database, web
server etc.
 Examples : AWS Elastic Beanstalk,
Heroku, Force.com, Google App Engine.
 IaaS(Infrastructure as a service), as the name suggests,
provides you the computing infrastructure, physical or
virtual machines and other resources like virtual-
machine disk image library, block and file-based
storage, firewalls, load balancers, IP addresses, virtual
local area networks etc.
 Infrastructure as a Service (IaaS) describes one of the
three main methods of accessing cloud computing
based services. Organisations rent computing power
and disk space and access them from desktop PCs
through a private network or across the internet.
 Examples : Amazon EC2, Windows Azure, Rackspace.
 Public cloud -- The cloud infrastructure is
made available to the general public or a large
industry group and is owned by an organization
selling cloud services.
 Public cloud services may be free or offered on
a pay-per-usage model.
Benefits
Easy and inexpensive set-up because
hardware, application and bandwidth costs
are covered by the provider.
No wasted resources because you pay for
what you use.
 Examples Amazon Elastic Compute Cloud
(EC2), IBM's Blue Cloud, Sun Cloud, Google
AppEngine and Windows Azure Services
Platform.
 Private cloud -- The cloud infrastructure is
operated solely for an organization. It may
be managed by the organization or a third
party and may exist on premise or off
premise.
 A private cloud can increase efficiency,
decrease costs and offer more security than
a public cloud.
 Examples Eucalyptus, Elastra, VMware and
Windows Azure Services Platform.
 Hybrid cloud -- The cloud infrastructure is a
composition of two or more clouds (private,
community, or public) that remain unique entities
but are bound together by standardized or
proprietary technology that enables data and
application portability (e.g., cloud bursting for load-
balancing between clouds).
 Government departments, universities, central banks
etc. often find this type of cloud useful.
Examples Google Apps for Government, Microsoft
Government Community Cloud
 Community cloud -- The cloud infrastructure is shared by
several organizations and supports a specific community
that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations).
 The goal of a community cloud is to have participating
organizations realize the benefits of a public cloud -- such
as multi-tenancy and a pay-as-you-go billing structure --
but with the added level of privacy, security and policy
compliance usually associated with a private cloud. The
community cloud can be either on-premises or off-
premises, and can be governed by the participating
organizations or by a third-party managed service provider
 Cloud computing requires an intricate interaction
with the hardware which is very essential to ensure
uptime of the application. It is very helpful to divide
the cloud model into two sections, one is front end
and other is backend.
 They are connected via a network and mostly
internet is used for fulfilling the requirement. The
front side is the interface for the user and the back
end is the cloud section for the whole system.
COMPLIANCECOMPLIANCE
DATA
MOBILITY
DATA
MOBILITY
PRIVAC
Y
PRIVAC
Y
SERVICE
LEVELS
SERVICE
LEVELS
RISKS OF
CLOUD
COMPUTING
Data Migration/Mobility
 It is the process of moving or transferring data,
application from your machine to cloud and vice-
versa. Moving to the cloud or between cloud
environments presents the usual IT issues, but
the problems are compounded by having data
stored and managed remotely, by external
organizations and often in multiple locations.
 Cloud disaster recovery and backup options have
become more common, and some users say they
provide a higher level of protection than
traditional solutions -- at lower cost
Performance metrics
 How fast is the cloud server’s vCPU?
 How quickly do memory and disk respond?
 What is the actual network throughput?
Naturally, cloud providers offer systems that are
different "sizes" with regard to power and price.
Offerings typically have two key dimensions: CPU
and memory (RAM).
Supplier’s own privacy & security policies. What are
the supplier’s own procedures and policies? Do
they include physical security? What about removal
of data from premises on removable media? Does
the supplier have an understanding of the role of
the applicable privacy regulatory authorities, and
procedures to respond to enquiries and complaints?
Privacy and data control issues are significant in the
context of cloud computing services.
Access controls Who will have access to the data
(including individuals or roles)? Are there access
audit trails? If there are particular individuals who
will have access to significant amounts of data
(for example, database administrators) how is
their access monitored and managed? Are any
subcontractors involved? How is their access
controlled? Is data encrypted on disk? “in flight”?
Who holds access keys?
 Secure Data Transfer
 Secure Stored Data
 Secure Software Interface
 User Access Control
 Data Separation
Cloud computing services often provide common
business application online that are accessed from a
web browser, while the software and data are stored
on the servers.
Cloud computing is an umbrella term used to refer to
Internet based development and services
Cloud computing defines virtual storage area which is
provided by cloud providers and accessed by clients
on demand and pay per use. Today, security is one of
the most important factors in computing
environment. Cloud service providers must provide
trust worthy environment. End users must know
about the awareness of security policy.
 [1] Bhushan Lal Sahu, Rajesh Tiwari, “A comprehensive
study on Cloud computing”, International journal of
Advanced Research in Computer science and Software
engineering, volume 2, issue 9, September 2012, ISSN:
2277 128X.
 [2] Mladen A. Vouk, “Cloud computing – Issues, Research
and Implementations”, Journal of Computing and
Information technology, CIT 16, 2008, 4, 235-246.
 [3] Anbalagan K., “Cloud computing”, National seminar on
Imminent Trends in Advanced Computing and Technology –
ITIACT’ 13, ISBN: 978-81-924922-3-0.
Cloud computing..
Cloud computing..

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Computing Technology_Usman
Cloud Computing Technology_UsmanCloud Computing Technology_Usman
Cloud Computing Technology_UsmanUsman Sait
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computingJagan Mohan Bishoyi
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation ReportAjit Yadav
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentationshilpa bojji
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 
State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010Victor Gridnev
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1Sagar Kumar
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud computing
Cloud computingCloud computing
Cloud computingJawhar Ali
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant guptaPrashant Gupta
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing reportErManish5
 

Was ist angesagt? (20)

Cloud Computing Technology_Usman
Cloud Computing Technology_UsmanCloud Computing Technology_Usman
Cloud Computing Technology_Usman
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Briefing 47
Briefing 47Briefing 47
Briefing 47
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 

Andere mochten auch

Workshop lesson 2
Workshop lesson 2Workshop lesson 2
Workshop lesson 2dearjili
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲dearjili
 
Prezi presentations
Prezi presentationsPrezi presentations
Prezi presentationsdearjili
 
Workshop lesson 1
Workshop lesson 1Workshop lesson 1
Workshop lesson 1dearjili
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲dearjili
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲dearjili
 
Detalles de productos salero 1
Detalles de productos  salero 1Detalles de productos  salero 1
Detalles de productos salero 1andrearomero2687
 
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICACGT FESANCAT
 
Detalles de productos frasco6
Detalles de productos  frasco6Detalles de productos  frasco6
Detalles de productos frasco6andrearomero2687
 
EAMEN DE POWER POINT
EAMEN DE POWER POINTEAMEN DE POWER POINT
EAMEN DE POWER POINTAlexi Ortega
 
Murder mystery parties of past and present
Murder mystery parties of past and presentMurder mystery parties of past and present
Murder mystery parties of past and presentCraigrownie Castle
 
Detalles de productos bombonera3
Detalles de productos   bombonera3Detalles de productos   bombonera3
Detalles de productos bombonera3andrearomero2687
 
Detalles de productos bombonera5
Detalles de productos  bombonera5Detalles de productos  bombonera5
Detalles de productos bombonera5andrearomero2687
 
Detalles de productos frasco1
Detalles de productos  frasco1Detalles de productos  frasco1
Detalles de productos frasco1andrearomero2687
 
關懷高風險幸福多一點
關懷高風險幸福多一點關懷高風險幸福多一點
關懷高風險幸福多一點藍 藍
 
Detalles de productos bombonera7
Detalles de productos  bombonera7Detalles de productos  bombonera7
Detalles de productos bombonera7andrearomero2687
 
15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDF15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDFMATHIAS MAZURURA
 

Andere mochten auch (20)

Workshop lesson 2
Workshop lesson 2Workshop lesson 2
Workshop lesson 2
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲
 
Prezi presentations
Prezi presentationsPrezi presentations
Prezi presentations
 
Workshop lesson 1
Workshop lesson 1Workshop lesson 1
Workshop lesson 1
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲
 
Detalles de productos salero 1
Detalles de productos  salero 1Detalles de productos  salero 1
Detalles de productos salero 1
 
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
 
Detalles de productos frasco6
Detalles de productos  frasco6Detalles de productos  frasco6
Detalles de productos frasco6
 
Ciencia y tecnología (1)
Ciencia y tecnología (1)Ciencia y tecnología (1)
Ciencia y tecnología (1)
 
EAMEN DE POWER POINT
EAMEN DE POWER POINTEAMEN DE POWER POINT
EAMEN DE POWER POINT
 
Linux training in chandigarh
Linux training in chandigarhLinux training in chandigarh
Linux training in chandigarh
 
Murder mystery parties of past and present
Murder mystery parties of past and presentMurder mystery parties of past and present
Murder mystery parties of past and present
 
Pagina web 3
Pagina web 3Pagina web 3
Pagina web 3
 
Detalles de productos bombonera3
Detalles de productos   bombonera3Detalles de productos   bombonera3
Detalles de productos bombonera3
 
Detalles de productos bombonera5
Detalles de productos  bombonera5Detalles de productos  bombonera5
Detalles de productos bombonera5
 
Detalles de productos frasco1
Detalles de productos  frasco1Detalles de productos  frasco1
Detalles de productos frasco1
 
關懷高風險幸福多一點
關懷高風險幸福多一點關懷高風險幸福多一點
關懷高風險幸福多一點
 
Detalles de productos bombonera7
Detalles de productos  bombonera7Detalles de productos  bombonera7
Detalles de productos bombonera7
 
15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDF15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDF
 

Ähnlich wie Cloud computing..

Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorialsUdara Sandaruwan
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in librariesNabi Hasan
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
Use of cloud computing technology as an application in libraries
Use of cloud computing technology  as an application in librariesUse of cloud computing technology  as an application in libraries
Use of cloud computing technology as an application in librariesDr. Mohd Asif Khan
 

Ähnlich wie Cloud computing.. (20)

Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
computing
computingcomputing
computing
 
ReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdfReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdf
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Use of cloud computing technology as an application in libraries
Use of cloud computing technology  as an application in librariesUse of cloud computing technology  as an application in libraries
Use of cloud computing technology as an application in libraries
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 

Kürzlich hochgeladen

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Kürzlich hochgeladen (20)

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

Cloud computing..

  • 1.
  • 2. Contents • Introduction • Why Cloud? • History of Cloud • Evolution of Cloud • Definition of Cloud • Cloud Models • Pros and Cons • Security Issues • Summary • References • Query
  • 3.  The spread of high-speed broadband networks in developed countries, the continual increase in computing power, and the growth of the Internet have changed the way in which society manages information and information services.
  • 5. Imagine the absence of a power grid throughout the nation, necessitating the presence of a  generator in every home for producing electricity. Well, why do we have our computers filled with software we use occasionally? Wouldn’t it be meaningful to use software the same way we use electricity – as and when we need it? This was the defining thought behind cloud computing.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.  In 1960, J.C.R. Licklider is person who brought the idea of cloud computing to the forefront. In 1961, John McCarthy suggested in a speech at MIT that computing can be sold like a utility, like electricity/water. In 1997, Ramnath Chellappa – first known academic use of the term “Cloud Computing”  In 1999, Salesforce started delivering applications to users using a simple website. In 2002, Amazon started Amazon Web Services, providing services like storage, computation and even human intelligence. However, the launch of the Elastic Compute Cloud in 2006, open to everybody existed. In 2009, Google Apps, Microsoft Windows Azure, and companies like Oracle and HP have all joined the game.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  Common  Location Independent  Online   Utility (that is available on)  Demand simplifies the meaning of CLOUD - (Chan, 2009).
  • 16.  The Cloud delivers a hosting environment that is immediate, flexible, elastic, scalable, secure, and available – while saving money, time and resources • Instead of hosting apps and data on an individual desktop computer, everything is hosted in the "cloud"— an assemblage of computers and servers accessed via the Internet.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.  SaaS - 'Software as a Service', describes when users 'rent' or borrow online software instead of actually purchasing and installing it on their own computers.   Instead of selling you a copy of Microsoft Word for $300, a cloud computing model would "rent" word processing software to you through the Internet for $5 a month. You would not install any special software to your home machine to use this rented online product. You simply use your modern web browser to login from any web-enabled computer, and you can access your word processing documents in the same way that you would access your Gmail.
  • 23.  PaaS (Platform as a service), as the name suggests, provides you computing platforms which typically includes operating system, programming language execution environment, database, web server etc.  Examples : AWS Elastic Beanstalk, Heroku, Force.com, Google App Engine.
  • 24.  IaaS(Infrastructure as a service), as the name suggests, provides you the computing infrastructure, physical or virtual machines and other resources like virtual- machine disk image library, block and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks etc.  Infrastructure as a Service (IaaS) describes one of the three main methods of accessing cloud computing based services. Organisations rent computing power and disk space and access them from desktop PCs through a private network or across the internet.  Examples : Amazon EC2, Windows Azure, Rackspace.
  • 25.
  • 26.  Public cloud -- The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.  Public cloud services may be free or offered on a pay-per-usage model. Benefits Easy and inexpensive set-up because hardware, application and bandwidth costs are covered by the provider. No wasted resources because you pay for what you use.  Examples Amazon Elastic Compute Cloud (EC2), IBM's Blue Cloud, Sun Cloud, Google AppEngine and Windows Azure Services Platform.
  • 27.  Private cloud -- The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.  A private cloud can increase efficiency, decrease costs and offer more security than a public cloud.  Examples Eucalyptus, Elastra, VMware and Windows Azure Services Platform.
  • 28.  Hybrid cloud -- The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load- balancing between clouds).  Government departments, universities, central banks etc. often find this type of cloud useful. Examples Google Apps for Government, Microsoft Government Community Cloud
  • 29.  Community cloud -- The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations).  The goal of a community cloud is to have participating organizations realize the benefits of a public cloud -- such as multi-tenancy and a pay-as-you-go billing structure -- but with the added level of privacy, security and policy compliance usually associated with a private cloud. The community cloud can be either on-premises or off- premises, and can be governed by the participating organizations or by a third-party managed service provider
  • 30.  Cloud computing requires an intricate interaction with the hardware which is very essential to ensure uptime of the application. It is very helpful to divide the cloud model into two sections, one is front end and other is backend.  They are connected via a network and mostly internet is used for fulfilling the requirement. The front side is the interface for the user and the back end is the cloud section for the whole system.
  • 31.
  • 32.
  • 34. Data Migration/Mobility  It is the process of moving or transferring data, application from your machine to cloud and vice- versa. Moving to the cloud or between cloud environments presents the usual IT issues, but the problems are compounded by having data stored and managed remotely, by external organizations and often in multiple locations.  Cloud disaster recovery and backup options have become more common, and some users say they provide a higher level of protection than traditional solutions -- at lower cost
  • 35. Performance metrics  How fast is the cloud server’s vCPU?  How quickly do memory and disk respond?  What is the actual network throughput? Naturally, cloud providers offer systems that are different "sizes" with regard to power and price. Offerings typically have two key dimensions: CPU and memory (RAM). Supplier’s own privacy & security policies. What are the supplier’s own procedures and policies? Do they include physical security? What about removal of data from premises on removable media? Does the supplier have an understanding of the role of the applicable privacy regulatory authorities, and procedures to respond to enquiries and complaints?
  • 36.
  • 37. Privacy and data control issues are significant in the context of cloud computing services. Access controls Who will have access to the data (including individuals or roles)? Are there access audit trails? If there are particular individuals who will have access to significant amounts of data (for example, database administrators) how is their access monitored and managed? Are any subcontractors involved? How is their access controlled? Is data encrypted on disk? “in flight”? Who holds access keys?
  • 38.  Secure Data Transfer  Secure Stored Data  Secure Software Interface  User Access Control  Data Separation
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Cloud computing services often provide common business application online that are accessed from a web browser, while the software and data are stored on the servers. Cloud computing is an umbrella term used to refer to Internet based development and services Cloud computing defines virtual storage area which is provided by cloud providers and accessed by clients on demand and pay per use. Today, security is one of the most important factors in computing environment. Cloud service providers must provide trust worthy environment. End users must know about the awareness of security policy.
  • 44.  [1] Bhushan Lal Sahu, Rajesh Tiwari, “A comprehensive study on Cloud computing”, International journal of Advanced Research in Computer science and Software engineering, volume 2, issue 9, September 2012, ISSN: 2277 128X.  [2] Mladen A. Vouk, “Cloud computing – Issues, Research and Implementations”, Journal of Computing and Information technology, CIT 16, 2008, 4, 235-246.  [3] Anbalagan K., “Cloud computing”, National seminar on Imminent Trends in Advanced Computing and Technology – ITIACT’ 13, ISBN: 978-81-924922-3-0.