SlideShare a Scribd company logo
1 of 18
What is Cloud Computing?

            DAN MORRILL
   HIGHLINE COMMUNITY COLLEGE
   CIS 210 COURSE PRESENTATION
Cloud Computing is…

 Cloud computing is the use of computing resources
 (hardware and software) that are delivered as a
 service over a network (typically the Internet). The
 name comes from the use of a cloud-shaped symbol
 as an abstraction for the complex infrastructure it
 contains in system diagrams. Cloud computing
 entrusts remote services with a user's data, software
 and computation.
Cloud Computing is not..

 It is not an answer to all business computing needs
  or wants
 Cloud Computing requires a new skill set for people
  who are working in virtualized environments, older
  data center skills often have a hard time translating
  to the Cloud Computing environment
 Cloud Computing is not suitable for all computing
  problems
 Cloud Computing has a different solution set for
  information security and forensics than the
  traditional network/data center
Cloud Computing is Similar to

      Autonomic computing — Computer systems capable of self-management.
      Client–server model — Client–server computing refers broadly to any distributed
    application that distinguishes between service providers (servers) and service
    requesters (clients).
      Grid computing — "A form of distributed and parallel computing, whereby a
    'super and virtual computer' is composed of a cluster of networked, loosely coupled
    computers acting in concert to perform very large tasks."
      Mainframe computer — Powerful computers used mainly by large organizations
    for critical applications, typically bulk data processing such as census, industry and
    consumer statistics, police and secret intelligence services, enterprise resource
    planning, and financial transaction processing.
      Utility computing — The "packaging of computing resources, such as computation
    and storage, as a metered service similar to a traditional public utility, such as
    electricity."
      Peer-to-peer — Distributed architecture without the need for central coordination,
    with participants being at the same time both suppliers and consumers of resources.
      Cloud gaming - Also known as on-demand gaming, this is a way of delivering
    games to computers. The gaming data will be stored in the provider's server, so that
    gaming will be independent of client computers used to play the game.
Types of Cloud Computing

   Infrastructure as a service (IaaS)
   Platform as a service (PaaS)
   Software as a service (SaaS)
   Network as a service (NaaS)
   Storage as a service (STaaS)
   Security as a service (SECaaS)
   Data as a service (DaaS)
   Database as a service (DBaaS)
   Test environment as a service (TEaaS)
   Desktop virtualization
   API as a service (APIaaS)
   Backend as a service (BaaS)
IaaS Infrastructure as a Service
   In this most basic cloud service model, IaaS providers
    offer computers, as physical or more often as virtual
    machines, and other resources. The virtual machines
    are run as guests by a hypervisor, such as Xen or KVM.
    Pools of hypervisors within the cloud operational
    support system support large numbers of virtual
    machines and the ability to scale services up and down
    according to customers' varying requirements. IaaS
    clouds often offer additional resources such as images
    in a virtual machine image library, raw (block) and file-
    based storage, firewalls, load balancers, IP addresses,
    virtual local area networks (VLANs), and software
    bundles. IaaS cloud providers supply these resources
    on demand from their large pools installed in data
    centers. For wide area connectivity, the Internet can be
    used or—in carrier clouds—dedicated virtual private
    networks can be configured.

   To deploy their applications, cloud users install
    operating system images and their application software
    on the cloud infrastructure. In this model, it is the
    cloud user who is responsible for patching and
    maintaining the operating systems and application
    software. Cloud providers typically bill IaaS services on
    a utility computing basis, that is, cost reflects the
    amount of resources allocated and consumed.

   Examples of IaaS providers include Amazon
    CloudFormation, Amazon EC2, Windows Azure Virtual
    Machines, DynDNS, Google Compute Engine, HP
    Cloud, Joyent, Rackspace Cloud, ReadySpace Cloud
    Services, and Terremark.
PaaS Platform as a Service
   In the PaaS model, cloud providers
    deliver a computing platform typically
    including operating system,
    programming language execution
    environment, database, and web server.
    Application developers can develop and
    run their software solutions on a cloud
    platform without the cost and
    complexity of buying and managing the
    underlying hardware and software
    layers. With some PaaS offers, the
    underlying computer and storage
    resources scale automatically to match
    application demand such that cloud
    user does not have to allocate resources
    manually.

   Examples of PaaS include: Amazon
    Elastic Beanstalk, Cloud Foundry,
    Heroku, Force.com, EngineYard,
    Mendix, Google App Engine, Windows
    Azure Compute and OrangeScape.
SaaS Software as a Service
   In the SaaS model, cloud providers install and
    operate application software in the cloud and cloud
    users access the software from cloud clients. The
    cloud users do not manage the cloud infrastructure
    and platform on which the application is running.
    This eliminates the need to install and run the
    application on the cloud user's own computers
    simplifying maintenance and support. What makes
    a cloud application different from other applications
    is its scalability. This can be achieved by cloning
    tasks onto multiple virtual machines at run-time to
    meet the changing work demand. Load balancers
    distribute the work over the set of virtual machines.
    This process is transparent to the cloud user who
    sees only a single access point. To accommodate a
    large number of cloud users, cloud applications can
    be multitenant, that is, any machine serves more
    than one cloud user organization. It is common to
    refer to special types of cloud based application
    software with a similar naming convention: desktop
    as a service, business process as a service, test
    environment as a service, communication as a
    service.

   The pricing model for SaaS applications is typically
    a monthly or yearly flat fee per user, so price is
    scalable and adjustable if users are added or
    removed at any point.

   Examples of SaaS include: Google Apps, Microsoft
    Office 365, Onlive, GT Nexus, Marketo, and
    TradeCard.
NaaS Network as a Service
 A category of cloud services where
  the capability provided to the cloud
  service user is to use
  network/transport connectivity
  services and/or inter-cloud
  network connectivity services.
  NaaS involves the optimization of
  resource allocations by considering
  network and computing resources
  as a unified whole.

 Traditional NaaS services include
  flexible and extended VPN, and
  bandwidth on demand. NaaS
  concept materialization also
  includes the provision of a virtual
  network service by the owners of
  the network infrastructure to a
  third party (VNP – VNO)
Four Common Deployment Models

 Public Cloud
 Community Cloud
    A Classroom would be a
     good example of a
     Community Cloud
 Hybrid Cloud
    Public/Private
     Components
 Private Cloud
    VPC – Virtual Private
     Cloud
Privacy Issues

   The cloud model has been criticized by privacy advocates for the greater ease in which the
    companies hosting the cloud services control, thus, can monitor at will, whether permitted or
    not by their customers, the communication between the host company and her end-user, as
    well as her stored data. Instances such as the secret NSA program, working with AT&T, and
    Verizon, which recorded over 10 million telephone calls between American citizens, causes
    uncertainty among privacy advocates, and the greater powers it gives to telecommunication
    companies to monitor user activity.[68] Using a cloud service provider (CSP) can complicate
    privacy of data because of the extent to which virtualization for cloud processing (virtual
    machines) and cloud storage are used to implement cloud service. CSP operations, customer or
    tenant data may not remain on the same system, or in the same data center or even within the
    same provider's cloud; this can lead to legal concerns over jurisdiction. While there have been
    efforts (such as US-EU Safe Harbor) to "harmonise" the legal environment, providers such as
    Amazon still cater to major markets (typically the United States and the European Union) by
    deploying local infrastructure and allowing customers to select "availability zones." Cloud
    computing poses privacy concerns because the service provider may access the data that is on
    the cloud at any point in time. They could accidentally or deliberately alter or even delete
    information.

   Postage and delivery services company Pitney Bowes launched Volly, a cloud-based, digital
    mailbox service to leverage its communication management assets. They also faced the
    technical challenge of providing strong data security and privacy. However, they were able to
    address the same concern by applying customized, application-level security, including
    encryption.
Compliance Issues

   In order to obtain compliance with regulations including FISMA, HIPAA, and SOX in the United States, the
    Data Protection Directive in the EU and the credit card industry's PCI DSS, users may have to adopt
    community or hybrid deployment modes that are typically more expensive and may offer restricted benefits.
    This is how Google is able to "manage and meet additional government policy requirements beyond FISMA"
    and Rackspace Cloud or QubeSpace are able to claim PCI compliance.

   Many providers also obtain a SAS 70 Type II audit, but this has been criticised on the grounds that the hand-
    picked set of goals and standards determined by the auditor and the auditee are often not disclosed and can
    vary widely. Providers typically make this information available on request, under non-disclosure agreement.

   Customers in the EU contracting with cloud providers outside the EU/EEA have to adhere to the EU
    regulations on export of personal data.

   U.S. Federal Agencies have been directed by the Office of Management and Budget to use a process called
    FedRAMP (Federal Risk and Authorization Management Program) to assess and authorize cloud products and
    services. Federal CIO Steven VanRoekel issued a memorandum to federal agency Chief Information Officers
    on December 8, 2011 defining how federal agencies should use FedRAMP. FedRAMP consists of a subset of
    NIST Special Publication 800-53 security controls specifically selected to provide protection in cloud
    environments. A subset has been defined for the FIPS 199 low categorization and the FIPS 199 moderate
    categorization. The FedRAMP program has also established a Joint Accreditation Board (JAB) consisting of
    Chief Information Officers from DoD, DHS and GSA. The JAB is responsible for establishing accreditation
    standards for 3rd party organizations who will perform the assessments of cloud solutions. The JAB will also
    review authorization packages and may grant provisional authorization (to operate). The federal agency
    consuming the service will still have the final responsibility for final authority to operate
Legal Issues

 As with other changes in the landscape of computing, certain legal issues
  arise with cloud computing, including trademark infringement, security
  concerns and sharing of propriety data resources.

 The Electronic Frontier Foundation has criticized the United States
  government for considering during the Megaupload seizure process that
  people lose property rights by storing data on a cloud computing service.

 One important but not often mentioned problem with cloud computing is
  the problem of whom is in "possession" of the data. If a cloud company is
  the possessor of the data, the possessor has certain legal rights. If the cloud
  company is the "custodian" of the data, then a different set of rights would
  apply. The next problem in the legalities of cloud computing is the problem
  of legal ownership of the data. Many Terms of Service agreements are silent
  on the question of ownership
Security Issues

   As cloud computing is achieving increased popularity, concerns are being voiced about the security issues
    introduced through adoption of this new model. The effectiveness and efficiency of traditional protection
    mechanisms are being reconsidered as the characteristics of this innovative deployment model can differ
    widely from those of traditional architectures.[90] An alternative perspective on the topic of cloud security is
    that this is but another, although quite broad, case of "applied security" and that similar security principles
    that apply in shared multi-user mainframe security models apply with cloud security.

   The relative security of cloud computing services is a contentious issue that may be delaying its adoption.
    Physical control of the Private Cloud equipment is more secure than having the equipment off site and under
    someone else’s control. Physical control and the ability to visually inspect the data links and access ports is
    required in order to ensure data links are not compromised. Issues barring the adoption of cloud computing
    are due in large part to the private and public sectors' unease surrounding the external management of
    security-based services. It is the very nature of cloud computing-based services, private or public, that
    promote external management of provided services. This delivers great incentive to cloud computing service
    providers to prioritize building and maintaining strong management of secure services.[93] Security issues
    have been categorised into sensitive data access, data segregation, privacy, bug exploitation, recovery,
    accountability, malicious insiders, management console security, account control, and multi-tenancy issues.
    Solutions to various cloud security issues vary, from cryptography, particularly public key infrastructure (PKI),
    to use of multiple cloud providers, standardisation of APIs, and improving virtual machine support and legal
    support.

   Cloud computing offers many benefits, but it also is vulnerable to threats. As the uses of cloud computing
    increase, it is highly likely that more criminals will try to find new ways to exploit vulnerabilities in the system.
    There are many underlying challenges and risks in cloud computing that increase the threat of data being
    compromised. To help mitigate the threat, cloud computing stakeholders should invest heavily in risk
    assessment to ensure that the system encrypts to protect data; establishes trusted foundation to secure the
    platform and infrastructure; and builds higher assurance into auditing to strengthen compliance. Security
    concerns must be addressed in order to establish trust in cloud computing technology.
Case Study – US Patriot Act

 From ZDNet.Com
 "Microsoft believes that its customers should control their own information
  to the extent possible. Accordingly, if law enforcement approaches
  Microsoft directly for information hosted on its systems for its enterprise
  customers, Microsoft will try to redirect law enforcement to the customer to
  afford it the opportunity to decide how to respond.―
 Any company that is wholly-owned by a U.S.-based corporation cannot
  guarantee that the data will not leave its customer-designated datacenters
  or servers. Google would not budge from its first and final response, and
  Microsoft could not offer guarantees to not move data outside the EU under
  any circumstances.
 These subsidiary companies and their U.S.-parent corporations cannot
  provide the assurances that data is safe in the UK or the EEA, because the
  USA PATRIOT Act not only affects the U.S.-based corporations but also
  their worldwide wholly-owned subsidiary companies based within and
  outside the European Union.
IT Governance Issues

 The introduction of cloud computing requires an
 appropriate IT governance model to ensure a secured
 computing environment and to comply with all
 relevant organizational information technology
 policies. As such, organizations need a set of
 capabilities that are essential when effectively
 implementing and managing cloud services,
 including demand management, relationship
 management, data security management, application
 lifecycle management, risk and compliance
 management.
Security Issues

   The relative security of cloud computing services is a contentious issue that may be delaying its
    adoption. Physical control of the Private Cloud equipment is more secure than having the
    equipment off site and under someone else’s control. Physical control and the ability to visually
    inspect the data links and access ports is required in order to ensure data links are not
    compromised. Issues barring the adoption of cloud computing are due in large part to the
    private and public sectors' unease surrounding the external management of security-based
    services. It is the very nature of cloud computing-based services, private or public, that promote
    external management of provided services. This delivers great incentive to cloud computing
    service providers to prioritize building and maintaining strong management of secure services.
    Security issues have been categorised into sensitive data access, data segregation, privacy, bug
    exploitation, recovery, accountability, malicious insiders, management console security,
    account control, and multi-tenancy issues. Solutions to various cloud security issues vary, from
    cryptography, particularly public key infrastructure (PKI), to use of multiple cloud providers,
    standardisation of APIs, and improving virtual machine support and legal support.

   Cloud computing offers many benefits, but it also is vulnerable to threats. As the uses of cloud
    computing increase, it is highly likely that more criminals will try to find new ways to exploit
    vulnerabilities in the system. There are many underlying challenges and risks in cloud
    computing that increase the threat of data being compromised. To help mitigate the threat,
    cloud computing stakeholders should invest heavily in risk assessment to ensure that the
    system encrypts to protect data; establishes trusted foundation to secure the platform and
    infrastructure; and builds higher assurance into auditing to strengthen compliance. Security
    concerns must be addressed in order to establish trust in cloud computing technology.
Questions?

 Please feel free to ask any questions




 Sources – Wikipedia, ZDNet, Amazon, Google,
 Microsoft, AFDnet.

More Related Content

What's hot

Architectures for open and scalable clouds
Architectures for open and scalable cloudsArchitectures for open and scalable clouds
Architectures for open and scalable cloudsRandy Bias
 
Introduction to Cloud Computing - CCGRID 2009
Introduction to Cloud Computing - CCGRID 2009Introduction to Cloud Computing - CCGRID 2009
Introduction to Cloud Computing - CCGRID 2009James Broberg
 
EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud ManagementCenk Ersoy
 
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)Lustratus REPAMA
 
Cloud Workshop - Presentation
Cloud Workshop - PresentationCloud Workshop - Presentation
Cloud Workshop - PresentationNAILBITER
 
Citrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-ServiceCitrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-ServiceShapeBlue
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...LicensingLive! - SafeNet
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingJithin Parakka
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An IntroductionRavindra Dastikop
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Karrox introduction to cloud computing
Karrox introduction to cloud computingKarrox introduction to cloud computing
Karrox introduction to cloud computingKarrox Franchise
 
Future of cloud computing linthicum
Future of cloud computing linthicumFuture of cloud computing linthicum
Future of cloud computing linthicumDavid Linthicum
 
Deep dive: Citrix CloudPlatform for Infrastructure as a Service
Deep dive: Citrix CloudPlatform for Infrastructure as a ServiceDeep dive: Citrix CloudPlatform for Infrastructure as a Service
Deep dive: Citrix CloudPlatform for Infrastructure as a ServiceCitrix
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2Ignacio M. Llorente
 

What's hot (20)

Hybrid cloud computing explained
Hybrid cloud computing explainedHybrid cloud computing explained
Hybrid cloud computing explained
 
Architectures for open and scalable clouds
Architectures for open and scalable cloudsArchitectures for open and scalable clouds
Architectures for open and scalable clouds
 
Cloud computing Fundamentals
Cloud computing FundamentalsCloud computing Fundamentals
Cloud computing Fundamentals
 
Introduction to Cloud Computing - CCGRID 2009
Introduction to Cloud Computing - CCGRID 2009Introduction to Cloud Computing - CCGRID 2009
Introduction to Cloud Computing - CCGRID 2009
 
EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud Management
 
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
 
Cloud Workshop - Presentation
Cloud Workshop - PresentationCloud Workshop - Presentation
Cloud Workshop - Presentation
 
Citrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-ServiceCitrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-Service
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An Introduction
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Karrox introduction to cloud computing
Karrox introduction to cloud computingKarrox introduction to cloud computing
Karrox introduction to cloud computing
 
Microsoft Cloud Computing E-Book
Microsoft Cloud Computing E-BookMicrosoft Cloud Computing E-Book
Microsoft Cloud Computing E-Book
 
Cloud computing What Why How
Cloud computing What Why HowCloud computing What Why How
Cloud computing What Why How
 
Future of cloud computing linthicum
Future of cloud computing linthicumFuture of cloud computing linthicum
Future of cloud computing linthicum
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Deep dive: Citrix CloudPlatform for Infrastructure as a Service
Deep dive: Citrix CloudPlatform for Infrastructure as a ServiceDeep dive: Citrix CloudPlatform for Infrastructure as a Service
Deep dive: Citrix CloudPlatform for Infrastructure as a Service
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2
 

Viewers also liked

FutureGrid Computing Testbed as a Service
 FutureGrid Computing Testbed as a Service FutureGrid Computing Testbed as a Service
FutureGrid Computing Testbed as a ServiceGeoffrey Fox
 
OpenStack networking (Neutron)
OpenStack networking (Neutron) OpenStack networking (Neutron)
OpenStack networking (Neutron) CREATE-NET
 
An introduction to cloud computing
An introduction to cloud computingAn introduction to cloud computing
An introduction to cloud computingJagan Mohan Bishoyi
 
Optimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack CloudsOptimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack CloudsYathiraj Udupi, Ph.D.
 
Cloud computing Brief
Cloud computing BriefCloud computing Brief
Cloud computing BriefJustin Lee
 
Introduction au Cloud Computing
Introduction au Cloud Computing Introduction au Cloud Computing
Introduction au Cloud Computing FICEL Hemza
 
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...Amazon Web Services
 
Cloud computing and big data analytics
Cloud computing and big data analyticsCloud computing and big data analytics
Cloud computing and big data analyticshanish93
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 

Viewers also liked (19)

FutureGrid Computing Testbed as a Service
 FutureGrid Computing Testbed as a Service FutureGrid Computing Testbed as a Service
FutureGrid Computing Testbed as a Service
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
OpenStack networking (Neutron)
OpenStack networking (Neutron) OpenStack networking (Neutron)
OpenStack networking (Neutron)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An introduction to cloud computing
An introduction to cloud computingAn introduction to cloud computing
An introduction to cloud computing
 
Optimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack CloudsOptimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack Clouds
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing Brief
Cloud computing BriefCloud computing Brief
Cloud computing Brief
 
Introduction au Cloud Computing
Introduction au Cloud Computing Introduction au Cloud Computing
Introduction au Cloud Computing
 
Présentation cloud computing
Présentation cloud computingPrésentation cloud computing
Présentation cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
 
Cloud computing and big data analytics
Cloud computing and big data analyticsCloud computing and big data analytics
Cloud computing and big data analytics
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
The Benefits of Cloud Computing
The Benefits of Cloud ComputingThe Benefits of Cloud Computing
The Benefits of Cloud Computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to What is cloud computing

Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1Sagar Kumar
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
Comparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing PlatformsComparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing Platformsijsrd.com
 
Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?ziaurrehman4484
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorialsUdara Sandaruwan
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceAhmadShah Sultani
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxUtkarshKumar608655
 

Similar to What is cloud computing (20)

Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Comparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing PlatformsComparison of Several IaaS Cloud Computing Platforms
Comparison of Several IaaS Cloud Computing Platforms
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud building
Cloud buildingCloud building
Cloud building
 
Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile NetworkCloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile Network
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 

More from Dan Morrill

Windows power shell and active directory
Windows power shell and active directoryWindows power shell and active directory
Windows power shell and active directoryDan Morrill
 
Windows power shell basics
Windows power shell basicsWindows power shell basics
Windows power shell basicsDan Morrill
 
Understanding web site analytics
Understanding web site analyticsUnderstanding web site analytics
Understanding web site analyticsDan Morrill
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingDan Morrill
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingDan Morrill
 
Understanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUTUnderstanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUTDan Morrill
 
Information security principles
Information security principlesInformation security principles
Information security principlesDan Morrill
 
Using Regular Expressions in Grep
Using Regular Expressions in GrepUsing Regular Expressions in Grep
Using Regular Expressions in GrepDan Morrill
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
You should ask before copying that media
You should ask before copying that mediaYou should ask before copying that media
You should ask before copying that mediaDan Morrill
 
Cis 216 – shell scripting
Cis 216 – shell scriptingCis 216 – shell scripting
Cis 216 – shell scriptingDan Morrill
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 
AWS Hadoop and PIG and overview
AWS Hadoop and PIG and overviewAWS Hadoop and PIG and overview
AWS Hadoop and PIG and overviewDan Morrill
 
Social Media Plan for CityU of Seattle
Social Media Plan for CityU of SeattleSocial Media Plan for CityU of Seattle
Social Media Plan for CityU of SeattleDan Morrill
 
Case Studies In Social Media Chinese
Case Studies In Social Media ChineseCase Studies In Social Media Chinese
Case Studies In Social Media ChineseDan Morrill
 
Case Studies In Social Media
Case Studies In Social MediaCase Studies In Social Media
Case Studies In Social MediaDan Morrill
 
Turn On Tune In Step Out
Turn On Tune In Step OutTurn On Tune In Step Out
Turn On Tune In Step OutDan Morrill
 
Technology And The Future Of Management
Technology And The Future Of ManagementTechnology And The Future Of Management
Technology And The Future Of ManagementDan Morrill
 

More from Dan Morrill (19)

Windows power shell and active directory
Windows power shell and active directoryWindows power shell and active directory
Windows power shell and active directory
 
Windows power shell basics
Windows power shell basicsWindows power shell basics
Windows power shell basics
 
Understanding web site analytics
Understanding web site analyticsUnderstanding web site analytics
Understanding web site analytics
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scripting
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
Understanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUTUnderstanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUT
 
Information security principles
Information security principlesInformation security principles
Information security principles
 
Using Regular Expressions in Grep
Using Regular Expressions in GrepUsing Regular Expressions in Grep
Using Regular Expressions in Grep
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
You should ask before copying that media
You should ask before copying that mediaYou should ask before copying that media
You should ask before copying that media
 
Cis 216 – shell scripting
Cis 216 – shell scriptingCis 216 – shell scripting
Cis 216 – shell scripting
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
AWS Hadoop and PIG and overview
AWS Hadoop and PIG and overviewAWS Hadoop and PIG and overview
AWS Hadoop and PIG and overview
 
Social Media Plan for CityU of Seattle
Social Media Plan for CityU of SeattleSocial Media Plan for CityU of Seattle
Social Media Plan for CityU of Seattle
 
BSIS Overview
BSIS OverviewBSIS Overview
BSIS Overview
 
Case Studies In Social Media Chinese
Case Studies In Social Media ChineseCase Studies In Social Media Chinese
Case Studies In Social Media Chinese
 
Case Studies In Social Media
Case Studies In Social MediaCase Studies In Social Media
Case Studies In Social Media
 
Turn On Tune In Step Out
Turn On Tune In Step OutTurn On Tune In Step Out
Turn On Tune In Step Out
 
Technology And The Future Of Management
Technology And The Future Of ManagementTechnology And The Future Of Management
Technology And The Future Of Management
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

What is cloud computing

  • 1. What is Cloud Computing? DAN MORRILL HIGHLINE COMMUNITY COLLEGE CIS 210 COURSE PRESENTATION
  • 2. Cloud Computing is…  Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation.
  • 3. Cloud Computing is not..  It is not an answer to all business computing needs or wants  Cloud Computing requires a new skill set for people who are working in virtualized environments, older data center skills often have a hard time translating to the Cloud Computing environment  Cloud Computing is not suitable for all computing problems  Cloud Computing has a different solution set for information security and forensics than the traditional network/data center
  • 4. Cloud Computing is Similar to  Autonomic computing — Computer systems capable of self-management.  Client–server model — Client–server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients).  Grid computing — "A form of distributed and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks."  Mainframe computer — Powerful computers used mainly by large organizations for critical applications, typically bulk data processing such as census, industry and consumer statistics, police and secret intelligence services, enterprise resource planning, and financial transaction processing.  Utility computing — The "packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity."  Peer-to-peer — Distributed architecture without the need for central coordination, with participants being at the same time both suppliers and consumers of resources.  Cloud gaming - Also known as on-demand gaming, this is a way of delivering games to computers. The gaming data will be stored in the provider's server, so that gaming will be independent of client computers used to play the game.
  • 5. Types of Cloud Computing  Infrastructure as a service (IaaS)  Platform as a service (PaaS)  Software as a service (SaaS)  Network as a service (NaaS)  Storage as a service (STaaS)  Security as a service (SECaaS)  Data as a service (DaaS)  Database as a service (DBaaS)  Test environment as a service (TEaaS)  Desktop virtualization  API as a service (APIaaS)  Backend as a service (BaaS)
  • 6. IaaS Infrastructure as a Service  In this most basic cloud service model, IaaS providers offer computers, as physical or more often as virtual machines, and other resources. The virtual machines are run as guests by a hypervisor, such as Xen or KVM. Pools of hypervisors within the cloud operational support system support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements. IaaS clouds often offer additional resources such as images in a virtual machine image library, raw (block) and file- based storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. IaaS cloud providers supply these resources on demand from their large pools installed in data centers. For wide area connectivity, the Internet can be used or—in carrier clouds—dedicated virtual private networks can be configured.  To deploy their applications, cloud users install operating system images and their application software on the cloud infrastructure. In this model, it is the cloud user who is responsible for patching and maintaining the operating systems and application software. Cloud providers typically bill IaaS services on a utility computing basis, that is, cost reflects the amount of resources allocated and consumed.  Examples of IaaS providers include Amazon CloudFormation, Amazon EC2, Windows Azure Virtual Machines, DynDNS, Google Compute Engine, HP Cloud, Joyent, Rackspace Cloud, ReadySpace Cloud Services, and Terremark.
  • 7. PaaS Platform as a Service  In the PaaS model, cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying computer and storage resources scale automatically to match application demand such that cloud user does not have to allocate resources manually.  Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry, Heroku, Force.com, EngineYard, Mendix, Google App Engine, Windows Azure Compute and OrangeScape.
  • 8. SaaS Software as a Service  In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. This eliminates the need to install and run the application on the cloud user's own computers simplifying maintenance and support. What makes a cloud application different from other applications is its scalability. This can be achieved by cloning tasks onto multiple virtual machines at run-time to meet the changing work demand. Load balancers distribute the work over the set of virtual machines. This process is transparent to the cloud user who sees only a single access point. To accommodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud based application software with a similar naming convention: desktop as a service, business process as a service, test environment as a service, communication as a service.  The pricing model for SaaS applications is typically a monthly or yearly flat fee per user, so price is scalable and adjustable if users are added or removed at any point.  Examples of SaaS include: Google Apps, Microsoft Office 365, Onlive, GT Nexus, Marketo, and TradeCard.
  • 9. NaaS Network as a Service  A category of cloud services where the capability provided to the cloud service user is to use network/transport connectivity services and/or inter-cloud network connectivity services. NaaS involves the optimization of resource allocations by considering network and computing resources as a unified whole.  Traditional NaaS services include flexible and extended VPN, and bandwidth on demand. NaaS concept materialization also includes the provision of a virtual network service by the owners of the network infrastructure to a third party (VNP – VNO)
  • 10. Four Common Deployment Models  Public Cloud  Community Cloud  A Classroom would be a good example of a Community Cloud  Hybrid Cloud  Public/Private Components  Private Cloud  VPC – Virtual Private Cloud
  • 11. Privacy Issues  The cloud model has been criticized by privacy advocates for the greater ease in which the companies hosting the cloud services control, thus, can monitor at will, whether permitted or not by their customers, the communication between the host company and her end-user, as well as her stored data. Instances such as the secret NSA program, working with AT&T, and Verizon, which recorded over 10 million telephone calls between American citizens, causes uncertainty among privacy advocates, and the greater powers it gives to telecommunication companies to monitor user activity.[68] Using a cloud service provider (CSP) can complicate privacy of data because of the extent to which virtualization for cloud processing (virtual machines) and cloud storage are used to implement cloud service. CSP operations, customer or tenant data may not remain on the same system, or in the same data center or even within the same provider's cloud; this can lead to legal concerns over jurisdiction. While there have been efforts (such as US-EU Safe Harbor) to "harmonise" the legal environment, providers such as Amazon still cater to major markets (typically the United States and the European Union) by deploying local infrastructure and allowing customers to select "availability zones." Cloud computing poses privacy concerns because the service provider may access the data that is on the cloud at any point in time. They could accidentally or deliberately alter or even delete information.  Postage and delivery services company Pitney Bowes launched Volly, a cloud-based, digital mailbox service to leverage its communication management assets. They also faced the technical challenge of providing strong data security and privacy. However, they were able to address the same concern by applying customized, application-level security, including encryption.
  • 12. Compliance Issues  In order to obtain compliance with regulations including FISMA, HIPAA, and SOX in the United States, the Data Protection Directive in the EU and the credit card industry's PCI DSS, users may have to adopt community or hybrid deployment modes that are typically more expensive and may offer restricted benefits. This is how Google is able to "manage and meet additional government policy requirements beyond FISMA" and Rackspace Cloud or QubeSpace are able to claim PCI compliance.  Many providers also obtain a SAS 70 Type II audit, but this has been criticised on the grounds that the hand- picked set of goals and standards determined by the auditor and the auditee are often not disclosed and can vary widely. Providers typically make this information available on request, under non-disclosure agreement.  Customers in the EU contracting with cloud providers outside the EU/EEA have to adhere to the EU regulations on export of personal data.  U.S. Federal Agencies have been directed by the Office of Management and Budget to use a process called FedRAMP (Federal Risk and Authorization Management Program) to assess and authorize cloud products and services. Federal CIO Steven VanRoekel issued a memorandum to federal agency Chief Information Officers on December 8, 2011 defining how federal agencies should use FedRAMP. FedRAMP consists of a subset of NIST Special Publication 800-53 security controls specifically selected to provide protection in cloud environments. A subset has been defined for the FIPS 199 low categorization and the FIPS 199 moderate categorization. The FedRAMP program has also established a Joint Accreditation Board (JAB) consisting of Chief Information Officers from DoD, DHS and GSA. The JAB is responsible for establishing accreditation standards for 3rd party organizations who will perform the assessments of cloud solutions. The JAB will also review authorization packages and may grant provisional authorization (to operate). The federal agency consuming the service will still have the final responsibility for final authority to operate
  • 13. Legal Issues  As with other changes in the landscape of computing, certain legal issues arise with cloud computing, including trademark infringement, security concerns and sharing of propriety data resources.  The Electronic Frontier Foundation has criticized the United States government for considering during the Megaupload seizure process that people lose property rights by storing data on a cloud computing service.  One important but not often mentioned problem with cloud computing is the problem of whom is in "possession" of the data. If a cloud company is the possessor of the data, the possessor has certain legal rights. If the cloud company is the "custodian" of the data, then a different set of rights would apply. The next problem in the legalities of cloud computing is the problem of legal ownership of the data. Many Terms of Service agreements are silent on the question of ownership
  • 14. Security Issues  As cloud computing is achieving increased popularity, concerns are being voiced about the security issues introduced through adoption of this new model. The effectiveness and efficiency of traditional protection mechanisms are being reconsidered as the characteristics of this innovative deployment model can differ widely from those of traditional architectures.[90] An alternative perspective on the topic of cloud security is that this is but another, although quite broad, case of "applied security" and that similar security principles that apply in shared multi-user mainframe security models apply with cloud security.  The relative security of cloud computing services is a contentious issue that may be delaying its adoption. Physical control of the Private Cloud equipment is more secure than having the equipment off site and under someone else’s control. Physical control and the ability to visually inspect the data links and access ports is required in order to ensure data links are not compromised. Issues barring the adoption of cloud computing are due in large part to the private and public sectors' unease surrounding the external management of security-based services. It is the very nature of cloud computing-based services, private or public, that promote external management of provided services. This delivers great incentive to cloud computing service providers to prioritize building and maintaining strong management of secure services.[93] Security issues have been categorised into sensitive data access, data segregation, privacy, bug exploitation, recovery, accountability, malicious insiders, management console security, account control, and multi-tenancy issues. Solutions to various cloud security issues vary, from cryptography, particularly public key infrastructure (PKI), to use of multiple cloud providers, standardisation of APIs, and improving virtual machine support and legal support.  Cloud computing offers many benefits, but it also is vulnerable to threats. As the uses of cloud computing increase, it is highly likely that more criminals will try to find new ways to exploit vulnerabilities in the system. There are many underlying challenges and risks in cloud computing that increase the threat of data being compromised. To help mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data; establishes trusted foundation to secure the platform and infrastructure; and builds higher assurance into auditing to strengthen compliance. Security concerns must be addressed in order to establish trust in cloud computing technology.
  • 15. Case Study – US Patriot Act  From ZDNet.Com  "Microsoft believes that its customers should control their own information to the extent possible. Accordingly, if law enforcement approaches Microsoft directly for information hosted on its systems for its enterprise customers, Microsoft will try to redirect law enforcement to the customer to afford it the opportunity to decide how to respond.―  Any company that is wholly-owned by a U.S.-based corporation cannot guarantee that the data will not leave its customer-designated datacenters or servers. Google would not budge from its first and final response, and Microsoft could not offer guarantees to not move data outside the EU under any circumstances.  These subsidiary companies and their U.S.-parent corporations cannot provide the assurances that data is safe in the UK or the EEA, because the USA PATRIOT Act not only affects the U.S.-based corporations but also their worldwide wholly-owned subsidiary companies based within and outside the European Union.
  • 16. IT Governance Issues  The introduction of cloud computing requires an appropriate IT governance model to ensure a secured computing environment and to comply with all relevant organizational information technology policies. As such, organizations need a set of capabilities that are essential when effectively implementing and managing cloud services, including demand management, relationship management, data security management, application lifecycle management, risk and compliance management.
  • 17. Security Issues  The relative security of cloud computing services is a contentious issue that may be delaying its adoption. Physical control of the Private Cloud equipment is more secure than having the equipment off site and under someone else’s control. Physical control and the ability to visually inspect the data links and access ports is required in order to ensure data links are not compromised. Issues barring the adoption of cloud computing are due in large part to the private and public sectors' unease surrounding the external management of security-based services. It is the very nature of cloud computing-based services, private or public, that promote external management of provided services. This delivers great incentive to cloud computing service providers to prioritize building and maintaining strong management of secure services. Security issues have been categorised into sensitive data access, data segregation, privacy, bug exploitation, recovery, accountability, malicious insiders, management console security, account control, and multi-tenancy issues. Solutions to various cloud security issues vary, from cryptography, particularly public key infrastructure (PKI), to use of multiple cloud providers, standardisation of APIs, and improving virtual machine support and legal support.  Cloud computing offers many benefits, but it also is vulnerable to threats. As the uses of cloud computing increase, it is highly likely that more criminals will try to find new ways to exploit vulnerabilities in the system. There are many underlying challenges and risks in cloud computing that increase the threat of data being compromised. To help mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data; establishes trusted foundation to secure the platform and infrastructure; and builds higher assurance into auditing to strengthen compliance. Security concerns must be addressed in order to establish trust in cloud computing technology.
  • 18. Questions?  Please feel free to ask any questions  Sources – Wikipedia, ZDNet, Amazon, Google, Microsoft, AFDnet.

Editor's Notes

  1. http://www.zdnet.com/blog/igeneration/case-study-how-the-usa-patriot-act-can-be-used-to-access-eu-data/8805http://www.aidanfinn.com/?p=11187