0% found this document useful (0 votes)
27 views

Cloud Computing: Madhusudan Goyal M. Sai Pavan Kumar Satya Suraj Patra Dipanjyoti Mishra Ashutosh Kumar

This document provides an overview of cloud computing. It discusses common cloud characteristics like ubiquitous network access, on-demand self-service, rapid elasticity, and pay-as-you-go models. The document also describes cloud computing architecture including SaaS, PaaS, and IaaS models. It compares private, public and hybrid clouds and discusses their differences in tenancy, accessibility, data center location, and management. The document outlines some disadvantages of cloud computing and discusses effective privacy components, emerging threats, and recent trends like the surge in demand for cloud experts and the rise of SaaS.

Uploaded by

Pragyan Rout
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Cloud Computing: Madhusudan Goyal M. Sai Pavan Kumar Satya Suraj Patra Dipanjyoti Mishra Ashutosh Kumar

This document provides an overview of cloud computing. It discusses common cloud characteristics like ubiquitous network access, on-demand self-service, rapid elasticity, and pay-as-you-go models. The document also describes cloud computing architecture including SaaS, PaaS, and IaaS models. It compares private, public and hybrid clouds and discusses their differences in tenancy, accessibility, data center location, and management. The document outlines some disadvantages of cloud computing and discusses effective privacy components, emerging threats, and recent trends like the surge in demand for cloud experts and the rise of SaaS.

Uploaded by

Pragyan Rout
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Cloud Computing

Madhusudan Goyal
UM17337
M. Sai Pavan Kumar
UM17338
Satya Suraj Patra
UM17364
Dipanjyoti Mishra
UM17332
Ashutosh Kumar
UM17328
What is Cloud Computing
Common Cloud Characteristics
Ubiquitous network access: Anywhere, Anytime, Any
device

On demand self services

Rapid Elasticity

Pay as you go

Location independent resource pooling


Cloud Computing Architecture
Cloud Computing Architecture
Packaged Software
OS & Application Stack SAAS End Users
Servers Storage Network

OS & Application Stack PAAS Application


Servers Storage Network Developers

IAAS Infrastructure and


Servers Storage Network Network
Architects
Private Cloud Public Cloud Hybrid
Differences

Cloud
The data stored in the public
Single tenancy: there’s only the data Multi-tenancy: the data of multiple cloud is usually multi-tenant,
Tenancy of a single organization stored in the organizations in stored in a shared which means the data from
cloud. environment. multiple organizations is stored in
a shared environment.
The services running on a private
cloud can be accessed only the
only the organization itself can use anyone can use the public cloud
Exposed to the Public organization’s users, while public
the private cloud services. services.
cloud can be accessed by
anyone.
Inside the organization’s network
Anywhere on the Internet where the
for private cloud services as well
Data Center Location Inside the organization’s network. cloud service provider’s services are
as anywhere on the Internet for
located.
public cloud.
The organization itself must
The organization must have their own The cloud service provider manages
Cloud Service manage the private cloud, while
administrators managing their private the services, where the organization
Management the public cloud is managed by
cloud services. merely uses them.
the CSP.
The organization must provide
Must be provided by the organization
Hardware The CSP provides all the hardware hardware for the private cloud,
itself, which has to buy physical
Components and ensures it’s working at all times. while the hardware of CSP is
servers to build the private cloud on.
used for public cloud services
Disadvantages of Cloud computing
Control and reliability
Reliance upon network connectivity
Security and compliance
Compatibility
Unpredictable cost
Risk on information linkage
Limited features
Possibility of Redundancy
Effective Privacy components
• Auditing and forensics :- evaluating security policy,
procedures, practices, and the technical controls for
correctness and completeness
• Readiness for emerging threats:- technology
considered safe for us may be vulnerable at the
other end.
• Encryption mechanism:-
• Asymmetric encryption algorithm.
• Block cipher.
• Stream cipher
Propositions in Security
• Information-centric security:- Protection
from within.
• High-assurance remote server attestation:-
the cloud server compliance with access
control policies.
• Privacy-enhanced business intelligence :-
encryption of all cloud data.
Emerging Threats
• Spoofing threat
• Tampering with data
• Repudiation
• Information disclosure
• Denial of Service
• Elevation of privilege
Recent Trends
• Surge In Demand For Cloud Experts
With increasing rates of cloud adoption, more IT teams now require cloud expertise
in order to remain competitive.

• Hybridization Of Technology
Large organizations have partially integrated cloud software with existing on-
premise software which results in a complex hybrid system.
• Enterprises are Preferring Public Cloud Services
A survey conducted by RightScale in 2017 shows that adoption of private cloud is
flattening across all providers
• Rise of SaaS
SaaS (Software as a service) is beginning to replace traditional (and expensive) on-
premises software because it provides improved solutions without engaging in time-
consuming deployment operations.
In recent years have we seen an explosion in adoption broadly in small and medium-
sized businesses (SMBs), across a variety of industries and a spectrum of departments.
• Reduced Software Restrictions
With the increased adoption of cloud applications, hosted services allow IT teams to
control applications without restricting the user’s personal choices.

Leads To
Real World Application
Real World Application
THANK YOU

You might also like