SlideShare une entreprise Scribd logo
1  sur  9
Cloud Computing and Data Security

Presented By:
Prem regmi
Rahul Panjiyar
Ram Bahadur Gharti
Cloud Computing
• Storing and accessing data and programs over
Internet.
• Practice of using remote servers on the internet to
manage, store and process data instead of using a
personal computer.
Cloud computing is a general term that
is better divided into three categories:
• Infrastructure-as-a-Service providing servers and
storage on demand with the consumer paying
accordingly.
• Platform-as-a-Service allows for the construction
of applications within a provider’s framework,
like Google’s App Engine.
• Software-as-a-Service enables customers to use
an application on demand via a browser. Dropbox
Why Cloud Computing?
• can allow a user to access applications and data from any
computer at any time
• reduces the need for companies to purchase top-of-the-line
servers and hardware or hire people to run them since it is
all maintained by a third party
• Software licenses do not have to be purchased for every
user as the cloud stores and runs the software remotely.
• Data can also be stored with cloud computing so
companies do not have to house servers and databases
themselves
• By centralizing memory, bandwidth, storage & processing in
an off-site environment for a fee, cloud computing can
significantly reduce costs
• Goggle Docs, YouTube, Online file storage,facebook,gmail
etc are the examples of cloud computing where you can
access your stored data from any computer with internet
access and they are widely used by many people worldwide
Data Security Questions
As data is save in cloud not in user hard drive there are
many questions
• Who is Managing My Data?
• Is the Data Secured?
• Where is the Data Actually Located?
• If we choose to put sensitive or protected data in the
cloud, how well does the cloud provider’s security
policies and procedures align with our organizations?
• Who will have access to my data?
• What will happen to my data if I decide to close my
account?
Data Security in Cloud Computing
There are 3 types of different layers of data security in cloud
computing.
1. Physical layer security
it serve as an data center, which includes biometric
scanning, finger prints and voice recognition.
For eg. Building itself is a physical data security. It is design to
stand against hurricane, rain, earthquake etc.
2. Logical layer security
integrated design of networks.
firewalls.
3. Methodological layer security
This includes passwords, controlled environment and
encrypted form.
Cloud Computing Ontology(cocoon)
Thank You!

Contenu connexe

Tendances

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Teja Babu
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Docu box intro_12-07-17
Docu box intro_12-07-17Docu box intro_12-07-17
Docu box intro_12-07-17MikeSadowski6
 
microsoftazure.presentation
microsoftazure.presentationmicrosoftazure.presentation
microsoftazure.presentationakshay kohli
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesPrakhyath Rai
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemsRavi Yasas
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityMamta Saxena
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceAsim Kumar Pathak
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000Van Pham
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber SecurityNiki Upadhyay
 
Cloud Computing Courses in Pune
Cloud Computing Courses in PuneCloud Computing Courses in Pune
Cloud Computing Courses in PuneClassboat.com
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitygangal
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education SectorWinastwan Gora
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkRohini SharmaOhlan
 

Tendances (19)

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Docu box intro_12-07-17
Docu box intro_12-07-17Docu box intro_12-07-17
Docu box intro_12-07-17
 
microsoftazure.presentation
microsoftazure.presentationmicrosoftazure.presentation
microsoftazure.presentation
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
 
cloud abstract
cloud abstractcloud abstract
cloud abstract
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud Computing Courses in Pune
Cloud Computing Courses in PuneCloud Computing Courses in Pune
Cloud Computing Courses in Pune
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education Sector
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer network
 

En vedette

En vedette (12)

електрик
електрикелектрик
електрик
 
Catholic identity dr. vanders
Catholic identity dr. vandersCatholic identity dr. vanders
Catholic identity dr. vanders
 
Catholic identity dr. vanders
Catholic identity dr. vandersCatholic identity dr. vanders
Catholic identity dr. vanders
 
Diwali
DiwaliDiwali
Diwali
 
Tutores 2012
Tutores 2012Tutores 2012
Tutores 2012
 
Behaviour driven development present
Behaviour driven development presentBehaviour driven development present
Behaviour driven development present
 
1Us Application - Quick Pitch
1Us Application - Quick Pitch1Us Application - Quick Pitch
1Us Application - Quick Pitch
 
Company profile
Company profileCompany profile
Company profile
 
Gás natural: perspectiva e utilização
Gás natural: perspectiva e utilizaçãoGás natural: perspectiva e utilização
Gás natural: perspectiva e utilização
 
Prueba diagnostica 02
Prueba diagnostica 02Prueba diagnostica 02
Prueba diagnostica 02
 
Presentacion pnle
Presentacion pnlePresentacion pnle
Presentacion pnle
 
In situ emerita_rodriguez
In situ emerita_rodriguezIn situ emerita_rodriguez
In situ emerita_rodriguez
 

Similaire à Cloud Computing and Data Security: Understanding Risks and Best Practices

Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing NASIMTAHIR2
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxDeveshKhandare
 
Leverage the Best Cloud Storage
Leverage the Best Cloud StorageLeverage the Best Cloud Storage
Leverage the Best Cloud Storageifcloudus
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsGaruda Trainings
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusNANDINI SHARMA
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfifcloudus
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfifcloudus
 
Public Cloud Model.pptx
Public Cloud Model.pptxPublic Cloud Model.pptx
Public Cloud Model.pptxchinmidbz2
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 

Similaire à Cloud Computing and Data Security: Understanding Risks and Best Practices (20)

Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Leverage the Best Cloud Storage
Leverage the Best Cloud StorageLeverage the Best Cloud Storage
Leverage the Best Cloud Storage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabus
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdf
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdf
 
Public Cloud Model.pptx
Public Cloud Model.pptxPublic Cloud Model.pptx
Public Cloud Model.pptx
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Cloud Computing and Data Security: Understanding Risks and Best Practices

  • 1. Cloud Computing and Data Security Presented By: Prem regmi Rahul Panjiyar Ram Bahadur Gharti
  • 2. Cloud Computing • Storing and accessing data and programs over Internet. • Practice of using remote servers on the internet to manage, store and process data instead of using a personal computer.
  • 3.
  • 4. Cloud computing is a general term that is better divided into three categories: • Infrastructure-as-a-Service providing servers and storage on demand with the consumer paying accordingly. • Platform-as-a-Service allows for the construction of applications within a provider’s framework, like Google’s App Engine. • Software-as-a-Service enables customers to use an application on demand via a browser. Dropbox
  • 5. Why Cloud Computing? • can allow a user to access applications and data from any computer at any time • reduces the need for companies to purchase top-of-the-line servers and hardware or hire people to run them since it is all maintained by a third party • Software licenses do not have to be purchased for every user as the cloud stores and runs the software remotely. • Data can also be stored with cloud computing so companies do not have to house servers and databases themselves • By centralizing memory, bandwidth, storage & processing in an off-site environment for a fee, cloud computing can significantly reduce costs • Goggle Docs, YouTube, Online file storage,facebook,gmail etc are the examples of cloud computing where you can access your stored data from any computer with internet access and they are widely used by many people worldwide
  • 6. Data Security Questions As data is save in cloud not in user hard drive there are many questions • Who is Managing My Data? • Is the Data Secured? • Where is the Data Actually Located? • If we choose to put sensitive or protected data in the cloud, how well does the cloud provider’s security policies and procedures align with our organizations? • Who will have access to my data? • What will happen to my data if I decide to close my account?
  • 7. Data Security in Cloud Computing There are 3 types of different layers of data security in cloud computing. 1. Physical layer security it serve as an data center, which includes biometric scanning, finger prints and voice recognition. For eg. Building itself is a physical data security. It is design to stand against hurricane, rain, earthquake etc. 2. Logical layer security integrated design of networks. firewalls. 3. Methodological layer security This includes passwords, controlled environment and encrypted form.