SlideShare une entreprise Scribd logo
1  sur  16


Cloud computing is a model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider
interaction.
NIST

Shared Infrastructure
Dynamic Provisioning
Managed Metering
Network Access
Cloud computing is an evolving paradigm. It is a potential technology to
change IT Services. The elasticity of resources plays an important part in
cloud computing.
Cloud computing provides,
OnDemand
Services
Broad
Network
Access

Measured
Services

Resource

Rapid

Pooling

Elasticity
Public Cloud

Private Cloud
Community Cloud
Hybrid Cloud
SaaS

IaaS

PaaS

Softyware as a Service

Platform as a Service

Infrastructure as a Service

-ERP

-Application Developement

-Caching

-CRM

-Web streaming

-Networking

-Email

-Decision Support

-Security

-Collaborative

CONSUME

-System Management

BUILD

HOST
Easy Connectivity
Inexpensive
Efficient Storage and Computing
Widespread Availability
Reliable and Redundant


Cloud computing makes eminent sense for small scale
enterprises. With no upfront investment; it allows SMEs a cost
effective solution with their capital.



It just a flat monthly rate and you’re sorted; no need to worry
about buying those expensive hardware solutions or to take
care of scalability issues.



As per your business demands; you can scale up and down.
Cloud computing provides better functionality then a
conventional solutions which are so expensive.


Cloud computing provides mobility; be it your office or a
comfort of your own home, you can access your business
software and all you need to do is ‘Login’.



Cloud computing makes sharing a cake walk. It expands your
business boundaries.



Better resilience and security is a key feature of cloud
computing which SMEs couldn’t afford otherwise.



Cloud computing effectively cuts down the labor cost up to
15-20%.


When it comes to implying mission-critical application; large
scale enterprise gives cloud system a second thought.



As the mission-critical application has sensitive
information, vulnerability issues are higher; that’s the main
reason for large scale enterprise to not adapt cloud
computing as it still contains some deficiencies.



Though the scenario is changing these days, especially after
Microsoft office 365 adopted cloud computing.


Hybrid cloud is a solution for large scale enterprises when
affordability of public cloud and security of private cloud is
needed.



Cloud computing provides best breed of services if it is
managed well by the large scale enterprises.



Cloud computing implies “Green approach”, we are not just
talking about environment; cloud computing also cuts down
the expenditures of large scale enterprise by 30%. Energy cost
goes tremendously down by adapting cloud computing.


Cloud computing has several security loopholes which makes it
vulnerable.



Cloud computing is yet to adhere several regulatory requirements
and security laws.



As cyber policy differs from country to country, there are some
legal issues in cloud computing.



Confidentiality is the major issue in cloud system, as all the
information is stored at remote location.



Another big issue with cloud system is encryption; it is very
essential for ensuring the security of data which is yet to be
implemented.


Denial of Service attack:
Denial of service attacks are the most common hacking attacks. Hackers flood
network host by invalid requests that occupies all the resources. This ultimately
affects in responding the legitimate requests.



Authentication attack:
In hosted and virtual services, authentication is a weak point. The methods and
mechanism used to secure the authentication process are frequently targeted.



Side channel attack:
Malicious virtual machine in close proximity to host system is placed in host
system. Side channel attack has emerged as effective security threat targeting
systems. Hence resilience to side channel attack is important.



Man in middle attack:
In man in middle attack, attacker gets in the middle of our interactions with
others and eavesdrops on data coming back and forth.
Research is being done on security issues in cloud computing
system. Researchers are still discovering the security issues
that are needed to be resolved in order to provide reliable
and robust solutions.
Cloud Computing  - True Vision Technologies

Contenu connexe

Tendances

Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computinggaurav jain
 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with servicesSuresh Kumar
 
2017 Cloud Computing Primer
2017 Cloud Computing Primer2017 Cloud Computing Primer
2017 Cloud Computing PrimerRajesh Math
 
Cloud reference architecture as per nist
Cloud reference architecture as per nistCloud reference architecture as per nist
Cloud reference architecture as per nistgaurav jain
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing TSplusIndia
 
1 introduction to cloud computing
1 introduction to cloud computing1 introduction to cloud computing
1 introduction to cloud computingVaibhav Khanna
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingAllwyn24
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructureGaurav Jain
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingieeepondy
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesIntel Corporation
 
Cloud computing
Cloud computingCloud computing
Cloud computingkanchu17
 
Testing under cloud
Testing under cloudTesting under cloud
Testing under cloudgaurav jain
 

Tendances (20)

Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
2017 Cloud Computing Primer
2017 Cloud Computing Primer2017 Cloud Computing Primer
2017 Cloud Computing Primer
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud reference architecture as per nist
Cloud reference architecture as per nistCloud reference architecture as per nist
Cloud reference architecture as per nist
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
 
1 introduction to cloud computing
1 introduction to cloud computing1 introduction to cloud computing
1 introduction to cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructure
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computing
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Testing under cloud
Testing under cloudTesting under cloud
Testing under cloud
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 

Similaire à Cloud Computing - True Vision Technologies

Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing coursesndshkgowda
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉ki779521
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldCiente
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentationrichszy
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 

Similaire à Cloud Computing - True Vision Technologies (20)

Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing course
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
70 74
70 7470 74
70 74
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Cloud Computing - True Vision Technologies

  • 1.
  • 2.  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST Shared Infrastructure Dynamic Provisioning Managed Metering Network Access
  • 3. Cloud computing is an evolving paradigm. It is a potential technology to change IT Services. The elasticity of resources plays an important part in cloud computing. Cloud computing provides, OnDemand Services Broad Network Access Measured Services Resource Rapid Pooling Elasticity
  • 5.
  • 6.
  • 7. SaaS IaaS PaaS Softyware as a Service Platform as a Service Infrastructure as a Service -ERP -Application Developement -Caching -CRM -Web streaming -Networking -Email -Decision Support -Security -Collaborative CONSUME -System Management BUILD HOST
  • 8. Easy Connectivity Inexpensive Efficient Storage and Computing Widespread Availability Reliable and Redundant
  • 9.  Cloud computing makes eminent sense for small scale enterprises. With no upfront investment; it allows SMEs a cost effective solution with their capital.  It just a flat monthly rate and you’re sorted; no need to worry about buying those expensive hardware solutions or to take care of scalability issues.  As per your business demands; you can scale up and down. Cloud computing provides better functionality then a conventional solutions which are so expensive.
  • 10.  Cloud computing provides mobility; be it your office or a comfort of your own home, you can access your business software and all you need to do is ‘Login’.  Cloud computing makes sharing a cake walk. It expands your business boundaries.  Better resilience and security is a key feature of cloud computing which SMEs couldn’t afford otherwise.  Cloud computing effectively cuts down the labor cost up to 15-20%.
  • 11.  When it comes to implying mission-critical application; large scale enterprise gives cloud system a second thought.  As the mission-critical application has sensitive information, vulnerability issues are higher; that’s the main reason for large scale enterprise to not adapt cloud computing as it still contains some deficiencies.  Though the scenario is changing these days, especially after Microsoft office 365 adopted cloud computing.
  • 12.  Hybrid cloud is a solution for large scale enterprises when affordability of public cloud and security of private cloud is needed.  Cloud computing provides best breed of services if it is managed well by the large scale enterprises.  Cloud computing implies “Green approach”, we are not just talking about environment; cloud computing also cuts down the expenditures of large scale enterprise by 30%. Energy cost goes tremendously down by adapting cloud computing.
  • 13.  Cloud computing has several security loopholes which makes it vulnerable.  Cloud computing is yet to adhere several regulatory requirements and security laws.  As cyber policy differs from country to country, there are some legal issues in cloud computing.  Confidentiality is the major issue in cloud system, as all the information is stored at remote location.  Another big issue with cloud system is encryption; it is very essential for ensuring the security of data which is yet to be implemented.
  • 14.  Denial of Service attack: Denial of service attacks are the most common hacking attacks. Hackers flood network host by invalid requests that occupies all the resources. This ultimately affects in responding the legitimate requests.  Authentication attack: In hosted and virtual services, authentication is a weak point. The methods and mechanism used to secure the authentication process are frequently targeted.  Side channel attack: Malicious virtual machine in close proximity to host system is placed in host system. Side channel attack has emerged as effective security threat targeting systems. Hence resilience to side channel attack is important.  Man in middle attack: In man in middle attack, attacker gets in the middle of our interactions with others and eavesdrops on data coming back and forth.
  • 15. Research is being done on security issues in cloud computing system. Researchers are still discovering the security issues that are needed to be resolved in order to provide reliable and robust solutions.