SlideShare une entreprise Scribd logo
1  sur  10
Netsec Discussion Session
Cloud Computing Overview &
        Research Directions
                     04 March, 2011



                      Muhammad Nasir Mumtaz Bhutta
          Centre for Communication Systems Research
                                  University of Surrey
                                     Guildford, Surrey
                                            GU2 7XH
                       Email: m.bhutta@surrey.ac.uk,
                                  Tel: 01483 68 3036

                                       www.surrey.ac.uk
Cloud Computing

    • Major Commercial Success for provision of
      managed services and resources.
    • Will remain in focus due to:
       – Reduce Management overhead
       – Global Market. (businesses can sell their services at
         low cost e.g. IT outsourcing).
    • Lot of investment in all over the world, to
      provide:
       – Enhanced Service Provision
       – Consultancy to migrate businesses
2                                               www.ee.surrey.ac.uk/CCSR
Technical Overview




3                        www.ee.surrey.ac.uk/CCSR
Technological Aspects

    •   Virtualization
    •   Multi Tenancy
    •   Security, Privacy and Compliance
    •   Data Management
    •   Programming and APIs
    •   Metering
    •   Tools

4                                     www.ee.surrey.ac.uk/CCSR
Non-Functional Aspects




5                            www.ee.surrey.ac.uk/CCSR
Economic Aspects




6                      www.ee.surrey.ac.uk/CCSR
Technological Aspects




7                           www.ee.surrey.ac.uk/CCSR
Strengths & Weaknesses




8                            www.ee.surrey.ac.uk/CCSR
Opportunities and Threats




9                               www.ee.surrey.ac.uk/CCSR
Thanks for listening !




               »Questions ?




10                            www.ee.surrey.ac.uk/CCSR

Contenu connexe

Similaire à Cloud computing overview & current research

Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
inevitablecloud
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
Tonny Omwansa
 
HTC ITMR - Latest over view - V2
HTC ITMR - Latest over view - V2HTC ITMR - Latest over view - V2
HTC ITMR - Latest over view - V2
Mohammed Samiuddin
 
Htc itmr latest over view - v2
Htc itmr   latest over view - v2Htc itmr   latest over view - v2
Htc itmr latest over view - v2
Mohammed Samiuddin
 

Similaire à Cloud computing overview & current research (20)

Cloud technologies
Cloud technologiesCloud technologies
Cloud technologies
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Csc Company Profile
Csc Company ProfileCsc Company Profile
Csc Company Profile
 
Major assignment slides group 4
Major assignment slides   group 4Major assignment slides   group 4
Major assignment slides group 4
 
Cloud value in cash management
Cloud value in cash managementCloud value in cash management
Cloud value in cash management
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
 
TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00
 
Big Data LDN 2018: A LOOK INSIDE APPLIED MACHINE LEARNING
Big Data LDN 2018: A LOOK INSIDE APPLIED MACHINE LEARNINGBig Data LDN 2018: A LOOK INSIDE APPLIED MACHINE LEARNING
Big Data LDN 2018: A LOOK INSIDE APPLIED MACHINE LEARNING
 
EXTENT-2016: Trading Technology Trends and Innovation
EXTENT-2016: Trading Technology Trends and InnovationEXTENT-2016: Trading Technology Trends and Innovation
EXTENT-2016: Trading Technology Trends and Innovation
 
Grid07 8 Osborne
Grid07 8 OsborneGrid07 8 Osborne
Grid07 8 Osborne
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
 
HTC ITMR - Latest over view - V2
HTC ITMR - Latest over view - V2HTC ITMR - Latest over view - V2
HTC ITMR - Latest over view - V2
 
The Future of Data Center Engineering Trends and Innovations.pdf
The Future of Data Center Engineering Trends and Innovations.pdfThe Future of Data Center Engineering Trends and Innovations.pdf
The Future of Data Center Engineering Trends and Innovations.pdf
 
Htc itmr latest over view - v2
Htc itmr   latest over view - v2Htc itmr   latest over view - v2
Htc itmr latest over view - v2
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
Future Commerce 2019
Future Commerce 2019 Future Commerce 2019
Future Commerce 2019
 
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MODMr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
 

Plus de Nasir Bhutta

Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 

Plus de Nasir Bhutta (13)

Blockchain for Interdisciplinary Research
Blockchain for Interdisciplinary ResearchBlockchain for Interdisciplinary Research
Blockchain for Interdisciplinary Research
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 
secure smart cities
 secure smart cities secure smart cities
secure smart cities
 
Ccsit cyberlympics 2017 workshop 3 - presentation
Ccsit cyberlympics 2017  workshop 3 - presentationCcsit cyberlympics 2017  workshop 3 - presentation
Ccsit cyberlympics 2017 workshop 3 - presentation
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Different types of networks
Different types of networksDifferent types of networks
Different types of networks
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet Protocols
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Cloud computing overview & current research

  • 1. Netsec Discussion Session Cloud Computing Overview & Research Directions 04 March, 2011 Muhammad Nasir Mumtaz Bhutta Centre for Communication Systems Research University of Surrey Guildford, Surrey GU2 7XH Email: m.bhutta@surrey.ac.uk, Tel: 01483 68 3036 www.surrey.ac.uk
  • 2. Cloud Computing • Major Commercial Success for provision of managed services and resources. • Will remain in focus due to: – Reduce Management overhead – Global Market. (businesses can sell their services at low cost e.g. IT outsourcing). • Lot of investment in all over the world, to provide: – Enhanced Service Provision – Consultancy to migrate businesses 2 www.ee.surrey.ac.uk/CCSR
  • 3. Technical Overview 3 www.ee.surrey.ac.uk/CCSR
  • 4. Technological Aspects • Virtualization • Multi Tenancy • Security, Privacy and Compliance • Data Management • Programming and APIs • Metering • Tools 4 www.ee.surrey.ac.uk/CCSR
  • 5. Non-Functional Aspects 5 www.ee.surrey.ac.uk/CCSR
  • 6. Economic Aspects 6 www.ee.surrey.ac.uk/CCSR
  • 7. Technological Aspects 7 www.ee.surrey.ac.uk/CCSR
  • 8. Strengths & Weaknesses 8 www.ee.surrey.ac.uk/CCSR
  • 9. Opportunities and Threats 9 www.ee.surrey.ac.uk/CCSR
  • 10. Thanks for listening ! »Questions ? 10 www.ee.surrey.ac.uk/CCSR