SlideShare une entreprise Scribd logo
1  sur  23
CONTENTSCONTENTS
 Introduction
 Structure
 Need for Cloud Computing
 Categories
 Layers
 Architecture & Working
 Cloud Storage
 Storage Architecture
 Reference Models on cloud
 Data Deployment Models
 Cloud Security
 Infrastructure Security
 Authentication
 Conclusion
 References
What is Cloud ????
 Term cloud is used as a metaphor for internet.
 Cloud computing relies on sharing hardware and
software resources over a network rather than on local
servers or personal devices. This network of servers
and connections is collectively known as the cloud.
 The cloud is a next Generation platform that
provides dynamic resource pools, virtualization, and
high availability.
Individuals Corporations Non-Commercial
Cloud Middle Ware
Storage
Provisioning
OS
Provisioning
Network
Provisioning
Service(apps)
Provisioning
SLA(monitor),
Security, Billing,
Payment
Services Storage Network OS
Resources
Cloud computing
 Cloud computing is how data is accessed using
remote servers via Internet.
 Cloud computing is internet based computing, where
by shared resources, software and information are proved
to computer and other devices on demand, like the
electricity grid.
 It has a business application.
 Cloud computing describes both a platform and a type
of application. A cloud computing platform dynamically
provisions, configures, reconfigures, and deprovisions
servers as needed.
Why Cloud Computing?
 Hide complexity of IT infrastructure management
 Massive configurability
 Reliability
 High Performance
 Specifiable configurability
 Low cost compared to dedicated infrastructure.
Categories
Cloud Computing - layers
Cloud computing Architecture
The two most components of cloud
computing architecture are
1)the front end
2) the back end
 The front end is the part seen by the
client, i.e. the computer user.
 The back end of the cloud computing
architecture is the ‘cloud’ itself,
comprising various computers, servers
and data storage devices.
How do they work?
Cloud Storage
• User send the copies of data
files he wants to store to the
server.
• The user can retrieve this
stored data from the server
as and when required.
• There is only one data
server needed to be
connected to the internet.
Cloud Storage
Architecture
A typical cloud
storage system
architecture
includes a master
control server and
several storage
servers, as shown
in the fig.
Cloud Storage Reference Model
1. Public Cloud Storage :
∗ Data offered by third party vender.
1. Private Cloud Storage:
∗ Cloud is dedicated to single organization.
1. Hybrid Cloud Storage:
∗ Combination of public and private storage.
1. Community Cloud Storage:
∗ Shared by several organizations having same policies.
Data Deployment models on
Cloud
• Cloud computing can provide infinite computing resources on
demand due to its high scalability in nature, which eliminates the
needs for Cloud service providers to plan far ahead on hardware
provisioning.
• The cloud gives access to the data but the challenge is to ensure
that only authorized entities have to access the data.
Security in Cloud Computing
∗ Data-in-Transit
‐ Confidentiality and integrity using secured protocol
‐ Communication between the two hosts is identified,
authenticated, authorized, and private.
∗ Data-at-Rest
‐ data is protected by strong encryption and the key is not
present on the media itself .
∗ Data Lineage
‐ Knowing when and where the data was located within cloud
is important for audit purposes.
Aspects of Data Security
* Data Provenance:
‐ Computational accuracy and data integrity
‐ to control access to information and computing resource
* Data Remanence:
‐ Inadvertent disclosure of sensitive information is possible.
* Multi-cloud
‐ Spread the risk
‐Increase redundancy per application
‐Increase chance of mission completion for critical applications
∗ Virtual Cloud Hosting :
‐ offering secured and reliable low cost solutions to cloud
computing clients, round the globe.
‐ maintain the security for every website they cater to
* Cloud Firewall :
‐ It can collect detailed information threats on the Internet
constantly, including the continuous attacks, botnet
harvest , malware outbreaks .
1.Network Level:
‐ Ensuring confidentiality and integrity of your organization’s data‐in‐
transit to and from your public cloud provider
2.Application Level:
‐ End user security
‐ Responsibility for Web application security in the cloud
‐ implements testing and acceptance procedures for outsourced
application code
Infrastructure Security
∗ Identity Management Module
∗ In this approach, an identity has identifiers or attributes that
identify and define the user. The notable idea of user‐centric
approach allows users to control their own digital identities
and also takes away the complexity of IDM from the
enterprises, therefore allowing them to focus on their own
functions.
Authentication
Conclusion
Storage of data on the cloud redefines the way
that we construct, access, and manage storage within
an enterprise. Some kind of data is more preferable
to be stored on the cloud than others.
Data stored on clouds is more SECURE than
those stored on transient servers.
References
 www.wikipedia.com
 www.infoworld.com/article/15FE-cloud-computing-
reality_1.html
 www.wiki.cloudcommunity.org/wiki/CloudComputing:Bill
_of_Rights
 www.davidchappell.com/CloudPlatforms--Chappell. PDF
 www.amazon.com
 www.salesforce.com
 www.google.com
 Chip Computer Magazine,
Thank
You !!!

Contenu connexe

Tendances

Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutionMajid Hajibaba
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxJaya Silwal
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureMonishaNehkal
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage pptNaga Dinesh
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architectureMohammad Ilyas Malik
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centersbega karadza
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationVivek Ravindran
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud ComputingPravin Sable
 

Tendances (20)

Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centers
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Similaire à CLOUD COMPUTING AND STORAGE

Similaire à CLOUD COMPUTING AND STORAGE (20)

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Scope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptxScope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptx
 
Clouding computing
Clouding computingClouding computing
Clouding computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Unit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptxUnit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Cloud-Computing.pptx
Cloud-Computing.pptxCloud-Computing.pptx
Cloud-Computing.pptx
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 

Plus de Shalini Toluchuri

Plus de Shalini Toluchuri (6)

Virtual migration cloud
Virtual migration cloudVirtual migration cloud
Virtual migration cloud
 
Reserch wearable devices ppt
Reserch wearable devices pptReserch wearable devices ppt
Reserch wearable devices ppt
 
GSM & CDMA
GSM & CDMAGSM & CDMA
GSM & CDMA
 
GSM
GSM GSM
GSM
 
GSM & CDMA TECHNOL
GSM & CDMA TECHNOLGSM & CDMA TECHNOL
GSM & CDMA TECHNOL
 
Contributers Identity
Contributers IdentityContributers Identity
Contributers Identity
 

Dernier

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

CLOUD COMPUTING AND STORAGE

  • 1.
  • 2. CONTENTSCONTENTS  Introduction  Structure  Need for Cloud Computing  Categories  Layers  Architecture & Working  Cloud Storage  Storage Architecture  Reference Models on cloud  Data Deployment Models  Cloud Security  Infrastructure Security  Authentication  Conclusion  References
  • 3. What is Cloud ????  Term cloud is used as a metaphor for internet.  Cloud computing relies on sharing hardware and software resources over a network rather than on local servers or personal devices. This network of servers and connections is collectively known as the cloud.  The cloud is a next Generation platform that provides dynamic resource pools, virtualization, and high availability.
  • 4. Individuals Corporations Non-Commercial Cloud Middle Ware Storage Provisioning OS Provisioning Network Provisioning Service(apps) Provisioning SLA(monitor), Security, Billing, Payment Services Storage Network OS Resources
  • 5. Cloud computing  Cloud computing is how data is accessed using remote servers via Internet.  Cloud computing is internet based computing, where by shared resources, software and information are proved to computer and other devices on demand, like the electricity grid.  It has a business application.  Cloud computing describes both a platform and a type of application. A cloud computing platform dynamically provisions, configures, reconfigures, and deprovisions servers as needed.
  • 6. Why Cloud Computing?  Hide complexity of IT infrastructure management  Massive configurability  Reliability  High Performance  Specifiable configurability  Low cost compared to dedicated infrastructure.
  • 9. Cloud computing Architecture The two most components of cloud computing architecture are 1)the front end 2) the back end  The front end is the part seen by the client, i.e. the computer user.  The back end of the cloud computing architecture is the ‘cloud’ itself, comprising various computers, servers and data storage devices.
  • 10. How do they work?
  • 11. Cloud Storage • User send the copies of data files he wants to store to the server. • The user can retrieve this stored data from the server as and when required. • There is only one data server needed to be connected to the internet.
  • 12. Cloud Storage Architecture A typical cloud storage system architecture includes a master control server and several storage servers, as shown in the fig.
  • 14. 1. Public Cloud Storage : ∗ Data offered by third party vender. 1. Private Cloud Storage: ∗ Cloud is dedicated to single organization. 1. Hybrid Cloud Storage: ∗ Combination of public and private storage. 1. Community Cloud Storage: ∗ Shared by several organizations having same policies. Data Deployment models on Cloud
  • 15. • Cloud computing can provide infinite computing resources on demand due to its high scalability in nature, which eliminates the needs for Cloud service providers to plan far ahead on hardware provisioning. • The cloud gives access to the data but the challenge is to ensure that only authorized entities have to access the data. Security in Cloud Computing
  • 16. ∗ Data-in-Transit ‐ Confidentiality and integrity using secured protocol ‐ Communication between the two hosts is identified, authenticated, authorized, and private. ∗ Data-at-Rest ‐ data is protected by strong encryption and the key is not present on the media itself . ∗ Data Lineage ‐ Knowing when and where the data was located within cloud is important for audit purposes. Aspects of Data Security
  • 17. * Data Provenance: ‐ Computational accuracy and data integrity ‐ to control access to information and computing resource * Data Remanence: ‐ Inadvertent disclosure of sensitive information is possible. * Multi-cloud ‐ Spread the risk ‐Increase redundancy per application ‐Increase chance of mission completion for critical applications
  • 18. ∗ Virtual Cloud Hosting : ‐ offering secured and reliable low cost solutions to cloud computing clients, round the globe. ‐ maintain the security for every website they cater to * Cloud Firewall : ‐ It can collect detailed information threats on the Internet constantly, including the continuous attacks, botnet harvest , malware outbreaks .
  • 19. 1.Network Level: ‐ Ensuring confidentiality and integrity of your organization’s data‐in‐ transit to and from your public cloud provider 2.Application Level: ‐ End user security ‐ Responsibility for Web application security in the cloud ‐ implements testing and acceptance procedures for outsourced application code Infrastructure Security
  • 20. ∗ Identity Management Module ∗ In this approach, an identity has identifiers or attributes that identify and define the user. The notable idea of user‐centric approach allows users to control their own digital identities and also takes away the complexity of IDM from the enterprises, therefore allowing them to focus on their own functions. Authentication
  • 21. Conclusion Storage of data on the cloud redefines the way that we construct, access, and manage storage within an enterprise. Some kind of data is more preferable to be stored on the cloud than others. Data stored on clouds is more SECURE than those stored on transient servers.
  • 22. References  www.wikipedia.com  www.infoworld.com/article/15FE-cloud-computing- reality_1.html  www.wiki.cloudcommunity.org/wiki/CloudComputing:Bill _of_Rights  www.davidchappell.com/CloudPlatforms--Chappell. PDF  www.amazon.com  www.salesforce.com  www.google.com  Chip Computer Magazine,