3. TABLE OF CONTENTS
• WHAT IS CLOUD COMPUTING?
• BASIC CONCEPTS
• EDGE COMPTUING
• CLOUD SECURITY
4. • WHAT IS CLOUD COMPUTING?
Cloud computing means storing and accessing the data and
programs over the internet rather than the computer’s hard disk.
The data can be anything such as music, files, images,
documents, and many more.
5. • HISTORY
Before cloud computing emerged, there was client/server computing, centralized storage in
which all the data, software applications and all the controls reside on the server side.
The cloud symbol was used to represent networks of computing equipment in the original
ARPANET by as early as 1977and the CSNET by 1981 both predecessors to the Internet itself.
In 1999, Salesforce.com became the 1st company to enter the cloud arena, excelling the
concept of providing enterprise-level applications to end users through the Internet.
In 2002, Amazon came up with Amazon Web Services, providing services like computation,
storage, and even human intelligence.
In 2009, Google Apps and Microsoft’s Windows Azurealso started to provide cloud computing
Later on many companies like HP, Oracle, Compaq, Facebook, Twitter, Instagram and many
other social media platforms started using cloud computing.
6. • DIFFERENCE BETWEEN CLOUD STORAGE AND LOCAL
Local Storage Cloud Storage
Local Storage includes physical hardware
such as external hard drives, flash drives, and
Cloud Storage refers to any program owned
by a third party that allows you to upload
your data using the Internet.
Your data isn't accessible unless you have the
hardware with you.
Cloud storage requires an Internet connection
It is inexpensive. If you want to store a lot of information,
you’ll probably have to pay for storage.
The data is under your control. Third-party storage is vulnerable to theft and
7. Following are the characteristics of Cloud Computing:
0. Great Availability of Resources
0. On-demand Self-service
0. Easy Maintenance
0. Large Network Access
0. Automatic System
0. Pay as you go
9. • BASIC CONCEPTS
There are certain services and models working behind the scene
making the cloud computing feasible and accessible to end users.
Following are the working models of cloud computing:-
• DEPLOYMENT MODEL
• SERVICE MODEL
11. Private cloud. The cloud infrastructure is provisioned for exclusive use by a
single organization comprising multiple consumers (e.g., business units). It
may be owned, managed, and operated by the organization, a third party, or
some combination of them, and it may exist on or off premises.
Community cloud. The cloud infrastructure is provisioned for exclusive use by
a specific community of consumers from organizations that have shared
concerns (e.g., mission, security requirements, policy, and compliance
considerations). It may be owned, managed, and operated by one or more of
the organizations in the community, a third party, or some combination of
them, and it may exist on or off premises.
Public cloud. The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated by a business,
academic, or government organization, or some combination of them. It exists
on the premises of the cloud provider.
Hybrid cloud. The cloud infrastructure is a composition of two or more
distinct cloud infrastructures (private, community, or public) that remain
unique entities, but are bound together by standardized or proprietary
technology that enables data and application portability (e.g., cloud bursting
for load balancing between clouds).
13. Software as a Service (SaaS). The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure2. The applications are
accessible from various client devices through either a thin client interface, such as a
web browser (e.g., web-based email), or a program interface. The consumer does not
manage or control the underlying cloud infrastructure including network, servers,
operating systems, storage, or even individual application capabilities, with the
possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS). The capability provided to the consumer is to deploy
onto the cloud infrastructure consumer-created or acquired applications created using
programming languages, libraries, services, and tools supported by the provider.3 The
consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting
Infrastructure as a Service (IaaS). The capability provided to the consumer is to
provision processing, storage, networks, and other fundamental computing resources
where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the
underlying cloud infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select networking components
(e.g., host firewalls).
14. • EDGE COMPUTING
1.Edge computing enables data to be analysed, processed and transferred at the edge of
2.Edge computing is upgrade version as well as extension of cloud computing.
3. edge computing is useful for reduce lower latency.
4.The basic difference between edge and cloud computing lies in the place where the
data processing takes place.
5.Simply when the user store data in the cloud so there is some physical distance
between device and cloud which affected on accessing data.
6.so in this physical distance the edge computing takes place which already store some
important data from the cloud and useful for accessing data faster.
7.It include local processing.
8.Edge computing has privacy benefits, but they are not guaranteed.
9.Bandwith saving is also enabled by edge computing.
16. • CLOUD SECURITY
1.Cloud security is known as cloud computing security, consists of a set of policies
controls, technologies that works together to protect cloud-based system.
2.Cloud security can be configured to the exact needs of the business.
3.Implementation cloud security process should be joint responsibility between the
business owner and solution provider.
4.Selecting the right cloud security solution is helpful for protected your organization
from unauthorized access, data breaches and other treats.
5.Forcepoint cloud access security broker (CASB) is a complete cloud security solution that
protect cloud app and cloud data.
6.Security treats are constantly evolving and becoming more sophisticated, for this
reason it is essential to work with cloud provider.
7.Cloud provider that offers best security that has been customised for your
infrastructure and protect more.