Cloud computing

GOVERNMENT POLYTECHNIC, NAGPUR
DEPARTMENT OF INFORMATION TECHNOLOGY
CLOUD COMPUTING
TOPIC:
TABLE OF CONTENTS
• WHAT IS CLOUD COMPUTING?
• HISTORY
• CHARACTERISTICS
• ARCHITECTURE
• BASIC CONCEPTS
• EDGE COMPTUING
• CLOUD SECURITY
• ADVANTAGES
• DISADVANTAGES
• WHAT IS CLOUD COMPUTING?
Cloud computing means storing and accessing the data and
programs over the internet rather than the computer’s hard disk.
The data can be anything such as music, files, images,
documents, and many more.
• HISTORY
Before cloud computing emerged, there was client/server computing, centralized storage in
which all the data, software applications and all the controls reside on the server side.
The cloud symbol was used to represent networks of computing equipment in the original
ARPANET by as early as 1977and the CSNET by 1981 both predecessors to the Internet itself.
In 1999, Salesforce.com became the 1st company to enter the cloud arena, excelling the
concept of providing enterprise-level applications to end users through the Internet.
In 2002, Amazon came up with Amazon Web Services, providing services like computation,
storage, and even human intelligence.
In 2009, Google Apps and Microsoft’s Windows Azurealso started to provide cloud computing
enterprise applications.
Later on many companies like HP, Oracle, Compaq, Facebook, Twitter, Instagram and many
other social media platforms started using cloud computing.
• DIFFERENCE BETWEEN CLOUD STORAGE AND LOCAL
STORAGE
Local Storage Cloud Storage
Local Storage includes physical hardware
such as external hard drives, flash drives, and
CDs.
Cloud Storage refers to any program owned
by a third party that allows you to upload
your data using the Internet.
Your data isn't accessible unless you have the
hardware with you.
Cloud storage requires an Internet connection
for access.
It is inexpensive. If you want to store a lot of information,
you’ll probably have to pay for storage.
The data is under your control. Third-party storage is vulnerable to theft and
hardware failure.
Following are the characteristics of Cloud Computing:
0. Great Availability of Resources
0. On-demand Self-service
0. Easy Maintenance
0. Large Network Access
0. Availability
0. Automatic System
0. Economical
0. Security
0. Pay as you go
• CHARACTERISTICS
• ARCHITECTURE
• BASIC CONCEPTS
There are certain services and models working behind the scene
making the cloud computing feasible and accessible to end users.
Following are the working models of cloud computing:-
• DEPLOYMENT MODEL
• SERVICE MODEL
• DEPLOYMENT MODEL
Private cloud. The cloud infrastructure is provisioned for exclusive use by a
single organization comprising multiple consumers (e.g., business units). It
may be owned, managed, and operated by the organization, a third party, or
some combination of them, and it may exist on or off premises.
Community cloud. The cloud infrastructure is provisioned for exclusive use by
a specific community of consumers from organizations that have shared
concerns (e.g., mission, security requirements, policy, and compliance
considerations). It may be owned, managed, and operated by one or more of
the organizations in the community, a third party, or some combination of
them, and it may exist on or off premises.
Public cloud. The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated by a business,
academic, or government organization, or some combination of them. It exists
on the premises of the cloud provider.
Hybrid cloud. The cloud infrastructure is a composition of two or more
distinct cloud infrastructures (private, community, or public) that remain
unique entities, but are bound together by standardized or proprietary
technology that enables data and application portability (e.g., cloud bursting
for load balancing between clouds).
• SERVICE MODEL
Software as a Service (SaaS). The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure2. The applications are
accessible from various client devices through either a thin client interface, such as a
web browser (e.g., web-based email), or a program interface. The consumer does not
manage or control the underlying cloud infrastructure including network, servers,
operating systems, storage, or even individual application capabilities, with the
possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS). The capability provided to the consumer is to deploy
onto the cloud infrastructure consumer-created or acquired applications created using
programming languages, libraries, services, and tools supported by the provider.3 The
consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting
environment.
Infrastructure as a Service (IaaS). The capability provided to the consumer is to
provision processing, storage, networks, and other fundamental computing resources
where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the
underlying cloud infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select networking components
(e.g., host firewalls).
• EDGE COMPUTING
1.Edge computing enables data to be analysed, processed and transferred at the edge of
the network.
2.Edge computing is upgrade version as well as extension of cloud computing.
3. edge computing is useful for reduce lower latency.
4.The basic difference between edge and cloud computing lies in the place where the
data processing takes place.
5.Simply when the user store data in the cloud so there is some physical distance
between device and cloud which affected on accessing data.
6.so in this physical distance the edge computing takes place which already store some
important data from the cloud and useful for accessing data faster.
7.It include local processing.
8.Edge computing has privacy benefits, but they are not guaranteed.
9.Bandwith saving is also enabled by edge computing.
EXAMPLE:
a. Smart Street lights
b. Mobile device
c. Automated vehicles
• CLOUD SECURITY
1.Cloud security is known as cloud computing security, consists of a set of policies
controls, technologies that works together to protect cloud-based system.
2.Cloud security can be configured to the exact needs of the business.
3.Implementation cloud security process should be joint responsibility between the
business owner and solution provider.
4.Selecting the right cloud security solution is helpful for protected your organization
from unauthorized access, data breaches and other treats.
5.Forcepoint cloud access security broker (CASB) is a complete cloud security solution that
protect cloud app and cloud data.
6.Security treats are constantly evolving and becoming more sophisticated, for this
reason it is essential to work with cloud provider.
7.Cloud provider that offers best security that has been customised for your
infrastructure and protect more.
8.BENEFITS:
a. Centralized security
b. Reduce cost
c. Reduce administration
d. reliability
• ADVANTAGES
1. Easy implementation.
2. Accessibility.
3. No hardware required.
4. Cost per head.
5. Flexibilityfor growth.
6. Efficient recovery.
• DISADVANTAGES
1. No longer in control.
2. May not get all the features.
3. Doesn’t mean you should do away with servers.
4. No Redundancy.
5. Bandwidth issues.
THANK YOU!
QUESTIONS?
1 sur 20

Contenu connexe

Tendances(20)

Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav11.8K vues
Cloud computingCloud computing
Cloud computing
Zameerhussainzardari18 vues
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
GAURAV SINHA803 vues
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu77.5K vues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava1.5K vues
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
Anshi Bhadoria841 vues
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel1.7K vues
Cloud EncryptionCloud Encryption
Cloud Encryption
RituparnaNag7.8K vues
Cloud security Cloud security
Cloud security
Mohamed Shalash2.8K vues
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Piyush Mittal1.3K vues
Cloud computing securityCloud computing security
Cloud computing security
Gahya Pandian285 vues
Cloud ComputingCloud Computing
Cloud Computing
International School Of Management Excellence6.3K vues
Cloud computing security Cloud computing security
Cloud computing security
Teja Babu866 vues
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey1.5K vues

Similaire à Cloud computing(20)

Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
BhuvneshYadav13562 vues
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
Journal For Research211 vues
Cloud Computing Cloud Computing
Cloud Computing
seleshkumar Prajapati561 vues
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
Md Nazrul Islam Roxy635 vues
Cloud computingCloud computing
Cloud computing
Uttam Kumar472 vues
Cloud computing pptCloud computing ppt
Cloud computing ppt
Sarvesh Meena5.3K vues
Cloud managementCloud management
Cloud management
surbhi jha346 vues
Cloud computing Cloud computing
Cloud computing
Muhammad Yaqoob81 vues
Cloud-Computing.pptxCloud-Computing.pptx
Cloud-Computing.pptx
MayuriPatel39920826 vues
cloud computing basicscloud computing basics
cloud computing basics
Sweta Kumari Barnwal824 vues
Cloud computingCloud computing
Cloud computing
vinitha96257 vues
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE116 vues
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ronak patel38.4K vues
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
Mayank Aggarwal3.8K vues
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
MiltonMolla1100 vues
Cloud ComputingCloud Computing
Cloud Computing
Sandeep Singh5.1K vues
Cloud notes 1Cloud notes 1
Cloud notes 1
Prateek Soni1.9K vues

Dernier(20)

Pointers.pptxPointers.pptx
Pointers.pptx
Ananthi Palanisamy62 vues
Deutsch CrimpingDeutsch Crimping
Deutsch Crimping
Iwiss Tools Co.,Ltd15 vues
Activated sludge process .pdfActivated sludge process .pdf
Activated sludge process .pdf
8832RafiyaAltaf6 vues
Solar PVSolar PV
Solar PV
Iwiss Tools Co.,Ltd11 vues
Codes and Conventions.pptxCodes and Conventions.pptx
Codes and Conventions.pptx
IsabellaGraceAnkers6 vues
Electrical CrimpingElectrical Crimping
Electrical Crimping
Iwiss Tools Co.,Ltd19 vues
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVA
Demian Antony D'Mello58 vues
PlumbingPlumbing
Plumbing
Iwiss Tools Co.,Ltd11 vues
IWISS Catalog 2022IWISS Catalog 2022
IWISS Catalog 2022
Iwiss Tools Co.,Ltd23 vues
CHI-SQUARE ( χ2) TESTS.pptxCHI-SQUARE ( χ2) TESTS.pptx
CHI-SQUARE ( χ2) TESTS.pptx
ssusera597c514 vues
Wire Cutting & StrippingWire Cutting & Stripping
Wire Cutting & Stripping
Iwiss Tools Co.,Ltd6 vues
Sanitary Landfill- SWM.pptxSanitary Landfill- SWM.pptx
Sanitary Landfill- SWM.pptx
Vinod Nejkar5 vues

Cloud computing

  • 1. GOVERNMENT POLYTECHNIC, NAGPUR DEPARTMENT OF INFORMATION TECHNOLOGY
  • 3. TABLE OF CONTENTS • WHAT IS CLOUD COMPUTING? • HISTORY • CHARACTERISTICS • ARCHITECTURE • BASIC CONCEPTS • EDGE COMPTUING • CLOUD SECURITY • ADVANTAGES • DISADVANTAGES
  • 4. • WHAT IS CLOUD COMPUTING? Cloud computing means storing and accessing the data and programs over the internet rather than the computer’s hard disk. The data can be anything such as music, files, images, documents, and many more.
  • 5. • HISTORY Before cloud computing emerged, there was client/server computing, centralized storage in which all the data, software applications and all the controls reside on the server side. The cloud symbol was used to represent networks of computing equipment in the original ARPANET by as early as 1977and the CSNET by 1981 both predecessors to the Internet itself. In 1999, Salesforce.com became the 1st company to enter the cloud arena, excelling the concept of providing enterprise-level applications to end users through the Internet. In 2002, Amazon came up with Amazon Web Services, providing services like computation, storage, and even human intelligence. In 2009, Google Apps and Microsoft’s Windows Azurealso started to provide cloud computing enterprise applications. Later on many companies like HP, Oracle, Compaq, Facebook, Twitter, Instagram and many other social media platforms started using cloud computing.
  • 6. • DIFFERENCE BETWEEN CLOUD STORAGE AND LOCAL STORAGE Local Storage Cloud Storage Local Storage includes physical hardware such as external hard drives, flash drives, and CDs. Cloud Storage refers to any program owned by a third party that allows you to upload your data using the Internet. Your data isn't accessible unless you have the hardware with you. Cloud storage requires an Internet connection for access. It is inexpensive. If you want to store a lot of information, you’ll probably have to pay for storage. The data is under your control. Third-party storage is vulnerable to theft and hardware failure.
  • 7. Following are the characteristics of Cloud Computing: 0. Great Availability of Resources 0. On-demand Self-service 0. Easy Maintenance 0. Large Network Access 0. Availability 0. Automatic System 0. Economical 0. Security 0. Pay as you go • CHARACTERISTICS
  • 9. • BASIC CONCEPTS There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models of cloud computing:- • DEPLOYMENT MODEL • SERVICE MODEL
  • 11. Private cloud. The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).
  • 13. Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.3 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
  • 14. • EDGE COMPUTING 1.Edge computing enables data to be analysed, processed and transferred at the edge of the network. 2.Edge computing is upgrade version as well as extension of cloud computing. 3. edge computing is useful for reduce lower latency. 4.The basic difference between edge and cloud computing lies in the place where the data processing takes place. 5.Simply when the user store data in the cloud so there is some physical distance between device and cloud which affected on accessing data. 6.so in this physical distance the edge computing takes place which already store some important data from the cloud and useful for accessing data faster. 7.It include local processing. 8.Edge computing has privacy benefits, but they are not guaranteed. 9.Bandwith saving is also enabled by edge computing.
  • 15. EXAMPLE: a. Smart Street lights b. Mobile device c. Automated vehicles
  • 16. • CLOUD SECURITY 1.Cloud security is known as cloud computing security, consists of a set of policies controls, technologies that works together to protect cloud-based system. 2.Cloud security can be configured to the exact needs of the business. 3.Implementation cloud security process should be joint responsibility between the business owner and solution provider. 4.Selecting the right cloud security solution is helpful for protected your organization from unauthorized access, data breaches and other treats. 5.Forcepoint cloud access security broker (CASB) is a complete cloud security solution that protect cloud app and cloud data. 6.Security treats are constantly evolving and becoming more sophisticated, for this reason it is essential to work with cloud provider. 7.Cloud provider that offers best security that has been customised for your infrastructure and protect more.
  • 17. 8.BENEFITS: a. Centralized security b. Reduce cost c. Reduce administration d. reliability
  • 18. • ADVANTAGES 1. Easy implementation. 2. Accessibility. 3. No hardware required. 4. Cost per head. 5. Flexibilityfor growth. 6. Efficient recovery.
  • 19. • DISADVANTAGES 1. No longer in control. 2. May not get all the features. 3. Doesn’t mean you should do away with servers. 4. No Redundancy. 5. Bandwidth issues.