Cloud computing and Cloud Security - Basics and Terminologies

  • Published on
    22-Jan-2018

  • View
    58

  • Download
    1

Embed Size (px)

Transcript

  • Cloud ComputingAnd Cloud Security

  • What is Cloud Computing?

    Cloud Computing is an internet basedservice that provides on demand access toshared computer resources and data. Inother words, cloud computing meansdelivery of hosted services and resourcesover the internet. These resources includestorage, server, network and applications.These resources can be quickly equippedand can be freed easily. Virtualization isthe driving force behind cloud computing.

  • Virtualization in Cloud Computing

    Virtualization means the creation of virtualresources rather than actual resources likehardware, operating system, storage, networketc. These virtual resources act as a replicaof the actual resources. The common exampleof virtualization is the partition of thehard drive to create separate hard drives. Invirtualization, there are two types ofmachines host machine and the guest machine.Host machine is the real physical machine onwhich virtualization takes place while theguest machine is the virtual machine.

  • Types of Virtualization

    Hardware Virtualization

    Operating System Virtualization

    Desktop Virtualization

    Storage Virtualization

    Network Virtualization

  • Characteristics of Cloud Computing

    On-demand self-service

    Broad network access

    Resource pooling

    Rapid Elasticity

    Measured Service

  • Cloud Services or Cloud Service Model

    IaaS(Infrastructure as a Service)

    PaaS(Platform as a Service)

    SaaS(Software as a Service)

  • Infrastructure as a Service(IaaS)

    Infrastructure as a Service provides virtual computing resources such as storage, server, virtual machines and network over the internet. A third party provider provides this infrastructure to the consumer.

  • Platform as a Service(PaaS)

    Platform as a Service allows the consumer to deploy applications on the cloud infrastructure. A consumer is not responsible for the underlying cloud infrastructure.

  • Software as a Service(SaaS)

    Software as a Service enables the user to use the deployed applications running on the cloud infrastructure. The consumer is not responsible for managing the underlying infrastructure and the applications.

  • Cloud Deployment Model

    Public Cloud

    Private Cloud

    Hybrid Cloud

    Community Cloud

  • Public Cloud - Public Cloud is for public use or a large organization and is owned by a third party provider selling cloud services.

    Private Cloud - Private Cloud is provided for a single organization with multiple consumers. It is operated by the organization itself or by a third party. It may be operated within the premises or off the premises.

  • Hybrid Cloud - Hybrid Cloud is a combination of two or more distinct clouds that retain their unique entity. It is used for sensitive data and strategic applications.

    Community Cloud - It is a type of private cloud for users with specific demands. It has several stakeholders. It is managed by the organization or by a third party provider.

  • Advantages of Cloud Computing

    It is cost effective

    It is based on pay per use method

    Improved security

    It is much more reliable and manageable

    It is flexible, scalable and also environment-friendly as it reduces carbon footprint

  • Drawbacks of Cloud Computing

    Security and privacy issues while using services from third party providers

    As it is an internet based service, it faces the risk of downtime i.e. internet breakdown or connection problems

    It is prone to cyber attacks Vendor lock-in It is a situation when a consumer wants to switch to other vendors services but cannot easily shift without paying a considerable cost.

  • Cloud Security

    Cloud Computing security refers to setof policies and measures deployed toprotect cloud infrastructure and theunderlying data and applications. It isa part of information security. CloudComputing Security is needed as thereare certain security concerns regardingsecurity and privacy of the users andtheir data.

  • Controls in Cloud Security

    Deterrent Control

    Preventive Control

    Detective Control

    Corrective Control

  • Topics in Cloud Computing and Cloud Security for Research and Thesis

    Virtualization

    Denial of Service

    Encryption

    DDoS Attack

    Cloud Security Dimensions

    Identity Management

    Data Security

    Data Separation

  • Thank You

    Reference: Techsparks

    Techsparks, 2nd floor, D-185, Phase 8B, Industrial Area, Sahibzada AjitSingh Nagar, Mohali, Punjab 160055http://www.techsparks.co.in

    +91-7696666022

    techsparks2013@gmail.com

    http://www.techsparks.co.in/