尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Contents
• Introduction
• Why Cloud?
• History of Cloud
• Evolution of Cloud
• Definition of Cloud
• Cloud Models
• Pros and Cons
• Security Issues
• Summary
• References
• Query
 The spread of high-speed broadband
networks in developed countries, the
continual increase in computing power, and
the growth of the Internet have changed
the way in which society manages
information and information services.
Why Cloud?
Imagine the absence of a power grid
throughout the nation, necessitating the
presence of a  generator in every home for
producing electricity. Well, why do we have our
computers filled with software we use
occasionally? Wouldn’t it be meaningful to use
software the same way we use electricity – as
and when we need it?
This was the defining thought behind cloud
computing.
 In 1960, J.C.R. Licklider is person who brought
the idea of cloud computing to the forefront. In
1961, John McCarthy suggested in a speech at
MIT that computing can be sold like a utility,
like electricity/water. In 1997, Ramnath
Chellappa – first known academic use of the
term “Cloud Computing”
 In 1999, Salesforce started delivering
applications to users using a simple website. In
2002, Amazon started Amazon Web Services,
providing services like storage, computation and
even human intelligence. However, the launch
of the Elastic Compute Cloud in 2006, open to
everybody existed. In 2009, Google Apps,
Microsoft Windows Azure, and companies like
Oracle and HP have all joined the game.
 Common
 Location Independent
 Online 
 Utility (that is available on)
 Demand
simplifies the meaning of CLOUD -
(Chan, 2009).
 The Cloud delivers a hosting
environment that is immediate,
flexible, elastic, scalable, secure,
and available – while saving money,
time and resources
• Instead of hosting apps and data on
an individual desktop computer,
everything is hosted in the "cloud"—
an assemblage of computers and
servers accessed via the Internet.
 SaaS - 'Software as a Service', describes when users
'rent' or borrow online software instead of actually
purchasing and installing it on their own computers. 
 Instead of selling you a copy of Microsoft Word for
$300, a cloud computing model would "rent" word
processing software to you through the Internet for $5
a month. You would not install any special software to
your home machine to use this rented online product.
You simply use your modern web browser to login
from any web-enabled computer, and you can access
your word processing documents in the same way that
you would access your Gmail.
 PaaS (Platform as a service), as the name
suggests, provides you computing
platforms which typically includes
operating system, programming language
execution environment, database, web
server etc.
 Examples : AWS Elastic Beanstalk,
Heroku, Force.com, Google App Engine.
 IaaS(Infrastructure as a service), as the name suggests,
provides you the computing infrastructure, physical or
virtual machines and other resources like virtual-
machine disk image library, block and file-based
storage, firewalls, load balancers, IP addresses, virtual
local area networks etc.
 Infrastructure as a Service (IaaS) describes one of the
three main methods of accessing cloud computing
based services. Organisations rent computing power
and disk space and access them from desktop PCs
through a private network or across the internet.
 Examples : Amazon EC2, Windows Azure, Rackspace.
 Public cloud -- The cloud infrastructure is
made available to the general public or a large
industry group and is owned by an organization
selling cloud services.
 Public cloud services may be free or offered on
a pay-per-usage model.
Benefits
Easy and inexpensive set-up because
hardware, application and bandwidth costs
are covered by the provider.
No wasted resources because you pay for
what you use.
 Examples Amazon Elastic Compute Cloud
(EC2), IBM's Blue Cloud, Sun Cloud, Google
AppEngine and Windows Azure Services
Platform.
 Private cloud -- The cloud infrastructure is
operated solely for an organization. It may
be managed by the organization or a third
party and may exist on premise or off
premise.
 A private cloud can increase efficiency,
decrease costs and offer more security than
a public cloud.
 Examples Eucalyptus, Elastra, VMware and
Windows Azure Services Platform.
 Hybrid cloud -- The cloud infrastructure is a
composition of two or more clouds (private,
community, or public) that remain unique entities
but are bound together by standardized or
proprietary technology that enables data and
application portability (e.g., cloud bursting for load-
balancing between clouds).
 Government departments, universities, central banks
etc. often find this type of cloud useful.
Examples Google Apps for Government, Microsoft
Government Community Cloud
 Community cloud -- The cloud infrastructure is shared by
several organizations and supports a specific community
that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations).
 The goal of a community cloud is to have participating
organizations realize the benefits of a public cloud -- such
as multi-tenancy and a pay-as-you-go billing structure --
but with the added level of privacy, security and policy
compliance usually associated with a private cloud. The
community cloud can be either on-premises or off-
premises, and can be governed by the participating
organizations or by a third-party managed service provider
 Cloud computing requires an intricate interaction
with the hardware which is very essential to ensure
uptime of the application. It is very helpful to divide
the cloud model into two sections, one is front end
and other is backend.
 They are connected via a network and mostly
internet is used for fulfilling the requirement. The
front side is the interface for the user and the back
end is the cloud section for the whole system.
COMPLIANCECOMPLIANCE
DATA
MOBILITY
DATA
MOBILITY
PRIVAC
Y
PRIVAC
Y
SERVICE
LEVELS
SERVICE
LEVELS
RISKS OF
CLOUD
COMPUTING
Data Migration/Mobility
 It is the process of moving or transferring data,
application from your machine to cloud and vice-
versa. Moving to the cloud or between cloud
environments presents the usual IT issues, but
the problems are compounded by having data
stored and managed remotely, by external
organizations and often in multiple locations.
 Cloud disaster recovery and backup options have
become more common, and some users say they
provide a higher level of protection than
traditional solutions -- at lower cost
Performance metrics
 How fast is the cloud server’s vCPU?
 How quickly do memory and disk respond?
 What is the actual network throughput?
Naturally, cloud providers offer systems that are
different "sizes" with regard to power and price.
Offerings typically have two key dimensions: CPU
and memory (RAM).
Supplier’s own privacy & security policies. What are
the supplier’s own procedures and policies? Do
they include physical security? What about removal
of data from premises on removable media? Does
the supplier have an understanding of the role of
the applicable privacy regulatory authorities, and
procedures to respond to enquiries and complaints?
Privacy and data control issues are significant in the
context of cloud computing services.
Access controls Who will have access to the data
(including individuals or roles)? Are there access
audit trails? If there are particular individuals who
will have access to significant amounts of data
(for example, database administrators) how is
their access monitored and managed? Are any
subcontractors involved? How is their access
controlled? Is data encrypted on disk? “in flight”?
Who holds access keys?
 Secure Data Transfer
 Secure Stored Data
 Secure Software Interface
 User Access Control
 Data Separation
Cloud computing services often provide common
business application online that are accessed from a
web browser, while the software and data are stored
on the servers.
Cloud computing is an umbrella term used to refer to
Internet based development and services
Cloud computing defines virtual storage area which is
provided by cloud providers and accessed by clients
on demand and pay per use. Today, security is one of
the most important factors in computing
environment. Cloud service providers must provide
trust worthy environment. End users must know
about the awareness of security policy.
 [1] Bhushan Lal Sahu, Rajesh Tiwari, “A comprehensive
study on Cloud computing”, International journal of
Advanced Research in Computer science and Software
engineering, volume 2, issue 9, September 2012, ISSN:
2277 128X.
 [2] Mladen A. Vouk, “Cloud computing – Issues, Research
and Implementations”, Journal of Computing and
Information technology, CIT 16, 2008, 4, 235-246.
 [3] Anbalagan K., “Cloud computing”, National seminar on
Imminent Trends in Advanced Computing and Technology –
ITIACT’ 13, ISBN: 978-81-924922-3-0.
Cloud computing..
Cloud computing..

More Related Content

What's hot

Cloud Computing Technology_Usman
Cloud Computing Technology_UsmanCloud Computing Technology_Usman
Cloud Computing Technology_Usman
Usman Sait
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
Jagan Mohan Bishoyi
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
Ajit Yadav
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
Briefing 47
Briefing 47Briefing 47
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
ahmed elmeghiny
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
Vamsi Krishna Vanama
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
shilpa bojji
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Supriya Pase
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
Divyesh Shah
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ashutosh Anshu
 
State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010
Victor Gridnev
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
Sagar Kumar
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Jawhar Ali
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
Prashant Gupta
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
ProfRajivKumarShobhi
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
eGuvernare_Moldova
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
ErManish5
 

What's hot (20)

Cloud Computing Technology_Usman
Cloud Computing Technology_UsmanCloud Computing Technology_Usman
Cloud Computing Technology_Usman
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Briefing 47
Briefing 47Briefing 47
Briefing 47
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010State of Public Sector Cloud Computing 2010
State of Public Sector Cloud Computing 2010
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 

Viewers also liked

Workshop lesson 2
Workshop lesson 2Workshop lesson 2
Workshop lesson 2
dearjili
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲dearjili
 
Prezi presentations
Prezi presentationsPrezi presentations
Prezi presentations
dearjili
 
Workshop lesson 1
Workshop lesson 1Workshop lesson 1
Workshop lesson 1
dearjili
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲dearjili
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲dearjili
 
Detalles de productos salero 1
Detalles de productos  salero 1Detalles de productos  salero 1
Detalles de productos salero 1
andrearomero2687
 
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
CGT FESANCAT
 
Detalles de productos frasco6
Detalles de productos  frasco6Detalles de productos  frasco6
Detalles de productos frasco6
andrearomero2687
 
Ciencia y tecnología (1)
Ciencia y tecnología (1)Ciencia y tecnología (1)
Ciencia y tecnología (1)
Eliana Molina Olivares
 
EAMEN DE POWER POINT
EAMEN DE POWER POINTEAMEN DE POWER POINT
EAMEN DE POWER POINT
Alexi Ortega
 
Linux training in chandigarh
Linux training in chandigarhLinux training in chandigarh
Linux training in chandigarh
CBitss Technologies
 
Murder mystery parties of past and present
Murder mystery parties of past and presentMurder mystery parties of past and present
Murder mystery parties of past and present
Craigrownie Castle
 
Pagina web 3
Pagina web 3Pagina web 3
Detalles de productos bombonera3
Detalles de productos   bombonera3Detalles de productos   bombonera3
Detalles de productos bombonera3
andrearomero2687
 
Detalles de productos bombonera5
Detalles de productos  bombonera5Detalles de productos  bombonera5
Detalles de productos bombonera5
andrearomero2687
 
Detalles de productos frasco1
Detalles de productos  frasco1Detalles de productos  frasco1
Detalles de productos frasco1
andrearomero2687
 
關懷高風險幸福多一點
關懷高風險幸福多一點關懷高風險幸福多一點
關懷高風險幸福多一點藍 藍
 
Detalles de productos bombonera7
Detalles de productos  bombonera7Detalles de productos  bombonera7
Detalles de productos bombonera7
andrearomero2687
 
15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDF15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDF
MATHIAS MAZURURA
 

Viewers also liked (20)

Workshop lesson 2
Workshop lesson 2Workshop lesson 2
Workshop lesson 2
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲
 
Prezi presentations
Prezi presentationsPrezi presentations
Prezi presentations
 
Workshop lesson 1
Workshop lesson 1Workshop lesson 1
Workshop lesson 1
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲
 
陆陈汉语试讲
陆陈汉语试讲陆陈汉语试讲
陆陈汉语试讲
 
Detalles de productos salero 1
Detalles de productos  salero 1Detalles de productos  salero 1
Detalles de productos salero 1
 
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
2015.09 SSCGTHJOANXXIII - REVISTA SANITAT PÚBLICA
 
Detalles de productos frasco6
Detalles de productos  frasco6Detalles de productos  frasco6
Detalles de productos frasco6
 
Ciencia y tecnología (1)
Ciencia y tecnología (1)Ciencia y tecnología (1)
Ciencia y tecnología (1)
 
EAMEN DE POWER POINT
EAMEN DE POWER POINTEAMEN DE POWER POINT
EAMEN DE POWER POINT
 
Linux training in chandigarh
Linux training in chandigarhLinux training in chandigarh
Linux training in chandigarh
 
Murder mystery parties of past and present
Murder mystery parties of past and presentMurder mystery parties of past and present
Murder mystery parties of past and present
 
Pagina web 3
Pagina web 3Pagina web 3
Pagina web 3
 
Detalles de productos bombonera3
Detalles de productos   bombonera3Detalles de productos   bombonera3
Detalles de productos bombonera3
 
Detalles de productos bombonera5
Detalles de productos  bombonera5Detalles de productos  bombonera5
Detalles de productos bombonera5
 
Detalles de productos frasco1
Detalles de productos  frasco1Detalles de productos  frasco1
Detalles de productos frasco1
 
關懷高風險幸福多一點
關懷高風險幸福多一點關懷高風險幸福多一點
關懷高風險幸福多一點
 
Detalles de productos bombonera7
Detalles de productos  bombonera7Detalles de productos  bombonera7
Detalles de productos bombonera7
 
15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDF15-129_DANONE_WD2_ELEVATNS.PDF
15-129_DANONE_WD2_ELEVATNS.PDF
 

Similar to Cloud computing..

Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
Udara Sandaruwan
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Nibi Maouriyan
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
Ajay844
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
Nabi Hasan
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
Dr. Radhey Shyam
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ronak patel
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Aniket Saxena
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
ssuserbb23da
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Monika Kumari
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
vishnu varunan
 
cloud computing
cloud computingcloud computing
cloud computing
Mukhid Khan LashKari
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
SriDurgaBhavani2
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Muhammad Usama Zuberi
 
computing
computingcomputing
computing
Pappu Deepti
 
ReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdfReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdf
Skill Test for Freelancer
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
Parveen Yadav
 
Use of cloud computing technology as an application in libraries
Use of cloud computing technology  as an application in librariesUse of cloud computing technology  as an application in libraries
Use of cloud computing technology as an application in libraries
Dr. Mohd Asif Khan
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
Sami Abu Shawarib
 

Similar to Cloud computing.. (20)

Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
computing
computingcomputing
computing
 
ReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdfReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdf
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Use of cloud computing technology as an application in libraries
Use of cloud computing technology  as an application in librariesUse of cloud computing technology  as an application in libraries
Use of cloud computing technology as an application in libraries
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 

Recently uploaded

APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 

Recently uploaded (20)

APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 

Cloud computing..

  • 1.
  • 2. Contents • Introduction • Why Cloud? • History of Cloud • Evolution of Cloud • Definition of Cloud • Cloud Models • Pros and Cons • Security Issues • Summary • References • Query
  • 3.  The spread of high-speed broadband networks in developed countries, the continual increase in computing power, and the growth of the Internet have changed the way in which society manages information and information services.
  • 5. Imagine the absence of a power grid throughout the nation, necessitating the presence of a  generator in every home for producing electricity. Well, why do we have our computers filled with software we use occasionally? Wouldn’t it be meaningful to use software the same way we use electricity – as and when we need it? This was the defining thought behind cloud computing.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.  In 1960, J.C.R. Licklider is person who brought the idea of cloud computing to the forefront. In 1961, John McCarthy suggested in a speech at MIT that computing can be sold like a utility, like electricity/water. In 1997, Ramnath Chellappa – first known academic use of the term “Cloud Computing”  In 1999, Salesforce started delivering applications to users using a simple website. In 2002, Amazon started Amazon Web Services, providing services like storage, computation and even human intelligence. However, the launch of the Elastic Compute Cloud in 2006, open to everybody existed. In 2009, Google Apps, Microsoft Windows Azure, and companies like Oracle and HP have all joined the game.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  Common  Location Independent  Online   Utility (that is available on)  Demand simplifies the meaning of CLOUD - (Chan, 2009).
  • 16.  The Cloud delivers a hosting environment that is immediate, flexible, elastic, scalable, secure, and available – while saving money, time and resources • Instead of hosting apps and data on an individual desktop computer, everything is hosted in the "cloud"— an assemblage of computers and servers accessed via the Internet.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.  SaaS - 'Software as a Service', describes when users 'rent' or borrow online software instead of actually purchasing and installing it on their own computers.   Instead of selling you a copy of Microsoft Word for $300, a cloud computing model would "rent" word processing software to you through the Internet for $5 a month. You would not install any special software to your home machine to use this rented online product. You simply use your modern web browser to login from any web-enabled computer, and you can access your word processing documents in the same way that you would access your Gmail.
  • 23.  PaaS (Platform as a service), as the name suggests, provides you computing platforms which typically includes operating system, programming language execution environment, database, web server etc.  Examples : AWS Elastic Beanstalk, Heroku, Force.com, Google App Engine.
  • 24.  IaaS(Infrastructure as a service), as the name suggests, provides you the computing infrastructure, physical or virtual machines and other resources like virtual- machine disk image library, block and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks etc.  Infrastructure as a Service (IaaS) describes one of the three main methods of accessing cloud computing based services. Organisations rent computing power and disk space and access them from desktop PCs through a private network or across the internet.  Examples : Amazon EC2, Windows Azure, Rackspace.
  • 25.
  • 26.  Public cloud -- The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.  Public cloud services may be free or offered on a pay-per-usage model. Benefits Easy and inexpensive set-up because hardware, application and bandwidth costs are covered by the provider. No wasted resources because you pay for what you use.  Examples Amazon Elastic Compute Cloud (EC2), IBM's Blue Cloud, Sun Cloud, Google AppEngine and Windows Azure Services Platform.
  • 27.  Private cloud -- The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.  A private cloud can increase efficiency, decrease costs and offer more security than a public cloud.  Examples Eucalyptus, Elastra, VMware and Windows Azure Services Platform.
  • 28.  Hybrid cloud -- The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load- balancing between clouds).  Government departments, universities, central banks etc. often find this type of cloud useful. Examples Google Apps for Government, Microsoft Government Community Cloud
  • 29.  Community cloud -- The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations).  The goal of a community cloud is to have participating organizations realize the benefits of a public cloud -- such as multi-tenancy and a pay-as-you-go billing structure -- but with the added level of privacy, security and policy compliance usually associated with a private cloud. The community cloud can be either on-premises or off- premises, and can be governed by the participating organizations or by a third-party managed service provider
  • 30.  Cloud computing requires an intricate interaction with the hardware which is very essential to ensure uptime of the application. It is very helpful to divide the cloud model into two sections, one is front end and other is backend.  They are connected via a network and mostly internet is used for fulfilling the requirement. The front side is the interface for the user and the back end is the cloud section for the whole system.
  • 31.
  • 32.
  • 34. Data Migration/Mobility  It is the process of moving or transferring data, application from your machine to cloud and vice- versa. Moving to the cloud or between cloud environments presents the usual IT issues, but the problems are compounded by having data stored and managed remotely, by external organizations and often in multiple locations.  Cloud disaster recovery and backup options have become more common, and some users say they provide a higher level of protection than traditional solutions -- at lower cost
  • 35. Performance metrics  How fast is the cloud server’s vCPU?  How quickly do memory and disk respond?  What is the actual network throughput? Naturally, cloud providers offer systems that are different "sizes" with regard to power and price. Offerings typically have two key dimensions: CPU and memory (RAM). Supplier’s own privacy & security policies. What are the supplier’s own procedures and policies? Do they include physical security? What about removal of data from premises on removable media? Does the supplier have an understanding of the role of the applicable privacy regulatory authorities, and procedures to respond to enquiries and complaints?
  • 36.
  • 37. Privacy and data control issues are significant in the context of cloud computing services. Access controls Who will have access to the data (including individuals or roles)? Are there access audit trails? If there are particular individuals who will have access to significant amounts of data (for example, database administrators) how is their access monitored and managed? Are any subcontractors involved? How is their access controlled? Is data encrypted on disk? “in flight”? Who holds access keys?
  • 38.  Secure Data Transfer  Secure Stored Data  Secure Software Interface  User Access Control  Data Separation
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Cloud computing services often provide common business application online that are accessed from a web browser, while the software and data are stored on the servers. Cloud computing is an umbrella term used to refer to Internet based development and services Cloud computing defines virtual storage area which is provided by cloud providers and accessed by clients on demand and pay per use. Today, security is one of the most important factors in computing environment. Cloud service providers must provide trust worthy environment. End users must know about the awareness of security policy.
  • 44.  [1] Bhushan Lal Sahu, Rajesh Tiwari, “A comprehensive study on Cloud computing”, International journal of Advanced Research in Computer science and Software engineering, volume 2, issue 9, September 2012, ISSN: 2277 128X.  [2] Mladen A. Vouk, “Cloud computing – Issues, Research and Implementations”, Journal of Computing and Information technology, CIT 16, 2008, 4, 235-246.  [3] Anbalagan K., “Cloud computing”, National seminar on Imminent Trends in Advanced Computing and Technology – ITIACT’ 13, ISBN: 978-81-924922-3-0.
  翻译: