尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
CLOUD COMPUTING AND
SECURITY
Under the Guidence : Mrs.N.Ruba
Name of the Student : N.Monisha, S.Mahalakshmi,
S.Kiruba
Register Number : CB17S 250394
Subject code : 16SMBECA 2:1
Class : III BCA-”A”
Batch : 2017-2020
Year : 2019 - 2020
UNIT-IV
CLOUD COMPUTING AND
SECURITY
CONTENT
• Risks in cloud computing
• Data security in cloud
• Cloud security services
• Tools and technologies for cloud
• Cloud mashaps
• Apache hadoop
• Cloud tools
Risk Management
• Risk management is a significant part of
business planning.
• It can also encompass legal risks like
deception, robbery and sexual harassment
lawsuits.
• Cloud computing is somewhat new in its
present pattern, granted that, it is best
directed to reduce intermediate risk
enterprise areas.
BUSINESS RISK IN CLOUD
COMPUTING
Various Threat in cloud
computing
• Misuse and illicit use of cloud computing
• Insecure interfaces and APIs
• Vicious insiders
• Issues-related technology sharing
• Data loss or leakage
• Hijacking
• Unknown risk profile
Type of Risks in cloud computing
• Internal Security Risk
• External Security Risk
• Data Protection Risk
• Data loss.
Security Advantages in Cloud
Environment
• Data centralization
• Incident response
• Forensic image verification time
• Logging
Security Disadvantages in Cloud
Environment
• Investigation
• Data segregation
• Long-term viability
• Compromised server
• Regulatory compliance
• Recovery
Content Level Security(CLS)
• CLS evolved to meet the market place
demands and propelled by the wishes of
customer institutions.
• Content level security endows
organizations to organize data and
content at the organizational level, rather
than at the institutional level.
Data Confidentiality
• Confidentiality refers to limiting data access
only to authorized users, and stopping access to
unauthorized ones.
Access control
Passwords
Biometrics
Encryption
Privacy
Ethics
Data Integrity
• Data integrity is characterized as
safeguarding the correctness and
completeness of data and processing
procedures from intentional, unauthorized
or unintentional changes.
Data Availability
• Availability of data resources. A data
system that is not accessible when
required is not good.
• Availability is double-checking that the
authorized users have access to data and
affiliated assets when required.
Data Backup Plan
• Data backups are an absolutely crucial part of
data security and an organization should be
adept to refurbish data corruption or hardware
failure.
Disaster Recovery Plan(DRP)
• A DRP is a design that is utilized to retrieve
rapidly after a catastrophe with a smallest of
influence to the organization.
Eras of computing
The most famous two eras of computing are the
 Sequential
 Parallel eras
1. The illusion of infinite computing assets
accessible on demand.
2. The elimination of an up-front firm promise by
cloud users.
3. The proficiency to pay for use of computing
assets on a short-term basis as required and
release them as needed.
Cloud Computing Platform
• Abicloud cloud computing platform
• Eucalyptus cloud platform
• Nimbus cloud computing platform
• Open nebula cloud computing platform
Tools for building cloud
 Shared infrastructure
 Self-service automated portal
 Scalable
 Rich application container
 Programmatic control
 100% virtual hardware abstraction
 Strong multi-tenancy
 Chargeback
Mashups
• A mashup is a computing term describing
an application that uses, combines and
aggregates data from one or more
services to create a new one.
• Cloud mashups can be understood based
on their differing scopes and rely on their
real purpose
Hadoop
• Hadoop is an open source program that
endows distributed processing of large
data over inexpensive servers.
• Hadoop is creating worth for enterprise,
organization and individuals.
VMware
• Vmware’s desktop software sprints on
Microsoft Windows, Linux and Mac OS-
X.
• Vmware software presents an absolutely
virtualized set of hardware to the visitor
functioning system.
Eucaluptus
• Cloud controller(CLC)
• Cluster controller(CC)
• Node controller(NC)
• Storage controller(SC)
• Walrus storage controller(WSC)
Cloudsim
• The objective of the cloudsim project is
to supply a generalized and extensible
replication structure that endows
seamless modelling, replication and
experimentation of cloud computing
infrastructure and application services.
Opennebula
• Open nebula is actually the premier and
most sophisticated structure for cloud
computing.
• Open nebula is a completely open-source
toolkit to construct Iaas private, public
and hybrid clouds.
Nimbus
• Nimbus is an open-source toolkit
concentrated on supplying infrastructure
as a service (Iaas).
• It provides capabilities to the scientific
community.

More Related Content

What's hot

Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
Gaurav Rawat
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
MonishaNehkal
 
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptx
Hitesh Mohapatra
 
Ppt cloud deployment
Ppt cloud deploymentPpt cloud deployment
Ppt cloud deployment
Virendra Ruhela
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
Vajira Thambawita
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Introduction to Aneka, Aneka Model is explained
Introduction to Aneka, Aneka Model is explainedIntroduction to Aneka, Aneka Model is explained
Introduction to Aneka, Aneka Model is explained
Dr Neelesh Jain
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
NephoScale
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
BHASKAR CHAUDHURY
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Unit 5
Unit  5Unit  5
Unit 5
Ravi Kumar
 
IaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud ComputingIaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud Computing
Software Park Thailand
 
Access Controls
Access ControlsAccess Controls
Access Controls
primeteacher32
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
Dr.Manjunath Kotari
 
Multithreading models.ppt
Multithreading models.pptMultithreading models.ppt
Multithreading models.ppt
Luis Goldster
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Load Balancing in Cloud
Load Balancing in CloudLoad Balancing in Cloud
Load Balancing in Cloud
Mphasis
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
Ripal Ranpara
 

What's hot (20)

Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptx
 
Ppt cloud deployment
Ppt cloud deploymentPpt cloud deployment
Ppt cloud deployment
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Introduction to Aneka, Aneka Model is explained
Introduction to Aneka, Aneka Model is explainedIntroduction to Aneka, Aneka Model is explained
Introduction to Aneka, Aneka Model is explained
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Unit 5
Unit  5Unit  5
Unit 5
 
IaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud ComputingIaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud Computing
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
 
Multithreading models.ppt
Multithreading models.pptMultithreading models.ppt
Multithreading models.ppt
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Load Balancing in Cloud
Load Balancing in CloudLoad Balancing in Cloud
Load Balancing in Cloud
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 

Similar to Unit 4 -Cloud Computing and security

ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
MuhammadArslan799356
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
Dimitar Georgiev
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
Md Nazrul Islam Roxy
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
Arun Ganesh
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Zubair Arshad
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
Gabor Bokor
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
raghurajsingh51
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
gunvinit931
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Imane SBAI
 
Cloud computing
Cloud computingCloud computing
Cloud computing
akanksha botke
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
BhuvneshYadav13
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
Ciente
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ripal Ranpara
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
Reza Pahlava
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
Dss
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Suryavamsi51
 

Similar to Unit 4 -Cloud Computing and security (20)

ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17
Celine George
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
MJDuyan
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
MattVassar1
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
biruktesfaye27
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
Frederic Fovet
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
Ben Aldrich
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
Friends of African Village Libraries
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
PriyaKumari928991
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
BiplabHalder13
 

Recently uploaded (20)

What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
 

Unit 4 -Cloud Computing and security

  • 1. CLOUD COMPUTING AND SECURITY Under the Guidence : Mrs.N.Ruba Name of the Student : N.Monisha, S.Mahalakshmi, S.Kiruba Register Number : CB17S 250394 Subject code : 16SMBECA 2:1 Class : III BCA-”A” Batch : 2017-2020 Year : 2019 - 2020
  • 3. CONTENT • Risks in cloud computing • Data security in cloud • Cloud security services • Tools and technologies for cloud • Cloud mashaps • Apache hadoop • Cloud tools
  • 4. Risk Management • Risk management is a significant part of business planning. • It can also encompass legal risks like deception, robbery and sexual harassment lawsuits. • Cloud computing is somewhat new in its present pattern, granted that, it is best directed to reduce intermediate risk enterprise areas.
  • 5. BUSINESS RISK IN CLOUD COMPUTING
  • 6. Various Threat in cloud computing • Misuse and illicit use of cloud computing • Insecure interfaces and APIs • Vicious insiders • Issues-related technology sharing • Data loss or leakage • Hijacking • Unknown risk profile
  • 7. Type of Risks in cloud computing • Internal Security Risk • External Security Risk • Data Protection Risk • Data loss.
  • 8. Security Advantages in Cloud Environment • Data centralization • Incident response • Forensic image verification time • Logging
  • 9.
  • 10. Security Disadvantages in Cloud Environment • Investigation • Data segregation • Long-term viability • Compromised server • Regulatory compliance • Recovery
  • 11. Content Level Security(CLS) • CLS evolved to meet the market place demands and propelled by the wishes of customer institutions. • Content level security endows organizations to organize data and content at the organizational level, rather than at the institutional level.
  • 12. Data Confidentiality • Confidentiality refers to limiting data access only to authorized users, and stopping access to unauthorized ones. Access control Passwords Biometrics Encryption Privacy Ethics
  • 13. Data Integrity • Data integrity is characterized as safeguarding the correctness and completeness of data and processing procedures from intentional, unauthorized or unintentional changes.
  • 14. Data Availability • Availability of data resources. A data system that is not accessible when required is not good. • Availability is double-checking that the authorized users have access to data and affiliated assets when required.
  • 15. Data Backup Plan • Data backups are an absolutely crucial part of data security and an organization should be adept to refurbish data corruption or hardware failure. Disaster Recovery Plan(DRP) • A DRP is a design that is utilized to retrieve rapidly after a catastrophe with a smallest of influence to the organization.
  • 16. Eras of computing The most famous two eras of computing are the  Sequential  Parallel eras 1. The illusion of infinite computing assets accessible on demand. 2. The elimination of an up-front firm promise by cloud users. 3. The proficiency to pay for use of computing assets on a short-term basis as required and release them as needed.
  • 17. Cloud Computing Platform • Abicloud cloud computing platform • Eucalyptus cloud platform • Nimbus cloud computing platform • Open nebula cloud computing platform
  • 18. Tools for building cloud  Shared infrastructure  Self-service automated portal  Scalable  Rich application container  Programmatic control  100% virtual hardware abstraction  Strong multi-tenancy  Chargeback
  • 19. Mashups • A mashup is a computing term describing an application that uses, combines and aggregates data from one or more services to create a new one. • Cloud mashups can be understood based on their differing scopes and rely on their real purpose
  • 20. Hadoop • Hadoop is an open source program that endows distributed processing of large data over inexpensive servers. • Hadoop is creating worth for enterprise, organization and individuals.
  • 21. VMware • Vmware’s desktop software sprints on Microsoft Windows, Linux and Mac OS- X. • Vmware software presents an absolutely virtualized set of hardware to the visitor functioning system.
  • 22. Eucaluptus • Cloud controller(CLC) • Cluster controller(CC) • Node controller(NC) • Storage controller(SC) • Walrus storage controller(WSC)
  • 23. Cloudsim • The objective of the cloudsim project is to supply a generalized and extensible replication structure that endows seamless modelling, replication and experimentation of cloud computing infrastructure and application services.
  • 24. Opennebula • Open nebula is actually the premier and most sophisticated structure for cloud computing. • Open nebula is a completely open-source toolkit to construct Iaas private, public and hybrid clouds.
  • 25. Nimbus • Nimbus is an open-source toolkit concentrated on supplying infrastructure as a service (Iaas). • It provides capabilities to the scientific community.
  翻译: