SlideShare a Scribd company logo
1 of 11
Download to read offline
Presented by:
MAULANA ABUL KALAM AZAD
UNIVERSITY OF TECHNOLOGY
Name: Anirban Pati
Roll: 32201221020
Semester: 5th
Stream: Bachelor of Computer
Applications
Paper Name:Cloud Computing
Paper Code:BCAD501(A)
Session:2021-2024
ASANSOL ENGINEERING COLLEGE
Department of Computer Application
AFFILIATED
TO
A detailed overview of the four main cloud deployment models
Deployment Models
ANIRBAN PATI AUGUST 05, 2023
Introduction
Cloud computing is a model for enabling ubiquitous, convenient, on-demand
access to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider interaction.
Cloud deployment models refer to the different ways in which cloud computing
resources can be provisioned and managed.
There are four main types of cloud deployment models: public cloud, private cloud,
hybrid cloud, and community cloud.
Types of Deployment Models
Public Cloud
The most common type of cloud
deployment model. It offers a
wide range of services, from
infrastructure as a service (IaaS)
to software as a service (SaaS).
Private Cloud
A good choice for organizations
that need more control over their
cloud environment. It can be more
expensive than a public cloud, but
it offers greater flexibility and
security.
Community Cloud
A good choice for organizations that
need to share resources with other
organizations. It can be more cost-
effective than a private cloud, but it
offers less flexibility and control.
Hybrid Cloud
A good choice for organizations
that need the best of both worlds.
It combines the flexibility and
scalability of a public cloud with
the control and security of a
private cloud.
1 2
3 4
Public Cloud
Public Cloud is a cloud computing model where cloud services are provided over the internet by a
third-party cloud service provider.
Services are available to the general public on a pay-as-you-go basis.
Scalability: Public clouds offer vast resources that can scale up or down based on demand.
Cost-effective: Users only pay for the resources they consume, reducing upfront infrastructure
costs.
Shared Resources: Resources are shared among multiple users, leading to cost savings but
potentially impacting performance during peak times.
Accessibility: Public clouds can be accessed from anywhere with an internet connection.
Software as a Service (SaaS) applications
Web hosting and email services
Collaborative tools and productivity suites
Definition:
Characteristics:
1.
2.
3.
4.
Use Cases:
Example Providers: AWS, Microsoft Azure, Google Cloud.
Private Cloud
Private Cloud is a cloud computing model where cloud services are dedicated to a single
organization and are not accessible to the general public.
Control and Security: Private clouds offer greater control over data and security, making them
suitable for highly sensitive data and compliance requirements.
Customization: Organizations can tailor the private cloud to meet their specific needs and
infrastructure.
Performance: As resources are not shared with others, private clouds generally provide more
consistent and predictable performance.
Government agencies handling classified data
Financial institutions with strict security and
Large enterprises with significant internal IT needs
Definition:
Characteristics:
1.
2.
3.
Use Cases:
regulatory requirements
Example Providers: OpenStack, VMware.
Community Cloud
Community Cloud is a cloud computing model where cloud resources are shared among several
organizations with common interests or objectives.
Limited Access: Access to the community cloud is restricted to specific organizations with shared
purposes.
Cost Sharing: Participants share the costs of the community cloud, making it more cost-effective.
Security and Privacy: Community clouds are designed to address the specific security and
compliance needs of the participating organizations.
Research consortiums collaborating on data-intensive projects
Healthcare organizations sharing patient data
Educational institutions with shared resources for e-learning platforms
Definition:
Characteristics:
1.
2.
3.
Use Cases:
while maintaining privacy compliance
Example Scenarios: Government agencies, research institutions.
Hybrid Cloud
Hybrid Cloud is a cloud computing model that combines both public and private cloud deployments.
It allows seamless integration and data flow between the two environments.
Flexibility: Organizations can use the public cloud for non-sensitive operations and the private cloud
for critical or sensitive data.
Data Backup and Redundancy: Hybrid clouds offer a redundant backup option, ensuring data is
available even if one cloud experiences an outage.
Bursting: During peak demands, organizations can "burst" into the public cloud to access additional
resources temporarily.
E-commerce companies that experience fluctuating traffic
Healthcare organizations needing to comply
Enterprises seeking cost optimization and greater flexibility
Definition:
Characteristics:
1.
2.
3.
Use Cases:
with regulations while leveraging public cloud for less sensitive data
Example Scenarios: Bursting to a public cloud during
peak loads while using a private cloud for regular operations.
Factors to Consider
Security: Evaluate the security measures provided by the cloud deployment model
and assess if it aligns with your data protection requirements.
Compliance: Consider industry-specific regulations and ensure the chosen
deployment model complies with relevant standards.
Cost: Analyze the total cost of ownership (TCO) for each deployment model, including
upfront expenses and ongoing operational costs.
Performance: Assess the performance capabilities of the deployment model,
especially during peak times and heavy workloads.
Scalability: Determine if the deployment model can scale seamlessly as your business
needs evolve
1.
2.
3.
4.
5.
Conclusion
In conclusion, selecting the right deployment model is crucial for successful cloud
adoption.
Each deployment model has its unique characteristics, advantages, and
considerations.
Understand your organization's requirements, security needs, and budget constraints
to make an informed decision.
By choosing the right deployment model, organizations can harness the full potential
of cloud computing and drive business growth and efficiency.
Thank you!
Have a great
day ahead.

More Related Content

What's hot

AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptxAWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
NabilMECHERI
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
kevnikool
 

What's hot (20)

Cloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptxCloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptx
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptxAWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Load balancing
Load balancingLoad balancing
Load balancing
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Firewall
FirewallFirewall
Firewall
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
 
What is private cloud Explained
What is private cloud ExplainedWhat is private cloud Explained
What is private cloud Explained
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 

Similar to Deployment Models in Cloud Computing

Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
cloudresearcher
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
 

Similar to Deployment Models in Cloud Computing (20)

Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdf
 
Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdf
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing document
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Nigga
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud building
Cloud buildingCloud building
Cloud building
 

Recently uploaded

Recently uploaded (20)

ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

Deployment Models in Cloud Computing

  • 1. Presented by: MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY Name: Anirban Pati Roll: 32201221020 Semester: 5th Stream: Bachelor of Computer Applications Paper Name:Cloud Computing Paper Code:BCAD501(A) Session:2021-2024 ASANSOL ENGINEERING COLLEGE Department of Computer Application AFFILIATED TO
  • 2. A detailed overview of the four main cloud deployment models Deployment Models ANIRBAN PATI AUGUST 05, 2023
  • 3. Introduction Cloud computing is a model for enabling ubiquitous, convenient, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud deployment models refer to the different ways in which cloud computing resources can be provisioned and managed. There are four main types of cloud deployment models: public cloud, private cloud, hybrid cloud, and community cloud.
  • 4. Types of Deployment Models Public Cloud The most common type of cloud deployment model. It offers a wide range of services, from infrastructure as a service (IaaS) to software as a service (SaaS). Private Cloud A good choice for organizations that need more control over their cloud environment. It can be more expensive than a public cloud, but it offers greater flexibility and security. Community Cloud A good choice for organizations that need to share resources with other organizations. It can be more cost- effective than a private cloud, but it offers less flexibility and control. Hybrid Cloud A good choice for organizations that need the best of both worlds. It combines the flexibility and scalability of a public cloud with the control and security of a private cloud. 1 2 3 4
  • 5. Public Cloud Public Cloud is a cloud computing model where cloud services are provided over the internet by a third-party cloud service provider. Services are available to the general public on a pay-as-you-go basis. Scalability: Public clouds offer vast resources that can scale up or down based on demand. Cost-effective: Users only pay for the resources they consume, reducing upfront infrastructure costs. Shared Resources: Resources are shared among multiple users, leading to cost savings but potentially impacting performance during peak times. Accessibility: Public clouds can be accessed from anywhere with an internet connection. Software as a Service (SaaS) applications Web hosting and email services Collaborative tools and productivity suites Definition: Characteristics: 1. 2. 3. 4. Use Cases: Example Providers: AWS, Microsoft Azure, Google Cloud.
  • 6. Private Cloud Private Cloud is a cloud computing model where cloud services are dedicated to a single organization and are not accessible to the general public. Control and Security: Private clouds offer greater control over data and security, making them suitable for highly sensitive data and compliance requirements. Customization: Organizations can tailor the private cloud to meet their specific needs and infrastructure. Performance: As resources are not shared with others, private clouds generally provide more consistent and predictable performance. Government agencies handling classified data Financial institutions with strict security and Large enterprises with significant internal IT needs Definition: Characteristics: 1. 2. 3. Use Cases: regulatory requirements Example Providers: OpenStack, VMware.
  • 7. Community Cloud Community Cloud is a cloud computing model where cloud resources are shared among several organizations with common interests or objectives. Limited Access: Access to the community cloud is restricted to specific organizations with shared purposes. Cost Sharing: Participants share the costs of the community cloud, making it more cost-effective. Security and Privacy: Community clouds are designed to address the specific security and compliance needs of the participating organizations. Research consortiums collaborating on data-intensive projects Healthcare organizations sharing patient data Educational institutions with shared resources for e-learning platforms Definition: Characteristics: 1. 2. 3. Use Cases: while maintaining privacy compliance Example Scenarios: Government agencies, research institutions.
  • 8. Hybrid Cloud Hybrid Cloud is a cloud computing model that combines both public and private cloud deployments. It allows seamless integration and data flow between the two environments. Flexibility: Organizations can use the public cloud for non-sensitive operations and the private cloud for critical or sensitive data. Data Backup and Redundancy: Hybrid clouds offer a redundant backup option, ensuring data is available even if one cloud experiences an outage. Bursting: During peak demands, organizations can "burst" into the public cloud to access additional resources temporarily. E-commerce companies that experience fluctuating traffic Healthcare organizations needing to comply Enterprises seeking cost optimization and greater flexibility Definition: Characteristics: 1. 2. 3. Use Cases: with regulations while leveraging public cloud for less sensitive data Example Scenarios: Bursting to a public cloud during peak loads while using a private cloud for regular operations.
  • 9. Factors to Consider Security: Evaluate the security measures provided by the cloud deployment model and assess if it aligns with your data protection requirements. Compliance: Consider industry-specific regulations and ensure the chosen deployment model complies with relevant standards. Cost: Analyze the total cost of ownership (TCO) for each deployment model, including upfront expenses and ongoing operational costs. Performance: Assess the performance capabilities of the deployment model, especially during peak times and heavy workloads. Scalability: Determine if the deployment model can scale seamlessly as your business needs evolve 1. 2. 3. 4. 5.
  • 10. Conclusion In conclusion, selecting the right deployment model is crucial for successful cloud adoption. Each deployment model has its unique characteristics, advantages, and considerations. Understand your organization's requirements, security needs, and budget constraints to make an informed decision. By choosing the right deployment model, organizations can harness the full potential of cloud computing and drive business growth and efficiency.
  • 11. Thank you! Have a great day ahead.