Slides 530 a2
Upcoming SlideShare
Loading in...5
×
 

Slides 530 a2

on

  • 544 views

 

Statistics

Views

Total Views
544
Views on SlideShare
544
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Slides 530 a2 Slides 530 a2 Presentation Transcript

    • SALEH ALGHAMDI-N26846627 VO HONG HANH –N7704283
    •  Introduction ◦ Scope ◦ Definition of key terms History of cloud computing Cloud service models Cloud deployment models Advantages of cloud computing Issues ◦ Privacy and security  Confidentiality  Integrity  Availability ◦ Laws and regulations Recommendations This image is taken from http://www.itp.net/584104-gartner-warns-of- cloud-service-contract-risks
    •  Cloud computing – a technology that provides web-based solutions and services to the public using networks, servers, data warehouses‟, software applications and internet services managed by a third party (Giard & Lessard, 2010).  Nowadays, cloud-based services are being adopted by organisations at a rapid rate.  Web 2.0 tools, social networking sites are all examples in which individuals are moving their activities to „the cloud‟  In 2010, Gartner predicted that cloud-based services generated more than $68 billion in worldwide revenue (Mielke, 2010).This image is taken from http://www.theindiagate.info/2011/04/regulations-for-the-cloud-ieee/
    • History of cloud computing Back to the 1960s, computer scientist John McCarthy wrote that “computation may someday be organized as a public utility” In 1997, the term was used for the first time in its current context by lecturer Ramnath Chellappa who defined it as a new “computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits alone” (Biswas-a, 2011). In 1999, Salesforce.com - one of the first movers in cloud computing, introduced the concept of delivering enterprise applications via a website. Amazon launched Amazon Web Service in 2002, Google launched GoogleDocs in 2006 In 2007, an industry-wide collaboration between Google, IBM and a number of universities across the United States soon followed. Microsoft‟s entry into cloud computing came in 2009 with the launch of Windows Azure  (Biswas, 2011)
    • Cloud service typesThere are 3 major models for cloud computing which are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS). This image is taken from: http://www.maintec.com/blog/cloud-computing-demystified/ /
    • IAASIAAS – Infrastructure as a Service IaaS involves physical computer hardware such as CPU processing, memory, data storage and network connectivity being provided by a vendor. Example of an IaaS service vendor is Amazon Elastic Compute Cloud (EC2). According to In-Stat, it is expected that IaaS spending will approach $4 billion from 2011 to 2014
    • PAASPAAS –Platform as a Service PaaS enables customers to use the vendor‟s cloud infrastructure to deploy web applications and other software developed by the customer using programming languages supported by the vendor . Example of PaaS vendors: Google App Engine, Amazon Web Services Elastic Beanstalk and Microsoft Windows Auzre platform. According to In-Stat, PaaS spending will increase 113 percent annually to approximately $460 million in 2014.
    • SAASSAAS – Software as a service The strongest cloud trend and services The Application itself is provided by the service provider. Examples: Google doc, Gmail, Hotmail, Flickr From 2011 to 2014, SaaS spending is expected to grow 112 percent annually.
    • Cloud deployment models This image is taken from: https://wiki.cloudsecurityalliance.org/guidance/index.php/Cloud_Computing_Architectural_ Framework
    • Public cloud The service are provided to the client from a third party service provider through the Internet. Public clouds have a maximum potential in cost efficiencies Security risks must be concerned Examples: Amazon This image is taken from: http://www.definethecloud.net/tag/public-cloud/
    • Private cloud A private cloud involves an organisation‟s exclusive use of cloud infrastructure and services located on premises or offsite which is then managed by the organisation or a selected vendor. Reduced potential security concerns Examples: HP Data Centers This image is taken from: http://www.hightechdad.com/2012/01/31/a-cloud-for-all-seasons- picking-the-right-cloud/
    • Hybrid cloud Hybrid clouds attempt to obtain most of the security benefits of a private cloud, and most of the economic benefits of a public cloud. This image is taken from: http://www.cloudave.com/6/perform-the-hybrid-cloud-dance-easily- with-newscale-rpath-and-eucalyptus/
    • Cloud computing advantages• Cost savings• No maintenance issues• Simplicity This image is taken from http://www.dailyblogging.org/internet/cloud-computing-advantages/
    • Cloud computing issues Security/Privacy Laws and regulationsThis image is taken fromhttp://www.gfi.com/blog/cloud-computing-security-implications-service-provider/ This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
    • Security/Privacy1. Confidentialityprivacy of information (Antonopoulos, etal., 2010).2. Integritythe authorisation to modify assets in thecloud (Antonopoulos, et al., 2010).3. Availabilitythe availability of data when it is needed This image is taken from(Antonopoulos, et al., 2010). http://www.gfi.com/blog/cloud- computing-security-implications- service-provider/
    • 1- ConfidentialityThe increased number of authorised parties toaccess the cloud computing makes the data morevulnerable to be compromised (Zissis, 2010). datarequires high algorithm encryption before it isstored in the cloud. (Kalyani, Sonia, &Paikrao, 2012). This image is taken from http://www.corporatecomplianceinsights.com/company/cipher cloud/
    • 2- IntegrityTampering QUT library data is most likely to cause dauntingdamage. This issue is greater in the public cloud than it is in privatecloud. The private cloud is set up on private network, whereases;the public cloud is off-site (Kuyoro, et al., 2011). Therefore, privatecloud is more secure for QUT library. This image is taken from http://patricksclouds.wordpress.com/2011/06/09/if-the- private-cloud-benefits-the-public-cloud-economic-model/
    • 3- Availabilitycloud computing provider must be trusted party to deal with.Trusted third party is the one that is fully compliant in itsfinancial, legal, and technical elements (Zissis, 2010). Theprotection of intellectual property within „the cloud‟ for QUTlibrary should focus on creating a strong contract, ensuringthat the business retains the rights to all data stored within theremote servers (LegalIQ, 2011). This image is taken from This image is taken from http://www.techrepublic.com/blog/cio- http://meship.com/Blog/2011/03/18/cloud- insights/cloud-computing-how-to-make- computing-contracts-and-services-whats- the-right-choices/39747431 really-happening/
    • Laws and regulationsOne feature of cloud computing is that data can belocalised, shared and stored in several countries, depending onwhat the service provider decides. However, when QUT library optfor cloud computing services, they relinquish all control over itsinformation (Giard & Lessard, 2010). Therefore, it isrecommended that contract specify the countries that theinformation can be accessed and used from. This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
    • Recommendations for QUT library1. Use complex algorithm encryption2. Use the private cloud3. Choose a trusted third party4. Negotiate Service Level Agreement5. In the contract, specify the countries in which the information can be accessed and used. This image is taken from http://www.tiptopcomputers.co.uk/recommendations.html