Cloud Computing & Soa

946 views
892 views

Published on

Cloud Computing & Soa

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
946
On SlideShare
0
From Embeds
0
Number of Embeds
91
Actions
Shares
0
Downloads
110
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cloud Computing & Soa

  1. 1. Cloud Computing & SOA Saurabh Soni
  2. 2. Agenda <ul><li>Introduction </li></ul><ul><li>Background Concept & Definitions </li></ul><ul><li>Current Issues </li></ul><ul><li>Primary Security Issues </li></ul><ul><li>Cloud Computing Architecture </li></ul><ul><li>SOA Architecture </li></ul><ul><li>Our Observation </li></ul><ul><li>Related Analysis </li></ul><ul><li>Conclusion </li></ul>
  3. 3. Introduction <ul><li>Cloud Computing </li></ul><ul><li>Service Oriented Architecture (SOA) </li></ul>
  4. 4. Background Concept & Definitions <ul><li>What is Cloud Computing? </li></ul><ul><li>What is SOA? </li></ul><ul><ul><li>Services </li></ul></ul><ul><ul><li>Connections </li></ul></ul>
  5. 5. Current Issues <ul><li>Data Confidentiality </li></ul><ul><li>Security </li></ul><ul><li>Piracy Prevention </li></ul><ul><li>Applications </li></ul><ul><li>Interoperability </li></ul><ul><li>Compliance </li></ul><ul><li>Service Level Agreement </li></ul>
  6. 6. Primary Security Issues <ul><li>Authentication </li></ul><ul><ul><li>is all about validating the authenticity of the request and binding the results to a principle. This is frequently a system-level service because it deals with the processing of system policies such as password policies and implementing complex protocols like Kerberos or any other encryption implementation. </li></ul></ul><ul><li>Authorization </li></ul><ul><ul><li>on some level, is always enforced locally, close to the thing being protected. In SOA, this thing is the service provider. While upper level authorization can be implemented at a global level, finer grained authorization requires mapping to the service and its operations. </li></ul></ul><ul><li>Auditing </li></ul><ul><ul><li>provide detection and response features that are responsible to answer questions around what digital subjects performed what actions to which objects. </li></ul></ul><ul><li>Assurance </li></ul><ul><ul><li>essentially exist as a set of system processes that increase the assessor's confidence in a given system. </li></ul></ul>
  7. 7. Cloud Computing Architecture <ul><li>Saa S </li></ul><ul><ul><li>Software as a service is a way of delivering applications over the internet- as a service. </li></ul></ul><ul><li>PaaS </li></ul><ul><ul><li>One of the main principal of Cloud Computing is provided by Platform as a Service (PaaS). PaaS provides platform for different applications to run the applications. </li></ul></ul><ul><li>IaaS </li></ul><ul><ul><li>It enables cloud computing to share traditional computing resources over the internet. It offers on demand virtual resources and storage over the internet. IaaS provides on-the-fly flexibility and configurability for setting up virtual storage. </li></ul></ul>
  8. 8. SOA Architecture <ul><li>Initiate </li></ul><ul><li>Develop Roadmap </li></ul><ul><li>Execute Plan </li></ul>
  9. 9. Our Observation <ul><li>Present Solutions: </li></ul><ul><ul><li>Antivirus Cloud </li></ul></ul><ul><ul><ul><li>Increase Traffic Overhead </li></ul></ul></ul><ul><ul><ul><li>Provide only Security </li></ul></ul></ul><ul><ul><li>Network Security </li></ul></ul><ul><ul><ul><li>Through VPN (Virtual Private Network) </li></ul></ul></ul><ul><ul><ul><li>(Secure Transmission Channel) </li></ul></ul></ul>
  10. 10. Related Analysis <ul><li>Central Security Mechanism </li></ul><ul><li>Trusted Sub-System SOA Pattern. </li></ul><ul><li>Public Cloud </li></ul>
  11. 11. Conclusion <ul><li>We make secure public clouds in cloud computing using of SOA strategies to make the system more robust, secure and vulnerable to the external attacks. </li></ul>
  12. 12. Questions?

×