2. CONTENTSCONTENTS
Introduction
Structure
Need for Cloud Computing
Categories
Layers
Architecture & Working
Cloud Storage
Storage Architecture
Reference Models on cloud
Data Deployment Models
Cloud Security
Infrastructure Security
Authentication
Conclusion
References
3. What is Cloud ????
Term cloud is used as a metaphor for internet.
Cloud computing relies on sharing hardware and
software resources over a network rather than on local
servers or personal devices. This network of servers
and connections is collectively known as the cloud.
The cloud is a next Generation platform that
provides dynamic resource pools, virtualization, and
high availability.
4. Individuals Corporations Non-Commercial
Cloud Middle Ware
Storage
Provisioning
OS
Provisioning
Network
Provisioning
Service(apps)
Provisioning
SLA(monitor),
Security, Billing,
Payment
Services Storage Network OS
Resources
5. Cloud computing
Cloud computing is how data is accessed using
remote servers via Internet.
Cloud computing is internet based computing, where
by shared resources, software and information are proved
to computer and other devices on demand, like the
electricity grid.
It has a business application.
Cloud computing describes both a platform and a type
of application. A cloud computing platform dynamically
provisions, configures, reconfigures, and deprovisions
servers as needed.
6. Why Cloud Computing?
Hide complexity of IT infrastructure management
Massive configurability
Reliability
High Performance
Specifiable configurability
Low cost compared to dedicated infrastructure.
9. Cloud computing Architecture
The two most components of cloud
computing architecture are
1)the front end
2) the back end
The front end is the part seen by the
client, i.e. the computer user.
The back end of the cloud computing
architecture is the ‘cloud’ itself,
comprising various computers, servers
and data storage devices.
11. Cloud Storage
• User send the copies of data
files he wants to store to the
server.
• The user can retrieve this
stored data from the server
as and when required.
• There is only one data
server needed to be
connected to the internet.
12. Cloud Storage
Architecture
A typical cloud
storage system
architecture
includes a master
control server and
several storage
servers, as shown
in the fig.
14. 1. Public Cloud Storage :
∗ Data offered by third party vender.
1. Private Cloud Storage:
∗ Cloud is dedicated to single organization.
1. Hybrid Cloud Storage:
∗ Combination of public and private storage.
1. Community Cloud Storage:
∗ Shared by several organizations having same policies.
Data Deployment models on
Cloud
15. • Cloud computing can provide infinite computing resources on
demand due to its high scalability in nature, which eliminates the
needs for Cloud service providers to plan far ahead on hardware
provisioning.
• The cloud gives access to the data but the challenge is to ensure
that only authorized entities have to access the data.
Security in Cloud Computing
16. ∗ Data-in-Transit
‐ Confidentiality and integrity using secured protocol
‐ Communication between the two hosts is identified,
authenticated, authorized, and private.
∗ Data-at-Rest
‐ data is protected by strong encryption and the key is not
present on the media itself .
∗ Data Lineage
‐ Knowing when and where the data was located within cloud
is important for audit purposes.
Aspects of Data Security
17. * Data Provenance:
‐ Computational accuracy and data integrity
‐ to control access to information and computing resource
* Data Remanence:
‐ Inadvertent disclosure of sensitive information is possible.
* Multi-cloud
‐ Spread the risk
‐Increase redundancy per application
‐Increase chance of mission completion for critical applications
18. ∗ Virtual Cloud Hosting :
‐ offering secured and reliable low cost solutions to cloud
computing clients, round the globe.
‐ maintain the security for every website they cater to
* Cloud Firewall :
‐ It can collect detailed information threats on the Internet
constantly, including the continuous attacks, botnet
harvest , malware outbreaks .
19. 1.Network Level:
‐ Ensuring confidentiality and integrity of your organization’s data‐in‐
transit to and from your public cloud provider
2.Application Level:
‐ End user security
‐ Responsibility for Web application security in the cloud
‐ implements testing and acceptance procedures for outsourced
application code
Infrastructure Security
20. ∗ Identity Management Module
∗ In this approach, an identity has identifiers or attributes that
identify and define the user. The notable idea of user‐centric
approach allows users to control their own digital identities
and also takes away the complexity of IDM from the
enterprises, therefore allowing them to focus on their own
functions.
Authentication
21. Conclusion
Storage of data on the cloud redefines the way
that we construct, access, and manage storage within
an enterprise. Some kind of data is more preferable
to be stored on the cloud than others.
Data stored on clouds is more SECURE than
those stored on transient servers.