SlideShare a Scribd company logo
1 of 11
Download to read offline
Presented by:
MAULANA ABUL KALAM AZAD
UNIVERSITY OF TECHNOLOGY
Name: Anirban Pati
Roll: 32201221020
Semester: 5th
Stream: Bachelor of Computer
Applications
Paper Name:Cloud Computing
Paper Code:BCAD501(A)
Session:2021-2024
ASANSOL ENGINEERING COLLEGE
Department of Computer Application
AFFILIATED
TO
A detailed overview of the four main cloud deployment models
Deployment Models
ANIRBAN PATI AUGUST 05, 2023
Introduction
Cloud computing is a model for enabling ubiquitous, convenient, on-demand
access to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider interaction.
Cloud deployment models refer to the different ways in which cloud computing
resources can be provisioned and managed.
There are four main types of cloud deployment models: public cloud, private cloud,
hybrid cloud, and community cloud.
Types of Deployment Models
Public Cloud
The most common type of cloud
deployment model. It offers a
wide range of services, from
infrastructure as a service (IaaS)
to software as a service (SaaS).
Private Cloud
A good choice for organizations
that need more control over their
cloud environment. It can be more
expensive than a public cloud, but
it offers greater flexibility and
security.
Community Cloud
A good choice for organizations that
need to share resources with other
organizations. It can be more cost-
effective than a private cloud, but it
offers less flexibility and control.
Hybrid Cloud
A good choice for organizations
that need the best of both worlds.
It combines the flexibility and
scalability of a public cloud with
the control and security of a
private cloud.
1 2
3 4
Public Cloud
Public Cloud is a cloud computing model where cloud services are provided over the internet by a
third-party cloud service provider.
Services are available to the general public on a pay-as-you-go basis.
Scalability: Public clouds offer vast resources that can scale up or down based on demand.
Cost-effective: Users only pay for the resources they consume, reducing upfront infrastructure
costs.
Shared Resources: Resources are shared among multiple users, leading to cost savings but
potentially impacting performance during peak times.
Accessibility: Public clouds can be accessed from anywhere with an internet connection.
Software as a Service (SaaS) applications
Web hosting and email services
Collaborative tools and productivity suites
Definition:
Characteristics:
1.
2.
3.
4.
Use Cases:
Example Providers: AWS, Microsoft Azure, Google Cloud.
Private Cloud
Private Cloud is a cloud computing model where cloud services are dedicated to a single
organization and are not accessible to the general public.
Control and Security: Private clouds offer greater control over data and security, making them
suitable for highly sensitive data and compliance requirements.
Customization: Organizations can tailor the private cloud to meet their specific needs and
infrastructure.
Performance: As resources are not shared with others, private clouds generally provide more
consistent and predictable performance.
Government agencies handling classified data
Financial institutions with strict security and
Large enterprises with significant internal IT needs
Definition:
Characteristics:
1.
2.
3.
Use Cases:
regulatory requirements
Example Providers: OpenStack, VMware.
Community Cloud
Community Cloud is a cloud computing model where cloud resources are shared among several
organizations with common interests or objectives.
Limited Access: Access to the community cloud is restricted to specific organizations with shared
purposes.
Cost Sharing: Participants share the costs of the community cloud, making it more cost-effective.
Security and Privacy: Community clouds are designed to address the specific security and
compliance needs of the participating organizations.
Research consortiums collaborating on data-intensive projects
Healthcare organizations sharing patient data
Educational institutions with shared resources for e-learning platforms
Definition:
Characteristics:
1.
2.
3.
Use Cases:
while maintaining privacy compliance
Example Scenarios: Government agencies, research institutions.
Hybrid Cloud
Hybrid Cloud is a cloud computing model that combines both public and private cloud deployments.
It allows seamless integration and data flow between the two environments.
Flexibility: Organizations can use the public cloud for non-sensitive operations and the private cloud
for critical or sensitive data.
Data Backup and Redundancy: Hybrid clouds offer a redundant backup option, ensuring data is
available even if one cloud experiences an outage.
Bursting: During peak demands, organizations can "burst" into the public cloud to access additional
resources temporarily.
E-commerce companies that experience fluctuating traffic
Healthcare organizations needing to comply
Enterprises seeking cost optimization and greater flexibility
Definition:
Characteristics:
1.
2.
3.
Use Cases:
with regulations while leveraging public cloud for less sensitive data
Example Scenarios: Bursting to a public cloud during
peak loads while using a private cloud for regular operations.
Factors to Consider
Security: Evaluate the security measures provided by the cloud deployment model
and assess if it aligns with your data protection requirements.
Compliance: Consider industry-specific regulations and ensure the chosen
deployment model complies with relevant standards.
Cost: Analyze the total cost of ownership (TCO) for each deployment model, including
upfront expenses and ongoing operational costs.
Performance: Assess the performance capabilities of the deployment model,
especially during peak times and heavy workloads.
Scalability: Determine if the deployment model can scale seamlessly as your business
needs evolve
1.
2.
3.
4.
5.
Conclusion
In conclusion, selecting the right deployment model is crucial for successful cloud
adoption.
Each deployment model has its unique characteristics, advantages, and
considerations.
Understand your organization's requirements, security needs, and budget constraints
to make an informed decision.
By choosing the right deployment model, organizations can harness the full potential
of cloud computing and drive business growth and efficiency.
Thank you!
Have a great
day ahead.

More Related Content

What's hot

Types of clouds in cloud computing
Types of clouds in cloud computingTypes of clouds in cloud computing
Types of clouds in cloud computingMahesh Chemmala
 
Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)Raj Sarode
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
Windows Azure Virtual Machines
Windows Azure Virtual MachinesWindows Azure Virtual Machines
Windows Azure Virtual MachinesClint Edmonson
 
Azure fundamentals
Azure   fundamentalsAzure   fundamentals
Azure fundamentalsRaju Kumar
 
AWS Certified Cloud Practitioner Course S11-S17
AWS Certified Cloud Practitioner Course S11-S17AWS Certified Cloud Practitioner Course S11-S17
AWS Certified Cloud Practitioner Course S11-S17Neal Davis
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnitinw25
 
Intro to Amazon S3
Intro to Amazon S3Intro to Amazon S3
Intro to Amazon S3Yu Lun Teo
 

What's hot (20)

Types of clouds in cloud computing
Types of clouds in cloud computingTypes of clouds in cloud computing
Types of clouds in cloud computing
 
Map Reduce
Map ReduceMap Reduce
Map Reduce
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Windows Azure Virtual Machines
Windows Azure Virtual MachinesWindows Azure Virtual Machines
Windows Azure Virtual Machines
 
Azure fundamentals
Azure   fundamentalsAzure   fundamentals
Azure fundamentals
 
AWS Certified Cloud Practitioner Course S11-S17
AWS Certified Cloud Practitioner Course S11-S17AWS Certified Cloud Practitioner Course S11-S17
AWS Certified Cloud Practitioner Course S11-S17
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Deployments Models
Cloud Deployments ModelsCloud Deployments Models
Cloud Deployments Models
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Intro to Amazon S3
Intro to Amazon S3Intro to Amazon S3
Intro to Amazon S3
 
Microsoft azure
Microsoft azureMicrosoft azure
Microsoft azure
 

Similar to Deployment Models in Cloud Computing

Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfCiente
 
Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfCiente
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing documentObul Naidu
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Niggasudhanshu345mishra
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxboti39263
 

Similar to Deployment Models in Cloud Computing (20)

Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdf
 
Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdf
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing document
 
NIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman NiggaNIST Model of Cloud by Piyush Bujade Aman Nigga
NIST Model of Cloud by Piyush Bujade Aman Nigga
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud building
Cloud buildingCloud building
Cloud building
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Deployment Models in Cloud Computing

  • 1. Presented by: MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY Name: Anirban Pati Roll: 32201221020 Semester: 5th Stream: Bachelor of Computer Applications Paper Name:Cloud Computing Paper Code:BCAD501(A) Session:2021-2024 ASANSOL ENGINEERING COLLEGE Department of Computer Application AFFILIATED TO
  • 2. A detailed overview of the four main cloud deployment models Deployment Models ANIRBAN PATI AUGUST 05, 2023
  • 3. Introduction Cloud computing is a model for enabling ubiquitous, convenient, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud deployment models refer to the different ways in which cloud computing resources can be provisioned and managed. There are four main types of cloud deployment models: public cloud, private cloud, hybrid cloud, and community cloud.
  • 4. Types of Deployment Models Public Cloud The most common type of cloud deployment model. It offers a wide range of services, from infrastructure as a service (IaaS) to software as a service (SaaS). Private Cloud A good choice for organizations that need more control over their cloud environment. It can be more expensive than a public cloud, but it offers greater flexibility and security. Community Cloud A good choice for organizations that need to share resources with other organizations. It can be more cost- effective than a private cloud, but it offers less flexibility and control. Hybrid Cloud A good choice for organizations that need the best of both worlds. It combines the flexibility and scalability of a public cloud with the control and security of a private cloud. 1 2 3 4
  • 5. Public Cloud Public Cloud is a cloud computing model where cloud services are provided over the internet by a third-party cloud service provider. Services are available to the general public on a pay-as-you-go basis. Scalability: Public clouds offer vast resources that can scale up or down based on demand. Cost-effective: Users only pay for the resources they consume, reducing upfront infrastructure costs. Shared Resources: Resources are shared among multiple users, leading to cost savings but potentially impacting performance during peak times. Accessibility: Public clouds can be accessed from anywhere with an internet connection. Software as a Service (SaaS) applications Web hosting and email services Collaborative tools and productivity suites Definition: Characteristics: 1. 2. 3. 4. Use Cases: Example Providers: AWS, Microsoft Azure, Google Cloud.
  • 6. Private Cloud Private Cloud is a cloud computing model where cloud services are dedicated to a single organization and are not accessible to the general public. Control and Security: Private clouds offer greater control over data and security, making them suitable for highly sensitive data and compliance requirements. Customization: Organizations can tailor the private cloud to meet their specific needs and infrastructure. Performance: As resources are not shared with others, private clouds generally provide more consistent and predictable performance. Government agencies handling classified data Financial institutions with strict security and Large enterprises with significant internal IT needs Definition: Characteristics: 1. 2. 3. Use Cases: regulatory requirements Example Providers: OpenStack, VMware.
  • 7. Community Cloud Community Cloud is a cloud computing model where cloud resources are shared among several organizations with common interests or objectives. Limited Access: Access to the community cloud is restricted to specific organizations with shared purposes. Cost Sharing: Participants share the costs of the community cloud, making it more cost-effective. Security and Privacy: Community clouds are designed to address the specific security and compliance needs of the participating organizations. Research consortiums collaborating on data-intensive projects Healthcare organizations sharing patient data Educational institutions with shared resources for e-learning platforms Definition: Characteristics: 1. 2. 3. Use Cases: while maintaining privacy compliance Example Scenarios: Government agencies, research institutions.
  • 8. Hybrid Cloud Hybrid Cloud is a cloud computing model that combines both public and private cloud deployments. It allows seamless integration and data flow between the two environments. Flexibility: Organizations can use the public cloud for non-sensitive operations and the private cloud for critical or sensitive data. Data Backup and Redundancy: Hybrid clouds offer a redundant backup option, ensuring data is available even if one cloud experiences an outage. Bursting: During peak demands, organizations can "burst" into the public cloud to access additional resources temporarily. E-commerce companies that experience fluctuating traffic Healthcare organizations needing to comply Enterprises seeking cost optimization and greater flexibility Definition: Characteristics: 1. 2. 3. Use Cases: with regulations while leveraging public cloud for less sensitive data Example Scenarios: Bursting to a public cloud during peak loads while using a private cloud for regular operations.
  • 9. Factors to Consider Security: Evaluate the security measures provided by the cloud deployment model and assess if it aligns with your data protection requirements. Compliance: Consider industry-specific regulations and ensure the chosen deployment model complies with relevant standards. Cost: Analyze the total cost of ownership (TCO) for each deployment model, including upfront expenses and ongoing operational costs. Performance: Assess the performance capabilities of the deployment model, especially during peak times and heavy workloads. Scalability: Determine if the deployment model can scale seamlessly as your business needs evolve 1. 2. 3. 4. 5.
  • 10. Conclusion In conclusion, selecting the right deployment model is crucial for successful cloud adoption. Each deployment model has its unique characteristics, advantages, and considerations. Understand your organization's requirements, security needs, and budget constraints to make an informed decision. By choosing the right deployment model, organizations can harness the full potential of cloud computing and drive business growth and efficiency.
  • 11. Thank you! Have a great day ahead.