SlideShare a Scribd company logo
1 of 10
What is Cloud Computing
 Cloud computing is a model for enabling network access to a
shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services).
 When you store your photos online, use webmail or a social
networking site, you are using a “cloud computing” service.
 It can be rapidly supplied and released with minimal
management effort.
 It has some essential service models, and deployment
models.
Cloud Architecture
Individual users connect to cloud from
their own personal computers and portable
device, over the Internet. To these individual
users, the cloud is seen as a single application
,device or software. The hardware in the cloud
and the operating system that manages the
hardware connections is invisible.
Service Models
1. Software as a service (SaaS)
> The capability provided to the consumer is to use the provider’s
applications running on a cloud infrastructure.
> The applications are accessible from various client devices such as
a web browser (e.g., web-based email).
> The consumer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems,
storage.
Examples: Caspio, Google Apps, Salesforce, Nivio, Learn.com.
Service Models (Cont’d)
2. Platform as a service (PaaS)
> The capability provided to the consumer is to acquired
applications created using programming languages and tools
supported by the provider.
> The consumer does not manage or control the underlying cloud
infrastructure.
> Consumer has control over the deployed applications and possibly
application hosting environment configurations.
Examples: Windows Azure, Google App.
Service Models (Cont’d)
3. Infrastructure as a service (IaaS)
> The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing
resources.
> The consumer is able to deploy and run arbitrary software, which
can include operating systems and applications.
> The consumer does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage,
deployed applications, and possibly limited control of select
networking components (e.g., host firewalls).
Examples: Windows Azure, Google App.
Service Models (Cont’d)
Deployment Models
The cloud is operated solely for an organization. It may be managed by the organization
or a third party and may exist on premise or off premise.
The cloud infrastructure is made available to the general public or a large industry group
and it is owned by an organization selling cloud services.
The cloud infrastructure is shared by several organizations and supports a specific
community that has shared concerns. It may be managed by the organizations or a third
party and may exist on premise or off premise
The cloud infrastructure is a composition of two or more clouds (private, community, or
public).
Deployment Models (cont’d)
Why the Cloud
Advantages:
• Can be less expensive compared to
software and hardware.
• Can be used from any computer or
with an Internet connection.
• The device does not need as large of an
internal storage system.
• Compatible with most computers and
operating systems.
• Provides dependable and secure data
storage center.
• Updates occur across the service.
Disadvantages:
• Security Issues
• Terms of Service
• Privacy Policies

More Related Content

What's hot

Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
Parveen Yadav
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Mamta Saxena
 

What's hot (20)

Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Introduction
 Cloud Computing Introduction Cloud Computing Introduction
Cloud Computing Introduction
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Chapter "Cloud Computing Architecture and Services"
Chapter  "Cloud Computing  Architecture and Services"Chapter  "Cloud Computing  Architecture and Services"
Chapter "Cloud Computing Architecture and Services"
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Chapter1
Chapter1Chapter1
Chapter1
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Deployment Model
Cloud Deployment ModelCloud Deployment Model
Cloud Deployment Model
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 

Similar to introduction to cloud computing

Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
Editor IJARCET
 

Similar to introduction to cloud computing (20)

Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud Def V15
Cloud Def V15Cloud Def V15
Cloud Def V15
 
Cloud def-v15
Cloud def-v15Cloud def-v15
Cloud def-v15
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction au Cloud computing
Introduction au Cloud computingIntroduction au Cloud computing
Introduction au Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 

Recently uploaded

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

introduction to cloud computing

  • 1.
  • 2. What is Cloud Computing  Cloud computing is a model for enabling network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services).  When you store your photos online, use webmail or a social networking site, you are using a “cloud computing” service.  It can be rapidly supplied and released with minimal management effort.  It has some essential service models, and deployment models.
  • 3. Cloud Architecture Individual users connect to cloud from their own personal computers and portable device, over the Internet. To these individual users, the cloud is seen as a single application ,device or software. The hardware in the cloud and the operating system that manages the hardware connections is invisible.
  • 4. Service Models 1. Software as a service (SaaS) > The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. > The applications are accessible from various client devices such as a web browser (e.g., web-based email). > The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage. Examples: Caspio, Google Apps, Salesforce, Nivio, Learn.com.
  • 5. Service Models (Cont’d) 2. Platform as a service (PaaS) > The capability provided to the consumer is to acquired applications created using programming languages and tools supported by the provider. > The consumer does not manage or control the underlying cloud infrastructure. > Consumer has control over the deployed applications and possibly application hosting environment configurations. Examples: Windows Azure, Google App.
  • 6. Service Models (Cont’d) 3. Infrastructure as a service (IaaS) > The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources. > The consumer is able to deploy and run arbitrary software, which can include operating systems and applications. > The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Examples: Windows Azure, Google App.
  • 8. Deployment Models The cloud is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. The cloud infrastructure is made available to the general public or a large industry group and it is owned by an organization selling cloud services. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or a third party and may exist on premise or off premise The cloud infrastructure is a composition of two or more clouds (private, community, or public).
  • 10. Why the Cloud Advantages: • Can be less expensive compared to software and hardware. • Can be used from any computer or with an Internet connection. • The device does not need as large of an internal storage system. • Compatible with most computers and operating systems. • Provides dependable and secure data storage center. • Updates occur across the service. Disadvantages: • Security Issues • Terms of Service • Privacy Policies