SlideShare a Scribd company logo
1 of 25
CLOUD COMPUTING AND
SECURITY
Under the Guidence : Mrs.N.Ruba
Name of the Student : N.Monisha, S.Mahalakshmi,
S.Kiruba
Register Number : CB17S 250394
Subject code : 16SMBECA 2:1
Class : III BCA-”A”
Batch : 2017-2020
Year : 2019 - 2020
UNIT-IV
CLOUD COMPUTING AND
SECURITY
CONTENT
• Risks in cloud computing
• Data security in cloud
• Cloud security services
• Tools and technologies for cloud
• Cloud mashaps
• Apache hadoop
• Cloud tools
Risk Management
• Risk management is a significant part of
business planning.
• It can also encompass legal risks like
deception, robbery and sexual harassment
lawsuits.
• Cloud computing is somewhat new in its
present pattern, granted that, it is best
directed to reduce intermediate risk
enterprise areas.
BUSINESS RISK IN CLOUD
COMPUTING
Various Threat in cloud
computing
• Misuse and illicit use of cloud computing
• Insecure interfaces and APIs
• Vicious insiders
• Issues-related technology sharing
• Data loss or leakage
• Hijacking
• Unknown risk profile
Type of Risks in cloud computing
• Internal Security Risk
• External Security Risk
• Data Protection Risk
• Data loss.
Security Advantages in Cloud
Environment
• Data centralization
• Incident response
• Forensic image verification time
• Logging
Security Disadvantages in Cloud
Environment
• Investigation
• Data segregation
• Long-term viability
• Compromised server
• Regulatory compliance
• Recovery
Content Level Security(CLS)
• CLS evolved to meet the market place
demands and propelled by the wishes of
customer institutions.
• Content level security endows
organizations to organize data and
content at the organizational level, rather
than at the institutional level.
Data Confidentiality
• Confidentiality refers to limiting data access
only to authorized users, and stopping access to
unauthorized ones.
Access control
Passwords
Biometrics
Encryption
Privacy
Ethics
Data Integrity
• Data integrity is characterized as
safeguarding the correctness and
completeness of data and processing
procedures from intentional, unauthorized
or unintentional changes.
Data Availability
• Availability of data resources. A data
system that is not accessible when
required is not good.
• Availability is double-checking that the
authorized users have access to data and
affiliated assets when required.
Data Backup Plan
• Data backups are an absolutely crucial part of
data security and an organization should be
adept to refurbish data corruption or hardware
failure.
Disaster Recovery Plan(DRP)
• A DRP is a design that is utilized to retrieve
rapidly after a catastrophe with a smallest of
influence to the organization.
Eras of computing
The most famous two eras of computing are the
 Sequential
 Parallel eras
1. The illusion of infinite computing assets
accessible on demand.
2. The elimination of an up-front firm promise by
cloud users.
3. The proficiency to pay for use of computing
assets on a short-term basis as required and
release them as needed.
Cloud Computing Platform
• Abicloud cloud computing platform
• Eucalyptus cloud platform
• Nimbus cloud computing platform
• Open nebula cloud computing platform
Tools for building cloud
 Shared infrastructure
 Self-service automated portal
 Scalable
 Rich application container
 Programmatic control
 100% virtual hardware abstraction
 Strong multi-tenancy
 Chargeback
Mashups
• A mashup is a computing term describing
an application that uses, combines and
aggregates data from one or more
services to create a new one.
• Cloud mashups can be understood based
on their differing scopes and rely on their
real purpose
Hadoop
• Hadoop is an open source program that
endows distributed processing of large
data over inexpensive servers.
• Hadoop is creating worth for enterprise,
organization and individuals.
VMware
• Vmware’s desktop software sprints on
Microsoft Windows, Linux and Mac OS-
X.
• Vmware software presents an absolutely
virtualized set of hardware to the visitor
functioning system.
Eucaluptus
• Cloud controller(CLC)
• Cluster controller(CC)
• Node controller(NC)
• Storage controller(SC)
• Walrus storage controller(WSC)
Cloudsim
• The objective of the cloudsim project is
to supply a generalized and extensible
replication structure that endows
seamless modelling, replication and
experimentation of cloud computing
infrastructure and application services.
Opennebula
• Open nebula is actually the premier and
most sophisticated structure for cloud
computing.
• Open nebula is a completely open-source
toolkit to construct Iaas private, public
and hybrid clouds.
Nimbus
• Nimbus is an open-source toolkit
concentrated on supplying infrastructure
as a service (Iaas).
• It provides capabilities to the scientific
community.

More Related Content

What's hot

Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computinghuda2018
 
8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computingMajid Hajibaba
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed applicationRishikese MR
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Relational database management system (rdbms) i
Relational database management system (rdbms) iRelational database management system (rdbms) i
Relational database management system (rdbms) iRavinder Kamboj
 
Unit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUDUnit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUDMonishaNehkal
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architectureYisal Khan
 

What's hot (20)

Cloud security
Cloud securityCloud security
Cloud security
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computing
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud Computing & Distributed Computing
 
8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Cloud Management Mechanisms
Cloud Management MechanismsCloud Management Mechanisms
Cloud Management Mechanisms
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Relational database management system (rdbms) i
Relational database management system (rdbms) iRelational database management system (rdbms) i
Relational database management system (rdbms) i
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Unit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUDUnit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUD
 
Database Security
Database SecurityDatabase Security
Database Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 

Similar to Unit 4 -Cloud Computing and security

ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxMuhammadArslan799356
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersGokul Alex
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125Gabor Bokor
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.pptgunvinit931
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingImane SBAI
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing pptBhuvneshYadav13
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.pptDss
 

Similar to Unit 4 -Cloud Computing and security (20)

ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Unit 4 -Cloud Computing and security

  • 1. CLOUD COMPUTING AND SECURITY Under the Guidence : Mrs.N.Ruba Name of the Student : N.Monisha, S.Mahalakshmi, S.Kiruba Register Number : CB17S 250394 Subject code : 16SMBECA 2:1 Class : III BCA-”A” Batch : 2017-2020 Year : 2019 - 2020
  • 3. CONTENT • Risks in cloud computing • Data security in cloud • Cloud security services • Tools and technologies for cloud • Cloud mashaps • Apache hadoop • Cloud tools
  • 4. Risk Management • Risk management is a significant part of business planning. • It can also encompass legal risks like deception, robbery and sexual harassment lawsuits. • Cloud computing is somewhat new in its present pattern, granted that, it is best directed to reduce intermediate risk enterprise areas.
  • 5. BUSINESS RISK IN CLOUD COMPUTING
  • 6. Various Threat in cloud computing • Misuse and illicit use of cloud computing • Insecure interfaces and APIs • Vicious insiders • Issues-related technology sharing • Data loss or leakage • Hijacking • Unknown risk profile
  • 7. Type of Risks in cloud computing • Internal Security Risk • External Security Risk • Data Protection Risk • Data loss.
  • 8. Security Advantages in Cloud Environment • Data centralization • Incident response • Forensic image verification time • Logging
  • 9.
  • 10. Security Disadvantages in Cloud Environment • Investigation • Data segregation • Long-term viability • Compromised server • Regulatory compliance • Recovery
  • 11. Content Level Security(CLS) • CLS evolved to meet the market place demands and propelled by the wishes of customer institutions. • Content level security endows organizations to organize data and content at the organizational level, rather than at the institutional level.
  • 12. Data Confidentiality • Confidentiality refers to limiting data access only to authorized users, and stopping access to unauthorized ones. Access control Passwords Biometrics Encryption Privacy Ethics
  • 13. Data Integrity • Data integrity is characterized as safeguarding the correctness and completeness of data and processing procedures from intentional, unauthorized or unintentional changes.
  • 14. Data Availability • Availability of data resources. A data system that is not accessible when required is not good. • Availability is double-checking that the authorized users have access to data and affiliated assets when required.
  • 15. Data Backup Plan • Data backups are an absolutely crucial part of data security and an organization should be adept to refurbish data corruption or hardware failure. Disaster Recovery Plan(DRP) • A DRP is a design that is utilized to retrieve rapidly after a catastrophe with a smallest of influence to the organization.
  • 16. Eras of computing The most famous two eras of computing are the  Sequential  Parallel eras 1. The illusion of infinite computing assets accessible on demand. 2. The elimination of an up-front firm promise by cloud users. 3. The proficiency to pay for use of computing assets on a short-term basis as required and release them as needed.
  • 17. Cloud Computing Platform • Abicloud cloud computing platform • Eucalyptus cloud platform • Nimbus cloud computing platform • Open nebula cloud computing platform
  • 18. Tools for building cloud  Shared infrastructure  Self-service automated portal  Scalable  Rich application container  Programmatic control  100% virtual hardware abstraction  Strong multi-tenancy  Chargeback
  • 19. Mashups • A mashup is a computing term describing an application that uses, combines and aggregates data from one or more services to create a new one. • Cloud mashups can be understood based on their differing scopes and rely on their real purpose
  • 20. Hadoop • Hadoop is an open source program that endows distributed processing of large data over inexpensive servers. • Hadoop is creating worth for enterprise, organization and individuals.
  • 21. VMware • Vmware’s desktop software sprints on Microsoft Windows, Linux and Mac OS- X. • Vmware software presents an absolutely virtualized set of hardware to the visitor functioning system.
  • 22. Eucaluptus • Cloud controller(CLC) • Cluster controller(CC) • Node controller(NC) • Storage controller(SC) • Walrus storage controller(WSC)
  • 23. Cloudsim • The objective of the cloudsim project is to supply a generalized and extensible replication structure that endows seamless modelling, replication and experimentation of cloud computing infrastructure and application services.
  • 24. Opennebula • Open nebula is actually the premier and most sophisticated structure for cloud computing. • Open nebula is a completely open-source toolkit to construct Iaas private, public and hybrid clouds.
  • 25. Nimbus • Nimbus is an open-source toolkit concentrated on supplying infrastructure as a service (Iaas). • It provides capabilities to the scientific community.