Cloud computing is an internet-based computing technology, where shared re-sources
such as software, platform, storage and information are provided to customers on demand.
Cloud computing is a computing platform for sharing resources that include infrastructures,
software, applications, and business processes. The exact definition of cloud computing is A
large-scale distributed computing paradigm that is driven by economies of scale, in which a
pool of abstracted, virtualized, dynamically scalable, managed computing power, storage,
platforms, and services are delivered on demand to external customers over the Internet .
2. Introduction
Cloud Services delivery Model
Deployment Model
Cloud advantage
Security in Cloud
data security
Encryption Scheme
Cloud integrity
Cloud availability
Conclusion
References
3. Introduction
Cloud computing is an internet-based computing
technology, where shared resources such as software,
platform, storage and information are provided to
customers on demand.
Cloud computing is a computing platform for sharing
resources that include infrastructures, software,
applications, and business processes. .
.
4. Cloud Services Delivery Model
A cloud services delivery model is
commonly referred to as an SPI and falls
into three generally accepted services:
The Software-As-a-Service Model
The Platform-As-a-Service Model
The Infrastructure-As-a-Service Model
hh
FIG.: Cloud delivery model
5. Software as a service (SaaS):
Software as a service features a complete
application offered as a service on
demand. A single instance of the
software runs on the cloud and services
multiple end users or client organizations.
.
Infrastructure as a service (IaaS):
Infrastructure as a service delivers basic storage and
computer capabilities as standardized services over
the network. Servers, storage systems, switches,
routers.
Platform as a service (PaaS):
In a platform-as-a-service
(PaaS) model, the vendor offers a
development environment to application
developers, who develop applications and
offer those services through the provider’s
platform.
6. Deployment Model
Cloud deployment models include:
Public clouds
Private clouds
Community clouds
Hybrid clouds.
Cloud deployment model
7. Public Clouds:
Public clouds are external or publicly available
cloud environments that are accessible to
multiple tenants.
Private clouds:
private clouds are typically tailored
environments with dedicated virtualized
resources for particular organizations.
8. Hybrid clouds:
Hybrid clouds combine both public and private
cloud models. They can help to provide on-
demand, externally provisioned scale.
Community Cloud:
In Community Cloud the cloud
infrastructure is shared by several
organizations and supports a specific
community that has shared concerns (e.g.,
mission, security requirements, policy, or
compliance considerations).
9. Cloud Advantage
Agility improves with users' ability to rapidly and inexpensively re-provision
technological infrastructure resources.
Cost is claimed to be greatly reduced and capital expenditure is converted to
operational expenditure.
Multi-tenancy enables sharing of resources and costs across a large pool of users .
Maintenance cloud computing applications are easier to maintain, since they don't
have to be installed on each user's computer.
Security could improve due to centralization of data, increased security-focused
resources, etc
10. SECURITY IN CLOUD
Data Security:
It focuses on protecting the software
and hardware associated with the cloud.
It deals with choosing an apt locatio
n for data centers so as to protect it from inter
nal threats, different types of weather conditio
ns, fire and even physical attacks that might de
stroy the center physically and external threats
avoiding unauthorized access and break in.
Network Security:
Network security Protecting the
network over which cloud is running from
various attacks DOS, DDOS, IP Spoofing, ARP
Spoofing and any novel attacks that
intruders may device.
11. Backups of Data
• Data store in database of provider should be redundantly store
in multiple physical location.
• Data that is generated during running of program on instances
is all customer data and therefore provider should not perform
backups.
• Control of Administrator on Databases.
12. Encryption Scheme
• Is it possible for all of my data to be fully encrypted?
• What algorithms are used?
• Who holds, maintains and issues the keys?
Problem:
• Encryption accidents can make data totally unusable.
• Encryption can complicate availability
Solution :
• The cloud provider should provide evidence that encryption schemes were
designed and tested by experienced specialists
13. Cloud Integrity
Integrity is a degree confidence that the data in the cloud is what is
supposed to be there, and is protected against accidental or intentional
alteration without authorization.
It also extends to the hurdles of synchronizing multiple databases.
Integrity is supported by well audited code, well-designed distributed
systems, and robust access control mechanisms.
14. Cloud Availability
Availability means being able to use the system as anticipated.
Cloud technologies can increase availability through widespread internet
enabled access, but the client is dependent on the timely and robust provision
of resources.
Availability is supported by capacity building and good architecture by the
provider, as well as well-defined contracts and terms of agreement.
15. Conclusion
Every new technology has its pros and cons, similar is the case with cloud computing.
Although cloud computing provides easy data storage and access. But there are several
issues related to storing and managing data, that is not controlled by owner of the data.
This attack attempts to prevent the data available to its intended users. The last
issue is cloud privacy and it is similar to cloud confidentiality. if cloud confidentiality is at
risk, cloud privacy will also be at risk.
16. Wang, Q, Wan, K. Ren nd Wenjing Lou, "Privacy-Preserving Public Auditing for Data StorageSecurity in
Cloud Computing", Infocom, Proceedings IEEE, 2010, pp.1-9.
Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Com-puting", in International
Conference on Computer Science and Electronics Engineer-ing(ICCSEE), 2012, vol.1, pp.647-651.
Xiao and Y. Xiao, "Security and Privacy in Cloud Computing ",IEEE Commun. Surveys and Tutorials, vol.
15, no.2, pp.843 - 859, Second quarter 2013.
Ren, C. Wang and Q. Wang, "Security Challenges for the Public Cloud", Internet Computing, IEEE ,
vol.16, no.1, pp.69-73, Jan/Feb 2012.
REFERENCES