SlideShare a Scribd company logo
1 of 12
Download to read offline
A Short Discussion On
Cloud Computing
ZUBAIR ANSARI (CSC-18F-002)
BSCS (EVENING)
SINDH MADRESSATUL ISLAM UNIVERSITY
DEPARTMENT : COMPUTER SCIENCE
Introduction To Cloud Computing
Tool & Types Of Cloud Computing
Services Of Cloud Computing
Security & Data Protection In Cloud Computing
TOPICS WILL BE COVERED
Cloud computing is a new and innovative technique for the
era of internet and technology. Cloud computing is a
systematic and technical way where related user can get on
demand access to the shared resources as well as
applications, servers’ storage or may any hardware device
over the internet or the network. Clients can buy the services
as per their need and requirement without getting the direct
access of hardware and User can access allocated services
and resources by using browser any where. Mostly root level
management is controlled by the vendor.
INTRODUCTION
Clients: A clients is a software application, platform or may be
device from where user or consumer can access their cloudy
services.
Cloud network: Cloud network is an interconnection of
resources or services between the user.
Cloud application programming interface: A cloud application
programming interface CAPI is a set of rules, tools and
that provides abstractions over a specific provider cloud.
TOOLS OF CLOUD COMPUTING
The public clouds: This is a general type of cloud. Normally small organization
use this type of cloud a start their system with cloud This type of cloud is highly
managed by cloud service provider.
The private cloud: This type of cloud computing infrastructure is used by single
organization and resources; services and access cannot be shared with other
organization.
The community clouds: This type of cloud can be shared among the multiple
organizations with a common tie. This type of cloud is generally managed and
controlled by a third party offering the cloud service.
The hybrid cloud: The hybrid cloud is concerned as another types of cloud
computing. In this type of cloud computing various internal or external services
provider provides service to multiple organization.
TYPES OF CLOUD COMPUTING
Cloud computing services provider companies or organizations are offering
range of services. According to the services module and usages it can be
categorized into four main types:
SERVICES OF CLOUD COMPUTING
SaaS (Software as a service)- It is an on-demand service where user or customer
pay per use of application in an independent platforming SaaS user can access
application or software as per their package anytime and anywhere by using the
browser. customer didn’t need to install the software on their PC.
PaaS (Platform as a service)- This type of service is generally used by developer
or programmers. PaaS provide environment for programming language
executional operating system, a web server and a database to the developer to
development, testing and running of their programs.
SERVICES OF CLOUD COMPUTING
IaaS (Infrastructure as a service)- This type of module or type offers computing
infrastructure and all computing resources including virtualization, networking
and more as well as the resources of SaaS and PaaS at a virtual environment .
type of module or type is mostly used by System administrators.
XaaS (Anything as a service) - This is a recent evolution to cloud computing
services. In XaaS, X is figure as anything which can be any cloud computing
services or as well as the mix of all resources of all three services. This module or
type is also known as ‘Everything-as-a-Service’.
SERVICES OF CLOUD COMPUTING
Security is a major challenging factor with could computing and it’s data. In this
session we will shortly discuss some important mechanisms of protection can be
used for data security in cloud computing.
SECURITY & DATA PROTECTION IN CC
Data encryption: Data encryption is most important way to protect data from
being understood or used by unrelative users. Even if unfortunately, any
unauthorized or unrelative party got the access of the data in cloud, they con
read or use it.
Backing up the data: Backing up the data is also considered as important
mechanism in the protection of data in cloud. Backing up the data is another
better way to protect the data and backed up data also must be protected
by using encryption decryption method.
Cloud Data Management Interface: Cloud Data Management Interface (CDMI) is
a modern mechanism in the phase of protection of data in the cloud. With the
implementation of CDMI user can transferred their data securely and easily from
previous to new one vendor.
SECURITY & DATA PROTECTION IN CC
This is the link for complete research paper for this presentation :
https://drive.google.com/open?id=1U494uh5ie3IUSuOQ4UW8asjfInLSxeX7
This is the link of about me on cybrary.it :
https://www.cybrary.it/members/officialzubairansari
SOURCE & ABOUT THE AUTHOR
./Thank You

More Related Content

What's hot (20)

Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Kussu.ppt
Kussu.pptKussu.ppt
Kussu.ppt
 
PPT on Cloud computing
PPT on Cloud computingPPT on Cloud computing
PPT on Cloud computing
 
It assigment
It assigmentIt assigment
It assigment
 
Venkatesh
VenkateshVenkatesh
Venkatesh
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
What is-cloud-computing
What is-cloud-computingWhat is-cloud-computing
What is-cloud-computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Advanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingAdvanced Concepts of Cloud Computing
Advanced Concepts of Cloud Computing
 
Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
How to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud ComputingHow to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud Computing
 

Similar to A short discussion on cloud computing

Similar to A short discussion on cloud computing (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CA NOTES ON EMERGING TECHNOLOGIES
CA NOTES ON EMERGING TECHNOLOGIESCA NOTES ON EMERGING TECHNOLOGIES
CA NOTES ON EMERGING TECHNOLOGIES
 
Cloud-Computing-ppt (1).pptx
Cloud-Computing-ppt (1).pptxCloud-Computing-ppt (1).pptx
Cloud-Computing-ppt (1).pptx
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdf
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Seminar cloud computing
Seminar cloud computingSeminar cloud computing
Seminar cloud computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
CC_10900220021_PRADEEP KUMAR.pptx
CC_10900220021_PRADEEP KUMAR.pptxCC_10900220021_PRADEEP KUMAR.pptx
CC_10900220021_PRADEEP KUMAR.pptx
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 

Recently uploaded

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Recently uploaded (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

A short discussion on cloud computing

  • 1. A Short Discussion On Cloud Computing ZUBAIR ANSARI (CSC-18F-002) BSCS (EVENING) SINDH MADRESSATUL ISLAM UNIVERSITY DEPARTMENT : COMPUTER SCIENCE
  • 2. Introduction To Cloud Computing Tool & Types Of Cloud Computing Services Of Cloud Computing Security & Data Protection In Cloud Computing TOPICS WILL BE COVERED
  • 3. Cloud computing is a new and innovative technique for the era of internet and technology. Cloud computing is a systematic and technical way where related user can get on demand access to the shared resources as well as applications, servers’ storage or may any hardware device over the internet or the network. Clients can buy the services as per their need and requirement without getting the direct access of hardware and User can access allocated services and resources by using browser any where. Mostly root level management is controlled by the vendor. INTRODUCTION
  • 4. Clients: A clients is a software application, platform or may be device from where user or consumer can access their cloudy services. Cloud network: Cloud network is an interconnection of resources or services between the user. Cloud application programming interface: A cloud application programming interface CAPI is a set of rules, tools and that provides abstractions over a specific provider cloud. TOOLS OF CLOUD COMPUTING
  • 5. The public clouds: This is a general type of cloud. Normally small organization use this type of cloud a start their system with cloud This type of cloud is highly managed by cloud service provider. The private cloud: This type of cloud computing infrastructure is used by single organization and resources; services and access cannot be shared with other organization. The community clouds: This type of cloud can be shared among the multiple organizations with a common tie. This type of cloud is generally managed and controlled by a third party offering the cloud service. The hybrid cloud: The hybrid cloud is concerned as another types of cloud computing. In this type of cloud computing various internal or external services provider provides service to multiple organization. TYPES OF CLOUD COMPUTING
  • 6. Cloud computing services provider companies or organizations are offering range of services. According to the services module and usages it can be categorized into four main types: SERVICES OF CLOUD COMPUTING
  • 7. SaaS (Software as a service)- It is an on-demand service where user or customer pay per use of application in an independent platforming SaaS user can access application or software as per their package anytime and anywhere by using the browser. customer didn’t need to install the software on their PC. PaaS (Platform as a service)- This type of service is generally used by developer or programmers. PaaS provide environment for programming language executional operating system, a web server and a database to the developer to development, testing and running of their programs. SERVICES OF CLOUD COMPUTING
  • 8. IaaS (Infrastructure as a service)- This type of module or type offers computing infrastructure and all computing resources including virtualization, networking and more as well as the resources of SaaS and PaaS at a virtual environment . type of module or type is mostly used by System administrators. XaaS (Anything as a service) - This is a recent evolution to cloud computing services. In XaaS, X is figure as anything which can be any cloud computing services or as well as the mix of all resources of all three services. This module or type is also known as ‘Everything-as-a-Service’. SERVICES OF CLOUD COMPUTING
  • 9. Security is a major challenging factor with could computing and it’s data. In this session we will shortly discuss some important mechanisms of protection can be used for data security in cloud computing. SECURITY & DATA PROTECTION IN CC
  • 10. Data encryption: Data encryption is most important way to protect data from being understood or used by unrelative users. Even if unfortunately, any unauthorized or unrelative party got the access of the data in cloud, they con read or use it. Backing up the data: Backing up the data is also considered as important mechanism in the protection of data in cloud. Backing up the data is another better way to protect the data and backed up data also must be protected by using encryption decryption method. Cloud Data Management Interface: Cloud Data Management Interface (CDMI) is a modern mechanism in the phase of protection of data in the cloud. With the implementation of CDMI user can transferred their data securely and easily from previous to new one vendor. SECURITY & DATA PROTECTION IN CC
  • 11. This is the link for complete research paper for this presentation : https://drive.google.com/open?id=1U494uh5ie3IUSuOQ4UW8asjfInLSxeX7 This is the link of about me on cybrary.it : https://www.cybrary.it/members/officialzubairansari SOURCE & ABOUT THE AUTHOR