SlideShare a Scribd company logo
1 of 25
OPTIMIZE THE QOS AND
SECURITY ISSUES IN CLOUD
COMPUTING
CONTENT
• Introduction
• Why Cloud Computing
• Cloud Service Models
• Cloud Computing deployment
models
• Characteristics
• Cloud Computing Architectures
• Cloud Computing Architectures
• Transparency of cloud
• Energy Management
• Security and Privacy Issues
• Azure Cloud
• Conclusion
INTRODUCTION
The practice of using a network of remote servers hosted on the Internet to store, manage, and
process data, rather than a local server or a personal computer.
We use cloud and its services to save ourselves to:
• Hire new management
• New Infrastructure
• Place to secure infrastructure.
• Controlling devices
• Increase in performance.
• Easy access to advanced resources.
• Pay per use service.
• No need to indulge in back end
maintenance.
• Full utilization of server.
• Security about their data.
• Cloud ensures auditing process.
• Reporting and tracking.
• Three services and four deployment
models.
• On-demand self-service.
• Resource pooling.
• Flexibility and scalability.
• Skilled management and
maintenance.
• Resource sharing
WHY CLOUD COMPUTING
CLOUD SCENARIO
CLOUD SERVICE MODELS
Infrastructure as a service (IaaS):
• The cost reduces as the resources exist already in the cloud.
• User just had to pay for infrastructure and the usage of capacity, like disk space, CPU,
memory server, storage and network.
• Cost service using fixed prices per resources.
• Many major computing resources coexist on IaaS.
In this model users are searching for computing resources. It is like
self-contained IT structure.
CLOUD SERVICE MODELS
Software as a service (SaaS):
• The productivity of internal resources is improved without of managing
and maintenance.
• The updating of software will be immediately given
• The complexity decreases by managing the system from central location.
• Resources are available on the network they will be accessed any time as pay
per use basis.
CLOUD SERVICE MODELS
Platform as a service (PaaS):
• The cost to manage, maintain is lower.
• Management and maintenance is responsibility of vendor.
• System is now flexible and scalable.
• Services for development, testing, deployment collaboration, hosting are now in
same environment which is deployed in cloud.
• The web based creation tools are now easily implemented.
• I provide ease to create components that are needed for user interface.
CLOUD SERVICE MODELS
CLOUD COMPUTING DEPLOYMENT MODELS
Model Managed by Used by Place location Accessibility
Public
Third party
provider
Third party
provider Off-premise Untrusted
Private
Organization
itself
Organization
itself
On-premise
Off-premise
Trusted
Third party
provider
Third party
provider
On-premise
Off-premise
Hybrid
Both
organization
and third party
provider
Both
organization
and third party
provider
Both On-
premise
Off-premise
Trusted or
Untrusted
CHARACTERISTICS REGARDING CLOUD
COMPUTING
Broad network Access. Resource Pooling. Rapid Elasticity.
Measured Service. On demand self service.
CLOUD COMPUTING ARCHITECTURES
Cloud have different Architecture:
• Aneka
• Market-oriented Cloud Architecture
• Service-Oriented Architecture
• Service-Oriented Cloud Computing Architecture (SOCCA)
• Layered Architecture of Service-Oriented Cloud Computing Architecture
• Comparison of Cloud Architectures
• Importance of Service-Oriented Architecture to Cloud Computing
SECURITY AND PRIVACY ISSUES
• What are the user privileges?
• At which level are regulatory compliance being?
• Is the data located at data center is safe enough?
• What are the issues regarding segregation of data?
• If the data is lost or damaged what are the recovery methods, Is there is any
support for investigation?
• What are the long-term planning of viability?
There are many security issues arises when we talk about cloud computing:
• Authentication.
• Authorization and confidentiality.
• Availability.
• Integrity.
CLOUD COMPUTING SECURITY ISSUES
SOLUTIONS
Integration of policies:
• Different servers have different set of policies
Controlling the Access Method:
• The most important method is the (RBAC) role based access control method.
Method of Encryption:
• Symmetric encryption
• Asymmetric encryption
METHOD PROVIDED BY AWS & AZURE
• Amazon’s web services and Microsoft Azure system gave the facility to decide the
geographic regions for their users.
• It gives assurance that data will remain there as far as they want.
• The regions are of North West, USA and some of the regions of UK.
• Now a day’s some regions of Asia are also included.
TRANSPARENCY OF CLOUD
• Transparency mean the policies will be clear to the clients and to the service providers.
• An important protocol regarding transparency is the SLA (service level agreement), SLA
has the information about:
 Service that cloud provides
 Tracing and estimating
 Managing the problem
 Appropriate compliance
 Duties of customers
 Security
 Confidential information
SECURE AUDITING
• There are two types of auditing that are:
Integrity Audit
•Confidentially
•Lost or Damaged
•Integrity check(hash PDP)
Security Audit
•Infrastructure
•Application
•Provider/ Third-party
VIRTUALIZATION ISSUES
• Virtualization concept is the building block for cloud computing.
• Basically there is a layer between hardware and operating system
that is introduced by virtualization.
• With virtualization concept the cloud computing become:
 Flexible
 Location independence
 Situations migration
• The difficulty with these virtual machines that are running on a single physical machine is to
manage them.
ENERGY MANAGEMENT
• Lot of energy is consumed during the run-time of application, power consumption
and cooling cost goes to 53% of total.
• voltage and frequency is adjusted
• P=V2*F*C
DVFS
• MIPS is used to calculate the capacity of host
machine.
• Voltagecpu= VirtualMac.MIPS/ HostMIPS
MIPS rate
ISSUES RELATED TO APPLICATION
• To ensure the security of the system there is a need to make the application secured.
• Security for the cloud application is very necessary because any hacker can easily be entered in
the system.
• Than make malicious attacks to the system.
• We have to take care of:
 Security of cloud Browser.
 Cloud Malware Attack.
 Distributed denial of service (DDoS) Attack.
 Debug and backdoor options.
ISSUES RELATED TO APPLICATION
Cloud Malware
Attack
TLS Encryption
& Signature
IS & XML
DDoS Attack
Malicious VM
Integrity Check
Debug and
backdoor options
Different
services different
network
IDS to detect.
Solutions to
handle the
Application
Code Backdoor
Development
Process
SOLUTIONS TO HANDLE THE APPLICATION
ISSUES
• Hierarchal ASBE
• Start up
• Function of Main Authority
• New User Access
• File Development
• Revocation
• Accessing the File
AZURE CLOUD
CONCLUSION
• What is Cloud.
• Implement the cloud computing.
• Architecture comparison.
• security and privacy.
• energy management.
• Application issues.
• Solutions of the issues.
• Azure Cloud.
FUTURE WORK
Researchers still have to work a lot to make this technology mature enough to adopt
easily:
• Complexity of the system.
• Strong check by enhancement in encryption/decryption process.
• Reduce the cost of the system.
• Auditing shell algorithm.
• Quad security layer.
It is an emerging technology so a lot of threats are there and organizations should have to
work together to make a big change in the IT world.

More Related Content

What's hot

Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationBryan Slayman
 
5G Network Architecture and FMC
5G Network Architecture and FMC5G Network Architecture and FMC
5G Network Architecture and FMCITU
 
Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 2019Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 20193G4G
 
Wifi wireless networks
Wifi wireless networksWifi wireless networks
Wifi wireless networksDooremoore
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513Zarobiza
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Diferencias 4 g 5g
Diferencias 4 g 5gDiferencias 4 g 5g
Diferencias 4 g 5gJJRodrguez1
 
Evolving sdn for low power iot networks
Evolving sdn for low power iot networksEvolving sdn for low power iot networks
Evolving sdn for low power iot networksHanieh Kashfi
 
5g Mobile Technology
5g Mobile Technology5g Mobile Technology
5g Mobile Technologyvineetkathan
 
5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.pptR.Karthick
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationPaul Richards
 
5G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_9125G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_912Pavan Kumar Sindgi
 
Broadband implementation in kg. baru
Broadband implementation in kg. baruBroadband implementation in kg. baru
Broadband implementation in kg. baruashrawi92
 

What's hot (20)

Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
 
Wimax Technology
Wimax TechnologyWimax Technology
Wimax Technology
 
5G Network Architecture and FMC
5G Network Architecture and FMC5G Network Architecture and FMC
5G Network Architecture and FMC
 
Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 2019Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 2019
 
Wifi wireless networks
Wifi wireless networksWifi wireless networks
Wifi wireless networks
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
 
Diferencias 4 g 5g
Diferencias 4 g 5gDiferencias 4 g 5g
Diferencias 4 g 5g
 
Evolving sdn for low power iot networks
Evolving sdn for low power iot networksEvolving sdn for low power iot networks
Evolving sdn for low power iot networks
 
3G
3G3G
3G
 
5g Mobile Technology
5g Mobile Technology5g Mobile Technology
5g Mobile Technology
 
5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for Transportation
 
5G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_9125G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_912
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
Broadband implementation in kg. baru
Broadband implementation in kg. baruBroadband implementation in kg. baru
Broadband implementation in kg. baru
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 

Similar to Cloud computing

CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.pptDss
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)priyas211420
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms Vibhawa Nirmal
 
1. introduction to cloud computing
1. introduction to cloud computing1. introduction to cloud computing
1. introduction to cloud computingLokesh Ramaswamy
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
Azure Fundamentals Part 1
Azure Fundamentals Part 1Azure Fundamentals Part 1
Azure Fundamentals Part 1CCG
 
Cloud computing computer
Cloud computing computerCloud computing computer
Cloud computing computerSanath Surawar
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Shivananda Rai
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud servicesSomnath Sen
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfkhan593595
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfkhan593595
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingDamian T. Gordon
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...DineshKumar746335
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud ComputingHarpreetKaur1382
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Cloud Computing Basics.pptx
Cloud Computing Basics.pptxCloud Computing Basics.pptx
Cloud Computing Basics.pptxSeethaDinesh
 

Similar to Cloud computing (20)

CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms
 
1. introduction to cloud computing
1. introduction to cloud computing1. introduction to cloud computing
1. introduction to cloud computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Azure Fundamentals Part 1
Azure Fundamentals Part 1Azure Fundamentals Part 1
Azure Fundamentals Part 1
 
Cloud computing computer
Cloud computing computerCloud computing computer
Cloud computing computer
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Computing Basics.pptx
Cloud Computing Basics.pptxCloud Computing Basics.pptx
Cloud Computing Basics.pptx
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 

More from Hamza Sajjad

Indoor propogation
Indoor propogationIndoor propogation
Indoor propogationHamza Sajjad
 
Resistor and conductor
Resistor and conductor Resistor and conductor
Resistor and conductor Hamza Sajjad
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Hamza Sajjad
 
How our body emit radiation
How our body emit radiationHow our body emit radiation
How our body emit radiationHamza Sajjad
 
What is complex number
What is complex numberWhat is complex number
What is complex numberHamza Sajjad
 

More from Hamza Sajjad (7)

Indoor propogation
Indoor propogationIndoor propogation
Indoor propogation
 
Resistor and conductor
Resistor and conductor Resistor and conductor
Resistor and conductor
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
 
How our body emit radiation
How our body emit radiationHow our body emit radiation
How our body emit radiation
 
Types of ram
Types of  ramTypes of  ram
Types of ram
 
Laser
LaserLaser
Laser
 
What is complex number
What is complex numberWhat is complex number
What is complex number
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Cloud computing

  • 1. OPTIMIZE THE QOS AND SECURITY ISSUES IN CLOUD COMPUTING
  • 2. CONTENT • Introduction • Why Cloud Computing • Cloud Service Models • Cloud Computing deployment models • Characteristics • Cloud Computing Architectures • Cloud Computing Architectures • Transparency of cloud • Energy Management • Security and Privacy Issues • Azure Cloud • Conclusion
  • 3. INTRODUCTION The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. We use cloud and its services to save ourselves to: • Hire new management • New Infrastructure • Place to secure infrastructure. • Controlling devices
  • 4. • Increase in performance. • Easy access to advanced resources. • Pay per use service. • No need to indulge in back end maintenance. • Full utilization of server. • Security about their data. • Cloud ensures auditing process. • Reporting and tracking. • Three services and four deployment models. • On-demand self-service. • Resource pooling. • Flexibility and scalability. • Skilled management and maintenance. • Resource sharing WHY CLOUD COMPUTING
  • 6. CLOUD SERVICE MODELS Infrastructure as a service (IaaS): • The cost reduces as the resources exist already in the cloud. • User just had to pay for infrastructure and the usage of capacity, like disk space, CPU, memory server, storage and network. • Cost service using fixed prices per resources. • Many major computing resources coexist on IaaS. In this model users are searching for computing resources. It is like self-contained IT structure. CLOUD SERVICE MODELS
  • 7. Software as a service (SaaS): • The productivity of internal resources is improved without of managing and maintenance. • The updating of software will be immediately given • The complexity decreases by managing the system from central location. • Resources are available on the network they will be accessed any time as pay per use basis. CLOUD SERVICE MODELS
  • 8. Platform as a service (PaaS): • The cost to manage, maintain is lower. • Management and maintenance is responsibility of vendor. • System is now flexible and scalable. • Services for development, testing, deployment collaboration, hosting are now in same environment which is deployed in cloud. • The web based creation tools are now easily implemented. • I provide ease to create components that are needed for user interface. CLOUD SERVICE MODELS
  • 9. CLOUD COMPUTING DEPLOYMENT MODELS Model Managed by Used by Place location Accessibility Public Third party provider Third party provider Off-premise Untrusted Private Organization itself Organization itself On-premise Off-premise Trusted Third party provider Third party provider On-premise Off-premise Hybrid Both organization and third party provider Both organization and third party provider Both On- premise Off-premise Trusted or Untrusted
  • 10. CHARACTERISTICS REGARDING CLOUD COMPUTING Broad network Access. Resource Pooling. Rapid Elasticity. Measured Service. On demand self service.
  • 11. CLOUD COMPUTING ARCHITECTURES Cloud have different Architecture: • Aneka • Market-oriented Cloud Architecture • Service-Oriented Architecture • Service-Oriented Cloud Computing Architecture (SOCCA) • Layered Architecture of Service-Oriented Cloud Computing Architecture • Comparison of Cloud Architectures • Importance of Service-Oriented Architecture to Cloud Computing
  • 12. SECURITY AND PRIVACY ISSUES • What are the user privileges? • At which level are regulatory compliance being? • Is the data located at data center is safe enough? • What are the issues regarding segregation of data? • If the data is lost or damaged what are the recovery methods, Is there is any support for investigation? • What are the long-term planning of viability?
  • 13. There are many security issues arises when we talk about cloud computing: • Authentication. • Authorization and confidentiality. • Availability. • Integrity. CLOUD COMPUTING SECURITY ISSUES
  • 14. SOLUTIONS Integration of policies: • Different servers have different set of policies Controlling the Access Method: • The most important method is the (RBAC) role based access control method. Method of Encryption: • Symmetric encryption • Asymmetric encryption
  • 15. METHOD PROVIDED BY AWS & AZURE • Amazon’s web services and Microsoft Azure system gave the facility to decide the geographic regions for their users. • It gives assurance that data will remain there as far as they want. • The regions are of North West, USA and some of the regions of UK. • Now a day’s some regions of Asia are also included.
  • 16. TRANSPARENCY OF CLOUD • Transparency mean the policies will be clear to the clients and to the service providers. • An important protocol regarding transparency is the SLA (service level agreement), SLA has the information about:  Service that cloud provides  Tracing and estimating  Managing the problem  Appropriate compliance  Duties of customers  Security  Confidential information
  • 17. SECURE AUDITING • There are two types of auditing that are: Integrity Audit •Confidentially •Lost or Damaged •Integrity check(hash PDP) Security Audit •Infrastructure •Application •Provider/ Third-party
  • 18. VIRTUALIZATION ISSUES • Virtualization concept is the building block for cloud computing. • Basically there is a layer between hardware and operating system that is introduced by virtualization. • With virtualization concept the cloud computing become:  Flexible  Location independence  Situations migration • The difficulty with these virtual machines that are running on a single physical machine is to manage them.
  • 19. ENERGY MANAGEMENT • Lot of energy is consumed during the run-time of application, power consumption and cooling cost goes to 53% of total. • voltage and frequency is adjusted • P=V2*F*C DVFS • MIPS is used to calculate the capacity of host machine. • Voltagecpu= VirtualMac.MIPS/ HostMIPS MIPS rate
  • 20. ISSUES RELATED TO APPLICATION • To ensure the security of the system there is a need to make the application secured. • Security for the cloud application is very necessary because any hacker can easily be entered in the system. • Than make malicious attacks to the system. • We have to take care of:  Security of cloud Browser.  Cloud Malware Attack.  Distributed denial of service (DDoS) Attack.  Debug and backdoor options.
  • 21. ISSUES RELATED TO APPLICATION Cloud Malware Attack TLS Encryption & Signature IS & XML DDoS Attack Malicious VM Integrity Check Debug and backdoor options Different services different network IDS to detect. Solutions to handle the Application Code Backdoor Development Process
  • 22. SOLUTIONS TO HANDLE THE APPLICATION ISSUES • Hierarchal ASBE • Start up • Function of Main Authority • New User Access • File Development • Revocation • Accessing the File
  • 24. CONCLUSION • What is Cloud. • Implement the cloud computing. • Architecture comparison. • security and privacy. • energy management. • Application issues. • Solutions of the issues. • Azure Cloud.
  • 25. FUTURE WORK Researchers still have to work a lot to make this technology mature enough to adopt easily: • Complexity of the system. • Strong check by enhancement in encryption/decryption process. • Reduce the cost of the system. • Auditing shell algorithm. • Quad security layer. It is an emerging technology so a lot of threats are there and organizations should have to work together to make a big change in the IT world.

Editor's Notes

  1. Secure Transmission of Data Encrypted Data and Encrypted Data Processing Database Secure Shell Internal and external Auditing