SlideShare a Scribd company logo
1 of 20
SALEH ALGHAMDI-N26846627
 VO HONG HANH –N7704283
   Introduction
    ◦ Scope
    ◦ Definition of key terms
   History of cloud computing
   Cloud service models
   Cloud deployment models
   Advantages of cloud computing
   Issues
    ◦ Privacy and security
       Confidentiality
       Integrity
       Availability
    ◦ Laws and regulations
   Recommendations                 This image is taken from
                                    http://www.itp.net/584104-gartner-warns-of-
                                    cloud-service-contract-risks
   Cloud computing – a technology that provides web-based solutions and
      services to the public using networks, servers, data warehouses‟, software
      applications and internet services managed by a third party (Giard &
      Lessard, 2010).
     Nowadays, cloud-based services are being adopted by organisations at a
      rapid rate.
     Web 2.0 tools, social networking sites are all examples in which individuals
      are moving their activities to „the cloud‟
     In 2010, Gartner predicted that cloud-based services generated more than
      $68 billion in worldwide revenue (Mielke, 2010).




This image is taken from http://www.theindiagate.info/2011/04/regulations-for-the-
cloud-ieee/
History of cloud computing
   Back to the 1960s, computer scientist John McCarthy wrote that “computation
    may someday be organized as a public utility”
   In 1997, the term was used for the first time in its current context by lecturer
    Ramnath Chellappa who defined it as a new “computing paradigm where the
    boundaries of computing will be determined by economic rationale rather
    than technical limits alone” (Biswas-a, 2011).
   In 1999, Salesforce.com - one of the first movers in cloud
    computing, introduced the concept of delivering enterprise applications via a
    website.
   Amazon launched Amazon Web Service in 2002, Google launched GoogleDocs
    in 2006
   In 2007, an industry-wide collaboration between Google, IBM and a number
    of universities across the United States soon followed.
   Microsoft‟s entry into cloud computing came in 2009 with the launch of
    Windows Azure
                                                        (Biswas, 2011)
Cloud service types

There are 3 major models for cloud computing which are:

   Infrastructure as a Service (IaaS)
   Platform as a Service (PaaS)
   Software as a Service (SaaS).




                              This image is taken from:
                              http://www.maintec.com/blog/cloud-computing-demystified/ /
IAAS

IAAS – Infrastructure as a Service

   IaaS involves physical computer hardware such as CPU
    processing, memory, data storage and network connectivity being provided
    by a vendor.
   Example of an IaaS service vendor is Amazon Elastic Compute Cloud (EC2).
   According to In-Stat, it is expected that IaaS spending will approach $4 billion
    from 2011 to 2014
PAAS

PAAS –Platform as a Service

   PaaS enables customers to use the vendor‟s cloud infrastructure to deploy
    web applications and other software developed by the customer using
    programming languages supported by the vendor .
   Example of PaaS vendors: Google App Engine, Amazon Web Services Elastic
    Beanstalk and Microsoft Windows Auzre platform.
   According to In-Stat, PaaS spending will increase 113 percent annually to
    approximately $460 million in 2014.
SAAS

SAAS – Software as a service

   The strongest cloud trend and services
   The Application itself is provided by the service provider.
   Examples: Google doc, Gmail, Hotmail, Flickr
    From 2011 to 2014, SaaS spending is expected to grow 112 percent
    annually.
Cloud deployment models




  This image is taken from:
  https://wiki.cloudsecurityalliance.org/guidance/index.php/Cloud_Computing_Architectural_
  Framework
Public cloud

   The service are provided to the client from a third party service provider
    through the Internet.
    Public clouds have a maximum potential in cost efficiencies
   Security risks must be concerned
   Examples: Amazon




                              This image is taken from:
                              http://www.definethecloud.net/tag/public-cloud/
Private cloud

   A private cloud involves an organisation‟s exclusive use of cloud
    infrastructure and services located on premises or offsite which is then
    managed by the organisation or a selected vendor.
   Reduced potential security concerns
   Examples: HP Data Centers




                             This image is taken from:
                             http://www.hightechdad.com/2012/01/31/a-cloud-for-all-seasons-
                             picking-the-right-cloud/
Hybrid cloud

   Hybrid clouds attempt to obtain most of the security benefits of a private cloud, and
    most of the economic benefits of a public cloud.




                                     This image is taken from:
                                     http://www.cloudave.com/6/perform-the-hybrid-cloud-dance-easily-
                                     with-newscale-rpath-and-eucalyptus/
Cloud computing advantages

•   Cost savings
•   No maintenance issues
•   Simplicity




                        This image is taken from
                        http://www.dailyblogging.org/internet/cloud-computing-advantages/
Cloud computing issues
     Security/Privacy                      Laws and regulations




This image is taken from
http://www.gfi.com/blog/cloud-computing-
security-implications-service-provider/    This image is taken from
                                           http://www.gfi.com/blog/cloud-computing-
                                           security-implications-service-provider/
Security/Privacy
1.     Confidentiality
privacy of information (Antonopoulos, et
al., 2010).


2.     Integrity
the authorisation to modify assets in the
cloud (Antonopoulos, et al., 2010).


3.     Availability
the availability of data when it is needed   This image is taken from
(Antonopoulos, et al., 2010).                http://www.gfi.com/blog/cloud-
                                             computing-security-implications-
                                             service-provider/
1- Confidentiality
The increased number of authorised parties to
access the cloud computing makes the data more
vulnerable to be compromised (Zissis, 2010). data
requires high algorithm encryption before it is
stored in the cloud. (Kalyani, Sonia, &
Paikrao, 2012).




                                  This image is taken from
                                  http://www.corporatecomplianceinsights.com/company/cipher
                                  cloud/
2- Integrity
Tampering QUT library data is most likely to cause daunting
damage. This issue is greater in the public cloud than it is in private
cloud. The private cloud is set up on private network, whereases;
the public cloud is off-site (Kuyoro, et al., 2011). Therefore, private
cloud is more secure for QUT library.




                                    This image is taken from
                                    http://patricksclouds.wordpress.com/2011/06/09/if-the-
                                    private-cloud-benefits-the-public-cloud-economic-model/
3- Availability
cloud computing provider must be trusted party to deal with.
Trusted third party is the one that is fully compliant in its
financial, legal, and technical elements (Zissis, 2010). The
protection of intellectual property within „the cloud‟ for QUT
library should focus on creating a strong contract, ensuring
that the business retains the rights to all data stored within the
remote servers (LegalIQ, 2011).




        This image is taken from                This image is taken from
        http://www.techrepublic.com/blog/cio-   http://meship.com/Blog/2011/03/18/cloud-
        insights/cloud-computing-how-to-make-   computing-contracts-and-services-whats-
        the-right-choices/39747431              really-happening/
Laws and regulations
One feature of cloud computing is that data can be
localised, shared and stored in several countries, depending on
what the service provider decides. However, when QUT library opt
for cloud computing services, they relinquish all control over its
information (Giard & Lessard, 2010). Therefore, it is
recommended that contract specify the countries that the
information can be accessed and used from.




                              This image is taken from http://www.gfi.com/blog/cloud-computing-
                              security-implications-service-provider/
Recommendations for QUT library
1. Use complex algorithm encryption

2. Use the private cloud

3. Choose a trusted third party

4. Negotiate Service Level Agreement

5. In the contract, specify the countries in which the information can be
   accessed and used.




                                  This image is taken from
                                  http://www.tiptopcomputers.co.uk/recommendations.html

More Related Content

What's hot

A220113
A220113A220113
A220113irjes
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..manoj kumar
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter9505567198
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Seungyun Lee
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
 

What's hot (20)

Briefing 47
Briefing 47Briefing 47
Briefing 47
 
A220113
A220113A220113
A220113
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
B042306013
B042306013B042306013
B042306013
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1
 
H046053944
H046053944H046053944
H046053944
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 

Similar to Slides 530 a2

The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingMike Tase
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
What is cloud computing technology
What is cloud computing technologyWhat is cloud computing technology
What is cloud computing technologyNIDHI SHARMA
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxaudeleypearl
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 

Similar to Slides 530 a2 (20)

Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
What is cloud computing technology
What is cloud computing technologyWhat is cloud computing technology
What is cloud computing technology
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
B017660813
B017660813B017660813
B017660813
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Slides 530 a2

  • 1. SALEH ALGHAMDI-N26846627 VO HONG HANH –N7704283
  • 2. Introduction ◦ Scope ◦ Definition of key terms  History of cloud computing  Cloud service models  Cloud deployment models  Advantages of cloud computing  Issues ◦ Privacy and security  Confidentiality  Integrity  Availability ◦ Laws and regulations  Recommendations This image is taken from http://www.itp.net/584104-gartner-warns-of- cloud-service-contract-risks
  • 3. Cloud computing – a technology that provides web-based solutions and services to the public using networks, servers, data warehouses‟, software applications and internet services managed by a third party (Giard & Lessard, 2010).  Nowadays, cloud-based services are being adopted by organisations at a rapid rate.  Web 2.0 tools, social networking sites are all examples in which individuals are moving their activities to „the cloud‟  In 2010, Gartner predicted that cloud-based services generated more than $68 billion in worldwide revenue (Mielke, 2010). This image is taken from http://www.theindiagate.info/2011/04/regulations-for-the- cloud-ieee/
  • 4. History of cloud computing  Back to the 1960s, computer scientist John McCarthy wrote that “computation may someday be organized as a public utility”  In 1997, the term was used for the first time in its current context by lecturer Ramnath Chellappa who defined it as a new “computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits alone” (Biswas-a, 2011).  In 1999, Salesforce.com - one of the first movers in cloud computing, introduced the concept of delivering enterprise applications via a website.  Amazon launched Amazon Web Service in 2002, Google launched GoogleDocs in 2006  In 2007, an industry-wide collaboration between Google, IBM and a number of universities across the United States soon followed.  Microsoft‟s entry into cloud computing came in 2009 with the launch of Windows Azure  (Biswas, 2011)
  • 5. Cloud service types There are 3 major models for cloud computing which are:  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS)  Software as a Service (SaaS). This image is taken from: http://www.maintec.com/blog/cloud-computing-demystified/ /
  • 6. IAAS IAAS – Infrastructure as a Service  IaaS involves physical computer hardware such as CPU processing, memory, data storage and network connectivity being provided by a vendor.  Example of an IaaS service vendor is Amazon Elastic Compute Cloud (EC2).  According to In-Stat, it is expected that IaaS spending will approach $4 billion from 2011 to 2014
  • 7. PAAS PAAS –Platform as a Service  PaaS enables customers to use the vendor‟s cloud infrastructure to deploy web applications and other software developed by the customer using programming languages supported by the vendor .  Example of PaaS vendors: Google App Engine, Amazon Web Services Elastic Beanstalk and Microsoft Windows Auzre platform.  According to In-Stat, PaaS spending will increase 113 percent annually to approximately $460 million in 2014.
  • 8. SAAS SAAS – Software as a service  The strongest cloud trend and services  The Application itself is provided by the service provider.  Examples: Google doc, Gmail, Hotmail, Flickr  From 2011 to 2014, SaaS spending is expected to grow 112 percent annually.
  • 9. Cloud deployment models This image is taken from: https://wiki.cloudsecurityalliance.org/guidance/index.php/Cloud_Computing_Architectural_ Framework
  • 10. Public cloud  The service are provided to the client from a third party service provider through the Internet.  Public clouds have a maximum potential in cost efficiencies  Security risks must be concerned  Examples: Amazon This image is taken from: http://www.definethecloud.net/tag/public-cloud/
  • 11. Private cloud  A private cloud involves an organisation‟s exclusive use of cloud infrastructure and services located on premises or offsite which is then managed by the organisation or a selected vendor.  Reduced potential security concerns  Examples: HP Data Centers This image is taken from: http://www.hightechdad.com/2012/01/31/a-cloud-for-all-seasons- picking-the-right-cloud/
  • 12. Hybrid cloud  Hybrid clouds attempt to obtain most of the security benefits of a private cloud, and most of the economic benefits of a public cloud. This image is taken from: http://www.cloudave.com/6/perform-the-hybrid-cloud-dance-easily- with-newscale-rpath-and-eucalyptus/
  • 13. Cloud computing advantages • Cost savings • No maintenance issues • Simplicity This image is taken from http://www.dailyblogging.org/internet/cloud-computing-advantages/
  • 14. Cloud computing issues Security/Privacy Laws and regulations This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/ This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
  • 15. Security/Privacy 1. Confidentiality privacy of information (Antonopoulos, et al., 2010). 2. Integrity the authorisation to modify assets in the cloud (Antonopoulos, et al., 2010). 3. Availability the availability of data when it is needed This image is taken from (Antonopoulos, et al., 2010). http://www.gfi.com/blog/cloud- computing-security-implications- service-provider/
  • 16. 1- Confidentiality The increased number of authorised parties to access the cloud computing makes the data more vulnerable to be compromised (Zissis, 2010). data requires high algorithm encryption before it is stored in the cloud. (Kalyani, Sonia, & Paikrao, 2012). This image is taken from http://www.corporatecomplianceinsights.com/company/cipher cloud/
  • 17. 2- Integrity Tampering QUT library data is most likely to cause daunting damage. This issue is greater in the public cloud than it is in private cloud. The private cloud is set up on private network, whereases; the public cloud is off-site (Kuyoro, et al., 2011). Therefore, private cloud is more secure for QUT library. This image is taken from http://patricksclouds.wordpress.com/2011/06/09/if-the- private-cloud-benefits-the-public-cloud-economic-model/
  • 18. 3- Availability cloud computing provider must be trusted party to deal with. Trusted third party is the one that is fully compliant in its financial, legal, and technical elements (Zissis, 2010). The protection of intellectual property within „the cloud‟ for QUT library should focus on creating a strong contract, ensuring that the business retains the rights to all data stored within the remote servers (LegalIQ, 2011). This image is taken from This image is taken from http://www.techrepublic.com/blog/cio- http://meship.com/Blog/2011/03/18/cloud- insights/cloud-computing-how-to-make- computing-contracts-and-services-whats- the-right-choices/39747431 really-happening/
  • 19. Laws and regulations One feature of cloud computing is that data can be localised, shared and stored in several countries, depending on what the service provider decides. However, when QUT library opt for cloud computing services, they relinquish all control over its information (Giard & Lessard, 2010). Therefore, it is recommended that contract specify the countries that the information can be accessed and used from. This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
  • 20. Recommendations for QUT library 1. Use complex algorithm encryption 2. Use the private cloud 3. Choose a trusted third party 4. Negotiate Service Level Agreement 5. In the contract, specify the countries in which the information can be accessed and used. This image is taken from http://www.tiptopcomputers.co.uk/recommendations.html