SlideShare a Scribd company logo
1 of 4
Download to read offline
CLOUD COMPUTING
Cloud computing is a new paradigm where services and resources are
provided to users over the Internet.
The cloud itself is not a product, but rather a data transmission and storage
model. Basically, it is a term used to describe a global network of
interconnected remote servers functioning as a single ecosystem to store
and manage data, run applications, provide content or services to users.
Although the term “cloud” may suggest something ethereal, there is actually
a huge infrastructure consisting of numerous physical resources
(communications networks, servers, storage systems, applications, services,
etc.) behind it. This allows multiple users manage all their files at any time
and from anywhere as long as they stay connected to the Internet.
TYPES OF CLOUDS
There are several different models of cloud computing services. They have
emerged to provide the right solution for a wide range of user needs.
• Public Cloud: Cloud resources, such as servers and storage, are owned and
managed by a third-party provider who delivers them over the Internet. This
provider also owns and manages all hardware, software, and other
infrastructure components. A user can access these services and manage
his/her account using a web browser.
• Private Cloud: Cloud computing resources are used exclusively by a single
organization which manages them and decides who can access the
infrastructure that is usually installed at a local data center of on the
organization premises.Hybrid Cloud: This model combines elements of a
public cloud and a private cloud using a technology that allows data and
applications to be shared between them. Users may own some parts and
share others, but in a controlled environment.
CLOUD SERVICES
Cloud services can be divided into three main categories:
• Software as a Service (SaaS): In this model, applications are delivered over the
Internet. Users access them from a connected device using a web browser.
Some of SaaS examples include email servers, online office tools, and file
sharing.
• Platform as a Service (PaaS): This is a model where a user can enjoy the
benefits of a fully functional service-oriented platform without having to
purchase or maintain the equipment or applications. For example, procuring
hosting services for websites, databases, email, etc.
• Infrastructure as a service (IaaS): In this model, users are provided with all the
infrastructure they need to install their applications and services without
having to worry about maintaining a physical server, communications
infrastructure, or storage. It can be a virtual machine, a CPU, a hard disk along
with the necessary storage and bandwidth.
ADVANTAGES OF CLOUD COMPUTING
• Files can be accessed and modified anytime, from any location, on any
Internet-connected device.
• Flexibility in terms of storage capacity and processing power.
• Saving backup copies in the cloud.
• Reasonable price.
• Facilitating teamwork.
DISADVANTAGES OF CLOUD COMPUTING
• When there is no Internet connection or if the service provider’s equipment
fails, you will not be able to access the files in the cloud.
• Since the service provider owns, manages and controls the cloud
infrastructure, customers have minimal control over it, even after it is
removed from the cloud.
• Even though service providers tend to implement the best security standards,
a cyberattack could compromise the data stored in the cloud.
• Apart from attacks by third parties, information security threats can also
originate from the service provider itself.
CLOUD SECURITY
Cloud computing provides various data storage and processing capabilities
based on third-party servers. As a result, when you decide to use the cloud,
you lose physical access to your data and have to trust your cloud service
provider to implement adequate security measures to protect your
information.
Cloud computing security includes a wide range of policies, technologies, and
controls aimed at protecting cloud-based data, applications, and
infrastructure.
There are many different security concerns associated with cloud computing
all of which can be divided into two broad categories: issues faced by
providers (organizations offering cloud-based software, platforms, or
infrastructure as a service) and those faced by customers (companies or
people using the cloud to run applications or store data).
Cloud security is a shared responsibility: the provider must make sure that
the offered infrastructure is secure and that the customers’ data is protected,
while users are responsible for taking measures to ensure secure access by
using efficient authentication methods.
For an effective cloud security architecture, the right defenses must be
deployed in the right places by identifying potential entry points for attacks,
establishing safeguards to eliminate weaknesses and mitigate the effect of
attacks.
While there are many types of controls used in a cloud architecture, they
usually fall into one of the following categories:
• Deterrent controls: They are used to reduce the probability of attacks on a
cloud system. They warn potential attackers by informing them that there will
be severe consequences if they choose to proceed.
• Preventive controls: They strengthen the system’s protection against
incidents by reducing or eliminating vulnerabilities. They provide reliable user
authentication, reducing the probability of unauthorized access and ensuring
positive user identification.
• Detective controls: They are designed to detect threats as they occur and
react appropriately. Attacks on the cloud system and its supporting
communication infrastructure are usually detected by system and network
security monitoring, including intrusion detection and prevention.
• Corrective controls: They are implemented while an attack is in progress or
after it has occurred to mitigate the consequences, usually by limiting the
damage. These controls are primarily designed to restore a compromised
system from backup copies.
It is generally recommended to select and implement cloud security controls
according to the existing risks which are determined by assessing threats,
vulnerabilities, and their impact. Furthermore, service providers and their
users should negotiate the terms of liability and establish how incidents
involving data breach will be resolved.
CLOUD ENCRYPTION
Cloud computing security has quickly become a major concern for everyone
who uses this technology due to the sensitive nature of information they
store on the Internet.
The process of synchronizing files between different devices and the cloud is
a critical vulnerability from the point of view of data protection, making data
encryption indispensable for a high level of security.
Most cloud storage providers offer some form of file encryption either on the
server side (to store information) or on the client side.
Server-side encryption is the method used by most cloud storage services. It
means that data in an unencrypted form is uploaded to server, where it is
encrypted using the user’s password. Files are transmitted via a secure
connection (HTTPS/SSL). However, while this method offers protection
against attacks by third parties, data privacy is not guaranteed as the server
administrator or another insider can obtain access to the data and/or
encryption keys.
With client-side encryption, files are encrypted locally before they leave the
device connected to a cloud service. Ideally, the password should never leave
the client device, meaning that the cloud service provider only stores and
synchronizes data, but cannot see its content. However, not all applications
support this. Although less common, this method offers the advantage of
better privacy protection: the user’s information in an unencrypted form is
stored only on their devices, and even if the server or files are compromised,
the intruder will obtain only encrypted data and not the original content. The
drawback here is that if you forget the password, you will never be able to
recover it or use the files online, because they are stored on the server in an
encrypted from and can only be modified from the client device.
Cloud security remains a pressing challenge, and both customers and cloud
service providers need to work together proceeding from the understanding
that protecting the information exchanged between them is a shared
responsibility.

More Related Content

Similar to CLOUD COMPUTING.pdf

Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptxCloud Computing PPT.pptx
Cloud Computing PPT.pptxHetKhandol
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptxJeetThacker7
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
Is Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docxIs Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docxTiInfotech
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 

Similar to CLOUD COMPUTING.pdf (20)

Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptxCloud Computing PPT.pptx
Cloud Computing PPT.pptx
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Cloud security
Cloud securityCloud security
Cloud security
 
Is Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docxIs Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docx
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

CLOUD COMPUTING.pdf

  • 1. CLOUD COMPUTING Cloud computing is a new paradigm where services and resources are provided to users over the Internet. The cloud itself is not a product, but rather a data transmission and storage model. Basically, it is a term used to describe a global network of interconnected remote servers functioning as a single ecosystem to store and manage data, run applications, provide content or services to users. Although the term “cloud” may suggest something ethereal, there is actually a huge infrastructure consisting of numerous physical resources (communications networks, servers, storage systems, applications, services, etc.) behind it. This allows multiple users manage all their files at any time and from anywhere as long as they stay connected to the Internet. TYPES OF CLOUDS There are several different models of cloud computing services. They have emerged to provide the right solution for a wide range of user needs. • Public Cloud: Cloud resources, such as servers and storage, are owned and managed by a third-party provider who delivers them over the Internet. This provider also owns and manages all hardware, software, and other infrastructure components. A user can access these services and manage his/her account using a web browser. • Private Cloud: Cloud computing resources are used exclusively by a single organization which manages them and decides who can access the infrastructure that is usually installed at a local data center of on the organization premises.Hybrid Cloud: This model combines elements of a public cloud and a private cloud using a technology that allows data and applications to be shared between them. Users may own some parts and share others, but in a controlled environment. CLOUD SERVICES Cloud services can be divided into three main categories: • Software as a Service (SaaS): In this model, applications are delivered over the Internet. Users access them from a connected device using a web browser. Some of SaaS examples include email servers, online office tools, and file sharing. • Platform as a Service (PaaS): This is a model where a user can enjoy the benefits of a fully functional service-oriented platform without having to purchase or maintain the equipment or applications. For example, procuring hosting services for websites, databases, email, etc.
  • 2. • Infrastructure as a service (IaaS): In this model, users are provided with all the infrastructure they need to install their applications and services without having to worry about maintaining a physical server, communications infrastructure, or storage. It can be a virtual machine, a CPU, a hard disk along with the necessary storage and bandwidth. ADVANTAGES OF CLOUD COMPUTING • Files can be accessed and modified anytime, from any location, on any Internet-connected device. • Flexibility in terms of storage capacity and processing power. • Saving backup copies in the cloud. • Reasonable price. • Facilitating teamwork. DISADVANTAGES OF CLOUD COMPUTING • When there is no Internet connection or if the service provider’s equipment fails, you will not be able to access the files in the cloud. • Since the service provider owns, manages and controls the cloud infrastructure, customers have minimal control over it, even after it is removed from the cloud. • Even though service providers tend to implement the best security standards, a cyberattack could compromise the data stored in the cloud. • Apart from attacks by third parties, information security threats can also originate from the service provider itself. CLOUD SECURITY Cloud computing provides various data storage and processing capabilities based on third-party servers. As a result, when you decide to use the cloud, you lose physical access to your data and have to trust your cloud service provider to implement adequate security measures to protect your information. Cloud computing security includes a wide range of policies, technologies, and controls aimed at protecting cloud-based data, applications, and infrastructure. There are many different security concerns associated with cloud computing all of which can be divided into two broad categories: issues faced by
  • 3. providers (organizations offering cloud-based software, platforms, or infrastructure as a service) and those faced by customers (companies or people using the cloud to run applications or store data). Cloud security is a shared responsibility: the provider must make sure that the offered infrastructure is secure and that the customers’ data is protected, while users are responsible for taking measures to ensure secure access by using efficient authentication methods. For an effective cloud security architecture, the right defenses must be deployed in the right places by identifying potential entry points for attacks, establishing safeguards to eliminate weaknesses and mitigate the effect of attacks. While there are many types of controls used in a cloud architecture, they usually fall into one of the following categories: • Deterrent controls: They are used to reduce the probability of attacks on a cloud system. They warn potential attackers by informing them that there will be severe consequences if they choose to proceed. • Preventive controls: They strengthen the system’s protection against incidents by reducing or eliminating vulnerabilities. They provide reliable user authentication, reducing the probability of unauthorized access and ensuring positive user identification. • Detective controls: They are designed to detect threats as they occur and react appropriately. Attacks on the cloud system and its supporting communication infrastructure are usually detected by system and network security monitoring, including intrusion detection and prevention. • Corrective controls: They are implemented while an attack is in progress or after it has occurred to mitigate the consequences, usually by limiting the damage. These controls are primarily designed to restore a compromised system from backup copies. It is generally recommended to select and implement cloud security controls according to the existing risks which are determined by assessing threats, vulnerabilities, and their impact. Furthermore, service providers and their users should negotiate the terms of liability and establish how incidents involving data breach will be resolved. CLOUD ENCRYPTION Cloud computing security has quickly become a major concern for everyone who uses this technology due to the sensitive nature of information they store on the Internet.
  • 4. The process of synchronizing files between different devices and the cloud is a critical vulnerability from the point of view of data protection, making data encryption indispensable for a high level of security. Most cloud storage providers offer some form of file encryption either on the server side (to store information) or on the client side. Server-side encryption is the method used by most cloud storage services. It means that data in an unencrypted form is uploaded to server, where it is encrypted using the user’s password. Files are transmitted via a secure connection (HTTPS/SSL). However, while this method offers protection against attacks by third parties, data privacy is not guaranteed as the server administrator or another insider can obtain access to the data and/or encryption keys. With client-side encryption, files are encrypted locally before they leave the device connected to a cloud service. Ideally, the password should never leave the client device, meaning that the cloud service provider only stores and synchronizes data, but cannot see its content. However, not all applications support this. Although less common, this method offers the advantage of better privacy protection: the user’s information in an unencrypted form is stored only on their devices, and even if the server or files are compromised, the intruder will obtain only encrypted data and not the original content. The drawback here is that if you forget the password, you will never be able to recover it or use the files online, because they are stored on the server in an encrypted from and can only be modified from the client device. Cloud security remains a pressing challenge, and both customers and cloud service providers need to work together proceeding from the understanding that protecting the information exchanged between them is a shared responsibility.