Published on

Published in: Technology, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. CONTENTSCONTENTS  Introduction  Structure  Need for Cloud Computing  Categories  Layers  Architecture & Working  Cloud Storage  Storage Architecture  Reference Models on cloud  Data Deployment Models  Cloud Security  Infrastructure Security  Authentication  Conclusion  References
  2. 2. What is Cloud ????  Term cloud is used as a metaphor for internet.  Cloud computing relies on sharing hardware and software resources over a network rather than on local servers or personal devices. This network of servers and connections is collectively known as the cloud.  The cloud is a next Generation platform that provides dynamic resource pools, virtualization, and high availability.
  3. 3. Individuals Corporations Non-Commercial Cloud Middle Ware Storage Provisioning OS Provisioning Network Provisioning Service(apps) Provisioning SLA(monitor), Security, Billing, Payment Services Storage Network OS Resources
  4. 4. Cloud computing  Cloud computing is how data is accessed using remote servers via Internet.  Cloud computing is internet based computing, where by shared resources, software and information are proved to computer and other devices on demand, like the electricity grid.  It has a business application.  Cloud computing describes both a platform and a type of application. A cloud computing platform dynamically provisions, configures, reconfigures, and deprovisions servers as needed.
  5. 5. Why Cloud Computing?  Hide complexity of IT infrastructure management  Massive configurability  Reliability  High Performance  Specifiable configurability  Low cost compared to dedicated infrastructure.
  6. 6. Categories
  7. 7. Cloud Computing - layers
  8. 8. Cloud computing Architecture The two most components of cloud computing architecture are 1)the front end 2) the back end  The front end is the part seen by the client, i.e. the computer user.  The back end of the cloud computing architecture is the ‘cloud’ itself, comprising various computers, servers and data storage devices.
  9. 9. How do they work?
  10. 10. Cloud Storage • User send the copies of data files he wants to store to the server. • The user can retrieve this stored data from the server as and when required. • There is only one data server needed to be connected to the internet.
  11. 11. Cloud Storage Architecture A typical cloud storage system architecture includes a master control server and several storage servers, as shown in the fig.
  12. 12. Cloud Storage Reference Model
  13. 13. 1. Public Cloud Storage : ∗ Data offered by third party vender. 1. Private Cloud Storage: ∗ Cloud is dedicated to single organization. 1. Hybrid Cloud Storage: ∗ Combination of public and private storage. 1. Community Cloud Storage: ∗ Shared by several organizations having same policies. Data Deployment models on Cloud
  14. 14. • Cloud computing can provide infinite computing resources on demand due to its high scalability in nature, which eliminates the needs for Cloud service providers to plan far ahead on hardware provisioning. • The cloud gives access to the data but the challenge is to ensure that only authorized entities have to access the data. Security in Cloud Computing
  15. 15. ∗ Data-in-Transit ‐ Confidentiality and integrity using secured protocol ‐ Communication between the two hosts is identified, authenticated, authorized, and private. ∗ Data-at-Rest ‐ data is protected by strong encryption and the key is not present on the media itself . ∗ Data Lineage ‐ Knowing when and where the data was located within cloud is important for audit purposes. Aspects of Data Security
  16. 16. * Data Provenance: ‐ Computational accuracy and data integrity ‐ to control access to information and computing resource * Data Remanence: ‐ Inadvertent disclosure of sensitive information is possible. * Multi-cloud ‐ Spread the risk ‐Increase redundancy per application ‐Increase chance of mission completion for critical applications
  17. 17. ∗ Virtual Cloud Hosting : ‐ offering secured and reliable low cost solutions to cloud computing clients, round the globe. ‐ maintain the security for every website they cater to * Cloud Firewall : ‐ It can collect detailed information threats on the Internet constantly, including the continuous attacks, botnet harvest , malware outbreaks .
  18. 18. 1.Network Level: ‐ Ensuring confidentiality and integrity of your organization’s data‐in‐ transit to and from your public cloud provider 2.Application Level: ‐ End user security ‐ Responsibility for Web application security in the cloud ‐ implements testing and acceptance procedures for outsourced application code Infrastructure Security
  19. 19. ∗ Identity Management Module ∗ In this approach, an identity has identifiers or attributes that identify and define the user. The notable idea of user‐centric approach allows users to control their own digital identities and also takes away the complexity of IDM from the enterprises, therefore allowing them to focus on their own functions. Authentication
  20. 20. Conclusion Storage of data on the cloud redefines the way that we construct, access, and manage storage within an enterprise. Some kind of data is more preferable to be stored on the cloud than others. Data stored on clouds is more SECURE than those stored on transient servers.
  21. 21. References   reality_1.html  _of_Rights  PDF     Chip Computer Magazine,
  22. 22. Thank You !!!