SlideShare a Scribd company logo
 Introduction
 What is cloud storage?
 How does cloud storage work?
 Cloud Storage - Business Benefits
 What does it cost to users?
 Advantages of Cloud Storage
 Disadvantages of Cloud Storage
 Conclusion
 Cloud storage is a model of data storage in which
the digital data is stored in logical pools, the
physical storage spans multiple servers (and often
locations), and the physical environment is typically
owned and managed by a hosting company.
History
J.C.R. Licklider – One of the fathers of
the cloud based computing idea.
Global network that allows access from
anywhere at anytime.
Technological limits of the 60’s.
 Concept
 Cloud storage is a service model in which
data is maintained, managed and backed up
remotely and made available to users over a
network (typically the Internet).
 Redundancy
Core of cloud
computing
 Equipment
Data servers
Power supplies
 Data files
Replication
iCloud
•iCloud is a service provided by
Apple
•5GB storage space is free of
cost
•Once the iCloud is used you
can share your stored data on
any of your different Apple
devices
•Aceess to all files, music,
calendar, email
 With cloud storage, there's no need for CDs,
external hard drives, or localized servers.
 Data is quickly and automatically updated in
the cloud and available for your retrieval
whenever you need it.
• Should your office become the victim of a burglary, fire, or
natural disaster, your data is safe and secure in the cloud, even if
your physical assets are destroyed.
• One of the greatest benefits of cloud storage is its ability to grow
with its users.
• With no need for physical, on-site storage space, you can have a
smaller workspace, less equipment to buy, and fewer IT
employees to maintain your equipment and manage your data.
 Security: Many companies may not want to hand
over their data to an external organization to store,
fearing that they may not have the right security
software to protect the company’s data.
 Performance: There were several incidents that
some cloud-service providers temporarily went
down or lost customer’s data.
 Usability
 Bandwidth
 Accessibility
 Disaster Recovery
 Cost Savings
 Usability
 Bandwidth
 Accessibility
 Data Security
 Software
 Grid Computing was the last research-led
centralised approach.
 However there are concerns that the mainstream
adoption of cloud computing could cause many
problems for users.
 Many new open source systems appearing that you
can install and run on your local cluster.
4.1 Introduction to cloud storage.pdf

More Related Content

What's hot

Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
Burhan Ahmed
 
Chapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualizationChapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualization
SsendiSamuel
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
Aman Balutia
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
Sabiha M
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
Md. Mahedi Mahfuj
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
Nitinder Mohan
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
NIKHIL NAIR
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
Michelle Holley
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems
Dilum Bandara
 
MODULE-2-Cloud Computing.docx.pdf
MODULE-2-Cloud Computing.docx.pdfMODULE-2-Cloud Computing.docx.pdf
MODULE-2-Cloud Computing.docx.pdf
Sweta Kumari Barnwal
 
Distributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency controlDistributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency control
balamurugan.k Kalibalamurugan
 
Expert System - Examples
Expert System - ExamplesExpert System - Examples
Expert System - Examples
university of education,Lahore
 
Agreement protocol
Agreement protocolAgreement protocol
Agreement protocol
Saif Ali Khan
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
BOSS Webtech
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
WBUTTUTORIALS
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Resilient Systems
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
Dr.Neeraj Kumar Pandey
 

What's hot (20)

Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Chapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualizationChapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualization
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems
 
MODULE-2-Cloud Computing.docx.pdf
MODULE-2-Cloud Computing.docx.pdfMODULE-2-Cloud Computing.docx.pdf
MODULE-2-Cloud Computing.docx.pdf
 
Distributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency controlDistributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency control
 
Expert System - Examples
Expert System - ExamplesExpert System - Examples
Expert System - Examples
 
Agreement protocol
Agreement protocolAgreement protocol
Agreement protocol
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
 

Similar to 4.1 Introduction to cloud storage.pdf

4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx
yasothamohankumar
 
ChodonKumar.pptx
ChodonKumar.pptxChodonKumar.pptx
ChodonKumar.pptx
AnSHiKa187943
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptx
aravind Guru
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptx
AnSHiKa187943
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
SritamDash6
 
Cloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptxCloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptx
MonuSahite
 
Cloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptxCloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptx
MonuSahite
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
DeveshKhandare
 
Cloud storage presentation.pptx
Cloud storage presentation.pptxCloud storage presentation.pptx
Cloud storage presentation.pptx
DevishreeRout
 
NIDHI KULKARNI.pptx
NIDHI KULKARNI.pptxNIDHI KULKARNI.pptx
NIDHI KULKARNI.pptx
NIDHIKULKARNI27
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providers
Ronit Sharma
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
amanyosama21
 
cloud storage.pptx
cloud storage.pptxcloud storage.pptx
cloud storage.pptx
SrujanaChiliveri
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
VishalR50
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum Collections
Kacy Clarke
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Tannya seth
 
oracle.pptx
oracle.pptxoracle.pptx
oracle.pptx
Minakshee Patil
 
An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack
Zara Tariq
 
cloud computing
cloud computingcloud computing
cloud computing
Arqam Rafay
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
techzimslides
 

Similar to 4.1 Introduction to cloud storage.pdf (20)

4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx
 
ChodonKumar.pptx
ChodonKumar.pptxChodonKumar.pptx
ChodonKumar.pptx
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptx
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptx
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
 
Cloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptxCloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptx
 
Cloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptxCloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptx
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
 
Cloud storage presentation.pptx
Cloud storage presentation.pptxCloud storage presentation.pptx
Cloud storage presentation.pptx
 
NIDHI KULKARNI.pptx
NIDHI KULKARNI.pptxNIDHI KULKARNI.pptx
NIDHI KULKARNI.pptx
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providers
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 
cloud storage.pptx
cloud storage.pptxcloud storage.pptx
cloud storage.pptx
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum Collections
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
oracle.pptx
oracle.pptxoracle.pptx
oracle.pptx
 
An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 

Recently uploaded

This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
rameshqapcba
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Flow Through Pipe: the analysis of fluid flow within pipes
Flow Through Pipe:  the analysis of fluid flow within pipesFlow Through Pipe:  the analysis of fluid flow within pipes
Flow Through Pipe: the analysis of fluid flow within pipes
Indrajeet sahu
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Northrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdfNorthrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdf
takipo7507
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 

Recently uploaded (20)

This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Flow Through Pipe: the analysis of fluid flow within pipes
Flow Through Pipe:  the analysis of fluid flow within pipesFlow Through Pipe:  the analysis of fluid flow within pipes
Flow Through Pipe: the analysis of fluid flow within pipes
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Northrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdfNorthrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 

4.1 Introduction to cloud storage.pdf

  • 1.
  • 2.  Introduction  What is cloud storage?  How does cloud storage work?  Cloud Storage - Business Benefits  What does it cost to users?  Advantages of Cloud Storage  Disadvantages of Cloud Storage  Conclusion
  • 3.  Cloud storage is a model of data storage in which the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company.
  • 4. History J.C.R. Licklider – One of the fathers of the cloud based computing idea. Global network that allows access from anywhere at anytime. Technological limits of the 60’s.  Concept  Cloud storage is a service model in which data is maintained, managed and backed up remotely and made available to users over a network (typically the Internet).
  • 5.  Redundancy Core of cloud computing  Equipment Data servers Power supplies  Data files Replication
  • 6. iCloud •iCloud is a service provided by Apple •5GB storage space is free of cost •Once the iCloud is used you can share your stored data on any of your different Apple devices •Aceess to all files, music, calendar, email
  • 7.  With cloud storage, there's no need for CDs, external hard drives, or localized servers.  Data is quickly and automatically updated in the cloud and available for your retrieval whenever you need it. • Should your office become the victim of a burglary, fire, or natural disaster, your data is safe and secure in the cloud, even if your physical assets are destroyed. • One of the greatest benefits of cloud storage is its ability to grow with its users. • With no need for physical, on-site storage space, you can have a smaller workspace, less equipment to buy, and fewer IT employees to maintain your equipment and manage your data.
  • 8.  Security: Many companies may not want to hand over their data to an external organization to store, fearing that they may not have the right security software to protect the company’s data.  Performance: There were several incidents that some cloud-service providers temporarily went down or lost customer’s data.
  • 9.  Usability  Bandwidth  Accessibility  Disaster Recovery  Cost Savings
  • 10.  Usability  Bandwidth  Accessibility  Data Security  Software
  • 11.  Grid Computing was the last research-led centralised approach.  However there are concerns that the mainstream adoption of cloud computing could cause many problems for users.  Many new open source systems appearing that you can install and run on your local cluster.