SlideShare a Scribd company logo
Cloud Architectures
By
Pradip Subedi
Sanjay Paudel
Sujit Timilsina
Introduction
● Cloud architectures are a set of technologies and practices that allow
organizations to use computing resources as a service over the internet.
● Cloud architectures provide flexibility, scalability, and cost efficiency for
organizations of all sizes, and are used in a variety of applications including
software development, data storage, and web hosting.
Types of Cloud Architectures
Public:
Public cloud architectures are owned and
operated by third-party providers and are
accessible to anyone over the internet.
Private
Private cloud architectures are owned and
operated by a single organization and are used
for internal operations, such as data management
or research.
Hybrid
Hybrid cloud architectures combine public and
private cloud architectures to provide the benefits
of both.
Benefits of Cloud Architectures
● Cloud architectures provide scalability,
allowing organizations to easily adjust
computing resources to meet changing
demand.
● Cloud architectures are cost efficient,
eliminating the need for organizations to
invest in their own physical infrastructure.
● Cloud architectures provide flexibility,
allowing organizations to access computing
resources from anywhere with an internet
connection.
Infrastructure as a Service (IaaS) Architecture
● IaaS provides computing resources, such
as virtual machines, storage, and
networking, as a service over the
internet.
● IaaS allows organizations to easily
provision and scale resources as
needed, and is used for a variety of
applications including software
development and hosting.
Platform as a Service
(PaaS) Architecture
● PaaS provides a complete
development environment as a
service over the internet, including
tools, libraries, and frameworks.
● PaaS allows organizations to
easily develop and deploy
applications without needing to
manage the underlying
infrastructure.
Software as a Service
(SaaS) Architecture
● SaaS provides software
applications as a service over the
internet, eliminating the need for
organizations to install and
manage software on their own
infrastructure.
● SaaS is used for a variety of
applications including email,
customer relationship
management, and accounting.
Cloud Security Threats
● Cloud security threats include data
breaches, insider attacks, and
misconfigurations.
● Cloud security threats can be caused by
the organization or the cloud service
provider, and can have serious
consequences for data privacy and
security.
Cloud Security Best Practices
● Cloud security best practices
include using strong passwords,
encrypting data, and regularly
monitoring cloud resources.
● Organizations should also
choose a reputable cloud
service provider and perform
regular security audits to ensure
that their data is secure.
Conclusion
● Cloud architectures provide organizations with flexibility,
scalability, and cost efficiency, and are used for a variety of
applications.
● Organizations should also be aware of the potential security
threats associated with cloud architectures, and should
implement best practices to protect their data

More Related Content

Similar to Cloud Architectures

Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
Neethu Kuruvilla
 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdf
Asif Ali
 
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
riyasil2
 
Introduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptxIntroduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptx
Nadir Arain
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
Violet Violet
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
AnittaPMarkose
 
Harshit.ppt
Harshit.pptHarshit.ppt
Harshit.ppt
harshit asthana
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
TSplusIndia
 
Cloud-Computing Training Course By Apponix Technologies
Cloud-Computing Training Course By Apponix TechnologiesCloud-Computing Training Course By Apponix Technologies
Cloud-Computing Training Course By Apponix Technologies
056kevinChauhan
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On Organization
Romana Sharmin
 
cloud computing
cloud computingcloud computing
cloud computing
Likhitha Tellakula
 
CC.pptx
CC.pptxCC.pptx
A Comprehensive Look into the World of Cloud Computing.pdf
A Comprehensive Look into the World of Cloud Computing.pdfA Comprehensive Look into the World of Cloud Computing.pdf
A Comprehensive Look into the World of Cloud Computing.pdf
Anil
 
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
TalluriRenuka
 
Introduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptxIntroduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptx
abcxyz1337
 
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud SolutionsCloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cygnet Infotech
 
file_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptxfile_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptx
AnkitMishra290193
 
Introduction to Mircosoft Azure.pptx
Introduction to Mircosoft Azure.pptxIntroduction to Mircosoft Azure.pptx
Introduction to Mircosoft Azure.pptx
technotrust1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Akshay Vasava
 
What are the pros and cons of using cloud applications.pdf
What are the pros and cons of using cloud applications.pdfWhat are the pros and cons of using cloud applications.pdf
What are the pros and cons of using cloud applications.pdf
Anil
 

Similar to Cloud Architectures (20)

Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdf
 
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
 
Introduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptxIntroduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptx
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Harshit.ppt
Harshit.pptHarshit.ppt
Harshit.ppt
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
 
Cloud-Computing Training Course By Apponix Technologies
Cloud-Computing Training Course By Apponix TechnologiesCloud-Computing Training Course By Apponix Technologies
Cloud-Computing Training Course By Apponix Technologies
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On Organization
 
cloud computing
cloud computingcloud computing
cloud computing
 
CC.pptx
CC.pptxCC.pptx
CC.pptx
 
A Comprehensive Look into the World of Cloud Computing.pdf
A Comprehensive Look into the World of Cloud Computing.pdfA Comprehensive Look into the World of Cloud Computing.pdf
A Comprehensive Look into the World of Cloud Computing.pdf
 
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
 
Introduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptxIntroduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptx
 
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud SolutionsCloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
 
file_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptxfile_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptx
 
Introduction to Mircosoft Azure.pptx
Introduction to Mircosoft Azure.pptxIntroduction to Mircosoft Azure.pptx
Introduction to Mircosoft Azure.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
What are the pros and cons of using cloud applications.pdf
What are the pros and cons of using cloud applications.pdfWhat are the pros and cons of using cloud applications.pdf
What are the pros and cons of using cloud applications.pdf
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Cloud Architectures

  • 2. Introduction ● Cloud architectures are a set of technologies and practices that allow organizations to use computing resources as a service over the internet. ● Cloud architectures provide flexibility, scalability, and cost efficiency for organizations of all sizes, and are used in a variety of applications including software development, data storage, and web hosting.
  • 3. Types of Cloud Architectures Public: Public cloud architectures are owned and operated by third-party providers and are accessible to anyone over the internet. Private Private cloud architectures are owned and operated by a single organization and are used for internal operations, such as data management or research. Hybrid Hybrid cloud architectures combine public and private cloud architectures to provide the benefits of both.
  • 4. Benefits of Cloud Architectures ● Cloud architectures provide scalability, allowing organizations to easily adjust computing resources to meet changing demand. ● Cloud architectures are cost efficient, eliminating the need for organizations to invest in their own physical infrastructure. ● Cloud architectures provide flexibility, allowing organizations to access computing resources from anywhere with an internet connection.
  • 5. Infrastructure as a Service (IaaS) Architecture ● IaaS provides computing resources, such as virtual machines, storage, and networking, as a service over the internet. ● IaaS allows organizations to easily provision and scale resources as needed, and is used for a variety of applications including software development and hosting.
  • 6. Platform as a Service (PaaS) Architecture ● PaaS provides a complete development environment as a service over the internet, including tools, libraries, and frameworks. ● PaaS allows organizations to easily develop and deploy applications without needing to manage the underlying infrastructure.
  • 7. Software as a Service (SaaS) Architecture ● SaaS provides software applications as a service over the internet, eliminating the need for organizations to install and manage software on their own infrastructure. ● SaaS is used for a variety of applications including email, customer relationship management, and accounting.
  • 8. Cloud Security Threats ● Cloud security threats include data breaches, insider attacks, and misconfigurations. ● Cloud security threats can be caused by the organization or the cloud service provider, and can have serious consequences for data privacy and security.
  • 9. Cloud Security Best Practices ● Cloud security best practices include using strong passwords, encrypting data, and regularly monitoring cloud resources. ● Organizations should also choose a reputable cloud service provider and perform regular security audits to ensure that their data is secure.
  • 10. Conclusion ● Cloud architectures provide organizations with flexibility, scalability, and cost efficiency, and are used for a variety of applications. ● Organizations should also be aware of the potential security threats associated with cloud architectures, and should implement best practices to protect their data