SlideShare a Scribd company logo
OPTIMIZE THE QOS AND
SECURITY ISSUES IN CLOUD
COMPUTING
CONTENT
• Introduction
• Why Cloud Computing
• Cloud Service Models
• Cloud Computing deployment
models
• Characteristics
• Cloud Computing Architectures
• Cloud Computing Architectures
• Transparency of cloud
• Energy Management
• Security and Privacy Issues
• Azure Cloud
• Conclusion
INTRODUCTION
The practice of using a network of remote servers hosted on the Internet to store, manage, and
process data, rather than a local server or a personal computer.
We use cloud and its services to save ourselves to:
• Hire new management
• New Infrastructure
• Place to secure infrastructure.
• Controlling devices
• Increase in performance.
• Easy access to advanced resources.
• Pay per use service.
• No need to indulge in back end
maintenance.
• Full utilization of server.
• Security about their data.
• Cloud ensures auditing process.
• Reporting and tracking.
• Three services and four deployment
models.
• On-demand self-service.
• Resource pooling.
• Flexibility and scalability.
• Skilled management and
maintenance.
• Resource sharing
WHY CLOUD COMPUTING
CLOUD SCENARIO
CLOUD SERVICE MODELS
Infrastructure as a service (IaaS):
• The cost reduces as the resources exist already in the cloud.
• User just had to pay for infrastructure and the usage of capacity, like disk space, CPU,
memory server, storage and network.
• Cost service using fixed prices per resources.
• Many major computing resources coexist on IaaS.
In this model users are searching for computing resources. It is like
self-contained IT structure.
CLOUD SERVICE MODELS
Software as a service (SaaS):
• The productivity of internal resources is improved without of managing
and maintenance.
• The updating of software will be immediately given
• The complexity decreases by managing the system from central location.
• Resources are available on the network they will be accessed any time as pay
per use basis.
CLOUD SERVICE MODELS
Platform as a service (PaaS):
• The cost to manage, maintain is lower.
• Management and maintenance is responsibility of vendor.
• System is now flexible and scalable.
• Services for development, testing, deployment collaboration, hosting are now in
same environment which is deployed in cloud.
• The web based creation tools are now easily implemented.
• I provide ease to create components that are needed for user interface.
CLOUD SERVICE MODELS
CLOUD COMPUTING DEPLOYMENT MODELS
Model Managed by Used by Place location Accessibility
Public
Third party
provider
Third party
provider Off-premise Untrusted
Private
Organization
itself
Organization
itself
On-premise
Off-premise
Trusted
Third party
provider
Third party
provider
On-premise
Off-premise
Hybrid
Both
organization
and third party
provider
Both
organization
and third party
provider
Both On-
premise
Off-premise
Trusted or
Untrusted
CHARACTERISTICS REGARDING CLOUD
COMPUTING
Broad network Access. Resource Pooling. Rapid Elasticity.
Measured Service. On demand self service.
CLOUD COMPUTING ARCHITECTURES
Cloud have different Architecture:
• Aneka
• Market-oriented Cloud Architecture
• Service-Oriented Architecture
• Service-Oriented Cloud Computing Architecture (SOCCA)
• Layered Architecture of Service-Oriented Cloud Computing Architecture
• Comparison of Cloud Architectures
• Importance of Service-Oriented Architecture to Cloud Computing
SECURITY AND PRIVACY ISSUES
• What are the user privileges?
• At which level are regulatory compliance being?
• Is the data located at data center is safe enough?
• What are the issues regarding segregation of data?
• If the data is lost or damaged what are the recovery methods, Is there is any
support for investigation?
• What are the long-term planning of viability?
There are many security issues arises when we talk about cloud computing:
• Authentication.
• Authorization and confidentiality.
• Availability.
• Integrity.
CLOUD COMPUTING SECURITY ISSUES
SOLUTIONS
Integration of policies:
• Different servers have different set of policies
Controlling the Access Method:
• The most important method is the (RBAC) role based access control method.
Method of Encryption:
• Symmetric encryption
• Asymmetric encryption
METHOD PROVIDED BY AWS & AZURE
• Amazon’s web services and Microsoft Azure system gave the facility to decide the
geographic regions for their users.
• It gives assurance that data will remain there as far as they want.
• The regions are of North West, USA and some of the regions of UK.
• Now a day’s some regions of Asia are also included.
TRANSPARENCY OF CLOUD
• Transparency mean the policies will be clear to the clients and to the service providers.
• An important protocol regarding transparency is the SLA (service level agreement), SLA
has the information about:
 Service that cloud provides
 Tracing and estimating
 Managing the problem
 Appropriate compliance
 Duties of customers
 Security
 Confidential information
SECURE AUDITING
• There are two types of auditing that are:
Integrity Audit
•Confidentially
•Lost or Damaged
•Integrity check(hash PDP)
Security Audit
•Infrastructure
•Application
•Provider/ Third-party
VIRTUALIZATION ISSUES
• Virtualization concept is the building block for cloud computing.
• Basically there is a layer between hardware and operating system
that is introduced by virtualization.
• With virtualization concept the cloud computing become:
 Flexible
 Location independence
 Situations migration
• The difficulty with these virtual machines that are running on a single physical machine is to
manage them.
ENERGY MANAGEMENT
• Lot of energy is consumed during the run-time of application, power consumption
and cooling cost goes to 53% of total.
• voltage and frequency is adjusted
• P=V2*F*C
DVFS
• MIPS is used to calculate the capacity of host
machine.
• Voltagecpu= VirtualMac.MIPS/ HostMIPS
MIPS rate
ISSUES RELATED TO APPLICATION
• To ensure the security of the system there is a need to make the application secured.
• Security for the cloud application is very necessary because any hacker can easily be entered in
the system.
• Than make malicious attacks to the system.
• We have to take care of:
 Security of cloud Browser.
 Cloud Malware Attack.
 Distributed denial of service (DDoS) Attack.
 Debug and backdoor options.
ISSUES RELATED TO APPLICATION
Cloud Malware
Attack
TLS Encryption
& Signature
IS & XML
DDoS Attack
Malicious VM
Integrity Check
Debug and
backdoor options
Different
services different
network
IDS to detect.
Solutions to
handle the
Application
Code Backdoor
Development
Process
SOLUTIONS TO HANDLE THE APPLICATION
ISSUES
• Hierarchal ASBE
• Start up
• Function of Main Authority
• New User Access
• File Development
• Revocation
• Accessing the File
AZURE CLOUD
CONCLUSION
• What is Cloud.
• Implement the cloud computing.
• Architecture comparison.
• security and privacy.
• energy management.
• Application issues.
• Solutions of the issues.
• Azure Cloud.
FUTURE WORK
Researchers still have to work a lot to make this technology mature enough to adopt
easily:
• Complexity of the system.
• Strong check by enhancement in encryption/decryption process.
• Reduce the cost of the system.
• Auditing shell algorithm.
• Quad security layer.
It is an emerging technology so a lot of threats are there and organizations should have to
work together to make a big change in the IT world.

More Related Content

What's hot

Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
Bryan Slayman
 
Wimax Technology
Wimax TechnologyWimax Technology
Wimax Technology
SHUBHAM ANAND
 
5G Network Architecture and FMC
5G Network Architecture and FMC5G Network Architecture and FMC
5G Network Architecture and FMC
ITU
 
Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 2019Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 2019
3G4G
 
Wifi wireless networks
Wifi wireless networksWifi wireless networks
Wifi wireless networks
Dooremoore
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513Zarobiza
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
Ibrahim Kazanci
 
Diferencias 4 g 5g
Diferencias 4 g 5gDiferencias 4 g 5g
Diferencias 4 g 5g
JJRodrguez1
 
Evolving sdn for low power iot networks
Evolving sdn for low power iot networksEvolving sdn for low power iot networks
Evolving sdn for low power iot networks
Hanieh Kashfi
 
5g Mobile Technology
5g Mobile Technology5g Mobile Technology
5g Mobile Technologyvineetkathan
 
5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt
R.Karthick
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for Transportation
Paul Richards
 
5G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_9125G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_912
Pavan Kumar Sindgi
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
Divya korrapati
 
Broadband implementation in kg. baru
Broadband implementation in kg. baruBroadband implementation in kg. baru
Broadband implementation in kg. baru
ashrawi92
 

What's hot (20)

Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
 
Wimax Technology
Wimax TechnologyWimax Technology
Wimax Technology
 
5G Network Architecture and FMC
5G Network Architecture and FMC5G Network Architecture and FMC
5G Network Architecture and FMC
 
Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 2019Yue Wang: AI in 5G –the Why and How - Jan 2019
Yue Wang: AI in 5G –the Why and How - Jan 2019
 
Wifi wireless networks
Wifi wireless networksWifi wireless networks
Wifi wireless networks
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
 
Diferencias 4 g 5g
Diferencias 4 g 5gDiferencias 4 g 5g
Diferencias 4 g 5g
 
Evolving sdn for low power iot networks
Evolving sdn for low power iot networksEvolving sdn for low power iot networks
Evolving sdn for low power iot networks
 
3G
3G3G
3G
 
5g Mobile Technology
5g Mobile Technology5g Mobile Technology
5g Mobile Technology
 
5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for Transportation
 
5G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_9125G Wireless Technology - pavankumar_912
5G Wireless Technology - pavankumar_912
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
Broadband implementation in kg. baru
Broadband implementation in kg. baruBroadband implementation in kg. baru
Broadband implementation in kg. baru
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 

Similar to Cloud computing

CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
Dss
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Naveed Farooq
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
priyas211420
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms
Vibhawa Nirmal
 
1. introduction to cloud computing
1. introduction to cloud computing1. introduction to cloud computing
1. introduction to cloud computing
Lokesh Ramaswamy
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
ananyaakk
 
Azure Fundamentals Part 1
Azure Fundamentals Part 1Azure Fundamentals Part 1
Azure Fundamentals Part 1
CCG
 
Cloud computing computer
Cloud computing computerCloud computing computer
Cloud computing computerSanath Surawar
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Shivananda Rai
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
Somnath Sen
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
khan593595
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
khan593595
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Damian T. Gordon
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
DineshKumar746335
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
HarpreetKaur1382
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud Computing Basics.pptx
Cloud Computing Basics.pptxCloud Computing Basics.pptx
Cloud Computing Basics.pptx
SeethaDinesh
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
BHASKAR CHAUDHURY
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
Syborg Services
 

Similar to Cloud computing (20)

CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms
 
1. introduction to cloud computing
1. introduction to cloud computing1. introduction to cloud computing
1. introduction to cloud computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Azure Fundamentals Part 1
Azure Fundamentals Part 1Azure Fundamentals Part 1
Azure Fundamentals Part 1
 
Cloud computing computer
Cloud computing computerCloud computing computer
Cloud computing computer
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Computing Basics.pptx
Cloud Computing Basics.pptxCloud Computing Basics.pptx
Cloud Computing Basics.pptx
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 

More from Hamza Sajjad

Indoor propogation
Indoor propogationIndoor propogation
Indoor propogation
Hamza Sajjad
 
Resistor and conductor
Resistor and conductor Resistor and conductor
Resistor and conductor
Hamza Sajjad
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
Hamza Sajjad
 
How our body emit radiation
How our body emit radiationHow our body emit radiation
How our body emit radiation
Hamza Sajjad
 
Types of ram
Types of  ramTypes of  ram
Types of ram
Hamza Sajjad
 
Laser
LaserLaser
What is complex number
What is complex numberWhat is complex number
What is complex number
Hamza Sajjad
 

More from Hamza Sajjad (7)

Indoor propogation
Indoor propogationIndoor propogation
Indoor propogation
 
Resistor and conductor
Resistor and conductor Resistor and conductor
Resistor and conductor
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
 
How our body emit radiation
How our body emit radiationHow our body emit radiation
How our body emit radiation
 
Types of ram
Types of  ramTypes of  ram
Types of ram
 
Laser
LaserLaser
Laser
 
What is complex number
What is complex numberWhat is complex number
What is complex number
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

Cloud computing

  • 1. OPTIMIZE THE QOS AND SECURITY ISSUES IN CLOUD COMPUTING
  • 2. CONTENT • Introduction • Why Cloud Computing • Cloud Service Models • Cloud Computing deployment models • Characteristics • Cloud Computing Architectures • Cloud Computing Architectures • Transparency of cloud • Energy Management • Security and Privacy Issues • Azure Cloud • Conclusion
  • 3. INTRODUCTION The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. We use cloud and its services to save ourselves to: • Hire new management • New Infrastructure • Place to secure infrastructure. • Controlling devices
  • 4. • Increase in performance. • Easy access to advanced resources. • Pay per use service. • No need to indulge in back end maintenance. • Full utilization of server. • Security about their data. • Cloud ensures auditing process. • Reporting and tracking. • Three services and four deployment models. • On-demand self-service. • Resource pooling. • Flexibility and scalability. • Skilled management and maintenance. • Resource sharing WHY CLOUD COMPUTING
  • 6. CLOUD SERVICE MODELS Infrastructure as a service (IaaS): • The cost reduces as the resources exist already in the cloud. • User just had to pay for infrastructure and the usage of capacity, like disk space, CPU, memory server, storage and network. • Cost service using fixed prices per resources. • Many major computing resources coexist on IaaS. In this model users are searching for computing resources. It is like self-contained IT structure. CLOUD SERVICE MODELS
  • 7. Software as a service (SaaS): • The productivity of internal resources is improved without of managing and maintenance. • The updating of software will be immediately given • The complexity decreases by managing the system from central location. • Resources are available on the network they will be accessed any time as pay per use basis. CLOUD SERVICE MODELS
  • 8. Platform as a service (PaaS): • The cost to manage, maintain is lower. • Management and maintenance is responsibility of vendor. • System is now flexible and scalable. • Services for development, testing, deployment collaboration, hosting are now in same environment which is deployed in cloud. • The web based creation tools are now easily implemented. • I provide ease to create components that are needed for user interface. CLOUD SERVICE MODELS
  • 9. CLOUD COMPUTING DEPLOYMENT MODELS Model Managed by Used by Place location Accessibility Public Third party provider Third party provider Off-premise Untrusted Private Organization itself Organization itself On-premise Off-premise Trusted Third party provider Third party provider On-premise Off-premise Hybrid Both organization and third party provider Both organization and third party provider Both On- premise Off-premise Trusted or Untrusted
  • 10. CHARACTERISTICS REGARDING CLOUD COMPUTING Broad network Access. Resource Pooling. Rapid Elasticity. Measured Service. On demand self service.
  • 11. CLOUD COMPUTING ARCHITECTURES Cloud have different Architecture: • Aneka • Market-oriented Cloud Architecture • Service-Oriented Architecture • Service-Oriented Cloud Computing Architecture (SOCCA) • Layered Architecture of Service-Oriented Cloud Computing Architecture • Comparison of Cloud Architectures • Importance of Service-Oriented Architecture to Cloud Computing
  • 12. SECURITY AND PRIVACY ISSUES • What are the user privileges? • At which level are regulatory compliance being? • Is the data located at data center is safe enough? • What are the issues regarding segregation of data? • If the data is lost or damaged what are the recovery methods, Is there is any support for investigation? • What are the long-term planning of viability?
  • 13. There are many security issues arises when we talk about cloud computing: • Authentication. • Authorization and confidentiality. • Availability. • Integrity. CLOUD COMPUTING SECURITY ISSUES
  • 14. SOLUTIONS Integration of policies: • Different servers have different set of policies Controlling the Access Method: • The most important method is the (RBAC) role based access control method. Method of Encryption: • Symmetric encryption • Asymmetric encryption
  • 15. METHOD PROVIDED BY AWS & AZURE • Amazon’s web services and Microsoft Azure system gave the facility to decide the geographic regions for their users. • It gives assurance that data will remain there as far as they want. • The regions are of North West, USA and some of the regions of UK. • Now a day’s some regions of Asia are also included.
  • 16. TRANSPARENCY OF CLOUD • Transparency mean the policies will be clear to the clients and to the service providers. • An important protocol regarding transparency is the SLA (service level agreement), SLA has the information about:  Service that cloud provides  Tracing and estimating  Managing the problem  Appropriate compliance  Duties of customers  Security  Confidential information
  • 17. SECURE AUDITING • There are two types of auditing that are: Integrity Audit •Confidentially •Lost or Damaged •Integrity check(hash PDP) Security Audit •Infrastructure •Application •Provider/ Third-party
  • 18. VIRTUALIZATION ISSUES • Virtualization concept is the building block for cloud computing. • Basically there is a layer between hardware and operating system that is introduced by virtualization. • With virtualization concept the cloud computing become:  Flexible  Location independence  Situations migration • The difficulty with these virtual machines that are running on a single physical machine is to manage them.
  • 19. ENERGY MANAGEMENT • Lot of energy is consumed during the run-time of application, power consumption and cooling cost goes to 53% of total. • voltage and frequency is adjusted • P=V2*F*C DVFS • MIPS is used to calculate the capacity of host machine. • Voltagecpu= VirtualMac.MIPS/ HostMIPS MIPS rate
  • 20. ISSUES RELATED TO APPLICATION • To ensure the security of the system there is a need to make the application secured. • Security for the cloud application is very necessary because any hacker can easily be entered in the system. • Than make malicious attacks to the system. • We have to take care of:  Security of cloud Browser.  Cloud Malware Attack.  Distributed denial of service (DDoS) Attack.  Debug and backdoor options.
  • 21. ISSUES RELATED TO APPLICATION Cloud Malware Attack TLS Encryption & Signature IS & XML DDoS Attack Malicious VM Integrity Check Debug and backdoor options Different services different network IDS to detect. Solutions to handle the Application Code Backdoor Development Process
  • 22. SOLUTIONS TO HANDLE THE APPLICATION ISSUES • Hierarchal ASBE • Start up • Function of Main Authority • New User Access • File Development • Revocation • Accessing the File
  • 24. CONCLUSION • What is Cloud. • Implement the cloud computing. • Architecture comparison. • security and privacy. • energy management. • Application issues. • Solutions of the issues. • Azure Cloud.
  • 25. FUTURE WORK Researchers still have to work a lot to make this technology mature enough to adopt easily: • Complexity of the system. • Strong check by enhancement in encryption/decryption process. • Reduce the cost of the system. • Auditing shell algorithm. • Quad security layer. It is an emerging technology so a lot of threats are there and organizations should have to work together to make a big change in the IT world.

Editor's Notes

  1. Secure Transmission of Data Encrypted Data and Encrypted Data Processing Database Secure Shell Internal and external Auditing