SlideShare a Scribd company logo
GOVERNMENT POLYTECHNIC, NAGPUR
DEPARTMENT OF INFORMATION TECHNOLOGY
CLOUD COMPUTING
TOPIC:
TABLE OF CONTENTS
• WHAT IS CLOUD COMPUTING?
• HISTORY
• CHARACTERISTICS
• ARCHITECTURE
• BASIC CONCEPTS
• EDGE COMPTUING
• CLOUD SECURITY
• ADVANTAGES
• DISADVANTAGES
• WHAT IS CLOUD COMPUTING?
Cloud computing means storing and accessing the data and
programs over the internet rather than the computer’s hard disk.
The data can be anything such as music, files, images,
documents, and many more.
• HISTORY
Before cloud computing emerged, there was client/server computing, centralized storage in
which all the data, software applications and all the controls reside on the server side.
The cloud symbol was used to represent networks of computing equipment in the original
ARPANET by as early as 1977and the CSNET by 1981 both predecessors to the Internet itself.
In 1999, Salesforce.com became the 1st company to enter the cloud arena, excelling the
concept of providing enterprise-level applications to end users through the Internet.
In 2002, Amazon came up with Amazon Web Services, providing services like computation,
storage, and even human intelligence.
In 2009, Google Apps and Microsoft’s Windows Azurealso started to provide cloud computing
enterprise applications.
Later on many companies like HP, Oracle, Compaq, Facebook, Twitter, Instagram and many
other social media platforms started using cloud computing.
• DIFFERENCE BETWEEN CLOUD STORAGE AND LOCAL
STORAGE
Local Storage Cloud Storage
Local Storage includes physical hardware
such as external hard drives, flash drives, and
CDs.
Cloud Storage refers to any program owned
by a third party that allows you to upload
your data using the Internet.
Your data isn't accessible unless you have the
hardware with you.
Cloud storage requires an Internet connection
for access.
It is inexpensive. If you want to store a lot of information,
you’ll probably have to pay for storage.
The data is under your control. Third-party storage is vulnerable to theft and
hardware failure.
Following are the characteristics of Cloud Computing:
0. Great Availability of Resources
0. On-demand Self-service
0. Easy Maintenance
0. Large Network Access
0. Availability
0. Automatic System
0. Economical
0. Security
0. Pay as you go
• CHARACTERISTICS
• ARCHITECTURE
• BASIC CONCEPTS
There are certain services and models working behind the scene
making the cloud computing feasible and accessible to end users.
Following are the working models of cloud computing:-
• DEPLOYMENT MODEL
• SERVICE MODEL
• DEPLOYMENT MODEL
Private cloud. The cloud infrastructure is provisioned for exclusive use by a
single organization comprising multiple consumers (e.g., business units). It
may be owned, managed, and operated by the organization, a third party, or
some combination of them, and it may exist on or off premises.
Community cloud. The cloud infrastructure is provisioned for exclusive use by
a specific community of consumers from organizations that have shared
concerns (e.g., mission, security requirements, policy, and compliance
considerations). It may be owned, managed, and operated by one or more of
the organizations in the community, a third party, or some combination of
them, and it may exist on or off premises.
Public cloud. The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated by a business,
academic, or government organization, or some combination of them. It exists
on the premises of the cloud provider.
Hybrid cloud. The cloud infrastructure is a composition of two or more
distinct cloud infrastructures (private, community, or public) that remain
unique entities, but are bound together by standardized or proprietary
technology that enables data and application portability (e.g., cloud bursting
for load balancing between clouds).
• SERVICE MODEL
Software as a Service (SaaS). The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure2. The applications are
accessible from various client devices through either a thin client interface, such as a
web browser (e.g., web-based email), or a program interface. The consumer does not
manage or control the underlying cloud infrastructure including network, servers,
operating systems, storage, or even individual application capabilities, with the
possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS). The capability provided to the consumer is to deploy
onto the cloud infrastructure consumer-created or acquired applications created using
programming languages, libraries, services, and tools supported by the provider.3 The
consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting
environment.
Infrastructure as a Service (IaaS). The capability provided to the consumer is to
provision processing, storage, networks, and other fundamental computing resources
where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the
underlying cloud infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select networking components
(e.g., host firewalls).
• EDGE COMPUTING
1.Edge computing enables data to be analysed, processed and transferred at the edge of
the network.
2.Edge computing is upgrade version as well as extension of cloud computing.
3. edge computing is useful for reduce lower latency.
4.The basic difference between edge and cloud computing lies in the place where the
data processing takes place.
5.Simply when the user store data in the cloud so there is some physical distance
between device and cloud which affected on accessing data.
6.so in this physical distance the edge computing takes place which already store some
important data from the cloud and useful for accessing data faster.
7.It include local processing.
8.Edge computing has privacy benefits, but they are not guaranteed.
9.Bandwith saving is also enabled by edge computing.
EXAMPLE:
a. Smart Street lights
b. Mobile device
c. Automated vehicles
• CLOUD SECURITY
1.Cloud security is known as cloud computing security, consists of a set of policies
controls, technologies that works together to protect cloud-based system.
2.Cloud security can be configured to the exact needs of the business.
3.Implementation cloud security process should be joint responsibility between the
business owner and solution provider.
4.Selecting the right cloud security solution is helpful for protected your organization
from unauthorized access, data breaches and other treats.
5.Forcepoint cloud access security broker (CASB) is a complete cloud security solution that
protect cloud app and cloud data.
6.Security treats are constantly evolving and becoming more sophisticated, for this
reason it is essential to work with cloud provider.
7.Cloud provider that offers best security that has been customised for your
infrastructure and protect more.
8.BENEFITS:
a. Centralized security
b. Reduce cost
c. Reduce administration
d. reliability
• ADVANTAGES
1. Easy implementation.
2. Accessibility.
3. No hardware required.
4. Cost per head.
5. Flexibilityfor growth.
6. Efficient recovery.
• DISADVANTAGES
1. No longer in control.
2. May not get all the features.
3. Doesn’t mean you should do away with servers.
4. No Redundancy.
5. Bandwidth issues.
THANK YOU!
QUESTIONS?

More Related Content

What's hot

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Piyush Mittal
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ClubHack
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 

What's hot (20)

Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 

Similar to Cloud computing

Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
 

Similar to Cloud computing (20)

Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
Cloud management
Cloud managementCloud management
Cloud management
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud-Computing.pptx
Cloud-Computing.pptxCloud-Computing.pptx
Cloud-Computing.pptx
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Recently uploaded

Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
Kamal Acharya
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
Atif Razi
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 

Cloud computing

  • 1. GOVERNMENT POLYTECHNIC, NAGPUR DEPARTMENT OF INFORMATION TECHNOLOGY
  • 3. TABLE OF CONTENTS • WHAT IS CLOUD COMPUTING? • HISTORY • CHARACTERISTICS • ARCHITECTURE • BASIC CONCEPTS • EDGE COMPTUING • CLOUD SECURITY • ADVANTAGES • DISADVANTAGES
  • 4. • WHAT IS CLOUD COMPUTING? Cloud computing means storing and accessing the data and programs over the internet rather than the computer’s hard disk. The data can be anything such as music, files, images, documents, and many more.
  • 5. • HISTORY Before cloud computing emerged, there was client/server computing, centralized storage in which all the data, software applications and all the controls reside on the server side. The cloud symbol was used to represent networks of computing equipment in the original ARPANET by as early as 1977and the CSNET by 1981 both predecessors to the Internet itself. In 1999, Salesforce.com became the 1st company to enter the cloud arena, excelling the concept of providing enterprise-level applications to end users through the Internet. In 2002, Amazon came up with Amazon Web Services, providing services like computation, storage, and even human intelligence. In 2009, Google Apps and Microsoft’s Windows Azurealso started to provide cloud computing enterprise applications. Later on many companies like HP, Oracle, Compaq, Facebook, Twitter, Instagram and many other social media platforms started using cloud computing.
  • 6. • DIFFERENCE BETWEEN CLOUD STORAGE AND LOCAL STORAGE Local Storage Cloud Storage Local Storage includes physical hardware such as external hard drives, flash drives, and CDs. Cloud Storage refers to any program owned by a third party that allows you to upload your data using the Internet. Your data isn't accessible unless you have the hardware with you. Cloud storage requires an Internet connection for access. It is inexpensive. If you want to store a lot of information, you’ll probably have to pay for storage. The data is under your control. Third-party storage is vulnerable to theft and hardware failure.
  • 7. Following are the characteristics of Cloud Computing: 0. Great Availability of Resources 0. On-demand Self-service 0. Easy Maintenance 0. Large Network Access 0. Availability 0. Automatic System 0. Economical 0. Security 0. Pay as you go • CHARACTERISTICS
  • 9. • BASIC CONCEPTS There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models of cloud computing:- • DEPLOYMENT MODEL • SERVICE MODEL
  • 11. Private cloud. The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).
  • 13. Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.3 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
  • 14. • EDGE COMPUTING 1.Edge computing enables data to be analysed, processed and transferred at the edge of the network. 2.Edge computing is upgrade version as well as extension of cloud computing. 3. edge computing is useful for reduce lower latency. 4.The basic difference between edge and cloud computing lies in the place where the data processing takes place. 5.Simply when the user store data in the cloud so there is some physical distance between device and cloud which affected on accessing data. 6.so in this physical distance the edge computing takes place which already store some important data from the cloud and useful for accessing data faster. 7.It include local processing. 8.Edge computing has privacy benefits, but they are not guaranteed. 9.Bandwith saving is also enabled by edge computing.
  • 15. EXAMPLE: a. Smart Street lights b. Mobile device c. Automated vehicles
  • 16. • CLOUD SECURITY 1.Cloud security is known as cloud computing security, consists of a set of policies controls, technologies that works together to protect cloud-based system. 2.Cloud security can be configured to the exact needs of the business. 3.Implementation cloud security process should be joint responsibility between the business owner and solution provider. 4.Selecting the right cloud security solution is helpful for protected your organization from unauthorized access, data breaches and other treats. 5.Forcepoint cloud access security broker (CASB) is a complete cloud security solution that protect cloud app and cloud data. 6.Security treats are constantly evolving and becoming more sophisticated, for this reason it is essential to work with cloud provider. 7.Cloud provider that offers best security that has been customised for your infrastructure and protect more.
  • 17. 8.BENEFITS: a. Centralized security b. Reduce cost c. Reduce administration d. reliability
  • 18. • ADVANTAGES 1. Easy implementation. 2. Accessibility. 3. No hardware required. 4. Cost per head. 5. Flexibilityfor growth. 6. Efficient recovery.
  • 19. • DISADVANTAGES 1. No longer in control. 2. May not get all the features. 3. Doesn’t mean you should do away with servers. 4. No Redundancy. 5. Bandwidth issues.