SlideShare a Scribd company logo
1
CHAPTER-1
INTRODUCTION
More than a marketing term, cloud computing refers to flexible self-service, network-
accessible computing resource pools that can be allocated to meet demand. Services
are flexible because the resources and processing power available to each can be
adjusted on the fl y to meet changes in need or based on configuration settings in an
administrative interface, without the need for direct IT personnel involvement. These
resources are assigned from a larger pool of available capacity (for examples, memory,
storage, CPUs) as needed, allowing an organization to spin up a proof-of-concept
application, expand. that to a full prototype, and then roll it out for full use without
having to worry about whether existing hardware, data center space, power, and cooling
are capable of handling the load. Cloud computing allows the allocation of resources
to be adjusted as needed, creating a hardware-independent framework for future growth
and development. Since the dawn of the networking age, when network diagrams
depicted an enterprise and its extended components, the industry standard has been to
use a simple cloud icon to identify the public Internet, This cloud
represents all of the various types of networking and functions that are necessary to
bridge together various parts of the enterprise over the Internet because the specific
routing details are subject to change and are outside the enterprise network
environment. That’s where the term cloud originated, and when we discuss migration
into the cloud, what we generally mean is applications and services being moved from
the organizational or hosting data center to cloud service providers available through
the Internet.
2
CHAPTER- 2
CLOUD COMPUTING
Cloud computing has become such a buzzword in the industry that it is being used to
market many different types of software and network services, not all of which really fi t
the proper, technical definition of the cloud. So, before we examine the use, impact, and
security issues of working in the cloud, it is necessary to define what cloud computing
really is. This chapter defines cloud computing, covers the origins of cloud computing, and
briefly examines the technologies used in cloud computing to help you understand the role
the cloud can play in organizational enterprise planning. Cloud Computing refers to
manipulating, configuring, and accessing the applications online. It offers online data
storage, infrastructure and application.
3
CHAPTER-3
CLOUD COMPUTING ARCHITECTURE
Cloud computing architecture refers to the components and subcomponents required
for cloud computing. These components typically consist of a front end platform (fat client,
thin client, mobile device), back end platforms (servers, storage), a cloud based delivery,
and a network (Internet, Intranet, Intercloud). Combined, these components make up cloud
computing architecture. Cloud computing architectures consist of front-end platforms
called clients or cloud clients. These clients are servers, fat (or thick) clients, thin clients,
zero clients, tablets and mobile devices. These client platforms interact with the cloud data
storage via an application (middleware), via a web browser, or through a virtual session.
4
The zero or ultra-thin client initializes the network to gather required configuration files that then
tell it where its OS binaries are stored. The entire zero client device runs via the network. This
creates a single point of failure, in that, if the network goes down, the device is rendered useless.
cloud computing is a construct that allows you to access applications that actually reside at a
location other than your computer or other Internet-connected device; most often, this will be a
distant datacenter. There are many benefits to this. For instance, think about the last time you
bought Microsoft Word and installed it on your organization’s computers. Either you ran around
with a CD- or DVD-ROM and installed it on all the computers, or you set up your software
distribution servers to automatically install the application on your machines. And every time
Microsoft issued a service pack, you had to go around and install that pack, or you had to set up
your software distribution servers to distribute it. Oh, and don’t forget the cost of all the licenses.
Pete down the hall probably uses Word once a month, but his license cost just as much as everyone
else’s
5
CHAPTER- 4
BASIC OF CLOUD COMPUTING
There are certain services and models working behind the scene making the cloud
computing feasible and accessible to end users. Following are the working models for
cloud computing:
A cloud refers to a distinct IT environment that is designed for the purpose of remotely
provisioning scalable and measured IT resources. The term originated as a metaphor for
the Internet which is, in essence, a network of networks providing remote access to a set
of decentralized IT resources. Prior to cloud computing becoming its own formalized IT
industry segment, the symbol of a cloud was commonly used to represent the Internet in a
variety of specifications and mainstream documentation of Web-based architectures. This
same symbol is now used to specifically represent the boundary of a cloud environment,
as shown in Figure 1.
Figure 1 - The symbol used to denote the boundary of a cloud environment.
It is important to distinguish the term "cloud" and the cloud symbol from the Internet. As
a specific environment used to remotely provision IT resources, a cloud has a finite
boundary. There are many individual clouds that are accessible via the Internet.
Whereas the Internet provides open access to many Web-based IT resources, a cloud is
typically privately owned and offers access to IT resources that is metered.
Much of the Internet is dedicated to the access of content-based IT resources published via
the World Wide Web. IT resources provided by cloud environments, on the other hand, are
dedicated to supplying back-end processing capabilities and user-based access to these
capabilities. Another key distinction is that it is not necessary for clouds to be Web-based
even if they are commonly based on Internet protocols and technologies. Protocols refer to
6
standards and methods that allow computers to communicate with each other in a pre-
defined and structured manner. A cloud can be based on the use of any protocols that allow
for the remote access to its IT resources.
4.1. DEPLOYMENT MODELS: - Deployment models define the type of access
to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access:
Public, Private, Hybrid and Community.
7
4.1.1. Public cloud: The Public Cloud allows systems and services to be easily accessible
to the general public. Public cloud may be less secure because of its openness, e.g., e-mail.
Public cloud or external cloud describes cloud computing in the traditional mainstream
sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis
over the Internet, via web applications/web services from an off-site third-party provider
who bills on a fine-grained utility computing basis. The cloud infrastructure is made
available to the general public or a large industry group, and is owned by an organization
selling cloud services. Examples: Amazon Elastic-Compute-Cloud, IBM's BlueCloud, Sun
Cloud, Google AppEngine
4.1.2. Private cloud: The Private Cloud allows systems and services to be accessible
within an organization. It offers increased security because of its private nature. A private
cloud is a particular model of cloud computing that involves a distinct and secure cloud
based environment in which only the specified client can operate. As with other cloud
models, private clouds will provide computing power as a service within a virtualized
environment using an underlying pool of physical computing resource. However, under the
private cloud model, the cloud (the pool of resource) is only accessible by a single
organization providing that organization with greater control and privacy.
4.1.3. Community cloud: The Community Cloud allows systems and services to be
accessible by group of organizations. A community cloud may be established where several
organizations have similar requirements and seek to share infrastructure so as to realize
some of the benefits of cloud computing. With the costs spread over fewer users than a
public cloud (but more than a single tenant) this option is more expensive but may offer a
higher level of privacy, security and/or policy compliance. Examples of community cloud
include Google’s "Gov Cloud".
4.1.4. Hybrid cloud: The Hybrid Cloud is mixture of public and private cloud. However,
the critical activities are performed using private cloud while the non-critical activities are
8
performed using public cloud. The term "Hybrid Cloud" has been used to mean either two
separate clouds joined together (public, private, internal or external), or a combination of
virtualized cloud server instances used together with real physical hardware. The most
correct definition of the term "Hybrid Cloud" is probably the use of physical hardware and
virtualized cloud server instances together to provide a single common service. Two clouds
that have been joined together are more correctly called a "combined cloud".
A hybrid storage cloud uses a combination of public and private storage clouds. Hybrid
storage clouds are often useful for archiving and backup functions, allowing local data to
be replicated to a public cloud.
4.2. SERVICE MODELS: - Service Models are the reference models on which the
Cloud Computing is based. These can be categorized into three basic service models as
listed below:
4.2.1 Infrastructure as a service (iaas):- IaaS is the delivery of technology
infrastructure as an on demand scalable service. Provides access to fundamental
resources such as physical machines, virtual machines, virtual storage, etc. The
capability provided to the consumer is the provision of grids or clusters or
virtualized servers, processing, storage, networks, and other fundamental
computing resources where the consumer is able to deploy and run arbitrary
software, which can include operating systems. The highest profile example is
Amazon’s Elastic Compute Cloud (EC2) and Simple Storage Service, but IBM and
other traditional IT vendors are also offering services, as is telecom-and-more
provider Verizon Business.
9
IAAS:-
10
4.2.2 Platform as a service (paas):- provides the runtime environment for applications,
development & deployment tools, etc. Paas provides all of the facilities required to
support the complete life cycle of building and delivering web applications and
services entirely from the Internet. Cloud computing has evolved to include
platforms for building and running custom web-based applications, a concept
known as Platform-as-a-Service. Paas is an outgrowth of the saas application
delivery model. The paas model makes all of the facilities required to support the
complete life cycle of building and delivering web applications and services
entirely available from the Internet, all with no software downloads or installation
for developers, IT managers, or end users. Examples include Microsoft’s Azure and
Salesforce’s Force.com.
Paas:-
11
4.2.3. Software as a service (Saas):-
SaaS model allows to use software applications as a service to end users. SaaS is a software
delivery methodology that provides licensed multi-tenant access to software and its functions
remotely as a Web-based service. The traditional model of software distribution, in which software
is purchased for and installed on personal computers, is sometimes referred to as Software-as-a-
Product. Software-as-a-Service is a software distribution model in which applications are hosted
by a vendor or service provider and made available to customers over a network, typically the
Internet. SaaS is becoming an increasingly prevalent delivery model as underlying technologies
that support web services and service-oriented architecture (SOA) mature and new developmental
approaches become popular. SaaS is also often associated with a pay-as-you-go subscription
licensing model. Mean-while, broadband service has become increasingly available to support user
access from more areas around the world. Examples are Google’s Gmail and Apps, instant
messaging from AOL, Yahoo and Google.
12
Saas:-
13
CHAPTER- 5
USE THE CLOUD
14
CHAPTER- 6
APPLICTION OF CLOUD COMPUTING
So now we get to the question—what does cloud computing actually do? Well, we have applications
running on our laptops, servers, phones and the like. Cloud computing either has them too or has
the potential to bring them to you. So cloud computing brings you applications, a way of viewing,
manipulating, and sharing data. Like their desktop brethren, many “staple” applications exist in
cloud computing, but what will differ for you is how you interact with those applications. The most
common are storage and database. In this section, we’ll take a closer look at storage and database
functionality.
6.1. Storage: - Somewhat similar to has, one of the uses for cloud computing is simply storage.
The benefits are in line with the general benefits of cloud computing—if you lease storage space
from a vendor, you are not responsible to buy equipment, pay to run it, and pay to cool it. That’s
all on the vendor. But there are different options when it comes down to cloud storage.
6.2. Database: - Databases (which we will talk more about later in this chapter) are repositories
for information with links within the information that help make the data searchable. Distributed
databases, like Amazon’s simpledb, spread information among physically dispersed hardware. But
to the client, the information seems to be located in one place. The advantages of such a database
include the following:
6.2.1. Improved availability: - If there is a fault in one database system, it will only affect one
fragment of the information, not the entire database.
6.2.2. Improved performance: - Data is located near the site with the greatest demand and the
database systems are parallelized, which allows the load to be balanced among the servers.
6.2.3. Price:-It is less expensive to create a network of smaller computers with the power of one
large one.
6.2.4. Flexibility: - Systems can be changed and modified without harm to the entire database.
Naturally there are disadvantages, including
15
6.2.5. Complexity:-Database administrators have extra work to do to maintain the system.
6.2.6. Labor: - costs with that added complexity comes the need for more workers on the payroll.
6.2.7. Security:-Database fragments must be secured and so must the sites housing the fragments.
6.2.8. Integrity: - It may be difficult to maintain the integrity of the database if it is too complex
or changes too quickly.
6.2.9. Standards:-There are currently no standards to convert a centralized database into a cloud
solution.
6.3. Synchronization: - Synchronization, as with Microsoft’s Live Mesh or Apple’s mobileme,
allows content to be refreshed across multiple devices. For instance, if you have a spreadsheet on
your computer and then upload it to the storage service, the next time you check your PDA, that
file will be downloaded onto it.
6.4. Database Services: - Another “as a service” offering that is becoming prevalent in the world
of cloud computing is Database as a Service (daas). The idea behind daas is to avoid the complexity
and cost of running your own database.
6.4.1. Ease of use:-There are no servers to provision and no redundant systems to worry about.
You don’t have to worry about buying, installing, and maintaining hardware for the database.
6.4.2. Power: - The database isn’t housed locally, but that doesn’t mean that it is not functional
and effective. Depending on your vendor, you can get custom data validation to ensure accurate
information. You can create and manage the database with ease.
6.4.3. Integration: - The database can be integrated with your other services to provide more
value and power. For instance, you can tie it in with calendars, email, and people to make your
work more powerful.
6.4.4. Management:-Because large databases benefit from constant pruning and optimization,
typically there are expensive resources dedicated to this task. With some DaaS offerings, this
management can be provided as part of the service for much less expense. The provider will often
use offshore labor pools to take advantage of lower labor costs there. So it’s possible that you are
16
using the service in Chicago, the physical servers are in Washington state, and the database
administrator is in the Philippines. are a number of providers out there, but let’s take a closer look
at two of the biggest players.
6.5. MS SQL:- Anyone who has worked with databases is no stranger to Microsoft’s premier
offering, SQL Server. They announced the cloud extension of that tool in the spring of 2008 by
introducing Microsoft SQL Server Data Services (SSDS). It is expected to be in a public beta by
spring 2009. SSDS looks very similar to Amazon’s SimpleDB, with a straightforward, schema-
free data storage, SOAP or REST APIs, and a pay-as-you-go payment system. It is also able to
start small and scale larger as needed. While it looks similar to SimpleDB, it varies greatly. First,
one of the main selling points of SSDS is that it integrates with Microsoft’s Sync Framework,
which is a .NET library for synchronizing dissimilar data sources. Microsoft wants SSDS to work
as a data hub, synchronizing data on multiple devices so they can be accessed offline. There are
three core concepts in SSDS:
6.5.1. Authority:- An authority is both a billing unit and a collection of containers. • Container A
container is a collection of entities and is what you search within.
6.5.2. Entity:- An entity is a property bag of name and value pairs.
6.6. Oracle:- In the fall of 2008 Oracle introduced three services to provide database services to
cloud users. Customers can license
• Oracle Database 11g
• Oracle Fusion Middleware
• Oracle Enterprise Manager
The products are available for use on Amazon Web Services’ Elastic Compute Cloud (Amazon
EC2). Oracle delivered a set of free Amazon Machine Images (AMIs) to its customers so they
could quickly and efficiently deploy Oracle’s database solutions. Developers can take advantage
of the provisioning and automated software deployment to rapidly build applications using
Oracle’s popular development tools such as Oracle Application Express, Oracle JDeveloper,
Oracle Enterprise Pack for Eclipse, and Oracle Workshop for WebLogic. Additionally, Oracle
Unbreakable Linux Support and AWS Premium Support is available for Oracle Enterprise Linux
17
on EC2, providing seamless customer support. “Providing choice is the foundation of Oracle’s
strategy to enable customers to become more productive and lower their IT costs—whether it’s
choice of hardware, operating system, or on demand computing—extending this to the Cloud
environment is a natural evolution,” said Robert Shimp, vice president of Oracle Global
Technology Business Unit. “We are pleased to partner with Amazon Web Services to provide our
customers enterpriseclass Cloud solutions, using familiar Oracle software on which their
businesses depend.” Additionally, Oracle also introduced a secure cloud-based backup solution.
Oracle Secure Backup Cloud Module, based on Oracle’s premier tape backup management
software, Oracle Secure Backup, enables customers to use the Amazon Simple Storage Service
(Amazon S3) as their database backup destination. Cloud-based backups offer reliability and
virtually unlimited capacity, available on demand and with no up-front capital expenditure. The
Oracle Secure Backup Cloud Module also enables encrypted data backups to help ensure complete
privacy in the cloud environment. It’s fully integrated with Oracle Recovery Manager and Oracle
Enterprise Manager, providing users with familiar interfaces for cloud-based backups. For
customers with an ongoing need to quickly move very large volumes of data into or out of the
AWS cloud, Amazon allows the creation of network peering connections.
18
CHAPTER-7
SECURITY OF CLOUD COMPUTING
Security is the number one issue when it comes to cloud computing, and that only makes sense.
Since a third party stores your data, you don’t know what’s going on with it. It’s easy to worry
about the security risks of a cloud solution, but let’s not overlook the inherent security benefits, as
well.
7.1. Data Leakage:- The biggest benefit is the centralization of data. Organizations have an issue
with asset protection, in no small part because of data being stored in numerous places, like laptops
and the desktop. Thick clients are apt to download files and maintain them on the hard drive, and
there are plenty of laptops out there with nonencrypted files. Using thin clients creates a better
chance for centralized data storage. As such, there’s less chance for data leakage. Centralization
also provides the opportunity for better monitoring. That data is in one place makes it easier to
check in on your data and see that everything is okay.
19
7.2. Offloading Work:-Another security benefit isn’t so much a technology, but the fact that you
don’t have to do it yourself. It’s up to the cloud provider to provide adequate security. After all,
can your organization afford 24/7 IT security staffing? The fact of the matter is that your cloud
provider might offer more security features than you had before. The fact that so many clients are
paying allows cloud providers to have beefier security, simply because of the economy of scale
involved. That is, there are many paying clients so the provider is able to do more, because there
is more money in the pot. Plus it’s to the provider’s benefit to offer more, because they want to get
a good reputation.
7.3. Logging:- Logging is also improved. It’s something that, in-house, usually gets the short end
of the stick. But in the virtualized world of cloud computing, providers can add as much memory
as they need to extend logging.
7.4. Forensics:- If there is a breach, the cloud provider can respond to the incident with less
downtime than if you had to investigate the breach locally. It is easy to build a forensic server
online, and it costs almost nothing until it comes into use. If there is a problem, the virtual machine
can be cloned for easy offline analysis. Further, many companies don’t have a dedicated in-house
incident response team. If there is a problem, IT staff have to quickly figure out their new job of
taking the server down, quickly investigating, and getting it back online for minimal production
downtime.
7.5 Development:- Even more good news is that security vendors aren’t in the dark about this
whole cloud thing. They are actively developing products that can apply to virtual machines and
the cloud. Security vendors also have a unique opportunity in the cloud. Since it’s new ground,
there are new opportunities for the vendors who are open-minded enough to imagine them.
7.6 Auditing:- As an IT professional, you already know the headache of securing your own local
network. But when you send your data to the cloud, a whole new set of issues arise. This is largely
because your data is being stored on someone else’s equipment.
20
 Privileged user access: - Inquire about who has specialized access to data, and about the
hiring and management of such administrators.
 Regulatory compliance: - Make sure that the vendor is willing to undergo external audits
and/or security certifications.
 Data Location: - Does the provider allow for any control over the location of data?
 Data Segregation: - Make sure that encryption is available at all stages, and that these
encryption schemes were designed and tested by experienced professionals.
 Recovery: - Find out what will happen to data in the case of a disaster. Do they offer
complete restoration? If so, how long would that take?
 Investigative support: - Does the vendor have the ability to investigate any inappropriate
or illegal activity?
 Long-term viability: - What will happen to data if the company goes out of business?
How will data be returned, and in what format?
21
CHAPTER- 8
ADVANTAGES
8.1. Cost Savings:- Perhaps, the most significant cloud computing benefit is in terms
of IT cost savings. Businesses, no matter what their type or size, exist to earn money
while keeping capital and operational expenses to a minimum. With cloud computing,
you can save substantial capital costs with zero in-house server storage and application
requirements. The lack of on-premises infrastructure also removes their associated
operational costs in the form of power, air conditioning and administration costs. You
pay for what is used and disengage whenever you like - there is no invested IT capital
to worry about. It’s a common misconception that only large businesses can afford to
use the cloud, when in fact, cloud services are extremely affordable for smaller
businesses.
8.2. Reliability:-With a managed service platform, cloud computing is much more
reliable and consistent than in-house IT infrastructure. Most providers offer a Service
Level Agreement which guarantees 24/7/365 and 99.99% availability. Your
organization can benefit from a massive pool of redundant IT resources, as well as
quick failover mechanism - if a server fails, hosted applications and services can easily
be transited to any of the available servers.
8.3. Manageability:-Cloud computing provides enhanced and simplified IT
management and maintenance capabilities through central administration of resources,
vendor managed infrastructure and SLA backed agreements. IT infrastructure updates
and maintenance are eliminated, as all resources are maintained by the service provider.
You enjoy a simple web-based user interface for accessing software, applications and
services – without the need for installation - and an SLA ensures the timely and
guaranteed delivery, management and maintenance of your IT services.
22
8.4. Strategic Edge:-Ever-increasing computing resources give you a competitive
edge over competitors, as the time you require for IT procurement is virtually nil. Your
company can deploy mission critical applications that deliver significant business
benefits, without any upfront costs and minimal provisioning time. Cloud computing
allows you to forget about technology and focus on your key business activities and
objectives. It can also help you to reduce the time needed to market newer applications
and services.
 Drive down costs: Avoid large capital expenditure on hardware and upgrades. Cloud can
also improve cost efficiency by more closely matching your cost pattern to your
revenue/demand pattern, moving your business from a capital-intensive cost model to an
Opex model.
 Cope with demand: You know what infrastructure you need today, but what about your
future requirements? As your business grows, a cloud environment should grow with you.
And when demand is unpredictable or you need to test a new application, you have the
ability spin capacity up or down, while paying only for what you use.
 Run your business; don’t worry about your IT: Monitoring your infrastructure 24/7 is
time consuming and expensive when you have a business to run. A managed cloud solution
means that your hosting provider is doing this for you. In addition to monitoring your
infrastructure and keeping your data safe, they can provide creative and practical solutions
to your needs, as well as expert advice to keep your IT infrastructure working efficiently
as your needs evolve.
 Innovate and lead: Ever-changing business requirements mean that your IT infrastructure
has to be flexible. With a cloud infrastructure, you can rapidly deploy new projects and
take them live quickly, keeping you at the vanguard of innovation in your sector.
 Improved security and compliance: You have to protect your business against loss of
revenue and brand damage. In addition, many organizations face strict regulatory and
compliance obligations. A cloud environment means that this responsibility no longer rests
entirely on your shoulders. Your cloud hosting provider will build in resiliency and
agility at an infrastructure-level to limit the risk of a security breach, and will work with
you to help address compliance and regulatory requirements.
23
 Future-proof your business: There is unprecedented demand for access to data anywhere,
any time and on any device. Don’t let your business fall behind. By embracing the cloud,
you can handle emerging mobile, BYOD and wearable technology trends
24
CHAPTER- 9
DISADVANTAGES
9.1 Downtime:-As cloud service providers take care of a number of clients each day,
they can become overwhelmed and may even come up against technical outages.
This can lead to your business processes being temporarily suspended.
Additionally, if your internet connection is offline, you will not be able to access
any of your applications, server or data from the cloud.
9.2 Security:-Although cloud service providers implement the best security standards
and industry certifications, storing data and important files on external service
providers always opens up risks. Using cloud-powered technologies means you
need to provide your service provider with access to important business data.
Meanwhile, being a public service opens up cloud service providers to security
challenges on a routine basis. The ease in procuring and accessing cloud services
can also give nefarious users the ability to scan, identify and exploit loopholes and
vulnerabilities within a system. For instance, in a multi-tenant cloud architecture
where multiple users are hosted on the same server, a hacker might try to break into
the data of other users hosted and stored on the same server. However, such exploits
and loopholes are not likely to surface, and the likelihood of a compromise is not
great.
9.3 Vendor lock-in:-Although cloud service providers promise that the cloud will be
flexible to use and integrate, switching cloud services is something that hasn’t yet
completely evolved. Organizations may find it difficult to migrate their services
from one vendor to another. Hosting and integrating current cloud applications on
another platform may throw up interoperability and support issues. For instance,
applications developed on Microsoft Development Framework (.Net) might not
work properly on the Linux platform.
9.4 Limited control:-Since the cloud infrastructure is entirely owned, managed and
monitored by the service provider, it transfers minimal control over to the customer.
The customer can only control and manage the applications, data and services
25
operated on top of that, not the backend infrastructure itself. Key administrative
tasks such as server shell access, updating and firmware management may not be
passed to the customer or end user.
 Requires a constant Internet connection. Cloud computing is impossible if you
can't connect to the Internet. Since you use the Internet to connect to both your
applications and documents, if you don't have an Internet connection you can't
access anything, even your own documents. A dead Internet connection means
no work, period and, in areas where Internet connections are few or inherently
unreliable, this could be a deal-breaker. When you're offline, cloud computing
simply doesn't work.
 Doesn't work well with low-speed connections. Similarly, a low-speed Internet
connection, such as that found with dial-up services, makes cloud computing
painful at best and often impossible. Web-based apps require a lot of bandwidth
to download, as do large documents. If you're laboring with a low-speed dial-up
connection, it might take seemingly forever just to change from page to page in a
document, let alone to launch a feature-rich cloud service. In other words, cloud
computing isn't for the broadband-impaired.
 Can be slow. Even on a fast connection, web-based applications can sometimes
be slower than accessing a similar software program on your desktop PC.
Everything about the program, from the interface to the current document, has to
be sent back and forth from your computer to the computers in the cloud. If the
cloud servers happen to be backed up at that moment, or if the Internet is having
a slow day, you won't get the instantaneous access you might expect from desktop
apps.
 Features might be limited. This situation is bound to change, but today many web-
based applications simply aren't as full-featured as their desktop-based brethren.
For example, you can do a lot more with Microsoft PowerPoint than with Google
Presentation's web-based offering. The basics are similar, but the cloud
application lacks many of PowerPoint's advanced features. If you're a power user,
you might not want to leap into cloud computing just yet.
26
 Stored data might not be secure. With cloud computing, all your data is stored on
the cloud. How secure is the cloud? Can unauthorized users gain access to your
confidential data? Cloud computing companies say that data is secure, but it's too
early in the game to be completely sure of that. Only time will tell if your data is
secure in the cloud.
 Stored data can be lost. Theoretically, data stored in the cloud is unusually safe,
replicated across multiple machines. But on the off chance that your data goes
missing, you have no physical or local backup. (Unless you methodically
download all your cloud documents to your own desktop—which few users do.)
Put simply, relying on the cloud puts you at risk if the cloud lets you down.
27
CONCLUSION
Cloud computing is an emerging computing paradigm that is increasingly popular.
Leaders in the industry, such as Microsoft, Google, and IBM, have provided their
initiatives in promoting cloud computing. But still there are many question have left
without an answer and indeed the most important one is security. IT technicians are
spearheading the challenge, while academia is bit slower to react. Several groups have recently
been formed, such as the Cloud Security Alliance or the Open Cloud Consortium, with the
goal of exploring the possibilities offered by cloud computing and to establish a common
language among different providers. New technologies and capabilities may result in a further
evolution of the cloud computing model. Companies presently considering such a move must
weigh the advantages against the potential drawbacks, and decide if they are ready to launch
their data into the cloud. Before doing so, a consultation with an experienced cloud computing
provider is the best way to determine an effective course of action.

More Related Content

What's hot

The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingMike Tase
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
Laud Randy Amofah
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
Divyesh Shah
 
Cloud computing
Cloud computingCloud computing
Cloud computing
AparnaKumari31
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
Mohammed Sajjad Ali
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
Mohammed Sajjad Ali
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
ProfRajivKumarShobhi
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
Sandhya Rathi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Kshitij Mittal
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
Asmaa Ibrahim
 
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Govt. P.G. College Dharamshala
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
Jagan Mohan Bishoyi
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computing
nik_053
 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 ppt
Dr VISU P
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
Microsoft Private Cloud
 
Cloud for dummies easycloud
Cloud for dummies   easycloudCloud for dummies   easycloud
Cloud for dummies easycloud
Alessandro Greco
 

What's hot (20)

The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
 
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computing
 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 ppt
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
 
Cloud for dummies easycloud
Cloud for dummies   easycloudCloud for dummies   easycloud
Cloud for dummies easycloud
 

Similar to Cloud computing

Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
Dr. Radhey Shyam
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
Sweta Kumari Barnwal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
AschalewAyele2
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
A220113
A220113A220113
A220113irjes
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.Florence Dayana
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
Sami Abu Shawarib
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
NikhilRanaCSELEET005
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
PARTHO KUMAR SAHA
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
vishnu varunan
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
Dr. Radhey Shyam
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
Hussain Hamil
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdf
SANDY4772
 
Cloud computing
Cloud computingCloud computing
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Amex Ka
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
vipluv mittal
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
vipluv mittal
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
SiddhantPandey67
 

Similar to Cloud computing (20)

Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
A220113
A220113A220113
A220113
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 

More from Jawhar Ali

seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
Jawhar Ali
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
Jawhar Ali
 
seminar report on kingapp application
seminar report on kingapp applicationseminar report on kingapp application
seminar report on kingapp application
Jawhar Ali
 
seminar report on school management system
seminar report on school management systemseminar report on school management system
seminar report on school management system
Jawhar Ali
 
seminar presentation on apache-spark
seminar presentation on apache-sparkseminar presentation on apache-spark
seminar presentation on apache-spark
Jawhar Ali
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
Jawhar Ali
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
Jawhar Ali
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense Technology
Jawhar Ali
 
Powerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technologyPowerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technology
Jawhar Ali
 
powerpoint presentation on Google glass
powerpoint presentation on Google glasspowerpoint presentation on Google glass
powerpoint presentation on Google glass
Jawhar Ali
 
Table Of Contents Google Glass
Table Of Contents Google GlassTable Of Contents Google Glass
Table Of Contents Google Glass
Jawhar Ali
 
introduction and abstract on Google Glass Major report
introduction and abstract on  Google Glass Major reportintroduction and abstract on  Google Glass Major report
introduction and abstract on Google Glass Major report
Jawhar Ali
 
Candidate declaration on Google Glass
Candidate declaration on Google GlassCandidate declaration on Google Glass
Candidate declaration on Google Glass
Jawhar Ali
 
front Page on Google Glass
 front Page on Google Glass front Page on Google Glass
front Page on Google Glass
Jawhar Ali
 
Table of contents on blood bank management system
Table of contents on blood bank management systemTable of contents on blood bank management system
Table of contents on blood bank management system
Jawhar Ali
 
List of figures in Blood bank management system
List of figures in Blood bank management systemList of figures in Blood bank management system
List of figures in Blood bank management system
Jawhar Ali
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management system
Jawhar Ali
 
Cand declaration
Cand declaration Cand declaration
Cand declaration
Jawhar Ali
 
Training report on web developing
Training report on web developingTraining report on web developing
Training report on web developing
Jawhar Ali
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 

More from Jawhar Ali (20)

seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
 
seminar report on kingapp application
seminar report on kingapp applicationseminar report on kingapp application
seminar report on kingapp application
 
seminar report on school management system
seminar report on school management systemseminar report on school management system
seminar report on school management system
 
seminar presentation on apache-spark
seminar presentation on apache-sparkseminar presentation on apache-spark
seminar presentation on apache-spark
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense Technology
 
Powerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technologyPowerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technology
 
powerpoint presentation on Google glass
powerpoint presentation on Google glasspowerpoint presentation on Google glass
powerpoint presentation on Google glass
 
Table Of Contents Google Glass
Table Of Contents Google GlassTable Of Contents Google Glass
Table Of Contents Google Glass
 
introduction and abstract on Google Glass Major report
introduction and abstract on  Google Glass Major reportintroduction and abstract on  Google Glass Major report
introduction and abstract on Google Glass Major report
 
Candidate declaration on Google Glass
Candidate declaration on Google GlassCandidate declaration on Google Glass
Candidate declaration on Google Glass
 
front Page on Google Glass
 front Page on Google Glass front Page on Google Glass
front Page on Google Glass
 
Table of contents on blood bank management system
Table of contents on blood bank management systemTable of contents on blood bank management system
Table of contents on blood bank management system
 
List of figures in Blood bank management system
List of figures in Blood bank management systemList of figures in Blood bank management system
List of figures in Blood bank management system
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management system
 
Cand declaration
Cand declaration Cand declaration
Cand declaration
 
Training report on web developing
Training report on web developingTraining report on web developing
Training report on web developing
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

Cloud computing

  • 1. 1 CHAPTER-1 INTRODUCTION More than a marketing term, cloud computing refers to flexible self-service, network- accessible computing resource pools that can be allocated to meet demand. Services are flexible because the resources and processing power available to each can be adjusted on the fl y to meet changes in need or based on configuration settings in an administrative interface, without the need for direct IT personnel involvement. These resources are assigned from a larger pool of available capacity (for examples, memory, storage, CPUs) as needed, allowing an organization to spin up a proof-of-concept application, expand. that to a full prototype, and then roll it out for full use without having to worry about whether existing hardware, data center space, power, and cooling are capable of handling the load. Cloud computing allows the allocation of resources to be adjusted as needed, creating a hardware-independent framework for future growth and development. Since the dawn of the networking age, when network diagrams depicted an enterprise and its extended components, the industry standard has been to use a simple cloud icon to identify the public Internet, This cloud represents all of the various types of networking and functions that are necessary to bridge together various parts of the enterprise over the Internet because the specific routing details are subject to change and are outside the enterprise network environment. That’s where the term cloud originated, and when we discuss migration into the cloud, what we generally mean is applications and services being moved from the organizational or hosting data center to cloud service providers available through the Internet.
  • 2. 2 CHAPTER- 2 CLOUD COMPUTING Cloud computing has become such a buzzword in the industry that it is being used to market many different types of software and network services, not all of which really fi t the proper, technical definition of the cloud. So, before we examine the use, impact, and security issues of working in the cloud, it is necessary to define what cloud computing really is. This chapter defines cloud computing, covers the origins of cloud computing, and briefly examines the technologies used in cloud computing to help you understand the role the cloud can play in organizational enterprise planning. Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
  • 3. 3 CHAPTER-3 CLOUD COMPUTING ARCHITECTURE Cloud computing architecture refers to the components and subcomponents required for cloud computing. These components typically consist of a front end platform (fat client, thin client, mobile device), back end platforms (servers, storage), a cloud based delivery, and a network (Internet, Intranet, Intercloud). Combined, these components make up cloud computing architecture. Cloud computing architectures consist of front-end platforms called clients or cloud clients. These clients are servers, fat (or thick) clients, thin clients, zero clients, tablets and mobile devices. These client platforms interact with the cloud data storage via an application (middleware), via a web browser, or through a virtual session.
  • 4. 4 The zero or ultra-thin client initializes the network to gather required configuration files that then tell it where its OS binaries are stored. The entire zero client device runs via the network. This creates a single point of failure, in that, if the network goes down, the device is rendered useless. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device; most often, this will be a distant datacenter. There are many benefits to this. For instance, think about the last time you bought Microsoft Word and installed it on your organization’s computers. Either you ran around with a CD- or DVD-ROM and installed it on all the computers, or you set up your software distribution servers to automatically install the application on your machines. And every time Microsoft issued a service pack, you had to go around and install that pack, or you had to set up your software distribution servers to distribute it. Oh, and don’t forget the cost of all the licenses. Pete down the hall probably uses Word once a month, but his license cost just as much as everyone else’s
  • 5. 5 CHAPTER- 4 BASIC OF CLOUD COMPUTING There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing: A cloud refers to a distinct IT environment that is designed for the purpose of remotely provisioning scalable and measured IT resources. The term originated as a metaphor for the Internet which is, in essence, a network of networks providing remote access to a set of decentralized IT resources. Prior to cloud computing becoming its own formalized IT industry segment, the symbol of a cloud was commonly used to represent the Internet in a variety of specifications and mainstream documentation of Web-based architectures. This same symbol is now used to specifically represent the boundary of a cloud environment, as shown in Figure 1. Figure 1 - The symbol used to denote the boundary of a cloud environment. It is important to distinguish the term "cloud" and the cloud symbol from the Internet. As a specific environment used to remotely provision IT resources, a cloud has a finite boundary. There are many individual clouds that are accessible via the Internet. Whereas the Internet provides open access to many Web-based IT resources, a cloud is typically privately owned and offers access to IT resources that is metered. Much of the Internet is dedicated to the access of content-based IT resources published via the World Wide Web. IT resources provided by cloud environments, on the other hand, are dedicated to supplying back-end processing capabilities and user-based access to these capabilities. Another key distinction is that it is not necessary for clouds to be Web-based even if they are commonly based on Internet protocols and technologies. Protocols refer to
  • 6. 6 standards and methods that allow computers to communicate with each other in a pre- defined and structured manner. A cloud can be based on the use of any protocols that allow for the remote access to its IT resources. 4.1. DEPLOYMENT MODELS: - Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid and Community.
  • 7. 7 4.1.1. Public cloud: The Public Cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness, e.g., e-mail. Public cloud or external cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services from an off-site third-party provider who bills on a fine-grained utility computing basis. The cloud infrastructure is made available to the general public or a large industry group, and is owned by an organization selling cloud services. Examples: Amazon Elastic-Compute-Cloud, IBM's BlueCloud, Sun Cloud, Google AppEngine 4.1.2. Private cloud: The Private Cloud allows systems and services to be accessible within an organization. It offers increased security because of its private nature. A private cloud is a particular model of cloud computing that involves a distinct and secure cloud based environment in which only the specified client can operate. As with other cloud models, private clouds will provide computing power as a service within a virtualized environment using an underlying pool of physical computing resource. However, under the private cloud model, the cloud (the pool of resource) is only accessible by a single organization providing that organization with greater control and privacy. 4.1.3. Community cloud: The Community Cloud allows systems and services to be accessible by group of organizations. A community cloud may be established where several organizations have similar requirements and seek to share infrastructure so as to realize some of the benefits of cloud computing. With the costs spread over fewer users than a public cloud (but more than a single tenant) this option is more expensive but may offer a higher level of privacy, security and/or policy compliance. Examples of community cloud include Google’s "Gov Cloud". 4.1.4. Hybrid cloud: The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are
  • 8. 8 performed using public cloud. The term "Hybrid Cloud" has been used to mean either two separate clouds joined together (public, private, internal or external), or a combination of virtualized cloud server instances used together with real physical hardware. The most correct definition of the term "Hybrid Cloud" is probably the use of physical hardware and virtualized cloud server instances together to provide a single common service. Two clouds that have been joined together are more correctly called a "combined cloud". A hybrid storage cloud uses a combination of public and private storage clouds. Hybrid storage clouds are often useful for archiving and backup functions, allowing local data to be replicated to a public cloud. 4.2. SERVICE MODELS: - Service Models are the reference models on which the Cloud Computing is based. These can be categorized into three basic service models as listed below: 4.2.1 Infrastructure as a service (iaas):- IaaS is the delivery of technology infrastructure as an on demand scalable service. Provides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc. The capability provided to the consumer is the provision of grids or clusters or virtualized servers, processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems. The highest profile example is Amazon’s Elastic Compute Cloud (EC2) and Simple Storage Service, but IBM and other traditional IT vendors are also offering services, as is telecom-and-more provider Verizon Business.
  • 10. 10 4.2.2 Platform as a service (paas):- provides the runtime environment for applications, development & deployment tools, etc. Paas provides all of the facilities required to support the complete life cycle of building and delivering web applications and services entirely from the Internet. Cloud computing has evolved to include platforms for building and running custom web-based applications, a concept known as Platform-as-a-Service. Paas is an outgrowth of the saas application delivery model. The paas model makes all of the facilities required to support the complete life cycle of building and delivering web applications and services entirely available from the Internet, all with no software downloads or installation for developers, IT managers, or end users. Examples include Microsoft’s Azure and Salesforce’s Force.com. Paas:-
  • 11. 11 4.2.3. Software as a service (Saas):- SaaS model allows to use software applications as a service to end users. SaaS is a software delivery methodology that provides licensed multi-tenant access to software and its functions remotely as a Web-based service. The traditional model of software distribution, in which software is purchased for and installed on personal computers, is sometimes referred to as Software-as-a- Product. Software-as-a-Service is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. SaaS is becoming an increasingly prevalent delivery model as underlying technologies that support web services and service-oriented architecture (SOA) mature and new developmental approaches become popular. SaaS is also often associated with a pay-as-you-go subscription licensing model. Mean-while, broadband service has become increasingly available to support user access from more areas around the world. Examples are Google’s Gmail and Apps, instant messaging from AOL, Yahoo and Google.
  • 14. 14 CHAPTER- 6 APPLICTION OF CLOUD COMPUTING So now we get to the question—what does cloud computing actually do? Well, we have applications running on our laptops, servers, phones and the like. Cloud computing either has them too or has the potential to bring them to you. So cloud computing brings you applications, a way of viewing, manipulating, and sharing data. Like their desktop brethren, many “staple” applications exist in cloud computing, but what will differ for you is how you interact with those applications. The most common are storage and database. In this section, we’ll take a closer look at storage and database functionality. 6.1. Storage: - Somewhat similar to has, one of the uses for cloud computing is simply storage. The benefits are in line with the general benefits of cloud computing—if you lease storage space from a vendor, you are not responsible to buy equipment, pay to run it, and pay to cool it. That’s all on the vendor. But there are different options when it comes down to cloud storage. 6.2. Database: - Databases (which we will talk more about later in this chapter) are repositories for information with links within the information that help make the data searchable. Distributed databases, like Amazon’s simpledb, spread information among physically dispersed hardware. But to the client, the information seems to be located in one place. The advantages of such a database include the following: 6.2.1. Improved availability: - If there is a fault in one database system, it will only affect one fragment of the information, not the entire database. 6.2.2. Improved performance: - Data is located near the site with the greatest demand and the database systems are parallelized, which allows the load to be balanced among the servers. 6.2.3. Price:-It is less expensive to create a network of smaller computers with the power of one large one. 6.2.4. Flexibility: - Systems can be changed and modified without harm to the entire database. Naturally there are disadvantages, including
  • 15. 15 6.2.5. Complexity:-Database administrators have extra work to do to maintain the system. 6.2.6. Labor: - costs with that added complexity comes the need for more workers on the payroll. 6.2.7. Security:-Database fragments must be secured and so must the sites housing the fragments. 6.2.8. Integrity: - It may be difficult to maintain the integrity of the database if it is too complex or changes too quickly. 6.2.9. Standards:-There are currently no standards to convert a centralized database into a cloud solution. 6.3. Synchronization: - Synchronization, as with Microsoft’s Live Mesh or Apple’s mobileme, allows content to be refreshed across multiple devices. For instance, if you have a spreadsheet on your computer and then upload it to the storage service, the next time you check your PDA, that file will be downloaded onto it. 6.4. Database Services: - Another “as a service” offering that is becoming prevalent in the world of cloud computing is Database as a Service (daas). The idea behind daas is to avoid the complexity and cost of running your own database. 6.4.1. Ease of use:-There are no servers to provision and no redundant systems to worry about. You don’t have to worry about buying, installing, and maintaining hardware for the database. 6.4.2. Power: - The database isn’t housed locally, but that doesn’t mean that it is not functional and effective. Depending on your vendor, you can get custom data validation to ensure accurate information. You can create and manage the database with ease. 6.4.3. Integration: - The database can be integrated with your other services to provide more value and power. For instance, you can tie it in with calendars, email, and people to make your work more powerful. 6.4.4. Management:-Because large databases benefit from constant pruning and optimization, typically there are expensive resources dedicated to this task. With some DaaS offerings, this management can be provided as part of the service for much less expense. The provider will often use offshore labor pools to take advantage of lower labor costs there. So it’s possible that you are
  • 16. 16 using the service in Chicago, the physical servers are in Washington state, and the database administrator is in the Philippines. are a number of providers out there, but let’s take a closer look at two of the biggest players. 6.5. MS SQL:- Anyone who has worked with databases is no stranger to Microsoft’s premier offering, SQL Server. They announced the cloud extension of that tool in the spring of 2008 by introducing Microsoft SQL Server Data Services (SSDS). It is expected to be in a public beta by spring 2009. SSDS looks very similar to Amazon’s SimpleDB, with a straightforward, schema- free data storage, SOAP or REST APIs, and a pay-as-you-go payment system. It is also able to start small and scale larger as needed. While it looks similar to SimpleDB, it varies greatly. First, one of the main selling points of SSDS is that it integrates with Microsoft’s Sync Framework, which is a .NET library for synchronizing dissimilar data sources. Microsoft wants SSDS to work as a data hub, synchronizing data on multiple devices so they can be accessed offline. There are three core concepts in SSDS: 6.5.1. Authority:- An authority is both a billing unit and a collection of containers. • Container A container is a collection of entities and is what you search within. 6.5.2. Entity:- An entity is a property bag of name and value pairs. 6.6. Oracle:- In the fall of 2008 Oracle introduced three services to provide database services to cloud users. Customers can license • Oracle Database 11g • Oracle Fusion Middleware • Oracle Enterprise Manager The products are available for use on Amazon Web Services’ Elastic Compute Cloud (Amazon EC2). Oracle delivered a set of free Amazon Machine Images (AMIs) to its customers so they could quickly and efficiently deploy Oracle’s database solutions. Developers can take advantage of the provisioning and automated software deployment to rapidly build applications using Oracle’s popular development tools such as Oracle Application Express, Oracle JDeveloper, Oracle Enterprise Pack for Eclipse, and Oracle Workshop for WebLogic. Additionally, Oracle Unbreakable Linux Support and AWS Premium Support is available for Oracle Enterprise Linux
  • 17. 17 on EC2, providing seamless customer support. “Providing choice is the foundation of Oracle’s strategy to enable customers to become more productive and lower their IT costs—whether it’s choice of hardware, operating system, or on demand computing—extending this to the Cloud environment is a natural evolution,” said Robert Shimp, vice president of Oracle Global Technology Business Unit. “We are pleased to partner with Amazon Web Services to provide our customers enterpriseclass Cloud solutions, using familiar Oracle software on which their businesses depend.” Additionally, Oracle also introduced a secure cloud-based backup solution. Oracle Secure Backup Cloud Module, based on Oracle’s premier tape backup management software, Oracle Secure Backup, enables customers to use the Amazon Simple Storage Service (Amazon S3) as their database backup destination. Cloud-based backups offer reliability and virtually unlimited capacity, available on demand and with no up-front capital expenditure. The Oracle Secure Backup Cloud Module also enables encrypted data backups to help ensure complete privacy in the cloud environment. It’s fully integrated with Oracle Recovery Manager and Oracle Enterprise Manager, providing users with familiar interfaces for cloud-based backups. For customers with an ongoing need to quickly move very large volumes of data into or out of the AWS cloud, Amazon allows the creation of network peering connections.
  • 18. 18 CHAPTER-7 SECURITY OF CLOUD COMPUTING Security is the number one issue when it comes to cloud computing, and that only makes sense. Since a third party stores your data, you don’t know what’s going on with it. It’s easy to worry about the security risks of a cloud solution, but let’s not overlook the inherent security benefits, as well. 7.1. Data Leakage:- The biggest benefit is the centralization of data. Organizations have an issue with asset protection, in no small part because of data being stored in numerous places, like laptops and the desktop. Thick clients are apt to download files and maintain them on the hard drive, and there are plenty of laptops out there with nonencrypted files. Using thin clients creates a better chance for centralized data storage. As such, there’s less chance for data leakage. Centralization also provides the opportunity for better monitoring. That data is in one place makes it easier to check in on your data and see that everything is okay.
  • 19. 19 7.2. Offloading Work:-Another security benefit isn’t so much a technology, but the fact that you don’t have to do it yourself. It’s up to the cloud provider to provide adequate security. After all, can your organization afford 24/7 IT security staffing? The fact of the matter is that your cloud provider might offer more security features than you had before. The fact that so many clients are paying allows cloud providers to have beefier security, simply because of the economy of scale involved. That is, there are many paying clients so the provider is able to do more, because there is more money in the pot. Plus it’s to the provider’s benefit to offer more, because they want to get a good reputation. 7.3. Logging:- Logging is also improved. It’s something that, in-house, usually gets the short end of the stick. But in the virtualized world of cloud computing, providers can add as much memory as they need to extend logging. 7.4. Forensics:- If there is a breach, the cloud provider can respond to the incident with less downtime than if you had to investigate the breach locally. It is easy to build a forensic server online, and it costs almost nothing until it comes into use. If there is a problem, the virtual machine can be cloned for easy offline analysis. Further, many companies don’t have a dedicated in-house incident response team. If there is a problem, IT staff have to quickly figure out their new job of taking the server down, quickly investigating, and getting it back online for minimal production downtime. 7.5 Development:- Even more good news is that security vendors aren’t in the dark about this whole cloud thing. They are actively developing products that can apply to virtual machines and the cloud. Security vendors also have a unique opportunity in the cloud. Since it’s new ground, there are new opportunities for the vendors who are open-minded enough to imagine them. 7.6 Auditing:- As an IT professional, you already know the headache of securing your own local network. But when you send your data to the cloud, a whole new set of issues arise. This is largely because your data is being stored on someone else’s equipment.
  • 20. 20  Privileged user access: - Inquire about who has specialized access to data, and about the hiring and management of such administrators.  Regulatory compliance: - Make sure that the vendor is willing to undergo external audits and/or security certifications.  Data Location: - Does the provider allow for any control over the location of data?  Data Segregation: - Make sure that encryption is available at all stages, and that these encryption schemes were designed and tested by experienced professionals.  Recovery: - Find out what will happen to data in the case of a disaster. Do they offer complete restoration? If so, how long would that take?  Investigative support: - Does the vendor have the ability to investigate any inappropriate or illegal activity?  Long-term viability: - What will happen to data if the company goes out of business? How will data be returned, and in what format?
  • 21. 21 CHAPTER- 8 ADVANTAGES 8.1. Cost Savings:- Perhaps, the most significant cloud computing benefit is in terms of IT cost savings. Businesses, no matter what their type or size, exist to earn money while keeping capital and operational expenses to a minimum. With cloud computing, you can save substantial capital costs with zero in-house server storage and application requirements. The lack of on-premises infrastructure also removes their associated operational costs in the form of power, air conditioning and administration costs. You pay for what is used and disengage whenever you like - there is no invested IT capital to worry about. It’s a common misconception that only large businesses can afford to use the cloud, when in fact, cloud services are extremely affordable for smaller businesses. 8.2. Reliability:-With a managed service platform, cloud computing is much more reliable and consistent than in-house IT infrastructure. Most providers offer a Service Level Agreement which guarantees 24/7/365 and 99.99% availability. Your organization can benefit from a massive pool of redundant IT resources, as well as quick failover mechanism - if a server fails, hosted applications and services can easily be transited to any of the available servers. 8.3. Manageability:-Cloud computing provides enhanced and simplified IT management and maintenance capabilities through central administration of resources, vendor managed infrastructure and SLA backed agreements. IT infrastructure updates and maintenance are eliminated, as all resources are maintained by the service provider. You enjoy a simple web-based user interface for accessing software, applications and services – without the need for installation - and an SLA ensures the timely and guaranteed delivery, management and maintenance of your IT services.
  • 22. 22 8.4. Strategic Edge:-Ever-increasing computing resources give you a competitive edge over competitors, as the time you require for IT procurement is virtually nil. Your company can deploy mission critical applications that deliver significant business benefits, without any upfront costs and minimal provisioning time. Cloud computing allows you to forget about technology and focus on your key business activities and objectives. It can also help you to reduce the time needed to market newer applications and services.  Drive down costs: Avoid large capital expenditure on hardware and upgrades. Cloud can also improve cost efficiency by more closely matching your cost pattern to your revenue/demand pattern, moving your business from a capital-intensive cost model to an Opex model.  Cope with demand: You know what infrastructure you need today, but what about your future requirements? As your business grows, a cloud environment should grow with you. And when demand is unpredictable or you need to test a new application, you have the ability spin capacity up or down, while paying only for what you use.  Run your business; don’t worry about your IT: Monitoring your infrastructure 24/7 is time consuming and expensive when you have a business to run. A managed cloud solution means that your hosting provider is doing this for you. In addition to monitoring your infrastructure and keeping your data safe, they can provide creative and practical solutions to your needs, as well as expert advice to keep your IT infrastructure working efficiently as your needs evolve.  Innovate and lead: Ever-changing business requirements mean that your IT infrastructure has to be flexible. With a cloud infrastructure, you can rapidly deploy new projects and take them live quickly, keeping you at the vanguard of innovation in your sector.  Improved security and compliance: You have to protect your business against loss of revenue and brand damage. In addition, many organizations face strict regulatory and compliance obligations. A cloud environment means that this responsibility no longer rests entirely on your shoulders. Your cloud hosting provider will build in resiliency and agility at an infrastructure-level to limit the risk of a security breach, and will work with you to help address compliance and regulatory requirements.
  • 23. 23  Future-proof your business: There is unprecedented demand for access to data anywhere, any time and on any device. Don’t let your business fall behind. By embracing the cloud, you can handle emerging mobile, BYOD and wearable technology trends
  • 24. 24 CHAPTER- 9 DISADVANTAGES 9.1 Downtime:-As cloud service providers take care of a number of clients each day, they can become overwhelmed and may even come up against technical outages. This can lead to your business processes being temporarily suspended. Additionally, if your internet connection is offline, you will not be able to access any of your applications, server or data from the cloud. 9.2 Security:-Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. However, such exploits and loopholes are not likely to surface, and the likelihood of a compromise is not great. 9.3 Vendor lock-in:-Although cloud service providers promise that the cloud will be flexible to use and integrate, switching cloud services is something that hasn’t yet completely evolved. Organizations may find it difficult to migrate their services from one vendor to another. Hosting and integrating current cloud applications on another platform may throw up interoperability and support issues. For instance, applications developed on Microsoft Development Framework (.Net) might not work properly on the Linux platform. 9.4 Limited control:-Since the cloud infrastructure is entirely owned, managed and monitored by the service provider, it transfers minimal control over to the customer. The customer can only control and manage the applications, data and services
  • 25. 25 operated on top of that, not the backend infrastructure itself. Key administrative tasks such as server shell access, updating and firmware management may not be passed to the customer or end user.  Requires a constant Internet connection. Cloud computing is impossible if you can't connect to the Internet. Since you use the Internet to connect to both your applications and documents, if you don't have an Internet connection you can't access anything, even your own documents. A dead Internet connection means no work, period and, in areas where Internet connections are few or inherently unreliable, this could be a deal-breaker. When you're offline, cloud computing simply doesn't work.  Doesn't work well with low-speed connections. Similarly, a low-speed Internet connection, such as that found with dial-up services, makes cloud computing painful at best and often impossible. Web-based apps require a lot of bandwidth to download, as do large documents. If you're laboring with a low-speed dial-up connection, it might take seemingly forever just to change from page to page in a document, let alone to launch a feature-rich cloud service. In other words, cloud computing isn't for the broadband-impaired.  Can be slow. Even on a fast connection, web-based applications can sometimes be slower than accessing a similar software program on your desktop PC. Everything about the program, from the interface to the current document, has to be sent back and forth from your computer to the computers in the cloud. If the cloud servers happen to be backed up at that moment, or if the Internet is having a slow day, you won't get the instantaneous access you might expect from desktop apps.  Features might be limited. This situation is bound to change, but today many web- based applications simply aren't as full-featured as their desktop-based brethren. For example, you can do a lot more with Microsoft PowerPoint than with Google Presentation's web-based offering. The basics are similar, but the cloud application lacks many of PowerPoint's advanced features. If you're a power user, you might not want to leap into cloud computing just yet.
  • 26. 26  Stored data might not be secure. With cloud computing, all your data is stored on the cloud. How secure is the cloud? Can unauthorized users gain access to your confidential data? Cloud computing companies say that data is secure, but it's too early in the game to be completely sure of that. Only time will tell if your data is secure in the cloud.  Stored data can be lost. Theoretically, data stored in the cloud is unusually safe, replicated across multiple machines. But on the off chance that your data goes missing, you have no physical or local backup. (Unless you methodically download all your cloud documents to your own desktop—which few users do.) Put simply, relying on the cloud puts you at risk if the cloud lets you down.
  • 27. 27 CONCLUSION Cloud computing is an emerging computing paradigm that is increasingly popular. Leaders in the industry, such as Microsoft, Google, and IBM, have provided their initiatives in promoting cloud computing. But still there are many question have left without an answer and indeed the most important one is security. IT technicians are spearheading the challenge, while academia is bit slower to react. Several groups have recently been formed, such as the Cloud Security Alliance or the Open Cloud Consortium, with the goal of exploring the possibilities offered by cloud computing and to establish a common language among different providers. New technologies and capabilities may result in a further evolution of the cloud computing model. Companies presently considering such a move must weigh the advantages against the potential drawbacks, and decide if they are ready to launch their data into the cloud. Before doing so, a consultation with an experienced cloud computing provider is the best way to determine an effective course of action.